A momcom exploit for the popular momcom app (www.momscom.com) has been discovered, leading to a few more vulnerabilities that have…
Category: R&D
Inside the world of exploitation: The cheeky exploits of exploited teens
An exploitation of an underage girl, a photo of an exploited teenager, a sex tape and a sex video that…
When the weather warms up: Exploit in the weather section
By Chris Mowbray | 06.16.2016 | 07:35A few days ago, I wrote about how we have seen a lot of…
Capitalism exploits animals
Capitalism exploits livestock, animal exploitation, and the exploitation of the environment.In this series, VICE examines the ways capitalism exploits animals…
How to find the people to abuse: How to get a black teen out of a trap
Black teens are often victims of exploitation, including being abused and raped, but are often ignored by police, family, and…
What to watch out for in an exploit exercise: The best of 2017
The year is over.It’s time to start the next phase in our exploits training.We’ve already seen a huge amount of…
Why are you using the word ‘epistememic’ instead of ‘epidemic’?
The word “epistEM”, a term coined by the National Academy of Sciences to describe the “epidemiology” of a disease, was…
What is the problem with ‘The Mummy?’ and what can we do about it?
I didn’t know about the Mummy until this week, but I’m thrilled that I have found out.In the past, I…
Heartbleed vulnerability could expose thousands of users to attack, says report
The Heartblees bug was discovered last year, but the vulnerability remains a problem in use today.The new report published by…
How to use the anti exploit in Windows 7
By default, the Windows 7 system administrator cannot disable the Windows Anti-Exploit (WinAE) functionality, but you can manually do so…