The Hacker News — Most Popular Cyber Security, Hacking News Site: Brute force

Bug Hunter Found Ways to Hack Any Instagram Accounts

Bug Hunter Found Ways to Hack Any Instagram Accounts
May 21, 2016Swati Khandelwal
How to hack an Instagram account? The answer to this question is difficult to find, but a bug bounty hunter just did it without too man...

Smartwatch Hacked... Data Exchange with Smartphone Not So Secure

Smartwatch Hacked... Data Exchange with Smartphone Not So Secure
December 10, 2014Swati Khandelwal
We are living in an era of smart devices that we sync with our smartphones and make our lives very simple and easy, but these smart devi...

Mayhem — A New Malware Targets Linux and FreeBSD Web Servers

Mayhem — A New Malware Targets Linux and FreeBSD Web Servers
July 24, 2014Swati Khandelwal
Security researchers from Russian Internet giant Yandex have discovered a new piece of malware that is being used to target Linux and F...

BrutPOS Botnet Compromises insecure RDP Servers at Point-of-Sale Systems

BrutPOS Botnet Compromises insecure RDP Servers at Point-of-Sale Systems
July 10, 2014Swati Khandelwal
Cyber criminals are infecting thousands of computers around the world with malware and are utilizing those compromised machines to break...

98% of SSL enabled websites still using SHA-1 based weak Digital Certificates

98% of SSL enabled websites still using SHA-1 based weak Digital Certificates
February 06, 2014Anonymous
The National Institute of Standards and Technology (NIST) had published a document on Jan 2011 that the SHA-1 algorithm will be risky and ...

More details about alleged 17-year-old Russian BlackPOS Malware Author released

More details about alleged 17-year-old Russian BlackPOS Malware Author released
January 20, 2014Anonymous
Security experts at IntelCrawler provided a new interesting update on BlackPOS malware author , that he forgot to delete his Social netwo...

Cyber criminals targeting another cryptocurrency 'Primecoin' with malicious miners

Cyber criminals targeting another cryptocurrency 'Primecoin' with malicious miners
January 16, 2014Mohit Kumar
Like Bitcoin, There are numerous other cryptocurrency similar in nature, including  MasterCoin , ProtoShares, Litecoin, Peercoin, BitBar and...

Hackers behind TARGET data breach looking for Pro-cracker to decrypt Credit card PINs

Hackers behind TARGET data breach looking for Pro-cracker to decrypt Credit card PINs
January 10, 2014Swati Khandelwal
I think you haven’t forgotten the massive data breach occurred at TARGET , the third-largest U.S. Retailer during last Christmas Holidays. P...

Hacking Wireless DSL routers via Administrative password Reset Vulnerability

Hacking Wireless DSL routers via Administrative password Reset Vulnerability
January 03, 2014Mohit Kumar
If you want to hack a Netgear and Linkys Wireless Routers , there is a quick backdoor entry available, that allow an attacker to reset the ...

World War C report - Motives behind State Sponsored Cyber Attacks

World War C report - Motives behind State Sponsored Cyber Attacks
October 03, 2013Anonymous
Nation-state driven cyber attacks are routinely conducted on a global scale to defend national sovereignty and project national power. W...

Short Password Reset code vulnerability allows hackers to brute-force many websites

Short Password Reset code vulnerability allows hackers to brute-force many websites
August 19, 2013Anonymous
Yesterday we received a vulnerability report in web applications from some unknown Indian Hacker, who explained that how Hackers are hi...

Cracking 16 Character Strong passwords in less than an hour

Cracking 16 Character Strong passwords in less than an hour
May 30, 2013Mohit Kumar
The Password serves to protect your financial transactions, your social networking sites, and a host of other nominally secure websites ...