Is LTE Vulnerability Traceable?
Calls made over the LTE network can still be monitored, even though they are encrypted. With a new system, researchers from the Ruhr University of …
Knowledge pool for Information Technologies
Calls made over the LTE network can still be monitored, even though they are encrypted. With a new system, researchers from the Ruhr University of …
Microsoft seems to be the victim of another leak related to the Windows operating system. This time around, the source code for Windows XP and …
This week, Check Point researchers announced a vulnerability in Instagram’s Android and iOS app that would take over the device remotely. With this vulnerability, the …
Linux operating system based servers generally do not have a graphical interface for security reasons. In this case, it is very important to know how …
In Linux-based operating systems, information about network operations such as network settings, network commands or network configuration is included. In Linux operating systems, as everything …
Security firm Secura published a technical article about CVE-2020-1472, an authentication vulnerability in Microsoft’s Netlogon authentication process, and the vulnerability was named “Zerologon.” The vulnerability …
Passwords are the first line of defence in any system’s protection. Passwordless SSH is a reliable alternative, but at the end of the day, a …
An easy-to-exploit bug in a popular WordPress plugin caused an internet-wide wave of hacking. Defiant, the company behind the Wordfence web firewall, said on Friday that …
SQL Server is a relational database management system developed by Microsoft. In the relational database system, data are kept in tables and these tables can …
Meterpreter is a tool written for the Metasploit Framework and aims to facilitate system penetration testing. It works as a kind of back door; It …