ethical_hackers (growing_hacker) instagram photos and videos

ethical_hackers
ethical_hackers

Ethical hacker🏆📱 Linux lover🖥️ Coding and hacking post 💻⌨️🖱️ Tech content 📶

ethical_hackers all instagram publications

  • followers count: 2,196
  • followers rank: 0
  • likes count: 13,650
  • like rank: 0

Most popular images

Hype medias

photo by ethical_hackers with description
            ElectionGuard Bug Bounty Program

Since no software comes bugs-free, Microsoft today finally launched the ElectionGuard Bounty program, inviting security researchers from across the world to help the company discover high impact vulnerabilities in the ElectionGuard SDK. "The ElectionGuard Bounty program invites security researchers to partner with Microsoft to secure ElectionGuard users, and is a part of Microsoft's broader commitment to preserving and protecting electoral processes under the Defending Democracy Program," the company says in a blog post published today.

ElectionGuard Bug Bounty Program Since no software comes bugs-free, Microsoft today finally launched the ElectionGuard Bounty program, inviting security researchers from across the world to help the company discover high impact vulnerabilities in the ElectionGuard SDK. "The ElectionGuard Bounty program invites security researchers to partner with Microsoft to secure ElectionGuard users, and is a part of Microsoft's broader commitment to preserving and protecting electoral processes under the Defending Democracy Program," the company says in a blog post published today. #engineeringstudent #trojan #stegnography #exploit #softwareengineering #crackers #linux #geek #shellscript #ethicalhacker #softwereengineering #pentesting #blackhathacker #hacker #blackhat #ransomware #bugbounty #metasploit #malware #grayhat #websitedesign #Virus #redteam #indianhacker #weareanonymous #kalilinux #pentesting #metasploit #google #cybersecurityexpert #hackernews #hackerinstagram

photo by ethical_hackers with description
            A decade-old botnet malware that currently controls over 450,000 computers worldwide has recently shifted its operations from infecting machines with ransomware or crypto miners to abusing them for sending out sextortion emails to millions of innocent people

A decade-old botnet malware that currently controls over 450,000 computers worldwide has recently shifted its operations from infecting machines with ransomware or crypto miners to abusing them for sending out sextortion emails to millions of innocent people #engineeringstudent #trojan #stegnography #exploit #softwareengineering #crackers #linux #geek #shellscript #ethicalhacker #softwereengineering #pentesting #blackhathacker #hacker #blackhat #ransomware #bugbounty #metasploit #malware #grayhat #websitedesign #Virus #redteam #indianhacker #weareanonymous #kalilinux #pentesting #metasploit #google #cybersecurityexpert #hackernews #hackerinstagram

photo by ethical_hackers with description
            A picture is worth a thousand words, but a GIF is worth a thousand pictures.

Today, the short looping clips, GIFs are everywhere—on your social media, on your message boards, on your chats, helping users perfectly express their emotions, making people laugh, and reliving a highlight.

But what if an innocent-looking GIF greeting with Good morning, Happy Birthday, or Merry Christmas message hacks your smartphone?

A picture is worth a thousand words, but a GIF is worth a thousand pictures. Today, the short looping clips, GIFs are everywhere—on your social media, on your message boards, on your chats, helping users perfectly express their emotions, making people laugh, and reliving a highlight. But what if an innocent-looking GIF greeting with Good morning, Happy Birthday, or Merry Christmas message hacks your smartphone? #engineeringstudent #trojan #stegnography #exploit #softwareengineering #crackers #linux #geek #shellscript #ethicalhacker #softwereengineering #pentesting #blackhathacker #hacker #blackhat #ransomware #bugbounty #metasploit #malware #grayhat #websitedesign #Virus #redteam #indianhacker #weareanonymous #kalilinux #pentesting #metasploit #google #cybersecurityexpert #hackernews #hackerinstagram

WhatsApp Remote Code Execution Vulnerability The vulnerability, tracked as CVE-2019-11932, is a double-free memory corruption bug that doesn't actually reside in the WhatsApp code itself, but in an open-source GIF image parsing library that WhatsApp uses. #engineeringstudent #trojan #stegnography #exploit #softwareengineering #crackers #linux #geek #shellscript #ethicalhacker #softwereengineering #pentesting #blackhathacker #hacker #blackhat #ransomware #bugbounty #metasploit #malware #grayhat #websitedesign #Virus #redteam #indianhacker #weareanonymous #kalilinux #pentesting #metasploit #google #cybersecurityexpert #hackernews #hackerinstagram

photo by ethical_hackers with description
            A team of Canadian cybersecurity researchers has uncovered a sophisticated and targeted mobile hacking campaign that is targeting high-profile members of various Tibetan groups with one-click exploits for iOS and Android devices.

