HackEinste.in

NSA knew about Heartbleed for two years

The critical “Heartbleed” bug reported earlier this week to have affected the security of most of the internet was discovered by researchers at the United States National Security Agency two years earlier, according to a new report. On Friday afternoon, Bloomberg News journalist Michael Riley reported that the NSA knew about the monstrous flaw for at least two years ahead of this week’s announceme...

Facebook pays bug hunters $1 million, India 2nd biggest recipient

Social networking giant Facebook said it has paid over $1 million in the past two years to security researchers who report bugs on its website, with India second among recipients by country. India, which has over 78 million Facebook users, is also second on the list of countries with the fastest-growing number of recipients of its Bug Bounty programme.   A bug is an error or defect in softwar...

Hack Facebook with Phishing: An old and awesome way to hack accounts.!!

What is Phishing : According to Wikipedia A phishing technique was described in detail in 1987, and (according to its creator) the first recorded use of the term “phishing” was made in 1995. Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic commun...

Anatomy of an Attack

I was on a tour in Asia Pacific when I first heard the news about the attack. The investigation into this attack continues but I’m eager to share some information with you about it. Let’s first make sure everyone is on the same page. The number of enterprises hit by APTs grows by the month; and the range of APT targets includes just about every industry. Unofficial tallies number dozens of mega co...

What is in a Name: Information Security Intelligence

One of the more elusive concepts in information security is that of information security intelligence.  Often times when discussing intelligence images of shadowy figures conducting espionage are evoked and the truth of the matter is that often times this is not far from the truth.  Information security intelligence means many things to many people yet no one can argue against the value that it pr...

Haunted by the Ghosts of ZeuS & DNSChanger

One of the challenges in malware research is separating the truly novel innovations in malcoding from new nasties that merely include nominal or superficial tweaks. This dynamic holds true for both malware researchers and purveyors, albeit for different reasons. Researchers wish to avoid being labeled alarmist in calling special attention to what appears to be an emerging threat that turns out to ...

Spammed URLs for the Snowden, Ender, Obama, and Tree Campaigns

obama 198.251.67.11 /incumbency/index.html obama 198.251.67.11 /philippine/index.html obama 198.251.67.11 /stifles/index.html snowden 198.251.67.11 /campaigners/index.html snowden 198.251.67.11 /foxhole/index.html snowden 198.251.67.11 /fracturing/index.html snowden 198.251.67.11 /incumbency/index.html tree 198.251.67.11 /nomadic/index.html tree 198.251.67.11 /philippine/index.html tree 198.251.67...

Largest Theft Case In US History: Feds Say Hackers Stole 160 Million Credit Card Numbers

Four Russians and a Ukrainian have been charged with operating a hacking organization that has infiltrated computer networks of more than a dozen major American and international corporations over the past seven years, Daily Mail reports. The hackers reportedly stole and sold over 160 million credit and debit card numbers and cost these companies hundreds of millions of dollars. The indictments we...

Facebook Testing User-Hosted Chat Room Feature

Facebook is currently testing a chat room feature, thats lets users to set up chat rooms for their friends can join without any invitation. According to TechCrunch, the feature has been codenamed ‘Host Chat’ and is being tested internally. Facebook chat rooms allow members to click ‘Host Chat’ from top their homepage, chats would be promoted in News Feed, though the host wo...

CARjacked ! Hackers remotely controlled the steering, brakes and horn of a car using a laptop.

Forget hacking accounts, computers or mobile devices – security engineers from Indiana have managed to hack the software inside the Toyota Prius and Ford Escape. Using a laptop wirelessly connected to the car’s electronics, Charlie Miller and Chris Valasek were able to remotely control the brakes, the accelerate, change the speedometer, switch the headlights on and off, tighten the sea...

How much of a geek are you? New calculator separates the tech buffs from the technophobes… so how do you score?

Are you obsessed with the latest technology and have a burning desire to own every new device? Or are you a prolific Tweeter or TV addict? A new study has divided the nation into five personality types based on the technology they own and their lifestyle choices.  The industry body behind the research has also created The Great British Geek Calculator so you can discover which group you belong to....

Why is Mobile Security essential ?

As the release of Google’s Open Source Mobile Operating System Android, it has became most popular target of malicious code writers. Android seems to have attracted the most attention from malicious code writers due to its popularity, but all platforms are potentially at risk. You’ll find info on what could potentially happen if a phone is infected, what’s happened so far, how we’re being ta...

Style Switcher
Default Classic Gaming

Sign In

Lost Password

Sign Up