30.2 C
Delhi
Sunday, April 20, 2025
outlook hacked

Hackers Attacked Microsoft Outlook Web App to steal Login Credentials

0
Hackers Attacked Microsoft Outlook Web App to steal Login Credentials   Researchers have recently founded a hazardous Backdoor in Microsoft’s Outlook Web Application, which allows the hackers to steal e-mail and...
final Wifi crack

Hack WPA2 Encrypted Wi-Fi Networks using Aircrack-ng

3
Hack  WPA2 Encrypted Wi-Fi Networks using Aircrack-ng | Kali-Linux Hello friend ,In this article I will demonstrate how to crack or hack some one's WiFi Network just in simple steps...
facebook verification page has bug

Facebook verification page has bug found by team Buffercode

5
Note: I already send report for this bug , I  hope Team Facebook will change their algorithm for this page.  New Bug has found by team Buffercode in Facebook It's always...
ransomware

What is Ransomware and How it works?

0
Attackers use ransomware to get ransom from its victims. In other words, ransomware is a malicious program or software to block user access on their own system or encrypt...
Ten hilarious facts that only programmers can understand

Exploiting buffer overflows using command line

0
After reading our previous post: Next step moving towards exploit:Finding the return address ,it's time to do some command line exploits. So this post is regarding Exploiting buffer...
An application to send Encrypted message

How to send encrypted message using softwares or applications??

1
How to Send Encrypted Message?? In our previous post Encryption and Decryption ,we told you the meaning and need of encryption and decryption. After that you may want to know...
Bitport Review : Download torrents to your cloud and play them online

Bitport Review : Download torrents to your cloud and play them online

Bitport.io review :Most of the people here use torrent to download movies, games , series , software and much more. But there is a question is it safe to...
Instagram Hacked

Instagram Hacked: A security researcher hacked into the servers of Instagram

0
Instagram Hacked! Someone just hacked into the servers of Instagram, showing the most secure mechanisms also have bugs. But you don’t try to do anything like this because even reporting the...
metasploit Unleashed

Explore into the Metasploit ( a Ultimate Hackers Tool)

0
  Metasploit is a complete and a Ultimate Security tool that provides information about Computer Security Vulnerabilities and also use in penetration testing .It was develop by HD Moore in...

ISIS Hacker Arrested In Malaysia: US Military Data Hacked By ISIS Hacker

0
A Kosovo citizen is arrested by Malaysian Authorities in the charges of computer hacking and providing the personal data of U.S. Military members to the Islamic State terrorist group...

Now use Facebook anonymously via Tor networks: good news for Tor users

0
Now use Facebook anonymously: Facebook is a most popular social network in world. Here is good news for Facebook lovers, who want to keep secret their identity on internet. Identity...
Basic Linux Exploits : Moving towards exploit

Basic Linux Exploits: Moving towards exploits

0
Note: Hacking is not a joke so please keep patience and learn it step by step. If you have read all our previous posts , you are ready to exploits the...
VDI

VDI Deployment Mistakes

0
Firstly, we should know about VDI. It stands for Virtual Desktop Infrastructure. It is a practice which hosts desktop operating system within a Virtual Machine (VM) running on a...
malware attack on facebook

Malware Attack on Facebook effect more than 110,000 users

0
  Malware attack on Facebook On Friday malware attack on Facebook is reported. Malware attack on Facebook infected more than 110,000 users. There are some pornography links on Facebook. When user click...
DemonBot, Botnet

Demonbot is on rising | A New Botnet

0
As security is getting stronger so hackers are getting more stronger. Once a loophole is closed by Operating systems or any vendors then hackers find out another way to breach...

USB Killer 2.0 : It can destroy your system in just some seconds

0
Do you remember Killer USB? It is about the new version of Killer USB, this time with tremendous powers. Let’s talk a bit about the previous version of Killer USB,...
Anonymity buffercode

How to surf internet Anonymously

1
Hello friends this  post is about how to hide your machine IP for surfing internet Anonymously. To read this may bore you but keep patience because it is important....
Mac Malware: Time to test Mac security

Mac Malware: Time to test Apple’s Security

0
Last quarter shows an interestingly spike in malware activity that targeted Mac users only. New samples in the 1st 3 months of this year are nearly equal to the...
Basic Linux exploits: Function Calling Procedure

Basic Linux exploits: Function Calling Procedure

0
Note: Hacking is not a joke so please keep patience and learn it step by step. Note: Before reading this post you must read : Learn hacking...

Kali Linux Rolling Edition updated with the latest patches

0
The most popular Kali Linux was released on 2015 at DefCon 23 in Las Vegas. Kali is successor of Backtrack based on Debian Jessie,distribution, includes many popular penetration...
Hack Attempts on Dropbox:

Is Dropbox safe against Ransomware and Hacks?

0
Imagine backing up your sensitive data on Dropbox and one fine morning, finding out that your password has been leaked or you are locked out of your account and...
NETGEAR Router Exploit

NETGEAR Router Exploit: Critical Bug in NETGEAR Router

0
Do you use NETGEAR Router, then have a look at it. NETGEAR Routers are once again vulnerable to the DNS Monitoring. A security researcher discovered that there is a serious...

UK court backs police use of face recognition, but the fight is still On.

0
Sources said that the data protection and human rights laws had been breached. A man from Cardiff, UK, claimed that the police breached his human rights when the police used...

WikiLeaks to publish the content from CIA’s Director Email

0
You must have visited the website of WikiLeaks, the non-profit and transparency organisation to read about the leaks and top secrets of this world. And now Julian Assange, the founder...
StageFright 2.0 fixed

StageFright 2.0 Fixed: Google released an OTA for Nexus Devices.

0
StageFright 2.0 Fixed Few days back, the researchers warned google of the new Stage Fright Bug. This bug affected more than a billion devices that are running on Android OS. This...
Guccifer hacker extradited to the US

Guccifer hacker extradited to the US

0
Guccifer is a egregious Romanian hacker,whose real name is Marcel Lazar Lehel has been permitted to abandon to the United States to face Computer Intrusion and Identity theft charges...