Quantcast
Channel: Hackers Online Club (HOC)
Browsing all 855 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

OWASP VBScan: A Black Box vBulletin Vulnerability Scanner Tool

OWASP VBScan: A Black Box vBulletin Vulnerability Scanner ToolOWASP VBScan (short for [VB]ulletin Vulnerability [Scan]ner) is an opensource project in perl programming language to detect VBulletin CMS...

View Article


Image may be NSFW.
Clik here to view.

HackersOnlineClub Celebrates 5th Anniversary

Dear readers,Greetings from HackersOnlineClub !!HackersOnlineClub [HOC] is celebrating its 5th Anniversary on 4th May 2016. And this would have never been accomplished without you all. This was like a...

View Article


Image may be NSFW.
Clik here to view.

Air Miles Reward Stolen By An Iranian Student Worth $260,000

Air Miles Reward Stolen By An Iranian Student Worth $260,000Miami police revealed that they arrested an Iranian national student studying in the UK for stealing the air miles reward from airlines...

View Article

Image may be NSFW.
Clik here to view.

CrackLib: A Package Contains Library Used To Enforce Strong Passwords

CrackLib: A Package Contains Library Used To Enforce Strong Passwords.The package of CrackLib consists a library that is used to implement the strong passwords by evaluating the user-selected passwords...

View Article

Image may be NSFW.
Clik here to view.

winPenPack: The Portable Software Collection

winPenPack: The Portable Software Collection winPenPack is an open-source software application that suites for Windows. Or you can say that  is a project that plans at gathering the most commonly used...

View Article


Image may be NSFW.
Clik here to view.

BeeCrypt: Cryptography Library Toolkit

BeeCrypt: Cryptography Library ToolkitBeeCrypt is a constant project to offer a strong as well as the fast toolkit of cryptography. In which it includes entropy sources, random generators, block...

View Article

Image may be NSFW.
Clik here to view.

Bank Of Greece Was The First DDOS Target Of Anonymous #OpIcarus

Bank Of Greece Was The First DDOS Target By Anonymous.The Anonymous hackers initiated #OpIcarus that is an operation intended at the sector of world banking as well as the first target in their...

View Article

Image may be NSFW.
Clik here to view.

Google Fixed Around 40 Android Security Vulnerabilities

Google Fixed Around 40 Android Security VulnerabilitiesGoogle has found around 40 security vulnerabilities which are affecting android devices. Once again media server is identified as having flaws ....

View Article


Image may be NSFW.
Clik here to view.

Researchers Discovered Three New Ransomware Variants: CryptFlle2, BrLock, and...

Researchers Discovered Three New Ransomware Variants: CryptFlle2, BrLock, and MM Locker.The security researchers from Proofpoint declared that they had found new three kinds of families of ransomware...

View Article


Image may be NSFW.
Clik here to view.

272 Million Email Account Credentials Traded In The Russian Criminal Underworld

272 Million Email Account Credentials Traded In The Russian Criminal UnderworldEven the security research firm also said that the hackers batch came from a “Russian kid” which is one of its analysts...

View Article

Image may be NSFW.
Clik here to view.

PWGen: Generator Of Cryptographically-Strong Passwords

PWGen: Generator Of Cryptographically-Strong Passwords.PWGen is a tool which generates strong cryptographic passwords. It is a tool used to generate professional secure strong  passwords, pronounceable...

View Article

Image may be NSFW.
Clik here to view.

A New Kind Of Android Malware Found In Google Play App Store

A New Kind Of Android Malware Found In Google Play App Store.According to an Intel Security blog post that the researchers discovered a series of malicious apps which surrounding the Android/Clicker.G...

View Article

Image may be NSFW.
Clik here to view.

Metasploitable: A Vulnerable Linux Virtual Machine

Metasploitable: A Vulnerable Linux Virtual MachineMetasploitable is a purposely vulnerable Linux virtual machine. This virtual machine can be used to perform the security training, tools of security...

View Article


Image may be NSFW.
Clik here to view.

Now CryptXXX Is Undecryptable That Protects The Users From Accessing Their PC

Now CryptXXX Is Undecryptable That Protects The Users From Accessing Their PC.CryptXXX is one of the most current ransomware families which are found and it has seen the main update as well as further...

View Article

Image may be NSFW.
Clik here to view.

Twitter Blocks Access To US Intelligence Agencies From Data Analytics Service

Twitter Blocks Access To US Intelligence Agencies From Data Analytics Service According to a report in The Wall Street Journal, the Twitter Inc. blocked the U.S. intelligence agencies' that access to...

View Article


Image may be NSFW.
Clik here to view.

Wordpress Redirect Hack Allows Web Traffic To The Malicious URLs

Wordpress Redirect Hack Allows Web Traffic To The Malicious URLsThe security experts from Sucuri have exposed today an continuing attack on the sites of WordPress that revised their source code as well...

View Article

Image may be NSFW.
Clik here to view.

Facebook Drops First Round In Suit Over Stocking Up The Biometric Data

Facebook Drops First Round In Suit Over Stocking Up The Biometric DataFacebook Inc (FBO) missed the first round in a court fight against some of its users who take legal action the social networking...

View Article


Image may be NSFW.
Clik here to view.

IPCop Firewall: Linux Firewall Distribution Geared Towards Home And SOHO Users

IPCop Firewall: Linux Firewall Distribution Geared Towards Home & SOHO Users.The IPCop Firewall is a Linux firewall distribution that targets to offer a simple-to-manage firewall application which...

View Article

Image may be NSFW.
Clik here to view.

A New Malware Discovered That Affected The 190 Android Apps On The Google...

A New Malware Discovered That Affected The 190 Android Apps On The Google Play StoreGoogle has deleted up to 190 applications affected with the malware from the Google Play Store after security...

View Article

Image may be NSFW.
Clik here to view.

Cyber Attackers Using ImageTragick Remote Code Execution Vulnerability To...

Cyber Attackers Using ImageTragick Remote Code Execution Vulnerability To Process Crafted Images.Multiple Vulnerabilities Found On ImageMagick Last Week.ImageMagick is a command-line tool that can be...

View Article
Browsing all 855 articles
Browse latest View live