Give your Desktop a Mozaic Touch

Experience the Windows 8 Metro Stlye UI on your Computer

Tuesday, July 19, 2011

EC-Council Academy Hacked by GaySec (Malaysian hackers)

          EC-Council Academy (http://eccouncilacademy.org) Hacked by GaySec (Malaysian hackers). EC-Council Academy is a separate distinct company with no corporate connection between itself and EC-Council or EC-Council University. Some months before same site was got hacked by some other hacker.                      EC-Council Academy , Here a...

THE CRAZIES Hackers Leaks Server Certificates of Defense Information Systems Agency (DISA)

THE CRAZIES Hackers steal the Several Certificate revocation lists (CRLs) from Server of Defense Information Systems Agency (DISA) - http://disa.mil/ and leak the Certificates at : http://www.mediafire.com/?dvli58a9logojld http://www.mediafire.com/?k8z168aazj6s1k8...

Wednesday, July 13, 2011

National Assembly of Pakistan database hacked by V0iD

           Another new hacker "V0iD" come in action ! He hack the website and database of National Assembly of Pakistan at http://www.na.gov.pk . The hacked database info is leaked at http://pastebin.com/bAgnnG9F .             Hacker leaks the username / passwords of 7 admin accounts and phone numbers of 13 accoun...

Toshiba Database hacked and User accounts leaked by V0iD

          Today V0iD hacker leak the database of National Assembly of Pakistan database and now he also Hack the website of Toshiba .             The Database names, Admin user table data with user-passwords and Normal users logins leaked at http://pastebin.com/mFwijETu . And also He leak Service Places of Toshiba. These are a small list of Toshiba resellers...

David beckham official website hacked

David beckham official website http://www.davidbeckham.com/  got Defaced by some unknown hacker with a image on homepage as shown. Message by "ScooterDAshooter = FAI...

Microsoft Vulnerability in Bluetooth Stack Could Allow Remote Code Execution

           The single Critical vulnerability in today’s batch of security updates addresses an issue in the Bluetooth stack. Your workstations’ risk to this vulnerability varies, depending on a number of factors. I’d like to use this blog post to outline those risk factors.            This security update resolves a privately reported vulnerability in the Windows Bluetooth Stack. The vulnerability...

Anonymous targets US defence consultant

          Post stolen 90,000 email addresses, passwords of Booz Allen Hamilton on Pirate Bay. Online hacktivist group Anonymous has posted stolen data after breaching into the database of US defence consultant Booz Allen Hamilton.           Booz Allen provides technological services including cyber-security consulting to the military and other US government agencies. Angered over the UK government's proposed extradition of whistleblower site WikiLeaks' founder Julian Assange, and the phone hack scandal,...

Google, Facebook, Cloud computing help terrorists to strike: Report

          New counter-terrorism strategy reveals technology increasingly being used by terrorists. The UK's new counter-terrorism strategy published by the home secretary Theresa May has revealed that terrorists are increasingly using technology such as Google Earth and Street View to plan attacks and encryption devices to carry out those.           The report also says that terrorists are also planning to launch cyber-attacks, according to a report by the Guardian. The report says terrorists are using...

Sunday, July 10, 2011

Hackers steal over a million emails from Washington Post jobs site

          Passwords, job accounts safe, says Jobs site. The Washington Post has said that the database of its jobs site had been breached by hackers who stole about 1.27 million users' IDs and email addresses.           The company said on its website that the Washington Post Co's jobs website was breached twice last month. Washington Post said it took immediate steps to shut down the website after discovering the attack quickly. It said that about 1.27 million users' IDs and email addresses were affected,...

808 Indian Websites Hacked By ZHC MongOse & ZHC Toshiro

          ZHC TOSHIRO & ZHC MONGOOSE from ZHC(ZCompany Hacking Crew) defaced more that 808 Indian Websites to deliver the message Regarding their Protest in Kashmir. Check here for message and Hacked sites list. There are most of Corporate websites in hacked site li...

German Federal Police servers Hacked by NN-Crew

          Hacking Group "NN-Crew" hacked into server used by Germany's Federal Police and stolen a large amount of data used to GPS-track suspects under surveillance. The hacked data published by NN-Crew included several usernames and passwords along with telephone numbers, license plate numbers, locations, and coordinates.           A spokesperson for the German Federal Police said that an "analysis...

