1
Launched in 2009, Shodan is a prying eye across the world through the IoT. Named as 'scariest search engine', it is the Hacker Search Engine
1
BlackArch Linux 2016.12.20 has just been released. The new ISO respins come with Linux kernel 4.8.13 and more than 100 new tools
1
Next time when you hear an announcement in the flight, “Ladies and gentlemen, this is your captain speaking…," the chances are that the announcement is coming from a hacker controlling your flight.
Dangerous vulnerabilities in an in-flight entertainment system used by the leading airlines, including Emirates, United, American Airlines, Virgin, and Qatar, could let hackers hijack several flight systems and even take control of the plane.
1
Apertus 0.3.11-beta : Archive data on your favorite blockchains.
1
Sarah has been working for the same company, on and off, for three years. Her latest contract runs for a few more months. She's desperate to be offered a full-time position, but she knows this...
1
Mirai malware which attacks the Internet of things devices to perform Distributed Denial of Service attacks is now improving itself by switching to .Onion domains, after it made a few tweaks to its Domain Generation Algorithm(DGA).
1
PowerShellArsenal is basically PowerShell for reverse engineering in a module format. The module can be used to disassemble managed/unmanaged code & more.
1
A sends:

The Gentleperson's Guide To Forum Spies (spooks, feds, etc.)

http://pastebin.com/irj4Fyd5

1. COINTELPRO Techniques for dilution, misdirection and control of a internet forum
2. Twenty-Five Rules of Disinformation
3. Eight Traits of the Disinformationalist
4. How to Spot a Spy (Cointelpro Agent)
5. Seventeen Techniques for Truth Suppression
1
Editor’s note: Here at HNN, we are obviously am not happy about this breaking news.

Why?

Just months ago, Snopes attempted to “debunk” us and changed our correct information to false information and got caught doing it on their site. We aren’t really sure who anointed them as God of true and false and that still remains a mystery.
1

The world needs truthtellers. They need Courage.


Justin Liverman – emergency appeal

The United States Department of Justice has accused computer science student Justin Liverman of being associated with Crackas with Attitude (CWA), the group that claimed to have accessed emails from the AOL account of CIA Director John Brennan in late 2015 and brought to widespread attention the vulnerability of a variety of US government computer systems to social engineering attacks.
1
​Yahoo acknowledged yesterday that hackers breached its systems and stole approximately 1 billion accounts, and now it turns out that the full database is a..
1
The MSM has proven itself ineffective against the rise of the alt media. There is a very good and obvious reason for this ... and for the fake news outbreak.
1

Julian Assange, the founder of Wikileaks spoke with Sean Hannity to lay to rest any questions regarding the Russians and election hacking.


1

Wikileaks founder Julian Assange denied Thursday that hacked emails from the Democratic National Committee and Hillary Clinton's campaign chairman John Podesta were stolen and passed to his organization by Russian state actors. 

1
A guide to online search and research techniques for using UGC and open source information in investigations
1
Back in November, it was discovered that a backdoor injected in a custom firmware powering nearly 700 million phones was being used to collect user informat
1
KickassTorrents is back from the dead!
Back in July, the world's largest and most notorious BitTorrent distribution site KickassTorrents (KAT) with millions of unique daily visitors was shut down by the U.S. authorities following the arrest of its alleged owner Artem Vaulin.
1

In this post I’ll describe how I found a remote code execution bug in Ubuntu Desktop which affects all default installations >= 12.10 (Quantal). The bug allows for reliable code injection when a user simply opens a malicious file. The following video demonstrates the exploit opening the Gnome calculator. The executed payload also replaces the exploit file with a decoy zip file to cover its tracks.

1
Remember The Shadow Brokers?
The hacker group that's believed to be behind the high-profile cyber theft of NSA hacking tools and exploits that sparked a larger debate on the Internet concerning abilities of US intelligence agencies and their own security
1
Newly observed variants of the Mirai botnet pack domain generation algorithm (DGA) features that haven’t been associated with previous Mirai samples, security researchers warn.
1
Americans tend to approve of the release of Podesta's emails, in stark contrast to their disapproval of the leaking of State Department cables in 2010
1
Hello and welcome to what was suppose to be a website about gathering & sharing information regarding Julian Assange's disappearance. This site was plagued with many problems that prevented it from ever launching to meet its true potential.
1
Lauri Love could be locked up in solitary confinement for years in America's "barbaric" prison system, even if he is eventually cleared, says his lawyer
1

Going through old papers my dad gave me, I found his map of the internet as of May 1973.

The entire internet. pic.twitter.com/0krvYoRGav

1
Bitcoin exchanges play a vital role in promoting the cryptocurrency by facilitating use. Most bitcoin users perform their transactions through an exchange
1
GitScrum is a Laravel 5.3 application to helps teams use Git version control and the Scrum framework in the support for day-to-day task management.
1
Adlice PEViewer (RogueKillerPE) FREE Download - Portable Executable parser for files and processes, with heuristics driven maliciousness score.
1

Online sexual predators are no longer assailants who reside near their target. With social media and the internet, child predators can target children from the other side of the planet. Until industrialized nations recognize that the dark side of cyberspace is not just dollars and cents and have far-reaching consequences for children, the online sexual predator will continue to roam freely online.


1

Want the most interesting Hacking and Cyber Security News delivered automatically to your inbox? Subscribe to our FREE Newsletter and eBooks.