• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Category: Security

Relay again. Mastering relevant NTLM Relay attack techniques implemented via SCCM
Security

Relay again. Mastering relevant NTLM Relay attack techniques implemented via…

1 month ago28/08/2025DrieVlad540
No doubt, you’ve heard many times that the NTLM Relay support is about to be disabled in Windows. I’ve heard it many times, too, but it’s mid-2025, and I still encounter NTLM Relay in almost every project. This article discusses relevant NTLM Relay…
CONTINUE READING 🡒
Comparing 8 Home Firewalls: Which Has the Strongest Default Security?
Security

Comparing 8 Home Firewalls: Which Has the Strongest Default Security?

1 month ago23/08/2025Aleksei Zemond Pankratov1110
You’d think picking a firewall for a home PC would be simple—just install it and go. But firewalls aren’t all the same, and choosing the right one can take time and effort. Today we’ll look at eight…
CONTINUE READING 🡒
Windows 10 Privacy Tools: Testing Apps to Disable Telemetry and Tracking
Security

Windows 10 Privacy Tools: Testing Apps to Disable Telemetry and…

1 month ago23/08/20258bit5100
It’s been more than three years since Windows 10 launched, and the issue of user data being sent to Microsoft’s servers still hasn’t been resolved. Worse, it’s been compounded by forced resets of privacy settings and the…
CONTINUE READING 🡒
DeepNude Explained: How AI Undresses Women in Photos and Drives Deepfake Abuse
Security

DeepNude Explained: How AI Undresses Women in Photos and Drives…

1 month ago23/08/2025ShəLMā3890
DeepNude, an app that can shamelessly undress women in photos, blew up online last June. The project runs on a hellish cocktail of neural networks, artificial intelligence, and raw sexual instinct.
CONTINUE READING 🡒
Why Messaging Apps Don’t Truly Protect Your Chat Privacy—and How to Do Encryption Right
Security

Why Messaging Apps Don’t Truly Protect Your Chat Privacy—and How…

1 month ago19/08/202584ckf1r31230
End-to-end encryption (E2EE) is often touted as a cure-all against persistent attempts by hackers and law enforcement to read online conversations. It’s commonly summarized as “the keys live only on the participants’ devices and never touch the…
CONTINUE READING 🡒
How Everyday Users Try to Hide Digital Evidence—and Why It Fails
Security

How Everyday Users Try to Hide Digital Evidence—and Why It…

1 month ago19/08/2025Oleg Afonin380
Most criminals are anything but professionals, so the data-hiding methods they use are pretty crude. Yet these methods often work—simply because the investigator may not have the time or expertise to run a thorough analysis. So what…
CONTINUE READING 🡒
How to Choose and Set Up an ESP8266 Wi‑Fi Deauther
Security

How to Choose and Set Up an ESP8266 Wi‑Fi Deauther

1 month ago19/08/2025vipluxa2220
A Wi‑Fi jammer—also called a Wi‑Fi blocker—is a gadget designed to disconnect wireless devices from an access point. Such a device can be used for harmless pranks as well as for criminal purposes, for example to take…
CONTINUE READING 🡒
DIY Ultra-Cheap Zigbee and Z-Wave Hub for Smart Home Devices
Security

DIY Ultra-Cheap Zigbee and Z-Wave Hub for Smart Home Devices

1 month ago19/08/2025Vitaly Yurkin480
Once you start building a smart home, it’s hard to stick to a single vendor. That means you’ll end up with a mishmash of standards that don’t mesh well and a lineup of hubs—each one hogging a…
CONTINUE READING 🡒
Quick Guide to Online Anonymity: Encryption Types, Traffic Protection, and Choosing the Right Security Tools
Security

Quick Guide to Online Anonymity: Encryption Types, Traffic Protection, and…

1 month ago19/08/2025Mikhail Kireev720
Today, everyday users have access to a solid range of cryptographically robust encryption protocols and the software that implements them. In this article, we’ll survey the main categories of these solutions (even if many are already well…
CONTINUE READING 🡒
Intercepting and Decoding RF Remote Control Signals with SDR
Security

Intercepting and Decoding RF Remote Control Signals with SDR

1 month ago19/08/2025DmitrySpb791650
If the word “radio” only brings to mind grandpa’s old Grundig or a Soviet Okean set, that’s a pretty narrow view. We live in an age of wireless devices, the Internet of Things, 5G, and all sorts…
CONTINUE READING 🡒
Vim for Beginners: Stop Fearing the Editor You Can’t Exit and Start Using It
Security

