Hackers Hacked An Offline Laptop In Another Room Easily

In recent times, hackers are aggressively targeting the air-gapped machines, which are considered super-secure. These systems are disconnected from the internet so that a hacker is unable to deploy any attack remotely via internet or any network. researchers from Tel Aviv University and Technion have showcased a way (PDF) to squeeze data from such “safe” air-gapped machines….

The Black Market for iPhone Vulnerabilities

Apple has never acknowledged the black market that exists where hackers are able to use zero-day security vulnerabilities to bypass the iOS protection system. Now, Ivan Krstić, head of security engineering and architecture for Apple revealed during his talk at Apple’s annual conference last week what he thinks about such vulnerabilities. Krstić says that since it is…

iOS Device Ransom Attacks Continue to Target Users

A few years ago, a number of users in Australia were victimized by attackers remotely locking iPhones, iPads, and Macs using Find My iPhone on iCloud. Compromised devices typically displayed Russian ransom messages demanding payments of around $50 to $100 for the device to be unlocked.   At the time, IT security expert Troy Hunt…

Top Famous Hacking Groups Of All Time

Like the animals, hackers also hack their prey in groups. Sometimes these groups become famous for perceived good deeds like hacking ISIS websites done by Anonymous but most of the time these hacker groups operate against the law. Some of the hacker groups have since disbanded after being in public eye. The prime example of…

How To Evade Detection in Kali Linux Using Proxychains

The most important thing about doing penetration testing is anonymity, undetectable, or at least hard to be detected. The worst thing that can happen to any pentesters is being detected by a security admin, the security technologies such as IDS, firewall, etc., or a forensic investigator. We need more additional tools in order to hide…

790,000 private messages from Muslim Match-dating website got hacked

Dating website Muslim Match was hacked by unknown hackers who leaked personal identifiable information of over 150,000 users including their names and email credentials. The hackers also leaked 790,000 private and confidential messages sent by Muslim Match users to one another; Security researcher Troy Hunt broke news of the breach to Motherboard, and posted data from the…

a student shuts down 444 school websites

Teen student from Japan says that he DDoSed 444 school websites to make teachers aware of how incompetent they were A 16 year-old student from Japan DDoSed websites of 444 elementary, junior high, and high schools in the area just to ‘remind teachers they are incompetent.’ The teenager has been arrested on May 11 and…

How To Become An Ethical Hacker In Simple Steps

Hacking is one of the hottest jobs in this decade but don’t take it as an easy job. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but…

Story of The First Facebook Hacker – Chris Putnam

I know you might have stumbled upon the Facebook icon of a certain guy with his face upwards to his right at some point of time in your virtual life dominated by Facebook.  Ever felt the desire to know about the story behind the same and how he is the only person who is having…

Code Your Own Watson AI Bot In 50 Lines Of Code

Bots are the new apps and the bot store is the new app store. Combined with AI, bots are becoming more powerful each day and learning to do new things. In this article, I’ll tell you how to use IBM Watson API to create a Telegram speech-to-text bot in 50 lines of code. Bots are…