Browsing category

Data Security

NSA Data Center Experiences Up to 300 Million Cyber-Attacks per Day

Six years ago, the cyber-attacks barely reached 25,000. Utah officials are saying that the number of cyber-attacks they’ve seen against local state organizations has grown exponentially in the past six years. In a quote to KUTV, a Salt Lake City TV station, Keith Squires, Utah Commissioner of Public Safety, says things have evolved since 2010 when […]

Russian bank employees received fake job offers in targeted email attack

Employees at six Russian banks were sent spoofed emails delivering Trojan.Ratopak in a narrow, targeted attack. In December 2015, employees from several Russian banks were targeted with spoofed emails, a common technique in attack campaigns. The emails were made to look like they were from the Central Bank of Russia and offered employment to their […]

Hack This: Scripting Deeper, Better Hacks in Python

Part of the point in presenting small, hack-minded tutorials a la “Edit an Image in Python” or “Send an Email from Python” is that some subset of readers who actually follow the steps will wind up interested enough in the subject(s) to go deeper on their own. I can present a detailed recipe, but learning […]

GPS hacking (PART 1)

GPS hacking has alway been a hot topic on security conferences over the past few years. But the contents are over academic and the cost for necessary equipment is too high, which stops many fans from getting started. The appearance of some open source projects, such as GPS-SDR-SIM, and the Keynote speech given by @Wang […]

Linux Mint was hacked, website served malicious ISO on Saturday

The Linux Mint website had been hacked, on Saturday, intruders were able to compromise it and serve malicious ISO of Linux Mint 17.3 Cinnamon edition. The Linux Mint website had been hacked, on Saturday 20th, February, intruders were able to compromise the website serving malicious ISO of Linux Mint 17.3 Cinnamon edition. The disconcerting announcement was made […]

How to secure databases?

Databases can be a treasure trove of confidential data. Normally most databases contain confidential information, private data of companies, people, intellectual property, employees or customers. Confidential data may include the customer data, employee’s salary data, employee address data, patient records, financial data, credit card numbers and much more. From a database security company’s point of […]

Remotely Disabling a Wireless Burglar Alarm

Countless movies feature hackers remotely turning off security systems in order to infiltrate buildings without being noticed. But how realistic are these depictions? Time to find out. Today we’re releasing information on a critical security vulnerability in a wireless home security system from SimpliSafe. This system consists of two core components, a keypad and a […]

Southampton University Creates 5D Storage Disc That Can Store 360TB Data

The mindblowing invention will revolutionise the way we store data Last year the researchers came up with a processor capable of transmitting data using light. Now, United Kingdom’s Southampton University created an optical disc that is regarded as a huge breakthrough in storage solutions. The quartz storage disc can store 360TB data for more than […]

The NSA’s SKYNET program may be killing thousands of innocent people

“Ridiculously optimistic” machine learning algorithm is “completely bullshit,” says expert. In 2014, the former director of both the CIA and NSA proclaimed that “we kill people based on metadata.” Now, a new examination of previously published Snowden documents suggests that many of those people may have been innocent. Last year, The Intercept published documents detailing the […]

GCHQ is allowed to hack into computers and smartphones

GCHQ is legally allowed to hack into computers, tablets and smartphones owned by the public, a tribunal has ruled, after a legal challenge was brought by Privacy International. The Investigatory Powers Tribunal (IPT) ruled on Friday that a “proper balance” has been struck in how GCHQ uses the ability to access devices using computer network […]

Skimmers Hijack ATM Network Cables

If you have ever walked up to an ATM to withdraw cash only to decide against it after noticing a telephone or ethernet cord snaking from behind the machine to a jack in the wall, your paranoia may not have been misplaced: ATM maker NCR is warning about skimming attacks that involve keypad overlays, hidden cameras and […]

Password Security — Who’s to Blame for Weak Passwords? Users, Really?

Password Security — Who’s to Blame for Weak Passwords? Users, Really? The vulnerability of people falling into the traps of online miscreants is huge. Owing to a large number of people coming online for the first time (mainly from the third world countries), the issues of hacking, data theft, impersonation etc. has witnessed an unprecedented […]

Russian Hackers Spying On Your Linux PC Using Sophisticated Malware “Fysbis”

Linux Backdoor Called Fysbis Used by Russian Hackers. A new malware family known as Fysbis (or Linux.BackDoor.Fysbis) is aiming Linux machines by setting up a backdoor that allows the malware’s author to snoop on victims and perform further attacks. Fybis showed its first signs in November 2014. However, the security researchers fromPalo Alto Networks only recently […]

Man charged of Laundering $19.6 Million earned with PBX system hacking

Pakistani citizen Muhammad Sohail Qasmani admits laundering Millions from massive computer hacking and telecommunications fraud scheme. A Pakistani citizen, Muhammad Sohail Qasmani (47) admitted laundering millions of dollars as part of a massive international computer hacking and telecommunications fraud scheme. The man worked for a hacking crew that targeted US companies by hacking into their PBX […]

HackSpy Trojan Exploit

HackSpy Trojan Exploit this tool  make undetectable trojan virus….which can help you to spy on other computers…….. this version consists of a trojan builder and multiple listener….send the trojan virus to others pc and then open a listener to control that pc remotely  it can remotely access any of the windows machine over a same network […]