HACK's
NEWS / INFO
today : | at : | safemode : ON
> / R00T / FACEBOOK / TWITTER / exit /
name author perms com modified category

APPLE iOS 8 Vulnerability Lets Hackers Crash Any iPhone and iPad Within Wifi Range D-38 freeware 0 12:33

Filename APPLE iOS 8 Vulnerability Lets Hackers Crash Any iPhone and iPad Within Wifi Range
Permission Freeware
Author D-38
Category


Security researchers have uncovered a zero-day vulnerability in iOS 8 that could repeatedly crash users' Apple iPhones, iPads and iPods when the devices connect to a malicious wireless hotspot.

It’s like Denial of Service (DoS) attack on Apple's iOS devices that results in crashing either individual iOS apps or users' entire iPhones.


You can also download the PDF related to this wireless attack.

10 Blacklisted Hacking countries D-38 freeware 0 07:01

Filename 10 Blacklisted Hacking countries
Permission Freeware
Author D-38
Category
10 Blacklisted Hacking countries



1. China
The Chinese may not always guilty, but have a share of 41% of hacker attacks. Just one year before the Republic of China was responsible for only 13% of
cyber attacks according to Akamai, and share in the third quarter was 33%.

2. U.S.
Every tenth hacker attacks worldwide originated in the United States.

Mother of Cyber World

3. Turkey
Bronze medal for Turkey, accounting for 4.7% of global cybercrime.

4. Russia
Russia is considered to defuse the situation from 6.8% to 4.3% October-December 2012.

5. Taiwan
Taiwanese are responsible for 3.7% of computer crimes at the end of 2012

6. Brazil
Brazil registered a decline of hacking attacks - from 4.4% at the end of 2011 to 3.8% in the third quarter of 2012 and 3.3% - in the fourth.

The hack3rs

7. Romania
The seventh is Romania with a share of 2.8%.

8. India
India is responsible for 2.4% of hacking attacks worldwide.

9.Italy
Italy's share falling to 1.6%.


10. Hungary
Hungary is responsible for 1.4% of cyber attacks in
late 2012.

Different Types of Hacker and their Thinking D-38 freeware 0 04:07

Filename Different Types of Hacker and their Thinking
Permission Freeware
Author D-38
Category
The different kinds of types of hackers there are, so people don't misunderstand what they are


White Hat: A hacker who is motivated to explore systems for intellectual curiosity, rather than for malicious or criminal intent. White hat hackers oppose doing damage to systems, stealing data, or interrupting service to a Web site. But their activities may be illegal if they explore systems they aren't authorized to enter. White hats can also unintentionally damage or delete data. Many white hat hackers work as well-paid security consultants, programmers, and network administrators. Refers to ethical hackers as well, as they (usually) only break into systems and pentest IF they have permission, thus they don't have a reason to do anything malicious except if it has been requested by f.ex. a contracting corporation (which is quite unlikely). These are also refered to as the good guys, as most of them makes proof of concept, consulting, etc. Which helps the internet to become more secure (even though their proof of concept are usually abused by f.ex. script kiddies). It should be said though, that occasionally black hats has been seen claiming they're white hats, and also (of course) that script kiddies were white hats. 




Black Hat: If you think of www as the wild, wild west, then you can guess on which side of the law the black hat hacker operates. Black hat hackers (aka "crackers") steal data or damage systems. The most dangerous black hats are able to remain undetected for years, secretly monitoring a victim's PC for whatever nefarious purpose they have in mind. This is the type of hacker that hacks for usually personal gain, weather it is economical, political or just fun doesn't matter. There's no such thing as respect for authorities, loyalty or morale (if there were, then they would be more near the gray hat area). In this case there's often found script kiddies claiming that they are pure black hat, because it sounds cool, destroying and might work with non-hackers to induce a state of "awesomeness", even though the real hackers would have no problem seeing that the person is just a script kiddo.




Red Hat- A Red Hat is an Aggressive Version of a White Mage in the employ of a Government Agency whose purpose is to hack into the Computer Mainframes of other Governments with the Goal of Disabling or Cripping them.

A Grey Hat-

A Grey Hat in the computer security community, refers to a skilled hacker who sometimes acts legally, sometimes in good will, and sometimes not. They are a hybrid between white and black hat hackers. They usually do not hack for personal gain or have malicious intentions, but may or may not occasionally commit crimes during the course of their technological exploits.

