• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • More than 44 million Microsoft user accounts are exposed to hack
  • Adobe Patch Tuesday addresses critical flaws in four products
  • NordVPN announced the launch of a bug bounty program
  • Snatch Ransomware force systems to Windows Safe Mode to bypass security solutions
  • City of Pensacola hit by a cyberattack few days after military base shooting
  • A bug in the decryptor for the Ryuk ransomware could cause data loss
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Posts tagged "password cracking"

password cracking

Hashcat 4.0.0 now can crack passwords and salts up to length 256

The new version of the tool, Hashcat 4.0.0 release is now available and includes...

October 30, 2017  By Pierluigi Paganini

Kali Linux 2017.1 is arrived, more power for password-cracking with cloud GPUs

Kali Linux 2017.1 rolling release was announced, the popular distro comes...

April 28, 2017  By Pierluigi Paganini

Hashcat, the fastest Password Cracking utility is now Open Source

Hashcat, the popular password recovery tool has been released as open source...

December 8, 2015  By Pierluigi Paganini

Two-factor Authentication for SMBs

The purpose of this article is to cover the challenges SMBs are facing...

July 1, 2013  By Pierluigi Paganini




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Necessary Always Enabled