Archive | Privacy




Explosion Of BlackBerry Trading In Nigeria – Data Theft

The number of Crackberry Blackberry users is increasing exponentially – especially since they released the much sexier Bold and the latest touch-screen Storm. The latest revelation is that used BlackBerries are being traded, not by the value of the phone but by the value of the data contained on the phone! It just shows most […]

Tags: , , , , , , , ,

Posted in: Cryptography, Hardware Hacking, Privacy | Add a Comment

Torpig Botnet Hijacking Reveals 70GB Of Stolen Data

We did mention Torpig in passing back in January 2008 when talking about the Mebroot rootkit which digs down deep into the Master Boot Record. It seems like Torpig has been pretty active since then and the latest break is that some security researchers have managed to infiltrate the botnet and collect some data on […]

Tags: , , , , , , , , , , , ,

Posted in: Malware, Privacy, Spammers & Scammers | Add a Comment

UCSniff – VoIP/IP Video Sniffing Tool

UCSniff is an exciting new VoIP Security Assessment tool that leverages existing open source software into several useful features, allowing VoIP owners and security professionals to rapidly test for the threat of unauthorized VoIP and Video Eavesdropping. Written in C, and initially released for Linux systems, the software is freely available for anyone to download, […]

Tags: , , , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Privacy | Add a Comment

Indian Credit Card Fraud Exposed – Linked to Symantec

In a recent undercover sting the BBC has uncovered some unscrupulous Indian chaps selling valid UK credit card details, the kicker to the story is the fraud is linked to Symantec as the people being defrauded had all recently bought Norton subscriptions. I guess it’s hard to control a 3rd party call center though and […]

Tags: , , , , , ,

Posted in: Legal Issues, Privacy, Spammers & Scammers | Add a Comment

VideoJak – IP Video Security Assessment Tool

What is VideoJak? VideoJak is an IP Video security assessment tool that can simulate a proof of concept DoS against a targeted, user-selected video session and IP video phone. VideoJak is the first of its kind security tool that analyzes video codec standards such as H.264. VideoJak works by first capturing the RTP port used […]

Tags: , , , , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Privacy | Add a Comment

Satellite Feed Hacking – Your Data Isn’t Private!

Hardware hacking is an interesting area and something not too many people get into as the soldering irons, capacitors and chipsets seem daunting. I did have a play around with cable boxes and satellite feeds in my earlier years and was surprised to find how insecure they were. Most traffic is transmitted unencrypted, the stuff […]

Tags: , , , , , , , , , , , ,

Posted in: Hardware Hacking, Legal Issues, Privacy | Add a Comment

Using Twitter for Data Mining and Information Gathering

We’ve mentioned Twitter a few times lately as it has become a larger and larger part of the social web and the premier ‘micro-blogging’ platform. There was a recent Phishing issue on Twitter and before that Twitter Jacking and a CSRF bug that allowed auto-following. Due to the large update of Twitter, the amount of […]

Tags: , , , , , , , , , , , , ,

Posted in: General Hacking, Privacy, Social Engineering | Add a Comment

Express Scripts Offers $1million Reward for Cyber Extortionists

This is an interesting story, I’ll be watching how it develops – it’s not often you see a bounty for online crimes and especially one as enticing as 1 million dollars! That’s a hell of a sum for nailing down some dodgy hackers who are running an extortion scam after a data leak. I really […]

Tags: , , , , , , ,

Posted in: General Hacking, Legal Issues, Privacy | Add a Comment

Google Hacking Back in The News – Google Takes Action

Google hacking was the big thing back in 2004, I actually did a talk on it in Hack in the Box 2004, it’s resurfaced again as a serious threat with Google noticing more queries relating to things like social security numbers. The Google Hacking Database has been active for years now and there are hundreds […]

Tags: , , , , , , , ,

Posted in: Database Hacking, Exploits/Vulnerabilities, Privacy, Web Hacking | Add a Comment

DarkMarket Carding (Credit Card Fraud) Site Part of FBI Sting

You may remember the story about the Pro ATM Hacker ‘Chao’ and his Tips a while back, apparently that was the start of a big global sting operation on credit card fraud. Chao was admin/moderator on a community of carders (where they bought/sold stolen credit card info) called DarkMarket and the first to be busted, […]

Tags: , , , , , ,

Posted in: Legal Issues, Privacy, Spammers & Scammers | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·