Browsing tag

black hat

Free Facial Recognition Tool to Track People on Social Media Sites

A new facial recognition tool is developed by the researchers at Trustwave, an information security company. This is an open-source facial recognition tool will help agencies gather intelligence at a faster turnaround time. The software is supposed to be a Social mapper which will help the agency find the profiles of hackers who hack into […]

How to Generate a PHP Backdoor using Weevely – Kali Linux

Weevely is a web shell designed for post-exploitation purposes that can be extended over the network at runtime. Upload weevely PHP agent to a target web server to get remote shell access to it. It has more than 30 modules to assist administrative tasks, maintain access, provide situational awareness, elevate privileges, and spread into the […]

5 Best Hacks From The Black Hat 2016

Short Bytes: At the Black Hat 2016 hacker conference in Las Vegas, the world saw a variety of cutting-edge cyber security applications. Some of these hacks stood out from the others and gained widespread praises. Here’s a quick recap of the 5 best Black Hat 2016 hacks, including the likes of famous Jeep Cherokee hackers […]

Hacked Websites Used in Black Hat SEO Campaign Redirecting Users to Adult Sites

Infected websites are hard to detect, only show up for users coming off search engines and for search bots. A new black hat SEO campaign is leveraging a combination of hacked websites, backdoors, doorway scripts, and SEO poisoning to redirect a website’s users to pornographic websites. This whole scenario relies on an attacker’s ability to hack into […]

Malware Is Using the Dark Web to Stay Hidden

The dark web is well known as a space where anything can be bought or sold: guns, drugs, stolen data, and extreme pornography are all relatively easy to get hold of with a few clicks of a mouse. But anonymity networks such as Tor, as well as the hidden sites they facilitate, can also act […]

Explained: How Criminals Hack Your Chip And Pin Card

Short Bytes: EMV credit cards have till now been assumed to be unhackable. The security professor from the University of California explains how it is NOT so. With the advancing technology and due time has given anything and everything can be hacked. We have already seen some of such events like the car-hacking, whole corporates brought […]

Researchers Show How To Hack Corvette with A Text Message

A video demonstration by the University of California researchers how a simple text message can control your car. The months of July and August have been bad for the automotive industry, thanks to the hackers who found out how easy it is to hack Jeep Cherokee leaving 470,000 vehicles vulnerable. As if that wasn’t enough when another hacker demonstrated […]

7 Unexpected Hacks of 2015, Thanks To DefCon and Black Hat

This year, at DefCon 23 and Black Hat USA 2015 security conferences, hackers are going to discuss how vulnerable and severely flawed our day-to-day things really are. Here at HackRead.com, we have brought you 7 much awaited hacking discussions that are related to the technologies towards which most of the individuals are looking forward to […]