Archive for the ‘Hacking’ Category

Chinese spies stole NSA hacking tools, report finds

In the report, the cybersecurity company Symantec claims that a Chinese hacker group associated with Chinese government intelligence conducted a hacking campaign using a tool that at the time was only known to be the property of the NSA. Source: Chinese spies stole NSA hacking tools, report finds Enter your email address: Delivered by FeedBurner

Leave a Comment

From phish to network compromise in two hours: How Carbanak operates

Cybercriminal group Carbanak has stolen hundreds of millions of dollars from financial institutions. Here’s a detailed analysis by Bitdefender of an attack on one bank. Source: From phish to network compromise in two hours: How Carbanak operates

Leave a Comment

Flipboard says hackers stole user details | ZDNet

Extent of the hack is unknown, but Flipboard said hackers had access to its systems for almost nine months. Source: Flipboard says hackers stole user details | ZDNet Flipboard confirms database hack, resets all user passwords InfoSec Breaches  Subscribe in a reader

Leave a Comment

Hacking the ‘Unhackable’ eyeDisk USB stick with Wireshark

The paradox, the USB stick eyeDisk that uses iris recognition to unlock the drive could reveal the device’s password in plain text in a simple way. Source: Hacking the ‘Unhackable’ eyeDisk USB stick with Wireshark  Subscribe in a reader

Leave a Comment

Python Cheat Sheets

Beginner’s Python Cheat Sheet Python Crash Course – Cheat Sheets

Leave a Comment

Hacking with BeEf – Stealing Social Media Credentials

BeEF [Browser Exploitation Framework] is a penetration testing tool which focuses strongly on the web browsers. BeEF passes the hardened network perimeters. Source: Hacking with BeEf – Stealing Social Media Credentials Enter your email address: Delivered by FeedBurner

Leave a Comment

Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault*

RV110W, RV130W, RV215W need patching to close remote hijacking bug Source: Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault* Enter your email address: Delivered by FeedBurner

Leave a Comment

Thunderclap flaws allow hacking most of modern computers

Researchers found a new set of flaws that can be exploited via Thunderbolt to compromise a broad range of modern computers with Thunderclap attacks Source: Thunderclap flaws allow hacking most of modern computers

Leave a Comment

Senators want Huawei equipment removed from US power grid because of security concerns

Huawei may well be causing excitement with its foldable smartphone, the Mate X, but the company’s troubles in the US continue. The American government has already banned the use of some Huawe… Source: Senators want Huawei equipment removed from US power grid because of security concerns

Leave a Comment

Beef : The Browser Exploitation Framework Project

BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.Amid growing concerns about web-borne Source: Beef : The Browser Exploitation Framework Project

Leave a Comment

Vulnerability In Xiaomi Electric Scooters Could Allow Remote Attacks

A researcher has discovered a serious vulnerability in Xiaomi electric scooters. Exploiting the flaw could allow remote attacks on it causing sudden breaks. Source: Vulnerability In Xiaomi Electric Scooters Could Allow Remote Attacks IoT Security DISC InfoSec 🔒 securing the business 🔒 Cyber Security Awareness ↑ Grab this Headline Animator

Leave a Comment

Are Hackers Winning The Denial Of Service Wars?

DDoS attacks may not be the quickest route to profitability for bad actors, but given the importance of this attack technique to nation-state cyberwar adversaries, we can expect continued innovation on the part of the hackers. Enterprises cannot afford to relax their efforts to combat such attacks. Source: Are Hackers Winning The Denial Of Service […]

Leave a Comment

Blue Monday in infosec: 620 million accounts across 16 hacked websites now for sale on dark web, seller boasts

Dubsmash, Armor Games, 500px, Whitepages, ShareThis, and more said to be up for grabs for $$$s in BTC Source: Blue Monday in infosec: 620 million accounts across 16 hacked websites now for sale on dark web, seller boasts DISC InfoSec 🔒 securing the business 🔒 Cyber Security Awareness ↑ Grab this Headline Animator

Leave a Comment

Metro Bank is the first bank that disclosed SS7 attacks

Metro Bank has become the first major bank to disclose SS7 attacks against its customers, but experts believe it isn’t an isolated case. Source: Metro Bank is the first bank that disclosed SS7 attacks DISC InfoSec 🔒 securing the business 🔒 Mobile network hacking ↑ Grab this Headline Animator

Leave a Comment

Bolt : Cross-Site Request Forgery Scanner Tool 2019

Bolt is in beta phase of development which means there can be bugs. Any production use of this tool discouraged. Bolt crawls the target website Source: Bolt : Cross-Site Request Forgery Scanner Tool 2019 DISC InfoSec 🔒 securing the business 🔒 Cyber Security Awareness ↑ Grab this Headline Animator

Leave a Comment

Check now to see if your webcam is being hacked

If you are using a laptop, chances are you have a… Source: Check now to see if your webcam is being hacked DISC InfoSec 🔒 securing the business 🔒 Cyber Security Awareness ↑ Grab this Headline Animator

Leave a Comment

Top 10 Open Source Web Testing Tools

by Arif Majeed Web Testing tools are used to find/identify bugs or errors in a website before it was launched officially for the public on the web. You can find many such tools on the web now a days some are also free.  Here is the list of the finest web testing tools available in […]

Leave a Comment

Have you heard about the Pwn Phone 2014?

by Jamie Titchener If you have to undertake vulnerability scans or penetration tests at remote sites as part of your day-to-day activities, having to lug around a laptop and other scanning and penetration testing kit can be a real pain. Having the right tools for the job is crucial. But how can you ensure you […]

Leave a Comment

8 Best Books That Every Budding #Hacker Must Read

Everyone knows that a hacker by extension is always a programmer. What many don’t know though is that there is a lot more to it. It’s not just about knowing the language. A hacking is mainly defined by his curiosity to know what is otherwise not to be known. While the following books are on a […]

Leave a Comment