Hacking News

Hackers Can Now Copy Your Fingerprint From A Photograph

Hackers Can Now Copy Your Fingerprint From A Photograph

Recently, the researchers at the National Institute of Information Technology in Japan revealed that hackers can now copy your fingerprint from a photograph. Hackers Can Now Copy Your Fingerprint From A Photograph Fingerprint authentication has brought...
Cyber War Begins! Pakistani Airport Websites Hacked by Indian Hackers

Cyber War Begins! Pakistani Airport Websites Hacked by Indian Hackers

After Pakistani hackers hacked the Indian NSG Websites. Now, Indian Hackers have claimed that they have hacked Islamabad, Peshawar, Multan Internationa and Karachi Airport website Cyber War Begins! Pakistani Airport Websites Hacked by Indian Hackers Previously...
How To Crack Android Encryption On Millions of Smartphones

Hacker Tells How to Crack Android Encryption on Millions of Smartphones

Recently, a security Researcher Gal Beniamini disclosed that Android's full disk encryption can be cracked easily with brute force and some patience. The problem lies with Qualcomm's Snapdragon processors Hacker Tells How to Crack Android...
Pixel's Security Features Are Better, Faster And Stronger Than Other Devices, Says Google

Pixel’s Security Features Are Better, Faster And Stronger Than Other Devices, Says Google

As we all know very well that the Android security has always been a controversial issue that has given rise to various opinions. The evidence shows that this is a very exposed system problems....
OpenSSL Fixed Six Severe Flaws

OpenSSL Fixed Six Severe Flaws

OpenSSL is an open source project that provides a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library and...

This New Tool Automatically Finds And Hacks Vulnerable Devices

We all know very well that the security of our devices is something that we always have to monitor. This is because, if we are not up to date with the patches or solutions...
Here's How Hackers Can Break iPhone And iPad Activation Lock

Here’s How Hackers Can Break iPhone And iPad Activation Lock

Recently security researchers discovered two different vulnerabilities that could simply allow anyone to bypass Apple's iPhone and iPad activation lock. The first one discovered by the Hemanth Joseph, a security researcher from India. Here's How...
WikiLeaks Reveals “How To Hack Windows” Secret Guide By CIA

WikiLeaks Reveals “How To Hack Windows” Secret Guide By CIA

The Anti-secrecy organization has disclosed 27 documents from Grasshopper framework. Well, Grasshopper framework is a platform used by Central Intelligence Agency to design malware payloads for Microsoft Windows. WikiLeaks Reveals “How To Hack Windows” Secret...
Hackers Selling Phishing Kits With Secret Backdoor Via YouTube

Hackers Selling Phishing Kits With Secret Backdoor Via YouTube

Did you know, nowadays the giant video platforms like YouTube is becoming one of the most commonly used platforms by cybercriminals to sell and distribute their dark and secret tools like phishing kits, that...
Scottish Teenager Hacked North Korea's Facebook

Scottish Teenager Hacked North Korea’s Facebook

North Korean replica of Facebook has been hacked by a Scottish teenager in just few hours after the news about the site was circulated online. It was North Korea's own Facebook like social networking...

STAY CONNECTED

1,470,183FansLike
1,869FollowersFollow
21,228FollowersFollow
103,544FollowersFollow
2,531FollowersFollow
6,354SubscribersSubscribe

LATEST