Category Archives: Hackers News

Hackers News

Apple hires developer of World's Most Secure Messaging App

Apple is serious this time to enhance its iPhone security that even it can not hack. To achieve this the company has hired one of the key developers of Signal — World’s most secure, open source and encrypted messaging app.

Frederic Jacobs, who worked to develop Signal, announced today that he is joining Apple this summer to work as an intern in its CoreOS security team.

“I’m delighted to

Apple is working on New iPhone Even It Can't Hack

Amid an ongoing dispute with the United States government over a court order to unlock iPhone 5C of one of the San Bernardino shooters Syed Farook…

…Apple started working on implementing stronger security measures “even it can’t hack” to achieve un-hackability in its future iPhones.

The Federal Bureau of Investigation (FBI) is deliberately forcing Apple to create a special, backdoored

Judge Confirms Government Paid CMU Scientists to Hack Tor Users for FBI

Everything is now crystal clear:

The security researchers from Carnegie Mellon University (CMU) were hired by the federal officials to discover a technique that could help the FBI Unmask Tor users and Reveal their IP addresses as part of a criminal investigation.

Yes, a federal judge in Washington has recently confirmed that the computer scientists at CMU’s Software Engineering

Asus Faces 20 years of Audits Over Poor Wi-Fi Router Security

Currently, Asus is undergoing through a troublesome situation after a lawsuit had been filed by the US Federal Trade Commission (FTC) regarding its Router Insecurity.

On Tuesday, FTC settled charges with Asus, where the hardware manufacturing company agrees to:

Undergo Independent Security Audits Once in 2 years, for the Next 2 Decades.

This action had been taken as the result of

Just One Device? No, Government wants Apple to Unlock 12 More iPhones

Until now, the FBI is asking for Apple’s help in unlocking the iPhone belonging to one of the terrorists in the San Bernardino shootings that killed 14 and injured 24 in December.

However, in addition to iPhone 5C belonged to San Bernardino shooter Syed Farook, the U.S. Justice Department is looking at court orders forcing Apple to help officials unlock at least 12 iPhones.

<!– adsense

How to Hack a Computer from 100 Meters by Hijacking its Wireless Mouse or Keyboard

No matter how secure you think your computer might be, something malicious can always happen. As a Computer is an open book with right tools and talent.
The same is proved by a group of security researchers by hacking into a computer with no internet, and no Bluetooth devices.
Yes, it is possible for attackers to Hack Your Computer through non-Bluetooth devices such as your wireless mouse and

NSA Data Center Experiencing 300 Million Hacking Attempts Per Day

Utah State computer systems are experiencing a massive cyber attack on up to 300 Million Hacking attempts per day due to National Security Agency’s (NSA) data center in the state.

Yes, 300,000,000 hacking attempts in a day!

According to the statistical survey, it is evident that the computer systems in the US State of Utah began to experience the hacking attack a few years back,

GM Bot (Android Malware) Source Code Leaked Online

The source code of a recently discovered Android banking Trojan that has the capability to gain administrator access on your smartphone and completely erase your phone’s storage has been LEAKED online.

The banking Trojan family is known by several names; Security researchers from FireEye dubbed it SlemBunk, Symantec dubbed it Bankosy, and last week when Heimdal Security uncovered it, they

Warning! — Linux Mint Website Hacked and ISOs replaced with Backdoored Operating System

Are you also the one who downloaded Linux Mint on February 20th? You may have been Infected!

Linux Mint is one of the best and popular Linux distros available today, but if you have downloaded and installed the operating system recently you might have done so using a malicious ISO image.

Here’s why:

Last night, Some unknown hacker or group of hackers had managed to hack into the