Listly by e hacking
Cyber Security news, tutorials and guidelines to stay secure while using latest web and mobile technology.
Hundreds of millions of Windows PC users are vulnerable to attacks exploiting the recently uncovered "Freak" encryption security flaw.
Ever wanted to spoof a restaurant's pager system? How about use an airport's Primary Surveillance RADAR to build your own bistatic RADAR system and track moving objects? What sorts of RF transactions take place in RFID systems, such as toll booths, building security and vehicular keyless entry?
" Nobody can hack you without your permission" Sometimes it is very hard to transfer your feelings and thoughts into words, especially if you are trying to say something about someone's privacy and security.
A crackdown lead by Britian's NCA (National Crime Agency) in the past week around 56 cyber criminals were arrested. NCA suspected that the arrested hackers are involved some very serious hacking activities like DoD, Yahoo, PlayStation and Xbox live attacks. This is the biggest hacking raid by any agency related to cyber security in UK.
When a hobbit can have an unexpected journey then why not a hacker has many unexpected stories to share with the world. Hacking is one of the adventurous field where you enjoy while working and you like to know the inside-out of everything, hacking is beyond a profession it is a passion.
Bluebox, a mobile-security firm has discovered preinstalled malware and a host of other security issues with Xiaomi Mi 4 device. It seems that mobile device has been tampered by an unidentified third party. Bluebox seeked to contact Xiaomi but did not get any response.
The news come to light today that US agency CIA is trying to crack the security of Apple devices for years. It is clear that world's top two giants Google and Apple didn't get along with the US security agencies like NSA and CIA in the past.
Apple has fixed the FREAK security flaw in its iPhone's and iPad's with the release of iOS 8.2. A Security researcher team told the company that this flaw will allow hackers to interpret encrypted connections. The update was released on Monday in a media event took place in San Francisco.
Appie is a software package that has been pre-configured to function as an Android Pentesting Environment. It is completely portable and can be carried on USB stick or your smartphone. It is one of its kind Android Security Analysis Tool and is a one stop answer for all the tools needed in Android Application Security Assessment, Android Forensics, Android Malware Analysis.
Microsoft has come up with the most important Patch Tuesday to address the "FREAK" security vulnerability, an encryption flaw that leaves device users vulnerable to having their electronic communications obstructed. Microsoft's regularly scheduled Patch Tuesday also included an updated patch for Stuxnet, a five-year-old vulnerability that affects windows operating system.
All the Banks around the world are now moving towards the embedded chip technology in their credit and debit cards to avoid any fraudulent activities from thieves and hackers. All the banks in U.S and Europe are already switch to this technology now hackers are using tools like AntiDetect and FraudFox to cashout from stolen cards.
China has confessed to the existence of special cyber warfare units as intimidation between a nation and United States over cyber espionage continues to rise. China has been the aim of suspicion relating to high-profile cyberattacks and state-sponsored campaigns for a long time.
Countries nowadays don't want to start wars on their border because it creates win-lose situation, loads of destruction, human life and infrastructure are in danger and there are many other disadvantages are there. The bitter truth is that human can't live without having a war, so we (human) have chosen a new ground to commence war.
Verizon has been spotted this past January for loading "supercookie" with every smartphone. Like more traditional Internet cookies, supercookies track users' online behavior to serve them up targeted advertisements, but unlike regular cookies, supercookies are impossible for users to delete. Mobile devices on the carrier's network include a Unique Identifier Header, or UIDH.
US President, Barack Obama has set out plans to use economic sanctions against cyber attackers and companies that benefit from the online theft of secrets. An executive order has been signed today which authorizes a set of new sanctions to be imposed on cyber attackers involved in hacking into the network of US companies or government agencies.
Google has enacted a system through Google play for Android devices called Verify Apps. The latest Android Security State of the Union includes clarification about what the company scans is your phone through Google Play-downloaded apps as well as apps you have downloaded elsewhere.
This is bash script which provides multiple access point attack using and BSSIDs list from a text file. If processed AP reaches rate limit, script goes to another from the list, and so forth.