hacker

  1. Hanno Labuschagne

    Teenager suspected to be behind Uber hack charged

    Teenager suspected to be behind Uber hack charged A 17-year-old teenager in England was charged with computer misuse and breaches of bail, according to a statement from City of London Police. The unidentified suspect was apprehended in Oxfordshire, southeast England, Thursday on suspicion of...
  2. J

    The hacker who disabled Telkom ADSL routers to force it to fix security flaws

    The hacker who disabled Telkom ADSL routers to force it to fix security flaws On the dark web and in the deeper corners of the public Internet, hackers tell stories of a vigilante who scoured the Internet for insecure devices, hacked into them, and disabled them so that other hackers couldn't...
  3. J

    Hacker to broadcast attack on Mark Zuckerberg's Facebook page

    Hacker to broadcast attack on Mark Zuckerberg's Facebook page An indie Taiwanese hacker has proclaimed he’ll broadcast an attempt to wipe out Mark Zuckerberg’s Facebook page this Sunday -- live. Self-professed bug bounty-hunter Chang Chi-yuan, who ferrets out software flaws in return for cash...
  4. P

    Local Hacker named "Curi Osity"

    Hi guys , just to make you aware. There seems to be a local Hacker named "Curi Osity". He uses [email protected] and lost of different gmail accounts to spread his work. Once he managed to get into your Gmail or any cloud based account then he copy all your photos and spread them via email...
  5. Newsfeed

    Radio station hijacked 8 times to play “I am a w**ker song”

    Radio station hijacked 8 times to play “I am a w**ker song” A hacker has hijacked the radio frequency of a UK radio station to play The Winker’s Song by Ivor Biggun eight times in one month.
  6. Newsfeed

    Why you should check your USB ports before using your PC

    Why you should check your USB ports before using your PC Before you start your PC, always check the USB ports.
  7. Kevin Lancaster

    Hackers leak emails from UAE ambassador to US

    Hackers leak emails from UAE ambassador to US Hackers have released the first series of leaked emails from the account of UAE’s ambassador to the United States Yousef al-Otaiba.
  8. Kevin Lancaster

    Russian hacker sentenced to 27 years

    Russian hacker sentenced to 27 years A federal judge has handed down the longest sentence ever imposed in the US for a cybercrime case to the son of a member of the Russian Parliament convicted of hacking into more than 500 US businesses and stealing millions of credit card numbers, which he...
  9. Kevin Lancaster

    Hackers nail unsecure websites on Afrihost server

    Hackers nail unsecure websites on Afrihost server In mid-February, hackers were able to access several websites hosted on one of Afrihost’s shared hosting servers, and started defacing them.
  10. G

    SA teens as victims of CyberCrime

    I am doing my LO project on SA teens as victims of CyberCrime. Not much is known about this problem in SA at the moment, other than issues around cyberbullying. We know that with the proliferation of smartphones, more and more teens are becoming vulnerable to cybercrime. Could you please...
  11. G

    Survey: Sa teens as victims of cybercrime

    I am in matric and am doing my LO research project on whether SA teens are victims of CyberCrime. I have developed a survey using Google forms. Would it be possible for you to please pass this on to any teens that would be willing to complete the survey? There will be a lucky draw of 5GB mobile...
  12. L

    Report 2 hacked VoIP numbers ASAP!

    A verbally abusive scammer calling up people shouting at them telling them he's calling from Microsoft and insisting that they are using pirated windows. Says his name is John Brady, demands people to run commands in their command prompt or open his logmein link to "prove" that the windows is...
  13. Kevin Lancaster

    An ethical hacker explains how to track down the bad guys

    An ethical hacker explains how to track down the bad guys When a cyberattack occurs, ethical hackers are called in to be digital detectives. In a certain sense, they are like regular police detectives on TV. They have to search computer systems to find ways an intruder might have come in – a...
  14. Kevin Lancaster

    Hacker posts iPhone hacking tools “FBI used”

    Hacker posts iPhone hacking tools “FBI used” The person who claimed responsibility for hacking mobile forensics company Cellebrite has posted cracking tools for older smartphones online, Motherboard reported.
  15. Kevin Lancaster

    Protect your privacy during turbulent times: A hacker’s guide to being cyber-safe

    Protect your privacy during turbulent times: A hacker’s guide to being cyber-safe Protecting individual privacy from government intrusion is older than American democracy. In 1604, the attorney general of England, Sir Edward Coke, ruled that a man’s house is his castle. This was the official...
  16. Kevin Lancaster

    Hacker shows a simple way to make a strong password that’s easy to remember

    Hacker shows a simple way to make a strong password that’s easy to remember A hacker has demonstrated a simple method for creating and remembering secure passwords.
  17. Kevin Lancaster

    Hacker can intercept any LTE call and text

    Hacker can intercept any LTE call and text Hacker Wanqiao Zhang of Chinese hacking house Qihoo 360 has demonstrated how calls and text messages on 4G LTE networks can be intercepted and shut off.
  18. Kevin Lancaster

    Hacker figures out how to get free data on his smartphone

    Hacker figures out how to get free data on his smartphone 17-year-old hacker Jacob Ajit has figured out how to get free mobile data on his smartphone, following a speed test he ran from a SIM with no service.
  19. Kevin Lancaster

    Religious hacker defaces escort sites, will leak user details

    Religious hacker defaces escort sites, will leak user details A “religiously-motivated” Moroccan hacker called ElSurveillance has defaced 37 websites as part of his #EscortsOffline campaign.
  20. Kevin Lancaster

    The drug-dealing, weapon-selling former South African crypto king

    The drug-dealing, weapon-selling former South African crypto king A former South African drug kingpin has been linked to the development of TrueCrypt, software which made headlines thanks to Edward Snowden.
Top
Sign up to the MyBroadband newsletter