Jump to content

Search the Community

Showing results for tags 'hacking'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

  1. Twitter Hacking for Profit and the LoLs The New York Times last week ran an interview with several young men who claimed to have had direct contact with those involved in last week’s epic hack against Twitter. These individuals said they were only customers of the person who had access to Twitter’s internal employee tools, and were not responsible for the actual intrusion or bitcoin scams that took place that day. But new information suggests that at least two of them operated a service that resold access to Twitter employees for the purposes of modifying or seizing control of prized Tw
  2. Thunderbolt Flaws Expose Millions of PCs to Hands-On Hacking The so-called Thunderspy attack takes less than five minutes to pull off with physical access to a device, and affects any PC manufactured before 2019. New research shows that Intel's Thunderbolt port is vulnerable to so-called evil maid attacks on all but the most recent PCs.Photograph: Oleksiy Maksymenko Photography/Alamy Security paranoiacs have warned for years that any laptop l
  3. Hey guys, I just wanna share something with you to see if someone can help me because I am frustrated. My facebook and instagram account were hacked for the 4th time this month. When it first happened, I created a new hotmail account and linked it with both my facebook and instagram profiles because my original hotmail was also hacked. 2 step verification was enabled for both social media accounts but still didn't protect me. After the second and the third time, I became convinced that someone had access to my phone or laptop so I resetted both of them. After each hack I recover my accounts us
  4. How can I know if a phone has been hacked? How can I demonstrate that a phone can be hacked easily to a relative? So a relative of mine had a misunderstanding that I am a computer engineer and that I know alot about hacking and stuffs like that because they often see me on a computer but I am from commercial, social and spiritual field. Nonetheless, I would like to know some easy as well as detailed methods which can be used to figure out if the phone or my relative uses has been hacked because I know. If possible I would also like to know how to delete or counterspy without lettin
  5. Millions of VPN users at risk of hacking - here's what you need to know After analyzing the top free VPNs available on the Google Play Store, security researchers have discovered that several contain critical vulnerabilities. VPNPro's investigation found that the app SuperVPN Free VPN Client, which has over 100m installs, contains critical vulnerabilities that open users of the app up to man-in-the-middle (MITM) attacks. By exploiting these vulnerabilities, a hacker can easily intercept all of the communications between a user and the VPN provider to f
  6. French Firms Rocked by Kasbah Hacker? A large number of French critical infrastructure firms were hacked as part of an extended malware campaign that appears to have been orchestrated by at least one attacker based in Morocco, KrebsOnSecurity has learned. An individual thought to be involved has earned accolades from the likes of Apple, Dell, and Microsoft for helping to find and fix security vulnerabilities in their products. In 2018, security intelligence firm HYAS discovered a malware network communicating with systems inside of a French national
  7. The accounts of Eamonn Holmes and Louis Theroux were among those hacked An online hacking security agency has “hijacked” multiple Twitter accounts in an effort to make a point regarding online security issues. On Thursday, the message: “This account has been temporarily hijacked by Insinia Security,” appeared on the Twitter accounts of a “number of celebrities” including Eamonn Holmes and Louis Theroux. The tweet also appeared on the Twitter feed of The Independent's travel correspondent Simon Calder. According to a post on Medium by Insinia Security, which explains the h
  8. An Australian teenager has pled guilty to hacking Apple’s system multiple times in a span of several months, but will not be going to jail. He said he did it because he’s just a huge Apple fanboy. Melbourne news outlet the Age reported that Apple had alerted the FBI after the company detected a breach. Then authorities notified the Australian Federal Police, which raided the teen’s home. There agents found 90Gb of sensitive files in a folder titled “hacky hack hack.” A magistrate told the court that the teen (not named for legal reasons) exploited a VPN int
  9. A Romanian Woman Eveline Cismaru. 28, pled guilty to federal charges for illegally gaining access to more than 126 computers that connected to Surveillance cameras installed and used by Metropolitan Police Department (MPD) and infected them with ransomware. She pled guilty before the Honorable Dabney L. Friedrich to one count of conspiracy to commit wire fraud and one count of conspiracy to commit computer fraud, carry statutory maximums of 20 years and five years in prison, Cismaru agrees to cooperate fully in the investigation and she is to be sentenced on Dec. 3, 201
  10. When a government body creates a self-service payment system for paying for everything from utility bills to permits and fines, you would expect convenience to be tied to adequate security for financial data. Not necessarily so in the case of Click2Gov, a payment portal system used by many US cities, both small and large. Developed by Central Square, formerly known as Superion, it was rumored last year that the local government portal service may have been subject to a data breach. In September this year, cybersecurity firm FireEye confirmed that a security incident had ta
  11. Cybercrime comes to school lunches School lunches exec faces felony charges related to the hacking of his rival’s network to expose weak security Every form of crime seems to invade the world of cybersecurity. Sooner or later that had to include the age-old childhood bullying trauma of school lunch theft. Except in this case the pilfered prize was data, not baloney. Keith Wesley Cosbey, CFO of California school lunch provider Choicelunch, was arrested in April on two felony counts — identity theft and unlawful computer access. The San Francisco
  12. Equifax revealed its earnings release related to the security breach suffered in 2017, the incident has cost about $1.4 billion plus legal fees. Equifax revealed this week its earnings release related to the security breach suffered by the credit bureau back in 2017, the incident has cost about $1.4 billion plus legal fees. In 2017 Equifax confirmed it has suffered a massive data breach, cyber criminals stole sensitive personal records of 145 million belonging to US citizens and hundreds of thousands Canada and in the UK. Attackers explo
