Friday, 27 December 2013

Researchers report security flaw in Samsung's Galaxy S4

Researchers report security flaw in Samsung's Galaxy S4  Here's some Grinchy news for those of you who put Samsung's Galaxy S4 on your holiday wish list: Israeli researchers have identified a vulnerability in the smartphone that allegedly allows a hacker to easily intercept secure data. We did not immediately hear back from Samsung with a response to the reported flaw, but the company has told The Wall Street Journal and other news outlets...

Wickr 2.0 makes self-destructing SMS -- Care about Privacy

Wickr 2.0 makes self-destructing SMS -- Care about Privacy Wickr 2.0's debut on Friday makes it much easier to invite friends to use the app, thanks to a new address-book scanning feature that prevents Wickr from learning who you're inviting. That's a big difference from just about every other service out there, which accesses your address book -- usually with your permission -- and then holds on to that data like the digital gold that it is. Nico...

Target data stolen in hack showing up on black market --

Target data stolen in hack showing up on black market As if the Target hack ordeal couldn't get any worse -- data from the retail chain's massive security breach stolen between November 27 and December 15 is popping up in huge quantities on the black market, The New York Times reported Friday.After Target conceded Thursday that its in-store point-of-sale systems were indeed hacked, compromising as many as 40 million debit and credit card accounts,...

Snowden's Christmas message about Privacy of ordinary person

 Snowden's Christmas message about Privacy of ordinary person Edward Snowden, the National Security Agency whistleblower, delivered a video message on Christmas Day via UK's Channel 4 with a simple theme: "privacy matters.""A child born today will grow up with no conception of privacy at all. They'll never know what it means to have a private moment to themselves -- an unrecorded, unanalyzed thought," Snowden said in the 1-minute, 43-second message. "And that's a problem because privacy matters. Privacy is what allows us to determine who...

Tuesday, 24 December 2013

MacBook Webcams can be used to covertly spy on people -- With proof

MacBook Webcams can be used to covertly spy on people -- With proof Imagine going about your daily life and then one day receiving photos of yourself from inside your home. Sound spooky? Well, this really happened to a woman named Cassidy Wolf, according to the Washington Post. And, to make matters worse, she was nude in the photos. How did this happen? Apparently, there's a way for hackers to spy on people via their iSight Webcams in older Apple...

Sunday, 1 December 2013

Google upgraded its web security certificate to 2048-bit encryption

Google upgraded its web security certificate to 2048-bit encryption Never again are you going to get a Google Web site whose security certificate is protected with comparatively weak 1,024-bit encryption. The Net giant has secured all its certificates with 2,048-bit RSA encryption keys or better, Google security engineer Dan Dulay said in a blog post Monday. Certificates are used to set up encrypted communications between...

Thursday, 28 November 2013

Optical fibres are under NSA snooping -- Privacy is going to smash down

Optical fibres are under NSA snooping -- Privacy is going to smash down In October, a report surfaced that the US National Security Agency secretly accessed data from tech giants like Google and Yahoo, by way of intercepting the unencrypted traffic flowing between each company's data centers. Specifically, it's believed the NSA tapped into the fiber-optic cables that connect those data centers. The New York Times reported Tuesday that...

Friday, 15 November 2013

Security holes found in D-Link Routers - Security Researchers

A new spate of vulnerabilities have been found in a D-Link router, a security researcher said Monday. The D-Link 2760N, also known as the D-Link DSL-2760U-BN, is susceptible to several cross-site scripting (XSS) bugs through its Web interface, reported ThreatPost.  Liad Mizrachi, the researcher who discovered the bugs, said he notified D-Link about the bugs in August, September, and October, but D-Link did not respond. The report follows a more serious backdoor bug found in the following D-Link routers: DIR-100, DIR-120, DI-524UP,...

Major Tech. Companies planning to fend off NSA hakcing

The National Security Agency (NSA) might soon have a harder time accessing user data. Google, Yahoo, Microsoft, Apple, and a other prominent technology companies are investing heavily in stronger, 2048-bit encryption that some say, won't be easily overcome for more than a decade, due to computing power constraints. Google is one of the leaders in the effort, announcing in July that it would encrypt its user data with 2048-bit encryption. According to Bloomberg, which spoke with several other companies that are investing in new encryption,...

Monday, 21 October 2013

How to hack (Brute Force) gmail account with backtrack 5

How to hack (Brute Force) gmail account with backtrack 5 Sorry for late posting on blog also on our facebook page infact i was very busy in my some projects but NOW I M BACK. Today i am here posting a very good and old method to hack any email id {e.g: gmail,ymail,etc} as you know "OLD IS GOLD". This method is known as Brute-Force Attack. I had added self explanatory images to use special tool of backtrack5 (any version) but i'm using BT5-R3...

Saturday, 31 August 2013

China is under Massive DDOS attack

China is under Massive DDOS attack A huge portion of Chinese-based Internet was disrupted on Sunday courtesy of  a massive Distributed Denial of Service (DDoS) attack.  The government has said it was the biggest it had ever experienced, as the attack was designed to flood networking infrastructure at the China Internet Network Information Center, which manages the Chinese domain name system and the .cn top level domain. DDoS...

