Browsing tag

Hacks

Here are 5 MacBook Hacks that You Must Know

MacBook hacks and shortcuts are endless. There is AirDrop, there is iMessage—the options are limitless. Here are 5 quick hacks to make the best out of your MacBook. Apple is known to be the epitome of an intuitive approach to tech. Be it unique gestures, or an overall simple approach to software, Apple has shown […]

ATM Robber Malware Turns ATM into Slot Machine to Dispense Cash Automatically

ATM hijacking malware dubbed WinPot turns the ATMs into a slot machine, which starts dispensing the cash based on SPIN button. Security researchers from Kaspersky observed the emergence of the WinPot malware, the malware appeared first in the underground markets in March 2018. Threat actors designed the malware to automatically dispense the cash automatically form […]

19-year-old youngster hacks local police systems

Officers say the young man wanted to belong to the police department Jared Joslin really wanted to belong to a law enforcement agency; “I wish I could pull people over and intervene in bank robberies”, the 19-year-old said to the police. However, the young man made the wrong decisions, as he was arrested by the […]

Hackers Are Using These 6 Tools To Steal Your Cryptocurrency

In the early July, suspicious action around 2.3 million Bitcoin wallets was discovered, all of which appeared to be full-blown hacks in the making. The attackers utilized malware — known as “clipboard hijackers” — which works in the clipboard and can possibly replicate wallet address with one of the attackers. The risk of hacking of […]

Quick look your right eyes and ears while using public WiFi network

Research has revealed that public WiFi networks are more dangerous than one might realize. They can be like ripe fruit for hackers. Setting up a fake WiFi network to steal personal information is an easy task for these hackers. When a user tries to connect with public WiFi, especially at an airport or coffee shop, […]

Report: Chinese government is behind a decade of hacks on software companies

Though sloppy at times, Winnti Umbrella remain advanced and extremely prolific. Researchers said Chinese intelligence officers are behind almost a decade’s worth of network intrusions that use advanced malware to penetrate software and gaming companies in the US, Europe, Russia, and elsewhere. The hackers have struck as recently as March in a campaign that used […]

Some Basic Tech Security Hacks That Everyone Should Use

Almost everyone today knows that the internet is full of viruses, all kinds of malware (simple as well as sophisticated ones) and different sorts of scams. There are hackers all around who are waiting to get a chance to prowl upon anyone with a vulnerability in their system/network. Today, the situation is even more complicated […]

New Tool Automatically Finds and Hacks Vulnerable Internet-Connected Devices

Hacking just got fully automated for script kiddies. Hacking isn’t always hard. Some lower-tier hackers use programs to automatically churn through breached login details to break into other accounts, and some penetration testing tools are designed to streamline processes so hackers can get to the more interesting stuff as quickly as possible. Enter AutoSploit, a program which takes that […]

Nintendo Switch Hacked to Run Pirated Games

There is no doubt about the fact that Nintendo Switch is currently the most sought-after device. However, the device is also prone to be hacked. According to hackers Yellow8, Plutoo, Derrek, and Naehrwert, it is possible to hack Nintendo Switch and install unofficial homebrew software and pirated games on the device. The hackers, minus Yehllow8, […]

PS4 Jailbreak possible with newly identified exploit

PS4 Jailbreak is now possible – Thanks to a new exploit identified by researchers. We have always believed gaming consoles to be most well-protected devices but it is about time manufacturers like Sony take notice of security protections in their devices. Seems like troubles for Sony are about to resume with the New Year since […]

DEVELOPERS TARGETED IN ‘PARSEDROID’ POC ATTACK

Researchers have developed a proof of concept attack that could impact the millions of users of integrated development environments such as Intellij, Eclipse and Android Studio. Attacks can also be carried out against servers hosting development environments in the cloud. The attack vector was identified by the Check Point Research Team, which on Tuesday released […]

Hackers Can Remotely Access Wireless Syringe Infusion Pump

Another day, another set of critical vulnerabilities in wireless medical devices – This time; high severity flaws identified in Smiths Medical Syringe Infusion Pumps. The Medfusion 4000 Wireless Syringe Infusion Pump that is manufactured by Minnesota-based firm Smiths Medical is reportedly plagued with not one or two but eight vulnerabilities. Some of these can easily […]

Wall Street IT Engineer Hacks Employer to See If He Will Be Let Go

On Friday, April 7, the FBI arrested Zhengquan Zhang, a 31-year-old IT engineer, who now stands accused of installing malware on his employer’s servers to steal proprietary source. Zhang started working for his former employer, KCG Holdings, Inc., in March 2010, first in its New York branch, and then its San Francisco offices. During his […]

Expert Hacks Internal DoD Network via Army Website

The Defense Digital Services (DDS) group is tasked with pioneering private sector solutions to solve some of the Department of Defense’s most complex problems. And pioneers they are. Back in November, the U.S. Army coordinated with the DDS to launch its first ever bug bounty challenge: https://hackerone.com/hackthearmy. The largest branch of the U.S. military welcomed […]

These were the biggest Cyber Attacks of the year 2016

This was the year when many historical hacks came back to bite millions just as they were least expecting it.This year many cyber attacks took place which caused almost 3,000 publicly data breaches, exposing more than 2.2 billion records. And the year isn’t even over yet. Let’s take a look back at some of the […]

HOW TO CLONE A SIM CARD

Clone A SIM Card The Ultimate Tool to spy on somebody is his phone. People mostly do their confidential talks over a cell phone. But only some know how easy it is to hack them. There are some tricks and hacks to do that, but the most powerful way is to clone their SIM Card. […]

Learn SQL Injection with Practical example!!

What is a SQL Injection? Full form of SQL is Structured Query Language. It is used to retrieve and manipulate data in the database. SQL Injection is an attack that poisons dynamic SQL statements to comment out certain parts of the statement or appending a condition that will always be true. How SQL Injection Works […]

Turkish Hacker Defaces Arizona State Representatives and Legislature Sites

A football loving Turkish hacker defaced high-profile US government websites belonging to the State of Arizona, Arizona House of Representatives and Arizona Legislature! A Turkish hacker going by the handle of “aLem!” hacked and defaced the official website of Arizona State, Arizona House of Representatives and Arizona State Legislature just a few hours ago. Hacker replaced the home page of […]