Friday, December 30, 2011

How World 1st Hacker exploit communication technology

Nevil Maskelyne was first hackers who exploited security flaws in communication technology from Morse code to the Internet in 1903.


The crowd was somewhat amused as the physicist John Ambrose Fleming was adjusting arcane apparatus to demonstrate the long-range wireless communication system developed by Italian radio pioneer Guglielmo Marconi. Marconi was 300 miles away in Cornwall trying to send the message.

Wednesday, December 28, 2011

Hackers next target can be New Zealand agencies after US host

Hacker's next target is the Sensitive information about the Department of Prime Minister and Cabinet and other New Zealand agencies after US host was hacked. activist group Anonymous hacked US intelligence firm Stratfor had its website on Monday and data including credit card details of its clients, was stolen. The hackers also claim Stratfor's more than 4000 clients include the US Defence Department, Microsoft, New Zealand Police, New Zealand Fire Service and Air New Zealand.

Pakistan a safe heaven for cyber criminals

That cyber criminal acts in many different different types on Pakistan contain accelerated as a result of six days within the last 5 quite a few years...

Tuesday, December 27, 2011

How to Hack Google Wallet to run on Verizon’s Galaxy Nexus

Most people was able to with success have Bing Pocket going to the HSPA+ release of your Samsung Universe Nexus without the need of a lot problem, although the significant news flash over the past weeks appeared to be this Verizon is keeping a practical application out of it has the release of your hotly estimated smartphone.

Monday, September 12, 2011

Iranian Users got warnedby google to Secure Accounts After Hack

With the wake up to a online digital license hack which will doubtless left hijackers to help you access that Google and yahoo provides in 299, 000 Iranians, that hunt icon it seven days forced the owners taking positive procedures to help you obtain ones own knowledge....

Spy Agencies threaded by Forge Hackers

Just after breaking a Nederlander CALIFORNIA (Documentation Recognition) DigiNotar, Iranian online criminals was able to hint cast certificates for any internet domain names with traveler specialists CIA, Mossad plus MI6. Main documentation experts for instance VeriSign plus Thawte ended up being as well aimed, when ended up being Iranian dissident web pages....

DigiNotar Hack VS Dutch Government Deal

 A Nederlander administration is trying to attenuate the effect of your DigiNotar get into for it has the THEM system nonetheless cautioned it's just a time-consuming approach: You cannot assume all a SSL certificates is often supplanted to the take a flight. ...

Thursday, August 25, 2011

How US Hacker Recruitment Increases

Term hacker frequently sticks out in the form of damaging message just for lousy who do the job unscrupulous laptop cerebrovascular events just for ailing bought develop... 

Monday, August 22, 2011

Android app 'Dog Wars' hacked by Animal rights activists

Animal rights protesters have taken sneaky and decisive action to shame users of "Dog Wars, " a controversial dogfighting app that was removed from the Android Market app store in April ...

What are the Confessions of a hacker

In advance of there seems to be Mysterious and also LulzSec and also various alternative current laptop online criminals, there seems to be Kevin Mitnick. After the legendary lawbreaker employment, amount of time in imprisonment, including a conversion to the laptop basic safety employment, Mitnick stock shares her narrative ...

Sunday, August 21, 2011

How to Hack Updated Seas0nPass For Apple TV 4.3

FireCore has got revealed some sort of refreshed variant within their jailbreaking program – Seas0nPass to help with untethered jailbreak meant for Piece of fruit TV FOR PC 3. 3 software programs redesign meant for following iteration Piece of fruit TV FOR PC...

Saturday, August 20, 2011

How Android Keylogger Hack Work

A couple College or university connected with Colorado safety measures analysts designed a Operating system request termed TouchLogger that could fit this phone's vibration when people attack some sort of touchscreen technology critical while using the unique critical people attack... 

Friday, August 19, 2011

Crack Down of Apple Products

Within the constant challenge next to brand encroachment, Apple company company possesses filled out a lawsuit next to a couple suppliers connected with knockoff Apple company company gadgets within this Ny city local community connected with Flushing, Queens, in line with docs unsealed Thurs . with Brooklyn fed judge...

