Archive | Privacy

ProtonMail DDoS Attack – Sustained & Sophisticated

So the ProtonMail DDoS Attack – if you’re not familiar ProtonMail is an secure, free, encrypted e-mail service that promises absolutely no compromises. It’s been getting hit hard since November 3rd, with a large scale rather sophisticated set of DDoS attacks rendering it unable to receive or send e-mail. It seems to have mitigated the […]

Tags: , , , , , , , , ,

Posted in: Cryptography, Network Hacking, Privacy | Add a Comment

SpiderFoot – Open Source Intelligence Automation Tool (OSINT)

SpiderFoot is an open source intelligence automation tool. Its goal is to automate the process of gathering intelligence about a given target, which may be an IP address, domain name, hostname or network subnet. SpiderFoot can be used offensively, i.e. as part of a black-box penetration test to gather information about the target or defensively […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Privacy | Add a Comment

TalkTalk Hack – Breach WAS Serious & Disclosed Bank Details

So it turns out the TalkTalk hack is a lot more serious than they initially tried to make it out to be, TalkTalk claimed that it’s core system wasn’t compromised and only the website was breached. But now they’ve admitted the hackers got away with bank account numbers, partial credit card numbers and dates of […]

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Legal Issues, Privacy | Add a Comment

Scumblr by Netflix – Automatically Scan For Leaks

Scumblr is a search automation web application that helps you to automatically scan for leaks by performing periodic searches and storing / taking actions on the identified results. Scumblr uses the Workflowable gem to allow setting up flexible workflows for different types of results. How do I use Scumblr? Scumblr is a web application based […]

Tags: , , , , , , , ,

Posted in: Countermeasures, Privacy, Security Software | Add a Comment

More Drama About Hillary Clinton’s E-mail Leak – VNC & RDP Open

So this Hillary Clinton’s e-mail leak case has been a pretty interesting phenomena to observe and has been going on since last month, we didn’t really cover it as well it mostly concerns US politics – not a huge area of interest for most. But it’s getting more and more interesting, there was a report […]

Tags: , , , , , , , , ,

Posted in: Legal Issues, Privacy | Add a Comment

Microsoft Data Harvesting Backported To Windows 7 & 8

So as a follow up to our recent article about the rather lax Windows 10 default privacy settings, Microsoft has decided that even if you aren’t upgrading – they want your data anyway. The most complete cloud indeed, made up of telemetry from your machines. Microsoft is back-porting the data harvesting portions of Windows 10 […]

Tags: , , , , ,

Posted in: Privacy | Add a Comment

Windows 10 Privacy – Just Installed? Read This

So no big surprise here but there’s some issues with the default settings in regards to Windows 10 Privacy, if you run through the express install without customizing settings the defaults a little suspect. A lot of Windows 7 and Windows 8 users have already opted in to the automatic (and free) upgrade to the […]

Tags: , , , , , ,

Posted in: Privacy | Add a Comment

Drones, Tor & Remailers – The Story Of A High-Tech Kidnapping

This whole thing sounds like something straight out of CSI: Cyber with references to Drones, Tor, remailers, anonymous image sharing and the scrubbing of meta data. Pretty interesting reading, although it rather smells like a lot of exageration. A super high-tech kidnapping – gone wrong in the end. Whoever wrote tho e-mails sent to the […]

Tags: , , , , , , , ,

Posted in: General Hacking, Legal Issues, Privacy | Add a Comment

Apple’s Password Storing Keychain Cracked on iOS & OS X

And another password shocker, a few days after ‘cloud’ password service LastPass was pretty seriously hacked (yah if you’re using it, change your master password) critical 0-day flaws in Apple’s password storing keychain have been exposed. Which is kinda funny, as after the LastPass hack I saw some people espousing the usage of Apple’s keychain […]

Tags: , , , , , , , , , , ,

Posted in: Apple, Cryptography, Exploits/Vulnerabilities, Password Cracking, Privacy | Add a Comment

IRS Was Not Hacked – Taxpayer Data Stolen For 100,000 People

So the IRS was not hacked – as many media outlets are claiming. Was taxpayer data stolen from IRS systems? Yes, did it involve any kind of hack (by any definition) – no. There was no intrusion, there was some clever phishing, data slurping and brute forcing – of people who already had their data […]

Tags: , , , , , , , , ,

Posted in: Legal Issues, Privacy | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·