Hacking Exposed Profile
Hacking Exposed

@hackingexposed

22,161
Followers
37
Following
29
Media
3,546
Statuses

The best-selling security book in the world with over 600,000 copies sold and translated in some 30 languages.

Irvine, CA
Joined August 2009
Don't wanna be here? Send us removal request.
@hackingexposed
Hacking Exposed
13 years
How to Crack a Wi-Fi Network's WEP Password with BackTrack. http://t.co/DZqltnxs
0
8
18
@hackingexposed
Hacking Exposed
11 years
Malware Traffic Patterns
0
21
13
@hackingexposed
Hacking Exposed
9 years
Don't trust anyone, any vendor, or any outside "independent" labs. Everything is paid for. Test products yourself.
0
12
11
@hackingexposed
Hacking Exposed
11 years
Download the latest ninja security tool from Cylance. Eavesdrop on your Bluetooth friends. http://t.co/P72wWbp6Tg
0
3
12
@hackingexposed
Hacking Exposed
12 years
Catch up on the last episodes of Hacking Exposed: LIVE - http://t.co/5CgHITZp8B
0
6
11
@hackingexposed
Hacking Exposed
13 years
Great animation does a wonderful job at explaining Stuxnet. http://t.co/xUociVeH
0
11
11
@hackingexposed
Hacking Exposed
7 years
Cylance and AI comes to the masses with CylanceProtect Home Edition for Consumers! Check out the webinar next week:
0
2
9
@hackingexposed
Hacking Exposed
10 years
The Backdoor Factory modifies binaries, adding a backdoor. Handy for pentesting/research.
0
8
10
@hackingexposed
Hacking Exposed
13 years
Android App Turns Smartphones Into Mobile Hacking Machines. http://zite.to/o7q4rG
0
6
9
@hackingexposed
Hacking Exposed
11 years
Paypal Android App Remote Code Execution
0
13
8
@hackingexposed
Hacking Exposed
11 years
How attackers can read credit card information from RAM so easily.
1
15
9
@hackingexposed
Hacking Exposed
10 years
GHOST vulnerability means you should run updates on your Linux systems ASAP.
0
21
8
@hackingexposed
Hacking Exposed
11 years
Analysis and exploitation of the Dexter POS botnet by @botnet_hunter http://t.co/TqL8VYMvJ3
0
14
9
@hackingexposed
Hacking Exposed
13 years
Dissecting the SQL Injection Tools Used By Hackers. http://t.co/29BvLpKn
0
7
9
@hackingexposed
Hacking Exposed
11 years
HTML5 Security Cheatsheet
0
10
9
@hackingexposed
Hacking Exposed
13 years
The Most Dangerous Virus for Computer and Technology. http://zite.to/mIwqyO <-Good trip down memory lane...
0
8
9
@hackingexposed
Hacking Exposed
12 years
New edition out! Hacking Exposed 7 with new cover and tons of new content including embedded hacking. http://t.co/txaepE0G
1
10
7
@hackingexposed
Hacking Exposed
13 years
Toolkit cracks encrypted information on iOS 5 devices. http://t.co/HDXlpgYb
0
7
8
@hackingexposed
Hacking Exposed
11 years
http://t.co/YnwtMtOnP4 Pentest from your Android.
0
14
8
@hackingexposed
Hacking Exposed
9 years
Hacking Exposed: Next Generation Attacks from @RSAConference 2015 with @stuartmcclure and @botnet_hunter
0
6
8
@hackingexposed
Hacking Exposed
6 years
What do you get when you transform AV to AI? Cylance Smart AV! Just in time for the holidays!
0
3
7
@hackingexposed
Hacking Exposed
7 years
Watch their video: @RoadtripNation
0
0
5
@hackingexposed
Hacking Exposed
11 years
http://t.co/jwj6c9IBMZ Attacking browsers without 0 days.
0
4
7
@hackingexposed
Hacking Exposed
11 years
Test your skills against the beginner botnet themed Vulnerable Virtual Machine "Ra1nxing Bots".
