Posts

Showing posts from September, 2017

Dark web drug dealer arrested after he travelled us for world beard championships

Image
United States authorities arrested suspected dark web drug kingpin late last month while he was travelling from his base in France to the United States of America for this year’s annual World Beard and Mustache Championships. Gal Vallerius, a 38-year-old French national, was travelling to Austin, Texas, for the competition but was caught by U.S. authorities on August 31 upon landing at Atlanta International Airport on a distribution complaint filed in Miami federal court, The Miami Herald reported Tuesday. Authorities confirmed Vallerius' identity to the online moniker " OxyMonster ," which was previously used to sell drugs on an illegal underground dark web marketplace called  Dream Market  by searching his laptop that the brown-beard contestant carried with him. Alleged Moderator/Admin Of Dark-Web Dream Market According to Drug Enforcement Administration (DEA) affidavit filed in September, Vallerius was an administrator, senior moderator and vendor on Dream Mark

Airport police demanded an activist's password. He really fused. Now he refused. Now he faced prison in the U.K.

Image
It was NOT the first time Muhammad Rabbani had problems when returning to the United Kingdom from travels overseas. But on this occasion something was different — he was arrested, handcuffed, and hauled through London’s largest airport, then put into the back of a waiting police van. Rabbani is the 36-year-old international director of Cage, a British group that was founded in 2003 to raise awareness about the plight of prisoners held at the U.S. government’s Guantánamo Bay detention site. Today, the organization has a broader focus and says it is working to highlight “the erosion of the rule of law in the context of the war on terror.” Due to its work campaigning for the legal rights of terrorism suspects, Cage has attracted controversy, and Rabbani has faced the government’s wrath. His trouble at Heathrow Airport in late November began with a familiar routine. Often, on his return to the U.K. from foreign trips, he was stopped by police and questioned under Schedule 7 of the T

Deloitte hacked - cyber attack exposes clients enails

Image
Another day, another data breach. This time one of the world's "big four" accountancy firms has fallen victim to a sophisticated cyber attack. Global tax and auditing firm Deloitte has confirmed the company had suffered a cyber attack that resulted in the theft of confidential information, including the private emails and documents of some of its clients. Deloitte is one of the largest private accounting firms in the U.S. which offers tax, auditing, operations consulting, cybersecurity advisory, and merger and acquisition assistance services to large banks, government agencies and large Fortune 500 multinationals, among others.  The global accountancy firm said Monday that its system had been accessed via an email platform from October last year through this past March and that "very few" of its clients had been affected, the Guardian reports. The firm discovered the cyber attack in March, but it believes the unknown attackers may have had access to its em

Whatsapp messenger banned in china

Image
Popular instant messaging app WhatsApp has already been struggling for its existence in China ever since July when Chinese government blocked its users from sending photos and videos over the app. Now, it appears that China has largely blocked Facebook-owned WhatsApp in its latest step to tighten censorship as the country prepares for a major Communist Party gathering next month. Yes, WhatsApp no longer works in the country at all.  China has a long history of blocking and limiting access to web services, especially social networks and Western-owned sites through its Great Firewall. The service currently blocks some 171 out of the world's leading websites, including Wikipedia, Twitter, Facebook, Instagram, and many Google services in mainland China. And now, it is WhatsApp. Although it's unclear how long the messaging app may remain inaccessible in the country, according to Symbolic Software, a Paris-based research firm that monitors WhatsApp's situation in China, the

#must red : post a boarding pass on facebook, get your account stolen

Image
A trip to Hong Kong I've known Petr Mára for few years now, he's a nice guy. He's a speaker, trainer, video blogger, and deploys iOS & macOS wherever possible. And also loves to travel. He and his wife went to Hong Kong to celebrate her birthday in May 2016 but Petr didn't say for how long they'd enjoy the city. And of course I  had  to know. It was this moment when I'd noticed that there's a booking reference  YJVFKG and some other barcode on boarding passes posted by Petr on Instagram before their departure. You better not publish your booking reference or any other codes or barcodes from your boarding passes or any tickets in general. Detail of the picture Petr Mára has posted The flight from London takes almost 12 hours, so  just for five days?  To find Petr's departure from Hong Kong, it was enough to go to British Airways website and enter the booking reference in the right input field. After submitting the reference code I learned, amo

