Anonymous DDoS and shutdown London Stock Exchange for two hours

Anonymous hacktivists take down the London Stock Exchange website for more than two hours as part of protest against world’s banks The online hacktivist group, Anonymous reportedly shut down the London Stock Exchange (LSE) website last week for more than two hours as part of a protest against world’s banks and financial institutions. According to Read more about Anonymous DDoS and shutdown London Stock Exchange for two hours[…]

Mark Zuckerberg’s Pinterest, LinkedIn and Twitter accounts Hacked

Facebook CEO, Mark Zuckerberg’s Pinterest, Twitter, LinkedIn accounts hacked Facebook CEO Mark Zuckerberg is in the news once again, but for all the reasons. This time is because of his social networking accounts which were hacked by hackers. A hacker group named OurMine Team with 41,000 followers on Twitter have claimed to have gained access of Zuckerberg’s Read more about Mark Zuckerberg’s Pinterest, LinkedIn and Twitter accounts Hacked[…]

Cyborg Hawk Linux

Cyborg Hawk Linux The most advanced, powerful and yet beautiful penetration testing distribution ever created.Lined up with ultimate collection of tools for pro Ethical Hackers and Cyber Security Experts. Simplify security in your IT infrastructure with Cyborg. Its real strength comes from the understanding that a tester requires a strong and efficient system,that benefits from Read more about Cyborg Hawk Linux[…]

Use Strong Passwords

Tips for creating a strong password Passwords provide the first line of defense against unauthorized access to your computer. The stronger your password, the more protected your computer will be from hackers and malicious software. You should make sure you have strong passwords for all accounts on your computer. If you’re using a corporate network, Read more about Use Strong Passwords[…]

Cyber Theft In India

Internet crime is crime committed on the Internet, using the Internet and by means of the Internet. Computer crime is a general term that embraces such crimes as phishing, credit card frauds, bank robbery, illegal downloading, industrial espionage, child pornography, kidnapping children via chat rooms, scams, cyberterrorism, creation and/or distribution of viruses, Spam and so Read more about Cyber Theft In India[…]

Kali linux Toolkit

Top 10 Kali linux Toolkit Information Gathering Vulnerability Analysis Web Applications Password Attacks Wireless Attacks Exploitation Tools Sniffing/Spoofing Maintaining Access Reverse Engineering Stress Testing Hardware Hacking Forensics Reporting Tools System Services Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. Since there is no patch for human stupidity, this is Read more about Kali linux Toolkit[…]

Website HackingTricks

SQL Injection in MySQL Databases:- SQL Injection attacks are code injections that exploit the database layer of the application. This is most commonly the MySQL database, but there are techniques to carry out this attack in other databases such as Oracle. In this tutorial i will be showing you the steps to carry out the Read more about Website HackingTricks[…]