How Your Computer Monitor Could Be Hacked To Spy On You.

  Just stop believing everything you see on your screen, as it turns out that even your computer monitor can be hacked. You have seen hackers targeting your computer, smartphone, and tablet, but...

Data Breach — Oracle’s Micros Payment Systems Hacked.

  The risks associated with data breaches continue to grow, impacting a variety of industries, tech firms, and social networking platforms. In the past few months, over 1 Billion credentials were dumped...

Torrentz.eu Shuts Down Forever! End of Biggest Torrent Search Engine.

Over two weeks after the shutdown of Kickass Torrents and arrest of its admin in Poland, the world's biggest BitTorrent meta-search engine Torrentz.eu has apparently shut down its operation. The surprise shutdown...

Bitcoin Price Drops 20% After $72 Million in Bitcoin Stolen from Bitfinex Exchange.

Yet another blow to Bitcoin: One of the world's most popular exchanges of the cryptocurrency has suffered a major hack, leading to a loss of around $72 Million worth of Bitcoins. Hong...

Beware! Advertisers Are Tracking You via Phone’s Battery Status.

Is my smartphone battery leaking details about me? Unfortunately, YES! Forget about supercookies, apps, and malware; your smartphone battery status is enough to monitor your online activity, according to a new report. In 2015,...

Pokémon GO Creator’s Twitter Account Hacked.

Twitter account of another high-profile CEO has been hacked! This time, it's Niantic CEO John Hanke, the developer behind the world's most popular game Pokémon GO. And it seems like Hanke is so...

Core Tor Contributor Leaves Project; Shutting Down Important Tor Nodes.

  Another blow to the Tor Project: One of the Tor Project's earliest contributors has decided to quit the project and shut down all of the important Tor nodes under his administration. Lucky...

Teen student from Japan says that he D-Dosed 444 school websites to make teachers...

A 16 year-old student from Japan DDoSed websites of 444 elementary, junior high, and high schools in the area just to ‘remind teachers they are incompetent.’ The teenager has been arrested on...

Hacking an ADSL router.

Majority of Internet users use average home ADSL router for broadband connection. Despite being the gatekeepers to your network, these ADSL routers can be easily hacked. This is because ADSL routers...

Firefox Add-ons for Security Researchers and Penetration Testers.

1. Foxy Proxy Standard Foxy Proxy is an advanced proxy management add-on for Firefox browser. It improves the built-in proxy capabilities of Firefox. There are few other similar kind of proxy management...

AdBlock Extension has been Sold to an ‘Unknown Buyer’.

Shocking! Adblock Extension that blocks annoying online advertising has been sold... ...And more shocking, the most popular "Adblock Extension", with more than 40 million users, quietly sold their creation to an unknown buyer... 'Michael Gundlach',...

Basic of Hacking .

Hacker means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks.Hackers may be...

How Browser Cookies Work ?

  Most Internet users are familiar with the term “Cookie” but only a few know what exactly it is and the purpose it serves. This article will help you understand the working...

What is Threat Intelligence and How It Helps to Identify Security Threats.

Simply put, threat intelligence is knowledge that helps you identify security threats and make informed decisions. Threat intelligence can help you solve the following problems: How do I keep up to...

Hacker’s Attitude .

1.Think creatively. Now that you've got the basic skills in place, you can start thinking artistically. Hackers are like artists, philosophers, and engineers all rolled up into one. They believe in freedom...

Hacker-Friendly Search Engine that Lists Every Internet-Connected Device.

  Meet an all-new Hacker’s Search Engine similar to Shodan – Censys. At the end of last month, security researchers from SEC Consult found that the lazy manufacturers of home routers and Internet of...

Hackers paid $300,000 to halt attacks on Sony PlayStation gaming network.

  It is not at all clear if he meant to show his face, but a hacker working on behalf of the Lizard Squad hacking organization that was responsible for attacking the...

How do I start learning how to hack and where to start?

I agree with Stan Hanks that hackers are born, not made. And they are popularly viewed as a kind of Prestige Class of geek, mysterious and exciting, and as such are the object of many...

Google Bug: Change OAuth Target URL & Domain Description by UI Redress Attack

Bug found by: Sandeep kamble To Change OAuth Target URL & Domain Description Can be achieved using Click jacking Vulnerability. Click Jacking is commonly known as OWASP Top 10 Vulnerability. OAuth is cool and...

Startup Stories

Toppr Raises Rs. 45 Crores In Series B Funding Round

Amazon.com, the global ecommerce giant, is investing another $306 million in its Indian arm Amazon Seller Services Pvt., Ltd., as a continuation of its...

Inshorts