Latest Hacking News

Hacking with new Ideas provide Latest Hacking News.

26 Dec 2013

Gadget that make your Smartphone more Smart : FIN

FIN a Gadget from RHL VISION  with the slogan " Wear the World ". From a website  Fin is a real life buddy for every individual to do their digital interactions as natural as possible. Fin is a trendy gadget you can wear on the thumb and make your whole palm as a digital touch interface.  From interacting with Rohil Dev a Founder/CEO of RHL Vision  ,  said about FIN - : We are using...

24 Dec 2013

Merry Christmas to you from Hacking with New Ideas

I hope that your Christmas would be enjoyable and may the essence of Christmas remains always with you. Merry X-mas. Friends like you are very tough to get.I wish you a merry Christmas before it is too late...

21 Dec 2013

Top 5 DDoS Attack Tools : Distributed Denial of Service Attack

What Is a Denial of Service Attack? A DOS attack is an attempt to make a system or server unavailable for legitimate users and, finally, to take the service down. This is achieved by flooding the server’s request queue with fake requests. After this, server will not be able to handle the requests of legitimate users. In general, there are two forms of the DOS attack. The first form is on that can crash a server. The second form of DOS attack...

19 Dec 2013

Top 10 CMS : Content Management Systems for Development

There are plenty of options when it comes to picking a content management system for a development project. Depending on how advanced you need the CMS to be, what language it’s built in, and who is going to be using it, it can be a nightmare trying to find the “perfect” CMS for a project. However, some CMSs have a slight edge over the rest of the competition because of the usability of the software. Some are just easier to install, use and extend,...

18 Dec 2013

NSA officials claimed that China has developed a BIOS based malware

During a CBS Interview show "60 Minutes", The National Security Agency (NSA) officials claimed that China has developed a BIOS based malware that can remotely destroy any computer. Obviously NSA is struggling to repair its image and in an effort to justify their extensive Surveillance programs, The NSA Director General Keith Alexander and Information Assurance Director Debora Plunkett made a number of claims.During...

16 Dec 2013

Google removes privacy feature from Android, says inclusion was an accident

Google Inc has removed an experimental privacy feature from its Android mobile software that had allowed users to block apps from collecting personal information such as address book data and a user's location. The change means that owners of smartphones using Android 4.4.2, the latest version of the world's most popular operating system for mobile devices released this week, must provide access to their personal data in order to use...

11 Dec 2013

Mouabad Android Malware calling to Premium numbers; Generating revenue for its Master

Android platform is a primary target for malware attacks from few years and during 2013, more than 79% of mobile operating malware threats are taking place on Android OS.  Till now we have seen the majority of Android malware apps that earn money for their creators by sending SMS messages to premium rate numbers from infected devices.  Security researchers at Lookout identified an interesting monetized Android Malware labeled...

4 Dec 2013

Researchers create malware that communicates via silent sound, no network needed

How a malware can steal the data from an infected system that doesn't have internet connection? You might think it is impossible.  Computer scientists say it is possible. When security researcher Dragos Ruiu claimed malware dubbed “badBIOS” allowed infected machines to communicate using sound waves alone—no network connection needed—people said he was crazy. New research from Germany’s Fraunhofer Institute for Communication, Information Processing,...

2 Dec 2013

SQL injection Tutorial : The Power of SQLi

In this article, you will learn how to perform a SQL injection attack on a website. Please note that this article is for instructional purposes only. If you successfully breach a website that does not belong to you, you are in violation of federal law and could face incarceration and hefty fines. That said, it is useful to understand how SQL injection works so that you can prevent it from occurring on your own website. What is a...