Blog Archives

This is the most authentic phishing site I’ve ever seen

There’s a new phishing site proof of concept on the block and I guarantee you it would trick you.  Think I’m kidding? Check this out.

Posted in Apple, Google Chrome, Malware, Mozilla Firefox, Security Tagged with: , , ,

Two ways to respond to the recent CIA and Vault7 Wikileaks exposures

fixedbyvonnie-help-ive-been-hacked_1

In case you’ve been living in a cave without electricity for a few days, on March 7th, 2017, WikiLeaks leaked a collection of almost 9,000 documents allegedly from the CIA related to a project known as Vault7.  The CIA issued an

Posted in Desktops, Laptops, News, Security, Smartphones, Tablets Tagged with: , , ,

How to become a hacker

The Weekend Penetration Testing Lab Creation Bootcamp

Have you ever wondered how to become a hacker? How are the bad guys breaching organizations and not getting caught?  Okay, maybe you’ve seen some videos online but the truth is the only way you’ll learn how to hack is

Posted in Laptops, Security, Windows, Windows 10, Windows 7, Windows 8 Tagged with: , , ,

Detecting Rootkits on a PC

Detecting Rootkits in Kali Linux

Imagine malware so sophisticated that it not only disappears from the Windows Task Manager and your antivirus software but also modifies the code that undergirds the operating system in such a way that it’s virtually impossible to detect. Does such a thing

Posted in Linux, Security, Windows, Windows 10, Windows 8.1 Tagged with: , , , ,

Welcome to Kali Linux (Part 3 of 3)

Image credit Tobi Firestone via Flickr

In the first guide, I gave you an overview of Kali Linux.  Then in the previous guide I showed you how to setup Kali Linux in VirtualBox.  In this guide, we’re going to log in Kali Linux, update the packages

Posted in Linux, Security Tagged with: , , , , ,

Last updated by at .