All for Joomla All for Webmasters
Home Tags Hacking

Tag: Hacking

Hacking

NadraGate Part 2 – PaperPk 200,000 Users Data At Risk

PaperPk.com is an online Jobs Searching platform like Rozee.pk where the users can find jobs from all newspapers ads. All latest jobs are mostly advertised in...

Trump says China could have hacked Democratic emails

President Donald Trump said China may have hacked the emails of Democratic officials to meddle with the 2016 presidential election, countering the view of...

Russian man gets longest-ever US hacking sentence, 27 years in prison

Russian hacker Roman Seleznev was sentenced to 27 years in prison today. He was convicted of causing more than $169 million in damage by hacking into point-of-sale computers. Seleznev,...

CIA cyber-spying toolkit now in hands of hackers worldwide: WikiLeaks

Amid a trove of documents released by WikiLeaks that allegedly contains “the entire hacking capacity of the CIA” is chilling evidence that everyday devices...

Your child’s teddy bear could now be vulnerable to hacking

This content was originally published by MarketWatch. Original publishers retain all rights. Two million recordings between parents and children were exposed to potential hackers. Wi-Fi connected...

Exploit with OS Command Injection

OS command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application....

Indian Ministry of Home Affairs website hacked

The Ministry of Home Affairs website was hacked today, prompting authorities to temporarily block it, an official said. The MHA website was immediately blocked by...

Bypass HTTP Basic Authentication with Nmap and Metasploit

Basic HTTP authentication is a method for providing username and password when making a request for particular web resources. The client sends the user...

Saudi Arabia again hit with disk-wiping malware Shamoon 2

Saudi Arabia has issued a warning to local organizations that the Shamoon virus that had hit state-held oil giant Saudi Aramco in 2012 has...

How to configure Proxychains with tor in Kali Linux

The goal of this tutorial is to configure proxychains with tor in Kali Linux in order to anonymize all the web traffic including network...

Top 33 Wireless Attacking Tools by Kali

We have compiled a group of Wireless Attacking Tools available in Kali that are used for wireless attacks. Note: This post is for experimental purposes. 1....

North Korea hacks South’s military cyber command

According to news released by BBC, South Korea's military cyber command, set up to guard against hacking, appears to have been breached by North...

DailyMotion Allegedly Hacked, 85 Million User Accounts Stolen

This time one of the World's leading video sharing platform Daily Motion is targeted by an unknown hacker. According to Bleeping Computer unknown hacker...

Introduction to HTTP Parameter Pollution

HTTP Parameter Pollution, or HPP, occurs when a website accepts input from a user and uses it to make an HTTP request to another system...

US Government wants you to hack US Military and Pentagon

Usually you won't see any organization or institution allowing you to hack their internal system for any cause but this time without getting into...