With every passing day, there is a new passwords breach. A lot of analysis has been done on patterns in password leaks. So, I thought..
I have been reading a lot about Chat bots and how they are the next big thing. Each day, there are articles about how chatbots can be ..
With the growth of Machine Learning in the past few years, many tasks are being done with the help of machine learning algorithms.Unfo..
Start Hacking – Comprehensive Hacking Tutorial
Recently, Pentagon launched their bug bounty program called “Hack the pentagon”. An engineer at Microsoft used XSSPY to find a Cross Site ..
Simple Social Engineering Trick with a phone call and crying baby.
An introduction to applied cryptography and information security suitable for programmers of all ages and skill levels.
The OWASP Testing Guide includes a “best practice” penetration testing framework which users can implement in their own organizations and ..