Category: Cybersecurity
-
What Your Browser Gives Away
Ever wonder what information websites get from your browser? At first glance, you might think it’s just basic stuff, like a return address, but it’s much more complicated than it seems. In this article, we’ll go over what sites can see about your device and why they would need this data. Note: You can check…
-
NFC Card Emulation
NFC and RFID are widespread technologies commonly used in services like contactless payments, item scanning, and security keycards. Over the years many technologies using NFC have been reverse engineered or hacked, resulting in tools like the proxmark or flipper zero. NXP, one of the big keycard manufacturers, has had multiple generations of their Mifare security cards…
-
Turn Your Android into a Mobile Hacking Platform (Root & Rootless)
Free, open source, and based on the Linux kernel, Android is the perfect candidate for a mobile hacking platform. It’s flexible and easy to modify, unlike most Apple devices. In this article, we’ll review a few tools you can install on your phone to start wreaking havoc on the go. Root or Rootless? Before you…