BlogHide Resteemszargham (25)in transport • 7 years agosteemCreated with Sketch.SMART TRANSPORTATION AND AUTONOMOUS VEHICLES Could be the future IoTVehicles and transportation systems have evolved into smart entities with sensing, autonomous and automatic capabilities within smart cities due to digital devices, ubiquitous computing and…zargham (25)in wearable-devices • 7 years agosteemCreated with Sketch.WBAN (Wireless body area network) a security breach could be horribleWearable devices are small embedded sensors which gather patient’s real time data from its surrounding then process this data and transmit it to any other remote location for further examination. As…zargham (25)in racism • 7 years agoThe Tor Project Defends the Human Rights Racists OpposeWe've heard that the hate-spewing website Daily Stormer has moved to a Tor onion service. We are disgusted, angered, and appalled by everything these racists stand for and do. We feel this way any…zargham (25)in phishing • 7 years agoPhishing: Tactics And Tools ExplainedPhishing (password harvesting fishing) is one of the most effective technique that hackers use to steal your credentials. Phishing is a mix of social engineering and computer skills that consists of…zargham (25)in crypto • 7 years agoComplete PGP GuideThe goal here today is to try and educate newbies on what PGP is, how to install GPA, I'm making the guide because I educated myself on PGP and it took awhile for me to understand it. So here is a…zargham (25)in privacy • 7 years agoEncrypting Your Hard Drive With TruecryptIntroduction If you save anything on your computer, it is likely that you do not want just anyone to be able to see what you have saved. You want a way to protect that information so that you can…zargham (25)in hacking • 7 years agoHow to access onion sites?In order to use most of the sites on the Hidden Marketplace list, you must be able to access and browse .onion sites on the TOR network. Accessing these sites is a very simple process; for those of…zargham (25)in privacy • 7 years agoBest VPN Services -- VPN Comparison Chartzargham (25)in hacking • 7 years agoBeware from DroidJack (Install Smart App Manager)There is nothing that you can do with a PC that you can't do using an Android phone. Since the power in the hand has grown so much, a control over that power is also needed. DroidJack is what you…zargham (25)in hacking • 7 years agoSession hijacking steals your account while you're using it. Here's how.Every login you do on an account is called a session. Normally, only you and the server knows what's happening in the session. But a session hijacker can sneak up on you, and spy on everything you…zargham (25)in chrome • 7 years ago8 More Chrome Extensions Hijacked to Target 4.8 Million Users.Google's Chrome web browser Extensions are under attack with a series of developers being hacked within last one month. Almost two weeks ago, we reported how unknown attackers managed to compromise…zargham (25)in backdoor • 7 years agoBackdoor Found in Popular Server Management Software used by Hundreds of CompaniesCyber criminals are becoming more adept, innovative, and stealthy with each passing day. They are now adopting more clandestine techniques that come with limitless attack vectors and are harder to…zargham (25)in androidhack • 7 years agoAndroid Trojan Now Targets Non-Banking Apps that Require Card PaymentsThe infamous mobile banking trojan that recently added ransomware features to steal sensitive data and lock user files at the same time has now been modified to steal credentials from Uber and other…