background preloader

Scary INFO

Facebook Twitter

10 million stolen passwords were just released – here’s how to see if yours is one of them. Hackers-hacking-2 Earlier this week, noted security researcher and consultant Mark Burnett made waves when he posted 10 million stolen usernames and passwords on his blog.

10 million stolen passwords were just released – here’s how to see if yours is one of them

Of course, the security expert didn’t post the passwords with malicious intent. 80+ Best Free Hacking Tutorials. Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques. How to Delete Yourself from the Internet.

Edit Article Edited by Flickety, Eric, Jordan, Tess and 17 others Seeking to escape the internet? AES encryption is cracked- The Inquirer. CRYPTOGRAPHY RESEARCHERS have identified a weakness in the Advanced Encryption Standard (AES) security algorithm that can crack secret keys faster than before.

AES encryption is cracked- The Inquirer

The crack is the work of a trio of researchers at universities and Microsoft, and involved a lot of cryptanalysis - which is somewhat reassuring - and still does not present much of a real security threat. Andrey Bogdanov, from K.U.Leuven (Katholieke Universiteit Leuven), Dmitry Khovratovich, who is full time at Microsoft Research, and Christian Rechberger at ENS Paris were the researchers and it was Bogdanov that contacted The INQUIRER.

Although there have been other attacks on the key based AES security system none have really come close, according to the researchers. ALL phone calls in the US are recorded and accessible to the government, claims former FBI agent. By Daily Mail Reporter Published: 14:32 GMT, 5 May 2013 | Updated: 14:32 GMT, 5 May 2013 A former FBI counterterrorism agent has hinted at a vast and intrusive surveillance network used by the U.S. government to monitor its own citizens.

ALL phone calls in the US are recorded and accessible to the government, claims former FBI agent

Anthem hacked, millions of records likely stolen. Anthem said Wednesday that its database has been hacked, potentially exposing personal information about 80 million of its customers and employees.

Anthem hacked, millions of records likely stolen

The health insurer said the breach exposed "names, birthdays, social security numbers, street addresses, email addresses and employment information, including income data," but added that no financial information, including credit card details, was compromised. "Cyber attackers executed a very sophisticated attack to gain unauthorized access to one of Anthem's IT systems and have obtained personal information relating to from consumers and Anthem employees who are currently covered, or who have received coverage in the past," the U.S. second largest insurer said in a statement. Hackers controlling millions of PCs disrupted in Europol sweep. Amsterdam, Boston: A cybercrime operation that stole banking information by hacking more than 3 million computers in Indonesia, India and other countries has been disrupted by European police with assistance from three technology companies, officials said on Wednesday.

Hackers controlling millions of PCs disrupted in Europol sweep

Huge hack 'ugly sign of future' for internet threats. 11 February 2014Last updated at 08:43 ET By Dave Lee Technology reporter, BBC News The attack exploited a fundamental vulnerability in a system used to synchronise computer clocks A massive attack that exploited a key vulnerability in the infrastructure of the internet is the "start of ugly things to come", it has been warned.

Huge hack 'ugly sign of future' for internet threats

Online security specialists Cloudflare said it recorded the "biggest" attack of its kind on Monday. Hackers used weaknesses in the Network Time Protocol (NTP), a system used to synchronise computer clocks, to flood servers with huge amounts of data. INFOTECH-HACKERS - hacking tricks and for related tips.: Crack Any WiFi wpa2-psk Password with Windows in just Two Minutes. Many of you always asking and searching on Internet that "How to hack facebook password" and "How to hack wifi password".

INFOTECH-HACKERS - hacking tricks and for related tips.: Crack Any WiFi wpa2-psk Password with Windows in just Two Minutes

If you search on youtube you can get millions of videos about these hacks. But none of the tricks are not working either due to they are fake or follow very complex process. DroidWindows.com brings a100% working and authenticated trick to hack any of WiFi wpa2-psk password in just two minutes. Please follow the steps below as it is given with pictures: Software requirement: 1. WiFi enabled Desktop or Laptop OS Requirement: Windows 8 or Windows 7 or Windows XP. Millions of passwords exposed - Associated Press. SAN FRANCISCO — An alarming lapse in Internet security has exposed millions of passwords, credit card numbers and other sensitive bits of information to potential theft by computer hackers who may have been secretly exploiting the problem before its discovery.

Millions of passwords exposed - Associated Press

The breakdown revealed this week affects the encryption technology that is supposed to protect online accounts for emails, instant messaging and a wide range of electronic commerce. Continue Reading. Researchers crack the world’s toughest encryption by listening to the tiny sounds made by your computer’s CPU. Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening — yes, with a microphone — to a computer as it decrypts some encrypted data.

Researchers crack the world’s toughest encryption by listening to the tiny sounds made by your computer’s CPU

The attack is fairly simple and can be carried out with rudimentary hardware. The repercussions for the average computer user are minimal, but if you’re a secret agent, power user, or some other kind of encryption-using miscreant, you may want to reach for the Rammstein when decrypting your data. Surveillance. WPA wireless encryption cracked - CNET.