Help
RSS
API
Feed
Maltego
Contact
Domain > thehacktimes.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2015-04-04
104.28.9.21
(
ClassC
)
2024-07-13
172.67.176.175
(
ClassC
)
Port 443
HTTP/1.1 200 OKDate: Sat, 13 Jul 2024 16:02:10 GMTContent-Type: text/html; charsetUTF-8Transfer-Encoding: chunkedConnection: keep-alivex-pingback: https://thehacktimes.com/xmlrpc.phplink: https://thehacktimes.com/wp-json/>; relhttps://api.w.org/link: https://thehacktimes.com/wp-json/wp/v2/pages/6>; relalternate; typeapplication/jsonlink: https://thehacktimes.com/>; relshortlinkvary: Accept-EncodingCF-Cache-Status: DYNAMICReport-To: {endpoints:{url:https:\/\/a.nel.cloudflare.com\/report\/v4?sAWRTb5tZcPWGBh4AP20nmjy6n88VYTYz3mGLTuk74i%2BO8VUs%2BSlAdMdO%2BV%2F6JdO6k0pRPkrKf41b08iTBFKNhF8cvHyRehct%2Bn6Kld%2BFVi0hBmVS9QpR5aHQ%2BhZAprgtN82H},group:cf-nel,max_age:604800}NEL: {success_fraction:0,report_to:cf-nel,max_age:604800}Server: cloudflareCF-RAY: 8a2a7eea7df6c39f-SEAalt-svc: h3:443; ma86400 !DOCTYPE html>html classno-js mh-two-sb langen-US>head> !-- Global site tag (gtag.js) - Google Analytics -->script async srchttps://www.googletagmanager.com/gtag/js?idUA-78289527-1>/script>script> window.dataLayer window.dataLayer || ; function gtag(){dataLayer.push(arguments);} gtag(js, new Date()); gtag(config, UA-78289527-1);/script>meta charsetUTF-8>title>The Hack Times • Breaking Hacker News – The Hack Times – analyzed news and cyber security reports on hacking/title>meta namerobots contentmax-image-preview:large />link relshortcut icon hrefhttps://thehacktimes.com/wp-content/uploads/2015/01/favicon.ico>!--if lt IE 9>script srchttps://thehacktimes.com/wp-content/themes/mh_magazine/js/css3-mediaqueries.js>/script>!endif-->meta nameviewport contentwidthdevice-width, initial-scale1.0>link relpingback hrefhttps://thehacktimes.com/xmlrpc.php/>link reldns-prefetch href//www.googletagmanager.com />link reldns-prefetch href//fonts.googleapis.com />link reldns-prefetch href//s.w.org />link reldns-prefetch href//pagead2.googlesyndication.com />link relalternate typeapplication/rss+xml titleThe Hack Times • Breaking Hacker News » Feed hrefhttps://thehacktimes.com/feed/ />link relalternate typeapplication/rss+xml titleThe Hack Times • Breaking Hacker News » Comments Feed hrefhttps://thehacktimes.com/comments/feed/ />link relalternate typeapplication/rss+xml titleThe Hack Times • Breaking Hacker News » Home Comments Feed hrefhttps://thehacktimes.com/home/feed/ /> script typetext/javascript> window._wpemojiSettings {baseUrl:https:\/\/s.w.org\/images\/core\/emoji\/13.0.1\/72x72\/,ext:.png,svgUrl:https:\/\/s.w.org\/images\/core\/emoji\/13.0.1\/svg\/,svgExt:.svg,source:{concatemoji:https:\/\/thehacktimes.com\/wp-includes\/js\/wp-emoji-release.min.js?ver5.7.12}}; !function(e,a,t){var n,r,o,ia.createElement(canvas),pi.getContext&&i.getContext(2d);function s(e,t){var aString.fromCharCode;p.clearRect(0,0,i.width,i.height),p.fillText(a.apply(this,e),0,0);ei.toDataURL();return p.clearRect(0,0,i.width,i.height),p.fillText(a.apply(this,t),0,0),ei.toDataURL()}function c(e){var ta.createElement(script);t.srce,t.defert.typetext/javascript,a.getElementsByTagName(head)0.appendChild(t)}for(oArray(flag,emoji),t.supports{everything:!0,everythingExceptFlag:!0},r0;ro.length;r++)t.supportsorfunction(e){if(!p||!p.fillText)return!1;switch(p.textBaselinetop,p.font600 32px Arial,e){caseflag:return s(127987,65039,8205,9895,65039,127987,65039,8203,9895,65039)?!1:!s(55356,56826,55356,56819,55356,56826,8203,55356,56819)&&!s(55356,57332,56128,56423,56128,56418,56128,56421,56128,56430,56128,56423,56128,56447,55356,57332,8203,56128,56423,8203,56128,56418,8203,56128,56421,8203,56128,56430,8203,56128,56423,8203,56128,56447);caseemoji:return!s(55357,56424,8205,55356,57212,55357,56424,8203,55356,57212)}return!1}(or),t.supports.everythingt.supports.everything&&t.supportsor,flag!or&&(t.supports.everythingExceptFlagt.supports.everythingExceptFlag&&t.supportsor);t.supports.everythingExceptFlagt.supports.everythingExceptFlag&&!t.supports.flag,t.DOMReady!1,t.readyCallbackfunction(){t.DOMReady!0},t.supports.everything||(nfunction(){t.readyCallback()},a.addEventListener?(a.addEventListener(DOMContentLoaded,n,!1),e.addEventListener(load,n,!1)):(e.attachEvent(onload,n),a.attachEvent(onreadystatechange,function(){completea.readyState&&t.readyCallback()})),(nt.source||{}).concatemoji?c(n.concatemoji):n.wpemoji&&n.twemoji&&(c(n.twemoji),c(n.wpemoji)))}(window,document,window._wpemojiSettings); /script> style typetext/css>img.wp-smiley,img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 .07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important;}/style> link relstylesheet idwp-block-library-css hrefhttps://thehacktimes.com/wp-includes/css/dist/block-library/style.min.css?ver5.7.12 typetext/css mediaall />link relstylesheet idmh-style-css hrefhttps://thehacktimes.com/wp-content/themes/mh_magazine/style.css?ver2.4.3 typetext/css mediaall />link relstylesheet idmh-google-fonts-css href//fonts.googleapis.com/css?familyAsap:300,400,400italic,600,700 typetext/css mediaall />script typetext/javascript srchttps://thehacktimes.com/wp-includes/js/jquery/jquery.min.js?ver3.5.1 idjquery-core-js>/script>script typetext/javascript srchttps://thehacktimes.com/wp-includes/js/jquery/jquery-migrate.min.js?ver3.3.2 idjquery-migrate-js>/script>script typetext/javascript srchttps://thehacktimes.com/wp-content/themes/mh_magazine/js/scripts.js?ver5.7.12 idscripts-js>/script>!