How to install kali- the modern day hacker's os

Image
Intro You're seeing this post probably because you want to install Kali Linux in your PC, if you don't you came here just to see what's this thing 'Kali Linux'... So it is a modified of Linux made for hackers... You can for example hack WPA/WPA2 (internet passwords). It's basically the perfect OS for the hackers, the 'Hackers' Paradise'. Setup - Virtual Machine (VMWare, VirtualBox) - μTorrent/BitTorrent Tutorial Step 1 - Install VirtualBox. ATENTION: Install VirtualBox version 4.3.12 because the latest version (4.3.14) is having some problems with some antivirus... So i recommend you to download version 4.3.12. Step 2 - Search on Google for Kali Linux and click in the first website (official one), select the Downloads tab and download the 'Kali Linux 32 bit ISO' with torrent not direct or it will take forever to download. Step 3 - Now open up VirtualBox and click on 'New' (top left). Name it Kali Linux 1.0.8 (or what

WARNING : cleaner hacked to distribute malware over 2.3 million user infected

Image
If you have downloaded or updated CCleaner application on your computer between August 15 and September 12 of this year from its official website, then pay attention—your computer has been compromised. CCleaner is a popular application with over 2 billion downloads, created by Piriform and recently acquired by Avast, that allows users to clean up their system to optimize and enhance performance. Security researchers from Cisco Talos discovered that the download servers used by Avast to let users download the application were compromised by some unknown hackers, who replaced the original version of the software with the malicious one and distributed it to millions of users for around a month.  This incident is yet another example of supply chain attack. Earlier this year, update servers of a Ukrainian company called MeDoc were also compromised in the same way to distribute the Petya ransomware, which wreaked havoc worldwide. Avast and Piriform have both confirmed that the W

Vevo music video service hacked- 3.12TB of internal DATA leaked

Image
OurMine is in headlines once again—this time for breaching the popular video streaming service  Vevo . After hunting down social media accounts of HBO and defacing WikiLeaks website, the infamous self-proclaimed group of white hat hackers OurMine have hacked Vevo and leaked about 3.12 TB worth of internal files. Vevo is a joint venture between Sony Music Entertainment, Universal Music Group, Abu Dhabi Media, Warner Music Group, and Google's parent company Alphabet Inc. OurMine managed to get hold of Vevo's "sensitive" data including its internal office documents, videos and promotional materials after the hacking collective successfully hacked into the Vevo servers. The group then posted the stolen documents (approximately 3.12 terabytes) from Vevo on its website on late Thursday, though OurMine removed the stolen information from its website on Vevo's request. Although it's not clear what prompted OurMine to hack Vevo, the group noted on its website t

#hacking tutorial what is penetration testing?

Image
Penetration Testing is a method that many companies follow in order to minimize their security breaches. This is a controlled way of hiring a professional who will try to hack your system and show you the loopholes that you should fix. Before doing a penetration test, it is mandatory to have an agreement that will explicitly mention the following parameters − what will be the time of penetration test, where will be the IP source of the attack, and what will be the penetration fields of the system. Penetration testing is conducted by professional ethical hackers who mainly use commercial, open-source tools, automate tools and manual checks. There are no restrictions; the most important objective here is to uncover as many security flaws as possible. Types of Penetration Testing We have five types of penetration testing − Black Box  − Here, the ethical hacker doesn’t have any information regarding the infrastructure or the network of the organization that he is trying

Google's new payment app for India user sound to transfer money

Image
Google has introduced a new payment app in India called Tez (the Hindi word for “fast”). Tez features a technology called audio QR that allows users to transfer money using sounds to pair two devices. Called the “cash mode option,” phones negotiate a connection using audioto identify the payer and payee. (The sounds should be inaudible to human ears though because they’re sent using ultrasonic frequencies, according to the  Financial Times . )The feature is therefore similar to cash transactions which don’t require the exchange of personal details like bank accounts and phone numbers. Cash Mode works with any phone with a mic and speaker and Tez app installed, and doesn’t require an NFC chip. Google’s Audio QR technology is similar to Chirp, which also sends data encoded in ultrasonic audio. There are 300 million smartphone users in India, and phones with NFC are still relatively rare and expensive, with many users instead favoring entry-level and mid-tier devices. Tez is a step be