Dubbed Poison Carp by University of Toronto's Citizen Lab, the hacking group behind this campaign sent tailored malicious web links to its targets over WhatsApp, which, when opened, exploited web browser and privilege escalation vulnerabilities to install spyware on iOS and Android devices stealthily.

A team of Canadian cybersecurity researchers has uncovered a sophisticated and targeted mobile hacking campaign that is targeting high-profile members of various Tibetan groups with one-click exploits for iOS and Android devices. Dubbed Poison Carp by University of Toronto's Citizen Lab, the hacking group behind this campaign sent tailored malicious web links to its targets over WhatsApp, which, when opened, exploited web browser and privilege escalation vulnerabilities to install spyware on iOS and Android devices stealthily. #engineeringstudent #trojan #stegnography #exploit #softwareengineering #crackers #linux #geek #shellscript #ethicalhacker #softwereengineering #pentesting #blackhathacker #hacker #blackhat #ransomware #bugbounty #metasploit #malware #grayhat #websitedesign #Virus #redteam #indianhacker #weareanonymous #kalilinux #pentesting #metasploit #google #cybersecurityexpert #hackernews #hackerinstagram

photo by ethical_hackers with description
            Apple has just updated the rules of its bug bounty program by announcing a few major changes during a briefing at the annual Black Hat security conference yesterday.

One of the most attractive updates is…

Apple has enormously increased the maximum reward for its bug bounty program from $200,000 to $1 million—that's by far the biggest bug bounty offered by any major tech company for reporting vulnerabilities in its products

Apple has just updated the rules of its bug bounty program by announcing a few major changes during a briefing at the annual Black Hat security conference yesterday. One of the most attractive updates is… Apple has enormously increased the maximum reward for its bug bounty program from $200,000 to $1 million—that's by far the biggest bug bounty offered by any major tech company for reporting vulnerabilities in its products #engineeringstudent #trojan #stegnography #exploit #softwareengineering #crackers #linux #geek #shellscript #ethicalhacker #softwereengineering #pentesting #ransomware #hacker #blackhat #ransomware #bugbounty #metasploit #malware #gamerguy #anonymous #websitedesign #Virus #redteam #indianhacker #weareanonymous #kalilinux #pentesting #metasploit #google #cybersecurityexpert #hackernews #hackerinstagram

photo by ethical_hackers with description
            Creeper was an experimental computer program written by Bob Thomas at BBN in 1971. Its original iteration was designed to move between DEC PDP-10 mainframe computers running the TENEX operating system using the ARPANET, with a later version by Ray Tomlinson designed to copy itself between computers rather than simply move.[3] This self-replicating version of Creeper is generally accepted to be the first computer worm.

Creeper was an experimental computer program written by Bob Thomas at BBN in 1971. Its original iteration was designed to move between DEC PDP-10 mainframe computers running the TENEX operating system using the ARPANET, with a later version by Ray Tomlinson designed to copy itself between computers rather than simply move.[3] This self-replicating version of Creeper is generally accepted to be the first computer worm. #engineeringstudent #trojan #stegnography #exploit #softwareengineering #crackers #linux #geek #shellscript #ethicalhacker #softwereengineering #pentesting #ransomware #hacker #blackhat #ransomware #bugbounty #metasploit #malware #gamerguy #anonymous #websitedesign #Virus #redteam #indianhacker #weareanonymous #kalilinux #pentesting #metasploit #google #cybersecurityexpert #hackernews #hackerinstagram

photo by ethical_hackers with description
            Beware! Billion of Android users can easily be tricked into changing their devices' critical network settings with just an SMS-based phishing attack.