-- Google Analytics snippet added by Site Kit -->script typetext/javascript srchttps://www.googletagmanager.com/gtag/js?idUA-78289527-1 idgoogle_gtagjs-js async>/script>script typetext/javascript idgoogle_gtagjs-js-after>window.dataLayer window.dataLayer || ;function gtag(){dataLayer.push(arguments);}gtag(set, linker, {domains:thehacktimes.com} );gtag(js, new Date());gtag(set, developer_id.dZTNiMT, true);gtag(config, UA-78289527-1, {anonymize_ip:true});gtag(config, G-T6E57H6DFN);/script>!-- End Google Analytics snippet added by Site Kit -->link relhttps://api.w.org/ hrefhttps://thehacktimes.com/wp-json/ />link relalternate typeapplication/json hrefhttps://thehacktimes.com/wp-json/wp/v2/pages/6 />link relEditURI typeapplication/rsd+xml titleRSD hrefhttps://thehacktimes.com/xmlrpc.php?rsd />link relwlwmanifest typeapplication/wlwmanifest+xml hrefhttps://thehacktimes.com/wp-includes/wlwmanifest.xml /> meta namegenerator contentWordPress 5.7.12 />link relcanonical hrefhttps://thehacktimes.com/ />link relshortlink hrefhttps://thehacktimes.com/ />link relalternate typeapplication/json+oembed hrefhttps://thehacktimes.com/wp-json/oembed/1.0/embed?urlhttps%3A%2F%2Fthehacktimes.com%2F />link relalternate typetext/xml+oembed hrefhttps://thehacktimes.com/wp-json/oembed/1.0/embed?urlhttps%3A%2F%2Fthehacktimes.com%2F&formatxml />meta namegenerator contentSite Kit by Google 1.78.0 /> style typetext/css> .main-nav, .header-nav .menu .menu-item:hover > .sub-menu, .main-nav .menu .menu-item:hover > .sub-menu, .slide-caption, .spotlight, .carousel-layout1, footer, .loop-layout2 .loop-wrap .meta, .loop-layout3 .loop-wrap .meta, inputtypesubmit:hover, #cancel-comment-reply-link:hover, .copyright, #infinite-handle span:hover { background: #3c5b9b; } .slicknav_menu, .slicknav_nav ul { border-color: #3c5b9b; } .copyright, .copyright a { color: #fff; } .ticker-title, .header-nav .menu-item:hover, .main-nav li:hover, .footer-nav, .footer-nav ul li:hover > ul, .slicknav_menu, .slicknav_btn, .slicknav_nav .slicknav_item:hover, .slicknav_nav a:hover, .slider-layout2 .flex-control-paging li a.flex-active, .flex-control-paging li a.flex-active, .sl-caption, .subheading, .pt-layout1 .page-title, .wt-layout2 .widget-title, .wt-layout2 .footer-widget-title, .carousel-layout1 .caption, .page-numbers:hover, .current, .pagelink, a:hover .pagelink, inputtypesubmit, #cancel-comment-reply-link, .post-tags li:hover, .tagcloud a:hover, .sb-widget .tagcloud a:hover, .footer-widget .tagcloud a:hover, #infinite-handle span { background: #0070a8; } .slide-caption, .mh-mobile .slide-caption, id*carousel-, .wt-layout1 .widget-title, .wt-layout1 .footer-widget-title, .wt-layout3 .widget-title, .wt-layout3 .footer-widget-title, .ab-layout1 .author-box, .cat-desc, textarea:hover, inputtypetext:hover, inputtypeemail:hover, inputtypetel:hover, inputtypeurl:hover, blockquote { border-color: #0070a8; } .dropcap, .carousel-layout2 .caption { color: #0070a8; } body, .mh-content h1, .pt-layout2 .mh-content .page-title, .entry h1, .entry h2, .entry h3, .entry h4, .entry h5 .entry h6, .wp-caption .wp-caption-text, .post-thumbnail .wp-caption-text { color: #3d3d3d; } .meta, .meta a, .breadcrumb, .breadcrumb a { color: #3d3d3d; } a, .entry a, .related-title, .carousel-layout2 .carousel-item-title, a .pagelink, .page-numbers { color: #3d3d3d; } a:hover, .meta a:hover, .breadcrumb a:hover, .related-title:hover, #ticker a:hover .meta, .slide-title:hover, .sl-title:hover, .carousel-layout2 .carousel-item-title:hover { color: #0070a8; } 12.mh-sidebar { display: none; }.mh-content { width: 100% !important; }.author-box-postcount { display: none; }.author-box { background: #fff; border-top: 1px solid #5f7ec1; border-bottom: 1px solid #5f7ec1; } /style> style typetext/css>.entry { font-size: 16px; font-size: 1rem; }h1, h2, h3, h4, h5, h6, .cp-widget-title { font-family: Asap, sans-serif; }body { font-family: Asap, sans-serif; }/style>!-- Google AdSense snippet added by Site Kit -->meta namegoogle-adsense-platform-account contentca-host-pub-2644536267352236>meta namegoogle-adsense-platform-domain contentsitekit.withgoogle.com>!-- End Google AdSense snippet added by Site Kit -->style typetext/css idcustom-background-css>body.custom-background { background-image: url(https://thehacktimes.com/wp-content/uploads/2015/05/pattern8.png); background-position: center top; background-size: auto; background-repeat: repeat; background-attachment: scroll; }/style> !-- Google AdSense snippet added by Site Kit -->script asyncasync srchttps://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?clientca-pub-2804587256363599 crossoriginanonymous typetext/javascript>/script>!