.
.

Hacking News & updates

.

Ads

RedHack Hackers Target Aktif Bank over Controversial e-Ticketing System

The recently introduced system relies on special cards that are mandatory for all those who want to attend soccer games. There are two main problems. One of them is the fact that the government can...

LaCie Security Breach went unnoticed for a Year

If you used a credit or debit card to purchase electronic items at LaCie’s website last year, you may want to eagle-eye your card statements. Sponsored Links LaCie, French Computer Hardware...

19-year-old been arrested of “HeartBleed” vulnerability.

A 19-year-old computer science student has been arrested by the Royal Canadian Mounted Police (RCMP) and accused of stealing personal data by exploiting the “HeartBleed” vulnerability....

Trojan-SMS.AndroidOS.Stealer.a

Most of the infections have been spotted in Russia, but researchers have determined that Trojan-SMS.AndroidOS.Stealer.a is capable of targeting users from numerous countries, including Belgium,...

How to find out if you’ve been hacked

There are numerous methods to see if you have been hacked. Using the Command Prompt, you can run a command which will check for incoming and outgoing connections to your computer. By checking all the...

‘Heartbleed’ hits 1.5 million users of UK parenting website

London:  British parenting website Mumsnet is the latest organisation to have been hacked due to the “Heartbleed” bug, founder Justine Roberts revealed on Monday. “Last week we...

Which of your online account hacked in world’s biggest data breach, CHECK NOW

The Heartbleed bug ( Biggest Data Breach ), a bug in OpenSSL cryptographic software library, has left billions of users vulnerable to sensitive information leak including those information that...

Root your Samsung Galaxy Pro 12.2

Here is a cheat sheet tutorial showing you how to root your Samsung Galaxy Pro 12.2 with Android 4.4.2 Download CF-Auto-Root and Odin v3.09. Then put your device in download mode by holding the...

Word 2010 Zero Day Vulnerability

Normal Word exploits include  booby-trapped documents in the Rich Text Format (RTF) which exploit a vulnerability in the 2010 version of Microsoft Word, Microsoft warned in an advisory published...

FBI arrests Hackers who hacked Call of Duty Game and Army computers to steal helicopter simulators

FBI agents have arrested three men who are suspected of breaking into US Army computers as well as hacking computers of famous video game manufacturers. By doing so, they were able to hack privileged...

Flickr Vulnerable to Remote Code Execution and SQL Injection

Flickr, one of the biggest online photo management and sharing website in the world was recently impacted by critical web application vulnerabilities, which left website’s database and server...

How to become an ethical hacker

I often get a number of people ask more for guidance  about how they can become an ethical hacker. I also receive even more requests about how to become a black hat hacker. The latter requests are...

TOP 101 Unique sites that is use full for anybody

These sites solve at least one problem really well and they all have simple web addresses (URLs) that you can easily memorize thus saving a trip to Google. 1. screenr.com – Record movies of your...

How to get facebook password in text format

Nine People Accused of Stealing Millions of Dollars with ZeuS Malware

Two of the suspects – Yuriy Konovalenko, 31, and Yevhen Kulibaba, 36 – have been apprehended. The Ukrainians were arrested in the United Kingdom and have recently been extradited to the United...

NSA

NSA secretly exploited devastating Heartbleed bug for years

This week, it came to light that a small error in the open-source OpenSSL implementation of the SSL encryption protocol opened a gaping hole in the security of hundreds of thousands websites and...

ATMs on Windows XP: How Risky Is It?

The vast majority of the world’s ATM cash machines run on Microsoft’s XP operating system, which officially hit its end of life earlier this week. Does the end of XP pose a security...

How To build a Computer

Using Autopwn to exploit a vulnerable browser

In this video i show you how to compromise a clients browser by socially engineering them to visit a specific link.

Call of Duty hacked using OpenSSL’s Heartbleed exploit

The Heartbleed security bug is a simple example of memory leakage through an overflow vulnerability in the Heartbeat component of OpenSSL. Bits of memory in 64 kilobyte chunks may be extracted from...