ISI Chief - Ahmed Shuja Pasha Email ID hacked by Indian Hacker

          An Indian Hacker "creatrix" Claim to hack into the email id of ISI Chief Ahmed Shuja Pasha's .The Directorate for Inter-Services Intelligence (more commonly known as Inter-Services Intelligence or simply by its initials ISI), is Pakistan's premier intelligence agency, responsible for providing critical national security intelligence assessment to the Government of Pakistan. The ISI is the largest of the three intelligence service agencies of Pakistan, the others being the Intelligence Bureau (IB) and Military Intelligence (M...

Anonymous Hacks FBI Contractors IRC Federal

          Anonymous Hackers today leak some files of  IRC Federal via a tweet. They've gotten access to contracts, internal documents, development schematics, logins and more. The Download Link released by Anonymous is http://www.mediafire.com/?twxc1nhiluwr126#1 ,106.91 MB. Mirror also available now on Torrent.            Anonymous Said "If you place any value on...

Tuesday, July 5, 2011

Give your Desktop a Mosaic Touch

Tabbed Widgets Locked Desktop Mosaic (previously known as Metro Home 2) is an application that brings Metro UI to your desktop. It is a set of live widgets that shows some content from the web or from your PC. Mosaic supports WPF and HTML(5) widgets (it uses IE9 engine if it installed). HTML widgets are visible only in full screen mode  (for technical reason). Currently some widgets are just link  to something (e.g. desktop or control panel)  but in future they could...

Sunday, July 3, 2011

US Military and Law Enforcement equipment supplier "Meggit" Database Hacked

           Database of www.meggitttrainingsystems.com a US Military and Law Enforcement equipment supplier has been hacked and exposed by Anonymous ( The Bash Crew ).                       Hackers said "People of the USA your government puts there trust and your money into these people and we got into there database useing a google dork and a simple...

UP Rajarshi Tandon Open University Allahabad Website Hacked

Website of UP Rajarshi Tandon Open University Allahabad Hacked last night.  Vulnerable Link --> http://www.uprtou.ac.in/ Hacker wrote message on the site "SECURE YOUR WEBSITE.. OR ELSE GET HACKED BY SOMEONE...The Education system in India sucks.. Till when we would be learning all the bullshit physics, chem, history and commerce.. We need some real knowledge.. Baccha, kabil bano.. kamyaabi jhak marke peeche aayegi.. lol..sorry admin.. just resotre your site..Don't worry.. nothing has...

Apple database hacked with SQL injection by Anonymous

Anonymous hackers announce on twitter that Apple can be there next target. They expose one SQL vulnerability on Apple domain with One table "Users" data.   Vulnerable Link : http://abs.apple.com:8080/ssurvey/survey?id= These all hacks now consider under Operation Antisec by Anonymous and Lulzsec Membe...

Saturday, July 2, 2011

How to hide files inside a JPEG image??

What is Steganography?                    Steganography is the art and science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read. The word steganography is derived from the Greek words “steganos” and “graphein”, which mean “covered” and “writing.” Steganography, therefore, is covered writing. Historical stenganography involved techniques such as disappearing ink or microdots. Modern steganography involves hiding data in computer...

L.A. man sentenced for phishing attacks on banks

          A 27-year-old man has been sentenced to 13 years in prison for managing a phishing operation in conjunction with Egyptian hackers that looted consumer bank accounts.           Kenneth Joseph Lucas II, of Los Angeles, was one of a total of 100 people arrested by Egyptian and U.S. authorities as part of Operation Phish Phry in 2009, which the Department of Justice (DOJ) said resulted in the highest number of people being charged in a single cybercrime case. The two-year investigation involved...

Spam messages promise Google+ invites, deliver drug ads

          It's the hottest invitation in technology right now -- an e-mail telling you how to "learn more about Google+." If you get one, though, be careful about clicking on it. It may be spam.           Security vendor Sophos says that pharmaceutical spammers have recently started to cash in on the popularity of Google's Facebook alternative by pushing out fake invitations to the Google+ social service. "The messages look similar to the real emails that users may receive from friends who are already...

Page 1 of 12012345Next