Tuesday , 7 July 2020
Home / IT Security / Black Hat (page 4)

Black Hat

(Phone Carriers) Selling Customer Location Data

(Phone Carriers) Selling Customer Location Data

Bug bounty hunters were able to figure out some of the services available through major telecom companies, that includes T-Mobile, AT&T, and Sprint, according to Motherboard. A researcher reportedly paid around $300 to a bounty hunter who was then able to geolocate a phone down to a location in a very specific neighborhood only blocks away from the actual location …

Read More »

The Marriott Data Breach (Includes Passport Numbers and Payment Card Info)

The Marriott Data Breach (Includes Passport Numbers and Payment Card Info)

Mariott Data Breach Includes Passport Details and Credit Card Information of Customers. Marriott Starwood Data Breach of around 500 Million Hotel Guests Data Compromised. Let’s Find out the Latest Marriot Hack.   The previous month, we have reported that one of the most famous hotel chains in the world, Marriott, which got attacked by the hackers. This data breach has …

Read More »

Pakistan Offline and Online Fresh Database of Mobile Network

Pakistan Offline and Online Fresh Database of Mobile Network

Is it another huge data breach for Pakistan? Imhook.net claims to provide fresh details of pakistani citizens mobile phone number? What action do Government needs to take against these malicious guys? Imhook is another malicious site that provides unauthorized access to pakistani citizens telecom details. Imhook claims in their website that they provide the very latest mobile details of 2019, …

Read More »

PewDiePie – Hackers are Taking over Chromecasts to Promote Their YouTube Channel

The two malicious attackers, Who teamed up to promote “PewDiePie” YouTube Channel by forcing the TVs to display a message, which encourages the users to forcing subscribe his YouTube Channel. This attach took an advantage of a router settings, which makes the smart devices such as: Chromecasts and Google Homes, publicly viewable on the Internet. These malicious hackers were than …

Read More »

Pak Coin – A Digital Scam in South Punjab Pakistan

pak coin

Digital Currency is growing so fastly all around the world. The experiences of experts give clear information about its importance in the future. The employment rate has become so low in Pakistan and the new generation is now dreaming of overnight success. It is one of the most common reason for scammers to betray innocent people. The same case occurred at south …

Read More »

NASA Confidential Employees Massive Data Breach

NASA data breech

I will not hesitate to inform you about the biggest firm in the world also faced a data breach. The firm is non-other than NASA the United States National Aeronautics and Space Administration. The news of Data breach was confirmed by the NASA themselves as they saw a third-party influence on their former and current employee’s personal data. A written …

Read More »

[Afghanistan Mobile Number Details] How to Check Name, NIC, Address, City

[Afghanistan Mobile Number Details] How to Check Name, NIC, Address, City

Are you being disturbed by unknown numbers? Not issue now. You can now easily find out the complete ownership of every single Afghani citizens mobile phone number details and location of Afghanistan’s number. DISCLIAMER: Before going further into explaining and discussing the Afghanistan phone number details, I would like to tell you that this is a sponsored post, and we …

Read More »

[Indian Phone Number Details] Find Ownership and Location of any Number

[Indian Phone Number Details] Find Ownership and Location of any Number

Are you being disturbed by unknown numbers? Not issue now. You can now easily find out the complete ownership of every single Indian citizenship phone number details and location of Indian number. DISCLIAMER: Before going further into explaining and discussing the Indian phone number details, I would like to tell you that this is a sponsored post, and we do …

Read More »

Sources for Information Gathering

Sources for Information Gathering

Many different sources exist for information gathering. The following list cannot possibly cover every source out there, but it does outline the major choices you have. Gathering Information from Websites Corporate and/or personal websites can provide a bounty of information. The first thing a good social engineer will often do is gather as much data as he can from the …

Read More »

Key Gang Member Involved in Telephone Banking Fraud

Key Gang Member Involved in Telephone Banking Fraud

GUJRANWALA: A key member of groups which were involved in telephone banking fraud and were successfully arrested from Hafizabad late Monday night. According to Federal Investigation Agency (FIA) officials, the group was involved in scamming the people and withdrawing millions from over 60 bank accounts in Gujranwala region. The malicious group members, Shabbir who was arrested from Hafizabad on a …

Read More »