Ethical Hacking

To secure your personal data, you need to stay up to date and educate yourself on threats. But what about the perpetrators of these attacks? Hackers are sometimes grouped together, however their diversity is astonishing sometimes, to say the least. We shall first dive in the regular colored-hat-wearing hackers; that being said, reading through the entire material below will shed more light into other types of hackers...

Read More

The Dark Web is a term used to describe encrypted internet information that is not searchable by traditional search engines. Hence, a Dark Web search result will not appear in your typical Google search. To access the black web, you must use specialized browsers such as the Tor browser. The Dark Web searches for websites using information that isn't publicly available, such as bank accounts, email...

Read More

  Pentesting is the science, know-how and art of finding security vulnerabilities (penetration vulnerabilities) in software and IT networks. When not done by professional pentesting companies, it’s better known as hacking. The last term may seem a bit harsh, but it’s the best way to describe the processes of identifying weak spots in an information system.   Of course, when not done maliciously, the activity is labeled as...

Read More