Disambiguation
One reason a grey hat might consider himself to be grey is to disambiguate from the other two extremes: black and white. It might be a little misleading to say that grey hat hackers do not hack for personal gain. While they do not necessarily hack for malicious purposes, grey hats do hack for a reason, a reason which more often than not remains undisclosed. A grey hat will not necessarily notify the system admin of a penetrated system of their penetration. Such a hacker will prefer anonymity at almost all cost, carrying out their penetration undetected and then exiting said system still undetected with minimal damages. Consequently, grey hat penetrations of systems tend to be for far more passive activities such as testing, monitoring, or less destructive forms of data transfer and retrieval.

The Ghost Hacker (Spammers)

This type of hacker, doesn't exist as the person behind has hidden that identity so well he should never get caught. The reason why it's unlikely he would get caught is due to he's extremely well skilled and also very focused on what he is doing. The ghost hacker lives though, a double-life in the real world and also virtually. He has a job, usually an anonymous IT-job in the middle-class, which he does without any problems. He has a normal route and routine on the internet just as the others of us, but this whole identity is just an identity to hide his real intentions. In his other life, which NO ONE knows about, he has probably a room with separate machines, which are quite stealthy. The last note about ghost hackers is they (usually) make big money on their things, and they might use a lot of time on doing the work with their contractors which are of course, hidden as well.



Blue Hat- A Blue Hat is a Rouge Hacker who hacks for fun or to get revenge on a certain person or company who may have angered them. You should avoid angering or offending Blue Hats, this should be very easy due to the fact that most Blue Hats are passive in nature and would rather practice on a person that they REALLY hate. Blue Hats are akin to "Noobs" due to the fact that they don't really care that much about hacking.

Green Hat- A Green Hat is a name for a New/Newb Hacker, who is just starting to practice hacking. Green Mages are akin to "Newbs" due to the fact that they show a desire to learn about hacking and listen to more experienced hackers, and also they don't suffer from the ADHD-like Noobdom of Blue Hats.

The Script Kiddie 

A script kiddie is not a hacker. He doesn't have the required knowledge about computers, servers and networks, infact only very basical knowledge about protocols, if he even knows what a protocol is. He's usually not capable of programming anything, though he's usually found on forums where similar exchanges ignorance. These kind of guys usually claims they know a lot, even though they really don't thus they are also found striking very at very random targets, on todays internet usually google picks their targets for them by using googledorks which might have even been made by other more skilled hackers. Most script kiddies doesn't understand anything in depth, yet they think they know a lot cause they can do their advanced stuff on windows machines.



Now My own Point of view is that 

World Best Defacer or Web hackers are "Turkish"
They hack 1 million plus sites and really make hell in cyber space.

World Best Coders are "Russians

Russian hacker codes are really really dangerous and what they code in 2003 are now used in 2012. This shows the level of Russian coders.

Reference : http://en.wikipedia.org/wiki/Hacker_(computer_security) Google Images

Legend Hackers of Pakistan Cyber Space D-38 freeware 1 03:26

Filename Legend Hackers of Pakistan Cyber Space
Permission Freeware
Author D-38
Category
Hey, I m Back. And this time, i came up with very very interesting post and very different from Regular Post. I thought, I should give the history and names of all those hackers, who was hell of passionate about hacking. At that time, most of them was in Student age so all are able to find time for hacking but now all just disappear in real world. That's just part of life. But we should become happy to remember the memories of old times. So lets start.....

"Pakistan Flag on Falcon HD Wallpaper"

"Team Name: GFORCE PAKISTAN
  Members: Sniper, instinct, Rave, Heataz, Miller, rsnake
  Cyber Era: 2000 - 2002""

"Team Name: PAKbugs
 Members: ZombiE_KsA, Spo0fer, x00mx00m, Cyber-Criminal
 Cyber Era: 2006 - 2009"
"PAKbugs , Pakistani Hackers HD Wallpaper"

"Team Name: Muslim Liberation Army - MLA
 Members: XtReMiSt ~ KillerMind ~ Jerry Hassan ~ Hitcher ~ Syed Zaadaa ~ HyP3r-Boy ~      Zarb-E-Momin ~ fAchO ~ Radical Assassin
 Cyber Era: 2008 - 2011"
Muslim Liberation Army, Pakistani Hackers HD Wallpaper

