This $88 Device Lets You Hack And Modify Your Car’s System

Famous hacker George Hotz put his first car product on the market on Friday, a few months after the National Highway Traffic Safety Administration prevented him from selling a self-driving roof kit. Called Panda, the device sells for $88 and can plug into a vehicle’s OBDII port to access data typically only available to vehicle…

Cloudbleed Is the Latest Internet Problem and It Gets Worse

Huge security disasters like Cloudbleed are never fun. However, as more information about the newly reported vulnerability becomes available, we can understand how dangerous bugs stand to screw up the internet. Luckily, in the case of Cloudbleed, it’s not as bad as it could have been. But it’s not good, either. Cloudbleed, if you hadn’t…

How to steal cookies using XSS

What is XSS? XSS is a way of inserting the malicious javascript code in your page in the form of the input therfore every time the page loads the script gets loaded in the webpage, since that the new code got inserted in the website, XSS is a short for “cross site scripting”. Today’s tutorial…

Hackers Hacked An Offline Laptop In Another Room Easily

In recent times, hackers are aggressively targeting the air-gapped machines, which are considered super-secure. These systems are disconnected from the internet so that a hacker is unable to deploy any attack remotely via internet or any network. researchers from Tel Aviv University and Technion have showcased a way (PDF) to squeeze data from such “safe” air-gapped machines….

iOS Device Ransom Attacks Continue to Target Users

A few years ago, a number of users in Australia were victimized by attackers remotely locking iPhones, iPads, and Macs using Find My iPhone on iCloud. Compromised devices typically displayed Russian ransom messages demanding payments of around $50 to $100 for the device to be unlocked.   At the time, IT security expert Troy Hunt…

Top Famous Hacking Groups Of All Time

Like the animals, hackers also hack their prey in groups. Sometimes these groups become famous for perceived good deeds like hacking ISIS websites done by Anonymous but most of the time these hacker groups operate against the law. Some of the hacker groups have since disbanded after being in public eye. The prime example of…

790,000 private messages from Muslim Match-dating website got hacked

Dating website Muslim Match was hacked by unknown hackers who leaked personal identifiable information of over 150,000 users including their names and email credentials. The hackers also leaked 790,000 private and confidential messages sent by Muslim Match users to one another; Security researcher Troy Hunt broke news of the breach to Motherboard, and posted data from the…

Story of The First Facebook Hacker – Chris Putnam

I know you might have stumbled upon the Facebook icon of a certain guy with his face upwards to his right at some point of time in your virtual life dominated by Facebook.  Ever felt the desire to know about the story behind the same and how he is the only person who is having…

Here are the world’s top 10 Female Hackers

Meet the world’s Top 10 Female Hackers It is very surprising to know that a handful of women were bold enough to step into the world of hacking and make their presence felt – a field where the art of writing computer code and manipulating computer hardware is always considered to be traditionally dominated by…