No password is safe from new breed of cracking software

/
No password is safe from new breed of cracking software

Hackers target President Obama’s social media tools

/
The political activist hackers of the Syrian Electronic Army are at it again, targeting one of the highest-profile users of social media in the world: President Obama. But SEA's claims of commandeering his Twitter account aren't quite accurate

Tor trouble: Anonymizing service faces vulnerability claims

/
Tor trouble: Anonymizing service faces vulnerability claims

WordPress 3.7 Released

/
WordPress 3.7, “Basie”, has just been released. It’s been named in honor of Count Basie. The WordPress 3.7 development cycle is the quickest turnaround between major versions with just 86 days from the time it launched WordPress 3.6 back in August 1. It has been stated version 3.8 is due out in December as it will continue this plugin-led development cycle.

Digital Attack Map

/
Check out the Digital Attack Map. It was produced in a collaborative effort by Google Ideas and Arbor Networks to raise awareness about distributed denial of service attacks.

Google’s new service will show Animated map of DDoS attacks

/
Google’s new service will show Animated map of DDoS attacks

BarCamp Charlotte 8

/
We are excited to announce, not only a new partnership with CPCC and The Geek Fest but a new website too. With the new face lift we are hoping to provide you with a more informative and interactive website. If there is something you’d like to see on our website, contact us at barcampcharlotte@gmail.com.

Kali Linux Default Username and Password

/
During installation, Kali Linux allows users to configure a password for the root user. However, should you decide to boot the live image instead, the i386, amd64, VMWare and ARM images are configured with the default root password – “toor“, without the quotes.

(ISC)2 FREE Half-Day CAP® Credential Clinic

/
(ISC)2 is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers with Gold Standard certifications and world class training.

Security Flaw In Chrome May Leave Users’ Personal Information At Risk

/
In a blog posted last week, researchers at security firm Identity Finder outlined methods for accessing personal data from Chrome's History Provider Cache, even if the data has been entered on a secure website. Some data also may be accessible through Chrome's Web Data and History databases, the researchers say.