xHacker

News
All
A Counter-Unmanned Aircraft System (C-UAS)

A Counter-Unmanned Aircraft System (C-UAS)

Unmanned Aircraft Systems (UAS), commonly known as drones, are increasingly prevalent in various sec...

"GPS spoofing"  Falsification of GPS signals

"GPS spoofing" Falsification of GPS signals

U.S. cargo ship Stolen in the canal of Oman.

A few months ago, the U.S. accused an Iranian-b...

What is RFCAT?

What is RFCAT?

In 2010, the RFCAT tool was developed by an Israeli researcher named Stephen Powell, and this tool i...

Israeli Security Agency ( SHABAK)

Israeli Security Agency ( SHABAK)

he Israel Security Agency (ISA, Hebrew: שֵׁירוּת הַבִּיטָּחוֹן הַכְּלָל...

Military Intelligence Directorate

Military Intelligence Directorate

The Military Intelligence Directorate is one of the oldest Directorates in the IDF. It was establish...

How FM Radio Hacking Work

How FM Radio Hacking Work

FM radio hacking works by exploiting the principles of frequency modulation to intercept, modify, or...

why FM Radio Hacking is important

why FM Radio Hacking is important

FM radio hacking holds considerable significance for a range of reasons across educational, technolo...

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

Attackers can exploit radio signals and mobile phones to steal protected data through several sophis...

what is a FM radio Hacking

what is a FM radio Hacking

FM radio hacking typically refers to various activities involving the manipulation, modification, or...

Cyberattacks: Bigger, smarter, faster

Cyberattacks: Bigger, smarter, faster

Cyberwars Begin

The Baltic nation of Estonia was the first state hit by a massive cyberattack...

The Kurds in the cyber warfare against ISIS

The Kurds in the cyber warfare against ISIS

friend sends you the link to a National Geographic video about the Kurdish Peshmerga fighting the Is...

Type Cyberwarfare

Type Cyberwarfare

Types of Cyberwarfare

1. Espionage
- Spying: Stealing secrets or sensitive information fro...

who is a Cyberwarfare Technician (CWT)

who is a Cyberwarfare Technician (CWT)

A Cyber Warfare Technician, often part of military or government cyber units, specializes in:

why cyberwarfare is very important?

why cyberwarfare is very important?

1) National Security: Protects against threats to a nation's safety and sovereignty and protect...

What is the pager and how exploded ?

What is the pager and how exploded ?

A pager is a wireless communication device that receives and displays alphanumeric or voice messages...

Recent Posts

ABOUT US

We are sharing latest cybersecurity newses, keep your eyes on us to be safe and be aware of the daily threats.

Copyright © xHacker - Developed by alienus.tech