Showing posts with label cyberattck. Show all posts
Showing posts with label cyberattck. Show all posts

Thursday, 8 October 2015

How To Find The Serial Key Of Any Software Free 2015- 2016 *LATEST* 2016

#How To Find Serial Key Of Any Software 2015 & 2016 


Method #1.

1.First You Have To open Google Homepage or Google Front page.

2. Type there your Software Name and �94FBR� (For e.g. � Photoshop 94FBR�)
3.In Google search result you see your product key name or you can open any webpage link.

How To Find The Serial Key Of Any Software Free 2015- 2016 *LATEST*

Use any product key and enjoy fully licensed software.

Method #2
A Direct Software To Get Serial Key - LINK TO CONNECT 

For More Hacks Stay Connected

Keywords -
How To Find The Serial Key Of Any Software Free 2015- 2016 *LATEST*
The Serial Key Of Any Software Free 2015- 2016 *LATEST*
Serial Key Of Any Software Free 2015- 2016
Serial Key Free 2015- 2016
serial keys of any software free free


Read more...

Saturday, 27 June 2015

Sandisks World�s First 200Gb microSD Card Arrives

There isn't any troll in the title. The "World's Largest microSD" card sized at 200GB is now officially available for purchasing from Amazon and number of retailers.

Order a Sandisk's new high-capacity microSD card from Amazon now. However, the only issue is that it is not exactly very cheap. You will have to pay Around $240 to Buy one.
200gb-microsd-card


Sandisk's World's First 200GB MicroSD Card :-


Back in March when Sandisk first announced the world's first 200GB microSD card, it was expected to be priced at around $400. However, $240 has been marked as the price for the highest-capacity microSD card available in the market.

Sandisk's 200GB microSD card, or Ultra microSDXC UHS-I card, offers a transfer speed of up to 90MB per second, which is double the speed provided by its 128GB counterpart.

Transfer Speed: 1200 Photos Per Minute

The company claims that the speed will allow you to transfer up to 1,200 photos in just a single minute. The card is something of great use for photographers and filmmakers who need more storage capacity to store high-resolution photographs and videos.

Moreover, Sandisk's 200GB MicroSD card comes packaged with an SD adapter and a 10-year limited warranty.

Furthermore, the 200GB MicroSD card is waterproof, shockproof, temperature proof, magnet proof and X-ray proof to deal with any possibility of destruction.

However, if you can not spent this much for 200GB of storage space, there always remains an option for you to buy a 128GB MicroSD card that still provides you plenty of space and costs as much as $80
Read more...

Saturday, 20 June 2015

This Simple Trick Requires Only Your Phone Number to Hack your Email Account !!

In order to get into your email account, an attacker does not need any coding or technical skills. All an attacker needs your email address in question and your cell phone number.



Here's How the Scam Works:


Send a text from an unknown number to the victim�s phone, asking them to verify their account by replying with the verification code they are about to receive in order to ensure their Google account is secure, but in real the code is a password resets code.
  • Send another text message containing an unlock code to the registered phone.
  • The victim receives the code with a text something like this: "This is Google. There has been unauthorized activity on your account. Please reply with your verification code.
  • As soon as victim responds with the verification code, the email address is forfeited, and the attacker can log into victim�s Gmail account without detection.
  • This social engineering trick sounds so easy and requires almost no technical skills to get into anyone�s email account.

    Most of us reply to the unknown phone calls and messages thinking it is from the company, as receiving messages and phone calls from companies is not something uncommon.

    Always be Defensive to such Scams


    Before watching the video, someone would have never thought of such a method to hack someone�s account.

    Of course, the untrained mind could easily fall victim to the text asking for a response. But, asSymantec says, "Legitimate messages from password recovery services will only tell you the verification code and will not ask you to respond in any way."

    The workaround is not to fall victim for such kinds of scams and always examine the messages you receive.
    SOURCE- THEHACKERNEWS
Read more...