-- End Google AdSense snippet added by Site Kit -->meta namegoogle-site-verification content2LAX7xOieKztozV9qAV_OgNoe9_UVMQpusyPXCHJ4Yk />meta namemsvalidate.01 contentF9951EAF25CC845A113C04A3CCE7784F />/head>body classhome page-template page-template-page-homepage page-template-page-homepage-php page page-id-6 custom-background mh-right-sb wt-layout2 pt-layout1 ab-layout1 rp-disable loop-layout2>div classmh-container>header classheader-wrap> nav classheader-nav clearfix> /nav> a hrefhttps://thehacktimes.com/ titleThe Hack Times • Breaking Hacker News relhome>div classlogo-wrap rolebanner>img srchttps://thehacktimes.com/wp-content/uploads/2015/01/thehacktimes-logo2.png height121 width500 altThe Hack Times • Breaking Hacker News />/div>/a> nav classmain-nav clearfix> div classmenu-navigation-container>ul idmenu-navigation classmenu>li idmenu-item-21 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-has-children menu-item-21>a hrefhttps://thehacktimes.com/category/hacker-news/>Hacker News/a>ul classsub-menu> li idmenu-item-235 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-235>a hrefhttps://thehacktimes.com/category/hacker-news/security-news/>Security news/a>/li> li idmenu-item-98 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-98>a hrefhttps://thehacktimes.com/category/hacker-news/darknet/>Darknet/a>/li> li idmenu-item-74 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-74>a hrefhttps://thehacktimes.com/category/hacker-news/defacement/>Defacement/a>/li> li idmenu-item-73 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-73>a hrefhttps://thehacktimes.com/category/hacker-news/data-breach/>Data breach/a>/li> li idmenu-item-75 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-75>a hrefhttps://thehacktimes.com/category/hacker-news/mobile-hacking/>Mobile hacking/a>/li> li idmenu-item-76 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-76>a hrefhttps://thehacktimes.com/category/hacker-news/password-hacking/>Password hacking/a>/li> li idmenu-item-72 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-72>a hrefhttps://thehacktimes.com/category/hacker-news/credit-card/>Credit Card Hacking/a>/li>/ul>/li>li idmenu-item-722 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-has-children menu-item-722>a hrefhttps://thehacktimes.com/category/cyber-news/>Cyber News/a>ul classsub-menu> li idmenu-item-726 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-726>a hrefhttps://thehacktimes.com/category/cyber-news/ddos-attacks/>DDOS attacks/a>/li> li idmenu-item-728 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-728>a hrefhttps://thehacktimes.com/category/cyber-news/malware-attacks/>Malware Attacks/a>/li> li idmenu-item-727 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-727>a hrefhttps://thehacktimes.com/category/cyber-news/email-hacking/>Email Hacking/a>/li> li idmenu-item-742 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-742>a hrefhttps://thehacktimes.com/category/cyber-news/cyber-crime-news/>Cyber Crime News/a>/li> li idmenu-item-723 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-723>a hrefhttps://thehacktimes.com/category/cyber-news/cyber-attacks/>Cyber attacks/a>/li> li idmenu-item-725 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-725>a hrefhttps://thehacktimes.com/category/cyber-news/cyber-war/>Cyber War/a>/li> li idmenu-item-724 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-724>a hrefhttps://thehacktimes.com/category/cyber-news/cyber-espionage/>Cyber espionage/a>/li>/ul>/li>li idmenu-item-729 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-has-children menu-item-729>a hrefhttps://thehacktimes.com/category/vulnerabilities/>Vulnerabilities/a>ul classsub-menu> li idmenu-item-730 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-730>a hrefhttps://thehacktimes.com/category/vulnerabilities/zero-day/>0 day “zero day”/a>/li> li idmenu-item-731 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-731>a hrefhttps://thehacktimes.com/category/vulnerabilities/android/>Android/a>/li> li idmenu-item-733 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-733>a hrefhttps://thehacktimes.com/category/vulnerabilities/ios/>iOS/a>/li> li idmenu-item-732 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-732>a hrefhttps://thehacktimes.com/category/vulnerabilities/brute-force/>Brute force/a>/li> li idmenu-item-734 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-734>a hrefhttps://thehacktimes.com/category/vulnerabilities/mitm-attacks/>MiTM Attacks/a>/li> li idmenu-item-735 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-735>a hrefhttps://thehacktimes.com/category/vulnerabilities/sql-injection/>SQL injection/a>/li>/ul>/li>li idmenu-item-736 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-has-children menu-item-736>a hrefhttps://thehacktimes.com/category/spying/>Spying/a>ul classsub-menu> li idmenu-item-737 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-737>a hrefhttps://thehacktimes.com/category/spying/encryption/>Encryption/a>/li> li idmenu-item-738 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-738>a hrefhttps://thehacktimes.com/category/spying/nsa/>NSA/a>/li> li idmenu-item-739 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-739>a hrefhttps://thehacktimes.com/category/spying/privacy/>Privacy/a>/li> li idmenu-item-740 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-740>a hrefhttps://thehacktimes.com/category/spying/surveillance/>Surveillance/a>/li> li idmenu-item-741 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-741>a hrefhttps://thehacktimes.com/category/spying/tor-network/>Tor network/a>/li>/ul>/li>li idmenu-item-744 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-has-children menu-item-744>a hrefhttps://thehacktimes.com/category/social-network-hacking/>Social Network Hacking/a>ul classsub-menu> li idmenu-item-745 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-745>a hrefhttps://thehacktimes.com/category/social-network-hacking/facebook-hack/>Facebook hacking/a>/li> li idmenu-item-746 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-746>a hrefhttps://thehacktimes.com/category/social-network-hacking/twitter-hack/>twitter hack/a>/li>/ul>/li>/ul>/div> /nav> nav classinfo-nav