Information security

694 Publication

Fsociety - framework for hacker

Fsociety - framework for hacker Greetings, dear reader! Today we will talk about the Fsociety framework. This framework contains all the tools used in the notorious Mr. Robot series. The framework structure consists of a huge set of tools for conducting penetration testing sorted by categories from information collection to post-operation. The advantage of Fsociety is that it can be run on Fsociety - framework for hacker

How mobile operators analyze our data

How mobile operators analyze our data Mobile operators receive a lot of data and metadata, from which you can learn a lot about the life of a single subscriber. And having understood how this data is processed and stored, you will be able to track the entire chain of information passing from the call to debiting money. If we talk about the internal intruder model, then the possibilities are even How mobile operators analyze our data

Fundamentals of information security

Fundamentals of information security Each of us has heard a lot about the concept of "information security" (IS), but for most these words remain an empty sound. For the vast majority of those who have an idea about information security, its basic principles are a sealed secret and only a few professionals can tell what information security is. Practitioners will not learn anything new, Fundamentals of information security

Information security

Information security Information protection Wikipedia The practice of preventing unauthorized access, use, disclosure, distortion, modification, research, recording or destruction of information. This universal concept applies regardless of the form that data can take. The main task of information security is the balanced protection of confidentiality, integrity and availability of data, taking Information security

Social engineering

Social engineering In one of the last articles, we discussed the changes in social engineering scenarios that the global COVID-19 pandemic provoked. Of course, it is impossible to consider all the subtleties within the framework of one publication, so today we will continue our conversation and tell you about the features of the attacker's physical penetration into the company's territory. It Social engineering