Thursday, 11 June 2015

62.5 Million Zomato Users Hacked By Hackers 2015


The online restaurant and search service that provides food place near you, home delivery,dining outs and night life of many cities in India and in other 21 countries, hacked by hacker with a single simple API vulnerability in it and hacker also explaining the way they hack into Zomato database and have access to 62.5 millions users details.
This hack was because of the vulnerability that was there in zomato that leads to database hack and the security researcher Anand Prakash found vulnerability in zomato. And he done a simple API call in the browser_id and gain access to the database of Zomato. He had explain the whole step he done to hack zomato database and gaining access to millions details.
As creating account in zomato needs you phone number, addresses, date of birth, link Instagram account and some more. Now all these details got hacked by hackers and millions user�s details are now exposed.


Read more...

Wednesday, 3 June 2015

How to Hack a Computer Using Just An Image 2015

Next time when someone sends you a photo of a cute cat or a hot chick than be careful before you click on the image to view � it might hack your machine.


Yes, the normal looking images could hack your computers � thanks to a technique discovered by security researcher Saumil Shah from India.

Dubbed "Stegosploit," the technique lets hackers hide malicious code inside the pixels of an image, hiding a malware exploit in plain sight to infect target victims.

Just look at the image and you are HACKED!


Shah demonstrated the technique during a talk titled, "Stegosploit: Hacking With Pictures," he gave on Thursday at the Amsterdam hacking conference Hack In The Box.

According to Shah, "a good exploit is one that is delivered in style."

Keeping this in mind, Shah discovered a way to hide malicious code directly into an image, rather than hiding it in email attachments, PDFs or other types of files that are typically used to deliver and spread malicious exploits.

To do so, Shah used Steganography � a technique of hiding messages and contents within a digital graphic image, making the messages impossible to spot with the naked eye.

Here's How to Hack digital pictures to send malicious exploits:


Until now Steganography is used to communicate secretly with each other by disguising a message in a way that anyone intercepting the communication will not realise it's true purpose.

Steganography is also being used by terrorist organisations to communicate securely with each other by sending messages to image and video files, due to which NSA officials are forced to watch Pornand much porn.

However in this case, instead of secret messages, the malicious code or exploit is encoded inside the image�s pixels, which is then decoded using an HTML 5 Canvas element that allows for dynamic, scriptable rendering of images.

The "Secret Sauce" behind Stegosploit � this is what Shah calls it.


"I don�t need to host a blog," Shah told Motherboard, "I don�t need to host a website at all. I don�t even need to register a domain. I can [just] take an image, upload it somewhere and if I just point you toward that image, and you load this image in a browser, it will detonate."
The malicious code, dubbed IMAJS, is a combination of both image code as well as JavaScript hidden into a JPG or PNG image file. Shah hides the malicious code within the image�s pixels, and unless somebody zoom a lot into it, the image looks just fine from the outside.


Video Demonstration:


Shah demonstrated to Lorenzo Franceschi of Motherboard exactly how his hack works. He used Franceschi�s profile picture and then prepared a demonstration video using his picture as the scapegoat.

In the first video presentation, Shah shows a step by step process on how it is possible to hide malicious code inside an image file using steganography technique. You can watch the video given below:



In the second video, Shah shows how his Stegosploit actually works. His exploit works only when the target opens the image file on his or her web browser and clicks on the picture.

You are HACKED!

Once the image is clicked, the system�s CPU shoots up to 100 percent usage, which indicates the exploit successfully worked. The malicious code IMAJS then sends the target machine�s data back to the attacker, thereby creating a text file on the target computer that says � "You are hacked!"



Shah also has programmed his malicious image to do more stealthy tasks, like downloading and installing spyware on victim�s machine, as well as stealing sensitive data out of the victim�s computer.

The bottom line here is:


You should not presume the image files as "innocent" anymore, as they can hide malicious code deep inside its pixels that could infect your computers.

Therefore, always make sure before you click on one.


Shah has been working on the research [PDF] during his spare time for almost five years, but he has not tested his technique on popular image sharing websites like Dropbox or Imgur. He also admitted that his method might not work everywhere.

SOURCE- THEHACKERNEWS
Read more...

