My Journal

Category : News about Cyber Attack

How To Monitor a Remote Computer For Free

After a long time I am going to share very interesting things with you what is always keen in the youngers. I think everyone want to know how they can monitor a remote computer absolutely free. Do you want to monitor a remote computer for free? If your answer is yes,….. T...

Continue reading

Bad TOR exit nodes attempts to login with sniffed password with your hacked account

A security researcher spent a month to find bad TOR exit nodes by setting up a honey pot kind of website which has a fake login page - To find the nodes that sniffs the traffic and attempts to steal the password. This is very dangerous for those who completely depend on TOR Brows...

Continue reading

World first 200GB microSD available in the online market

@megaleecher.net Now wait has finished, no need to compress our mobile data to store in the mobile or any gadget.. You know why i ma saying to this because 200GB microSD has availabe in the market.. You can buy this product from many shopping website like Amazon etc.. This ha...

Continue reading

Astoria – Advanced Tor Client Designed to Avoid NSA Attack

In response to the threat of intelligence agencies like NSA and GCHQ, Security researchers from American and Israeli academics have developed a new advanced Tor client called Astoria specially designed to make eavesdropping harder. Tor (The Onion Router) is the most popular ...

Continue reading

100+ Mozilla Developers Emails and Password Exposed Accidentally

[caption id="attachment_67" align="alignleft" width="300"] Mozilla Developer email id exposed accidentally[/caption] Mozilla on Friday notified users of its Mozilla Developer Network (MDN) that the company has accidentally exposed the e-mail addresses and cryptographically prot...

Continue reading

Social Media Networks are going to medium to spread the worm to the user devices

[caption id="attachment_47" align="alignleft" width="207"] Worm grabbed the facebook[/caption] Very Interesting and useful information for the all Facebook lovers who spend a lot of time on Facebook. Well first of all I want to introduce a service which make your original url to ...

Continue reading

Hackers can intercept sms and phone calls.

[caption id="attachment_39" align="alignleft" width="300"] Hacker can access your Phone calls and SMS[/caption] Top I.T. security experts have discovered a fatal security flaw that can allow hackers to monitor private phone calls and also read text messages even if the consumers...

Continue reading

A Teenager hacked his school’s Computer to change his grade to avoid the parent verate

[caption id="attachment_6" align="alignleft" width="300"] School Network hacked by teenager to alter the grades of his exam[/caption] A normal boy of 16-year-old is being charged as an adult for the hacking of the the school computer to increase the grade. First of all he m...

Continue reading