"Team Name: CyberH0x0rs
 Members: Apendix, Sho0ter, Net_Spy
 Cyber Era: 2008 - 2010"
CyberH0x0rs, Pakistani Hackers HD Wallpaper

"Team Name: Napsters CrEw / Team Guardians
 Team Members: MrCreepy, Dr.Freak, Hax.r00t, Hex786, Seeker, Evil_Gang, Predaterspk
 Cyber Era: 2008 - 2010"
Napsters CrEw / Team Guardians, Pakistani Hackers HD Wallpaper

"Team Name: UrduHack
 Team Members: Hex-Coder, Shadow008, Death_Angle, Password_Cracker, Shozy, Badoo
 Cyber Era: 2009 - 2010"
UrduHack, Pakistani Hackers HD Wallpaper

"Team Name: Pak Cyber Pirates- PCP
 Team Members: | Cyb3r0ck3r | NoSwear | XXx_Death_xXX | MINDY | Gujjar Haxor |
 Cyber Era: 2009 - 2010"
Pak Cyber Pirates, Pakistani Hackers HD Wallpaper

"Team Name: The Hackers Army - THA
 Team Members: THA Disaster, THA X ....
 Cyber Era: Active Team"
The Hackers Army - Pakistani Hackers HD Wallpaper

"Team Name: Pak Cyber Eaglez - PCE
 Team Member: P@khtun~72, SP@RK, Code Crack3r, Sizzling Soul, Nob0dy, Master M!nd
 Cyber Era: 2012-2013"
Pak Cyber Eaglez - Pakistani Hackers HD Wallpaper

"Team Name: Robot Pirates
 Team Members: Cfr, Reaper Grim, Zq@r, Ninja Kai, 3xploit
 Cyber Era: 2011-2012"
Robot Pirates, Pakistani Hackers HD Wallpaper

"Team Name: Zcompany Hacking Crew - ZHC
 Team Members: Muslim Hackers
 Cyber Era: 2008-2012"
Zcompany Hacking Crew, Pakistani Hackers HD Wallpaper

Mann... it was hell of a post. I forgot most of people names now. lol. If i say in 2013 and now, Pakistani hackers make some new records of fighting with each others. I will not point any single group but all of them are responsible. In old times, we used to hack for learning. And now every one hack for fame. I hope, we will again see the real era of hackers again. Who really hack for their passion. Not for fame.

I really enjoy to make these wallpapers. i know, its very much possible that missed many of hackers name but my memory is not so good. I try my best to add those name, which was in my memory. If some one want to say any thing or give me any advice or some thing. Feel free to comment. You can also comment as Anonymous so feel free to comment. That's all for today. Remember in in your prayers. Bye bye....

copy content  link

micro robots D-38 freeware 0 02:14

Filename micro robots
Permission Freeware
Author D-38
Category



A Colony of Solar Powered Flying Microbots! The Harvard Robobee Project is funded by the National Science Foundation. Scientists believe these robotic bees will autonomously pollinate field crops, perform search and rescue tasks, hazardous environment exploration, military surveillance and so much more. It's what's happening in your #Worldnow.




The top 10 most important hacks of 2013 D-38 freeware 0 07:48

Filename The top 10 most important hacks of 2013
Permission Freeware
Author D-38
Category



Over in the States previous week, Christmas buyers got an undesirable shock when it was exposed that a waiting scam resulted in the robbery of up to 40 million debit and credit card numbers commencing from a Target customers.
The retailer insisted on consumers to carry on a close eye on their testimonials in addition to credit scores; however this is definitely not the opening time that consumers along with web users have got to double verify their financial records for fraud, or alter an Internet secret code, in 2013.
This year, crooks have beleaguered servers to safe personal data, otherwise spread malware by means of phishing plans in order to win over Twitter and further social medium feeds. Government organizations were not protected to breaches, whilst the US in addition to China had a combat of words above whether they were undercover work on each other.
Mid-year, in the meantime, there was as well an uproar above presently how much right to use the US National Security Agency cover to email, phone records, plus other data, when previous contractor Edward Snowden revealed a cache trove of credentials to the journalists.
It’s positively been a full of activity year for scammers and hacker, moreover so we thinking we’d gather together the high-profile hacks which prepared headlines this year. Go through this article for our top ten safety breaches of 2013…

1. Adobe


In near the beginning of October, Adobe disclosed that it was the sufferer of a hack that influenced in the region of 3 million users. The cheaters made off with consumer names, encrypted debit or credit card numbers, cessation dates, as well as other information connecting to consumer orders.
The software firm too alleged that “source code intended for plentiful Adobe products” was stolen in a split intrusion that might be associated to the robbery of customer data. Later, on the other hand, Adobe admitted that the violation actually bowled 38 million users. Oops.