Whenever you insert a new SIM in your phone and connects to your cellular network for the very first time, your carrier service automatically configures or sends you a message containing network-specific settings required to connect to data services.

While manually installing it on your device, have you ever noticed what configurations these messages, technically known as OMA CP messages, include?

Well, believe me, most users never bother about it if their mobile Internet services work smoothly.

But you should worry about these settings, as installing untrusted settings can put your data privacy at risk, allowing remote attackers to spy on your data communications, a team of cybersecurity researchers told The Hacker News.

Beware! Billion of Android users can easily be tricked into changing their devices' critical network settings with just an SMS-based phishing attack. Whenever you insert a new SIM in your phone and connects to your cellular network for the very first time, your carrier service automatically configures or sends you a message containing network-specific settings required to connect to data services. While manually installing it on your device, have you ever noticed what configurations these messages, technically known as OMA CP messages, include? Well, believe me, most users never bother about it if their mobile Internet services work smoothly. But you should worry about these settings, as installing untrusted settings can put your data privacy at risk, allowing remote attackers to spy on your data communications, a team of cybersecurity researchers told The Hacker News. #engineeringstudent #trojan #stegnography #exploit #softwareengineering #crackers #linux #geek #shellscript #ethicalhacker #softwereengineering #pentesting #ransomware #hacker #blackhat #ransomware #bugbounty #metasploit #malware #gamerguy #anonymous #websitedesign #Virus #redteam #indianhacker #weareanonymous #kalilinux #pentesting #metasploit #google #cybersecurityexpert #hackernews #hackerinstagram

photo by ethical_hackers with description
            Insecure Internet-connected devices have aided different types of cybercrime for years, most common being DDoS and spam campaigns. But cybercriminals have now shifted toward a profitable scheme where botnets do not just launch DDoS or spam—they mine cryptocurrencies as wel

Insecure Internet-connected devices have aided different types of cybercrime for years, most common being DDoS and spam campaigns. But cybercriminals have now shifted toward a profitable scheme where botnets do not just launch DDoS or spam—they mine cryptocurrencies as wel #engineeringstudent #trojan #stegnography #exploit #softwareengineering #crackers #linux #geek #shellscript #ethicalhacker #softwereengineering #pentesting #ransomware #hacker #blackhat #ransomware #bugbounty #metasploit #malware #gamerguy #anonymous #websitedesign #Virus #redteam #indianhacker #weareanonymous #kalilinux #pentesting #metasploit #google #cybersecurityexpert #hackernews #hackerinstagram

photo by ethical_hackers with description
            Google has released an urgent software update for its Chrome web browser and is urging Windows, Mac, and Linux users to upgrade the application to the latest available version immediately.

Google has released an urgent software update for its Chrome web browser and is urging Windows, Mac, and Linux users to upgrade the application to the latest available version immediately. #engineeringstudent #trojan #stegnography #exploit #softwareengineering #crackers #linux #geek #shellscript #ethicalhacker #softwereengineering #pentesting #ransomware #hacker #blackhat #ransomware #bugbounty #metasploit #malware #gamerguy #anonymous #websitedesign #Virus #redteam #indianhacker #weareanonymous #kalilinux #pentesting #metasploit #google #cybersecurityexpert #hackernews #hackerinstagram

photo by ethical_hackers with description
            All the vulnerabilities, which required no user interaction, were responsibly reported to Apple by Samuel Groß and Natalie Silvanovich of Google Project Zero, which the company patched just last week with the release of the latest iOS 12.4 update.

The fifth vulnerability (CVE-2019-8646), an out-of-bounds read, can also be executed remotely by just sending a malformed message via iMessage. But instead of code execution, this bug allows an attacker to read the content of files stored on the victim's iOS device through leaked memory.

