CIA Tool Captures Still Images From Live Video Stream
Aug11

CIA Tool Captures Still Images From Live Video Stream

CouchPotato WikiLeaks has exposed CIA tool which captures images from live video streams remotely. While there are no specific documentations how CIA are able to hack the machine remotely, it could be assumed that the tool is used with other malware by CIA. Not only the tool can capture images but also save the video as AVI. It also has the ability to capture with and without the audio. “Today, August 10th 2017, WikiLeaks...

Read More
US Government To Launch A Cyber Attack Against Russian Government
Oct17

US Government To Launch A Cyber Attack Against Russian Government

“we’re sending a message” to Putin The U.S. Intelligence Community (USIC) is confident that the Russian Government directed the recent compromises of e-mails from US persons and institutions, including from US political organizations. The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed...

Read More
Apple May Log All Your Contacts
Oct11

Apple May Log All Your Contacts

End to End Encryption Isn’t So Secure After All When company chooses to log information which isn’t necessary and breach privacy acts, end to end encryption is no use. Apple promises that your iMessage’s are secure and safe. Unfortunately this is not the case. Documents obtained by The Intercept, show’s that Apple logs your IP addresses and contacts stored on your phone even though no communication were carried...

Read More
Weekly Compile Of Cyber Security Threats and Exploits – 24-Sept-2016
Sep25

Weekly Compile Of Cyber Security Threats and Exploits – 24-Sept-2016

Hacker Makes 4BTC With Mamba Ransomware Being Ransomware developer is a real thing now. Instead of encrypting files now, a new Ransomeware dubbed as Mamba Ransomware encrypts whole hard drive partitions. “Mamba encrypts the whole partitions of the disk,” Marinho said. “It uses a disk-level cryptography and not a traditional strategy of other ransomware that encrypts individual files.”. The Ransomware edits Master Boot Record and...

Read More
FBI ordered By Judge to Reveal Exploit Code For Tor
Mar31

FBI ordered By Judge to Reveal Exploit Code For Tor

Should FBI Reveal The Exploit Code? Last month FBI were ordered to reveal the exploit source for Tor, the ordered came after FBI used the exploit to hack visitors of possibly the largest child pornography site called PlayPen. FBI are fighting back because it only shows how the hacking code was deployed. FBI are arguing that it is not necessary for the case and have asked the judge to reconsider the motion. FBI used a NIT, Network...

Read More
The Justice Department Successful Hacks Into iPhone Without Apple
Mar29

The Justice Department Successful Hacks Into iPhone Without Apple

Will Justice Department Disclose The Vulnerability The long on going case of the US Justice Department compelling Apple to create a backdoor which would allow the authorities to access Syed Rizwan Farook, a gunman which took lives of 14 people in San Bernardino has now come to a close. The authorities hinted earlier that they have found a third party hacker which would allow them to hack into the iPhone without altering any data. This...

Read More
%d bloggers like this: