Archive | Privacy




MongoDB Ransack – Over 33,000 Databases Hacked

Ah our favourite database in the news again, being hailed as the MongoDB Ransack a whole bunch of people have turned the insecure MongoDB default configuration into a ransom opportunity. They are deleting/stealing databases and soliciting bitcoin payments to return the data. With multiple actors doing the same stuff though it’s hard to know who […]

Tags: , , , , , , , , ,

Posted in: Database Hacking, Privacy | Add a Comment

Exitmap – Tor Exit Relay Scanner

Exitmap is a fast and modular Python-based Tor exit relay scanner. Exitmap modules implement tasks that are run over (a subset of) all exit relays. If you have a background in functional programming, think of exitmap as a map() interface for Tor exit relays. Modules can perform any TCP-based networking task; fetching a web page, […]

Tags: , , , , , , ,

Posted in: Network Hacking, Privacy | Add a Comment

UK Encryption Backdoor Law Passed Via Investigatory Powers Act

The latest news out of my homeland is not good, the UK encryption backdoor law passed via Investigatory Powers Act or the IPA Bill as it’s commonly known. And itself was passed through a kind of backdoor route, which avoided the scorn of the public. Which was good for the lawmakers, but not for the […]

Tags: , , , , , , ,

Posted in: Cryptography, Legal Issues, Privacy | Add a Comment

Android Devices Phoning Home To China

So unsurprisingly a security researcher found some cheap Android devices phoning home to China when buying a phone to travel with. One of the phones seems to be Blu R1 HD, which is ‘Currently unavailable’ on Amazon.com and customers that bought it have received security update e-mails. Security researchers have uncovered a secret backdoor in […]

Tags: , , , , , , , , , , ,

Posted in: Malware, Privacy | Add a Comment

Signal Messaging App Formal Audit Results Are Good

I’ve recommended Signal Messaging App quite a few times and I do use it myself, I know there are some privacy concerns with the fact it requires Google App Store – but that’s the developers choice. It’s a pretty solid app, clean, sleek and works well across both Android and iOS and the latest news […]

Tags: , , , , , , ,

Posted in: Countermeasures, Cryptography, Privacy | Add a Comment

Censys – Public Host & Network Search Engine

Censys is a public host & network search engine that allows computer scientists to ask questions about the devices and networks that compose the Internet. Driven by Internet-wide scanning, Censys lets researchers find specific hosts and create aggregate reports on how devices, websites, and certificates are configured and deployed. Censys collects data on hosts and […]

Tags: , , , , , , ,

Posted in: Network Hacking, Privacy | Add a Comment

Massive Yahoo Hack – 500 Million Accounts Compromised

So if you are a Yahoo user (which most of us probably have been at some point) you will be aware of the Yahoo Hack – with 200 Million e-mail addresses being up for sale on the black market it seems up to 500 million have been compromised in one of the biggest hacks yet. […]

Tags: , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Legal Issues, Privacy | Add a Comment

Dropbox Hacked – 68 Million User Accounts Compromised

So was Dropbox Hacked? There was some rumours going around last week after it sent out a password reset e-mail warning to all users. It seems like it’s limited to users who were active in 2012 and the only ones who would be in trouble are as usual, those who haven’t changed their password since […]

Tags: , , , , , ,

Posted in: Exploits/Vulnerabilities, Privacy | Add a Comment

Telegram Hack – Possible Nation State Attack By Iran

So there’s been a lot of news lately about the Telegram hack and how 15 million accounts were compromised, which is not technically true. There’s 2 vectors of attack at play here, both of which regard Iranian users, but are not connected (other than the attackers probably being the same group). So the two attacks […]

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Privacy | Add a Comment

Up1 – Client Side Encrypted Image Host

Up1 is a client side encrypted image host that that can also encrypt text, and other data, and then store them, with the server knowing nothing about the contents. It has the ability to view images, text with syntax highlighting, short videos, and arbitrary binaries as downloadables. How it Works Before an image is uploaded, […]

Tags: , , , , , , , ,

Posted in: Cryptography, Privacy | Add a Comment

Popular Tags

computer-security · darknet · Database Hacking · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · XSS ·