Enter The Dark World ..!

Blog

Microsoft Kills microsoft tuesday patches Advance Notifications; Now for Paid Members Only

Posted by on Jan 11, 2015 in Hacking News | 0 comments

Microsoft Kills microsoft tuesday patches Advance Notifications; Now for Paid Members Only

Microsoft began issuing Patch Tuesday updates publically in advance over ten years ago, but from next every second Tuesday of the Month, if you want to see what security patches Microsoft is going to issue, then you will have to pay for it. UPDATE ALERTS FOR PAID CUSTOMERS ONLY Yes right, Microsoft has decided to ditch its Advanced Notification Service (ANS) and will no longer be releasing a public blog post to preview what is to come on Patch Tuesday. Microsoft is facing fierce criticism by industry experts for its decision to make advanced...

read more

Jonathan James

Posted by on Jan 11, 2015 in TOP Hackers Profiles | 0 comments

Jonathan James

Jonathan James was known as “c0mrade” on the Internet. What is his ticket to fame? He was convicted and sent to prison for hacking in the United States–all while he was still a minor. At only fifteen years of age, he managed to hack into a number of networks, including those belonging to Bell South, Miami-Dade, the U.S. Department of Defense, and NASA. Yes, James hacked into NASA’s network and downloaded enough source code to learn how the International Space Station worked. The total value of the downloaded assets equaled $1.7 million. To...

read more

Kevin Mitnick

Posted by on Jan 11, 2015 in TOP Hackers Profiles | 0 comments

Kevin Mitnick

Kevin Mitnick, “America’s Most Wanted Computer Outlaw,” eluded the police, US Marshalls, and FBI for over two years after vanishing while on probation for his 1989 conviction for computer and access device fraud. His downfall was his Christmas 1994 break-in to Tsutomu Shimomura’s computers in San Diego, California. Less than two months later, Tsutomu had tracked him down after a cross-country electronic pursuit. Mitnick was arrested by the FBI in Raleigh, North Carolina, on February 15th, 1995. While he was on the run, he broke into countless...

read more

Website Backdoor Scripts Leverage the Pastebin Service

Posted by on Dec 20, 2014 in Hacking News | 0 comments

Website Backdoor Scripts Leverage the Pastebin Service

website backdoor- The popular copy and paste website ‘Pastebin‘ created a decade ago for software developers and even by hackers groups to share source code, dumps and stolen data, has more recently been leveraged by cyber criminals to target millions of users. Compromising a website and then hosting malware on it has become an old tactic for hackers, and now they are trying their hands in compromising vast majority of users in a single stroke. Researchers have discovered that hackers are now using Pastebin to spread malicious...

read more

Kevin Poulsen

Posted by on Dec 11, 2014 in TOP Hackers Profiles | 0 comments

Kevin Poulsen

Kevin Poulsen, also known as “Dark Dante,” gained his fifteen minutes of fame by utilizing his intricate knowledge of telephone systems. At one point, he hacked a radio station’s phone lines and fixed himself as the winning caller, earning him a brand new Porsche. According to media, he was called the “Hannibal Lecter of computer crime.” He then earned his way onto the FBI’s wanted list when he hacked into federal systems and stole wiretap information. Funny enough, he was later captured in a supermarket and sentenced to 51 months in prison,...

read more

Operation Cleaver — Iranian Hackers Targeting Critical Infrastructure Worldwide

Posted by on Dec 6, 2014 in Hacking News | 0 comments

Operation Cleaver — Iranian Hackers Targeting Critical Infrastructure Worldwide

For over past two years, Iranian hackers have infiltrated computer networks of some of the world’s top organizations including airlines, defense contractors, universities, military installations, hospitals, airports, telecommunications firms, government agencies, and energy and gas companies, security researchers said. An 87-page report published by the U.S. cyber security firm Cylance says Iranian state-sponsored hackers have hacked critical infrastructure of more than 50 organizations in 16 countries worldwide in a cyber-espionage...

read more

DoubleDirect MitM Attack Targets Android, iOS and OS X Users

Posted by on Nov 23, 2014 in Android hacking tricks, Iphone hacking, Mobile | 0 comments

DoubleDirect MitM Attack Targets Android, iOS and OS X Users

Security researchers have discovered a new type of “Man-in-the-Middle” (MitM) attack in the wild targeting smartphone and tablets users on devices running either iOS or Android around the world. The MitM attack, dubbed DoubleDirect, enables an attacker to redirect a victim’s traffic of major websites such as Google, Facebook and Twitter to a device controlled by the attacker. Once done, cyber crooks can steal victims’ valuable personal data, such as email IDs, login credentials and banking information as well as can deliver...

read more

Chinese Telecom Routes Russian Domestic Internet Traffic through China

Posted by on Nov 13, 2014 in Hacking News | 0 comments

Chinese Telecom Routes Russian Domestic Internet Traffic through China

Russian Internet traffic, including the domestic one, has continuously been re-routed outside the country due to routing errors by China Telecom, which could result in compromising the security of Russian communications. Internet monitoring service Dyn reported Thursday in a blog post that the apparent networking fault is due to the weakness in the Border gateway protocol (BGP), which forms the underpinning of the Internet’s global routing system. The problem started after the BGP peering agreement signed between the China Telecom and...

read more

14 Crazy Google Facts that You May Not Know.

Posted by on Nov 1, 2014 in Google Hack, Tricks | 0 comments

14 Crazy Google Facts that You May Not Know.

There is only one question – How we lived before Google? The most used searcher around the world with billions of info about literally everything. But how it started? Who invented it? How it got so much info? What Google means? The following list will tell you top 14 google facts…..   #1. Less is more   Even though most websites and social networks are changing their looks, Google’s founders still prefer and insist to keep the home page simple and they insist that the words on the home page do not exceed 28 words.   #2....

read more

Ankit Fadia

Posted by on Oct 26, 2014 in TOP Hackers Profiles | 0 comments

Ankit Fadia

Ankit Fadia (born 24 May 1985) is an Indian Author who has written 16 books on various topics related to Cyber Security, Ethical Hacking and Technology. He graduated from Stanford University with a degree in Management Science and Engineering. Official Website :http://www.ankitfadia.in/ He started a website called “HackingTruths”, which he claims was judged as the “second best hacking site in the world by the FBI”. He claims that when he was 14, he trashed the front page of an Indian magazine’s website. He then sent an e-mail to the editor...

read more