Archive | Privacy




Don’t Sweat or Scratch Your Face Whilst Flying

If not the magic camera in the sky might think you are a terrorist and a squad of crack F16s might be dispatched to blow up your plane.. Don’t go to the toilet too often too, or walk around too much…or do anything really. Better just sit in your seat with a blank expression on […]

Tags: , , , , , , , ,

Posted in: Legal Issues, Privacy | Add a Comment

TJX Employee Fired for Trying to Fix Things

Ah TJX in the news again….after previously having the Largest Breach of Customer Data in U.S. History, now they are screwing people over that try to help them and their seemingly ridiculous information security policies. Hello blank passwords? Sounds crazy but I believe it happens, at more places than just TJX. It’s sad that someone […]

Tags: , , , , , , ,

Posted in: Legal Issues, Privacy | Add a Comment

UK to Become Even More Draconian with Privacy Laws

Oh dear, UK going backwards again. A bad case of Big Brother syndrome and once again under the blanket excuse of efforts against terrorism. Please! That’s so old and tired now, do governments seriously think they can keep infringing people’s privacy and rights under the same old guise? Strike terror into the public by continually […]

Tags: , , , , , , , , ,

Posted in: Legal Issues, Privacy | Add a Comment

Three Charged With Hacking Dave & Buster’s Chain

Another big heist in the US netting a whole lot of juicy information on credit and debit cards, over half a million USD lost in this case alone. There’s a whole lot of fraud going on.. Not bad for fiddling with the cash register system of a restaurant chain. It just shows, anyone dealing with […]

Tags: , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, General Hacking, Legal Issues, Privacy | Add a Comment

browserrecon – Passive Browser Fingerprinting

Most of todays tools for fingerprinting are focusing on server-side services. Well-known and widely-accepted implementations of such utilities are available for http web services, smtp mail server, ftp servers and even telnet daemons. Of course, many attack scenarios are focusing on server-side attacks. Client-based attacks, especially targeting web clients, are becoming more and more popular. […]

Tags: , , , , , , , , ,

Posted in: General Hacking, Privacy, Web Hacking | Add a Comment

US Really Owns Your Data Now!

A while back we reported how US customs owns your data, now it’s getting even worse. 10 days ago the US appeals court gave them rights to COPY all your data without notice even if there are no suspicions. Anyone want to talk about dilution of intellectual property? Privacy? Or just basic human rights.. In […]

Tags: , , , , , , , , , , , ,

Posted in: Legal Issues, Privacy | Add a Comment

Chocolate Owns Your Passwords

The same old story, if you ask people for something they will most likely give it without thinking of the consequences.. Even more so if you are a pretty girl, and in this case you offer someone chocolate. Hey who doesn’t love chocolate? I have to say I don’t love it enough to give out […]

Tags: , , , , , ,

Posted in: Privacy, Social Engineering | Add a Comment

Russia Heavy Handed Registration for Wifi

It seems like Russia wants to keep a tight reign on things, anything with Wifi capability must be licenses! That includes your phone…imagine having to apply for a permit to have a wireless AP at home? Rather ridiculous no? Business travellers to Russia might want to keep their laptops and iPhones well-concealed – not from […]

Tags: , , , , , , , ,

Posted in: Legal Issues, Privacy | Add a Comment

WifiZoo v1.3 Released – Passive Info Gathering for Wifi

WifiZoo is a tool to gather wifi information passively. It is created to be helpful in wifi pentesting and was inspired by ‘Ferret‘ from Errata Security. The tool is intended to get all possible info from open wifi networks (and possibly encrypted also in the future, at least with WEP) without joining any network, and […]

Tags: , , , , , ,

Posted in: Hacking Tools, Privacy, Wireless Hacking | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·