Posts

Top 10 Most Secure Operating Systems (Untraceable) 2017

Image
Top 10 Most Secure Operating Systems.By laurian;

The security of a given anything, even operating systems (OS), tends to be a difficult or even controversial issue to examine. The only, truly secure operating systems are those that lack contact to the outside world (e.g., a DVD player's firmware). As for any other OS, they'll inevitably have some sort of vulnerability or weakness that can be exploited. In fact, any networked OS can be exposed by careful abuse of its configuration—no exceptions. All the same, here are the top ten most secure operating systems on the planet today.

Another important fact is how fast the vendor is to release a patch when a vulnerability has been discovered.
Recently the more popular Bash shellshock and Openssl Heartbleed shows that.


 1. OPEN BSD:
By default, this is the most secure general purpose operating system out there. The proof in the pudding? The fact that it suffered only two remote attack vulnerabilities in the last decade serves as solid ev…

10 Most Powerful (Known) Active Hacking Groups

Image
10 Most Powerful (Known) Active Hacking GroupsGroups 2017






 By laurian;

There are young, prank hackers like Lizard Squad. Lizard Squad infamously used a DDOS attack to take down Playstation and Xbox networks during Christmas (it's a pretty sinister prank to target children like that). Some hackers are older, and often work as "computer security consultants" who advise companies on how to protect themselves. Some hackers are in it for monetary gain, while others are in it for the lulz and the power.

More and more there are state-sponsored groups that have Hollywood-style capabilities. The best known example of this is Stuxnet, an Israeli (as well as probably American) worm that infected Iran nuclear facilities. Stuxnet caused the nuclear centrifuges to go haywire while the control system displays for those centrifuges would read normally. It had the power to create a devastating explosion while monitoring stations appeared normal. The scariest part is that it could be refitte…

Anonymous Message.

Image
Anonymous – They Aren’t Going to Tell You About This! (CERN ALERT MESSAGE 2017)
Help by spreading this information, and facts they don’t want you to know. Leave a like.
We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.



Becoming Expert Hacker.

Image
Want To Become Hacker, I Will Make You Expert.
By laurian;Soyou want to become a Hacker! I will make you an expert hacker and I will do it for free. I can give you a 100% assurance that if you are willing to become a hacker, I can make you the best one. I will teach you everything I know. No one can be perfect, but experts always exist. Most people have aspirations to become a hacker but don’t know where to start, or don’t know the difference between what is good and what is bad. The media typically portrays hacking as negative, but it can be used for good, and I will you teach how Note: YOU are the catalyst, I am just your guide.
Disclaimer: It’s up to every individual to decide which path he will take. My goal is to provide knowledge and ethics.

Although hacker has many definitions, we believe most people asking this question are    interested in malicious coding. Computer Hope does not teach or condone cracking, stealing, breaking, or otherwise illegal cyber activity. However, a hacker …

Vault 7: Projects

Vault 7: Projects.This publication series is about specific projects related to the Vault 7 main publication.


Imperial.   31,July, 2017
Today, June 31st 2017, WikiLeaks publishes documents from theCherryBlossom project of the CIA that was developed and implemented with the help of the US nonprofit Stanford Research Institute (SRI International).

CherryBlossom provides a means of monitoring the Internet activity of and performing software exploits on Targets of interest. In particular,CherryBlossom is focused on compromising wireless networking devices, such as wireless routers and access points (APs), to achieve these goals. Such Wi-Fi devices are commonly used as part of the Internet infrastructure in private homes, public spaces (bars, hotels or airports), small and medium sized companies as well as enterprise offices. Therefore these devices are the ideal spot for "Man-In-The-Middle" attacks, as they can easily monitor, control and manipulate the Internet traffic of connected…

At Black Hat Hacker Summit, Cybersecurity Shift Urged

Image
BlackHatNews By laurianGlobal Attacks, Serious DamageSince May, the world has been rocked by two major international cyberattacks -- the ransomware WannaCry and a likely state-sponsored attack called NotPetya that spread out of Ukraine. Those and other recent digital assaults have paralyzed hospitals, disrupted commerce, caused blackouts and interfered with national elections. Stamos himself was formerly the chief security officer at Yahoo, which last year disclosed breaches of more than a billion user accounts that dated back to 2013 and 2014. Black Hat, now in its 20th year, has matured since what Stamos, a longtime attendee of the computer security conference, described as its "edgy and transgressive" early days. It has grown more professional and corporate over time. Stamos called for a culture change among hackers and more emphasis on defense -- and basic digital hygiene -- over the thrilling hunt for undiscovered vulnerabilities. And he called for diversifying an industry …