You are here:
Home
Information Security
Wireless Security
RFID in Player Cards Hacked ?
© (c) Cyberfreek Industries, llc 1997-2025 All rights reserved.
Main Menu
Home
Blackhat - Las Vegas
DEFCON - Las vegas
Information Security
Cyber Security
Cyberfreek News
Phishing Expeditions
Consulting Services
Cheat Sheets
Log4j / Log4shell
Hacking Labs
Flipper Zero
Raspberry Pi
Cyberfreek on Twitter
The Hacker News
The Hacker News
Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties
Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS
NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors
Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
Why Cyber Freek?
Security Week Feed
In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
Undetectable Android Spyware Backfires, Leaks 62,000 User Logins
Cisco Warns of Hardcoded Credentials in Enterprise Software
Cyber Security Hub
Building cyber security resilience through governance & assurance
Breaking the vicious cycle between climate change & cybersecurity
Cloud security strategies that actually work for businesses
Viewing cyber security events in context
Navigating the rising tide of AI attacks
6 major cyber attacks & data breaches in March 2025
How cyber security experts are fighting AI-generated threats
Articles
Title
Author
Dropbox Vulnerabilities
Written by: CyberFreek
RSA Hacked
Written by: CyberFreek
Android and SmartPhones are a Target
Written by: CyberFreek
OpenBTS Cell Phone Network
Written by: CyberFreek
New Cell Phone Hack Demo.
Written by: CyberFreek
Simplistic approach to Application Security
Written by: CyberFreek
Application Security, general statement
Written by: CyberFreek
Page 8 of 8
1
2
3
4
5
6
7
8
Application Security
5
Articles that pertain specifically to Application Security
Breach and Disclosure
19
Network Security
4
Wireless Security
5
Celll Phones and Mobile devices
19
The Cloud
6