Michigan Sports' Facebook Pages Hacked, Overloaded With Butts

Michigan Sports' Facebook Pages Hacked, Overloaded With Butts Fans of the Michigan football and men’s basketball teams hoping to find...

Grams - First Search Engine for Underground Black Markets

Grams - First Search Engine for Underground Black Markets We often talk about Underground communities, illegal websites or black mark...

Tortilla Tool, Anonymize everything through Tor

Tortilla Tool, Anonymize everything through Tor Recent disclosures by whistleblower Edward Snowden claiming that internet traffic ...

The biggest bank robbery in history, Hackers stole $45 million

The biggest bank robbery in history, Hackers stole $45 million They didn't use guns, masks or even threatening notes passed to ba...

Chrome, Firefox, Java, IE10 exploited at Pwn2Own competition

Chrome , Firefox , Java , IE10 EXPLOITED at Pwn2Own competition During the first day of Pwn2Own competition at the CanSecWest con...

Accused UGA Hacker committed suicide

Accused UGA Hacker committed suicide A former University of Georgia (UGA) student under investigation for allegedly hacking into the sc...

Download Nmap 6.25

Nmap 6.25 released with 85 new NSE scripts Download Nmap 6.25 After five months NMAP team release latest version of open source ut...

iPhone Instagram users vulnerable to hackers

iPhone Instagram users vulnerable to hackers  Instagram - Facebook’s popular photo sharing app for iOS, is currently has a vulnerabi...

Anonymous member Barrett Brown Arrested by FBI

Anonymous member Barrett Brown Arrested by FBI Anonymous hacker Barrett Brown was arrested by the FBI last night, his apartment ra...

Electromagnetic Pulse Attacks

Electromagnetic Pulse Attacks : Are we prepared ? An electromagnetic pulse (EMP) attack is a threat few Americans are familiar with...

Google buys Online Malware Scanner VirusTotal

Google buys Online Malware Multi Scanner VirusTotal Google on Friday said it acquired online virus-scanning service, VirusTotal, ...

Air Force openly Seeks Offensive Cyber Weapons

Air Force openly Seeks Offensive Cyber Weapons The Air Force Life Cycle Management Center posted a broad agency announcement recentl...

Trojan steals Linux and Mac Data

Cross Platform Trojan steals Linux and Mac OS X passwords Russian anti-virus company Doctor Web reported about the first cross-platfo...

NetWeirdRC - backdoor targeting Mac

NetWeirdRC -  backdoor tool targeting Mac NetWeirdRC is a commercial backdoor tool targeting Mac OS X 10.6 and later, as well as Windows...

SABU still helping Feds to entrap hackers

LulzSec Leader Sabu Gets 6-Month Sentencing Delay for helping Feds   Today was the day that Hector Xavier Monsegur, a.k.a. Sabu...

Hack and set CARS to Self Destruct

Remote attacks to  Hack and set CARS to Self Destruct Let’s say you’re driving and otherwise minding your own business, when like ...

MatrixDAR - Military Grade Encryption

MatrixDAR - First Military Grade Encryption for Android AuthenTec, a leading provider of mobile and network security, today intr...

Your BRAIN can be HACKED

Sensitive data in human brain successfully extract by Hackers It is now possible to hack the human brain ? YES ! This was explaine...

iPhone Bug Allows SMS Spoofing

Serious Security Flaw : iPhone Bug Allows SMS Spoofing iPhone  Hack A rather serious security flaw in the iPhone’s SMS messaging s...

Bafruz trojan Removal Tool

Bafruz trojan vs Microsoft : Malicious Software Removal Tool Updated There's a new family of malware that's using a comple...

index