How Hackers Steal Passwords using the SEToolkit

We’ll start by explaining the anatomy of the attack, and then we’ll perform the attack for ourselves. We’re going to be using a Man in the Middle Attack and a DNS spoofing attack, so you should read up on those attacks if you haven’t already. So, without further adieu, let’s get started! The Anatomy of […]

Snake Malware Modified; OS X The Next Target

The security researchers at Fox-IT have discovered a modified version of the previously known snake malware. A version specifically designed to target MacOS. Still not sure what snake malware is? Well, it also goes by the name of Turla, Agent.BTZ and Uroburous. Sounds familiar now? Previous Victims: As per reports, the snake malware was previously […]

If You Use Facebook Messenger, This Is How You Are Being Recorded Even When Not On The Phone

There are many ups and downs about improvements in technology. We have, undoubtedly, become more enamoured with its ability to make our lives easier, and more informed in ways we never thought possible. Everything has been digitized, and there are so many forms of communication, it’s no wonder the home telephone has collected dust.My suggestion: […]