Cracking WPA/WPA2 Tutorial in Kali Linux
When it comes to WiFi security, WPA/WPA2 seems to be more secure and reliable than WEP encryption technique; however nothing is secure and everything has vulnerability and weaknesses in it. So a penetration tester or a hacker job is to find the vulnerability and exploit it to gain the desired level of access. Kali Linux […]
Apple’s new iMessage and Facetime authentication process makes it safer than ever
Apple Inc has change its verification process for users who are using Facetime and iMessage. Previously it was just a one step verification process where your Apple id password was required. But the new verification process is consists of two-steps which will make it very hard for the cyber criminals to gain access of the […]