Browsing category

Data Security

Forbes Website Dropping Malware on Visitor’s PCs

Disabling ad-blocker at Forbes will unleash a malware Web publications usually ask readers to disable ad blockers if visiting their websites with AdBlock on. It is understandable since publishers rely upon advertisements for income and therefore, want users to not turn on adblockers. But for a reader, it becomes quite irritating to let adverts ruin […]

The Father of Online Anonymity Has a Plan to End the Crypto War

IT’S BEEN MORE than 30 years since David Chaum launched the ideas that would serve as much of the groundwork for anonymity online. In doing so, he also helped spark the debate that’s endured ever since, over the anarchic freedoms that digital secrecy enables—the conflict between privacy advocates and governments known today as the “crypto […]

The Dark Web Hacking Forum ‘Hell’ Has Returned Online

Look who’s back? The Dark Web Hacking Forum ‘Hell’ Just months after users speculated that the infamous dark web hacking forum, ‘Hell’ was shut for good, it has made a comeback. The dark web hacking forum ostentatiously called “Hell,” was hovered by undercover cops and it was shut down amidst rumors of its founder being arrested has […]

What REALLY Happened with the Juniper Networks Hack?

Last month, it was revealed that Juniper Networks’ routers/firewalls were hacked. It was reported that a backdoor was implanted in the operating system of their routers/firewalls and that attackers could listen in on all encrypted communication. There are now fears that all confidential communications by U.S. government agencies and officials could have been compromised over […]

Discovered a new DB containing more than 56 million records of US Voters

A second misconfigured database has been discovered by Chris Vickery containing data of US voters, including 19 million profiles with private information on religion, gun ownership and more. A couple of weeks ago Salted Hash reported on a sensational discovery made by the security expert Chris Vickery who found a misconfigured archive containing the personal […]

How to Successfully Hack a Website in 2016!

Hello partners, first of all I would like to thank all those who have sent me positive feedback about my posts, and say that I’m always willing to learn,teach, and I’m always open to answer the good questions, second i want to say sorry for the series i left in stand by mode, as soon […]

ISIS Hacker Killed in US Drone Strike in Syria

Siful Haque Sujan killed near Raqqah, Syria. Siful Haque Sujan, a Bangladesh-born man, educated in the UK, who later joined ISIS (IS, Daesh) forces in Syria, has been killed in a drone strike, the Pentagon reports. Sujan, a successful Cardiff businessman, has been killed on December 10, near Raqqah, Syria. According to the Pentagon’s statement, issued […]

Turkish hackers took over a Russian Govt Instagram account

Alleged Turkish hackers have taken over the Russian Communications and Mass Media Minister Nikolai Nikiforov’s Instagram account. Events in the cyberspace are strictly correlated with facts in the real life, in many cases, disputes between countries are associated with numerous cyber events that could be analyzed by intelligence analysts. The recent crisis in Crimea between Russia and Ukraine is just […]

Fail0verflow Group Hacks PlayStation 4 to Run Linux

A group going with the handle of ”fail0verflow” hacked PlayStation 4 and run Pokémon on it — The group used a WebKit flaw to access the Linux Free BSD based Sony Orbis operating system. Whenever a Xbox or PlayStation is released, hackers actively find new ways to crack the console. Hence, when PlayStation 4 went on sale, […]

Forget anonymity, we can remember you wholesale with machine intel, hackers warned

Resistance coders, malware writers, and copyright infringers take note. 32c3 Anonymous programmers, from malware writers to copyright infringers and those baiting governments with censorship-foiling software, may all be unveiled using stylistic programming traits which survive into the compiled binaries – regardless of common obfuscation methods. The work, titled De-anonymizing Programmers: Large Scale Authorship Attribution from Executable […]

DLL Hijacking Tutorial

Dll hijacking is a vulnerability that is caused by a misbehavior practiced by all versions of Windows.Many people believe that is a feature and not a bug because it was intended to be made this way by Microsoft. Basically, it works by creating a custom malicious dll and putting it in the same directory of […]

AVG’s extension is flawed, Chrome users are at risk

On AVG.com, there’s a free download available. It’s called Web TuneUp and it’s meant to guarantee a secure and safe browsing activity for every user. Including Chrome aficionados. But is it really? The website powerfully recites: be safe. Be in control. Free yourself of hidden threats and hackers. Yes, please – we would merrily chant. […]

PlayStation 4 hacked to run Linux, Pokémon

The PlayStation 4 and Xbox One systems are just PCs, and now hardware hackers have started doing some very cool things with at least one of these systems. Console-hacking group Fail0verflow has cracked the PlayStation 4 and loaded it up with a version of Linux. This is a big step in the process to get […]

Backspace Flaw Enables Linux Zero-Day Attack

Researchers last week revealed a zero-day flaw that lets attackers take over a Linux system by pressing the backspace key repeatedly. Pressing backspace 17 to 20 times will overwrite the highest byte of the return address of the grub_memset() function, ultimately causing a reboot by redirecting control flow to the 0x00eb53e8 address, according to the Cybersecurity […]

The Tor Project Is launching the Tor Bug Bounty Program

The Tor officially announced to launch the Tor Bug Bounty Program in the next year, a great news for the Tor community. The non-profit organization that is maintaining the TOR project plans to launch very soon  a Tor Bug Bounty Program for researchers who find vulnerabilities in the popular anonymizing platform. This is a great for all the […]

Ian Murdock, father of Debian, dead at 42

Former Sun VP and Linux Foundation CTO died under suspicious circumstances. Ian Murdock, founder of the Debian GNU/Linux distribution project, has died at the age of 42. His death, announced in a blog post by Docker CEO Ben Golub, came after an apparent encounter with police and a statement posted on Murdock’s Twitter feed that […]

Tor Project To Launch Bug Bounty Program

Tor would soon be launching a bounty program which would reward any person who finds a vulnerability in one of the most popular anonymity programs these days. This was announced during “State of the Onion” talk at Chaos Communication Congress, an art, politics, and security conference that is held annually in Hamburg, Germany. “We are […]