Teen student from Japan says that he D-Dosed 444 school websites to make teachers...

A 16 year-old student from Japan DDoSed websites of 444 elementary, junior high, and high schools in the area just to ‘remind teachers they are incompetent.’ The teenager has been arrested on...

Hacking an ADSL router.

Majority of Internet users use average home ADSL router for broadband connection. Despite being the gatekeepers to your network, these ADSL routers can be easily hacked. This is because ADSL routers...

Firefox Add-ons for Security Researchers and Penetration Testers.

1. Foxy Proxy Standard Foxy Proxy is an advanced proxy management add-on for Firefox browser. It improves the built-in proxy capabilities of Firefox. There are few other similar kind of proxy management...

AdBlock Extension has been Sold to an ‘Unknown Buyer’.

Shocking! Adblock Extension that blocks annoying online advertising has been sold... ...And more shocking, the most popular "Adblock Extension", with more than 40 million users, quietly sold their creation to an unknown buyer... 'Michael Gundlach',...

New Botnet Hunts for Linux — Launching 20 DDoS Attacks/Day at 150Gbps.

A network of compromised Linux servers has grown so powerful that it can blow large websites off the Internet by launching crippling Distributed Denial-of-service (DDoS) attacks of over 150 gigabits per second (Gbps). The distributed denial-of-service network,...

Basic of Hacking .

Hacker means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks.Hackers may be...

How Browser Cookies Work ?

  Most Internet users are familiar with the term “Cookie” but only a few know what exactly it is and the purpose it serves. This article will help you understand the working...

What is Threat Intelligence and How It Helps to Identify Security Threats.

Simply put, threat intelligence is knowledge that helps you identify security threats and make informed decisions. Threat intelligence can help you solve the following problems: How do I keep up to...

Nemesis Bootkit — A New Stealthy Payment Card Malware

Another day, another stunning Malware – this time targeting banks, payment card processors, and other financial services. Security researchers have uncovered a sophisticated payment card malware that executes before the operating system boots, making...

Hacker’s Attitude .

1.Think creatively. Now that you've got the basic skills in place, you can start thinking artistically. Hackers are like artists, philosophers, and engineers all rolled up into one. They believe in freedom...

Hacker-Friendly Search Engine that Lists Every Internet-Connected Device.

  Meet an all-new Hacker’s Search Engine similar to Shodan – Censys. At the end of last month, security researchers from SEC Consult found that the lazy manufacturers of home routers and Internet of...
New Tech Targets Enterprise Ransomware.

New Tech Targets Enterprise Ransomware.

SentinelOne last week introduced an addition to its behavioral solution designed to address the problem of ransomware scrambling files on a computer. Ransomware has been a scourge not only for consumers, but for...

Hackers paid $300,000 to halt attacks on Sony PlayStation gaming network.

  It is not at all clear if he meant to show his face, but a hacker working on behalf of the Lizard Squad hacking organization that was responsible for attacking the...

How do I start learning how to hack and where to start?

I agree with Stan Hanks that hackers are born, not made. And they are popularly viewed as a kind of Prestige Class of geek, mysterious and exciting, and as such are the object of many...

This 20-year-old Student Has Written 100 Malware Programs in Two Years

Security firm Trend Micro has identified a 20-year-old Brazilian college student responsible for developing and distributing over 100 Banking Trojans selling each for around US$300. Known online as 'Lordfenix', 'Hacker's Son' and 'Filho de Hacker',...

Simplest Way to Check If Your Emails Are Being Tracked

You might be not aware of the companies that know pretty much everything related to your email activities like when you’ve opened email sent by one of their clients, where you...

Adware android Apps Found in Google Play with Millions of Downloads

With the rise in mobile market, last year we have seen sharp growth in malicious 'adware' — the most prevalent mobile threat in the world. And now, security researchers have once...

Google Bug: Change OAuth Target URL & Domain Description by UI Redress Attack

Bug found by: Sandeep kamble To Change OAuth Target URL & Domain Description Can be achieved using Click jacking Vulnerability. Click Jacking is commonly known as OWASP Top 10 Vulnerability. OAuth is cool and...

Xiaomi Mi4 Smartphone Pre-loaded with malware custom android ROM

  Once again the very popular and the world's third largest smartphone distributor Xiaomi, which had previously been criticized for secretly stealing users information from the device without the user's permissions, has...

Startup Stories

Apple CEO Tim Cook Praises Modi’s Demonetization As A Great Move

Cryptocurrencies saw a sudden rise in the recent times. At present, there are atleast ten popular digital currencies that are ruling the virtual currency...

Inshorts