• in ,

    Top 30 Bug Bounty Programs in 2018

    Below is a curated list of Bounty Programs by reputable companies 1) Intel Intel’s bounty program mainly targets the company’s hardware, firmware, and software. Limitations: It does not include recent acquisitions, the company’s web infrastructure, third-party products, or anything relating to McAfee. Minimum Payout: Intel offers a minimum amount of $500 for finding bugs in their system. […] More

  • in

    WHAT IS CLOUD STORAGE SECURITY? SECURING CLOUD STORAGE USAGE

    As cloud adoption continues to grow rapidly at the enterprise level, IT and security departments must provide for secure use of cloud storage and services. A DEFINITION OF CLOUD STORAGE SECURITY While cloud storage is convenient and gives employees access to their data anywhere, at any time, on nearly any device, cloud storage security is […] More

  • in

    The Life of Hackers [Full Documentary]

    A day in the life of a professional hacker: How IT spies masquerading as employees are paid to test company security(aided by ex-CIA, FBI and Delta Force operatives). 1.) Alexander Jones carries out ‘full penetration tests’ at multinational corporations as well as small businesses. 2.) Involves getting past office security and hacking into internal networks.The […] More

  • in ,

    TOR VS VPN VS PROXY

    What is Tor? Tor or “The Onion Router” is a service created to allow people to anonymously browse the Internet. It is a decentralized system that allows users to connect through a network of relays rather than making a direct connection. The benefit of this method is that your IP address is hidden from the […] More

  • in ,

    Evil Twin Tutorial

    Prerequisites Kali Linux Prior experience with wireless hacking You will also need to install a tool (bridge utils) which doesn’t come pre-installed in Kali. No big deal- apt-get install bridge-utils Objectives The whole process can be broken down into the following steps- Finding out about the access point (AP) you want to imitate, and then […] More

  • in

    Intel CPU Kernel Bug

    During a conference call Wednesday afternoon, Intel shed more light on the CPU kernel vulnerability, now being referred to as a “side channel analysis exploit.” Expect to see patches roll out to address the flaw over the next several weeks, Intel executives said. The performance impact of the patches is expected to be at frustrating […] More

  • in

    Love

    The New Giant In House

    Hey guys, first of all Happy New Year from all of us at CYBERTRON and this article is going to be little different from my regular articles.Today I am not going to talk about hacking or any other thing like that, today I am going to talk about a new giant in house “Defense Pacific” a brand new […] More

  • in ,

    Area 51

    Less than 100 miles from Las Vegas, Nevada is the most famous secret military installation on the planet. Rumors swirl around this base, much like the mysterious aircraft that twist and turn in the skies overhead. Although it’s known by many names, most people call it by the Atomic Energy Commission’s (AEC) designation: Area 51.  Area 51 is surrounded […] More

  • in

    Understanding Google Dorks and How Hackers Use Them

    The idea of using Google as a hacking tool or platform certainly isn’t a novel idea, and hackers have been leveraging this incredibly popular search engine for years. In fact, Google Dorks have their roots in 2002 when a man by the name of Johnny Long started using custom queries to search for elements of […] More

Load More
Congratulations. You've reached the end of the internet.