Hacking News produced by chain | Fri, 01/09/15 @ 04:17 pm | 0 replies
<p><span style="color:#000000"><span style="font-family:'Segoe UI';"><span style="font-size:14px"><strong>Free tool to detect surveillance spyware has been launched by global union of human rights organizations, including Electronic Frontier Foundation and Amnesty International.</strong></span></span></span><br><span ...
Android produced by chain | Fri, 01/09/15 @ 07:34 am | 0 replies
<p><span style="font-size:18px"><span style="color:#210021"><span style="font-family:'Open Sans';"><span style="background-color:rgb(250,250,250)">I use AndChat. It does its job so I can recommend it. You can download it form Google Play Store and it is free.</span></span></span></span></p> <p><strong><em>Picture...
Trojan produced by chain | Fri, 01/09/15 @ 07:25 am | 0 replies
<p><span style="font-size:14px"><span style="color:#333333"><span style="font-family:'Segoe UI';">Backdoor:Win32/IRCFlood</span></span></span><span style="color:#333333"><span style="font-family:'Segoe UI';"><span style="font-size:12px"><span style="font-size:14px"> is an IRC-controlled backdoor trojan that allows an...
Facebook produced by chain | Fri, 01/09/15 @ 06:56 am | 0 replies
<p><span style="font-size:24px"><strong>Infowars</strong></span></p> <p>&nbsp;</p> <p class="bbc_center"><span style="font-size:18px"><span style="color:#444444"><span style="font-family:Roboto"><strong><u>reporter Joe Biggs</u></strong> </span></span></span></p> <p ...
Hacking News produced by chain | Fri, 01/09/15 @ 06:34 am | 0 replies
The popular copy and paste website 'Pastebin' created a decade ago for software developers and even by hackers groups to share source code, dumps and stolen data, has more recently been leveraged by cyber criminals to target millions of users. Compromising a website and then hosting malware on it has become an old tactic for hackers, and now they are trying their hands in compromising vast...
Hacking produced by chain | Wed, 01/07/15 @ 10:54 pm | 0 replies
A new critical security vulnerability in the BASH shell, the command-line shell used in many Unix and Linux operating systems, leaves a large number of systems at security risk. The bug also affects Mac OS X. CVE Number: CVE-2014-6271 Technical Details: Here is technical details of the vulnerability, posted by Florian Weimer in Seclists: "Bash supports exporting not just shell variables,...