Posts

Showing posts with the label HACKERS

Message From TalkTalk Hackers

Image
Statement To: Th3 W3b 0f H4r4m ~  We Have adapted To The Security measures Of The Web, We Cannot Be Stopped. We Have Made Our Tracks Untraceable Through Onion Routing,  Encrypted Chat Messages, Private Key Emails, Hacked Servers.  WE Are In The Soviet Russia And Near Place, Your Europe, WE control Asia, We Control AMERICA Here Is Example Info. . To Prove: From password Change log: message,log_timestamp,email_address SSO-CP:Update Submitted,1311343316,cabbiejohn01@tiscali.co.uk SSO-CP:Update Submitted,1311343310,haydnwyatt@tiscali.co.uk SSO-CP:Update Submitted,1311343302,norma.frost@tiscali.co.uk SSO-CP:Update Submitted,1311343301,boothy129@tiscali.co.uk SSO-CP:Update Submitted,1311343296,david.smith54@tiscali.co.uk SSO-CP:Update Submitted,1311343289,dmgatthemadhouse@tiscali.co.uk SSO-CP:Update Submitted,1311343289,catherine_spencer@tiscali.co.uk SSO-CP:Update Submitted,1311343280,lkent01@tiscali.co.uk SSO-CP:Update Submitted,1311343279...

Top 10 hacker tools of 2015

Image
Every task requires a good set of tools. This because having right tools in hand one can save much of its energy and time. In the world of Cyber Hacking (“Cyber Security” formally) there are millions of tools which are available on the Internet either as Freewares or as Sharewares. If you are security researcher, pentester or a system admin, you need to have this on your PCs/laptops to find the vulnerabilities and plug them.  Concise Courses conducted an online poll to determine top ten hacking tools out of some of the famous ones. Here is the list which came out the winner on the poll. 1. Nmap:  Network Mapper Abbreviated as nmap is a versatile tool for Network Security, plus it is free and open source. It  is largely used by network administrators for network discovery and security auditing.  System admins use nmap for network inventory, determining open ports, managing service upgrade schedules,  and monitoring host (A term used for ...

New Android Flaw Lets Hackers Into Your Phone With Just a Text

The best defense against any of your gadgets becoming flooded with malware has always been personal vigilance. “Hmm, this app looks sketchy and is from a third-party app store I’ve never heard of. NOPE!” But a new vulnerability, discovered by security experts at Zimperium, can attack your phone with just a text. According to Zimperium researcher Joshua Drake via NPR, here’s how this scary bit of malicious hacking happens: The bad guy creates a short video, hides the malware inside it and texts it to your number. As soon as it’s received by the phone, Drake says, “it does its initial processing, which triggers the vulnerability. The real culprit here is our endless thirst for convenience and Hangouts, Google’s SMS alternative. Because Hangouts automatically processes video so it’s ready in your gallery, the malicious code enters your phone without you even clicking on the text. So essentially, you receive one malicious text and your smartpho...