1
11
7
@hackingexposed
Hacking Exposed
11 years
LD_PRELOAD explained and mitigation strategy http://t.co/M9ezKOc7XI
0
11
7
@hackingexposed
Hacking Exposed
13 years
Unknown Exploit Kit (Crimeware) leaked, Available for Download ! http://zite.to/mG2LF5
0
23
7
@hackingexposed
Hacking Exposed
13 years
First Zeus, now SpyEye – look at the source code now! http://t.co/UGRKh0K
0
6
6
@hackingexposed
Hacking Exposed
10 years
http://t.co/pCjngz3C2L Google announces Project Zero, hunting 0days before the bad guys.
0
8
7
@hackingexposed
Hacking Exposed
9 years
Building a Wireless Pentesting Environment in Docker by: @awhitehatter @foxglovesec
0
8
6
@hackingexposed
Hacking Exposed
11 years
"Hand of Thief", a banking trojan targeting Linux users.
0
9
7
@hackingexposed
Hacking Exposed
11 years
http://t.co/iuSJIdsvyl Anatomy of a program in memory.
0
7
7
@hackingexposed
Hacking Exposed
11 years
Client side attacks with Heartbleed.
0
8
7
@hackingexposed
Hacking Exposed
13 years
Rootkit Detection Via Kernel Code Tunneling. http://t.co/nOeUNga
0
14
7
@hackingexposed
Hacking Exposed
7 years
New Hacking Exposed Webinar announced! Find out what Stu has up his sleeve.
0
7
5
@hackingexposed
Hacking Exposed
9 years
Cylance vs. GlassRAT: GlassRAT IOCs including YARA rule, configuration extraction via bamfdetect, and new samples!
0
5
6
@hackingexposed
Hacking Exposed
10 years
Most vulnerable operating systems and applications in 2014? #1 and #2 - MacOSX and iOS http://t.co/EqzguELdZ7
1
13
6
@hackingexposed
Hacking Exposed
13 years
Android passwords are stored in plain text on disk. http://t.co/eXI3Nl8
0
23
6
@hackingexposed
Hacking Exposed
10 years
http://t.co/9Pb9WWvi4E What this patch Tuesday means to pentesters.
0
11
6
@hackingexposed
Hacking Exposed
13 years
Tool Lets Single Laptop Take Down An SSL Server . http://t.co/szAs9k8z
0
3
6
@hackingexposed
Hacking Exposed
10 years
UPnP Pentest Toolkit
0
10
6
@hackingexposed
Hacking Exposed
11 years
http://t.co/wbO73zbx2E European ATMs being backdoored with a hidden USB pen.
0
17
6
@hackingexposed
Hacking Exposed
10 years
Redirect to SMB is a new attack method leveraging common functions like URLDownloadToFile to leak logon credentials. http://t.co/GqFj2aeKrX
0
8
6
@hackingexposed
Hacking Exposed
13 years
Pentagon Discloses Largest-Ever Cyber Theft. http://t.co/bN6dDTh
0
36
6
@hackingexposed
Hacking Exposed
10 years
Continue to get XP updates with a registry hack http://t.co/Njsh6EZ27b Cool hack, but you should be upgrading.
0
7
6
@hackingexposed
Hacking Exposed
11 years
Test your servers for the Heartbleed OpenSSL vulnerability. http://t.co/GcV7eMYB6g Source of test available here:
0
14
6
@hackingexposed
Hacking Exposed
11 years
Getting Root with Sudo
0
2
6
@hackingexposed
Hacking Exposed
11 years
First phase of TrueCrypt audit comes out backdoor free.