Vim for Beginners: Stop Fearing the Editor You Can’t Exit…

1 month ago16/08/2025Eugene Zobnin530
Vim is one of the most polarizing tools ever made. It’s not just an editor—it’s a litmus test that neatly divides programmers, admins, and Unix die-hards into insiders and outsiders. While some ask why we still need…
CONTINUE READING 🡒
Hacking with Google: Up-to-Date Google Dork Queries for OSINT and Penetration Testing
Security

Hacking with Google: Up-to-Date Google Dork Queries for OSINT and…

1 month ago16/08/202584ckf1r3740
Penetration tests usually rely on a toolkit of specialized utilities, but one of them is available to everyone and always at your fingertips—Google. You just need to know how to use it. Google dork queries are clever…
CONTINUE READING 🡒
GPU-Accelerated Password Cracking: Harnessing Your Graphics Card for Brute-Force Attacks
Security

GPU-Accelerated Password Cracking: Harnessing Your Graphics Card for Brute-Force Attacks

1 month ago16/08/2025Andrey Vasilkov2220
Modern graphics cards are essentially compact supercomputers, delivering several teraflops of performance. A multi-GPU setup fits on a desk and can quickly crack most encrypted files. Where you once had to buy and configure a stack of…
CONTINUE READING 🡒
Privacy Showdown: Comparing the Most Secure Browsers
Security

Privacy Showdown: Comparing the Most Secure Browsers

2 months ago11/08/2025ShəLMā2670
Web browsers collect a lot of data about users and track their activity online. To counter that, there are dedicated privacy browsers built to protect your privacy and block tracking and ads. Today we’ll review and compare…
CONTINUE READING 🡒
Beyond Packet Sniffers: How to Choose the Right Tool for Network Traffic Capture and Analysis
Security

Beyond Packet Sniffers: How to Choose the Right Tool for…

2 months ago11/08/2025ShəLMā600
There’s a lot of interesting stuff to be found in network packets. To capture and analyze traffic, we use packet sniffers—and there are plenty to choose from. Today, we’ll look at the most popular sniffers for Windows.
CONTINUE READING 🡒
FPGA Fundamentals: Inside Programmable Logic Architecture and Key Advantages
Security

FPGA Fundamentals: Inside Programmable Logic Architecture and Key Advantages

2 months ago11/08/2025Yuri Rumyantsev510
Imagine a processor that, instead of executing a fixed set of instructions, reconfigures itself for each program and turns the algorithm directly into hardware. That’s exactly how FPGAs work! In this article, I’ll explain how that’s possible…
CONTINUE READING 🡒
Windows 10 Hardening Guide: Secure, Private, and Optimized Setup for Everyday Use
Security

Windows 10 Hardening Guide: Secure, Private, and Optimized Setup for…

2 months ago11/08/2025Andrey Vasilkov850
Over the years, Windows has evolved from a graphical shell on top of MS-DOS into a client front end for Microsoft’s cloud services. Turning it into a fully self-sufficient OS is probably unrealistic, but with some deep…
CONTINUE READING 🡒
Fortress assault: Bypassing authentication in FortiOS and FortiProxy
Security

Fortress assault: Bypassing authentication in FortiOS and FortiProxy

2 months agoYellowDuck670
This article narrates my searches for the CVE-2024-55591 vulnerability in FortiOS and FortiProxy disclosed by Fortinet. This security hole makes it possible to bypass authentication using an alternate path or channel (CWE-288) and enables a remote attacker to gain administrator privileges and execute arbitrary commands.
CONTINUE READING 🡒
How to Encrypt XMPP (Jabber) Chats: Step-by-Step Guide
Security

How to Encrypt XMPP (Jabber) Chats: Step-by-Step Guide

2 months ago11/08/2025Hacker1310
I don’t think I need to explain why someone might want a reliable, secure communication channel. Sure, you can encrypt messages and send them by email, but the very fact that you’re sending something can be telling.…
CONTINUE READING 🡒
Modlishka Reverse-Proxy Phishing: How Attackers Bypass Two-Factor Authentication
Security

Modlishka Reverse-Proxy Phishing: How Attackers Bypass Two-Factor Authentication

2 months ago11/08/20258bit2590
Underground forums are rife with offers to hack accounts. In most cases, attackers rely on phishing with spoofed login pages. However, that approach doesn’t work when the user receives an SMS verification code. I’ll show how to…
CONTINUE READING 🡒
« Previous 1 2 3 4 5 6 … 13 14 15 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com