  13. By replacing a PC's SPI flash chip with one that contains rogue code, an attacker can can gain full, persistent access. Researchers have found a new way to defeat the boot verification process for some Intel-based systems, but the technique can also impact other platforms and can be used to compromise machines in a stealthy and persistent way. Researchers Peter Bosch and Trammell Hudson presented a time-of-check, time-of-use (TOCTOU) attack against the Boot Guard feature of Intel's reference Unified Extensible Firmware Interface (UEFI) implementation
  14. If you are someone who relies on “Windows Defender” on Windows 10 to protect your device from malware threats, you should know about the new version of TrickBot malware that attempts to disable the antivirus software altogether. TrickBot Trojan isn’t exactly new as it surfaces from time to time. The last we heard about TrickBot was a couple of weeks ago when it managed to infect nearly 250 million Gmail accounts with new cookie stealing abilities. For the uninitiated, TrickBot is a trojan that tries to steal bank account information, crypto walle
  15. Members of Congress in both parties are taking some clear if limited steps this week toward protecting the country, and their own campaigns, from hackers out to disrupt the next election. Next to easing access to the polls and otherwise enhancing the right to vote, protecting against the sort of foreign interference that marred the 2016 balloting is top of mind for those who say boosting confidence in the electoral system is essential to restoring democracy. To that end, the Senate unexpectedly passed legislation Wednesday night that would make it a federal crime to hack in
  16. With just a year to go before the 2020 Census, the U.S. government is urgently working to safeguard against hacking and disinformation campaigns as it perfects a plan to count about 330 million people largely online for the first time. Going digital is intended to cut costs. But cybersecurity experts say it may also put the survey at unprecedented risk in a nation embroiled in fallout from Russian interference in the 2016 election. Any outside attempt to discredit or manipulate the decennial survey could drive down response rates, imperiling the integrity of data that
  17. A newly discovered hacking group is targeting energy and telecoms companies There’s a new hacking group on the radar targeting telecommunications and oil and gas companies across Africa and the Middle East. Industrial security company Dragos, which discovered the group, calls it “Hexane,” but remains largely tight lipped on its activities. The security company said Thursday, however, that that the group’s activity has ramped up in recent months amid heightened tensions in the region since the group first emerged a year ago.
  18. Is it allowed under the site terms and conditions to talk about learning and preventing hacking?
  19. The internet and technology have become a way of life for us all. From cars to homes, we depend on technology. While it serves as a relief to us, there are always drawbacks to it. In case of the internet, the risks involves hacking. In the past few months, we have seen cryptocurrency hacks, data hacks, bank hacks, phone hacks, social media hacks and whatnot. Keeping that in mind, researchers have invented a black box chip that makes it difficult for hackers to hack into a system. There was a need to come up with a working solution to prevent hacking, and th
  20. InnoExtractor is a powerful application that helps you to unpack Inno Setup installers. With InnoExtractor you can explore the internal structure and content of the installer and you can to extract them to a local folder or a portable devices, without having to run the setup. Download up-to-date installer (clean / ads free installer edition): http://www.mediafire.com/?1a5z25ioxet5z05 http://www.datafilehost.com/d/76ddda0a Homepage: http://www.havysoft.cl/Screenshot: Features: - Simple and friendly GUI. - Open installers into the application with only drag and drop executables from W
  21. InnoExtractor is a powerful application that helps you to unpack Inno Setup installers. With InnoExtractor you can explore the internal structure and content of the installer and you can to extract them to a local folder or a portable devices, without having to run the setup. Download up-to-date installer (clean / ads free installer edition): http://www.mediafire.com/?1a5z25ioxet5z05 http://www.datafilehost.com/d/3841ea2d Homepage: http://www.havysoft.cl/Screenshot: Features: - Simple and friendly GUI. - Open installers into the application with only drag and drop executables from Win
  22. JenX Botnet Has Grand Theft Auto Hook Researchers at Radware have discovered a new botnet that uses vulnerabilities linked with the Satori botnet and is leveraging the Grand Theft Auto videogame community to infect IoT devices. Satori is a derivative of Mirai, the notorious botnet that in 2016 infamously managed to take down Dyn, a DNS hosting provider that supports some of the world’s largest websites. The vulnerabilities in question are CVE-2014-8361 and CVE-2017-17215, which affect certain Huawei and Realtek routers, Radware researcher Pascal Geenens
  23. ATM makers warn of 'jackpotting' hacks on U.S. machines (Reuters) - Diebold Nixdorf Inc and NCR Corp, two of the world’s largest ATM makers, have warned that cyber criminals are targeting U.S. cash machines with tools that force them to spit out cash in hacking schemes known as “jackpotting.” The two ATM makers did not identify any victims or say how much money had been lost. Jackpotting has been rising worldwide in recent years, though it is unclear how much cash has been stolen because victims and police often do not disclose details. The attacks were repo
  24. InnoExtractor is a powerful application that helps you to unpack Inno Setup installers using InnoUnp technology. With InnoExtractor you can explore the internal structure and content of the installer and you can to extract them to a local folder or a portable devices, without having to run the setup. Download up-to-date installer (clean / ads free installer edition): http://www.mediafire.com/?xgkjwbwdtcis9sh Homepage: http://www.havysoft.cl/Screenshot: Features: - Simple and friendly GUI. - Open installers into the application with only drag and drop executables from Windows Explorer.
  25. InnoExtractor is a powerful application that helps you to unpack Inno Setup installers using InnoUnp technology. With InnoExtractor you can explore the internal structure and content of the installer and you can to extract them to a local folder or a portable devices, without having to run the setup. Download up-to-date installer (clean / ads free installer edition): http://www.mediafire.com/?xgkjwbwdtcis9sh Homepage: http://www.havysoft.cl/ Softpedia site: http://www.softpedia.com/get/Compression-tools/InnoExtractor.shtml Screenshot: Features: - Simple and friendly GUI. - Open instal
×
×
  • Create New...