Browsing author

root

Hack United Airlines Website and Get Paid in Million Miles

Are you good at programming and do you call yourself a computer expert? Here’s a chance to earn a million miles and spend it on traveling by air. The United Airlines is willing to reward you with free “miles” for your expertise if you are able to find a bug in United Airlines’ site. The […]

What is Enforced Transparency? A Western Trend?

The concept of Transparency carries a simple meaning, if practiced by governments it will empower the masses, place them in a position to expose misuse of power, corruption and defend their democracies. A namesake transparency will only be reduced to a smokescreen and a word to keep everything dark hidden and under wraps, something needs […]

Mobile Spy Software Maker mSpy Hacked, Personal data of 400k users leaked

mSpy, the notorious software-as-a-device product which so far enabled two million plus people spy on their spouses and kids, is believed to be a victim of serious hacking. Last week it was discovered that massive data has been stolen from the company’s servers and posted on the Dark Web, revealing numerous emails, text messages, payment […]

Live Stream Twitch in VLC to avoid buffering

Twitch has been making some very awful encoding and additional bad choices for streamers and viewers of Twitch.tv. This method has been used before for various streams but now is rather needed to avoid buffering and delay of the stream. Things you will need Livestreamer   –   Download here Vlc                     –   Download here Step 1 […]

Free Microsoft Office alternatives

Many people feel the need to use Torrents to pirate software that would normally be paid for, however by doing this torrent users are putting themselves at risk to all kinds of Trojan related Malware. However there are alternatives to pirating software and that is to look further into the fabulous world of open source!. […]

10 Games That Teach Kids To Code

In this world 36 million kids have taken part in Hour of code activities, by helping them to develop their skill in technology use and that might help to get a job one day. Most of your kids wont be interesting in coding but these games can improve problem-solving and thinking skills which is important […]

Internet users hit with Breaking Bad Theme Crypto-Malware

To demonstrate their creativity cybercriminals have released a new ransomware equipped with file encryption abilities and this time they have chosen logo of “Los Pollos Hermanos” fast food chain featured in famous TV show “Breaking Bad.”  No matter how much we condemn cybercriminals for their deeds we cannot deny that they have been demonstrating their […]

Syrian Electronic Army Hacks Washington Post Mobile Site

The official mobile website of American daily newspaper The Washington Post was hacked by Syrian Electronic Army (SEA), a group loyal to Syrian President Bashar Al-Assad. After taking over the mobile website of The Washington Post, hackers redirected the site to one of their own sites (sea.sy). The attack was conducted about 9 hours ago when visitors on the […]

Anonymous Hijacks Thousands of Insecure Routers to Power Its DDoS Tools

Lack of some elementary security measures can risk your router’s security and this has stemmed to grow into a large-scale denial-of-service (DDoS) attacks using these hacker-controlled routers. A web security firm Incapsula has discovered a new router based botnet Mr Black while investigating some DDoS attacks against its customers since this December. Hackers exploited routers’ […]

Researcher claims Starbucks mobile app got hacked, credit card data stolen

Summary: Earlier this week Bob Sullivan reported that hackers can easily access Starbucks customer accounts by stealing their username and passwords and naturally Starbucks app users panicked — Starbucks in its official statement denied the allegations of any sort of security breach. An independent tech reporter Bob Sullivan shocked the users of Starbucks app by reporting that […]

Notion of Cloud’s Unmatched Security Shattered by ‘Venom’ vulnerability

The CrowStrike researchers discovered that any attacker can burst out of specific virtual machines and exploit whatever is running nearby — The most disturbing fact revealed is that a portion of cloud-hosted network may also be running on that same system. This revelation nullifies the claim that these vessels are extremely strong and protective. A […]

US House Votes to end NSA’ bulk phone data collection

The USA Freedom Act was passed by the House of Representatives on Wednesday and the bill, which is going to change the way NSA gathers nation’s cellular data, now will be forwarded to Senate. The United States House of Representatives overwhelmingly voted in favor of the USA Freedom Act with 338 votes favoring it and […]