All the vulnerabilities, which required no user interaction, were responsibly reported to Apple by Samuel Groß and Natalie Silvanovich of Google Project Zero, which the company patched just last week with the release of the latest iOS 12.4 update. The fifth vulnerability (CVE-2019-8646), an out-of-bounds read, can also be executed remotely by just sending a malformed message via iMessage. But instead of code execution, this bug allows an attacker to read the content of files stored on the victim's iOS device through leaked memory. #engineeringstudent #trojan #stegnography #exploit #softwareengineering #crackers #linux #geek #shellscript #ethicalhacker #softwereengineering #pentesting #ransomware #hacker #blackhat #ransomware #bugbounty #metasploit #malware #gamerguy #anonymous #websitedesign #Virus #redteam #indianhacker #weareanonymous #kalilinux #pentesting #metasploit #google #cybersecurityexpert #hackernews #hackerinstagram

photo by ethical_hackers with description
            If you are running a KDE desktop environment on your Linux operating system, you need to be extra careful and avoid downloading any ".desktop" or ".directory" file for a while.

A cybersecurity researcher has disclosed an unpatched zero-day vulnerability in the KDE software framework that could allow maliciously crafted .desktop and .directory files to silently run arbitrary code on a user's computer—without even requiring the victim to actually open it.

KDE Plasma is one of the most popular open-source widget-based desktop environment for Linux users and comes as a default desktop environment on many Linux distributions, such as Manjaro, openSUSE, Kubuntu, and PCLinuxOS

If you are running a KDE desktop environment on your Linux operating system, you need to be extra careful and avoid downloading any ".desktop" or ".directory" file for a while. A cybersecurity researcher has disclosed an unpatched zero-day vulnerability in the KDE software framework that could allow maliciously crafted .desktop and .directory files to silently run arbitrary code on a user's computer—without even requiring the victim to actually open it. KDE Plasma is one of the most popular open-source widget-based desktop environment for Linux users and comes as a default desktop environment on many Linux distributions, such as Manjaro, openSUSE, Kubuntu, and PCLinuxOS #engineeringstudent #trojan #stegnography #exploit #softwareengineering #crackers #linux #geek #shellscript #ethicalhacker #softwereengineering #pentesting #ransomware #hacker #blackhat #ransomware #bugbounty #metasploit #malware #gamerguy #anonymous #websitedesign #Virus #redteam #indianhacker #weareanonymous #kalilinux #pentesting #metasploit #google #cybersecurityexpert #hackernews #hackerinstagram

photo by ethical_hackers with description
            In a move to protect its users based in Kazakhstan from government surveillance, Google, Apple and Mozilla finally today came forward and blocked Kazakhstan's government-issued root CA certificate within their respective web browsing software

In a move to protect its users based in Kazakhstan from government surveillance, Google, Apple and Mozilla finally today came forward and blocked Kazakhstan's government-issued root CA certificate within their respective web browsing software #engineeringstudent #trojan #stegnography #exploit #softwareengineering #crackers #linux #geek #shellscript #ethicalhacker #softwereengineering #pentesting #ransomware #hacker #blackhat #ransomware #bugbounty #metasploit #malware #gamerguy #anonymous #websitedesign #Virus #redteam #indianhacker #weareanonymous #kalilinux #pentesting #metasploit #google #cybersecurityexpert #hackernews #hackerinstagram

photo by ethical_hackers with description
            Following the public disclosure of a critical zero-day vulnerability in Webmin last week, the project's maintainers today revealed that the flaw was not actually the result of a coding mistake made by the programmers.

Following the public disclosure of a critical zero-day vulnerability in Webmin last week, the project's maintainers today revealed that the flaw was not actually the result of a coding mistake made by the programmers. #engineeringstudent #trojan #stegnography #exploit #softwareengineering #crackers #linux #geek #shellscript #ethicalhacker #softwereengineering #pentesting #ransomware #hacker #blackhat #ransomware #bugbounty #metasploit #malware #gamerguy #anonymous #websitedesign #Virus #redteam #indianhacker #weareanonymous #kalilinux #pentesting #metasploit #google #cybersecurityexpert #hackernews #hackerinstagram

photo by ethical_hackers with description
            Google announced a new initiative—called Privacy Sandbox—in an attempt to develop a set of open standards that fundamentally enhances privacy on the web while continuing to support a free, open and democratic Internet through digital advertisements.

A lot of websites on the Internet today, including The Hacker News, rely on online advertisements as their primary source of funding to operate and keep their professionally created content open and freely accessible to everyone.

