jaykaran (31)in #macos • 6 years agosteemCreated with Sketch. • 6381.807Mac on goooo...One simply Python command could be enough to take over someone's MacBook or iMac if you have a few seconds of access.jaykaran (31)in #facts10freenet • 6 years ago • 6381.7983Free internet....RouterSploit makes it easy to take over someone's internet router. (Make sure to check out our video guide as well!).jaykaran (31)in #facebookbugfacts10 • 6 years ago • 6381.0605Find the bug.....Facebook Bug Caused New Posts by 14 Million Users to be Shared Publiclyjaykaran (31)in #en-us • 7 years ago • 6295.14New newsMassive heat source discovered under Antarctica, driving melting ice & volcanismjaykaran (31)in #en-us • 7 years agosteemCreated with Sketch. • 6295.0835Hide yourselfOn google play, the humble non-breaking space takes on chameleon-like powers #cybersecurity #infosecjaykaran (31)in #en-us • 7 years agosteemCreated with Sketch. • 6294.9644TorWarning: Critical Tor Browser [Firefox] Vulnerability Leaks Users’ Real IP Address—Update Nowjaykaran (31)in #e • 7 years ago • 6295.147Participate.@HIMSS #cyber 11/16 webinar! Cybersecurity and The Little Man - Perspectives from Critical Access/Rural Health IT (jaykaran (31)in #en-us • 7 years ago • 6292.402Future of cyber security.....Massive Malaysian data breach; 6 Russians identified in DNC hack; & the future of cybersecurity - infosecjaykaran (31)in #en-gb • 7 years agosteemCreated with Sketch. • 6294.419Iptables firewalls .....How to configure iptables firewall on Linux ?jaykaran (31)in #en-us • 7 years ago • 6294.4Are we safe of browsing.....“Catch-All” Google Chrome extension rigged to steal user data, including credit card information #virus #malware bold