2. Syrian Electronic Army

The Syrian Electronic Army appeared in September 2012, although it was relatively tiring this year aiming the societal media descriptions of diverse media channels that the SEA supposed was publishing editorials considerate to Syrian rebels, counting the Financial Times, the New York Times, , the BBC,  the Guardian plus, even The Onion. It moreover managed to receive the New York Times web page offline in the month August. (Honorable mention: Hacking the Jeep Twitter and Burger King feeds).

3. Chinese hackers

In the month January, the New York Times discovered that it had been the goal of Chinese hackers for no less than four months. The invaders were supposedly in search of particulars in relation to sources to whom Times’ journalists conversed to for an October narrative about the prosperity of Wen Jiabao, China’s prime minister.
The subsequent month, security investigators from Mandiant sketched a inexhaustible group of supercomputer hackers to a government-backed, martial structure in Shanghai, China. The firm alleged the People’s Liberation Army Unit 61398 is sited “in specifically the similar area” as a part of APT1, an proceeded persistent hazard (APT) grouping that has stolen thousands of terabytes of memory data as of at least 141 organizations universally.

4. JPMorgan

Previous to this month, JPMorgan declared that 465,000 persons using prepaid currency cards issued through the bank possibly will have covered their individual data uncovered in an infringe. JPMorgan notified exaggerated cardholders, concerning 2 per cent of the whole 25 million citizens who cover UCards in addition to used the UCard Centre webpage amid July along with September. (Honourable declare: Evernote’s March contravenes along with LivingSocial’s April hack).

5. Zombies!

This hack was added amusing than monetarily devastating for users, but it did emphasize a disadvantage in America’s urgent situation alert process. In February, somebody hacked keen on the Emergency Alert System as well as announced on KRTV in addition to the CW within Montana so as to the zombie catastrophe was upon the first-class citizens of the US. The note kicked off resembling any other urgent situation alert – with dial up-esque bleeps along with tones and an attentive crawl atop the display. But relatively than forewarning about weather conditions emergency or else some further plausible position, an alarming voice came on to caution people concerning zombies. Rest guaranteed that there were no zombies. Not up till now, anyway.

6. US government hacks

Above in the States, the feeds were not protected to crooks or hackers this year, with more than a little government agencies falling victim to Internet violators, counting the Energy Department, the Federal Reserve, in addition to even the societal media accounts of previous Secretary of State Colin Powell.

7. Zuckerberg’s wall


If you don’t boast $100 (£60) to catch Mark Zuckerberg’s concentration, why not scam his Facebook timeline wall? That’s what Palestinian safety investigator Khalil Shreateh did following he discovered a malfunction in the Facebook surrounding substance that would purportedly allow any person to place to the Facebook walls of several other addict. Subsequent to Facebook ignored his cautions, he determined to take benefit of the development and post particulars of the post on the CEO’s facebook wall. Facebook later on fixed the glitch, but refused to provide Shreateh a $500 (£300) bug reward.

8. Apple developer website

Apple gets its developer medial offline in late July, whilst a suspected hacker endeavored to embezzle personal data from the corporation’s record. While the statistics was encrypted with “cannot be accessed,” Apple supposed, there was several concerns that “developers’ names, sending addresses, with/or email addresses possibly will have been admittances.” An refurbished version of the website responsed online in median-August.

9. Facebook plus Apple malware

In the month February, Facebook alleged its safety team had revealed that Facebook’s coordination was “targeted in a complicated attack.” It occurred “when a set of workers stopover a mobile developer webpage that was negotiated,” Facebook alleged. Some days afterward, Apple completed the rare access that it as well was the prey of hackers, assaulted by the similar online criminals who besieged Facebook. No consumer records was stolen as of either corporation, however.

10. Anonymous v/s North Korea

In the month April, North Korea’s certified Twitter plus Flickr explanations were hacked, supposedly as component of “hacktivist” set Anonymous’ efforts to disturb the Communist state’s web attendance. The attackers embattled North Korean head Kim Jong-un in a sequence of tweets plus photos that depicted him in a fewer-than-flattering beam.

