Jump to content

Search the Community

Showing results for tags 'Hackers'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Categories

  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 13 results

  1. Hackers from Cyber Berkut group are claiming to hack and leak personal emails belonging to Colonel V.M. Pushenko. of the Ukrainian Ministry of Defense. In an email one of the representative from Cyber Berkut claimed that the leaked emails contain confidential conversation between officials about ongoing conflict between Ukraine and Russia. The content of email conversation is available below: The claimed leaked emails are available here in Russian language. This is not the first time when hackers have a high profile leak. In February 13, 2014 Anonymous hackers claimed to hack and leak secre
  2. Police have arrested around 100 people in global raids against notorious malware being sold complete with "ransom notes" to extort money after taking control of computers. "During the course of a worldwide investigation, creators, sellers and users ofBlackShades malware were targeted by judicial and law enforcement authorities in 16 different countries," Europe-wide police and justice bodies Europol and Eurojust said in a statement. Thousands of people around the world have bought BlackShades RAT (Remote Access Tools) malicious software or malware, which can be used to secretly take control of
  3. Year back, one of the largest “Advanced Persistent Threat” (APT) hacking groups received widespread attention from the media and from the U.S. government. APT Groups are China’s cyber espionage units and they won’t stop their espionage operation, despite being exposed last year. Yes, APT hacking groups, APT1 and APT12, are again making headlines. Without bothering that the world knows about its cyber hacking activities, the two of its major hacking groups have became once again active and have resumed their espionage operation, reports the security firm Mandiant. A timeline of APT1 economic es
  4. Two engineers from Netflix this week released to open source a security tool that detects attacks against web applications—and also reacts to those attacks with responses they hope will flummox a hacker to the point that he moves on to his next target. The utility is called Ensnare and is available on Github. It is a Ruby on Rails gem plug-in and once added to a Web application, it will add steps to requests browsers make to a web application server that will quickly detect attacks, characterize them, and send responses back to the browser that range from error messages, to security alerts, t
  5. Hackers are targeting Word and Excel users with a sophisticated new data-siphoning malware that hides its movements using the Tor network, according to security firm Trend Micro. Trend Micro threat response engineer Alvin John Nieto reported the campaign in a blog post. "Malware targeting Word and Excel files has been around for some time, but we recently encountered a new malware family Crigent (also known as ‘Power Worm'), which brings several new techniques to the table," he said. "This particular threat arrives as an infected Word or Excel document, which may be dropped by other malware, o
  6. When it comes to Information Security, there's a great way to learn, train and keep sharp your skills. This can be done using gamification mechanics to speed up the learning curve and improve retention rate. Capture The Flag competitions use gamification mechanics and represent one of the best ways to learn security hands on. The Infosec team behind Capture The Flag platform CTF365 has created a place for hackers to play weekend CTFs with great prizes, called Hacker's Dome. In order to access the Hacker's Dome, you need is a registered and confirmed CTF365 account. At Hacker's Dome CTF Platf
  7. Hackers could take control of Philips ‘smart TVs’ and broadcast their own ‘shows’ to watching famlies, thanks to a ‘fixed’ password which allows nearby attackers easy access to the set’s Wi-Fi adapter. A hacker within Wi-Fi range of any 2013 Philips Smart TV can replace the image on screen with video or images of his choosing (useful, for instance, for phishing attacks, by creating a bogus login screen), and can read files on USB devices attached to the set. Researchers ReVuln demonstrated the attack in a video, showing how private data such as browser cookies for sites used by the set’s owner
  8. Hackers are threatening to publish more than 600,000 Domino's customers' details online, if the company does not pay €30,000 by the end of Monday. Hacking group Rex Mundi posted the demand on Twitter over the weekend, with a Pastebin link showing a snippet of the data claimed to have been stolen. At the time of publishing the link had been taken offline. The data was reportedly stolen from the French and Belgian Domino's websites and includes customers' names, phone numbers, email and street addresses, and passwords. We hacked the websites of @dominos_pizzafr & Domino's Belgium, and downlo
  9. Last year Edward Snowden leaked the NSA's Advanced Network Technology catalog, a listing of the hardware and software tools the agency makes available to agents for spying. Now enterprising security experts are using the catalog to build similar tools using available electronics. The team, led by Michael Ossmann of Great Scott Gadgets, examined the leaked catalog and found that a number of the devices the NSA developed can be very simple to recreate. Ossmann was able to build a software-defined radio (SDR) system capable of recording and transmitting data from a target PC using a Kickstarter p
  10. Iranian threat actors, using more than a dozen fake personas on popular social networking sites, have been running a wide-spanning cyber espionage operation since 2011, according to cyber intelligence firm iSIGHT Partners. The recently uncovered activity, which iSIGHT Partners calls NEWSCASTER, was a “brazen, complex multi-year cyber-espionage that used a low-tech approach to avoid traditional security defenses­–exploiting social media and people who are often the ‘weakest link’ in the security chain.” Using the fake personas, including at least two (falsified) legitimate identities from lead
  11. During the past 24 hours a brand new Pirate Bay blockade was put in place in Argentina following a complaint from the IFPI-affiliated music industry group CAPIF. Now, just hours later, the tables have been turned after hackers transformed CAPIF's website into a fully functioning and blockade-circumventing Pirate Bay proxy. There was a time when music and movie industry aggression against The Pirate Bay was met with aggression right back, with sites belonging to the MPAA, RIAA, IFPI and others targeted in retaliatory moves. In recent times, however, that kind of reaction has largely been on
  12. Criminals plan to release a fresh wave of advanced cyber attack campaigns using the anonymising Tor network, according to Kaspersky Lab. Kaspersky Lab senior security researcher Sergey Lozhkin issued the warning during a webinar attended by V3, citing the recently discovered ChewBacca and evolved Zeus Tor malware as proof of their claim. "The Tor network started small but lots of hackers and cyber criminals have discovered the benefits of storing their communities and malware there. We've seen malware developers creating malware that communicates with the Tor network and passes its comman
  13. Security firm FireEye has uncovered a new evolved version of the notorious WinSpy remote administration tool (RAT), capable of simultaneously infiltrating Windows and Android systems. FireEye researchers uncovered the campaign while investigating an attack on an unnamed US financial institution, they reported in a blog post. "FireEye recently observed a targeted attack on a US-based financial institution via spear-phishing email. In the process of investigating the Windows modules for WinSpy we also discovered various Android components that can be employed to engage in surveillance of a targe
×
×
  • Create New...