Search results

  1. Hacker

    Аккаунты гидры с балансом - осторожно, скам!

    Всем доброго вечера. Вероятно, многие из вас видели рекламу в различных ПАВ-каналах о продаже «аккаунтов гидры с балансом». Не ведитесь на это дерьмо, это лютый скам. Схема работы проста: продавцы подобного товара и в правду имеют сфишенные аккаунты трёхголовой, но крайне выборочно выдают...
  2. Hacker

    CCTools 7.5

    Хотите помимо вашего IP-адреса сменить и ID своего железа? Тогда эта утилита для Вас! Сайты, которые любят шпионить, будут видеть только изменённые ID вашего железа. Данная программа предназначена для работы с различными ID системы, быстрой их смены, а так же дополнительные утилиты которые...
  3. Hacker

    Ways to communicate with different types of people

    The famous psychologist James Borg in his book The Power of Persuasion. The art of influencing people ”identifies five main types of interlocutors, respectively, each of these types of people need to apply their own communication methods, this is the key to successful communication. 1. “What...
  4. Hacker

    How to check your webcam for hacks: a 7-point checklist

    If an attacker gains access to your webcam and starts spying on you, you can get into a lot of trouble. Author: Neeraj Chand The webcam is one of the most common and important devices that can be used for a variety of tasks. On the other hand, this device poses the most serious threat to your...
  5. Hacker

    The Role of the Human Factor in Ensuring Internet Security

    We live in a progressively developing world, and the topic of electronic technology no longer surprises us. Tablets, smartphones and “smartwatches” have become everyday attributes for us, and mobile operators have made a lot of efforts to provide their users with Internet access from anywhere in...
  6. Hacker

    Another dump appeared on the darknet, this time 93 million users are selling records

    Last week, a hacker (or a group of individuals) using the pseudonym Gnosticplayers put up two large dumps for sale on the Dream Market. The first set includes data from 620 million users on 16 major sites, including MyHeritage, 500px and Dubsmash. For this dump, the attacker asked for a total...
  7. Hacker

    Review of the best mobile spies

    There are several dozen spyware / mobile spyware that can be remotely installed on a mobile phone in "quiet mode" and spy on its owner without revealing its presence. It was previously believed that by adhering to the so-called cybersecurity hygiene, you can reliably protect yourself from such...
  8. Hacker

    Manipulation of people

    Manipulation: definitions and types Manipulation- methods of social influence on people using the mass media, economic, political, social and other means in order to impose certain ideas, values, forms of behavior, etc. The term "manipulation" is perceived by the society with a rather negative...
  9. Hacker

    Anti-criminalistics. How to protect your smartphone from data extraction.

    A kind of trigger that caused the appearance of this article was a huge number of publications in a wide variety of publications, including quite technical ones. All these publications, without a single exception, sadly repeat the same mantra: use a strong lock code, turn on the fingerprint...
  10. Hacker

    14 gadgets for a cracker

    Unusual types of devices and gadgets are not limited to special services and 007 agents. Quite a few devices have been specially designed for the needs of hackers and security researchers. What are they? We decided to put together a real hacker's suitcase. Why is this needed? Anyone who is...
  11. Hacker

    Quench the wave! Select and configure the hardware Wi-Fi deauthenticator on the ESP8266

    A Wi-Fi jammer, or a Wi-Fi jammer, is a gadget designed to disconnect wireless devices from a hotspot. Why is this needed? You can imagine both a friendly prank (a neighbor, of course, will be glad when you cut off his porn video or, for example, a football match at the most interesting place)...
  12. Hacker

    Criminals have learned to bypass the stolen iPhone blocking feature

    Criminals use several methods to unlock stolen iCloud-locked devices. Back in 2013, Apple implemented a security feature in the iPhone designed to make the device unattractive to thieves. Since an iPhone can only be associated with one iCloud account, it must be completely deleted for a...
  13. Hacker

    Two hack groups are responsible for 60% of the hacks of well-known cryptocurrency exchanges

    According to analyst firm Chainalysis, only two hacker groups are responsible for 60% of publicly known incidents involving attacks on cryptocurrency exchanges. Researchers estimate that the criminals have already stolen about a billion dollars. In the expert report, the groupings are codenamed...
  14. Hacker

    Hacker who stole $ 5 million through SIM card fraud got 10 years in prison

    For the first time in the California county of Santa Clara, a condemnation of a swindler involved in the so-called SIM swap has been pronounced. 20-year-old student Joel Ortiz, who stole cryptocurrency from 40 people worth about $ 5,000,000, pleaded guilty and sentenced him to 10 years in...
  15. Hacker

    Conspiracy theories: how to distinguish the solid ground of fact from the swamp of fiction

    Uncertainty and ambiguity make it possible for conspiracy to penetrate from the periphery into the center of public life. Fortunately, we have the tools at our disposal to determine if we have fiction or conspiracy theory. These tools include common sense, knowledge of history, and the ability...
  16. Hacker

    Method of obtaining information of interest

    The preliminary study of the interlocutor, of course, is one of the most important tasks of the method of obtaining information. In practical terms, one should take into account those norms that regulate the behavior and attitudes of people in the process of communication and significantly...
  17. Hacker

    Firefox configuration help

    Configuring anonymity in the Mozilla Firefox browser Today we will talk about setting up the Mozilla Firefox browser, and we will talk about the features that increase its anonymity. How do I disable tracking in Firefox? You will not find the following browser settings in the standard...
  18. Hacker

    A hacker group that blackmails the United States

    Origin DarkSide first announced themselves in August 2020, when they publicly presented their malware. The product is called RaaS. After that, the group gained popularity due to the fact that the operations were carried out efficiently, but most importantly - professionally. It can also be noted...
  19. Hacker

    Becoming anonymous

    Anonymous anonymity Let's talk about how to set up Bitvise and Proxifier without giving away your not-so-secret hideout. So, let's begin: First, download the proxyufier (human name above) Downloading Install, run and activate with a key from the Internet. If you did everything correctly...
Top