Surveillance is a profitable business, Motherboard has published a never-before-seen 10-minute video showing a live demo of a surveillance software. Recently, the iPhone hack carried out with the NSO Group‘s Pegasus raised the debate about the use of surveillance software. Who uses them? How? Are we able to defend our machines from a so invasive surveillance? NSO Group is […]
Everyone is a potential victim, even the wannabe hackers that try to exploit Facebook Hacker Tools to hack into friends’ accounts. When dealing with cybercrime everyone, is a potential victim, even the hackers, this is the case of a Crimeware-as-a-Service hack that turns wannabe crooks into victims. For those who are looking to hack the Facebook accounts […]
Every collective has its tactics and tools, Today Iâll present you Anonandmore, a hacker that is very active online. Enjoy the Interview. You are a talented hacker that is very active online, could you tell me more about you. Could you tell me which his your technical background and when you started hacking? I started […]
Cisco disclosed the existence of the CVE-2016-6399 flaw that can be exploited by remote unauthenticated attackers to trigger DoS conditions in ACE products. Experts at Cisco have disclosed the existence of a high-severity vulnerability, tracked as CVE-2016-6399, that can be exploited by remote unauthenticated attackers to trigger DoS conditions in some of Application Control Engine (ACE) […]
Today I have the pleasure to share with you the interview with Francisco Moraga, a popular cyber security expert also known as @BTshell . Enjoy it! You are one of the most respected experts on cyber security. Could you tell me which his your technical background and when you started hacking? My name is Francisco Moraga, […]
Another old and huge data breach was reported to LeakedSource, more than 33 million QIP records from 2011 have been compromised. Once again we are here to discuss a data breach, the victim is the Russian instant messaging service Quiet Internet Pager (QIP.ru.). According to the breach notification service LeakedSource, the leaked dump includes details of […]
The manufacturer USBKill.com has commercialized USB Kill 2.0, a USB dongle that is able to fry any computer through the USB ports. The Hong Kong-based technology manufacturer USBKill.com has created a USB dongle that is able to fry any computer into which it’s plugged by using an electrical discharge. The attack is simple, the USBKill use […]
U.S. authorities have arrested two alleged members of the Crackas With Attitude group involved in dumping details of officials with the FBI and the DHS. The FBI has identified and arrested two men from North Carolina men that are suspected to be members of the notorious ‘Crackas With Attitude‘Â hacker group that dumped details of government […]
President Obama at the recent G-20 Summit held in China declared that the US has âmore capacity than anybody, both offensively and defensively.â Governments recognize the cyberspace as the fifth domain of warfare, in June the NATO alliance communicated during the Warsaw summit that it has officially declared cyberspace a warfare domain and confirmed that a cyber attack […]
Today Iâll present you AnonRising IRC, a very active collective of hacktivist that participated in the major hacking campaigns. Enjoy the interview You and your AnonRising IRC team are talented hackers that have already participated in several hacking campaigns, could you tell me more about you? We have participated in many operations list is below […]