Friday, 1 May 2015

Famous Online Indian Portal �Rediff� Hacked By Palestinian Hacker 2015

On 30th April, 2015, a Palestinian-friendly hacker going with the online handle of HolaKo hacked and defaced a subdomain of Rediff.com, a famous Indian news, information, shopping and entertainment web portal.

The targeted domain (businessemail.rediff.com) belongs to Rediff enterprise providing emails, Windows andLinux web hosting services in India.
In an exclusive conversation with HolaKo, HackRead was told that reason for targeting Rediff was to deliver a message about Israeli occupation of Palestinianland.
The deface message was left in following words: 
HACKED BY HOLAKO, REDIFF MAIL OWNED!? W00T !! WE ARE THE BEST OF THE REST. FREE PALESTINE ! #SAVEGAZA
A full preview of the deface page is available below:
subdomain-of-indian-online-portal-rediff-hacked-by-palestinian-hacker
Link of targeted domain along with its zone-h mirror as a proof of hack is available below:
 I THINK THEY FOUND OUT I AM IN THEIR SERVER 
HolaKo claims he had access to Rediff�s databases, emails and login data, but the access was cutoff by site admin later on. 
In past the hacker was in news for defacing Institute of Electrical and Electronics Engineers (IEEE,org) website in support of Palestine. You can contact the hacker here.{AT YUOUR OWN RISK}
At the time of publishing this article, the targeted Rediff domain was restored and accessible online. 
Read more...

Tuesday, 28 April 2015

Crazy!!! Hacker Implants NFC Chip In His Hand To Hack Android Phones News

There is a very sleek line between hacking and security. The security used to protect the public could be misused by hackers against the public itself, and one shouldn�t forget that with the advance in technology, the techniques used by cyber criminals also improves.


Today, What hackers need to conduct a successful cyber attack?

Maybe just a computing device injected under the skin of their bodies, who can bear the pain, would be enough to help complete a successful cyber attack � also known as Biohacking.

This was exactly what presented by the former U.S. Navy petty officer and now engineer at APA Wireless Seth Wahle.


With no malicious intention, Wahle implanted a small NFC chip in his left hand right between his thumb and his pointer finger in order to display the risks of Biohacking.

Hacking Android devices using NFC implants:

For those unaware, NFC (Near Field Communications) chips embedded in our smartphone devices are used for transferring files and in various mobile payment applications.

Wahle's chip has an NFC antenna that is capable to hack Android devices and bypass almost all security measures. The chip can ping a nearby Android smartphone, prompting its user to open a link.

Once the user of the smartphone agrees to open that link, the link installs a malicious piece of software on the phone that allows the phone to connect to a remote computer controlled by the hacker.

The hacker would now be able to carry out further exploits on the victim's device, potentially putting all the important information and sensitive data of victim at risk.

How is NFC implant done?

In order to implant the NFC device, Wahle bought a chip designed to be injected into cattle and implanted the chip by an "unlicensed amateur" for $40 by using a needle which was larger than he had initially expected, Wahle told Forbes during a Skype call.

The worst part about NFC implant:

The chip implant into Wahle hand was almost invisible after few days. The major thing to worry about this technique is that the NFC chip goes completely undetected in almost all kinds of security measures, including the security checkpoints in airports and other high-security locations.

Wahle said that with the chip implanted in himself, he went through daily scans prior to leaving the military and the chip was never detected. But, he also notes that the X-rays would be able to detect the chip.

However, these Implantable NFC chips potentially open up a smart way for hackers to hack Android devices and networks and gain access to victims' sensitive information.
"This implanted chip can bypass pretty much any security measures that are in place at this point and we will show proof of that," said Rod Soto, the event�s secretary of the board and security consultant.
Limitations of the attacks:

There are some limitations to methods like this, as Wahle says that the remote connection made by a hacker to the server can only be kept if the affected Android device is not locked or rebooted.

However, these limitations could be overcome by various means. Like if, say, the affected phone is rebooted, a software run as a background service that starts on boot would fix the problem.

Wahle will be presenting his finding at the Hack Miami conference taking place this May, with Rod Soto. Both of them intended to alert about these latest strategies that can be used by hackers to hack terminals and networks.

