Category Archives: Hackers News

Hackers News

Leaked Exploits are Legit and Belong to NSA: Cisco, Fortinet and Snowden Docs Confirm

Last week, a group calling itself “The Shadow Brokers” published what it said was a set of NSA “cyber weapons,” including some working exploits for the Internet’s most crucial network infrastructure, apparently stolen from the agency’s Equation Group in 2013.

Well, talking about the authenticity of those exploits, The Intercept published Friday a new set of documents from the Edward Snowden

Warning — Bitcoin Users Could Be Targeted by State-Sponsored Hackers

Another day, another bad news for Bitcoin users.

A leading Bitcoin information site is warning users that an upcoming version of the Blockchain consolidation software and Bitcoin wallets could most likely be targeted by “state-sponsored attackers.”

Recently, one of the world’s most popular cryptocurrency exchanges, Bitfinex, suffered a major hack that resulted in a loss of around $72 Million

Omegle, the Popular 'Chat with Strangers' Service Leaks Your Dirty Chats and Personal Info

Ever since the creation of online chat rooms and then social networking, people have changed the way they interact with their friends and associates.

However, when it comes to anonymous chatting services, you don’t even know what kinds of individuals you are dealing with.

Sharing identifiable information about yourself with them could put you at risk of becoming a victim of stalking,

Microsoft Open Sources PowerShell; Now Available for Linux and Mac OS X

‘Microsoft loves Linux’ and this has never been so true than now.

Microsoft today made its PowerShell scripting language and command-line shell available to the open source developer community on GitHub under the permissive MIT license.
<!– adsense –>
The company has also launched alpha versions of PowerShell for Linux (specifically Red Hat, Ubuntu, and CentOS) and Mac OS X, in addition,

The NSA Hack — What, When, Where, How, Who & Why?

You might have heard about the recent ongoing drama of NSA hack that has sparked a larger debate on the Internet concerning abilities of US intelligence agencies as well as their own security.

Saturday morning the news broke that a mysterious group of hackers calling themselves “The Shadow Brokers” claimed it hacked an NSA-linked group and released some NSA hacking tools with a promise to

Someone is Spying on Researchers Behind VeraCrypt Security Audit

After TrueCrypt mysteriously discontinued itself, VeraCrypt became the most popular open source disk encryption software used by activists, journalists, and privacy conscious people.

Due to the huge popularity of VeraCrypt, security researchers from the OSTIF (The Open Source Technology Improvement Fund) announced at the beginning of this month that it had agreed to audit VeraCrypt

Internet Traffic Hijacking Linux Flaw Affects 80% of Android Devices

An estimated 80 percent of Android smartphones and tablets running Android 4.4 KitKat and higher are vulnerable to a recently disclosed Linux kernel flaw that allows hackers to terminate connections, spy on unencrypted traffic or inject malware into the parties’ communications.

Even the latest Android Nougat Preview is considered to be vulnerable.
<!– adsense –>
The security flaw was first

China Launches World's 1st 'Hack-Proof' Quantum Communication Satellite

China has taken one more step forward towards achieving success in Quantum communication technology.

China has launched the world’s first quantum communications satellite into orbit aboard a Long March-2D rocket earlier today in order to test the fundamental laws of quantum mechanics at space.

‘Hack-Proof’ Communications System

The satellite, dubbed Quantum Science Satellite, is designed

NSA's Hacking Group Hacked! Bunch of Private Hacking Tools Leaked Online

It seems like the NSA has been HACKED!

An unknown hacker or a group of hackers just claimed to have hacked into “Equation Group” — a cyber-attack group allegedly associated with the United States intelligence organization NSA — and dumped a bunch of its hacking tools (malware, private exploits, and hacking tools) online.
<!– adsense –>
I know, it is really hard to believe, but some

DDoSCoin — New Crypto-Currency Pays Users for Participating in DDoS Attacks

It’s 2016, and now, you can earn some dollars by contributing into well-organized DDoS attack scheme.

Do you know while mining Bitcoins you are actually contributing a significant computational power to keep the Bitcoin network running?

In Bitcoins, the miners actually build and maintain massive public ledger containing a record of every Bitcoin transaction in history.

When one user tries