Browsing author

root

Hackers charge $90 to hack Gmail, $200 to $350 for Facebook, WhatsApp

Can you believe there are several online forums who actually claim to provide hackers in case you want to get someone’s Website, Facebook, Gmail, WhatsApp, Netflix etc hacked? The grand and Mysterious “World Wide Web” can be a dilemma for the naive, searching for the desired items may open a Pandora box of forbidden gifts. It is no […]

Easy-to-use TunnelBear Chrome Extension Brings VPN Services to Everyone

TunnelBear is one of the most loved VPN (Virtual Proxy Network) services because of its simplicity and clean interface. Now, the company has decided to make this service even handier by launching an extension for your Google Chrome browser. So, now you can maintain your privacy more easily. Keeping aside the advantages of the anonymity, […]

Google suspends Maps editor over peeing Android fiasco

Remember Android logo peeing on Apple logo found on Google Maps in Rawalpindi, Pakistan? Well, Google didn’t like it and for now it has suspended the map editor feature. Mere apologizing wasn’t enough for Google as all hell broke loose when an image of the android mascot peeing on the Apple logo leaked and brought public […]

TeslaCrypt looks like AlphaCrypt Malware uses TOR to transfer ransomware

AlphaCrypt Crypto-Malware the actual mind blower is that it Looks like TeslaCrypt and acts like CryptoWall. the latest piece of ransomware with new and improved file encryption capabilities has been discovered by security researchers, it was also known that it is somewhat similar in some measures from the rest of the two crypto-malware, TeslaCrypt and the […]

Bypass Internet Censorship

Internet censorship is the control or suppression of what can be accessed, published, or viewed on the Internet. It may be carried out by governments or by private organizations at the behest of government, regulators, or on their own initiative. Individuals and organizations may engage in self-censorship for moral, religious, or business reasons, to conform […]

Facebook users hit with See ‘What Happens to this Pregnant Lady’ video scam

Facebook’s astonishing “Video Scam” – ‘See What Happens to this Pregnant Lady’ inappropriately misusing “shock element” for users. A post appeared recently on Facebook, one in line of the many similar “claim-to-be-shocking-you posts” features a pregnant lady at the beach, promising to amaze viewers upon clicking the “Play” icon, warning it to be revealing and disturbing, what happens […]

Whistleblower reveals Cyber Security Firm hacks its own clients to extort them

A former employee of P2P cyber security firm Tiversa, turned whistleblower spilled the beans that the firm hacks its customers in order to fake bogus data breaches and then furthermore extorts its clients to finance its ‘incident response’ services. The P2P cyber security firm Tiversa is once again in the news but for all the wrong reasons, this time […]

Simple Brute Force Method

Brute Forcing is simply testing a list of passwords to a list of usernames and hopefully you will have matched a username and password combination that is correct. There are many disadvantages in using this method to hack, such as time (you need to test thousands if not millions of combination) and most websites now […]

80 funny, creepy, strange, disturbing Google Street View Images

We know how awesome Google Street View service is, the Google Maps feature lets you enjoy the virtual journey through streets all over the world for free. What we may not know is that Google Street view also contains some of the world’s most creepy, weird, funny, strange and shocking images. We have a collection of 80 images […]

Goodluck USA, China and Russia Promise Not to Hack Each other

In a surprising development, Russia and China have signed a cyber-security deal this Friday when Xi Jinping visited Moscow this week to celebrate the World War II’s end. According to the experts, these countries have signed a treaty to agree on not to conduct cyber-attacks on each other. It should be noted that recently China […]

DNS Spoofing – Hacking Technique

This tutorial was meant to inform the community of a modern technique countless hackers are using to harm innocent people. This tutorial is meant to be purely educational. By reading this tutorial, you agree that you will not replicate the steps I have listed below on ANY Wi-Fi but your own; and you will not […]

Girl Hacks Dad’s Computer on Her Raspberry Pi

Here I’m going to tell you about a fun project to help you learn the Linux shell on a Raspberry Pi and then use it to play a prank and ‘hack’ someone’s computer. In the video shared ahead, you will see little a daughter describing how she connected to her dad’s computer using their Raspberry […]

What is Windows Hello and How it Will Make Your Life Easier

With its upcoming Windows 10 release, Microsoft is focusing on security more than ever. At this year’s Microsoft Developers Build Conference, the software company tried to reaffirm the same notion. One of the new systems launched at Build 2015 is Windows Hello. What is Windows Hello? Windows Hello is company’s brand new biometric security system […]

Seemingly Legit Resume actually contains Crypto-Malware

The malicious email, targeted at a company’s resume screening department, is equipped with file encryption capabilities. A new ransomware having capabilities of file encryption is being flung at the company workers that perform resume screening for job seekers. This malware is distributed through a short and precise email message that appears legitimate and informs about […]

How To Save Instagram Photos To Your Mobile And Desktop

Just like WhatsApp, Instagram’s acquisition was one of the most wise decisions made by Facebook. Instagram is one of most used photography apps and I know it’s one your favorite apps for photo sharing. Based on a user request, today I’m sharing something related to Instagram and how to use it to the fullest. There […]

Iran Ministry of Defense Website Hacked by Saudi Hacker

Saudi Arabia along with its allies is fighting a war in Yemen while their hackers are fighting an online war against Iran, accusing the country of supporting Houthi forces. A Saudi hacker going with the handle of RxR HaCker hacked and defaced the official website of Iranian Ministry of Defense, Thursday night. The targeted domain belongs to Gozinesh […]

US based Company lost $3.8 million stolen due to cyberattack

Due to a cyberattack an Alaska Native Corporation had to bear the loss of $3.8million which the firm was transferring to a Hong Kong based bank account last month. CEO Greg Hambright of the Kodiak-based Afognak Native Corp explained to the group’s 900 shareholders in a letter that one of its affiliates Alutiiq LLC was […]