Archive | Legal Issues




UK Encryption Backdoor Law Passed Via Investigatory Powers Act

The latest news out of my homeland is not good, the UK encryption backdoor law passed via Investigatory Powers Act or the IPA Bill as it’s commonly known. And itself was passed through a kind of backdoor route, which avoided the scorn of the public. Which was good for the lawmakers, but not for the […]

Tags: , , , , , , ,

Posted in: Cryptography, Legal Issues, Privacy | Add a Comment

UK Teen Earned More Than US$385,000 From DDoS Service

Another DDoS service down after the owner got busted, this time a UK teenager who created the service called Titanium Stresser when he was just 15. Not long ago we wrote about the two Israeli guys who got busted for running the VDoS-s.com DDoS Service. There seems to be a bit of a crack down […]

Tags: , , , , , , , ,

Posted in: Legal Issues, Network Hacking | Add a Comment

Massive Yahoo Hack – 500 Million Accounts Compromised

So if you are a Yahoo user (which most of us probably have been at some point) you will be aware of the Yahoo Hack – with 200 Million e-mail addresses being up for sale on the black market it seems up to 500 million have been compromised in one of the biggest hacks yet. […]

Tags: , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Legal Issues, Privacy | Add a Comment

Two Israeli Men Arrested For Running VDoS-s.com DDoS Service

DDoS or Booter services have been around for a while, but VDoS-s.com was a particularly slick (and shameless) one with a content marketing strategy and active social media accounts. Two Israeli men were arrested for running the service after ironically being hacked by a security researcher. They called their service a ‘Stresser’ and claimed to […]

Tags: , , , , , , , , ,

Posted in: Legal Issues, Network Hacking | Add a Comment

Criminal Rings Hijacking Unused IPv4 Address Spaces

So apparently this Hijacking Unused IPv addresses has been going on for a while, but with quite a lot number of attempts recently it’s ramped up a LOT since the September announcement by ARIN about IPv4 depletion. There was only only 50 hijacking attempts between 2005 and 2015. Since September, ARIN has already seen 25 […]

Tags: , , , , , , , , ,

Posted in: Legal Issues, Network Hacking | Add a Comment

The Panama Papers Leak – What You Need To Know

The HUGE news this week is the Panama Papers leak, a massive cache of 11.5 million documents leaked to a German Newspaper (Süddeutsche Zeitung) in August 2015. It’s one of the most significant data leaks of all time and Edward Snowden has labelled it as “the biggest leak in the history of data journalism”. It’s […]

Tags: , , , , , , , , ,

Posted in: Legal Issues, Privacy | Add a Comment

FBI Backed Off Apple In iPhone Cracking Case

So the big furore this week is because the FBI backed off Apple in the whole Apple vs the World privacy case regarding cracking the iPhone Passcode of the phone belonging to the San Bernardino gunman Syed Farook. If you’re not familiar with the case, catch up with it here: FBI–Apple encryption dispute. The latest […]

Tags: , , , , , , , , ,

Posted in: Apple, Legal Issues | Add a Comment

TalkTalk Hack – Breach WAS Serious & Disclosed Bank Details

So it turns out the TalkTalk hack is a lot more serious than they initially tried to make it out to be, TalkTalk claimed that it’s core system wasn’t compromised and only the website was breached. But now they’ve admitted the hackers got away with bank account numbers, partial credit card numbers and dates of […]

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Legal Issues, Privacy | Add a Comment

More Drama About Hillary Clinton’s E-mail Leak – VNC & RDP Open

So this Hillary Clinton’s e-mail leak case has been a pretty interesting phenomena to observe and has been going on since last month, we didn’t really cover it as well it mostly concerns US politics – not a huge area of interest for most. But it’s getting more and more interesting, there was a report […]

Tags: , , , , , , , , ,

Posted in: Legal Issues, Privacy | Add a Comment

Drones, Tor & Remailers – The Story Of A High-Tech Kidnapping

This whole thing sounds like something straight out of CSI: Cyber with references to Drones, Tor, remailers, anonymous image sharing and the scrubbing of meta data. Pretty interesting reading, although it rather smells like a lot of exageration. A super high-tech kidnapping – gone wrong in the end. Whoever wrote tho e-mails sent to the […]

Tags: , , , , , , , ,

Posted in: General Hacking, Legal Issues, Privacy | Add a Comment

Popular Tags

computer-security · darknet · Database Hacking · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · XSS ·