Anonymous Hacks Israeli Arms Importer Site, Leaks Massive Client Login Data

Online hacktivist Anonymous has breached into the website of an Israeli arm importer and manufacture Fab-Defanse (fab-defense.com) and leaked login credentials plus personal details of its local and international clients/customers, including some government officers. The latest cyber attack was conducted under the banner of OpIsrael. After analyzing we found out that data is legit and never been […]

Flash Player Bug Records Audio and Video without User Permission

Researchers have identified a vulnerability in some Adobe Flash Player versions that can be exploited by attackers for spying on users having built-in webcams on their computers — The spying remains completely discreet. Flash player’s configuration panel allows creation of a list of sites that can access the device’s built-in microphone and webcam. Alternately, users […]

Brazil will sue Facebook for blocking picture of indigenous woman

Brazilian Ministry of Culture is planning to sue Facebook on blocking the picture of an Indian woman from 1909 just because her breasts were exposed. The ministry claims that Facebook is illegally exposing its censorship standards on Brazil. Brazil will sue Facebook for blocking picture of indigenous woman Reportedly, Brazilian Cultural Ministry isn’t happy with […]

How to Use Proxychains to Run Applications Behind Proxy

Some applications do not support proxy by default. Other applications might support HTTP proxy but fail when using SOCKS. As Tor provides a SOCKS proxy, you can not use it with your update or download client. Sure you can set up proxy variables (not SOCKS) in the shell, but there is a better alternative, Proxychains. […]

How to find out if you’ve been HACKED with CMD

There are numerous methods to see if you have been hacked. Using the Command Prompt, you can run a command which will check for incoming and outgoing connections to your computer. By checking all the established connections, you can identify a malicious connection from a hacker. Click “Start,” then type “cmd” into the quick search. […]

Man who revealed plane can be hacked offloaded for the second time

Earlier this week the FBI denied air travel to Chris Roberts due to his sarcastic tweets about United Airlines’ security system on board. Now, for the second time in a row, Roberts has been denied air travel via United. Apparently, United Airline isn’t very keen on letting Chris Roberts travel on their planes. Roberts, acclaimed […]

Microsoft Outlook Users Hit with ‘Discontinue Support’ Phishing Scam

‘Discontinue Support’—Latest Phishing Scam Targeting Microsoft Outlook Users. An email is being circulated by cybercriminals that appears to be sent by Outlook.com team informing users that on 11th May 2015, MS Outlook will be discontinuing “support on your account and security.” The message is nothing else but another crude phishing attempt. The email warns users […]

How To Enable YouTube’s Transparent Player

I think we all agree that YouTube is the best place to watch online videos, and this is why it is world third most visited website after Google and Facebook. But there is one thing that irritates most of us- its Control Bar. It appears at the bottom and snatches the real feeling of watching […]

How to Connect to Ad Hoc WiFi Network in Windows 8.1

Having Windows 8.1 and then connecting to a wireless network, sometimes it may create some problems. Well I use Ubuntu most of the time, but I have a friend who use Windows and recently upgraded to Windows 8.1. So the other day, we were doing some project and he needed to connect to Internet. So, […]

TOP 100 Unique sites

These sites solve at least one problem really well and they all have simple web addresses(URLs) that you can easily memorize thus saving a trip to Google. 1. screenr.com – Record movies of your desktop and send them straight to YouTube. 2. ctrlq.org/screenshots – for capturing screenshots of web pages on mobile and desktops. 3. goo.gl – shorten long URLs and […]

How to Check If A Used iPhone Is Stolen

Apple attempted to address this issue with the Find My iPhone service in 2010, but that could be defeated by turning the iPhone off or erasing the contents of the phone. Apple made things much harder on thieves when it introduced Activation Lock in iOS 7. This feature made it impossible to activate an iPhone […]

Anonymous Hacks and Removes X-Rated Animal Abuse Websites

Anonymous hackers have started a new operation under the banner of #OpNullDenmark and #OpBEAST. The purpose of this operation is to raise awareness about animal cruelty and websites promoting bestiality content (sexual relations between a human being and a lower animal). Though the operation is more active on Twitter, some Anonymous hackers decided to target such websites […]

U.S Military to hire civilian cybersecurity specialists

If you are a cybersecurity specialist then U.S Military is ready to hire you. Lt. Gen Cordon announced that U.S Military is planning to create Cyber Branch 17, a new cybersecurity wing. The department is thinking of launching a new career option for civilians who can help the military to secure its servers against the increasing […]

Pro-Israeli Jewish Press Website Hacked by ‘Gaza Team’ Hackers

Gaza Team, a Palestinian-friendly group of hackers, hacked The Jewish Press — The site displayed a black backdrop with a man holding ISIS-type flag. The team vows to hack many more Pro-Israel websites in future. On 14th April 2015, a pro-Israel Jewish Press newspaper was hacked by a group that calls itself ‘Gaza hacker Team.’ […]

Reveal Asterix Symbols with Javascript

How to do it 1) Open the Login Page of any website. E.g http://www.gmail.com 2) Type your ‘Username’ and ‘Password’. (DONT CLICK LOG IN) 3) Copy and paste the JavaScript code given below into your browser’s address bar and press ‘Enter’ on your keyboard. Quote:j alert(document.getElementById(‘Passwd’).value);   4) As soon as you press ‘Enter’, A […]

Meet Cirrus7 Nimbini – The Most Beautiful Ubuntu PC Ever Made

Cirrus7 Nimbini reminds us that beautiful PCs are possible. This laser-cut aluminum PC from German PC manufacturer Nimbini is company’s smallest PC ever. Back in the year 2014, Ubuntu-powered Cirrus7 Nimbus won the renowned Red Dot design award. Earlier this week, Cirrus7 unveiled their latest offering – Cirrus7 Nimbini. This Broadwell NUC motherboard powered PC […]

Pics of IDF women soldiers helped hackers to breach Israeli Military Servers

Arab hackers are using pictures of IDF’s women division to hack Israeli military servers — And it’s a success. Several computer networks belonging to the Israeli military have reportedly been penetrated by Arabic-speaking hackers under a four-month spying campaign. The modus operandi of these hackers involves using a careful combination of spyware along with deceiving emails attached with […]