Skip to main content

Posts

Showing posts from April, 2015

Hacking WordPress Website with Just a Single Comment !

Most of the time, we have reported about WordPress vulnerabilities involving vulnerable plugins, but this time a Finnish security researcher has discovered a  critical zero-day vulnerability in the core engine of the WordPress   content management system. The vulnerability, found by  Jouko Pynnönen  of Finland-based security firm Klikki Oy, is  a Cross-Site Scripting (XSS) flaw   buried deep into the WordPress’ comments system. The vulnerability affects the  WordPress versions 3.9.3, 4.1.1, 4.1.2,  and  the latest WordPress version 4.2. Pynnönen disclosed the details of the zero-day flaw, along with  a video and a proof-of-concept code for an exploit   of the bug, on his blog post on Sunday before the WordPress team could manage to release a patch. Why the researcher made the 0-Day Public? A similar cross-site-scripting (XSS) vulnerability was patched this week by WordPress developers, which was nearly 14 months after the ...

What the British Elections can teach us

The British Elections for Prime Minister are eight days away. I don’t drink tea, (even ice tea) I don’t say “bloody” every other word and I don’t want a king and queen over America. All of that said there are things about the British Elections that here in America it would not be a bad idea to imitate. I’m not talking about the fact that in the prime minister debate they had seven party nominees competing. (This wasn’t even the primaries!) Nor am I saying that we should call each other names like they do, (idiot, dodgy, useless, just to name a few) or scream and stomp each other down like they do. Americans have enough anger issues without needing anything exported from our “mother nation.” But I am talking about the fact that their campaign season lasts just six weeks. That’s it, just six. Five weeks ago the campaigns began with a speech from the current prime minister, David Cameron; he notified the queen he was dissolving congress after five years of continuance, gave a speech trash...

Crazy!!! Hacker Implants NFC Chip In His Hand To Hack Android Phones News

There is a very sleek line between hacking and security. The security used to protect the public could be misused by hackers against the public itself, and one shouldn’t forget that with the advance in technology, the techniques used by cyber criminals also improves. Today,  What hackers need to conduct a successful cyber attack? Maybe just a computing device injected under the skin of their bodies, who can bear the pain, would be enough to help complete a successful cyber attack – also known as  Biohacking . This was exactly what presented by the former U.S. Navy petty officer and now engineer at APA Wireless  Seth Wahle . With no malicious intention, Wahle implanted a small NFC chip in his left hand right between his thumb and his pointer finger in order to display the risks of Biohacking. Hacking Android devices using NFC implants: For those unaware,  NFC (Near Field Communications) chips  embedded in our smartphone devices are used for transferring files and...

15-Year-Old Admits Hacking NASA Computers

A 15-year-old computer hacker caused a 21-day shutdown of NASA computers that support the international space station, and invaded a Pentagon weapons computer system to intercept 3,300 e-mails, steal passwords and cruise around like an employee. The boy, known on the Internet as “c0mrade,” pleaded guilty today to juvenile delinquency in a sealed federal case. Six Months in Jail He became the first young hacker to be incarcerated for computer crimes, the Justice Department in Washington said in a summary. He will serve six months in a state detention facility. “Breaking into someone else’s property, whether it’s a robbery or a computer intrusion, is a serious crime,” said Attorney General Janet Reno. The prosecution “shows that we take computer intrusion seriously and are working with our law enforcement agencies to aggressively fight this problem.” Chris Rouland, who monitors computer attacks for Internet Security Systems Inc. in Atlanta, said the unusual part of the case was that the ...

How To Create A WiFi Hotspot In Windows 8.1/8/7 Using CMD

You can easily  create WiFi hotspot  in Windows by using  command prompt  if you have wired or wireless  WiFi connection . Step 1: Open Command Prompt (Admin) as an administrator and enter below command. netsh wlan set hostednetwork mode=allow ssid=EthicalHacking key=Wiknix1122 ssid = Your Wi-Fi Name Key = Your Password Step 2: Now create virtual adapter by the use below command. netsh wlan start hostednetwork Now type  exit  and enter. Step 3: Right click on  Network  icon and click  Open Network and Sharing Center . Step 4: Click  Change adapter settings. Now right click on  your Internet Connection  and click  Properties . I’m using mobile broadband, if you using ethernet then right click on ethernet. Step 5: Now click  Sharing Tab  and check “ Allow other network users to connect through this computer’s Internet connection ” and select  Local Area Connection 12 . Now click OK, that’s it. If This Pos...

