Google Chrome may not be as safe as it was thought to be. Recently, a security engineer, Bosko Stankovic, found a vulnerability in Google Chrome that hackers can easily exploit to get a user’s credentials such as their username and password and poten…
Chelsea Manning, Alleged Wikileaks Whistleblower Released from Jail 28 Years Early
Chelsea Manning, the first convicted source to Wikileaks is free from prison as of…
Source: Chelsea Manning, Alleged Wikileaks Whistleblower Released from Jail 28 Years Early appeared first on Freedom Hacker the number one source for hacking news, security news & everything cyber.
WikiLeaks Posts User Manuals for CIA Malware AfterMidnight and Assassin
WikiLeaks recently leaked some files as part of its Vault 7 series, that contained user manuals for two malware called, Assassin and AfterMidnight. According to the documents, these viruses belong to the CIA.
What is AfterMidnight?
Unlike th…
Hackers hold unreleased Pirates of the Caribbean movie to ransom
The CEO of Disney Bob Iger has reportedly warned that hackers are holding the unreleased copy of “Pirates of the Caribbean” movie which is due to be released this summer by Disney franchise but the hackers are demanding a massive amount of ransom pay…
From Shodan to Remote Code Execution #2 – hacking OpenDreambox 2.0.0
A sequel to the last post of what is now becoming a series of “From Shodan to remote code execution”, we now take a look at how to hack misconfigured Dreambox installations. Dreambox is a company which offers Digital TV set top boxes and ot…
The Bondnet Army: Questions & Answers
The following is a select list of questions and answers that we hope will shed more light on the botnet.
The Best DIY Home Security Systems
Whether you own or rent your home, a security system offers peace of mind against theft, fire and other hazards. However, monthly fees for professionally monitored security systems may be too much for your budget.
The post The Best DIY Home Security Systems appeared first on iSmartSafe.
Two-factor authentication for banking
Clearly, you should not use SMS for banking authentiation. We have been saying this for over eight years now. The solution must use encryption that you control.
Any hardware-based solution like key fobs would be very expensive and difficult to scale…
Exploiting Windows with Eternalblue and Doublepulsar with Metasploit!
Most of us got hold of the NSA exploits recently released to the public and there was so much hype and public statements around it. A lot has been said, and most vendors came out to defend their products and to release patches to downplay/mitigate the …
How to reduce the consequences of Data Breach
The storing and processing of data sets that contain personally identifiable information (PII) is increasingly regulated and is subject to onerous notification requirements when data breaches occur. Such data includes health information, finan…