freeCodeCamp.org provides this free course, where you will learn the basics of Kali Linux.

The course covers installation, using the terminal / command line, bash scripting, tools and features for ethical hacking, and more. The course focuses on Kali Linux but much of the content applies to other versions of Linux as well.

In the eyes of the media and general public, hacking and coding are the same thing.

Those of us in the technology field know that’s not true. Even the terms “hacker” and “hacking” have multiple meanings to us.

But should hackers know how to code? It seems to me that at some point, one must know at least a scripting language to do any hacking. However, is that really true?

The importance of programming for hackers or cyber security experts is a very common question, YouTuber zSecurity  shares his opinion on the matter.

Null Byte explains how to Use Android & Raspberry Pi for Local Voice communications.

It can be difficult to communicate off the grid when there’s no infrastructure. That’s also true when you’re in situations where there is no cellular service or reliable Wi-Fi hotspots, such as a convoy of vehicles that want to talk to talk to each other, or protestors around the world where law enforcement cut out the cell signals.

On this episode of Cyber Weapons Lab, we’ll show how you can use a cheap $35 Raspberry Pi with PirateBox to enable Android phones to talk to each other without using any cell towers.  

To learn more, check out the article: https://nulb.app/x6vtu

At the recent DEFCONConference, Nina Kollars explains her experience buying Nespresso coffee capsules.

In 2018 I somewhat innocently bought very expensive coffee (Nespresso capsules) online from Ebay. What followed was a series of unexpected additional packages from the manufacturer Nespresso and a lurking suspicion that something had gone terribly–if not criminally–wrong as a result of my purchase.

This talk chronicles the obnoxious amounts of obsessive research and tracking that became my new hobby–stalking Nespresso fraudsters and my decidedly non-technical attempts at developing a generic search profile and reporting the fraudsters to anyone who would listen, to include : the persons whose identities had been stolen, Nespresso, Ebay, and the FBI. Ultimately I just ended up with a LOT of coffee; a lingering sense that I had committed several crimes; and no faith left in humanity. 

The worlds of CyberSecurity and AI are colliding. That’s the good news. The bad news is that the world of Cybersecurity and AI are colliding. Bad things could happen when bad actors get their hands on ML.

Artificial intelligence won’t revolutionize anything if hackers can mess with it. That’s the warning from Dawn Song , a professor at UC Berkeley who specializes in studying the security risks involved with AI and machine learning. Speaking at EmTech Digital, an event in San Francisco produced by […]

NB: this article is behind a registration wall. Usually, I avoid posting content from such sites, but this time I made an exception since the content is relevant and worth the hassle.