WPA2 encryption can now be hacked with new KRACKS method
Posted by
Posted in

WPA2 encryption can now be hacked with new KRACKS method

Security Researcher Mathy Vanhoef of Imec-DistiNet discovered a weakness within the WPA2 protocol, potentially affecting all the wireless routers supporting WPA2, an attacker can take advantage of this vulnerability by using key re-installation attacks (KRACKS).

Hack a Windows 7/8/10 admin account password with Windows magnifier
Posted by
Posted in

Hack a Windows 7/8/10 admin account password with Windows magnifier

This exploit takes advantage of the ease of access tool on the login page by ‘tricking’ windows into launching a fully privileged command prompt by selecting ‘make items on the screen larger – magnifier’. By using this method you can simply reset admin admin account password, just by having physical access to the computer.

WannaCry ransomware: researcher halts its spread by registering domain for $10.69
Posted by
Posted in

WannaCry ransomware: researcher halts its spread by registering domain for $10.69

Last year the Internet was taken down by cyber criminals through a massive Distributed Denial of Service Attack (DDoS) attack using the infamous Mirai malware. But last Friday afternoon, almost 99 countries including Russia, UK, USA and Australia became victims of a worldwide mass cyber-attack that has been reported to have caused major disruptions to systems that were being used by hospitals, companies, and other institutions.

WannaCry ransomware –  hitting world right now uses NSA windows exploit
Posted by
Posted in

WannaCry ransomware – hitting world right now uses NSA windows exploit

Earlier today, a massive ransomware campaign hit computer systems of hundreds of private companies and public organizations across the globe – which is believed to be the most massive ransomware delivery campaign to date. The Ransomware in question has been identified as a variant of ransomware known as WannaCry (also known as ‘Wana Decrypt0r,’ ‘WannaCryptor’ or ‘WCRY’).

Over 85% of Smart TVs can be hacked remotely using broadcasting signals
Posted by
Posted in

Over 85% of Smart TVs can be hacked remotely using broadcasting signals

The Internet-connected devices are growing at an exponential rate, and so are threats to them. Due to the insecure implementation, a majority of Internet-connected embedded devices, including Smart TVs, Refrigerators, Microwaves, Security Cameras, and printers, are routinely being hacked and used as weapons in cyber attacks.

“Disappearing Malware” Allowed Hackers Steal $800,000 Cash From Russian ATMs
Posted by
Posted in

“Disappearing Malware” Allowed Hackers Steal $800,000 Cash From Russian ATMs

A team of researchers at Kaspersky Labs have recently cracked the mystery of a fileless malware that was used to hack bank ATMs in Russia and steal $800,000 in a single night. It was possible because of the two log files unintentionally left on the machine by the attackers. The researchers were able to reverse engineer the attack.

Google hacking (dorking) tutorial #1
Posted by
Posted in

Google hacking (dorking) tutorial #1

Everybody knows how to use search engine “google”. But do you know tips, tricks and operators which can be used for google hacking? Here’s a tutorial that will teach you how to use google to hack and obtain even more specific data. Enjoy!