HULK - The Web Server DoS Tool. Tools Yard Hacking Tools archive by The Hacker News. Get hacking tools, network tools, gmail hacking tools, ethical hacking, vulnerability assessment, penetration testing, email hacking, password hacking, reverse engineering, denial of service, wifi hacker

Penetration Testing Cheat Sheet from 'Average Security Guy'

[ Please Retweet ] #MALWARE | The Hacker News Magazine - IT Security Magazine http://magazine.thehackernews.com/issue-12.html

DROPOUTJEEP: #NSA's Secret program to access any #Apple iPhone, including microphone & camera http://thehackernews.com/2014/01/DROPOUTJEEP-NSA-Apple-iPhone-hacking-tool.html

Social-media management service #Buffer hacked; Twitter, Facebook flooded with #Spam Weight-loss links http://thehackernews.com/2013/10/buffer-hacked-twitter-facebook-flooded.html #Security

Several Malicious #Android apps found on Google Play affects 25,000 devices http://thehackernews.com/2013/08/Android-hacking-apps-download-malware-tool.html #Security #malware

Encryption Tool TrueCrypt Shuts Down Mysteriously, Encouraging to Use Bitlocker http://thehackernews.com/2014/05/encryption-tool-truecrypt-shuts-down.html #Security

Terrorist Group Al-Qaeda has started using 3 New own-developed Encryption Softwares After #NSA Revelations. But, Should Edward Snowden be blamed for this? Read Article to Know More - http://goo.gl/80dJR0

"Maxpain" Hacker and Security Developer, Releases two tools in an Package called "Anonymous Attacker Package". First one is - Anonymous external attack, allows you to execute udp flood web attack, into websites and 2nd - Anonymous DNS Extractor. Get it here : http://thehackernews.com/2012/03/anonymous-attacker-package-by-maxpain.html

Superb! Realtime 3D #Cyber Attack Alert System in Japan http://news.thehackernews.com/superb-realtime-3d-cyberattack-alert-system-in-japan

Title: Ghost in the Wires Author: Kevin Mitnick Business book? Well, maybe not; however, you will learn about social engineering and why security is not just guards at the door and Norton antivirus on your computer. One of those rare books that you can't put down - a fascinating read.

The art of deception by Kevin Mitnick

Hacker reported #vulnerability in Kaspersky website; Demonstrated #malware spreading technique http://thehackernews.com/2013/08/hacker-reported-vulnerability-in.html #Security

Hey // Follow The Hacker News on Pinterest (Another Amazing Social Network) http://pinterest.com/thehackernews/the-hacker-news/

First, he warned of the #security flaw in Iran’s banking system. Then he provided them with 1,000 bank account details. When they didn’t listen, he #hacked 3 million accounts across at least 22 banks. http://thehackernews.com/2012/04/banking-system-vulnerability-3-million.html

Chinese Hackers Steal Designs for top US Military Tech - Now What?

Is your Internet TV #vulnerable to hackers? Internet TVs could be the newest avenue for cybercriminals to infiltrate your home or business. According to a new report from researcher NPD In-Stat predicts that 100 million homes in North America and Western Europe will own television sets that blend traditional programs with Internet content by 2016. #Security Read story here : http://thehackernews.com/2012/04/security-concern-internet-enabled-tv.html

Chinese+hackers+attack+on+White+House+computers

Last week, Hackers posted on the internet the private data of Czech Prime Minister Petr Necas, including the numbers of his three mobile telephones, after a series of cyber attacks on government web sites. Today Anonymous Hackers claim to released personal details about members of the largest of the three parties in the ruling Czech coalition, the Civic Democrats (ODS). http://thehackernews.com/2012/04/anonymous-exposes-data-of-10000-civic.html

Accused #LulzSec hacker Cody Kretsinger pleaded guilty today in a federal court in Los Angeles, California, to felony charges associated with the breach of Sony Pictures Entertainment that occurred in mid-2011. http://thehackernews.com/2012/04/lulzsec-hacker-pleads-guilty-in-sony.html

modern-methods-of-electronic-communications-interception-unit-1-i-p by Carla McCoy via Slideshare