0
28
6
@hackingexposed
Hacking Exposed
13 years
Mac OS X Lion Login Passwords Extracted With Ease. http://t.co/5hZjzyO
0
12
6
@hackingexposed
Hacking Exposed
11 years
UAC tips for pentesters http://t.co/FkGvPZFhhP
0
4
4
@hackingexposed
Hacking Exposed
12 years
Missed last week's episode of Hacking Exposed: LIVE - APT's Exposed? Watch it here! http://t.co/vurZvjEEz4
0
6
6
@hackingexposed
Hacking Exposed
10 years
http://t.co/oqm1lwuSUh Analysis of the wide spread Backoff Point of Sale malware. Analysis by @botnet_hunter of @cylanceinc
0
8
6
@hackingexposed
Hacking Exposed
13 years
Anonymous launches 'Operation Global Blackout', aims to DDoS the Root Internet servers. http://t.co/e3WEv0iu
0
15
6
@hackingexposed
Hacking Exposed
14 years
Technical Analysis and Advanced Exploitation of Adobe Flash 0-Day (CVE-2011-0609) on Windows 7. http://mcaf.ee/07b9a
0
12
6
@hackingexposed
Hacking Exposed
12 years
Analyzing PDF Malware - Part 3A. http://t.co/e1Joui6Y
0
4
6
@hackingexposed
Hacking Exposed
11 years
0
2
6
@hackingexposed
Hacking Exposed
13 years
Inside a Malicious PDF Attack. http://mcaf.ee/68o37
0
16
6
@hackingexposed
Hacking Exposed
10 years
@hackingexposed techniques reign supreme in Operation Cleaver: http://t.co/P4XEJc63Oa
0
0
2
@hackingexposed
Hacking Exposed
12 years
Check out the latest episode of Hacking Exposed: LIVE - APT's EXPOSED! http://t.co/vurZvjEEz4
0
5
5
@hackingexposed
Hacking Exposed
10 years
http://t.co/umKFbn9lqM Getting Personal With PowerShell: Linux to PowerShell
0
3
5
@hackingexposed
Hacking Exposed
7 years
Check out the follow-on to last week's webinar. Hacking Exposed: DLL Devastation vs Cylance:
0
4
4
@hackingexposed
Hacking Exposed
13 years
First Malicious IRC Bot For Android Shows Up, Allows The Attacker Full Remote Control Of Your Device. http://t.co/zbBFzJke
0
10
4
@hackingexposed
Hacking Exposed
11 years
Downloading files via recursive DNS with bash/PowerShell http://t.co/Fuj1bLdnfg
0
3
5
@hackingexposed
Hacking Exposed
13 years
Why Your Company Needs To Hack Itself. http://t.co/LZ5iD66D
0
8
5
@hackingexposed
Hacking Exposed
11 years
Chrome's password security lacks security. http://t.co/c95r1VNhTz
0
8
5
@hackingexposed
Hacking Exposed
10 years
Well the Banking industry's worst nightmare has officially come true: http://t.co/Ss5rkjBXGO even leveraging SWIFT apparently.
0
9
5
@hackingexposed
Hacking Exposed
11 years
Missed Hacking Exposed: LIVE #35 today? Watch it here! http://t.co/oeHH3oSGj2
0
1
5
@hackingexposed
Hacking Exposed
14 years
Identifying the Mobile Security Stack. http://mcaf.ee/fec31 <Great read.
0
7
5
@hackingexposed
Hacking Exposed
12 years
Let's start the new year off right with a BRAND NEW episode of Hacking Exposed! Jan. 9th @ 1:00 PDT:
0
13
5
@hackingexposed
Hacking Exposed
6 years
Watch "HE Live: Think Beyond" as we tear down our RSA hacks vs Cylance:
0
4
5
@hackingexposed
Hacking Exposed
14 years
RSA breach compromised key federal networks. http://mcaf.ee/36c0f
0
8
5
@hackingexposed
Hacking Exposed
13 years
New Flash exploit is extremely effective against the security technologies that many depend on for shelter. http://t.co/jR30xSD
0
12
5
@hackingexposed
Hacking Exposed
10 years
Guess they finally bought Hacking Exposed Korean edition... http://t.co/08xs45mqiC http://t.co/fnt8faZyxA
Tweet media one
Tweet media two
1
3
5
@hackingexposed
Hacking Exposed
7 years
Wow what an amazing group @RoadtripNation ! What an honor to be a part of their journey!! #NeverGiveUp
0
0
4
@hackingexposed
Hacking Exposed
10 years
http://t.co/ZasuyjhaZq The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network
0
7
4
@hackingexposed
Hacking Exposed
13 years
This is how Windows get infected with malware. http://t.co/OOtOoAUs <-good read.
