Technology - Hacking

Technology news and blogs

Gaining Access the Easy Way

Alibaba had a problem. Over the span of two week in late 2015, over 20 million accounts were compromised from an on-going brute force attack. While a portion of the compromised accounts...

Google drops new Edge zero-day as Microsoft misses 90-day deadline – Naked Security

Google’s Project Zero team has dropped a Microsoft Edge bug for the world to see. Google originally shared details of the flaw with Microsoft on 17 November 2018, but Microsoft wasn’t...

Equifax Hack-Attack interview on the Jewel 106.7FM

Kris Leblanc and I discuss the Equifax hack along with other scams, and what you can do about it.  ... The post Equifax Hack-Attack interview on the Jewel 106.7FM appeared first...

How to enable Envion Token (EVN) on EtherScan/Ethplorer

This article will explain how to make our EVN Tokens enabled on EtherScan as currently they do not show, although for many they do appear in MyEtherWallet but doesn’t appear...

Broadband network plagued by wheezy old cryptomining gadget – Naked Security

Lisa Vaas Lisa has been writing about technology, careers, science and health since 1995. She rose to the lofty heights of Executive Editor for eWEEK, popped out with...

Building a smarter Hacker News

Kamran Mohsin June 6, 2017 Cyber News 350 Views With only 24 hours to build an app, it’s never easy to come up with a viable idea, nevermind build one...

Hack Any Android Over Internet Using Metasploit Part : 1

Today we’ll create metasploit payload embedding into android application and use it over Internet! First we’ve to get the DDNS (Dynamic DNS) address to get the meterpreter session on the internet;...

Hacker erase 1 terabyte of data from spyware developers server

Another day, another data breach – This time it is Retina-X Studios, a well know spyware developing firm.There are different types of hackers, some hack for profit while some hack for...

Leaked Alleged WikiLeaks Chat Reveals GOP Bias

Leaked conversations from a private WikiLeaks chat group reportedly reveal founder Julian Assange as favoring a Republican Party candidate in the last US presidential election. Rumors have been swirling for some...

SonicWall spots Meltdown exploits with machine learning tech

Exploitation of Meltdown and Spectre vulnerabilities is difficult to detect, but one security vendor believes it's found a way to identify and stop potential Meltdown exploits. SonicWall recently unveiled a...

APLICATIONS

For the Governments of the Future : bigdata

For all bigdata gurus everywhere from hedgefunds (quant finance) to biotech (drug discovery) to social media (twitter) to discuss the latest trends, topics,...

HOT NEWS