clearfix> div classmenu-meni-ispod-container>ul idmenu-meni-ispod classmenu>li idmenu-item-116 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-116>a hrefhttps://thehacktimes.com/category/infosec/>Infosec/a>/li>li idmenu-item-749 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-749>a hrefhttps://thehacktimes.com/category/how-to/>How to/a>/li>li idmenu-item-751 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-751>a hrefhttps://thehacktimes.com/category/videos/>Videos/a>/li>li idmenu-item-114 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-114>a hrefhttps://thehacktimes.com/category/cyber-insurance/>Cyber Insurance/a>/li>li idmenu-item-747 classmenu-item menu-item-type-taxonomy menu-item-object-category menu-item-747>a hrefhttps://thehacktimes.com/category/anonymous/>Anonymous/a>/li>/ul>/div> /nav> /header> div classnews-ticker clearfix> div classticker-title> Must Read /div> div classticker-content> ul idticker> li classticker-item> a hrefhttps://thehacktimes.com/iptables-deter-attackers/ titleIPtables to Deter Attackers> span classmeta ticker-item-meta> June 21, 2016 in Cyber attacks: /span> span classmeta ticker-item-title> IPtables to Deter Attackers /span> /a> /li> li classticker-item> a hrefhttps://thehacktimes.com/composition-risks-cloud/ titleComposition and Risks of the Cloud> span classmeta ticker-item-meta> June 20, 2016 in Infosec: /span> span classmeta ticker-item-title> Composition and Risks of the Cloud /span> /a> /li> li classticker-item> a hrefhttps://thehacktimes.com/facebook-introduces-deep-text/ titleFacebook Introduces Deep Text> span classmeta ticker-item-meta> June 4, 2016 in Cyber News: /span> span classmeta ticker-item-title> Facebook Introduces Deep Text /span> /a> /li> li classticker-item> a hrefhttps://thehacktimes.com/filipino-bank-hacking-attack/ titleBank Hacking Attack Uncovered in Philippines> span classmeta ticker-item-meta> May 27, 2016 in Cyber attacks: /span> span classmeta ticker-item-title> Bank Hacking Attack Uncovered in Philippines /span> /a> /li> li classticker-item> a hrefhttps://thehacktimes.com/hackers-weekly-report/ titleHackers Weekly Report – Jan 2016 (*1/2*)> span classmeta ticker-item-meta> January 25, 2016 in Cyber Crime News: /span> span classmeta ticker-item-title> Hackers Weekly Report – Jan 2016 (*1/2*) /span> /a> /li> /ul> /div> /div> div classmh-wrapper hp clearfix> div classhp-main> div classsb-widget home-1 home-wide> section idslider-46 classflexslider slider-large slider-layout1> ul classslides> li> article classslide-wrap> a hrefhttps://thehacktimes.com/iptables-deter-attackers/ titleIPtables to Deter Attackers>img classmh-image-placeholder srchttps://thehacktimes.com/wp-content/themes/mh_magazine/images/noimage_940x400.png altNo Picture /> /a> div classslide-caption> div classslide-data> a hrefhttps://thehacktimes.com/iptables-deter-attackers/ titleIPtables to Deter Attackers>h2 classslide-title>IPtables to Deter Attackers/h2>/a> /div> /div> /article> /li> li> article classslide-wrap> a hrefhttps://thehacktimes.com/composition-risks-cloud/ titleComposition and Risks of the Cloud>img classmh-image-placeholder srchttps://thehacktimes.com/wp-content/themes/mh_magazine/images/noimage_940x400.png altNo Picture /> /a> div classslide-caption> div classslide-data> a hrefhttps://thehacktimes.com/composition-risks-cloud/ titleComposition and Risks of the Cloud>h2 classslide-title>Composition and Risks of the Cloud/h2>/a> /div> /div> /article> /li> li> article classslide-wrap> a hrefhttps://thehacktimes.com/facebook-introduces-deep-text/ titleFacebook Introduces Deep Text>img classmh-image-placeholder srchttps://thehacktimes.com/wp-content/themes/mh_magazine/images/noimage_940x400.png altNo Picture /> /a> div classslide-caption> div classslide-data> a hrefhttps://thehacktimes.com/facebook-introduces-deep-text/ titleFacebook Introduces Deep Text>h2 classslide-title>Facebook Introduces Deep Text/h2>/a> /div> /div> /article> /li> li> article classslide-wrap> a hrefhttps://thehacktimes.com/filipino-bank-hacking-attack/ titleBank Hacking Attack Uncovered in Philippines>img width670 height386 srchttps://thehacktimes.com/wp-content/uploads/2016/05/image22.jpg classattachment-slider size-slider wp-post-image alt loadinglazy /> /a> div classslide-caption> div classslide-data> a hrefhttps://thehacktimes.com/filipino-bank-hacking-attack/ titleBank Hacking Attack Uncovered in Philippines>h2 classslide-title>Bank Hacking Attack Uncovered in Philippines/h2>/a> /div> /div> /article> /li> li> article classslide-wrap> a hrefhttps://thehacktimes.com/hackers-weekly-report/ titleHackers Weekly Report – Jan 2016 (*1/2*)>img width940 height400 srchttps://thehacktimes.com/wp-content/uploads/2016/01/Weekly-report-The-Hack-Times.jpg classattachment-slider size-slider wp-post-image alt loadinglazy /> /a> div classslide-caption> div classslide-data> a hrefhttps://thehacktimes.com/hackers-weekly-report/ titleHackers Weekly Report – Jan 2016 (*1/2*)>h2 classslide-title>Hackers Weekly Report – Jan 2016 (*1/2*)/h2>/a> /div> /div> /article> /li> /ul> /section>/div> div classhp-columns clearfix> div idmain-content classhp-content left> div classsb-widget home-2 home-wide> article classspotlight> div classsl-thumb> a hrefhttps://thehacktimes.com/composition-risks-cloud/ titleComposition and Risks of the Cloud>img classmh-image-placeholder srchttps://thehacktimes.com/wp-content/themes/mh_magazine/images/noimage_580x326.png