Home » Tag Archives: hacking

Tag Archives: hacking

C:\Users\Vitáris\Desktop\twerk\img\hack-wi-fi-selecting-good-wi-fi-hacking-strategy.1280x600.jpg

Dispatch from Academia: Exit scams, hacking, violence, predation and fraud

Rasmus is a PhD student at the School of Criminology at University of Montréal. He has studied DNM’s since early 2014 and has, among other things, researched the politics of DNM’s, the demand DNM’s satisfy, how DNM’s affect global drug trafficking and much more. Currently his PHD research centers around trust and transactions on DNM’s, and he works with leading ... Read More »

Court Rules FBI Can Keep Phone Hacking Tool Secret from the Public

On December 2nd, 2015 Syed Rizwan Farook committed one of the worst terrorist attacks in the history of California, shooting 14 people and seriously injuring 22 other people. After Farook died in a shootout with law enforcement, the FBI seized Farook’s iPhone 5c. During the investigation into the terrorist attack, the FBI was unable to decrypt Farook’s iPhone. The FBI ... Read More »

The Art Of Google Hacking

When it comes to Google, everyone feels confident in knowing what we’re talking about. Google is that nice site that allows us to search whatever we want on the web. More technically, it’s a search engine, something that knows our preferences, our tastes and even (sometimes) our secrets. Google is easy, isn’t it? It appears as a blank page with ... Read More »

DEA in Talks with iPhone Hacking Group

The United States’ Drug Enforcement Agency (DEA) recently revealed to be in talks with an Israeli malware and hacking organization known as the NSO Group. The NSO Group has ties to the Israeli military and intelligence agencies. The Israeli malware company’s top selling product, Pegasus, is a backdoor for Apple iPhones and iPads. Pegasus can even infect the newest fully ... Read More »

More CIA Android Hacking

  WikiLeaks published another entry in their Vault 7 collection of CIA leaks. The new documents released by WikiLeaks detail a program called HighRise, which infects Android phones and devices, and intercepts and redirects SMS text messages to a remote server controlled by the CIA. The user manual for HighRise version 2.0 comes from the CIA’s Information Operations Center. According ... Read More »

25-Year-Old Admits Hacking the Department of Defense

On June 15, the UK’s National Crime Agency announced that a 25-year-old hacker pleaded guilty to hacking the United States Department of Defense. He hacked a DoD satellite communication system in June 2014 and upload evidence two months later. Working with the FBI and DoD, the NCA arrested the hacker, Sean Caffrey, in March 2015. At Birmingham Crown Court, Caffrey ... Read More »

Local Police Contract the Same Hacking Firms as the FBI

C. Aliens Local Police Contract the Same Hacking Firms as the FBI As part of an ongoing investigation into law enforcement’s forensic procedures regarding cellphones, Muckrock filed Freedom of Information Requests with several police Departments in the US. The organization wanted information related to utilization logs, guidelines, policy, and even payment contracts. They requested the payment information from commercial hacking ... Read More »

Leaked UK Privacy Law Requires ISP Spying and Hacking

According to a recently leaked draft of the Investigatory Powers bill, the UK government is searching for a new mass surveillance method. And not in the sense that the government is asking private firms how to access the darknet to purchase stolen NSA tools; they are in the process of developing a plan to force those fortune, namely ISPs, into ... Read More »

Research Claims: The Dark Net Is Less Vulnerable To Hacking Attacks

The dark web is a part of the internet, which provides and maintains anonymity to its users. People can use this privacy to either illegal and legal ways. For example, in countries where freedom of speech is oppressed, or the media is censored, the citizens can use the Tor browser to connect to the dark web and anonymously browse the ... Read More »

International Hacker Pleaded Guilty Hacking 13,000 Computers

In Newark, New Jersey, the administrator of two so-called “hacking forums” pleaded guilty to two charges from a six-count indictment. The administrator end International hacker admitted that he committed wire fraud and aggravated identity theft in New Jersey and many known and unknown locations in the United States. The hacker/admin, Sergey Vovnenko, worked with an international criminal investigation from 2010 ... Read More »

hacking and politics.png

Hacking and Politics – Can Hackers Change World Politics?

Researching through Science and Technology Studies STS along with application of the social movement theory, present literature has tried to examine the relationship between hacking and politics. Most authors only present questions without proposing any answers. Most authors resist equating political activism with hacking. Hacking is unique, especially when considering Gabriella Cleman’s phrase “the political agnosticism of hackers” . This ... Read More »

Five Arrested for Hacking 41 ATMs and Stealing $2.5m in Taiwan

According to a press release from Europol, law enforcement in Europe and Asia ran a “complex operation” that resulted in five arrests. Three separate law enforcement agencies made the arrests after collecting intel during the year-long investigation into “an organized criminal group.” The European and Asian law enforcement agencies involved—agencies in Romania, Belarus, and Taiwan—successfully convicted three of the five ... Read More »

Wireless Hacking #1

Welcome to the first of a series of articles dedicated to the art of hacking wifi Internet connections using Kali Linux and terminal commands. You will know: • What are the different flavors of wireless networks you’ll encounter and how difficult it is to hack each of them. • What are hidden networks, and whether they offer a real challenge ... Read More »

Security Researchers Found a “One-Stop-Shop” for Hacking Tools on Command and Control Server

Security researchers from Kaspersky Lab’s Secure List described the accidental discovery of a “one-stop-shop” for hacking tools. The Kaspersky Lab team intercepted traffic from machines infected with the Hawkeye RAT and “stumbled upon an interesting domain.” They found a command and control server that saved the keylog data provided by the HawEye RAT. The server additionally sold hacking software, tools, ... Read More »