5 Effective Ways on How To Hack Cellular Phones

  Image source: Pixabay Construction and deconstruction have always been the core elements that drive the sector of technology forward. Ethical hacking may sound like something odd, but its value is bigger than many may think. The livelihood of many platforms is their security. It is out of necessity that many systems fortify their security after it’s been breached by knowing how it was breached and then fixing accordingly. If a company uses a third-party … Read more

New DDoS Hacking Group Looking to Out-Slither the Lizard Squad

In the battle for supremacy between two powerhouse DDoS hacking groups, botnets will be assembled, malicious traffic will be mobilized, servers will be sunk and targets will buckle under the strain. In the battle for supremacy between DDoS hacking groups, there can be only one victor. However, there can be over one billion losers: every website on the internet. Behold the chaos brought on by a single distributed denial of service attack on Skype. The … Read more

Keep Hackers Away From Your Smart Gifts This Christmas

This holiday season, there won’t be a shortage of internet connected devices like Drone planes, Smartwatches, Smart TVs, cameras, microwave ovens, refrigerators, ACs and central heating thermostats, even medical devices like pacemakers on the market. While it might seem like a great idea to get Smart Gifts for Christmas for your friends and relatives, don’t hurry off just yet. As more aspects of our daily lives become network based, we are opening ourselves to increased … Read more

Why Passwords are Bad for Data Security

Did you think using a password was enough to protect all your personal and financial information? Think again. The primary reasons why Passwords are a bad bet in the world of data security are: Badly chosen combinations – Most people choose passwords which are combinations of phrases and numbers somehow related to their identities. This makes it easier to guess what the password it, when you have the relevant personal details. Even less secure passwords … Read more

pcAnywhere Cracked by Anonymous Admits Symantec and Norton Security

Despite the reputation of being “hackers on steroids,” Anonymous’ first tool of choice is not always a crack, hack, or exploit.  In response to legislation concerning SOPA and ACTA, much of their protest has come in the form of DDoS (denial of service) attacks.  These attacks are executed by simply requesting access to a website an infinite amount of times to the point that it fails to load.  According to Symantec however, Anonymous is utilizing … Read more

Megaupload Shutdown by Feds: Anonymous Retaliates Brutally

Updates can be found at the bottom of the story. Megaupload just can’t seem to catch a break these days – in fact it may not ever catch a break again.  The online storage company has fallen under the dark cloud of a federal indictment for its alleged long term history of “racketeering conspiracy, conspiring to commit copyright infringement, conspiring to commit money laundering,” and many other charges as outlined by the Department of Justice … Read more