They also admitted that this NFC implant-based attack could provide hackers and cyber criminals with a particularly useful "tool in their social engineering toolset."

For More Updated News Stay Connected 
LIKE US ON FACEBOOK
Read more...

Thursday, 23 April 2015

China Using A Powerful 'Great Cannon' Weapon to Censor The Internet

China has something very impressive that we are not aware of. The country has a powerful and previously unknown weapon that its government is using to bolster their cyber attack capabilities:


Dubbed "The Great Cannon."

INTERNET CENSORSHIP IN CHINA
When I talk about Internet censorship, it is incomplete if I don't mention China. China is famous for its Great Wall of China and Great Firewall of China. The censoring of Internet access and blocking an individual website in China by its government, known as the Great Firewall of China.

But, why the Chinese government does that? The answer is very simple:

The Chinese government restricts those contents it deems sensitive for its country's so-called democracy. It illegalize certain online speech and activities, block selected websites, and filter keywords out of searches initiated from computers located in Mainland China.

The worse:

Those Chinese citizens who offend authorities against Internet censorship in the country can also face judicial consequences.

GITHUB HIT BY MASSIVE DDoS ATTACK
Now:

The same thing I mentioned above China did few days ago to Github by launching a massivedistributed denial of service (DDoS) attack.

Github is a popular source code hosting website used by programmers to collaborate on software development.

The massive DDoS attacks, that intermittently shut down GitHub for more than 5 days, specifically targeted two popular Github projects �
  • GreatFire.org � Anti-censorship tool, hosted on GitHub, used to help Chinese citizens circumvent The Great Firewall Of China.
  • CN-NYTimes � A group on Github that hosts New York Times mirrors to allow Chinese netizens access to the news website, which is normally blocked in China.

But, how did the Chinese manage to produce DDoS attacks of so much strength and Bandwidth?

Yes, the answer is the "Great Cannon" (GC). Chinese government is now using a new cyber weapon in an effort to silence not only its citizens, but critics around the world, according to the latest report released by Citizen Lab.

THE GREAT CANNON � A NEW POWERFUL WEAPON
What's the Great Cannon?

The Great Cannon is a special cyber attack tool essentially capable of hijacking Internet traffic at the national level and then direct that traffic at targeted networks the attackers want to knock offline, sending back spyware or malware, or using the target to flood another website with traffic.

It is believed that Github's attackers used the Great Cannon as a DDoS attack tool to redirect the Internet traffic of visitors to Chinese search engine giant 'Baidu' or any website that used Baidu�s extensive Advertisement network in order to cripple the popular code-sharing website.

In simple words:

Those visiting a Baidu-affiliated website from anywhere in the world were vulnerable to getting their Internet traffic hijacked by the attackers, which could then be turned into a weapon to flood anti-censorship websites, like GitHub, with too much of junk traffic.

Let�s have a look on how the Great Cannon was deployed in the GitHub and GreatFire.org attacks:
HOW THE GREAT CANNON WORKS?
The Great Cannon works by intercepting data which is sent between two nodes and then redirecting the data to a third one. This powerful cyber weapon seems to leverage an analytic script, which is commonly distributed by the Chinese search engine Baidu.

Now:
Generally this script is not malicious, but according to Citizen Lab, the Cannon's creators tampered with the script code a little bit in order to redirect the user to Github, instead of sending a data packet, thus flooding the target website with traffic from unsuspecting users.

The weapon is also capable of producing a full-fledged man-in-the-middle (MITM) attack, so it could also be used to intercept unencrypted emails.

It makes me remind of:

QUANTUM � an NSA's similar weapon that was capable to redirect victims to fake websites containing malware served through unencrypted sites using Man in the middle attacks to a spoofed server, which can respond faster than the real one that is placed somewhere on the Internet backbone.

These secret Internet backbone nodes, which the National Security Agency, dubbed Quantum nodes.

What's more:

This new move by Chinese government could signal a trouble in China's online behavior � Shifting from the passive censorship of the Great Firewall of China to the active censorship by readily attacking foreign websites with the Great Cannon.

Cyber attacks originating in China are not at all surprising. But...