0
9
5
@hackingexposed
Hacking Exposed
13 years
BEWARE: Others Can Unlock Your Cars Using Cell Phone, Laptop. http://t.co/bnRomXa
0
9
5
@hackingexposed
Hacking Exposed
14 years
MySql.Com Vulnerable to Blind SQL Injection. http://mcaf.ee/2b7c5
0
14
5
@hackingexposed
Hacking Exposed
13 years
Apple laptops can be hacked to self-destruct. http://zite.to/r9TQ3M
1
9
5
@hackingexposed
Hacking Exposed
13 years
Android's big security flaw, and why only Google can fix it. http://t.co/I84lVHVJ
0
6
5
@hackingexposed
Hacking Exposed
13 years
Backdoor in the latest version of vsftpd. http://t.co/2GJhViB
0
20
5
@hackingexposed
Hacking Exposed
13 years
Report: Conficker and AutoRun infections proliferating. http://t.co/rylHNh3H
0
8
5
@hackingexposed
Hacking Exposed
11 years
http://t.co/vMVCHvZmJN @cylanceinc Researcher Brian Wallace ( @botnet_hunter ) details emerging botnets from Indonesia.
0
5
5
@hackingexposed
Hacking Exposed
13 years
Malware as a Service, Zeus Trojan Variants 2012 Security Trends, etc. http://t.co/XRxZ8w3R
0
2
5
@hackingexposed
Hacking Exposed
12 years
HULK vs. THOR - Application DoS . http://t.co/NGE1r4OL
0
3
5
@hackingexposed
Hacking Exposed
11 years
Did you know that Hacking Exposed has been translated into 30+ languages? Here's just a few. http://t.co/dwwH1YxhGe
Tweet media one
1
8
4
@hackingexposed
Hacking Exposed
9 years
Multiple Vulnerabilities identified in pentesting tool Veil-Evasion
Tweet media one
0
9
2
@hackingexposed
Hacking Exposed
13 years
Open hacking season - on everyone! http://zite.to/izgsZc
1
7
5
@hackingexposed
Hacking Exposed
12 years
Hacking Exposed: LIVE - Episode #032 is now available on our YouTube channel! http://t.co/SPUt6aVM
0
2
4
@hackingexposed
Hacking Exposed
13 years
What Was the First Computer Virus? http://t.co/SDY68a13 <- Trip down memory lane...
0
4
4
@hackingexposed
Hacking Exposed
13 years
Crimeware Kit Emerges for Mac OS X. http://mcaf.ee/5tmsb
0
4
4
@hackingexposed
Hacking Exposed
12 years
Can't get enough of Hacking Exposed? Join @stuartmcclure on 3/26 for Hacking Exposed: LIVE "Apt's EXPOSED"
0
4
4
@hackingexposed
Hacking Exposed
13 years
Source Code For SpyEye Trojan Published; More Exploits On The Horizon. http://t.co/S3rrbbf
0
5
4
@hackingexposed
Hacking Exposed
13 years
Wireless Remote iPad Hack in Mobile Security Demonstration. http://t.co/UUn6NloG
0
7
4
@hackingexposed
Hacking Exposed
11 years
http://t.co/rrAE8e2uVH 12 Endpoints Security Myths dispelled.
0
5
4
@hackingexposed
Hacking Exposed
13 years
Insider data breach costs Bank of America over $10 million. http://mcaf.ee/rjbyw
0
6
4
@hackingexposed
Hacking Exposed
10 years
This patch Tuesday is a significant one.
0
2
4
@hackingexposed
Hacking Exposed
13 years
Hacked MIT Server Used to Stage Attacks, Scan for Vulnerabilities. http://t.co/ubux9Kgn
0
2
4
@hackingexposed
Hacking Exposed
13 years
Massive hack hit 760 companies. http://t.co/3nCFq67P
0
5
3
@hackingexposed
Hacking Exposed
13 years
Home is where the computer virus is. http://t.co/Pxfu86T
0
3
4