Google announced a new initiative—called Privacy Sandbox—in an attempt to develop a set of open standards that fundamentally enhances privacy on the web while continuing to support a free, open and democratic Internet through digital advertisements. A lot of websites on the Internet today, including The Hacker News, rely on online advertisements as their primary source of funding to operate and keep their professionally created content open and freely accessible to everyone.

photo by ethical_hackers with description
            When a person's device scans for networks the device already knows, the wifi pineapple fakes as one of those networks, and the device automatically connects to it. It acts as a sort of middle man between the Internet and the device. It can intercept the device's web traffic.

When a person's device scans for networks the device already knows, the wifi pineapple fakes as one of those networks, and the device automatically connects to it. It acts as a sort of middle man between the Internet and the device. It can intercept the device's web traffic. #engineeringstudent #trojan #vpn #exploit #softwareengineering #crackers #linux #geek #shellscript #ethicalhacker #softwereengineering #pentesting #ransomware #hacker #blackhat #ransomware #bugbounty #metasploit #malware #gamerguy #anonymous #websitedesign #Virus #redteam #indianhacker #engineeringlife #kalilinux #pentesting #google

photo by ethical_hackers with description
            WPA, or WiFi Protected Access, is a WiFi security standard that has been designed to authenticate wireless devices using the Advanced Encryption Standard (AES) protocol and intended to prevent hackers from eavesdropping on your wireless data.

The WiFi Protected Access III (WPA3) protocol was launched a year ago in an attempt to address technical shortcomings of the WPA2 protocol from the ground, which has long been considered to be insecure and found vulnerable to more severe KRACK attacks.

WPA3 relies on a more secure handshake, called SAE (Simultaneous Authentication of Equals), which is also known as Dragonfly, that aims to protect WiFi networks against offline dictionary attacks

WPA, or WiFi Protected Access, is a WiFi security standard that has been designed to authenticate wireless devices using the Advanced Encryption Standard (AES) protocol and intended to prevent hackers from eavesdropping on your wireless data. The WiFi Protected Access III (WPA3) protocol was launched a year ago in an attempt to address technical shortcomings of the WPA2 protocol from the ground, which has long been considered to be insecure and found vulnerable to more severe KRACK attacks. WPA3 relies on a more secure handshake, called SAE (Simultaneous Authentication of Equals), which is also known as Dragonfly, that aims to protect WiFi networks against offline dictionary attacks #engineeringstudent #trojan #stegnography #exploit #softwareengineering #crackers #linux #geek #shellscript #ethicalhacker #softwereengineering #pentesting #ransomware #hacker #blackhat #ransomware #bugbounty #metasploit #malware #gamerguy #anonymous #websitedesign #Virus #redteam #indianhacker #weareanonymous #kalilinux #pentesting #metasploit #google #cybersecurityexpert #hackernews #hackerinstagram

photo by ethical_hackers with description
            The research was primarily focused on how app developers abuse multiple ways around to collect location data, phone identifiers, and MAC addresses of their users by exploiting both covert and side channels

Abusing Android Accelerometer to Capture Loudspeaker Data

Dubbed Spearphone, the newly demonstrated attack takes advantage of a hardware-based motion sensor, called an accelerometer, which comes built into most Android devices and can be unrestrictedly accessed by any app installed on a device even with zero permissions.

The research was primarily focused on how app developers abuse multiple ways around to collect location data, phone identifiers, and MAC addresses of their users by exploiting both covert and side channels Abusing Android Accelerometer to Capture Loudspeaker Data Dubbed Spearphone, the newly demonstrated attack takes advantage of a hardware-based motion sensor, called an accelerometer, which comes built into most Android devices and can be unrestrictedly accessed by any app installed on a device even with zero permissions. #engineeringstudent #trojan #stegnography #exploit #softwareengineering #crackers #linux #geek #shellscript #ethicalhacker #softwereengineering #pentesting #ransomware #hacker #blackhat #ransomware #bugbounty #metasploit #malware #gamerguy #anonymous #websitedesign #Virus #redteam #indianhacker #weareanonymous #kalilinux #pentesting #metasploit #google #cybersecurityexpert #hackernews #hackerinstagram