altNo Picture /> /a> /div> a hrefhttps://thehacktimes.com/composition-risks-cloud/ titleComposition and Risks of the Cloud>h2 classsl-title>Composition and Risks of the Cloud/h2>/a> /article>/div> div classclearfix> div classhp-sidebar hp-home-3> div classsb-widget home-3>h4 classwidget-title>a hrefhttps://thehacktimes.com/category/cyber-news/cyber-crime-news/ classwidget-title-link>Cyber Crime News/a>/h4> ul classcp-widget clearfix> li classcp-wrap cp-large clearfix> div classcp-thumb-xl>a hrefhttps://thehacktimes.com/filipino-bank-hacking-attack/ titleBank Hacking Attack Uncovered in Philippines>img width300 height173 srchttps://thehacktimes.com/wp-content/uploads/2016/05/image22.jpg classattachment-cp_large size-cp_large wp-post-image alt loadinglazy />/a>/div> div classcp-data> h3 classcp-xl-title>a hrefhttps://thehacktimes.com/filipino-bank-hacking-attack/ titleBank Hacking Attack Uncovered in Philippines>Bank Hacking Attack Uncovered in Philippines/a>/h3> p classmeta>May 27, 2016 /p> /div> div classmh-excerpt>Symantec Security Response has learned of another Lazarus SWIFT bank hacking attack. This time the victim is a bank in the Philippines. Previous banks attacked include Banco del Austro in a hrefhttps://thehacktimes.com/filipino-bank-hacking-attack/ titleBank Hacking Attack Uncovered in Philippines>.../a>/div> /li> /ul>/div> /div> div classhp-sidebar sb-right hp-home-4> div classsb-widget home-4>h4 classwidget-title>a hrefhttps://thehacktimes.com/category/cyber-news/cyber-war/ classwidget-title-link>Cyberwar/a>/h4> ul classcp-widget clearfix> li classcp-wrap cp-large clearfix> div classcp-thumb-xl>a hrefhttps://thehacktimes.com/cyber-warfare/ titleCyber Warfare>img width300 height128 srchttps://thehacktimes.com/wp-content/uploads/2015/10/rsz_cyber-war-landscape-warriors.jpg classattachment-cp_large size-cp_large wp-post-image altCyber war is usually something we see in movies - but we are getting ever closer to this frightening reality. Now is the time to ensure there are rules and regulations. loadinglazy />/a>/div> div classcp-data> h3 classcp-xl-title>a hrefhttps://thehacktimes.com/cyber-warfare/ titleCyber Warfare>Cyber Warfare/a>/h3> p classmeta>October 6, 2015 /p> /div> div classmh-excerpt>It feels like science fiction. Still, after all these years, it feels like sceince fiction. Cyber Warfare. Yet, this concept which comes so easy to us when we think of movies, has little grasp in the a hrefhttps://thehacktimes.com/cyber-warfare/ titleCyber Warfare>.../a>/div> /li> /ul>/div> /div> /div> div classsb-widget home-5 home-wide>h4 classwidget-title>a hrefhttps://thehacktimes.com/category/social-network-hacking/ classwidget-title-link>Social Network Hacking/a>/h4> ul classcp-widget clearfix> li classcp-wrap cp-large clearfix> div classcp-thumb-xl>a hrefhttps://thehacktimes.com/social-engineering-test-for-human-error/ titleSocial Engineering Test for Human Error>img width300 height128 srchttps://thehacktimes.com/wp-content/uploads/2015/10/rsz_social-media-dangers.jpg classattachment-cp_large size-cp_large wp-post-image altCorporations can now test how vulnerable their employees are to social engineering and human error. loadinglazy />/a>/div> div classcp-data> h3 classcp-xl-title>a hrefhttps://thehacktimes.com/social-engineering-test-for-human-error/ titleSocial Engineering Test for Human Error>Social Engineering Test for Human Error/a>/h3> /div> div classmh-excerpt>Ava is supposed to “test” how employees fight off social engineering – by tricking them and stalking their social networks. The implications are a hrefhttps://thehacktimes.com/social-engineering-test-for-human-error/ titleSocial Engineering Test for Human Error>.../a>/div> /li> li classcp-wrap cp-large clearfix> div classcp-thumb-xl>a hrefhttps://thehacktimes.com/facebook-vulnerability/ titleFacebook Vulnerability>img width300 height128 srchttps://thehacktimes.com/wp-content/uploads/2015/09/rsz_facebook-257829_640.jpg classattachment-cp_large size-cp_large wp-post-image alt loadinglazy />/a>/div> div classcp-data> h3 classcp-xl-title>a hrefhttps://thehacktimes.com/facebook-vulnerability/ titleFacebook Vulnerability>Facebook Vulnerability/a>/h3> /div> div classmh-excerpt>We use it every day, it is an integral part of our lives and for more than a decade now, it has grown to become as important to us as the coffee in the morning a hrefhttps://thehacktimes.com/facebook-vulnerability/ titleFacebook Vulnerability>.../a>/div> /li> /ul>/div> /div> div classmh-sidebar hp-sidebar hp-home-6> div classsb-widget home-6>h4 classwidget-title>a hrefhttps://thehacktimes.com/category/editors-choice/ classwidget-title-link>Editors Choice/a>/h4> ul classcp-widget clearfix> li classcp-wrap cp-large clearfix> div classcp-thumb-xl>a hrefhttps://thehacktimes.com/jonathan-james-and-aaron-swartz-two-obituaries-one-prosecutor/ titleJonathan James and Aaron Swartz-Two Obituaries One Prosecutor>img width300 height128 srchttps://thehacktimes.com/wp-content/uploads/2015/05/cia-folter-gefaengnisse-940x400.jpg classattachment-cp_large size-cp_large wp-post-image alt loadinglazy />/a>/div> div classcp-data> h3 classcp-xl-title>a hrefhttps://thehacktimes.com/jonathan-james-and-aaron-swartz-two-obituaries-one-prosecutor/ titleJonathan James and Aaron Swartz-Two Obituaries One Prosecutor>Jonathan James and Aaron Swartz-Two Obituaries One Prosecutor/a>/h3> p classmeta>May 22, 2015 /p> /div> div classmh-excerpt>Years after the suicide of two hacker geniuses, Jonathan James and Aaron Swartz, one question is still circling the online community: How come those two hackers both committed suicide after being charged by the a hrefhttps://thehacktimes.com/jonathan-james-and-aaron-swartz-two-obituaries-one-prosecutor/ titleJonathan James and Aaron Swartz-Two Obituaries One Prosecutor>.../a>/div> /li> li classcp-wrap cp-large clearfix> div classcp-thumb-xl>a hrefhttps://thehacktimes.com/how-hacking-makes-the-world-better-place-first-wireless-hack-in-history/ titleHow hacking makes the world better place- first wireless hack in history.