Friday, 2 August 2013

62 Pakistani websites hacked by r00tsect0r Team

62 pk websites hacked by r00tsect0r crew member spider64 Today, Indian well known defacer spider64 notified us [hack4friends Team] about a mass defacement of pakistani domains. spider64  The reason of such mass defacement "Stop defacing Indian Websites". here is the list of websites hacked by spider64 http://evita-me.com http://tellcoms.com http://inforesights.com http://salsabeila.com http://hitmas.com http://www.funtimepass.com http://federallimousineservice.com https://arifnaushahi.com http://rafiqenterprises.com.pk http://shelozon.com https://faisalasghar.com https://binrahman.com http://foundationstone.com.pk http://medco.net.pk http://articleteams.com https://opaltradersltd.com http://meeranjee.com http://opalstudios.com http://saudipak.com/admin http://sprintarabia.com http://sti.com.pk https://muhammadattique.com http://goldengympk.com http://www.pricemycartons.com http://bleeclothing.com http://medco.net.pk http://agoudelock.com http://frontexgroup.com http://w3.com.pk http://ideasdnn.com http://agoudelock.com http://restoncoachbus.com/index.html http://uhrs.com.pk http://sscpakistan.com http://manhattanpakistan.com http://combnet.net http://lg.gok.pk http://dyaanscollection.com http://yamtex.com http://stlyonn.com http://atlantaautismconsortium.org/index.html http://wagexpress.com http://thehewadgroup.com http://mehakraza.net http://issrahairways.net http://bluetecharabia.com/index.html https://atlantic-limo.com http://inceptapharmapk.com http://kalamrestaurant.fr http://softpakistan.org http://mugheestextiles.com http://hbcontract.com http://medley.com.pk http://davosin.com http://nmtech.com.pk http://galalocations.com http://decisions.com.pk http://bahriatownspk.com http://alibdaamovers.net hotelgulbergpalace.com http://mindworksmedia.org/ http://agp-pakistan.com/index.html Stay...

Sunday, 28 July 2013

No cyber war between INDIA and PAKISTAN on Independence day

No cyber war between INDIA and PAKISTAN In these days many news are spreading very vigorously on different blogs / cyber news portals. These news are about an cyber attack which will we shooted by  PCE[Pak Cyber Eaglez] and other Pakistani hackers group on Indian Cyber Space at Independence Day and special target IndiShell , Indian Cyber Pyrates, Indian Cyber Army etc. But to clarify such all fake news Chief Member of PCE --...

Sunday, 7 July 2013

New amazing Google Terminal --- mirror of google

New amazing Google Terminal --- mirror of google A mirror of google websites is created by some developers must have a look on these all links..                                             Google Terminal                                    ...

Wednesday, 3 July 2013

Linux v3.10 Released

Linux v3.10 Released Linus Torvalds released version 3.10 just nine weeks after Linux 3.9 was released, making this development cycle about one week shorter than many previous cycles. This speed is particularly impressive considering more changes were integrated into the latest kernel version than ever before, at least if you go by the number of commits in the source code management system – the number of lines changed is about the same...

North Korea grants asylum for Snowden

North Korea grants asylum for Snowden At last hacker's beloved person Edward Snowden found a home SEOUL, Republic of Korea – In response to a formal application for asylum on behalf of Edward Snowden, Kim Jong-un issued a statement offering the whistleblower not just asylum, but full North Korean citizenship. Snowden and his entourage, staffed mostly by WikiLeaks employees, were ecstatic at the news of a safe haven after 14 other countries had...

Tuesday, 2 July 2013

Download free ebook on backtrack 5 wireless penetration

Download free ebook on backtrack 5 wireless penetration search feed Content of ebook.. Chapter 1: Wireless Lab Setup Hardware requirements Software requirements Installing BackTrack Time for action – installing BackTrack Setting up the access point Time for action – configuring the access point Setting up the wireless card Time for action – configuring your wireless card Connecting to the access point Time for action – configuring...

How to spoof (Change) MAC address without any software

How to spoof (Change)  MAC address without any software Mac address Spoofing::::::: I am posting this article considering the thing that you know very well about What is MAC address. Still if any guy dont know then comment below i will explain it via new article. Lets see how easy to spoof MAC address in Windows OS ... search feed I have solely tried it and get success in it ..  Just follow these steps.. Step 1.  ...

How to block ads on Youtube

How to block ads on Youtube search feed  Youtube is the most popular Video sharing website. Launched on Feb 14th 2005. And within such a short period it became the most popular Video sharing site. We often open youtube only to search for any video clipping,etc... but if any ad comes in between our video buffering it irritates us a lot. These Ads are put on by the Google AdSense. There are two types of Ads which we come across:- >...

Sunday, 30 June 2013

Basic commands of Backtrack

Basic commands of Backtrack                                                                                                                       ...

*****************************Thanks for Your kind Visit****************************

Receive All Free Updates Via Facebook.