Skip to main content

Posts

Showing posts from April 26, 2015

Worlds Top 5 Notorious Hackers Of All Time!!

There are two types of hackers. First, you’ve got the kind that is so often portrayed by Hollywood as an anti-social nerd with a chip on his shoulder out to dominate the cyber world by breaking into secure networks and messing things up. Second, you’ve got the kind of people who just enjoy fiddling around with software source code and hardware gigs... That’s right. The term “hacker” originally referred to the second type, which held absolutely no malevolent connotations. Only recently has the term been used to refer primarily to criminal masterminds. There are good hackers and bad hackers ! Nowadays, benevolent hackers are often called “ white hats ” while the more sinister are called “ black hats .” In this article, we will be talking specifically about famous hackers that don hats of black. Here are five of the most widely known black hatters and what happened to them for their recklessness . 1. Jonathan James Jonathan James was known as “c0mrade” on the Internet. What is his tic

Famous Online Indian Portal ‘Rediff’ Hacked By Palestinian Hacker 2015

On 30th April, 2015, a Palestinian-friendly hacker going with the online handle of HolaKo hacked and defaced a subdomain of Rediff.com, a famous Indian news, information, shopping and entertainment web portal. The targeted domain (businessemail.rediff.com) belongs to Rediff enterprise providing emails,  Windows  and Linux  web hosting services in  India . In an exclusive conversation with HolaKo,  HackRead  was told that reason for targeting Rediff was to deliver a message about  Israeli  occupation of  Palestinian land. The deface message was left in following words:  HACKED BY HOLAKO, REDIFF MAIL OWNED!? W00T !! WE ARE THE BEST OF THE REST. FREE PALESTINE ! #SAVEGAZA A full preview of the deface page is available below: Link of targeted domain along with its zone-h mirror as a proof of hack is available below: http://businessemail.rediff.com/ http://www.zone-h.org/mirror/id/24135554  I THINK THEY FOUND OUT I AM IN THEIR SERVER  HolaKo claims he had access to Rediff’s databases, email

Website and Twitter account of high-tech automaker HACKED by Tesla

The website and Twitter account of high-tech automaker Tesla were hacked over the weekend as part of a prank by angry rival hackers. Tesla CEO Elon Musk’s personal twitter account was also hacked around Saturday night (US Standard Time). The first sign of hijacking was noticed around 1:52 p.m., when the company’s Twitter account had a tweet that declared it being under the control of attackers and the name changed from “Tesla Motors” to  “#RIPPRGANG”. The tweet posted on the carmaker’s account said, “This Twitter is now run [sic] by Henry Blair Strater [sic] from Oswego Illinois, call me at [number redacted]”.  A few minutes later, the account began promising free Teslas to those who followed certain accounts or to those who called a certain phone number. The number belonged to a repair shop in Illinois which was flooded with calls. Nearly at that time, Tesla’s website was hacked by the same attackers. Visitors were redirected to a website with ISIS in the URL, a Laden-ranting video an

8 Best Android Apps To Improve Privacy and Security in 2015

As Mobile Device Security is comprised of security of different features, such as: Data privacy and security features Permission restrictions for snoopy apps A blacklist for undesired calls An excellent backup capability, in case your smartphone gets deteriorated. As well as encryption functionality. Google’s Android is a very flexible mobile operating system that can fulfill all these mobile device security challenges if you select the right security applications from Google Play Store. No doubt, Google Play Store has an abundance of suitable options, and it’s quite difficult for you to select the ones that meet all your expectations. So, I decided to help you by making a short list of the best mobile device security applications that I always carry in my Android smartphone. Here are the best security apps you must have in your Android smartphone; have a look: TextSecure Private Messenger (Free) There are vast number of secure messaging apps available in Play Store, but the trouble pa

