Hacking & Cracking

  • Photo of CyberSecurity for the Next Generation in 2014 Held Again

    Bring together young researchers, a leading IT security experts and professors from universities around the world in a collaborative environment, fun and creative to discuss the hottest issues on the cyber security held back. Kaspersky Lab has just announced the resumption of the annual competition for students, “CyberSecurity for the Next Generation” for the new academic year. In 2014, the conference “CyberSecurity” consists of four rounds and one regional global…

    Read More »
  • Photo of Four Types of Scam and Spam to Avoid on Facebook

    With more than 800 million registered accounts and 400 million user visits each day, Facebook continues to lead the race dominance of social networking with unique and innovative products and intelligent marketing strategies that lead to user without stopping to press the ‘like’ and post status updates whole day. Facebook is not only a major media to share ideas and interact with friends, but the place is a booming attack…

    Read More »
  • Photo of How to Secure Online Transactions? Tips for Securing and Vulnerabilities

    Can not be denied, the number of users online transactions each year continues to increase. Harris Interactive survey conducted in February-March 2012 said there was 57 percent of Internet users who manage bank accounts online and make online shopping. Of these, about 31 percent admitted they store data banking on the hard drive. Therefore not surprising that banking information is very tempting targets for cybercriminals. The target was none other…

    Read More »
  • Photo of Break Up to 450 Million Passwords per Second with Extreme GPU Bruteforcer

    Extreme GPU Bruteforcer, developed by InsidePro is a program meant for the recovery of passwords from hashes of different types, utilizing the power of GPU which enables reaching truly extreme attack speed of approx 450 Million passwords/Second. The software supports hashes of the following types: MySQL, DES, MD4, MD5, MD5(Unix), MD5(phpBB3), MD5(WordPress), NTLM, Domain Cached Credentials, SHA-1, SHA-256, SHA-384, SHA-512, and many others. The software implements several unique attacks, including…

    Read More »
  • Photo of Duqu Trojan Use an Unknown Programming Language

    Sometime later, Duqu Trojan increasingly popular as a dangerous malware targeting intelligence. Duqu was first discovered in September 2011. However, according to Kaspersky Lab, the Duqu trace has been tracked since August 2007. Kaspersky Lab found that Duqu Trojan written in a programming language that is not known. Duqu a sophisticated Trojan that was created by the same people who make Stuxnet. This malware has a goal as a system…

    Read More »
  • Photo of Over Weekend, GitHub hacked with Ruby on Rails public key vulnerability

    Github, the service that many professional programmers use to store their work and collaborate on coding, was hacked over the weekend. A young Russian developer Egor Homakov exploited a gaping vulnerability in GitHub that allowed him (or anyone else with basic hacker know-how) to gain administrator access to projects such as Ruby on Rails, Linux, and millions of others. When Github saw what happened, they suspended Homakov’s account, which created…

    Read More »
  • Photo of From Sony, Michael Jackson’s entire back catalog stolen by Hackers

    Entertainment giant Sony has confirmed that hackers accessed its systems and compromised Michael Jackson’s entire back catalog, including many unreleased songs. Michael Jackson’s entire back catalog has been stolen by Internet hackers. Sony music suffered its second major security breach in a year, with thieves targeting songs and unreleased material by the superstar singer. It’s alleged they downloaded more than 50,000 music files worth $253 million in the biggest ever…

    Read More »
  • Photo of Total $60000 Prize for Exploiting Google Chrome, Hackers at Pwnium work

    Google has offered prizes, totaling $1 million, to those who successfully hack the Google Chrome browser at the Pwn2Own hacker contest taking place next week i.e 7 March 2012. Chrome is the only browser in the contest’s six-year history to not be exploited at all. Therefore Google will hand out prizes of $60,000, $40,000, and $20,000 for contestants able to remotely commandeer a fully-patched browser running on Windows 7. Finding…

    Read More »
  • Photo of Russian Hackers Stealing Money American Citizen, Around U$3,2 Million

    More recently, after a weekend that everyone thinks to get ready back activity, Trend Micro, the security company of mobile and cloud in the world, had just discovered the activities from a gang cyber hackers from Russia by using SpyEye-Zeus Trojan to steal the money from U.S. citizens since January 2011 around U$ 3.2 million or approximately U$ 17,000 per day. During the six periods since January 2011, Trend Micro…

    Read More »
  • Photo of WordPress Security that You Must to Know

    WordPress is the undisputed CMS with the most widely used, both for the benefit of organizations and individuals. Along with its popularity, more and more also are trying to find the weaknesses of this engine, like a tree higher then the wind will grow louder. The following tips to increase the security that must be known by you who use WordPress as a Content Management System or platform that is…

    Read More »
Back to top button