Search found 12 matches

by Just
Fri Apr 12, 2024 7:56 pm
Forum: Advanced hacking
Topic: LogoFAIL attack: using image files to attack computers
Replies: 0
Views: 427

LogoFAIL attack: using image files to attack computers

When you turn on a computer, the manufacturer’s logo is displayed on the screen before the operating system boots. This logo can actually be changed — a function intended to be used by laptop and desktop manufacturers. But there’s nothing stopping an ordinary user from using it and replacing the def...
by Just
Fri Apr 12, 2024 7:39 pm
Forum: Other Tech news
Topic: Compact Disks make Comeback: Memory could Exceed Petabytes
Replies: 0
Views: 446

Compact Disks make Comeback: Memory could Exceed Petabytes

Memory storage technology has come a long way from compact disks. Or has it? In a recent paper, scientists report they were able to fit petabits of memory onto a compact disk using new laser technologies and advanced material design. Is this the future of data storage? Let’s have a look. https://www...
by Just
Fri Apr 12, 2024 3:29 pm
Forum: Announcements
Topic: Everybody can post, no registration needed!
Replies: 0
Views: 466

Everybody can post, no registration needed!

Everybody can post for now, no registration needed!
by Just
Fri Apr 12, 2024 3:21 pm
Forum: Security News
Topic: Dutch chipmaker Nexperia hacked by cyber criminals
Replies: 0
Views: 456

Dutch chipmaker Nexperia hacked by cyber criminals

Dutch-headquartered chipmaker Nexperia was victim of a hacking attack by cyber criminals last month, the Chinese-owned company said on Friday, and was investigating the incident with the help of outside specialists. "Nexperia has become aware that an unauthorized third party accessed certain Ne...
by Just
Fri Apr 12, 2024 3:16 pm
Forum: Dumps
Topic: File With 1.4 Billion Hacked And Leaked Passwords Found On The Dark Web
Replies: 0
Views: 625

File With 1.4 Billion Hacked And Leaked Passwords Found On The Dark Web

Researchers said the 41GB massive archive, as shown below, contains 1.4 billion usernames, email, and password combinations—properly fragmented and sorted into two and three level directories. The archive had been last updated at the end of November and didn't come from a new breach—but from a colle...
by Just
Fri Apr 12, 2024 2:52 pm
Forum: Beginner hacking
Topic: Beginner's guide to hacking
Replies: 0
Views: 996

Beginner's guide to hacking

https://media.geeksforgeeks.org/wp-content/uploads/20230104164245/EH-11.png The word "hacker" is used to define programmers who obtain unauthorised access to computer systems via exploiting flaws or vulnerabilities, either for malicious or mischievous purposes. This includes the creation ...
by Just
Fri Apr 12, 2024 2:39 pm
Forum: Security News
Topic: Darknet marketplace Nemesis Market seized by German police
Replies: 0
Views: 417

Darknet marketplace Nemesis Market seized by German police

The German police have seized infrastructure for the darknet Nemesis Market cybercrime marketplace in Germany and Lithuania, disrupting the site's operation. The Federal Criminal Police Office in Germany (BKA) and the Frankfurt cybercrime combating unit (ZIT) conducted the action on Wednesday, March...
by Just
Fri Apr 12, 2024 2:33 pm
Forum: Security News
Topic: Hackers Leak Personal Information of 30,000 FBI and DHS Employees
Replies: 0
Views: 410

Hackers Leak Personal Information of 30,000 FBI and DHS Employees

After a making several threats to publish breached information, hackers took to social media to boast about a data dump that exposed details of 20,000 Federal Bureau of Investigation employees last Monday. This was a quick follow-up to the posted information bragged about a day before by the same gr...
by Just
Fri Apr 12, 2024 2:31 pm
Forum: Recent databreaches
Topic: Data Breaches That Have Happened in 2022, 2023 and 2024 So Far
Replies: 0
Views: 440

Data Breaches That Have Happened in 2022, 2023 and 2024 So Far

March 2024 March 20 Vans Data Breach: Vans customers have been told they might be at risk of fraud and identity theft following a breach of the company's systems. “On December 13, we detected unauthorized activities on a part of our IT systems, apparently carried out by external threat actors,” the ...
by Just
Fri Apr 12, 2024 2:27 pm
Forum: Security News
Topic: Malicious Code in XZ Utils for Linux Systems Enables Remote Code Execution
Replies: 0
Views: 422

Malicious Code in XZ Utils for Linux Systems Enables Remote Code Execution

The malicious code inserted into the open-source library XZ Utils, a widely used package present in major Linux distributions, is also capable of facilitating remote code execution, a new analysis has revealed. The audacious supply chain compromise, tracked as CVE-2024-3094 (CVSS score: 10.0), came ...