Category: How-To’s

Top 15 Tips to Create Strong Passwords, FREE Secure Password Generator

Top 15 Tips to Create Strong Passwords, FREE Secure Password Generator

| July 6, 2012 | 9 Replies

Chris Dougherty Virtual Threat Contributing Writer   You can use our FREE Secure Password Generator to create a new password now. Top 15 Tips to Create Strong Passwords Today’s digital world brings new conveniences and entertainment in the form of online shopping, banking and social networking sites.  With these conveniences there are also new threats […]

Read More

NYTimes.com Site Vulnerability Allows Attacker to Post Fake Story

NYTimes.com Site Vulnerability Allows Attacker to Post Fake Story

| May 25, 2012 | 3 Replies

Chris Dougherty Virtual Threat Contributing Writer   In this day and age we all depend heavily on the Internet and social networking to stay informed about important happenings around the world and in our own communities. What many people may not realize is the fact that there is a cyber war occurring beneath the covers […]

Read More

Cracking WPA2 PSK with Backtrack, Aircrack-ng and John The Ripper

Cracking WPA2 PSK with Backtrack, Aircrack-ng and John The Ripper

| May 24, 2012 | 11 Replies

  by h4xoR VirtualThreat Contributing Writer   This article will walk you through the steps used to crack a WPA2 encrypted wifi router using Backtrack, aircrack-ng and John the Ripper. The information provided in this article is meant for educational purposes only. VirtualThreat is a site about computer security and not a site that promotes […]

Read More

A Beginner’s Guide To Joining The Anonymous Hactivist Group

A Beginner’s Guide To Joining The Anonymous Hactivist Group

| May 23, 2012 | 3 Replies

Anonymous Virtual Threat   Questions? So you want to join Anonymous? How to get in contact with others? How do I recognize other Anonymous? Have you been infiltrated? How do I protect my privacy? What is the right thing to do? How many Anonymous are there? Answers So you want to join Anonymous? You can […]

Read More

Cyber Safety Measures for Online Shopping

Cyber Safety Measures for Online Shopping

| April 16, 2012 | 1 Reply

With the popularity of online shopping today, the importance of cyber security becomes essential to everyone. Shopping, even in the real world, involves money and where there is money, there go the criminals. And since much shopping is now happening in cyber space, these criminals lost no time in following the money trail targeting online […]

Read More

Anti – Android Network Toolkit and 7″ Tablet make a $99 Pentesting Platform

Anti – Android Network Toolkit and 7″ Tablet make a $99 Pentesting Platform

| April 16, 2012 | Reply

D. Dieterle Cyber Arms   Every once in a while you run into a product that just makes you sit back and say – “Wow!” I just picked up a 7″ Polaroid tablet for $99 and was stunned at how good it works. The screen quality, how smooth it ran and how responsive it was. […]

Read More

Hackathon Survival Guide: 9 Things To Know

Hackathon Survival Guide: 9 Things To Know

| April 16, 2012 | Reply

Jamillah Knowles The Next Web     I love covering a good hackathon. There’s a lot to choose from around the UK with many creative, competitive and altruistic versions of a coding get-together where people make amazing things in a short amount of time. One thing I do see at the end of these events […]

Read More

Firefox Addon Allows Clueless to Hack Facebook

Firefox Addon Allows Clueless to Hack Facebook

| March 9, 2012 | 2 Replies

Darlene Storm ComputerWorld    Even if you were drunk and surfing at a Wi-Fi hotspot, you probably wouldn’t stand up and shout your username and password for anyone who might want it. But an attacker does not need to find out your username and password. If you thought that capturing a user’s social media session […]

Read More