The Latest Articles

Filter By Category...

DNS Security 101

Parrot OS

Windows 7

Microsoft Powershell

Hacking Computers With Powershell Empire ๐Ÿ’€๐Ÿ”“

Living off the grid with TAILS OS ๐Ÿ‘ป

How I learned Hacking, and my tips for fast-tracking the learning journey ๐Ÿ’ป

NSO Group Ordered to handover Pegasus code to WhatsApp

Apple Releases Quantum-Resistant Encryption Functionality For iMessage

Roundcube vulnerability being exploited by Russian hackers ๐Ÿ˜ถ

Meta warns of increasing spyware attacks targeting IOS, Windows, and Android

FBI Most Wanted Zeus and IcedID Malware Creator Pleads Guilty

Google argues for increased artificial intelligence usage within cybersecurity strategies

9 Best Tools For Social Media OSINT

What is Human Intelligence (HUMINT) and how does it work?

What is Signal Intelligence (SIGINT) and how does it work? ๐Ÿ“ก

Spyware

5 things that the Edward Snowden leaks revealed

Edward Snowden

Allow List

Advanced Encryption Standard (AES)

Administrative Account

Ad Hoc Network

Accreditation

Accounting

Account Management

Access Control List

Access Control

ARP (Address Resolution Protocol)

Access Points

SQL Injection

ARP Poisoning

Advanced Persistent Threat (APT)

The 14 types of malware ๐Ÿ’ฃ

If you think your antivirus programme is protecting you, think again! ๐Ÿซฃ

WiFi Security 101: A Quick Guide to Safeguarding Your Network ๐Ÿ‘€

This is why you DON’T want to get hacked. Here is what hackers can do after compromising your system ๐Ÿ˜ฃ

Why it’s a good idea to have multiple email addresses ๐Ÿ‘

The simple trick to protect you from 86% of Windows threats ๐Ÿ˜ฎ

Your mobile phone is SPYING on you. Here’s how ๐Ÿ‘€

Anonymise yourself with TAILS OS… the operating system used by Edward Snowden ๐Ÿ‘ป

This is how you should THINK about your cybersecurity ๐Ÿ’ญ

What is really on the ‘Dark Net’, and how does it work? ๐Ÿ‘€

How do VPNs work (and how they don’t) ๐Ÿ‘€

Stylometry: how intelligence agencies track you by your writing style โœ๏ธ

This is how I hack WiFi networks ๐Ÿฅท

Sea Turtle Strikes Again: Dutch IT Giants Targeted in Stealthy Cyber Espionage Campaign

A heist In plain sight: North Korean hackers stole over $600 million in 2023

IBM’s Cybersecurity Trends For 2024

How I hack websites using Burpsuite๐Ÿ’ป

Nmap: an essential tool for hacking โœ…

US Department of Justice charges 19 people in Darknet marketplace fraud

Report: The UK’s Ministry of Defence has the worst cybersecurity in Whitehall

What is the OSI Model? ๐Ÿ”Œ

What is Cryptojacking?

What happens to stolen data? ๐Ÿ’ฐ

Quantum Computers: An Emerging Threat To Cryptography

What is Linux, and why should I switch from Windows? ๐Ÿง

Hacking websites with WPScan ๐Ÿง

Is it time we take counter forensics seriously?

Is TOR Truly as Anonymous as We Think? Unveiling the Layers of Privacy ๐Ÿค”

Remembering Log4Shell: The Vulnerability That Almost Broke The Internet

The 2024 Complete Guide To Online Privacy ๐Ÿค“

Fifteen Steps to maximising firefox privacy ๐Ÿ”’โœ…

Download the complete FireFox checklist that I give to my counter-surveillance clients – completely free of charge! I will take you step-by-step through advanced Firefox Configurations that will help you maximise your privacy, security and anonymity.ย 

Enter your details below and I will email it to you straight away. And don’t worry, your data is safe with me ๐Ÿ˜‡

Access free subscriber only content ๐Ÿ˜˜

I would love to share my latest ethical hacking, defensive security, OSINT, and anonymity guides with you. But I’ll need you to trust me with something… your email address. Your data will be encrypted and I will never sell it to third parties ๐Ÿ˜‡

UK Cybersecurity Company

About Aitken Security

Aitken Security is a UK Cybersecurity Company specialising in offensive and defensive security.