Dr Smurf ‘GUILTY’
A hacker who went by the online moniker of “Dr Smurf” on the underground DarkMarket cybercrime forum has pleaded guilty to charges of identity theft. Tadas Petrauskas, a 23-year-old Lithuanian hacker...
View ArticleBulgarian Hackers Group Arrested
Bulgarian authorities say that after months of investigation they have busted the “most powerful hacker group” in the country, the Cyber Warrior Invasion. The operation was conducted by Bulgaria’s...
View ArticleTop 15 Open Source/Free Security/Hacking Tools
1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on...
View ArticleBackup\Steal Passwords Using a USB
This post is of-course for educational purposes only. Although the title of this post implies that this is designed for a USB, any device like an MP3 player or a mobile phone can be used as they can...
View ArticleAnonymous Hack Team Website Demand Apology for Assault
Hackers identifying as “KnightSec,” an arm of Anonymous, attacked the website of an Ohio high school football team to demand a public apology for the gang rape of a 16-year-old girl reportedly...
View ArticleTop 10 Ethical Hacking Tools
As regular readers will already know I am an avid hacker/cracker and enjoy sharing knowledge. So below is a my ‘Top 10 Ethical Hacking Tools’ for Linux and Windows. Now remember only use these tools on...
View ArticleA 13 Year Old Tried to Hack a Steam Account, and got Hacked.
This is absolutely hilarious. This guy tried to phish for some dudes password via MSN. It ended up with him getting pwned. The lesson is, don’t phish, i love his end comment. You need to check this...
View ArticleBritish MI6 Replaces al-Qaeda Bomb Recipe with Cupcakes
British MI6 intelligence officers hacked into the Islamic extremist website and magazine, Inspire, and replaced bomb-making instructions with a recipe on how to make cupcakes, media reports said on...
View ArticleMy Top Hacking Tools Of All Time
Here is a list of my favorite old & new school information security & hacking tools: Burpsuite Burp Suite is an integrated platform for performing security testing of web applications. Its...
View ArticleBlackBerry Enterprise Server Vulnerable to TIFF Image Based Exploit
If you are a BlackBerry Enterprise Network user, here is something you need to be careful about. BlackBerry Enterprise Server (BES) users have been warned that an image-based exploit could allow...
View ArticleRomanian Jailed For ATM Skimming Scheme
A Romanian man serving a five-year jail sentence in Romania for his involvement in an ATM skimming scheme, has developed a device designed to protect ATMs from such attacks. 33-year-old Valentin Boanta...
View ArticleWhen is a Phone Charger Not A Charger ?
You might want to be a little more careful the next time you pick up a cheap knock-off accessory for your device to save a few bucks because new hardware hacks could be the next big thing among cyber...
View ArticleCreate a Script to Steal Data
Please use responsibly, Caintech.co.uk take no responsibility for the use of the following information it should only be used for educational purposes How to steal files with USB For this you’ll need a...
View ArticleTop 15 Free Hacking Tools
1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on...
View ArticleSecret Hacking Codes for Android Mobile Phones
1. Complete Information About your Phone *#*#4636#*#* This code can be used to get some interesting information about your phone and battery. It shows following 4 menus on screen: • Phone information...
View ArticleAll Smartwatches are Hackable
Do you own a Smartwatch? If yes, then how safe it is? There are almost 100 percent chances that you own a vulnerable Smartwatch. Computer manufacturer Hewlett-Packard is warning users of smartwatches...
View ArticleDownload Top Hacker Shells
In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. Hackers usually take advantage of an upload panel designed for uploading...
View ArticleThe Top Free Hacking e-Books
Free hacking ebooks where you can download from the links below. Black Belt Hacking & Complete Hacking Book Hackers High School 13 Complete Hacking E-books Penentration Testing With Backtrack 5 A...
View ArticleFree Computer Forensic Tools
Here is some help for you guys and gals that are looking for some forensic tools, they can also be good fun to mess around with. 1. Disk tools and data capture ————————————————————————————————————–...
View ArticleGet Hacked By Opening a JPEG File
Researchers have disclosed a critical zero-day vulnerability in the JPEG 2000 image file format parser implemented in OpenJPEG library, which could allow an attacker to remotely execute arbitrary code...
View Article
More Pages to Explore .....