Monitoring the brand mention Do you want to know the coverage of a particular brand? DataLocator is an artificial intelligence that collects and processes information online.
Information security (IS) is one of the most in-demand areas of IT. In this article, you will learn about the professions of IB and how to switch to IB with any background.
Changing your voice ? People often change their voice on audio recordings — to preserve anonymity or just to make fun of friends. For example, to say something frightening in the voice of a monster.
? Maltego blog. Up-to-date tools, modules and manuals. • Since June 2022, #Maltego has launched a new section on its blog, which describes relevant and useful tools, cheat sheets, manuals and modules for its tool.
Witchcraft Online is a social engineering tool with sub-functions that aim to meet people's social needs, such as social media services and short message services. Launched attacks are always associated with spam (resending messages), spoofing and brute force engineering, since dos or denial of service subfunctions are nothing more than just attracting interested users.
Help a buddy prank his colleagues! Show your mettle with spoofing emails, malicious attachments, spoofing sms, and spoofing phone calls to get access to voicemail
Digital epidemics The first computer viruses appeared back in the 1970s. They were conceived as harmless and more like games, the purpose of which was to distribute the program to the largest number of players. The participant whose program will make more copies of its own and fill the computers of others faster was declared the winner.
Hacking routers and finding their location Keep in mind, illegal entry is punishable by law.The channel is not responsible First we need the RouterScan program:
Social engineering In one of the last articles, we discussed the changes in social engineering scenarios that the global COVID-19 pandemic provoked. Of course, it is impossible to consider all the subtleties within the framework of one publication, so today we will continue our conversation and tell you about the features of the attacker's physical penetration into the company's territory. It
Fundamentals of information security Each of us has heard a lot about the concept of "information security" (IS), but for most these words remain an empty sound. For the vast majority of those who have an idea about information security, its basic principles are a sealed secret and only a few professionals can tell what information security is. Practitioners will not learn anything new,
How mobile operators analyze our data Mobile operators receive a lot of data and metadata, from which you can learn a lot about the life of a single subscriber. And having understood how this data is processed and stored, you will be able to track the entire chain of information passing from the call to debiting money. If we talk about the internal intruder model, then the possibilities are even