Tuesday, December 22, 2015

Top 6 Black Hat Hackers In The World


There are two types of hackers. First one are good hackers who are known as “white hat” hackers and another one which we will be talking about today are called “black hat” hackers.
In this post, I will talk about six famous black hat hackers and their hacks which made them famous or wanted.

1. George Hotz

George Hotz
Young and talented and what is the most important bored teenager, George Hotz wanted to have fun one summer night and as a result he hacked the Sony’s company Iphone. It happened in June of 2007, by that time George was 17. It was a bit of a challenge, because how to hack device with assistant things? The secret is to figure out how “to speak to the device”. He also mentioned that what he did was completely legal. It seems people can be dangerous in certain way when they are bored. Who knows what may happen if crazy smart geek will find thy way of his ideas.

2. Kevin Mitnick

Kevin
Kevin Mitnick is well-known as the most-wanted computer criminal in the United States. He was in high school when he started hacking. For several years he hacked dozens ofcompanies. What interesting, for those “services” he was finally arrested in 1995 at his apartment for hacking. Kevin also has served 5 years in prison, nevertheless despite of his experience he runs his own security firm named Mitnick Security Consulting. The other side of the coin is, however Mitnick published a book that calls “Ghost in Wires”, which is about his upps-and-downs, victories and crushes. He shared that every hack was like a climbing to mountain and he reached the Everest. This is one more proof how talent have pined, because of a boredom.

3. Adrian Lamo

Adrian  
Adrian was called as the most effective and controversial hacker of the 21st century. That is very flattering status. He was famous for breaking into several high-profile computer networks. Lamo might use his gift to help people to consult, what is actually he did, but as exception and compromise. His baby steps in hacking, Adrian Lamo made pretty early and became known for the first time for operating AOL watchdog site. As many others, he was arrested in 2003 and had to correspond for each and every computer crime.Thus, even if Lamo now works as a threat analyst and public speaker, his glory will always follow him, because our past if the part of our “present” and a part of who we are.

4. Gary McKinnon

Gary
This “black hat” McKinnon hacked into 97 United States military and NASA computers. He could be the biggest threat for government. Glasgow-born McKinnon wanted the truth to come out and show itself. In March 2002 Gary was arrested by police. “Black hat” used his hacking skills to “research” his beliefs and evidence of UFOs inexhaustible source of power, into the US government’s computers. He didn’t do that because of boredom, but because of obsession and thirst to hidden knowledge. Probably this computer crime is serious, but forgivable. Man wasn’t going to hack computer system because he was bored or to prove something, we was looking for truth no more than.

5. Jonathan James

Jonathan
Story of Jonathan James is sad, nevertheless his life can be compared to come t – short, but bright. In 1999 teenager at the age of 15 years old hacked into Bellsouth and Miami-Dade school network. Jonathan James damaged NASA Systems, it costed $41,000 to fix the systems. It goes without saying that he made serious damage. To stole software from NASA that worth $1.7 Million is one the biggest computer crimes. He wasn’t after information or justice, he was after money… As they say, never speak ill of the dead. Jonathan James was sentenced 6 months house arrest and banned from using computer, however that didn’t prevent him to commit suicide.

6. Kevin Poulsen

Kevin
This talented “cyber-terrorists” could have great career and almost blow his chance. It seems that this hacker likes contracts and his life reflects it pretty well. He hacked into the US Department of Defense’s Arpanet. However later he worked as a consultant testing Pentagon computer security. Late on Kevin hacked FBI, after that hacked phone lines to radio station of Los Angeles… Poulsen’s life reminded American switchbacks…Certainly he was wanted by FRI and finally they caught him. Despite of such interesting past, Kevin is law-abiding citizen and has several awards of International Academy of Digital Arts and Sciences.

Friday, November 6, 2015

1,000 Ku Klux Klan member leaks!!

 
The online hacktivist group Anonymous has followed through on its promise to disclose the identities of hundreds of Ku Klux Klan members.
On Monday, Anonymous vowed to release the full info dump of about 1,000 alleged Ku Klux Klan members with a chosen date of 5th of this November.
As promised, Anonymous posted a link to a Pastebin account with the names, aliases, Google Plus profiles, Facebook accounts and other identifying information of roughly 1,000 individuals the group believes are members of the Ku Klux Klan.

The hackers behind the leak tweeted a link to a Pastebin on a Twitter account, Operation KKK (@Operation_KKK) believed to be controlled by them.
Ku Klux Klan (KKK) is classified as a White Supremacist Racist group by the Anti-Defamation League and the Southern Poverty Law Center, allegedly having total 5,000 to 8,000 members.
"We hope Operation KKK will, in part, spark a bit of constructive dialogue about race, racism, racial terror and freedom of expression, across group lines. Public discourse about these topics can be honest, messy, snarky, offensive, humbling, infuriating, productive, and serious all at once," Anonymous wrote in the Pastebin post.
"The reality is that racism usually does NOT wear a hood, but it does permeate our culture on every level. Part of the reason we have taken the hoods off of these individuals is not because of their identities, but because of what their hoods symbolize to us in our broader society."
Anonymous also notes that the group collected the information of KKK members over 11 months through public documents, "digital espionage," interviews with experts and information from social media accounts of KKK affiliates.
However, the group has not published any personal information about the KKK members.
 
Via : http://thehackernews.com/2015/11/anonymous-group-kkk.html

Wednesday, November 4, 2015

Anonymous Hackers to Leak 1000 of KKK Members Details on Million Mask March (Nov 5, 2015)

Anonymous Operation KKK
The Online Hacktivist group Anonymous announced it plans to reveal the identities of about 1,000 Ku Klux Klan (KKK) members on 5th November, the day of the Global Protest movement known as the Million Mask March.
Million Mask March, where protesters don Guy Fawkes masks in hundreds of cities around the world, and march together against the corrupt Governments and corporations.
Ku Klux Klan (KKK) is classified as a White Supremacist Racist group by the Anti-Defamation League and the Southern Poverty Law Center, allegedly having total 5,000 to 8,000 members.

Tuesday, November 3, 2015

Using DroidJack Android RAT Will Put You In Jail


DroidJack is an Android RAT (Remote Administration Trojon) tool used by hackers to steal or record data on injected Android smartphones.
DroidJack can be used to remotely access Android device from a computer and remains hidden from the device owner. It is available on internet for $210/£137 and it is also one of the hottest Android RAT tool on the market, mainly used in Middle East region which affects Android users only.
DroidJack has cool features such as:
  • GPS tracking
  • Send, delete, view SMS
  • View contacts, call logs and make a phone call
  • View history browsers and bookmarks
  • Open an app
  • Turn ON/OFF camera and microphone
According to the spokesman said to BBC that,” A 28-year-old male from Carlisle under suspicion of computer misuse act offences,” this arrest was made in connection with the international DroidJack operation and he has been bailed next 6 months.
Police have raided 13 houses in Germany and one man was arrested in the UK (United Kingdom). Germany suspects that 19 – 51 aged people are involved in DroidJack.
Conclusion: Buying DroidJack Android RAT and installing in on victims device without their permission will put you in danger of being arrested by police.