What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
hacoder.webp 2016-08-17 16:51:03 “Hunted” schoolgirls\' nude images and personal info published online (lien direct) “Hunted” schoolgirls’ nude images and personal info published online Post navigation More than 2,000 sexual images of underage girls and women have been shared by teen boys and young men, on an Australian website. The site allows users to barter the illegal images, announce the “wins” of their hunting sprees and identify the subjects by
hacoder.webp 2016-08-17 12:30:44 (Déjà vu) Facebook\'s unblockable-ads push is a “big bluff” (lien direct) Facebook’s unblockable-ads push is a “big bluff” Post navigation Facebook, the adblocker ball’s back in your court, but researchers seem to have punched some holes in your racket. I’ve just installed a Chrome extension called Facebook Ad Highlighter, and I can still see your sponsored posts – hello, collapsible foam roller! – but it’s now
hacoder.webp 2016-08-17 12:30:04 Facebook\'s unblockable-ads push is a “big bluff” (lien direct) Facebook’s unblockable-ads push is a “big bluff” Post navigation Facebook, the adblocker ball’s back in your court, but researchers seem to have punched some holes in your racket. I’ve just installed a Chrome extension called Facebook Ad Highlighter, and I can still see your sponsored posts – hello, collapsible foam roller! – but it’s now
hacoder.webp 2016-08-16 17:15:03 Did “The Shadow Brokers” hack NSA cyberweapons worth $500M? (lien direct) Did “The Shadow Brokers” hack NSA cyberweapons worth $500M? Post navigation A self-styled hacking group going by The Shadow Brokers have started a tongue-in-cheek media campaign claiming that they’ve penetrated the NSA (or someone like that), and made off with “cyberweapons” that they imply are worth more than $500 million. Their briefing document is entitled
hacoder.webp 2016-08-16 13:30:39 People like using passwords way more than biometrics (lien direct) People like using passwords way more than biometrics Post navigation A new survey shows that we’ll give up our passwords only when they’re pried from our cold, dead hands. That’s more or less the conclusion of a new study conducted by Yougov on behalf of email portal mail.com. In a recent survey of 1,119 US
hacoder.webp 2016-08-16 08:32:01 “You dirty RAT” – Spy versus Spy in the cybercrime underworld (lien direct) “You dirty RAT” – Spy versus Spy in the cybercrime underworld Post navigation Thanks to Gabor Szapannos of SophosLabs, who did the hard work behind this article. Not all malware is ransomware, even though ransomware hogs the spotlight these days. Keyloggers are still popular in the cyberunderworld, because they help crooks to steal your passwords.
hacoder.webp 2016-08-15 23:40:44 (Déjà vu) Silk Road suspect “Libertas” can be extradited to US, says court (lien direct) Silk Road suspect “Libertas” can be extradited to US, says court Post navigation Back in December 2013, the US Department of Justice (DoJ) charged three individuals with three different offences stemming from the now-defunct Silk Road website. Silk Road operated on the so-called Dark Web, allowing customers to buy illegal drugs, fake IDs and numerous
hacoder.webp 2016-08-15 23:40:04 Silk Road suspect “Libertas” can be extradited to US, says court (lien direct) Silk Road suspect “Libertas” can be extradited to US, says court Post navigation Back in December 2013, the US Department of Justice (DoJ) charged three individuals with three different offences stemming from the now-defunct Silk Road website. Silk Road operated on the so-called Dark Web, allowing customers to buy illegal drugs, fake IDs and numerous
hacoder.webp 2016-03-22 23:03:00 The Top 500 Worst Passwords of All Time (lien direct) From the moment people started using passwords, it didn't take long to realize how many people picked the very same passwords over and over. Even the way people misspell words is consistent. In fact, people are so predictable that most hackers make use of lists of common passwords just like these. To give you some
hacoder.webp 2016-03-21 23:03:00 Whatsapp: Use 20+ whatsapp in one device (lien direct) hello guys , we all know a couple of number is common these days so don’t you think you need all over whatsapp and live in one single device. Guess what yes its possible to do so we can start up all whatsapp. so lets get started Its pretty simple guys just follow these simple
hacoder.webp 2016-03-20 23:03:00 Instagram : likes and follower all you need (Part I) (lien direct) hello guys today we gonna see about our most favorite and cool  “Instagram”  which is an online mobile photo-sharing, video-sharing, and social networking service.All we see that many of us have only a couple of hundred follower so is case with the Likes , Today in Part I we gonna see to get followers and
hacoder.webp 2016-03-19 23:03:00 SQL Injection Tutorial: Part 1/3 (lien direct) ==THIS ARTICLE IS FOR EDUCATIONAL PURPOSES ONLY== Hello everybody to the SQL Injection tutorial by HaCoder. In this SQL Injection tutorial series I will teach you the basics of SQL Injection. In this first part you will learn two types of SQL Injection and what is the difference between those two types. Definition: “SQL injection
hacoder.webp 2016-03-18 23:03:00 Password Cracking : Series Part 1 (lien direct) Nowadays, password is mostly used for every kind of security. Almost every web server and computer system uses a password to prevent unauthorized access to the system, eventually this over usage has became an easy target for hacker to gain unauthorized access to the systems and leak the confidential files and private data. In this
hacoder.webp 2016-03-17 23:03:00 How Antivirus Software Works & How to Evade It (lien direct) Welcome back, my tenderfoot hackers!As hackers, we often are required to get past antivirus (AV) software or other security measures. To do so effectively, we need to have some understanding of how AV software works. In this tutorial, we will take a cursory view of how AV software works so that you can better strategize
hacoder.webp 2016-03-16 23:03:00 Hackers Using Joomla Servers For DDoS Attacks (lien direct) Security researchers from Akamai Prolexic Security Engineering, PhishLabs and  Intelligence Division (R.A.I.D) have uncovered DDoS (Distributed Denial of Service) attack campaign that is exploiting a vulnerability in Google Maps plug-in installed Joomla servers. Researchers found that several paid DDoS tools are also using the same vulnerability to power up and mask the origin of DDoS attacks. DAVOSET and UFOnet are the publicly
hacoder.webp 2016-03-15 23:03:00 Your Brain Is 30 Times Faster Than The Best Supercomputers (lien direct) Some of us are born with exceptional talents. It could be anything ranging from superb athletic capabilities to being a maths genius. A 12-year-old girl from England who tipped Einstein's and Hawking's scores in the IQ test is a perfect example. Humans have the mind power unparalleled to anyone in the universe, provided we are able to
hacoder.webp 2016-03-14 23:03:00 Penetrate Pro: Android App For Hackers (lien direct) Penetrate pro is an android app developed by Biogo Ferreira for hackers. It is an excellent app for decoding WEP/WPA WiFi keys. The latest version of Penetrate pro ( 2.11.1) supports the following routers: Routers based on Thomson: Thomson, Infinitum, BBox, DMax, Orange, SpeedTouch, BigPond, O2Wireless, Otenet. DLink Eircom Pirelli Discus Verizon FiOS (only some routers)
hacoder.webp 2016-03-13 23:03:00 WhatsApp Scam: Voice Calling Text Invite Spreads Malware (lien direct) WhatsApp users, beware, a new scam spreads malware through a fake voice calling text invite. If you have received the message, just ignore it. The scam message: “Hey, I am inviting you to try WhatsApp calling, click here to activate now”. The scam messages that invites WhatsApp users to try voice calling feature redirects the
Last update at: 2024-04-18 23:07:57
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter