Huge Morrisons data breach due to employee with grudge, court hears
A Morrisons employee with a grudge was responsible for posting personal data of nearly 100,000 staff onto the internet, a court heard.
A Morrisons employee with a grudge was responsible for posting personal data of nearly 100,000 staff onto the internet, a court heard.
Earlier this month, as a part of the massive breach at the infamous Hacking Team, numerous documents were leaked. Since then, analysts are busy going through them and new revelations are greeting us each day. In the same process, leaked documents have revealed that the Federal Bureau of Investigation (FBI) communicated with Hacking Team to […]
About two weeks ago, we reported about the Raspberry Pi 2 based WiFi router that provided anonymous WiFi by putting you 2.5 miles away from your IP address. This device was called ProxyHam and Ben Caudill of Rhino Security was scheduled to introduce the device at DefCon 2015, few days ago. But, this highly anticipated […]
British teen Seth Nolan Mcdonagh, aka “narko” has been sentenced for his role in a 2013 attack which slowed the internet around the world.
United Airlines has paid out two million flight miles to two security researchers who uncovered 14 separate vulnerabilities in the company’s operation.
Welcome to the second post of the series covering top open source projects by most popular companies in the world. Last time, we covered Facebook’s contribution to open source community and in this article, we are going to highlight most popular open source projects made by twitter engineering team. Twitter engineers use, contribute to and […]
The American security Agency NSA is infamous for its mass surveillance programs. Every alternate day, we are greeted with new revelations regarding its policies and tools being used to track people. Recently, it was announced that NSA will be continuing its phone spying program for another six months. Putting aside the numerous allegations, NSA has open […]
International law enforcement agencies have arrested more than 60 people suspected of carrying out cybercrime associated with the Darkode forum.
Artificial Intelligence is getting embedded in our lives on a regular basis in form of various speech recognition software, digital assistants like Cortana or, the famous deep dreaming robot of Google – that turns pictures and video into horror movies. All this intelligence comes from a software called neural networks. Recently, a programmer shared a […]
Today, the common public is aware, more than ever, regarding rights and privacy. Recent revelations made by whistleblowers like Edward Snowden and Julian Assange have made it clearer that your government is looking at your personal data. In the wake of some new leaks by Edward Snowden, I’d like to tell you that government can “effortlessly” read […]
We all remember that game-changing personal hardware proxy device that guaranteed to provide you with Anonymous access to the Wi-Fi located up to 2.5 miles away from the actual location. The complete source code, blueprint as well as the detailed hardware specifications was planned to be unveiled during the Def Con Hacker Conference in the […]
Most of the hackers would have heard about Backtrack. Weakerthan is another Linux based pentesting distro which is really good.. I think Weakerthan is second best OS for hackers after Backtrack. Weakth4n Linux is designed primarily for penetration testing. It’s Built from Debian Squeeze. Tools: BRuWRT-FORSSE v2.0 Easy-SSHd Web-Hacking-Portal v2.0 Perlwd Netgh0st v3.0 YouTube-Thief! Netgh0st v2.2 DomainScan ADtrace Admin-Tool […]
Now a days, we all save our data in a Word file or a PDF file. Some have basic information and some have secret information. To secure those files, you might need to put a password on your PDF files because setting a password on your PDF file is very easy and anyone can do […]
Mozilla Firefox has blocked Adobe Flash Player and it’s a good news. If you are a regular Firefox user you must have faced this issue like whenever you open a website using flash it warns about blocking the flash part. The Firefox browser has blocked it until a new update being released; the only reason […]
Whenever your computer, smartphone device or any other Internet-capable gadget is connected to the Internet, there is always a risk of security threats. This is the reason why hacking has now become the norm. The privately funded organizations, as well as the government agencies, are using various cyber spy technologies and tools so that they […]
A planned Defcon talk around a low-cost privacy device called ProxyHam has been cancelled.
In April, ESET’s Laboratory in Latin America received a report on an executable program named “Liberty2-0.exe.” Now, it asks is there a version 1.0?
Yellow Jersey wearer targeted by critics who claim he has been using performance-enhancing drugs.
Just yesterday, the chief security officer at Facebook, Alex Stamos asked for the end for Adobe’s fragile and vulnerable software Flash Player after 400 GB cache of files was stolen by the spyware company Hacking Team. In another similar development, Mozilla has decided lead the way and set examples for others. Reviewing the vulnerabilities, Mozilla was quick […]
How homograph attacks can present a spoofed, malicious link, and a case where a secure connection doesn’t guarantee a safe site.
Scammers have become amusingly very popular in this day and age — They are the reason why holiday makers won’t keep their antennas down lest they get fleeced of their hard-earned holiday savings. Scamming, especially in July and August has hit its high as this is the season for booming business in the airline industry […]