Jeb Bush's Laughable Hypocrisy

Kansas City, KA - It was once, a long time ago when Twitter had not been invented and America had not yet been blessed by importing pizza to its shores that men (no women even ran in those days) who wanted to be President of the United States didn’t run for that office. Things were different back then, with what was called “front porch campaigns,” where candidates, while, apparently, sitting on their front porches, let it be known among a few that they wanted to run for president, and those people went out and campaigned. It was seen as undignified, in the first few years of American Presidential Politics, to actually run a campaign yourself, because anyone who did that must be “greedy” for power. You just sat on their porch, and sat hard, kept your fingers crossed, and hoped your people could pull it off. Of course that ended a long time ago, and now candidates are in a desperate run for the White House in which they often can’t afford more than a couple of days away from the camp...

9 years old cybersecurity expert hacks Android smartphone in minutes 2015

9-year-old cybersecurity expert hacks Android smartphone in minutes Wondering how secure your Android smartphone is? Well, a 9-year-old cybersecurity expert has demonstrated how hackers could steal contacts, call logs and messages within just 15 minutes. Speaking at the Security B-sides Conference last week, Harmony School of Science third-grader Reuben Paul took to the stage to promote safer smartphone security. His Keynote speech stressed the importance of being extra careful when downloading apps, showing how even seemingly safe software can be used by cybercriminals to access sensitive data and snoop on your location. “If a child can do it then a regular hacker can do it… so I just want everybody to be aware [and to] be more careful when you download games and stuff like that,” he said. Paul is a rising star of the computer security industry, speaking at a number of other conferences as well as acting as CEO of Prudent Games; a company which attempts to...

Dear Democrats: Thank you

Lynch Around 170 days ago I stood in a living room in California when I was told that Eric Holder, the first black man to be confirmed as Attorney General would be stepping down amid scandals that have rocked his tenure, including being held in contempt of congress. His replacement, as appointed by President Barak Obama, would be the first black woman to be nominated, Loretta Lynch. She has a history of being an able prosecutor and being tough on human traffickers. So one would think that Lynch, who is from New York, would be any easy sell to Democrats, especially since their own President confirmed her. But it was nearly 170 days, in one of the longest confirmation battles for an Attorney General Confirmation in history, before, when driving in a car across Iowa, yesterday, I finally heard she had gotten a yes vote. The food fight has been vicious, with Senator Dick Durbin saying that Republicans were treating her like Rosa Parks, prompting FOX News pundits to literally scream on ...

Selecting a minister who is prime: The British Elections

 #10 Downing Street is the British equivalent, in London, of our White House. And there is a mad scramble among seven contenders to sit in it. n the United Kingdom, for the first time in five years, the people are going to the polls. It will happen two weeks from today, and the country with a population just shy of 70 million, a nation that has been out greatest ally almost since the day after we whipped them in our great Revolutionary War and sent them packing, except for the unpleasant time they burned down Washington DC of course, does things a bit differently than we do.  Current Prime Minister, David Cameron They have no president, and what they have, the prime minister, is not elected like our president is. In fact, in the House of Commons, their lower, popularly elected house of 650 members, the people cast the votes for the members of some seven to twelve different parties. The party that gets the most votes usually will then be asked by the Queen to form a government. And t...

China Using A Powerful 'Great Cannon' Weapon to Censor The Internet

China has something very impressive that we are not aware of. The country has a powerful and previously unknown weapon that its government is using to bolster their cyber attack capabilities: Dubbed " The Great Cannon. " INTERNET CENSORSHIP IN CHINA When I talk about Internet censorship, it is incomplete if I don't mention China. China is famous for its  Great Wall of China  and  Great Firewall of China . The censoring of Internet access and blocking an individual website in China by its government, known as the Great Firewall of China. But, why the Chinese government does that?  The answer is very simple: The Chinese  government restricts those contents  it deems sensitive for its country's so-called democracy. It illegalize certain online speech and activities, block selected websites, and filter keywords out of searches initiated from computers located in Mainland China. The worse: Those Chinese citizens who offend authorities against Internet censorship...