Shakar

News
All
What is the OMG Cable ?

What is the OMG Cable ?

The OMG Cable, referred to as the O.MG Elite cable, is a distinctive cable that functions as a hacki...

Flipper Zero

Flipper Zero

In cybersecurity and hardware hacking the Flipper zero is highly value tool that has gained signific...

A Counter-Unmanned Aircraft System (C-UAS)

A Counter-Unmanned Aircraft System (C-UAS)

Unmanned Aircraft Systems (UAS), commonly known as drones, are increasingly prevalent in various sec...

"GPS spoofing"  Falsification of GPS signals

"GPS spoofing" Falsification of GPS signals

U.S. cargo ship Stolen in the canal of Oman.

A few months ago, the U.S. accused an Iranian-b...

What is RFCAT?

What is RFCAT?

In 2010, the RFCAT tool was developed by an Israeli researcher named Stephen Powell, and this tool i...

What is a signal amplification attack? Passive keyless entry (PKE)

What is a signal amplification attack? Passive keyless entry (PKE)

How does it make a car door open without anyone using the car's controls to open or close, how ...

What is Hardware Hacking

What is Hardware Hacking

In general, hardware hacking refers to modifying an existing piece of hardware in order to use it in...

The Cyber Threat of FBI

The Cyber Threat of FBI

The Cyber Threat

Malicious cyber activity threatens the public’s safety and our national a...

Israeli Security Agency ( SHABAK)

Israeli Security Agency ( SHABAK)

he Israel Security Agency (ISA, Hebrew: שֵׁירוּת הַבִּיטָּחוֹן הַכְּלָל...

Military Intelligence Directorate

Military Intelligence Directorate

The Military Intelligence Directorate is one of the oldest Directorates in the IDF. It was establish...

Network attack history

Network attack history

1. 1988 – Morris Worm

- One of the first internet worms that caused widespread disruption.<...

Information Warfare in USA army

Information Warfare in USA army

Although it is widely agreed that information and Information Warfare (IW) has become a vital compon...

What is HackRF?

What is HackRF?

What is HackRF?

HackRF One is an open-source SDR platform that allows users to receive and tr...

Hacking techniques and tools

Hacking techniques and tools

Ultimately, what a hacker does is gain access to a system in some way that the system’s designers ...

Why do people hack?

Why do people hack?

Who are hackers and why do they hack? Motivations for hacking vary. Some of the most common include:...

How does hacking work?

How does hacking work?

So, how do hackers hack? Hackers use a variety of techniques to achieve their aims. Some of the most...

Protect Yourself Against Hacking

Protect Yourself Against Hacking

There are further steps that users and organizations can take to protect themselves against the thre...

Devices Most Vulnerable To Hacking

Devices Most Vulnerable To Hacking

Smart devices
Smart devices, such as smartphones, are lucrative targets for hackers. Android devi...

Hacking—Definition, Types

Hacking—Definition, Types

A commonly used hacking definition is the act of compromising digital devices and networks through u...

Network Security - New Windows Wi-Fi Flaw Lets Hackers Infiltrate Your PC Without You Even Clicking Anything

Network Security - New Windows Wi-Fi Flaw Lets Hackers Infiltrate Your PC Without You Even Clicking Anything

Microsoft releasing updates for 49 CVE-tagged security flaws in its products – including one bug d...

US, Allies Publish Guidance on Securing Network Access

US, Allies Publish Guidance on Securing Network Access

Government agencies in the US, New Zealand, and Canada have published new guidance on improving netw...

Ncrack

Ncrack

Ncrack is a powerful and flexible open-source tool used for network authentication cracking. It is d...

Information Warfare

Information Warfare

Information Warfare (IW): involves the strategic use of information to create an asymmetric advantag...

What is a Network Attack?

What is a Network Attack?

What is a Network Attack?

A network attack is the method of breaking the security of a comput...

What is Electromagnetic Warfare?

What is Electromagnetic Warfare?

Electromagnetic Warfare (EW), also referred to as Electronic Warfare, is a structured use of the ele...

History of Cybersecurity

History of Cybersecurity

History of Cybersecurity

The concept of cybersecurity traces back to the early days of comput...

what is a Cyber security

what is a Cyber security

Cyber security is the process of protecting devices, network, software and data from corrosive acces...

How FM Radio Hacking Work

How FM Radio Hacking Work

FM radio hacking works by exploiting the principles of frequency modulation to intercept, modify, or...

why FM Radio Hacking is important

why FM Radio Hacking is important

FM radio hacking holds considerable significance for a range of reasons across educational, technolo...

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

Attackers can exploit radio signals and mobile phones to steal protected data through several sophis...

what is a FM radio Hacking

what is a FM radio Hacking

FM radio hacking typically refers to various activities involving the manipulation, modification, or...

Golang language

Golang language

1. Simplicity: The language is designed to be simple and easy to read, with a clean syntax and minim...

what is a LINUX

what is a LINUX

What is Linux?

Just like Windows, iOS, and Mac OS, Linux is an operating system. In fact, one...

How Programming Languages Work

How Programming Languages Work

computers rely on a CPU, and a CPU can understand a specific set of instructions in the form of ones...

Israel uses programming languages in the military sector

Israel uses programming languages in the military sector

In Israel, programming languages and technologies developed for military use have played a significa...

what is a programming language

what is a programming language

what is a programming language

A programming language is a computer language that is used by ...

Malware protection best practices

Malware protection best practices

1. Update your frontline defenses

Adhere to policies and best practices for application, syst...

History of Malware

History of Malware

1982

A plain and simple "unwanted software" is the most widely accepted malware def...

Type of malware

Type of malware

here is the most common type of the malware:

1. What are Computer Viruses?
A virus is a ty...

what is malware?

what is malware?

malware means virus, in the real world we have a virus biologically such COVID 19 or corona and so o...

Cyberattacks: Bigger, smarter, faster

Cyberattacks: Bigger, smarter, faster

Cyberwars Begin

The Baltic nation of Estonia was the first state hit by a massive cyberattack...

The Kurds in the cyber warfare against ISIS

The Kurds in the cyber warfare against ISIS

friend sends you the link to a National Geographic video about the Kurdish Peshmerga fighting the Is...

Type Cyberwarfare

Type Cyberwarfare

Types of Cyberwarfare

1. Espionage
- Spying: Stealing secrets or sensitive information fro...

who is a Cyberwarfare Technician (CWT)

who is a Cyberwarfare Technician (CWT)

A Cyber Warfare Technician, often part of military or government cyber units, specializes in:

why cyberwarfare is very important?

why cyberwarfare is very important?

1) National Security: Protects against threats to a nation's safety and sovereignty and protect...

What is the pager and how exploded ?

What is the pager and how exploded ?

A pager is a wireless communication device that receives and displays alphanumeric or voice messages...

Automotive Hacking - Hacking Kia

Automotive Hacking - Hacking Kia

It is possible to control a car remotely by using the car license plate ?

Security researcher...

Recent Posts

ABOUT US

We are sharing latest cybersecurity newses, keep your eyes on us to be safe and be aware of the daily threats.

Copyright © Shakar - Developed by alienus.tech