Kmart, Bunnings and the Good Guys have come under fire for the use of facial recognition technology on customers have now been referred for privacy breaches.
Continue ReadingApplications
Meta Warns Data Breach on Facebook
A recent discovery on apps that require users to sign into their Facebook account had been stealing account username and password details.
Continue ReadingKali Linux
Home of Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.
Continue ReadingOpen Source Intelligence OSINT
Intelligence gathering usually starts with scraping information from public sources, collectively known as open source intelligence or OSINT.
Continue ReadingPegasus The Spyware Technology
Pegasus spyware can pass your phone’s security with complete access including emails, messages, GPS location, photos, video, and your phone’s microphone.
Continue ReadingWiGLE Stats WiFi Wireless Networking
WiGLE Stats WiFi wireless networking a slow march to infinity.
Continue ReadingWiGLE WiFi Wireless News
WiGLE News WiFi wireless networking database and mapping.
Continue ReadingBinaryEdge Science and Technology
BinaryEdge Science and Technology Thoughts, stories and Ideas.
Continue ReadingHunter
The Hunter mission is to give professionals the power to create new connections with the people that matter.
Continue ReadingIntelligence X
You can use Intelligence X to perform any kind of open source intelligence.
Continue ReadingCompass Digital Identity & People Search
The Compass Digital Identity & People Search The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.
Continue ReadingPulsedive Threat Intelligence
Pulsedive Threat Intelligence Read. Learn. Defend.
Continue ReadingCybersecurity Search Engines
Take your security to the next level with these Cybersecurity Search Engines. Here is a list of some cybersecurity search engines.
Continue Reading