The Ultimate Guide to Automation Testing
Have you heard about the term “test automation” but don’t really know what it is? Well, you’ve come to the right page! Get all your
1. Adeanna Cooke
Adeanna Crooke was born in 31st Dec 1988, She is also a former playboy model. Now how a beauty like her came to be a cyber criminal? It started when her friend used her photos to make money Via internet. She responded by taking down the site that showed her photos, instead of going to Cyber Crime Authorities.
2. Anna Chapmanis
Anna Vasil’yevna Chapmanis is a Russian national born on 23rd Feb 1982. She completed her masters from Moscow University, Russia. She is an Entrepreneur and a TV host. On June 27, 2010 she was arrested with 9 other hackers for the suspicion of working under the Russian intelligence agency. Right after she got arrested her videos and photos goes viral on internet and she gained a celebrity status. Anna Chapmanis again gained media attention when she asked a former CIA employee and NSA contractor Edward Snowden to merry her. Edward Snowden has a history of leaking details of the top secret surveillance program of U.S,Israel and U.K to the press.
3. Kristina Svechinskaya
Kristina Svechinskaya is dubbed as the worlds sexiest female hacker because of her casual dressing style and killer looks. She was born in Feb 16,1989.Kristina is a student of New York University. She is known as a Money Mule hacker, because of her hacking antics. She is accused of hacking into banks like ‘Bank of America’ and ‘Wachovia’. She used Zeus trojan horse and attacked thousands of bank accounts. She managed to open atleast 5 accounts of ‘Bank of America’ and ‘Wachovia’. Kristina received $35,000 of money theft. As per the estimates, Svechinskaya with nine other people skimmed $3 million.
4. Joanna Rutkowska
Joanna Rutkowska is a polish national, known for her research in low-level security and stealth malware.
She is an entrepreneur, owns a security services startup Invisible Things Lab in Poland. She became famous at Black Hat Briefings (computer security conference) held in Vegas on August 2006. Where she presented presented an attack against Vista kernel protection mechanism, and also a technique dubbed Blue Pill, that used hardware virtualization to move a running OS into a virtual machine.
5. Ying Cracker
Ying Cracker is from Shanghai,China and she is a known in in Hacking. She is a instructor of Hacking, Ying Cracker believes that hacking is an skill that can be learn by anyone. She provides basics of hacking but she is not a cheap instructor. Cracker helps students with information such as how to change one’s IP
address or even scramble their personal passwords. Originally noticed on
a message board for her looks, Ying Cracker has set out to convince the
world that female hackers can add quite a bit to this field. As her
primary form of income, she now offers free courses as well as
tailor-made software to private and public organizations that would like
to protect their sensitive data. She also offers paid courses for those
that would like to move beyond the basics of hacking and get into
high-end software development.
6. Xiao Tian
Xiao Tian is also a Chinese hacker , she works with a female hacker group in China. She is the leader of this group named as ” China Girl Security team”. Xiao Tian was born in Hunan on Sep 6,1989. The idea of Xiao Tian of starting this female hacking group is that she beleives there should be a place where female hackers like her can come together. She wants to break the male dominance in Hacking. Right now there are around 2200 female hackers in the China Girl security team.
Industrial Cybersecurity
September 28, 2023
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings
Have you heard about the term “test automation” but don’t really know what it is? Well, you’ve come to the right page! Get all your
This article explores the idea of discovering the victim’s location. Previously, we have used several tools for OSINT purposes, so, today let us try this
Can random characters in your code get you in trouble? They certainly can! Today, we are going to discuss CRLF injections and improper neutralization of
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings