3 Things You Need to Know About Apple’s A12 Bionic Chip

Built using 7-nanometer tech In its press release, Apple boasted that its new trio of iPhones incorporate “the first 7-nanometer chip in a smartphone.” Since Taiwan Semiconductor Manufacturing Company (NYSE:TSM) is the only company that’s currently mass-producing 7-nanometer chips, it’s a safe bet that the Taiwan-based contract chip manufacturing giant is responsible for cranking out Apple’s latest chip design. […]

READ MORE
What is OSINT? How can I make use of it?

In the past months, we have reviewed a couple interesting OSINT utilities. In fact, just a few weeks ago, we also published the Top 20 OSINT Tools as a great resource for everyone with an information security investigation. But one thing is missing for all those who have just started the fascinating world of cybersecurity:  the key concept […]

READ MORE
Penetration

Definition of ‘Penetration’ Definition:  Penetration defines how many users there are for a product. This is one of the measures a company or industry can use to get their customers to succeed. The penetration numbers for India are very low in most products, like telephones (tele density) or shampoos, soaps, cosmetics and so on. Description:  A rising penetration of […]

READ MORE
Rooting Your Android Phone

We love Android, but rooting your phone can give you the opportunity to do more with your phone than you can with the box — whether it’s wireless tethering, speeding it up with overclocking, or customizing the look with your phone. Here’s what you need to know about the rooting process, and where to find a […]

READ MORE
What is Jailbreaking?

You’ve probably seen the term “jailbreaking” on your travels around the web, but what exactly is this vaguely illicit-sounding term? It’s a busting out of prison – it’s about unlocking your phone. Jailbreaking is usually used in connection with the iPhone, the most ‘locked down’ mobiles on sale today: it lets you install apps that have […]

READ MORE
Backtracking

Introduction Prerequisites  : Recursion Complexity Analysis Backtracking is an algorithmic-technique for solving problems by trying to build a solution incrementally, at one piece of time, by removing those solutions that fail to satisfy the constraints of the problem at any point in time (here, time, here) the search tree of any level until the time elapsed). […]

READ MORE
Lan Turtle

Introduction: What’s LAN Turtle? The LAN Turtle is a covert Systems Administration and Pentesting tool providing stealth remote access, network intelligence gathering, and MiTM (man-in-the-middle) surveillance capabilities through a simple graphic shell. Available models: LAN Turtle Classic LAN Turtle SD (Storage expansion via Micro SD, capture packets, exfiltrate data) LAN Turtle 3G (Unclocked world-band 3G […]

READ MORE
Wifi Pineapple

Introduction: What’s WiFi Pineapple? The WiFi Pineapple NANO and TETRA are the 6th generation auditing platforms for wireless networks invented by Darren Kitchen, the founder of Hak5. Pineapple looks similar to a typical access point (AP) but is loaded with a custom OS, called PineAP. It’s developed for mobile and persistent deployments, therefore it’s able to interface with hundreds […]

READ MORE
Keylogger

A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices. Keyloggers are often used as a spyware tool by cybercriminals to steal personally […]

READ MORE