FBI Used Hacking Team’s Help to Track Tor User

Earlier this month, as a part of the massive breach at the infamous Hacking Team, numerous documents were leaked. Since then, analysts are busy going through them and new revelations are greeting us each day. In the same process, leaked documents have revealed that the Federal Bureau of Investigation (FBI) communicated with Hacking Team to […]

Top Twitter Open Source Projects You Must Know

Welcome to the second post of the series covering top open source projects by most popular companies in the world. Last time, we covered Facebook’s contribution to open source community and in this article, we are going to highlight most popular open source projects made by twitter engineering team. Twitter engineers use, contribute to and […]

NSA Open Sources its Linux-based Cyber Security Tool

The American security Agency NSA is infamous for its mass surveillance programs. Every alternate day, we are greeted with new revelations regarding its policies and tools being used to track people. Recently, it was announced that NSA will be continuing its phone spying program for another six months. Putting aside the numerous allegations, NSA has open […]

A Neural Network in 11 Lines of Python

Artificial Intelligence is getting embedded in our lives on a regular basis in form of various speech recognition software, digital assistants like Cortana or, the famous deep dreaming robot of Google – that turns pictures and video into horror movies. All this intelligence comes from a software called neural networks. Recently, a programmer shared a […]

How Government Secretly Reads Your Emails With This Insane Law

Today, the common public is aware, more than ever, regarding rights and privacy. Recent revelations made by whistleblowers like Edward Snowden and Julian Assange have made it clearer that your government is looking at your personal data. In the wake of some new leaks by Edward Snowden, I’d like to tell you that government can “effortlessly” read […]

ProxyHam Device Providing Wi-Fi Access Anonymously is Gone

We all remember that game-changing personal hardware proxy device that guaranteed to provide you with Anonymous access to the Wi-Fi located up to 2.5 miles away from the actual location. The complete source code, blueprint as well as the detailed hardware specifications was planned to be unveiled during the Def Con Hacker Conference in the […]

WEAKERTH4N – Another Hacking OS

Most of the hackers would have heard about Backtrack. Weakerthan is another Linux based pentesting distro which is really good.. I think Weakerthan is second best OS for hackers after Backtrack.   Weakth4n Linux is designed primarily for penetration testing. It’s Built from Debian Squeeze. Tools:  BRuWRT-FORSSE v2.0  Easy-SSHd  Web-Hacking-Portal v2.0  Perlwd  Netgh0st v3.0  YouTube-Thief!  Netgh0st v2.2  DomainScan  ADtrace  Admin-Tool […]

Removing a PDF password

Now a days, we all save our data in a Word file or a PDF file. Some have basic information and some have secret information. To secure those files, you might need to put a password on your PDF files because setting a password on your PDF file is very easy and anyone can do […]

Good News: Mozilla Kicks Out Flash by Default on Firefox Browser

Mozilla Firefox has blocked Adobe Flash Player and it’s a good news. If you are a regular Firefox user you must have faced this issue like whenever you open a website using flash it warns about blocking the flash part. The Firefox browser has blocked it until a new update being released; the only reason […]

8 Technologies That Can Hack Into Your Offline Computer and Phone

Whenever your computer, smartphone device or any other Internet-capable gadget is connected to the Internet, there is always a risk of security threats. This is the reason why hacking has now become the norm. The privately funded organizations, as well as the government agencies, are using various cyber spy technologies and tools so that they […]

Mozilla Firefox Kills All Versions of Flash Player by Default

Just yesterday, the chief security officer at Facebook, Alex Stamos asked for the end for Adobe’s fragile and vulnerable software Flash Player after 400 GB cache of files was stolen by the spyware company Hacking Team. In another similar development, Mozilla has decided lead the way and set examples for others. Reviewing the vulnerabilities, Mozilla was quick […]

Scammers Targeting Facebook Users with Airline Scams

Scammers have become amusingly very popular in this day and age — They are the reason why holiday makers won’t keep their antennas down lest they get fleeced of their hard-earned holiday savings. Scamming, especially in July and August has hit its high as this is the season for booming business in the airline industry […]