Since 2015 the Dark Web marketplaces have been flourishing. From drugs, weapons, databases, fake documents to all sorts of illegal stuff are available for anyone at anytime. Recently, HackRead found out a vendor going by the online handle of “nclay” …
CryptoMining malware Adylkuzz using the same vulnerability as WannaCry
It seems that WannaCry had a predecessor that apparently carried out attacks which involved mining the cryptocurrency Monero using the same vulnerability found in Windows’ Sever Message Block (SMB) protocol.
Adylkuzz – another NSA enabled malware: A…
ExtraTorrent permanently down;
The world renowned torrenting platform ExtraTorrent (ET) has been shut down on permanent bases. The announcement came just a few minutes ago when users visiting the site saw a brief message on its home page stating that ExtraTorrent along with all of…
Chrome vulnerability can allow attackers to steal user credentials
Google Chrome may not be as safe as it was thought to be. Recently, a security engineer, Bosko Stankovic, found a vulnerability in Google Chrome that hackers can easily exploit to get a user’s credentials such as their username and password and poten…
Chelsea Manning, Alleged Wikileaks Whistleblower Released from Jail 28 Years Early
Chelsea Manning, the first convicted source to Wikileaks is free from prison as of…
Source: Chelsea Manning, Alleged Wikileaks Whistleblower Released from Jail 28 Years Early appeared first on Freedom Hacker the number one source for hacking news, security news & everything cyber.
WikiLeaks Posts User Manuals for CIA Malware AfterMidnight and Assassin
WikiLeaks recently leaked some files as part of its Vault 7 series, that contained user manuals for two malware called, Assassin and AfterMidnight. According to the documents, these viruses belong to the CIA.
What is AfterMidnight?
Unlike th…
Hackers hold unreleased Pirates of the Caribbean movie to ransom
The CEO of Disney Bob Iger has reportedly warned that hackers are holding the unreleased copy of “Pirates of the Caribbean” movie which is due to be released this summer by Disney franchise but the hackers are demanding a massive amount of ransom pay…
From Shodan to Remote Code Execution #2 – hacking OpenDreambox 2.0.0
A sequel to the last post of what is now becoming a series of “From Shodan to remote code execution”, we now take a look at how to hack misconfigured Dreambox installations. Dreambox is a company which offers Digital TV set top boxes and ot…
The Bondnet Army: Questions & Answers
The following is a select list of questions and answers that we hope will shed more light on the botnet.
The Best DIY Home Security Systems
Whether you own or rent your home, a security system offers peace of mind against theft, fire and other hazards. However, monthly fees for professionally monitored security systems may be too much for your budget.
The post The Best DIY Home Security Systems appeared first on iSmartSafe.