Uncle Bernie from Brooklyn

Bernie Sanders Kansas City, KA – Some people call him the people’s senator, some people call him Uncle Bernie from Brooklyn. I just call him nuts. Bernie Sanders, four time mayor of Burlington Vermont, and eight term member of the House of Representatives, and now the Jr. Senator from Vermont in his second term, the boy born in Brooklyn New York is now running for the nomination of the Democratic Party. Bernie Sanders said not long ago on NBC’s Meet the Press that if he announced he was running, as he did yesterday, it would be because he thinks he can win. That fact alone betrays him to some as being out of touch with reality.   Sanders problems are so many that I do not have time for them all. For one thing, he is only at 4% in the polls, consistently polling behind Hillary Clinton for the Democratic Nomination by 40 to 60 percentage points. Another one of his many problems is that he isn’t actually a Democrat. He is a self-described Socialist, and independent, in fact he is the long

Hacking WordPress Website with Just a Single Comment !

Most of the time, we have reported about WordPress vulnerabilities involving vulnerable plugins, but this time a Finnish security researcher has discovered a  critical zero-day vulnerability in the core engine of the WordPress   content management system. The vulnerability, found by  Jouko Pynnönen  of Finland-based security firm Klikki Oy, is  a Cross-Site Scripting (XSS) flaw   buried deep into the WordPress’ comments system. The vulnerability affects the  WordPress versions 3.9.3, 4.1.1, 4.1.2,  and  the latest WordPress version 4.2. Pynnönen disclosed the details of the zero-day flaw, along with  a video and a proof-of-concept code for an exploit   of the bug, on his blog post on Sunday before the WordPress team could manage to release a patch. Why the researcher made the 0-Day Public? A similar cross-site-scripting (XSS) vulnerability was patched this week by WordPress developers, which was nearly 14 months after the bug was reported to the team. Due to fear of delay in fixing thi

What the British Elections can teach us

The British Elections for Prime Minister are eight days away. I don’t drink tea, (even ice tea) I don’t say “bloody” every other word and I don’t want a king and queen over America. All of that said there are things about the British Elections that here in America it would not be a bad idea to imitate. I’m not talking about the fact that in the prime minister debate they had seven party nominees competing. (This wasn’t even the primaries!) Nor am I saying that we should call each other names like they do, (idiot, dodgy, useless, just to name a few) or scream and stomp each other down like they do. Americans have enough anger issues without needing anything exported from our “mother nation.” But I am talking about the fact that their campaign season lasts just six weeks. That’s it, just six. Five weeks ago the campaigns began with a speech from the current prime minister, David Cameron; he notified the queen he was dissolving congress after five years of continuance, gave a speech trash

Crazy!!! Hacker Implants NFC Chip In His Hand To Hack Android Phones News

There is a very sleek line between hacking and security. The security used to protect the public could be misused by hackers against the public itself, and one shouldn’t forget that with the advance in technology, the techniques used by cyber criminals also improves. Today,  What hackers need to conduct a successful cyber attack? Maybe just a computing device injected under the skin of their bodies, who can bear the pain, would be enough to help complete a successful cyber attack – also known as  Biohacking . This was exactly what presented by the former U.S. Navy petty officer and now engineer at APA Wireless  Seth Wahle . With no malicious intention, Wahle implanted a small NFC chip in his left hand right between his thumb and his pointer finger in order to display the risks of Biohacking. Hacking Android devices using NFC implants: For those unaware,  NFC (Near Field Communications) chips  embedded in our smartphone devices are used for transferring files and in various mobile payme

15-Year-Old Admits Hacking NASA Computers

A 15-year-old computer hacker caused a 21-day shutdown of NASA computers that support the international space station, and invaded a Pentagon weapons computer system to intercept 3,300 e-mails, steal passwords and cruise around like an employee. The boy, known on the Internet as “c0mrade,” pleaded guilty today to juvenile delinquency in a sealed federal case. Six Months in Jail He became the first young hacker to be incarcerated for computer crimes, the Justice Department in Washington said in a summary. He will serve six months in a state detention facility. “Breaking into someone else’s property, whether it’s a robbery or a computer intrusion, is a serious crime,” said Attorney General Janet Reno. The prosecution “shows that we take computer intrusion seriously and are working with our law enforcement agencies to aggressively fight this problem.” Chris Rouland, who monitors computer attacks for Internet Security Systems Inc. in Atlanta, said the unusual part of the case was that the