• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer

Easy Hack

Cyber World for Security Geek

  • Latest News
  • Tools
  • Tutorials
  • Proof of concept
  • About us
  • Privacy policy
  • Hire me

Main Content

Featured Post

Anonymous Movement Calls TikTok Chinese Spyware

7 months ago By Punit-Darji

Anonymous activists accused TikTok, a popular Chinese service, of mass surveillance of users and transferring data to Chinese authorities. TikTok collects information about user contacts, device, information about installed programs, etc. Anonymous participants urged users to remove this “spyware” … Continue Reading about Anonymous Movement Calls TikTok Chinese Spyware

Latest News

Apple encouraged developers to new technologies

7 months ago By Punit-Darji

Apple encouraged iOS and macOS app developers to favor new web technologies. During a short presentation at WWDC 2020 June 22-26, Apple revealed some internal statistics to convince developers to use new technologies and protocols such as IPv6, HTTP / 2, TLS 1.3 and Multipatch TCP. According to Apple Internet Technology Engineer Jiten Mehta, the popularity of IPv6 (the next … Continue Reading about Apple encouraged developers to new technologies

steal facebook credentials and contained malicious code

7 months ago By Punit-Darji

This month, Google removed 25 Android apps from the Play Store because steal facebook accounts with passwords . At the time of removal of the application, a total of 2.34 million times were downloaded. Applications were equipped with legitimate functionality, but also contained malicious code. The creator of all 25 applications is the same cybercriminal grouping. Despite the fact that the … Continue Reading about steal facebook credentials and contained malicious code

Experts “broke” the barrier between Wi-Fi and Bluetooth

8 months ago By Punit-Darji

A group of German and Italian scientists have developed a new attack to circumvent the separation between Wi-Fi and Bluetooth technologies used on the same device (smartphone, laptops and tablets). The attack, dubbed Spectra, runs on “combined” chips that process various types of wireless communications, including Wi-Fi, Bluetooth, LTE, etc. “Spectra’s new class of vulnerabilities is based on … Continue Reading about Experts “broke” the barrier between Wi-Fi and Bluetooth

Cybercriminals exploit three-year vulnerability in Magento plugin

8 months ago By Punit-Darji

The Federal Bureau of Investigation has reported that cybercriminals exploit a three-year vulnerability (CVE-2017-7391) in the MAGMI plug-in (Magento Mass Import) for Magento in order to hack online stores and create a malicious script that can record and steal customer payment card data. The problem is a Cross-Site Scripting (XSS) vulnerability, the exploitation of which allows an attacker to … Continue Reading about Cybercriminals exploit three-year vulnerability in Magento plugin

Hacking

InviZible Pro – Android application for Internet privacy and security

October 17, 2019 By Punit-Darji

InviZible Pro includes a well-known modules DNSCrypt, Tor , Purple I2P. They are used to achieve maximum security, privacy and comfortable use of the Internet. This application is designed for Android … Continue Reading about InviZible Pro – Android application for Internet privacy and security

India’s First Processor Shakti is ready for app development

July 3, 2019 By Punit-Darji

Shakti is processor developed by India. The Indian Institute of Technology in Madras has has released the software development kit (SDK) for its open-source Shakti processor. Shakti is based on the … Continue Reading about India’s First Processor Shakti is ready for app development

Top 10 Browser Extensions for OSINT Researchers

July 1, 2019 By Punit-Darji

For hackers and OSINT researchers, these tools can be used to defeat online tracking, log in to SSH devices, and search the internet for clues during an investigation. These are a list of my top ten … Continue Reading about Top 10 Browser Extensions for OSINT Researchers

How to find breached Email : Whatbreach

June 25, 2019 By Punit-Darji

WhatBreach is a tool to search for breached emails and their corresponding database. It takes either a single email or a list of emails and searches them leveraging haveibeenpwned.com's API, from … Continue Reading about How to find breached Email : Whatbreach

Tools Updates

Best disposable email provider

7 months ago By Punit-Darji

Top 5 disposable email provider Disclaimer : Please do not use any of these services for private and sensitive information sharing. We do not promote any illegal activities which you can perform by … Continue Reading about Best disposable email provider

How to install tails operating system on

7 months ago By Punit-Darji

Tails is a Linux-based operating system. Its main goals are to promote anonymity on the Internet, the safe storage of data, not to leave traces. All network connections and programs are configured to … Continue Reading about How to install tails operating system on

Unc0ver team published a jailbreak for iOS 13.5

8 months ago By Punit-Darji

The famous Unc0ver jailbreak team managed to detect a previously unknown vulnerability in the iOS kernel, exploit it and create a working jailbreak. The tool is suitable for hacking most (if not all) … Continue Reading about Unc0ver team published a jailbreak for iOS 13.5

Remote Android Management Suite : L3MON

11 months ago By Punit-Darji

In recent times, distinctive kinds of Android-powered gadgets are often used on a daily foundation. In case you're a proud owner of an Android tool, at times you can have felt the want to access it … Continue Reading about Remote Android Management Suite : L3MON

Proof Of Concept

Experts “broke” the barrier between Wi-Fi and Bluetooth

8 months ago By Punit-Darji

A group of German and Italian scientists have developed a new attack to circumvent the separation between Wi-Fi and Bluetooth technologies used on the same device (smartphone, laptops and tablets). The attack, dubbed … Continue Reading about Experts “broke” the barrier between Wi-Fi and Bluetooth

DoS on Bluetooth. Reality of “Bluetooth Hacking”

10 months ago By Punit-Darji

In the world, there are not many things that infuriate almost everyone without exception. This is spring-autumn slush, summer hot water cut-off and schoolchildren with portable Bluetooth speakers. And if with the first … Continue Reading about DoS on Bluetooth. Reality of “Bluetooth Hacking”

Vulnerability in Slack allowed hijacking accounts

10 months ago By Punit-Darji

Slack developers fixed a vulnerability that allowed to capture other people's accounts. The problem was discovered in November 2019 by information security researcher Ivan Castodio (Evan Custodio). Castodio discovered … Continue Reading about Vulnerability in Slack allowed hijacking accounts

Primary Sidebar

Search

Follow Us on Social

  • Facebook
  • LinkedIn
  • Medium
  • Twitter
  • YouTube

Recent Post

Anonymous Movement Calls TikTok Chinese Spyware

Apple encouraged developers to new technologies

steal facebook credentials and contained malicious code

Best disposable email provider

How to install tails operating system on

Footer

About Easy Hacks

Quick Links

  • About us
  • Privacy policy
  • Contact Us
  • Terms and Conditions

Copyright © 2020 · Easy Hacks | All Rights are Reserved