Category: ethical hacking
-
Trump up the US Cyber Arsenal
The US military had received a “historic†and “never before†funding of USD716 billion budget in mid-August, sealed with US President, Donald Trump’s signature. The massive military spending might not be the largest in US military history as Trump suggested as US Congress had approved larger funds during the peak of the wars in Iraq…
-
Powerful Android Spyware Can Record Almost Anything On Infected Devices
Cybercriminals are turning legitimate apps into intrusive and sophisticated spyware, armed with extensive surveillance capabilities that can capture and record your calls, messages, photos and videos. Security researchers at Bitdefender discovered a threatening malware framework, referred to as “Trioutâ€, on the Android platform. It has the power to spy on, monitor and record infected devices…
-
New RCE Flaw in Apache Struts Could Be Another Equifax in the Making
Hackers are constantly on the lookout for system vulnerabilities that could give them control of important systems; and just recently, a new one just popped up within the Apache Struts open source framework, one that could give hackers complete control of a system that could lead to an Equifax-level security breach . RCE or Remote…
-
DEALS
root@hackware:~# cd dealslatest For more tutorials, news, and resources on hacking and cybersecurity, visit our blog at DarkbyteGear.com.
-
Dangers of DNS Interception
The Domain Name System is basically the internet’s phone book or yellow pages that translates domain name URLs into their equivalent numeric (IP4) or alphanumeric (IP6) IP Addresses. As far as we know, it has largely been untouched or unexploited by hackers until recently, or the practice has not been put to light by media…
-
Users Say “Doh sveedahneeyah” to Their Instagram Accounts
It seems that Facebook and election machines aren’t the only things the Russians are busy with. They’re also busy sowing chaos on Instagram as well resulting in thousands of users being forced to say goodbye to their Instagram accounts and their hundreds of respective followers. For some unknown reason, these Instagram accounts are being hijacked…
-
Apple Gets Hacked from Down Under Their Noses–by a Kid
Apple is faced with an embarrassing situation. About 90GB worth of company data was stolen from their servers after a series of hacking attacks, that if left undiscovered could have made the company’s future plans known to the world—or at least to some people. Strange that major tech sites haven’t picked up on this much…
-
WhatsApp vulnerability allows users to easily spread fake news
WhatsApp, the hugely popular Facebook-owner messaging application, has recently come under scrutiny as multiple vulnerabilities have been uncovered. With over 1 billion users and more than 60 billion messages sent every day, security flaws are a serious concern as they have the potential to have far-reaching impacts across the world. Researchers at Israeli security company…
-
Snapchat Hack – Giant Social Media Platform Source Code Leaked and Posted to GitHub
The source code of the social media giant app Snapchat recently appeared on a repository at GitHub. The parent company Snap Inc filed a takedown request and GitHub complied and removed it . Snapchat Hack – Giant Social Media Platform Source Code Leaked and Posted to GitHub Snapchat Hack – Giant Social Media Platform Source…
-
Ransomware attack: Alaska town returns to typewriters for a week
What do you when a cyber-attack cripples your computer network? You may just use an old-fashioned solution – typewriters. Ransomware attack: Alaska town returns to typewriters for a week That’s what government workers did in tow municipalities in Alaska last week on 24 July 2018. “Without computers and files, Borough employees acted resourcefully. They re-enlisted…