Search results

  1. Hacker

    LockBit ransomware app

    The LockBit ransomware app is launching a new series of attacks against employees of organizations in Taiwan, Italy, the United Kingdom and Chile. The app offers a reward of millions of dollars for valid login credentials. Representatives of the Trend Micro company told about it. Unlike the...
  2. Hacker

    How is a bank password stolen?

    The bank password can be stolen both by an intruder and by a person familiar to the victim who has gained access to the password or to the victim's device where it is stored, the director of the Center for Expertise told Prime There are several ways to leak user credentials: password guessing...
  3. Hacker

    Why Two-Factor Authentication Doesn't Guarantee Security!

    Hacking user accounts is usually blamed on the users themselves. The position of cybersecurity experts is that people stubbornly do not want to protect themselves and use extremely weak passwords. Let's be honest and admit that in many cases this is the case - users are just too lazy to come up...
  4. Hacker

    A well-known banking Trojan for hacking ATMs

    Banking Trojans that steal money from the accounts of companies and ordinary users cause millions of dollars in damage every year. Naturally, virus makers try to keep everything related to the internal cuisine of bankers in the deepest secrecy. That is why we could not miss a unique event -...
  5. Hacker

    Voice changer on dictaphone

    If, for any reason, you decide to change your voice on a sound recording, then you can use the following online service voicechanger.io. 1. Follow the link and select "Upload audio" to upload the finished audio file; 2. After loading, in the window that opens, select the sound we need; 3. We...
  6. Hacker

    We install a powerful wiretap on someone else's phone

    We will listen using a regular link. We will analyze the creation below, but to generate the link, be sure to turn off wifi, turn on the access point, and at the same time you must have a mobile Internet. Let's get started: 1. Launch thermux and enter these commands: • pkg upgrade • pkg...
  7. Hacker

    How to change geolocation in Google Chrome browser?

    There can be many reasons for hiding your location from the websites you visit, from the desire to gain access to regional content to testing your services in different countries. However, due to the existence of technologies such as the Geolocation API, which allows to determine the location...
  8. Hacker

    How do they steal the firmware of devices and how to protect themselves from it?

    All of us in childhood were armed with screwdrivers and disassembled some device in order to understand how it works. For some it has become a profession, but the years when the experimental devices did not resist the study have already passed. Now every coffee maker is trying with all its might...
  9. Hacker

    The history of the Ryuk ransomware Trojan

    FBI officers who spoke at an information security conference in South Africa called the Ryuk ransomware Trojan the most profitable ransomware on the market. That, however, is not surprising: according to the company Advanced Intelligence and HYAS, Trojan operators today have earned about 150...
  10. Hacker

    We are building a cyber testing ground for hacker tests

    When testing security tools, as well as training personnel in attack scenarios and protecting network infrastructure, virtualization tools are indispensable. The wheel is often reinvented for this, constructing a terrible jumble of virtual machines and all kinds of software. We will take a...
  11. Hacker

    How do scammers hide their sites on the Internet?

    Analyzing fraudulent sites, you sometimes marvel at the ingenuity of crooks. Either they offer you free pizza, or morgencoins ... There are also resources that you cannot say immediately that they are fraudulent: these sites simply collect contacts, so that later, after forming a database, they...
  12. Hacker

    Exploration utilities for hunting with bugs

    Any hack begins with collecting information about the target. The faster and better you collect information, the greater the chance of finding a cool bug, reporting it first and getting a reward. Unlike pentesting, bugbounty involves hundreds of thousands of people at the same time, and services...
  13. Hacker

    How to detect a hacker attack?

    There are many ways to exploit most of the vulnerabilities. For a hacker attack, you can use one exploit, several exploits at the same time, incorrect settings of software components, or even a backdoor program installed in the operating system during a previous attack. Because of this...
  14. Hacker

    The most famous hackers and what happened to them

    Despite the huge number of warnings, we are not used to expecting something bad from the Internet, because the World Wide Web offers easy access to information and quick communication with people from different parts of the world. However, in addition to the many advantages that the Internet...
  15. Hacker

    The largest cyber robbery of the century

    This article was written for educational purposes only. We do not call anyone to anything, only for information purposes! The author is not responsible for your actions The largest cybercrime of the century was committed by the CARBANAK criminal group. Who does this group consist of? It is...
  16. Hacker

    The most technologically advanced heists

    In many crime films, you can see the scene of a beautiful robbery of a bank or a cash-in-transit car. Criminals use high-tech gadgets, drill walls with laser cutters, use scout robots, cleverly disable alarms and trick motion sensors. Is it true? Are there many high-tech robberies in the real...
  17. Hacker

    Information systems vulnerabilities

    Vulnerabilities related to vulnerabilities in system and application software. The current vulnerabilities of system and application software include the following vulnerabilities: - system functions and procedures, with a certain change in the parameters of which it is possible to use them for...
  18. Hacker

    Creating an OpenVPN server. We monitor traffic and filter ads.

    This article was written for educational purposes only. We do not call anyone to anything, only for information purposes! The author is not responsible for your actions In this article, we will create our own VPN server that will bypass blocking and slowdowns of sites, as well as block really...
  19. Hacker

    Top selection of hosting services for projects

    The process of creating a website is always accompanied by various technical nuances, and this does not depend on the purpose of the created Internet platform, the developer's experience and professionalism. The most frequent questions include choosing a hosting provider that provides hosting...
  20. Hacker

    How do I view the history of opening files and folders?

    For example, if a user suspects that someone is hacking into their operating system and working on it without permission. Tracking your browsing history and open / saved files is not an easy task. There are various ways to get information that the user is interested in. We will focus exclusively...
Top