A Live Map of Ongoing DDoS Attacks D-38 freeware 0 03:17

Filename A Live Map of Ongoing DDoS Attacks
Permission Freeware
Author D-38
Category

A Live Map of Ongoing DDoS Attacks

In a dusty pre-millennium geography journal I was reading the other day, I skimmed over an article that iterated the great challenges faced in trying to visualize the Internet, and "access" to it via different ISPs determined by living in different metropolitan areas in the US.
Fast forward 14 years, and that seems a lesser challenge. Today, visualizing cyberspace is a "consensual hallucination" many of us want to see and feel more of. Now, take a look at this map, where it's a bright, sunny day, and everyone is attacking each others' networks. Business as usual.
It's the Digital Attack Map, and it was produced in a collaborative effort by Google Ideas and Arbor Networks to raise awareness about distributed denial of service attacks. You know, those malicious digital attempts to choke, or shutdown websites by sending them volumes of traffic far too large for them to handle. The map "surfaces anonymous attack traffic data to let users explore historic trends and find reports of outages happening on a given day," as its about page explains.
Created using attack data from Arbor’s "ATLAS® global threat intelligence system," this is the D.A.R.E. of DDoS—it's about the danger of having information streams cut off. Under the heading "DDoS Attacks Matter," Google and Arbor explain that "sites covering elections are brought down to influence their outcome, media sites are attacked to censor stories, and businesses are taken offline by competitors looking for a leg up."
While this map is here to emphasize the impact that screwing with the way the Internet works can have on everyday citizens of real-world democracies, I wonder if it's too pretty for its own good. To those carrying out the attacks (activists, money makers, or just malicious, anarchistic hackers), I'd think the live display of their attack data is read with pride. Like graffiti.
We've seen some very interesting visualizations of the Internet's endless flow of information in the past year. Namely, one of Internet-use over the course of a day, resulting in a beautiful Lite-Brite-like map that was created by hacking into 420,000 computers. There were also some YouTube videos that lent themselves to visualize what a DDoS attack looks like. While the former wasn't very legal to create, it has endlessly fascinated and consumed web-users with its repeating animation.
While Digital Attack Map is a public service announcement that'll likely captivate a long stare (and fall deaf on many ears, like my mom's), this live map is anything but underwhelming. For those bored with the live map, the site features playbacks of bigger DDoS attacks in recent history. Just scroll down to the bottom of the page, where you can watch as Citizen's Bank,Github/Obamacare, and Al-Qaida's forums are attacked.

Skype Provided Backdoor Access to the NSA Before Microsoft Takeover [NYT] D-38 freeware 0 11:49

Filename Skype Provided Backdoor Access to the NSA Before Microsoft Takeover [NYT]
Permission Freeware
Author D-38
Category
The NSA saga continues in the Redmond-based empire, this time with a new report aimed at Microsoft’s flagship VoIP platform Skype.



A report published by The New York  Times and citing people who asked not to be named for obvious reasons, Skype developed its own user-monitoring system before the Microsoft acquisition in October 2011.

It appears that US intelligence agencies have insisted that local software companies must cooperate closer with the NSA, so it asked several top vendors, including Skype, to put together secret teams to develop systems that would provide them with backdoor access to users’ conversations.The source claims that the NSA wanted “to control the process themselves” and thus skip the process of contacting the parent company and asking for details on select user accounts.

This is how Skype Project Chess was born. “Less than a dozen people inside Skype” have been asked to develop a hidden system that would allow the NSA to access conversations and user details at any time. 

Skype officially joined the PRISM program on February 6, 2011, so it’s believed that the backdoor access system was already up and running at that time, more than half a year before the Microsoft acquisition was completed.

It’s not yet confirmed, but it appears that those tools have already been removed from Skype, as part of Microsoft’s network updates over the years. Tipsters, on the other hand, claim that companies involved in this NSA secret plan have kept the monitoring systems to “control the process themselves.”

The interesting thing is that Microsoft is now refusing to comment on this report, even though the company has often denied stories claiming that Skype calls can be wiretapped.

The only thing we got from Microsoft in the PRISM scandal is the public statement rolled out this month and claiming that it never provides user details to the government on a voluntary basis.

“We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”