This Hack Tracks Calls and Location Of Every Mobile Phone

This tool uses SS7 Flaw to let you spy on mobile phone calls, messages and user location The latest news only confirms the theory that Israeli firms are creating a position in the spying and surveillance industry with their ground-breaking and wide-ranging products. The latest news only confirms the theory that Israel is going places…

KickassTorrents is now back online

Just a few days ago, popular torrent site KickassTorrents (KAT) was shut down after alleged owner was arrested. It didn’t take long for the website to resurface as other online pirates rushed in to fill the void. A second mirror called KAT.am offers a better copy of the original site. Its anonymous creators said that…

Top Famous Hacking Groups Of All Time

Like the animals, hackers also hack their prey in groups. Sometimes these groups become famous for perceived good deeds like hacking ISIS websites done by Anonymous but most of the time these hacker groups operate against the law. Some of the hacker groups have since disbanded after being in public eye. The prime example of…

How To Evade Detection in Kali Linux Using Proxychains

The most important thing about doing penetration testing is anonymity, undetectable, or at least hard to be detected. The worst thing that can happen to any pentesters is being detected by a security admin, the security technologies such as IDS, firewall, etc., or a forensic investigator. We need more additional tools in order to hide…

Millions of Android Devices Have Flawed

A security researcher was able to easily nullify Android’s full disk encryption that is utilized by millions of devices. According to Techspot, the implementation of full disk encryption on Google’s Android mobile operating system has been an important step forward in terms of security and personal privacy. However, the security measure is not fail proof, as…

790,000 private messages from Muslim Match-dating website got hacked

Dating website Muslim Match was hacked by unknown hackers who leaked personal identifiable information of over 150,000 users including their names and email credentials. The hackers also leaked 790,000 private and confidential messages sent by Muslim Match users to one another; Security researcher Troy Hunt broke news of the breach to Motherboard, and posted data from the…

a student shuts down 444 school websites

Teen student from Japan says that he DDoSed 444 school websites to make teachers aware of how incompetent they were A 16 year-old student from Japan DDoSed websites of 444 elementary, junior high, and high schools in the area just to ‘remind teachers they are incompetent.’ The teenager has been arrested on May 11 and…

How To Become An Ethical Hacker In Simple Steps

Hacking is one of the hottest jobs in this decade but don’t take it as an easy job. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but…

Video: Hacking your neighbours ADSL router is easier than you think

Watch: Hacking an ADSL router is this easy Majority of Internet users use average home ADSL router for broadband connection. Despite being the gatekeepers to your network, these ADSL routers can be easily hacked. This is because ADSL routers are low-cost consumer devices manufactured on the assembly lines somewhere in China without much of security investment…

How to Setup and run Kali-Linux on any Android Smartphone

Kali Linux is one the best love operating system of white hat hackers, security researchers and pentesters. It offers advanced penetration testing tool and its ease of use means that it should be a part of every security professional’s toolbox. Penetration testing involves using a variety of tools and techniques to test the limits of…

Here are the world’s top 10 Female Hackers

Meet the world’s Top 10 Female Hackers It is very surprising to know that a handful of women were bold enough to step into the world of hacking and make their presence felt – a field where the art of writing computer code and manipulating computer hardware is always considered to be traditionally dominated by…