Author: admin

  • Google search in Linux CLI

    Making a google search in Linux via CLI is not a just a geek thing anymore, as Linux gaining popularity among normal people. Googler is a powerful, feature-rich and written in Python. This command line tool lets you access Google and Google Site Search within the Linux terminal. It provides an interface from the command…

  • What are Top 10 Common Hacking Techniques?

    We don’t need to explain why it is important to know what are the commonly used hacking techniques. Below is a list of top Top 10 Common Hacking Techniques. Keylogger Do you know one of the reasons why the online banking sites sometimes gives you the option to use their virtual keyboard? The answer to…

  • Not so “encrypted” cryptocurrency

    Cryptocurrency has been the buzzword recently, with Bitcoin, Etherum, Ripple have all suddenly became the darlings of financial investors. The buzz surrounding the cryptocurrency pointed to the meteoric rise of Bitcoin from valuation of around USD950 in January 2017, to jump nearly 20 times to USD19,200 in December 2017. With huge amount of profits made…

  • HackWareSprint

    HackWareSprint – Hackathon in Singapore on 28-29 Jan 2018! More details coming soon ! For more tutorials, news, and resources on hacking and cybersecurity, visit our blog at DarkbyteGear.com.

  • Uber pays ransom to cover up cyberattack

    Car-transportation application, Uber has fallen victim to a cyber-attack that resulted data breach of around 57 million riders and paid a handsome fee to cover up the incident. According to local media, Uber executives responded to the data breach of 57 million customers’ data by paying USD 100,000 to the two hackers responsible for the…

  • Top 10 Linux Distro for Ethical Hacking and Penetration Testing

    Top 10 Linux Distro for Ethical Hacking and Penetration Testing. If you are pursuing a careers in infosec or working professionally in cyber security, surely you must have a good Linux distro that works best for you. The list below highlights some of the top Linux distros for ethical hacking and pen testing : Kali…

  • Battlefield: Online

    Battlefield: Online. Forget about the troop amassing near North Korea’s border, the real battlefield nowadays is not putting boots on ground but rather gaining initiatives on the cyber world . This week, the team from Hackwarenews, saw some desperate hackings across the globe for various reasons. Be it political-motivated or simply for the roots of…

  • Malaysia sees biggest data breach at 46.2 million mobile information

    Malaysia has become the latest victims of the telecom data breach that threatened to leak around 46.2 million postpaid and prepaid phone subscribers’ information. The alleged data breach is more than the overall population of Malaysia which recorded 32 million people. The breach came to surface after an individual tried to sell the data over…

  • Lessons draw from Start-up Nation

    Singapore is gearing up itself as the next start –up nation. Does this ring a bell in you? Yes, the tiny red dot is following the model of Israel, arguably the world’s best start up nation. As we put Israel into the magnifying glass, the model that Singapore supposes to follow, we discover a whole…

  • Horangi: The Tiger that does not sleep

    Paul Hadjy, co-founder and CEO of Horangi almost finds himself an endangered species in the tiny red dot at plying the rare trade of cyber-security. “It was cool to see some of the other companies doing cyber-security in the region as there are not that many.” said Hadjy, referring to the recent turnout for the…