Ex-National Security Agency (NSA) employee Edward Snowden’s various leaks – the most recent being a slide showing that the NSA infected 50,000 of computer networks with remote-controlled spyware – confirm that state intelligence agencies around the world have been collecting and analysing peo
via Pocket http://ift.tt/1gjzLvw
The NSA has seemingly become a loaded acronym with many people tying either illegal actions or useful surveillance to it.
via Pocket http://ift.tt/1gjzIjp
A modern Open-Source MySQL Data Management tool with fast and elaborate user interface. Created because of an disaffection with existing MySQL data management tools. Share the post “Open-Source MySQL…
via Pocket http://ift.tt/1epOTXA
Twitter has joined the likes of Google and Facebook, by implementing “forward secrecy,” a security tool that will aid the effort to keep out government agencies like the NSA and and GCHQ.
via Pocket http://ift.tt/18xjIbZ
The study of friend list is another powerful practice to profile a target, but it is known that through privacy setting Facebook users can make the friend list public or private, if friend list is made private it will be not visible on publicly viewable profile.
via Pocket http://ift.tt/1aXhRt1
To reduce online piracy Google has implemented several changes to its search engine in recent years. Among other things, the search engine blacklisted dozens of piracy-related terms from appearing in its Autocomplete and Instant services.
via Pocket http://bit.ly/18mODEY
A U.S. surveillance court has given the National Security Agency no limit on the number of U.S. telephone records it collects in the name of fighting terrorism, the NSA director said Thursday. The NSA intends to collect all U.S.
via Pocket http://bit.ly/17aCkKp
Several months ago, I was asked if I had a way to get past two-factor authentication on web applications. Criminals do it, but penetration testers don’t. To solve this problem, I built a man-in-the-browser capability for penetration testers and red teams. I call it browser pivoting.
via Pocket http://bit.ly/19KvtIl
Summary: Penetration testers seeking flaws in computer systems can now take advantage of Kvasir, a web-based application built to assist in “at-a-glance” tests.
via Pocket http://zd.net/1fBFEVt