Category: Tech News

  • iPhone can be used as spy phone to get desktop Keystrokes

    iPhone can be used as spy phone to get desktop Keystrokes What if a hacker could log every key you typed on your PC by placing a cellphone nearby? US researchers have shown how this is possible using any smartphone available today. At a conference in Chicago on Thursday, a group of computer researchers from […]

    Read more


  • Artillery 0.1 alpha – New tool for Linux Protection by ReL1K

    Artillery 0.1 alpha – New tool for Linux Protection by ReL1K A new Tool “Artillery” – for Linux Protection has been Released by ReL1K (Founder DerbyCon, Creator of the Social-Engineer Toolkit). It’s written in Python and completely open-source. Artillery is a combination of a honeypot, file monitoring and integrity, alerting, and brute force prevention tool. […]

    Read more


  • Operation Hackerazzi : FBI arrests alleged Hacker for Stealing naked photos of Hollywood stars

    Pperation Hackerazzi : FBI arrests alleged Hacker for Stealing naked photos of Hollywood stars FEDERAL officials on Wednesday arrested a 35-year-old Florida man,Christopher Chaney and charged him with 26 counts of cyber-related crimes against Hollywood stars following an 11-month federal probe dubbed “Operation Hackerazzi”. Twitter was ablaze earlier today with messages claiming to link to […]

    Read more


  • Sony admits another 93000 PSN/SOE accounts just got hacked

    Earlier this year Sony suffered major embarrassment and the wrath of its customers when the PlayStation Network got hacked. 77 million accounts were stolen, and Sony was forced to take its servers offline, do a system reset, and get everyone to select new passwords. Eventually PSN came back online with Sony’s promise of new security […]

    Read more


  • Sony hacked again – 93,000 accounts compromised with brute-force attack

    Sony hacked again – 93,000 accounts compromised with brute-force attack Sony has warned users against a massive bruteforce attack against PlayStation and Sony network accounts. The attack – which used password and user ID combinations from an unidentified third-party source – succeeded in compromising 60,000 PlayStation Network and 33,000 Sony Online Entertainment network accounts. These […]

    Read more


  • REMnux: A Linux Distribution for Reverse-Engineering Malware

    REMnux: A Linux Distribution for Reverse-Engineering MalwareREMnux is a lightweight Linux distribution for assisting malware analysts in reverse-engineering malicious software. The distribution is based on Ubuntu and is maintained by Lenny Zeltser. REMnux is designed for running services that are useful to emulate within an isolated laboratory environment when performing behavioral malware analysis. As part […]

    Read more


Recent Posts
Categories
Archives