The Cyber Most Wanted List
The FBI has posted a “Most Wanted Cyber Criminal” list. I hope you aren’t on it. OTW
Continue ReadingThe FBI has posted a “Most Wanted Cyber Criminal” list. I hope you aren’t on it. OTW
Continue ReadingWe have our first community post on Hackers-Arise. G was gracious and generous enough to offer this short tutorial on installing Kali 2.0 on VirtualBox. If you have an article you would like to submit to Hackers-Arise, send it to admin-hackers-arise@protonmail.com OTW Hey guys! I’m G. Recently, I finally decided to check out Kali 2.0 […]
Continue ReadingWelcome back, Mr. Robot fans! In the first episode of season 2 of Mr. Robot (eps2.0_unm4sk-pt1.tc), the hackers of f/society took control of the SmartHome of the General Counsel (the in-house, lead attorney) of Evil Corp. This woman’s elegant home, in the tony Greenwich Village section of New York City, had everything automated including the […]
Continue ReadingWelcome back, my aspiring cyber warriors! Nearly all of us have used a search engine such as Google or Bing to find material on the web. These search engines crawl the entire web and index nearly every word contained on those pages and rank them. This enables us find the information we are looking for […]
Continue ReadingContinuing with my series on how to crack passwords, I now want to introduce you to one of the newest and best designed password crackers out there—hashcat. The beauty of hashcat is in its design, which focuses on speed and versatility. It enables us to crack multiple types of hashes, in multiple ways, very fast. […]
Continue ReadingWelcome back, my aspiring cyberwarriors! Ransomware is rapidly becoming the most important form of malware afflicting our digital systems. Companies across the globe are being hit with various forms of malware including the new variant, Snake, designed specifically for SCADA/ICS systems. The Colonial Pipeline in the US was shutdown for nearly a week before paying […]
Continue ReadingThe war in Ukraine began February 24, 2022 when Putin marched his troops from Belorussia to invade Ukraine and attempt to capture the Ukraine capital, Kiev. The brave Ukrainians resisted this invasion and pushed back Putin’s troops. Within minutes of the war starting, Ukrainian officials made a request of the hackers of the world to […]
Continue ReadingWelcome back, my cyberwarriors! In recent months, AI or artificial intelligence has made great strides toward becoming a tool we may use everyday in cybersecurity. Very soon, we will likely be using it similarly to the way we use a search engine such as Google, Bing, or Shodan. These rapid developments seem to have raised […]
Continue ReadingWelcome back, my aspiring cyberwarriors! If the hacker can obtain or crack the target’s password, in many cases, this can lead to complete account compromise and takeover. Many people use simple passwords that are relatively easy to crack with a good word list. From our examination and analysis of data dumps on the dark web, […]
Continue ReadingHacking radio signals (RF) IS the leading edge of cybersecurity! So many applications in our modern life use radio frequency elements that it is hard to list them all. For instance, consider the following list: Automobile and vehicle access and monitoring Mouse and keyboards Cellphone Signals Remote control Telemetry Satellite transmissions Police and military […]
Continue Reading