I write about ethical hacking, cybersecurity and digital privacy.
-
The US military had received a “historic†and “never before†funding of USD716 billion budget in mid-August, sealed with US President, Donald Trump’s signature. The massive military spending might not be the largest in US military history as Trump suggested…
-
Powerful Android Spyware Can Record Almost Anything On Infected Devices
Cybercriminals are turning legitimate apps into intrusive and sophisticated spyware, armed with extensive surveillance capabilities that can capture and record your calls, messages, photos and videos. Security researchers at Bitdefender discovered a threatening malware framework, referred to as “Trioutâ€, on…
-
New RCE Flaw in Apache Struts Could Be Another Equifax in the Making
Hackers are constantly on the lookout for system vulnerabilities that could give them control of important systems; and just recently, a new one just popped up within the Apache Struts open source framework, one that could give hackers complete control…
-
DEALS
root@hackware:~# cd dealslatest For more tutorials, news, and resources on hacking and cybersecurity, visit our blog at DarkbyteGear.com.
-
Dangers of DNS Interception
The Domain Name System is basically the internet’s phone book or yellow pages that translates domain name URLs into their equivalent numeric (IP4) or alphanumeric (IP6) IP Addresses. As far as we know, it has largely been untouched or unexploited…
-
Users Say “Doh sveedahneeyah” to Their Instagram Accounts
It seems that Facebook and election machines aren’t the only things the Russians are busy with. They’re also busy sowing chaos on Instagram as well resulting in thousands of users being forced to say goodbye to their Instagram accounts and…
-
Apple Gets Hacked from Down Under Their Noses–by a Kid
Apple is faced with an embarrassing situation. About 90GB worth of company data was stolen from their servers after a series of hacking attacks, that if left undiscovered could have made the company’s future plans known to the world—or at…
-
WhatsApp vulnerability allows users to easily spread fake news
WhatsApp, the hugely popular Facebook-owner messaging application, has recently come under scrutiny as multiple vulnerabilities have been uncovered. With over 1 billion users and more than 60 billion messages sent every day, security flaws are a serious concern as they…
-
Snapchat Hack – Giant Social Media Platform Source Code Leaked and Posted to GitHub
The source code of the social media giant app Snapchat recently appeared on a repository at GitHub. The parent company Snap Inc filed a takedown request and GitHub complied and removed it . Snapchat Hack – Giant Social Media Platform…
-
Ransomware attack: Alaska town returns to typewriters for a week
What do you when a cyber-attack cripples your computer network? You may just use an old-fashioned solution – typewriters. Ransomware attack: Alaska town returns to typewriters for a week That’s what government workers did in tow municipalities in Alaska last…
Join 900+ subscribers
Stay in the loop with everything you need to know.