..."the operational deployment of the Great Cannon represents a significant escalation in state-level information control: the normalization of widespread use of a [cyber] attack tool to enforce censorship by weaponizing users," the security researchers from the University of Toronto and University of California wrote in a report published Friday.

MEASURES TO MITIGATE THE GREAT CANNON
According to the researchers, the Great Cannon weapon used by Chinese authorities could be neutralized to a great extent if the websites communicate over encrypted HTTPS connections.

Why? The reason:

Those websites whose communications are end-to-end encrypted is difficult to modify for an attacker sitting in between the sender & the receiver, unless and until those websites are not loading files or resources via unencrypted i.e. non-HTTPS connections.
Read more...

Wednesday, 22 April 2015

Hacker Who Stole Money From Bill Gates Arrested in Philippines 2015

What if you get into the bank account of the World�s most richest person?
 Maybe it could be difficult for you as well as I. But not for this guy�


Konstantin Simeonov Kavrakov, a Bulgarian hacker, who hacked into the ATM and stole thousands of dollars from the bank account of Microsoft mogul Bill Gates with fake ATM cards arrested in Philippines, according to the Philippine National Police.

The 31-year-old man was arrested red-handed by the Philippine National Police while he was withdrawing cash from an ATM using fake cards.

He had stolen tens of thousands of dollars from many victims by hacking into the automated teller machines (ATMs).



In 2011, Kavrakov got arrested and was jailed in Paraguay for hacking into the Bill Gates' account in The Philippines' densely-populated Quezon City and stealing thousands of dollars. Since then Kavrakov was on the hit list of many countries police.

During the arrest, the police recovered seven cloned credit cards, nine PPS Bank Quezon Avenue ATM branch receipts, and P76,570 (US$1715) in hand.

The assorted credit cards include a Citi Visa, Eastwest Bank Vice, Citibank MasterCard, Standard Chartered MasterCard, Citibank Visa, Citi MasterCard and a blank Gold card.

The arrest took place in a joint operation of the Presidential Anti-Organized Crime Commission (PAOCC) and Philippine National Police�s Criminal Investigation and Detection Group (CIDG).

The police believe that Kavrakov is the head of an International network of cloning bank cards, which was actively working in United States and European countries from last 10 to 12 years.

Kavrakov was under surveillance operations, Operation Jugador ('Gambler'), by the authorities that target foreign carders and online gamblers.
!!!!!!
Read more...

Tuesday, 7 April 2015

White House computers hacked by Russians 2015

Russian hackers penetrated a White House computer system and were able to eyeball sensitive information � including details of President Obama�s schedule that were supposed to be secret, a new report said Tuesday.

The hackers were believed to be the same ones who cracked into computers at the State Department in recent months, CNN reported.
White House sources said the hackers had not accessed any classified information � but that other information considered �sensitive� was breached, including Obama�s schedule.
The FBI, Secret Service and US intelligence agencies are all investigating the embarrassing breakdown in cyber security, which they say was among the most sophisticated attacks ever launched against the US government, the network reported.?
A top Obama aide insisted the president�s classified computer system was secure � but acknowledged weaknesses in its unclassified system.
�There�s always vulnerability,� said adviser Ben Rhodes.
But he would not confirm exactly what nonclassified data was swiped or identify the Russians as the culprits.
And a spokesman for the National Security Council downplayed the revelation.
�This report is not referring to a new incident � it is speculating on the attribution of the activity of concern on the unclassified EOP network that the White House disclosed last year,� NSC rep Mark Stroh told The Post.
�We took immediate measures to evaluate and mitigate the activity.�
The White House acknowledged in October that it detected suspicious activity on its unclassified network while assessing possible cyber threats.
The network said the hackers targeted sensitive information � such as real-time details of the president�s schedule.
Such information is not classified but is still highly sensitive and prized by foreign intelligence agencies, sources said.
To get to the White House, the hackers first broke into the State Department�s computers � and may still be able to gain access at State despite beefed-up security efforts.
Reports about the State Department and White House hacks also come as former Secretary of State Hillary Clinton is in hot water over her use of a private e-mail server in her Westchester home to conduct official government business.
Read more...