Enter The Dark World ..!

Microsoft Kills microsoft tuesday patches Advance Notifications; Now for Paid Members Only

Posted by on Jan 11, 2015

Microsoft began issuing Patch Tuesday updates publically in advance over ten years ago, but from next every second Tuesday of the Month, if you want to see what security patches...

Read More
Learn Ethical Hacking with “Backtrack 5″ ( backtrack 5 tutorial )

Posted by on Jul 22, 2014

Download link – www.backtrack-linux.org/downloads backtrack 5 tutorial :- BackTrack was a Linux distribution, superseded by Kali Linux, that focused on security based on the...

Read More
Jonathan James

Posted by on Jan 11, 2015

Jonathan James was known as “c0mrade” on the Internet. What is his ticket to fame? He was convicted and sent to prison for hacking in the United States–all while he was still a...

Read More
tips to make your Facebook account safer

Posted by on Aug 15, 2014

1. Set up login notifications You can set Facebook up to send you an alert every time your account is accessed from an unknown computer or other device. This can be a handy way of...

Read More

Recent Posts

Microsoft Kills microsoft tuesday patches Advance Notifications; Now for Paid Members Only

Microsoft Kills microsoft tuesday patches Advance Notifications; Now for Paid Members Only

Jan 11, 2015

Microsoft began issuing Patch Tuesday updates publically in advance over ten years ago, but from next every second Tuesday of the Month, if you want to see what security patches Microsoft is going to issue, then you will have to pay for it. UPDATE ALERTS FOR PAID CUSTOMERS ONLY Yes right, Microsoft has decided to ditch its Advanced Notification Service (ANS)...

Jonathan James

Jonathan James

Jan 11, 2015

Jonathan James was known as “c0mrade” on the Internet. What is his ticket to fame? He was convicted and sent to prison for hacking in the United States–all while he was still a minor. At only fifteen years of age, he managed to hack into a number of networks, including those belonging to Bell South, Miami-Dade, the U.S. Department of Defense, and NASA. Yes,...

Kevin Mitnick

Kevin Mitnick

Jan 11, 2015

Kevin Mitnick, “America’s Most Wanted Computer Outlaw,” eluded the police, US Marshalls, and FBI for over two years after vanishing while on probation for his 1989 conviction for computer and access device fraud. His downfall was his Christmas 1994 break-in to Tsutomu Shimomura’s computers in San Diego, California. Less than two months later, Tsutomu had...

Website Backdoor Scripts Leverage the Pastebin Service

Website Backdoor Scripts Leverage the Pastebin Service

Dec 20, 2014

website backdoor- The popular copy and paste website ‘Pastebin‘ created a decade ago for software developers and even by hackers groups to share source code, dumps and stolen data, has more recently been leveraged by cyber criminals to target millions of users. Compromising a website and then hosting malware on it has become an old tactic for...

Kevin Poulsen

Kevin Poulsen

Dec 11, 2014

Kevin Poulsen, also known as “Dark Dante,” gained his fifteen minutes of fame by utilizing his intricate knowledge of telephone systems. At one point, he hacked a radio station’s phone lines and fixed himself as the winning caller, earning him a brand new Porsche. According to media, he was called the “Hannibal Lecter of computer crime.” He then earned his way...

Operation Cleaver — Iranian Hackers Targeting Critical Infrastructure Worldwide

Operation Cleaver — Iranian Hackers Targeting Critical Infrastructure Worldwide

Dec 6, 2014

For over past two years, Iranian hackers have infiltrated computer networks of some of the world’s top organizations including airlines, defense contractors, universities, military installations, hospitals, airports, telecommunications firms, government agencies, and energy and gas companies, security researchers said. An 87-page report published by the...

DoubleDirect MitM Attack Targets Android, iOS and OS X Users

DoubleDirect MitM Attack Targets Android, iOS and OS X Users

Nov 23, 2014

Security researchers have discovered a new type of “Man-in-the-Middle” (MitM) attack in the wild targeting smartphone and tablets users on devices running either iOS or Android around the world. The MitM attack, dubbed DoubleDirect, enables an attacker to redirect a victim’s traffic of major websites such as Google, Facebook and Twitter to a device...

Chinese Telecom Routes Russian Domestic Internet Traffic through China

Chinese Telecom Routes Russian Domestic Internet Traffic through China

Nov 13, 2014

Russian Internet traffic, including the domestic one, has continuously been re-routed outside the country due to routing errors by China Telecom, which could result in compromising the security of Russian communications. Internet monitoring service Dyn reported Thursday in a blog post that the apparent networking fault is due to the weakness in the Border...