Uncategorized

Hacking Tutorials- Lesson 2 –

This is our second lesson so  you may want to take a look at our previous lessons, search for: https://blog.brightertechs.co.ke/hacking-tutorials-lesson-1/  Essential concepts Before actually jumping into the hands-on approach, it is highly necessary for one to have a thorough understanding of the basics of computer network and their working model. In this lesson therefore, we will find a brief description of…

Read More

Uncategorized

Hacking Tutorials- Lesson 1

Disclaimer: I am not responsible for any damages that occur from this lessons am going to give you it’s only for educational purposes Alot of you guys have seen and heard alot of people in movies and reality classify their self as “hackers” but the main question you should ask yourself is WHO IS A HACKER? & WHAT REALLY IS…

Read More

Uncategorized

Security alert | Apple Face-time vulnerability

A significant bug has been discovered in FaceTime. The bug lets you call any iOS user and immediately hear the audio coming from their phone before the person on the other end has accepted or rejected the call. NTT Security has issued a notification regarding a vulnerability affecting the Apple Facetime application. Successful exploitation of this vulnerability could lead to…

Read More