>img width300 height128 srchttps://thehacktimes.com/wp-content/uploads/2015/05/addtext_com_MTMwNzExMjM1OTk.jpg classattachment-cp_large size-cp_large wp-post-image alt loadinglazy />/a>/div> div classcp-data> h3 classcp-xl-title>a hrefhttps://thehacktimes.com/how-hacking-makes-the-world-better-place-first-wireless-hack-in-history/ titleHow hacking makes the world better place- first wireless hack in history.>How hacking makes the world better place- first wireless hack in history./a>/h3> p classmeta>May 12, 2015 /p> /div> div classmh-excerpt>The idea of hacking may conjure stylized images of electronic vandalism, banking frauds or some other ways of computer misuse. Most people today associate hacking with breaking the law and assume that everyone a hrefhttps://thehacktimes.com/how-hacking-makes-the-world-better-place-first-wireless-hack-in-history/ titleHow hacking makes the world better place- first wireless hack in history.>.../a>/div> /li> li classcp-wrap cp-large clearfix> div classcp-thumb-xl>a hrefhttps://thehacktimes.com/why-experts-consider-new-u-s-multi-billion-credit-card-system-upgrade-is-already-vulnerable-to-cyber-scams/ titleWhy Experts Consider New U.S. Multi-Billion Credit Card System Upgrade Is Already Vulnerable To Cyber Scams>img width300 height182 srchttps://thehacktimes.com/wp-content/uploads/2015/04/Credit-Cards_Merithew.jpg classattachment-cp_large size-cp_large wp-post-image altcredit card hacking loadinglazy />/a>/div> div classcp-data> h3 classcp-xl-title>a hrefhttps://thehacktimes.com/why-experts-consider-new-u-s-multi-billion-credit-card-system-upgrade-is-already-vulnerable-to-cyber-scams/ titleWhy Experts Consider New U.S. Multi-Billion Credit Card System Upgrade Is Already Vulnerable To Cyber Scams>Why Experts Consider New U.S. Multi-Billion Credit Card System Upgrade Is Already Vulnerable To Cyber Scams/a>/h3> p classmeta>April 8, 2015 /p> /div> div classmh-excerpt> As the looming deadline for the new chip-enabled credit card change in the U.S. is coming to a close this year, more and more concern is raised naturally, over the question of security of the newly a hrefhttps://thehacktimes.com/why-experts-consider-new-u-s-multi-billion-credit-card-system-upgrade-is-already-vulnerable-to-cyber-scams/ titleWhy Experts Consider New U.S. Multi-Billion Credit Card System Upgrade Is Already Vulnerable To Cyber Scams>.../a>/div> /li> /ul>/div> /div> /div> div classsb-widget home-7 home-wide>h4 classwidget-title carousel-title-layout2>Reports/h4> div idcarousel-3143 classflexslider carousel-layout2> ul classslides> li classcarousel-item> a hrefhttps://thehacktimes.com/iptables-deter-attackers/ titleIPtables to Deter Attackers> img classmh-image-placeholder srchttps://thehacktimes.com/wp-content/themes/mh_magazine/images/noimage_174x98.png altNo Picture /> /a> div classcaption> Cyber attacks /div> a hrefhttps://thehacktimes.com/iptables-deter-attackers/ titleIPtables to Deter Attackers> h3 classcarousel-item-title> IPtables to Deter Attackers /h3> /a> /li> li classcarousel-item> a hrefhttps://thehacktimes.com/composition-risks-cloud/ titleComposition and Risks of the Cloud> img classmh-image-placeholder srchttps://thehacktimes.com/wp-content/themes/mh_magazine/images/noimage_174x98.png altNo Picture /> /a> div classcaption> Infosec /div> a hrefhttps://thehacktimes.com/composition-risks-cloud/ titleComposition and Risks of the Cloud> h3 classcarousel-item-title> Composition and Risks of the Cloud /h3> /a> /li> li classcarousel-item> a hrefhttps://thehacktimes.com/facebook-introduces-deep-text/ titleFacebook Introduces Deep Text> img classmh-image-placeholder srchttps://thehacktimes.com/wp-content/themes/mh_magazine/images/noimage_174x98.png altNo Picture /> /a> div classcaption> Cyber News /div> a hrefhttps://thehacktimes.com/facebook-introduces-deep-text/ titleFacebook Introduces Deep Text> h3 classcarousel-item-title> Facebook Introduces Deep Text /h3> /a> /li> li classcarousel-item> a hrefhttps://thehacktimes.com/filipino-bank-hacking-attack/ titleBank Hacking Attack Uncovered in Philippines> img width170 height98 srchttps://thehacktimes.com/wp-content/uploads/2016/05/image22.jpg classattachment-carousel size-carousel wp-post-image alt loadinglazy /> /a> div classcaption> Cyber attacks /div> a hrefhttps://thehacktimes.com/filipino-bank-hacking-attack/ titleBank Hacking Attack Uncovered in Philippines> h3 classcarousel-item-title> Bank Hacking Attack Uncovered in Philippines /h3> /a> /li> li classcarousel-item> a hrefhttps://thehacktimes.com/hackers-weekly-report/ titleHackers Weekly Report – Jan 2016 (*1/2*)> img width174 height74 srchttps://thehacktimes.com/wp-content/uploads/2016/01/Weekly-report-The-Hack-Times.jpg classattachment-carousel size-carousel wp-post-image alt loadinglazy /> /a> div classcaption> Cyber