Thursday, August 18, 2011

volunteer program for security professionals

Arthur Extended was once identified regarding Yahoo hacking--finding prone computers on the net making use of certain keyphrases....

Hacker Conference found Sophos Antivirus Flaws

A researcher present at the Black Hat participated Sophos antivirus and found it lacking in several areas, leaving him vulnerable to attack or bypass - something he says could be applied to other publishers of 'antivirus' as well, but it just does not see....

Hacker Drone Highlight of Hacker Conference

Anyone who is confident in their own safety, make a stop at the Black Hat and Defcon conferences Security researcher annual convention in Las Vegas....

Monday, August 15, 2011

Robbers hack ATM

Two robbers Saturday allegedly chopped off the hand of a security guard at an ATM, when he resisted their attempt to rob bank officials who were leaving after loading cash into the machine....

Hacker use Facebook Account to Hack Bank Account.


Iain Wood used up to 18 hours per day online, working out passwords from personal information posted on social networking sites by his acquaintances....

Saturday, August 06, 2011

How to protect secret information

Firefox addon called HTTPS Everywhere which encrypts your connection. For instance when you visit websites you are visiting them unencrypted or unprotected....

How to Hack Facebook Yahoo Msn and Gmail Account on LAN

A Firefox addon called FireSheep hi-jacks other peoples session and lets you use it. For instance close to all sites on the web store cookies on their servers...   

Thursday, August 04, 2011

Hack your Optimized google Search

Using JavaScript you can hack google search results for your own advantage. In this post I would be providing 5 java scripts which you can use to download Songs , Ebooks , Images , Applications and Games....

How to Hack Formatted Content In WordPress

Today I am going to write about how can we get formatted content by get_the_content wordpress function. This function can be used in loop and by this function we can get content in one variable and can be print it later....

Tuesday, July 26, 2011

How hackers access Austrian bank data

Anonymous Hackers accessed the Australian bank data of 96,000 people in an attack on the website of the country's GIS television licence agency, officials said on Monday....

Monday, July 25, 2011

How to Download Paid Android Apps for FREE!

Its a simple way to downlaod Android Apps for Free. Follow the steps below to download it on your Android Phone ...

Friday, July 15, 2011

Apologize for phone hacking scandal by News Int'l

News Int'l will run advertisements in major British newspapers to apologize to the nation for the phone hacking scandal, James Murdoch says....

Wednesday, July 06, 2011

Hackers Attack Apple,Fox News and Twitter.

Hackers exposed numerous email and password combinations related to Apple and infiltrated a Fox News' Twitter account, sending out several tweets falsely claiming that President Obama had been assassinated ....

Sunday, May 29, 2011

How to Hack Audix Voicemail Systems

When doing reconnaisance you should always be aware of the information you have already found, and how it can be used. Thats where an employee directory comes in handy....

New Android app released for select HTC phones, Samsung Nexus S

It looks like the LG Revolution won't be the first Android phone to get Netflix after all...

Friday, May 13, 2011

Stay Tuned on Potential Amazon Tablet

Amazon CEO Jeff Bezos didn't confirm a Samsung-built tablet today, but he's not saying no -- in fact, the tell-it-like-it-is founder of the massive e-tailer suggested quite the opposite in an interview with Consumer Reports...

Tuesday, May 03, 2011

FB 'Likes' are being hacked for Osama bin laden shoot out video

Facebook 'Likes' are being hacked for Osama bin laden shoot out video while attracting people to a video that they say it is real osama bin laden shoot out video in military operation in Abbott Abad in Pakistan.Although there is no video found on their given url...

Monday, May 02, 2011

Ps Jailbreak hack threat by chinese store

New PS3 jailbreak being sold at chinese store. Some say they hacked the hack, some say its like the original PS Jailbreak. What we say is, its cheap, and it works....

Sunday, April 03, 2011

Hack Smartphone in two easy steps.

Smart phones, tablet PCs and mobile devices are now being used with online payment and banking networks that require more security than a smartphone generally provides....

Thursday, March 24, 2011

Sim Card Hack in Iphone Jailbreak

Non practitioners often confuse jailbreaking and unlocking. With the former, you are removing Apple’s built in restrictions from your iOS gadget while with the latter and this is true of all mobile devices, really you are freeing up your tech to be used with wireless service providers that don’t sell or support it....

