Bug Bounty
February 17th, 2014 | ๐
Text to Speech Demo Despite not being part of the bug bounty scheme for many years, Microsoft finally got in
February 17th, 2014 | ๐
Text to Speech Demo Despite not being part of the bug bounty scheme for many years, Microsoft finally got in
February 16th, 2014 | ๐
iSpeech.org http://profitabletradingtips.com/stock-trading/trading-target-stock-after-the-data-breach Trading Target Stock after the Data Breach By www.ProfitableTradingTips.com As many as 110 million credit and debit cards
February 16th, 2014 | ๐
https://www.ispeech.orgOWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero
February 16th, 2014 | ๐
iSpeechGoLismero is an open source framework for security testing. Itโs currently geared towards web security, but it can easily be
February 16th, 2014 | ๐
TTSDamn Vulnerable iOS App (DVIA) is an iOS application that is damn vulnerable. Its main goal is to provide a
February 16th, 2014 | ๐
iSpeech Using the Autopsy forensic browser inside Kali Linux to explore the contents of a drive image 2014-02-16 00:00:16 source
February 16th, 2014 | ๐
https://www.ispeech.org/text.to.speech Version with better audio at http://www.youtube.com/watch?v=JqJ4zaDIVAs A short tutorial on how to configure and use cree.py v1.1 Download cree.py
February 15th, 2014 | ๐
iSpeech.org Billy Austin, iScan Online Co-founder and President, discusses iScan Online's vision for endpoint security scanning. How important is it
February 15th, 2014 | ๐
iSpeech courtesy:Abdullah Hasam one my of close facebook friend,who managed to expose the critical vulnerability in flash files :Rakesh Singh
February 15th, 2014 | ๐
iSpeech Until a week ago, it was believed that Distributed denial-of-service(DDOS) attack against Spamhaus is the largest one in the
February 15th, 2014 | ๐
iSpeech Another variant of the recently discovered Mac Trojan "OSX/CoinThief" is found to be hosted on two popular download websites
February 15th, 2014 | ๐
iSpeech.org Forbes, american business magazine, is appeared to be the latest victim of the Syrian Electronic Army. ย The group has
February 15th, 2014 | ๐
Convert Text to Speech Azazel is a userland rootkit written in C based off of the original LD_PRELOAD technique from
February 14th, 2014 | ๐
https://www.ispeech.org Harrisburg University of Science and Technology computer forensics and cyber security expert Chuck Davis discusses cyber scams and how
Gloss