Tag Archives | Privacy




US School Remotely Spying On Kids With Webcams

The big news that has been blowing up in the past week or so is about a relatively unknown school district in Pennsylvania, US that has been spying on its students using Macbook webcams. It has actually turned into a class action lawsuit and there is a lot of debate surrounding the story, the school […]

Tags: , , , , , , , , , , , , , , , ,

Posted in: Hardware Hacking, Privacy | Add a Comment

Facebook Pushes Out New Privacy Settings

There have been plenty of stories about Facebook in the past and the latest is about their new privacy system. From what I understand they have abandoned the previous concept of “Networks” and now everyone is open to everyone else. The network system was initially relevant when the site was targeted at only US college […]

Tags: , , , , , , , ,

Posted in: General News, Privacy | Add a Comment

Facebook Used By Whitewell Trojan To Communicate

Facebook has had it’s fair share of security woes and the latest is the discovery of a new Trojan that uses Facebook to communicate. Interesting that it’s using the Facebook notes feature to communicate depending on title/subject of the note. The actual malware itself is spread through doc/pdf exploits and not through any flaws in […]

Tags: , , , , , , , , , , ,

Posted in: Malware, Privacy | Add a Comment

UCSniff 3.0 Released – VoIP/IP Video Sniffing Tool

UCSniff is a VoIP & IP Video Security Assessment tool that integrates existing open source software into several useful features, allowing VoIP and IP Video owners and security professionals to rapidly test for the threat of unauthorized VoIP and Video Eavesdropping. Written in C/C++, and available on Linux and Windows, the software is free and […]

Tags: , , , , , , , , , , , , , , ,

Posted in: General Hacking | Add a Comment

TJX Hacker Albert “Segvec” Gonzalez Indicted By Federal Grand Jury

We’ve been following the whole TJX saga for quite some time now since way back in September 2007 when the hack became public as the Largest Breach of Customer Data in U.S. History and in August 2008 when the TJX Credit Card Hackers Got Busted. The legal system has ticked along and now they have […]

Tags: , , , , , , , , , , , ,

Posted in: General Hacking, Legal Issues, Privacy | Add a Comment

UAE Telco Etisalat Installs Spyware On Users Blackberries

Now this is pretty disgusting behaviour from a national telco provider, but well is it really surprising in Dubai? For me..no it’s not. I’ve spent a reasonable amount of time in Dubai on various projects, and my first surprise was Flickr being blocked. Especially as Dubai is probably the most liberal place in the Middle […]

Tags: , , , , , , , , , , ,

Posted in: Legal Issues, Malware, Privacy | Add a Comment

The Middler – User Session Cloning & MITM Tool

The Middler is a Man in the Middle tool to demonstrate protocol middling attacks. Led by Jay Beale, the project involves a team of authors including InGuardians agents Justin Searle and Matt Carpenter. The Middler is intended to man in the middle, or “middle” for short, every protocol for which we can create code. In […]

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Privacy | Add a Comment

Ensuring Data Security During Hardware Disposal

After our recent story about the trading of BlackBerries for data theft the issue has emerged again this time more towards the secure disposal of data stored on PC hard disks. If a company or organisation has a decent data/information security policy in place (Like ISO27001 for example) they should have a secure destruction/disposal policy […]

Tags: , , , , , , , , , , , ,

Posted in: Cryptography, Hardware Hacking, Privacy | Add a Comment

Explosion Of BlackBerry Trading In Nigeria – Data Theft

The number of Crackberry Blackberry users is increasing exponentially – especially since they released the much sexier Bold and the latest touch-screen Storm. The latest revelation is that used BlackBerries are being traded, not by the value of the phone but by the value of the data contained on the phone! It just shows most […]

Tags: , , , , , , , ,

Posted in: Cryptography, Hardware Hacking, Privacy | Add a Comment

Interceptor – Wireless Wired Network Tap (Fon+)

The Interceptor is a wireless wired network tap. Basically, a network tap is a way to listen in to network traffic as it flows past. Most tools are designed to pass a copy of the traffic onto a specified wired interface which is then plugged into a machine to allow a user to monitor the […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Popular Tags

computer-security · darknet · Database Hacking · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · XSS ·