What is the OMG Cable ?
The OMG Cable, referred to as the O.MG Elite cable, is a distinctive cable that functions as a hacki...
The OMG Cable, referred to as the O.MG Elite cable, is a distinctive cable that functions as a hacki...
In cybersecurity and hardware hacking the Flipper zero is highly value tool that has gained signific...
Unmanned Aircraft Systems (UAS), commonly known as drones, are increasingly prevalent in various sec...
U.S. cargo ship Stolen in the canal of Oman.
A few months ago, the U.S. accused an Iranian-b...
In 2010, the RFCAT tool was developed by an Israeli researcher named Stephen Powell, and this tool i...
How does it make a car door open without anyone using the car's controls to open or close, how ...
In general, hardware hacking refers to modifying an existing piece of hardware in order to use it in...
The Cyber Threat
Malicious cyber activity threatens the public’s safety and our national a...
he Israel Security Agency (ISA, Hebrew: שֵׁירוּת הַבִּיטָּחוֹן הַכְּלָל...
The Military Intelligence Directorate is one of the oldest Directorates in the IDF. It was establish...
1. 1988 – Morris Worm
- One of the first internet worms that caused widespread disruption.<...
Although it is widely agreed that information and Information Warfare (IW) has become a vital compon...
What is HackRF?
HackRF One is an open-source SDR platform that allows users to receive and tr...
Ultimately, what a hacker does is gain access to a system in some way that the system’s designers ...
Who are hackers and why do they hack? Motivations for hacking vary. Some of the most common include:...
So, how do hackers hack? Hackers use a variety of techniques to achieve their aims. Some of the most...
There are further steps that users and organizations can take to protect themselves against the thre...
Smart devices
Smart devices, such as smartphones, are lucrative targets for hackers. Android devi...
A commonly used hacking definition is the act of compromising digital devices and networks through u...
Microsoft releasing updates for 49 CVE-tagged security flaws in its products – including one bug d...
Government agencies in the US, New Zealand, and Canada have published new guidance on improving netw...
Ncrack is a powerful and flexible open-source tool used for network authentication cracking. It is d...
Information Warfare (IW): involves the strategic use of information to create an asymmetric advantag...
What is a Network Attack?
A network attack is the method of breaking the security of a comput...
Electromagnetic Warfare (EW), also referred to as Electronic Warfare, is a structured use of the ele...
History of Cybersecurity
The concept of cybersecurity traces back to the early days of comput...
Cyber security is the process of protecting devices, network, software and data from corrosive acces...
FM radio hacking works by exploiting the principles of frequency modulation to intercept, modify, or...
FM radio hacking holds considerable significance for a range of reasons across educational, technolo...
Attackers can exploit radio signals and mobile phones to steal protected data through several sophis...
FM radio hacking typically refers to various activities involving the manipulation, modification, or...
1. Simplicity: The language is designed to be simple and easy to read, with a clean syntax and minim...
What is Linux?
Just like Windows, iOS, and Mac OS, Linux is an operating system. In fact, one...
computers rely on a CPU, and a CPU can understand a specific set of instructions in the form of ones...
In Israel, programming languages and technologies developed for military use have played a significa...
what is a programming language
A programming language is a computer language that is used by ...
1. Update your frontline defenses
Adhere to policies and best practices for application, syst...
1982
A plain and simple "unwanted software" is the most widely accepted malware def...
here is the most common type of the malware:
1. What are Computer Viruses?
A virus is a ty...
malware means virus, in the real world we have a virus biologically such COVID 19 or corona and so o...
Cyberwars Begin
The Baltic nation of Estonia was the first state hit by a massive cyberattack...
friend sends you the link to a National Geographic video about the Kurdish Peshmerga fighting the Is...
Types of Cyberwarfare
1. Espionage
- Spying: Stealing secrets or sensitive information fro...
A Cyber Warfare Technician, often part of military or government cyber units, specializes in:
1) National Security: Protects against threats to a nation's safety and sovereignty and protect...
A pager is a wireless communication device that receives and displays alphanumeric or voice messages...
It is possible to control a car remotely by using the car license plate ?
Security researcher...
We are sharing latest cybersecurity newses, keep your eyes on us to be safe and be aware of the daily threats.
Copyright © Shakar - Developed by alienus.tech