When the first hacking of a telecommunication system occurred?
Do we bet that such technique will appear in the next season of Mr. Robot? A team of researchers of the Cyber Security Research Center at Ben-Gurion University of the Negev in Israel have disclosed a new technique that can be used to exfiltrate data from air-gapped computers reading the pulses of light on the HDD…
A completely open-source mobile phone that you can assemble for 50$
Be careful, next time that you leave your computer unattended at your office!
Cracking Wi-Fi passwords, spoofing accounts, and testing networks on the road! Great tutorial by LifeHacker!