hacking

125 Articles 0 Followers


Exploit kits: what they are and how to defend yourself

6 Jan 2020 1 minute read 1 comment Ilcarp

Let's start by explaining what exploits are. An exploit is any type of script or virus that exploits vulnerabilities to create unexpected behaviors in a software, and through appropriate commands, make it perform actions not originally foreseen.All t...

Digital Retaliation of Iran – Top 6 Likely Cyberattacks

5 Jan 2020 3 minute read 1 comment Matthew Rosenquist

The United States and allies' national cyber response may soon be tested with the latest escalating conflict in the middle east. The U.S. conducted an airstrike that killed a revered Iranian general while in Iraq. This was in retaliation to a number...

STOLEN CRYPTOCURRENCIES ARE STILL CHANGING HANDS.

15 Dec 2019 1 minute read 0 comments Slowmen

  STOLEN CRYPTOCURRENCIES ARE STILL CHANGING HANDS.   The hacker, who recently stole 342,000 Ethereum (ETH) from the South Korea-based cryptocurrency exchange Upbit, is moving funds quickly. Ethereum (ETH) funds are being transferred to decentralize...

Hackers Scan Massive Docker Instances to Mine Crypto

27 Nov 2019 1 minute read 0 comments Matthew Rosenquist

Hackers are at it again, looking for vulnerable Docker instances so they can selfishly mine Monero.  Over the weekend, according to cybersecurity researchers at Bad Packets, what is believed to be a concerted effort to scan for known vulnerabilities...

How Did He Steal $ 5 Million Worth Of Cryptocurrencies? The 20-year-old computer hacker revealed his confidential information.

19 Nov 2019 1 minute read 0 comments Slowmen

  How Did He Steal $ 5 Million Worth Of Cryptocurrencies? The 20-year-old computer hacker revealed his confidential information. This event, which was directed to the users of a few stock exchanges, soon led us to question How safe the stock exchang...

(IJCH) After one week, I unbricked & restored my girlfriend's smartphone! (or How I learned how to hack into Android phones)

16 Nov 2019 3 minute read 0 comments JaiChai

Source IJCH - Inside JaiChai's Head (Meaning: My Warped, Personal Opinions and Musings) Source From the Author: Salutations. I am JaiChai. And if I haven't had the pleasure of meeting you before, I'm delighted to make your acquaintance now. Source I...

North Korea Laundered Money Using a Blockchain Company!

7 Nov 2019 1 minute read 0 comments alberdioni8406

The Government of North Korea has been accused to Laundry money using a crypto Firm located in Hong-Kong and,of course The Kim Il Sung Nation denied all. It's now new that Pyong-Yang Government is involved in multiple hacking all over the world and u...

Government Panic Button for Internet Isolation

1 Nov 2019 1 minute read 0 comments Matthew Rosenquist

Russia moves forward with the recently approved “Sovereign Internet” law that will enable the government to disconnect the nation’s networks from the main Internet in times of a security emergency.  In theory, Russia would be able to operate indepen...

Major Drone Attack Against Global Oil Production Showcases Weak Cybersecurity Thinking

20 Sep 2019 4 minute read 3 comments Matthew Rosenquist

Drones attacked an oil processing facility last week and shut down half of all Saudi capacity, representing about 5% of the world's daily oil production.  We have seen how a botnet of compromised home appliances can take down a sizeable chunk of the...

Use Brave Browser To Access Password Or App-locker Protected Files In SDcard.

13 Sep 2019 1 minute read 0 comments Nightmare

Hello Publishers, Good day to all. Now a days almost all of us secure there private files in smart phone via app locker app.    Today I am going to share a trick to access protected files via Brave browser. You can use another browser but I recommen...