Wednesday, March 23, 2011

Threats against WikiLeaker captors

The Pentagon has asked for an investigation into threats made by the Anonymous hacking collective against officials at Quantico, the Marine brig that is holding accused WikiLeaker Pfc. Bradley Manning....

Tuesday, March 22, 2011

Google Pay $142,000 for Privacy Violation

France’s data privacy regulator has fined Google €100,000 for gathering data from private Wi-Fi networks while collecting imagery for Google Street View....

Friday, March 11, 2011

Hackers way to access Paypal

Hackers access PayPal through email. Most people already know not to click a link in an email for their PayPal mail.



Saturday, February 12, 2011

How Anti computer hacking bill Processed

Strengthening cybersecurity is the goal of legislation being introduced in Congress after reports of hack attacks on computer networks at Nasdaq OMX Group and at oil and gas companies....

U.S under Cyber warfare threats

The cyber warfare threat facing the United States is increasing in scope

US oil companies got attacked by Chinese hackers

Hackers from China have penetrated computer networks of global oil companies, stealing financial documents on bidding plans and other confidential information, a US computer security firm said Thursday....

PS3 Hacker aims against Sony !!!

According to Wired, famed Playstation 3 hacker George “GeoHot” Hotz must turn over the tools of his trade and allow Sony to sift through his computer’s hard drive...

Thursday, February 10, 2011

How security loophole expose Twitter


A security loophole in Twitter can give website developers easy access to users' private direct messages, messages that are exchanged between two people and not meant to be shared on Twitter or with anyone else, according to a report....

How iPhone passwords Hacked in Six Minutes

IPhone has been lost or stolen can be a terrible experience. Not only do you have to deal with replacing the device, but you also have to worry about someone accessing all the personal information you've got on the gadget....

Tuesday, February 08, 2011

Sikkim govt website got Hacked to register protest

A Kashmiri group has allegedly hacked the Sikkim government web site. Hacker hacked web site not for any benefit but to register a protest against the alleged violence in Kashmir....

Monday, February 07, 2011

Password Stealing with Cookies

Computers are one of the media to explore cyberspace. In the computer are some informations that we can learn, especially recovering confidential information stored on the computer. One of them is a username and password to run commands on a web. Typically, the important information is stored in a file named Cookie.... 

Protect you Password from Hackers

Protect your yahoo account and every account in general and should not be used for stealing someone's info, password etc...

Saturday, February 05, 2011

Password Cracking

The problem lies with the ever increasing abilities of computers to process larger amounts of data in a smaller amount of time. A password is just a string of characters, typically only keyboard characters, which a person must remember and type into a computer terminal when required....

Sunday, January 30, 2011

How to prevent from hackers

How you protect your tiny machine from hacker tricks? Fortunately, there are some measures that we can take, and it doesn't require us to be a Neo or Hugh Jackman's character from the movie "Swordfish". These hacker protection tips are simple and effective and will defend you from most of the attacks....

Wednesday, January 19, 2011

Google collect private data illegally

South Korea has concluded that Google illegally collected personal data while collecting information for its Street View map service, an official at the country's National Police Agency (NPA) said Thursday.....

New Windows bug Confirmed by Microsoft

Microsoft today confirmed an unpatched vulnerability in Windows just hours after a hacking toolkit published an exploit for the bug....

Banks threaded by Hacked laptops

Recent data breaches at two banks underscore what's becoming a gnarly problem for companies that handle sensitive information: When does a hacked PC become a data breach?....

Tuesday, January 18, 2011

Hacker Stole Nude photo from email accounts

A California man has pleaded guilty to charges that he broke into the e-mail accounts of thousands of women, scouring them for nude photos that he then posted to the Internet.....

Criminal charges against the alleged attackers

The U.S. Department of Justice (DOJ) will file criminal charges against the alleged attackers who copied personal information from the AT&T network of approximately 120,000 iPad users, the U.S. Attorney's Office, District of New Jersey announced Monday.....

Hackers hack IBM DeveloperWorks site

An IBM site for developers was defaced over the weekend, with attackers replacing some of the Web pages on the site with ones containing their own messages, IBM confirmed Monday.....