Crime News /div> a hrefhttps://thehacktimes.com/hackers-weekly-report/ titleHackers Weekly Report – Jan 2016 (*1/2*)> h3 classcarousel-item-title> Hackers Weekly Report – Jan 2016 (*1/2*) /h3> /a> /li> li classcarousel-item> a hrefhttps://thehacktimes.com/layered-security/ titleLayered Security> img width174 height74 srchttps://thehacktimes.com/wp-content/uploads/2015/10/rsz_cloud-identity-security-concept-icon-fingerprint-locked-padlock-layered-file-easy-customization-45592674.jpg classattachment-carousel size-carousel wp-post-image altA wall can keep intruders out if they use brute force. An immune system scans your system constantly for threats and irregularities. It looks for trouble all the time, finds it and eliminates it. The layered security approach is trying to take the best of both worlds: once an intruder (read: virus, malware etc) gets into the system by breaching the first wall of defense, it then has another line of defense and then another one and then another one to breach. loadinglazy /> /a> div classcaption> Cyber attacks /div> a hrefhttps://thehacktimes.com/layered-security/ titleLayered Security> h3 classcarousel-item-title> Layered Security /h3> /a> /li> li classcarousel-item> a hrefhttps://thehacktimes.com/social-engineering-test-for-human-error/ titleSocial Engineering Test for Human Error> img width174 height74 srchttps://thehacktimes.com/wp-content/uploads/2015/10/rsz_social-media-dangers.jpg classattachment-carousel size-carousel wp-post-image altCorporations can now test how vulnerable their employees are to social engineering and human error. loadinglazy /> /a> div classcaption> Cyber News /div> a hrefhttps://thehacktimes.com/social-engineering-test-for-human-error/ titleSocial Engineering Test for Human Error> h3 classcarousel-item-title> Social Engineering Test for Human Error /h3> /a> /li> li classcarousel-item> a hrefhttps://thehacktimes.com/cyber-warfare/ titleCyber Warfare> img width174 height74 srchttps://thehacktimes.com/wp-content/uploads/2015/10/rsz_cyber-war-landscape-warriors.jpg classattachment-carousel size-carousel wp-post-image altCyber war is usually something we see in movies - but we are getting ever closer to this frightening reality. Now is the time to ensure there are rules and regulations. loadinglazy /> /a> div classcaption> Cyber attacks /div> a hrefhttps://thehacktimes.com/cyber-warfare/ titleCyber Warfare> h3 classcarousel-item-title> Cyber Warfare /h3> /a> /li> li classcarousel-item> a hrefhttps://thehacktimes.com/iot-security/ titleIoT Security> img width174 height74 srchttps://thehacktimes.com/wp-content/uploads/2015/10/rsz_internet-de-las-cosas.jpg classattachment-carousel size-carousel wp-post-image altIoT Security has become more and more important as it grows to take over every aspect of our life. loadinglazy /> /a> div classcaption> Cyber News /div> a hrefhttps://thehacktimes.com/iot-security/ titleIoT Security> h3 classcarousel-item-title> IoT Security /h3> /a> /li> li classcarousel-item> a hrefhttps://thehacktimes.com/apple-app-store-hacked-xcode-ghost/ titleApple App Store Hacked: XCode Ghost> img width174 height74 srchttps://thehacktimes.com/wp-content/uploads/2015/09/rsz_apple.jpg classattachment-carousel size-carousel wp-post-image altDid the CIA hack the Apple App Store? loadinglazy /> /a> div classcaption> Cyber attacks /div> a hrefhttps://thehacktimes.com/apple-app-store-hacked-xcode-ghost/ titleApple App Store Hacked: XCode Ghost> h3 classcarousel-item-title> Apple App Store Hacked: XCode Ghost /h3> /a> /li> /ul> /div>/div> div classhp-columns clearfix> div classhp-sidebar hp-home-8> div classsb-widget home-8>h4 classwidget-title>a hrefhttps://thehacktimes.com/category/vulnerabilities/zero-day/ classwidget-title-link>0 day/a>/h4> ul classcp-widget clearfix> li classcp-wrap cp-large clearfix> div classcp-thumb-xl>a hrefhttps://thehacktimes.com/venom-zero-day-affects-datacenter-and-millions-of-end-users/ titleVenom zero-day affects datacenter and Millions of end users.>img width300 height128 srchttps://thehacktimes.com/wp-content/uploads/2015/05/Venom-Vulnerability.jpg classattachment-cp_large size-cp_large wp-post-image alt loadinglazy />/a>/div> div classcp-data> h3 classcp-xl-title>a hrefhttps://thehacktimes.com/venom-zero-day-affects-datacenter-and-millions-of-end-users/ titleVenom zero-day affects datacenter and Millions of end users.>Venom zero-day affects datacenter and Millions of end users./a>/h3> /div> div classmh-excerpt>Well, heartbleed was a big buzz back in the day when security researcher Neel Mehta of Google’s security team had reported it, many websites, some were very popular, were affected. The new a hrefhttps://thehacktimes.com/venom-zero-day-affects-datacenter-and-millions-of-end-users/ titleVenom zero-day affects datacenter and Millions of end users.