Home Technology - Hacking

Technology - Hacking

Technology news and blogs

Agent 1433: remote attack on Microsoft SQL Server

All over the world companies large and small use Microsoft SQL Server for database management. Highly popular yet insufficiently protected, this DBMS is a target of choice for hacking. One...

Google, Mozilla, Apple Block the Kazakhstan root CA Certificate

Google, Mozzila, and Apple decided to ban the Kazakhstan root CA certificate to protect the millions of users privacy, it means Chrome, Firefox, and Safari will no longer trust the...

as-a-Service – Crooks Sell Passwords on Hacking Forums

Threat actors advertising a new Combolists-as-a-Service model to sell credentials on the underground hacking forums that enable account takeovers. Attackers employ several methods to gain access to the account that...

Google, Mozilla, Apple Block the Kazakhstan root CA Certificate

Google, Mozzila, and Apple decided to ban the Kazakhstan root CA certificate to protect the millions of users privacy, it means Chrome, Firefox, and Safari will no longer trust the...

Google, Mozilla, Apple Block the Kazakhstan root CA Certificate

Google, Mozzila, and Apple decided to ban the Kazakhstan root CA certificate to protect the millions of users privacy, it means Chrome, Firefox, and Safari will no longer trust the...

Mobile Hacking Firm Cellebrite’s UFED Tool can Hack any iOS & Android

Israeli forensics firm and well-known Law enforcement contractor Cellebrite released a public statement that they can hack any iOS and High-end Android devices for law enforcement agencies. Cellebrite Mobile Synchronization is...

Ransomware Hits Fortnite Players

DarkReading reports: "Ransomware masquerading as game "cheats" is hitting Fortnite players. Fortunately, there are ways to recover without paying a ransom." Similar to phishing attacks on STEAM, gamers are being...

Google, Mozilla, Apple Block the Kazakhstan root CA Certificate

Google, Mozzila, and Apple decided to ban the Kazakhstan root CA certificate to protect the millions of users privacy, it means Chrome, Firefox, and Safari will no longer trust the...

Biometric Platform Data Breach Leaked Millions of Users Fingerprint Data

Security researchers discovered the biggest data breach in Biometric Security Platform BioStar 2 that leaks millions of users facial recognition records, fingerprints, log data, and other personal information. BioStar 2, a...

CryptoCurrency Breaches and Hacking Scandals: How to Address them?

The proponents of cryptocurrency always harp on the point that it is very safe and secure and the blockchain technology that is used is virtually hacking proof. Let’s face it,...

APLICATIONS

The Android Arsenal – Networking

ReactiveConnectivity - a library for Listen Connectivity Change on Android ReactiveConnectivity is an Android Library to Listening NetworkConnectivity with...

HOT NEWS