- 77 facts about cyber crimes one should know in 2018 (INFOGRAPHIC)
- How CoffeeMiner Attack Hacks Public Wi-Fi And Uses Your PC For Mining Cryptocurrency
- Meltdown and Spectre exploits: Cutting through the FUD
- WPA2 encryption can now be hacked with new KRACKS method
- 10 private search engines that do not track you
- How to see who viewed your Facebook profile 2,802 visits
- Build own OpenVPN server by using raspberry Pi (Part1/2) 2,751 visits
- How to make SOCKS proxy server by using Raspberry Pi 1,253 visits
- Checkpoint FW GAIA – remote admin/expert password reset 1,005 visits
- Build own OpenVPN server by using raspberry Pi (Part2/2) 924 visits
How many information is out there, purposely being concealed for the sake of greater good, for the sake of our own safety? The number is probably unfathomable. Today, when everything is online, and our lives are intertwined with a world most of us know nothing about, privacy and safety become an issue of epic proportions.
A breakdown of what the Meltdown and Spectre exploits are, what they aren’t, the risks they pose, and what you should do.
Security Researcher Mathy Vanhoef of Imec-DistiNet discovered a weakness within the WPA2 protocol, potentially affecting all the wireless routers supporting WPA2, an attacker can take advantage of this vulnerability by using key re-installation attacks (KRACKS).
Cryptocurrency trading can be a lucrative career and has already made many a person very, very rich. Whether you’re a seasoned professional trader or a total cryptocurrency novice who only wants to buy your first cryptocoin, this list has something to suit your needs. Just the same if you want to back the ideals behind decentralized cryptocurrencies and help out the community.
The HBO hackers who have been notoriously leaking unaired TV show episodes and their scripts are acting well on their promise of continuously releasing new material. In the latest wave, the hackers have released more content, but it didn’t include Game of Thrones Season 7 episodes.
Last year the Internet was taken down by cyber criminals through a massive Distributed Denial of Service Attack (DDoS) attack using the infamous Mirai malware. But last Friday afternoon, almost 99 countries including Russia, UK, USA and Australia became victims of a worldwide mass cyber-attack that has been reported to have caused major disruptions to systems that were being used by hospitals, companies, and other institutions.
Earlier today, a massive ransomware campaign hit computer systems of hundreds of private companies and public organizations across the globe – which is believed to be the most massive ransomware delivery campaign to date. The Ransomware in question has been identified as a variant of ransomware known as WannaCry (also known as ‘Wana Decrypt0r,’ ‘WannaCryptor’ or ‘WCRY’).
There are chances that you might’ve received an email with a Google document. It could be a phishing attempt that has gone viral. This attack has affected about 1 million Gmail users. While Google has blocked the attack, make sure to take security check and look for suspicious app permissions.
The Internet-connected devices are growing at an exponential rate, and so are threats to them. Due to the insecure implementation, a majority of Internet-connected embedded devices, including Smart TVs, Refrigerators, Microwaves, Security Cameras, and printers, are routinely being hacked and used as weapons in cyber attacks.
A team of researchers at Kaspersky Labs have recently cracked the mystery of a fileless malware that was used to hack bank ATMs in Russia and steal $800,000 in a single night. It was possible because of the two log files unintentionally left on the machine by the attackers. The researchers were able to reverse engineer the attack.
Researchers at Google have realized the first real world collision attack against SHA-1, creating two documents with different content but identical hashes.
As we have already announced, WikiLeaks published CIA’s hacking capabilities, so called Vault 7. Hereby we are providing list of top 15 discoveries & implications.
On 07/03/2017, Wikileaks published a massive collection of data which is the biggest ever leak on CIA (Central Intelligence Agency). This immediate sensational news highlights the hacking capabilities for of CIA.
Huge database of e-mail addresses has been leaked by the company known as one of the biggest SPAM senders. Unencrypted backup from January 2017 contains more than 1.37 bilion e-mail contacts with additional information (names, addresses, IPs etc.).
A severe security vulnerability has been discovered in the CloudFlare content delivery network that has caused big-name websites to expose private session keys and other sensitive data. Last Friday, Tavis Ormandy from Google’s Project Zero contacted Cloudflare to report a security problem with their edge servers.