Hackers News Bulletin| Latest Cyber Security News Portal

Hackers News Bulletin | Latest Cyber Security News Portal
Follow us socially to get News Fast:

Hackers gain access to FAA computers

Hackers gain access to FAA computers The Federal Aviation Administration has failed to safeguard the nationwide air traffic system from cyber criminals or others who may try to attack computers that are used to direct flight planes. The Government Accountability Office...

Read More


By: Hacker | in: News | on: March 3, 2015

Seagate NAS Zero Day Makes Many Susceptible: One Cyber criminal’s Painful Account Of Failed Exposé Proceedings

Seagate NAS Zero Day Makes Many Susceptible One Cyber criminal's Painful Account Of Failed Exposé Proceedings When white hat cyber criminal OJ Reeves revealed a vulnerability in Seagate’s Network Attached Storage (NAS) software, alongside two completely functional developments leveraging the fault, he did not do it out of some bad content. Or to...

Read More


By: Hacker | in: News | on: March 3, 2015

Gemalto offers the findings of its examination into the suspected hacking of SIM card encryption keys by (GCHQ) an (NSA)

Gemalto offers the findings of its examination into the suspected hacking of SIM card encryption keys by (GCHQ) an (NSA) On February 25, 2015 in Amsterdam, following the a report by a news site on February 19, 2015, Gemalto has carried out a methodical examination, based on two features: the alleged NSA and GCHQ files which were posted publicly by this site, and...

Read More


By: Hacker | in: News | on: March 2, 2015

Teenager hacks his school and improves his grades!

Teenager hacks his school and improves his grades! He sure is extremely bright for a student with bad grades. A computer geek from Staten Island who took higher computer training classes at an technology camp for elite students used his talent to raid a safe computer network and change his...

Read More


By: Hacker | in: News | on: March 1, 2015

Cyber criminals discover a new gadget that will help you make spam calls and turn someone’s life into a nightmare!

Cyber criminals discover a new gadget that will help you make spam calls and turn someone's life into a nightmare! There has been a new break - through in the field of cyber hacking. The days of hackers coming up with advanced ways of gaining access in to the private systems are over, and now they have leaped forward with a new invention. Cyber criminals...

Read More


By: Hacker | in: News | on: February 26, 2015

Cyber Criminals hack the US state department thousands times in one day

Cyber criminals hack the US state department thousand times in one day You may seldom fret over lost pass codes and attempting recovery again and again, but you take reassurance in the reality that you are not the United States of America State Department. Administrators have exposed that the government stops many...

Read More


By: Hacker | in: News | on: February 25, 2015

What is a Dictionary Attack – How a dictionary attacker uses a word list

What is a Dictionary Attack - How a dictionary attacker uses a word list A dictionary attack occurs when the hackers try to obtain the passwords of a secure web site or area by using every single word in the dictionary (so that they can manually guess the password) in order to access confidential information. In...

Read More


By: Hacker News | in: Online Security | on: February 24, 2015

The Lizard Squad hackers are back

The Lizard Squad hackers are back in action In the midst of December, an internet foray scraped both the X Box Live and Play Station system offline. In an attempt to capture the culprit, the British law force detained a boy who was just eighteen years of age - many people expressed...

Read More


By: Hacker | in: News | on: February 22, 2015

Sim card database hack gave US and UK spies access to billions of cell phones

Sim card database hack gave US and UK spies access to billions of cell phones Spies from America and the UK hacked into the world’s biggest Sim card producer in a move that gave them unregulated access to billions of mobile phones around the world and looks ready to spark another international line up into overstretch...

Read More


By: Hacker | in: News | on: February 21, 2015

Two factor authentication Solutions for more online security

Two factor authentication Two-factor verification provides definite recognition of consumers by means of two different mechanisms. These mechanisms may already be known by the user, it may be something that the user has or something that is inseparable from the consumer....

Read More


By: Hacker | in: Online Security | on: February 20, 2015