>.../a>/div> /li> li classcp-wrap cp-large clearfix> div classcp-thumb-xl>a hrefhttps://thehacktimes.com/mackeeper-0-day-flaw-more-than-20-million-users-affected/ titleMacKeeper 0-day flaw more than 20 million users affected>img width300 height128 srchttps://thehacktimes.com/wp-content/uploads/2015/05/MacKeeper-zero-day-security-flaw.jpg classattachment-cp_large size-cp_large wp-post-image alt loadinglazy />/a>/div> div classcp-data> h3 classcp-xl-title>a hrefhttps://thehacktimes.com/mackeeper-0-day-flaw-more-than-20-million-users-affected/ titleMacKeeper 0-day flaw more than 20 million users affected>MacKeeper 0-day flaw more than 20 million users affected/a>/h3> /div> div classmh-excerpt>If you are a Mac user and not using MacKeeper, you probably seen it in some pop-under ads on spam or porn websites as advertisement and their infamous “Leave Page/Stay on This Page” dialogue, no a hrefhttps://thehacktimes.com/mackeeper-0-day-flaw-more-than-20-million-users-affected/ titleMacKeeper 0-day flaw more than 20 million users affected>.../a>/div> /li> /ul>/div> /div> div classhp-sidebar sb-right hp-home-9> div classsb-widget home-9>h4 classwidget-title>a hrefhttps://thehacktimes.com/category/cyber-news/cyber-espionage/ classwidget-title-link>Cyber Espionage/a>/h4> ul classcp-widget clearfix> li classcp-wrap cp-large clearfix> div classcp-thumb-xl>a hrefhttps://thehacktimes.com/apple-app-store-hacked-xcode-ghost/ titleApple App Store Hacked: XCode Ghost>img width300 height128 srchttps://thehacktimes.com/wp-content/uploads/2015/09/rsz_apple.jpg classattachment-cp_large size-cp_large wp-post-image altDid the CIA hack the Apple App Store? loadinglazy />/a>/div> div classcp-data> h3 classcp-xl-title>a hrefhttps://thehacktimes.com/apple-app-store-hacked-xcode-ghost/ titleApple App Store Hacked: XCode Ghost>Apple App Store Hacked: XCode Ghost/a>/h3> /div> div classmh-excerpt>Back in March 2015 first first malware infection of iPhones came to light: The Apple App Store was hacked. Back then, it was assumed that only 39 apps had been affected, and Apple acted quickly a hrefhttps://thehacktimes.com/apple-app-store-hacked-xcode-ghost/ titleApple App Store Hacked: XCode Ghost>.../a>/div> /li> li classcp-wrap cp-large clearfix> div classcp-thumb-xl>a hrefhttps://thehacktimes.com/how-hacking-makes-the-world-better-place-first-wireless-hack-in-history/ titleHow hacking makes the world better place- first wireless hack in history.>img width300 height128 srchttps://thehacktimes.com/wp-content/uploads/2015/05/addtext_com_MTMwNzExMjM1OTk.jpg classattachment-cp_large size-cp_large wp-post-image alt loadinglazy />/a>/div> div classcp-data> h3 classcp-xl-title>a hrefhttps://thehacktimes.com/how-hacking-makes-the-world-better-place-first-wireless-hack-in-history/ titleHow hacking makes the world better place- first wireless hack in history.>How hacking makes the world better place- first wireless hack in history./a>/h3> /div> div classmh-excerpt>The idea of hacking may conjure stylized images of electronic vandalism, banking frauds or some other ways of computer misuse. Most people today associate hacking with breaking the law and assume a hrefhttps://thehacktimes.com/how-hacking-makes-the-world-better-place-first-wireless-hack-in-history/ titleHow hacking makes the world better place- first wireless hack in history.>.../a>/div> /li> /ul>/div> /div> div classhp-sidebar sb-right hp-home-10> div classsb-widget home-10>h4 classwidget-title>Darknet/h4> ul classcp-widget clearfix> /ul>/div> /div> /div> /div> div classhp-sidebar-2 sb-wide sb-right> div classsb-widget home-12>h4 classwidget-title>Most Popular/h4> ul classcp-widget clearfix> li classcp-wrap cp-large clearfix> div classcp-thumb-xl>a hrefhttps://thehacktimes.com/jonathan-james-and-aaron-swartz-two-obituaries-one-prosecutor/ titleJonathan James and Aaron Swartz-Two Obituaries One Prosecutor>img width300 height128 srchttps://thehacktimes.com/wp-content/uploads/2015/05/cia-folter-gefaengnisse-940x400.jpg classattachment-cp_large size-cp_large wp-post-image alt loadinglazy />/a>/div> div classcp-data> h3 classcp-xl-title>a hrefhttps://thehacktimes.com/jonathan-james-and-aaron-swartz-two-obituaries-one-prosecutor/ titleJonathan James and Aaron Swartz-Two Obituaries One Prosecutor>Jonathan James and Aaron Swartz-Two Obituaries One Prosecutor/a>/h3> p classmeta>May 22, 2015 /p> /div> div classmh-excerpt>Years after the suicide of two hacker geniuses, Jonathan James and Aaron Swartz, one question is still circling the online community: How come those two hackers both committed suicide after being charged by the FBI, and what is even more interesting, they had to deal with the same federal prosecutor? Two obituaries one prosecutor? Jonathan James (1983 – 2008), know as „c0mrade“, was an a hrefhttps://thehacktimes.com/jonathan-james-and-aaron-swartz-two-obituaries-one-prosecutor/ titleJonathan James and Aaron Swartz-Two Obituaries One Prosecutor>.../a>/div> /li> li classcp-wrap cp-large clearfix> div classcp-thumb-xl>a hrefhttps://thehacktimes.com/mackeeper-0-day-flaw-more-than-20-million-users-affected/ titleMacKeeper 0-day flaw more than 20 million users affected>img width300 height128 srchttps://thehacktimes.com/wp-content/uploads/2015/05/MacKeeper-zero-day-security-flaw.jpg classattachment-cp_large size-cp_large wp-post-image alt loadinglazy />/a>/div> div classcp-data> h3 classcp-xl-title>a hrefhttps://thehacktimes.com/mackeeper-0-day-flaw-more-than-20-million-users-affected/ titleMacKeeper 0-day flaw more than 20 million users affected>MacKeeper 0-day flaw more than 20 million users affected/a>/h3> p classmeta>May 12, 2015 /p> /div> div classmh-excerpt>If you are a Mac user and not using MacKeeper, you probably seen it in some pop-under ads on spam or porn websites as advertisement and their infamous “Leave Page/Stay on This Page” dialogue, no wonder it been affected by 0-day emoemote code execution flaw considering what kind of ads campaigns they use for promotion… MacKeeper 3.4.1 and earlier are affected, the way it handles a hrefhttps://thehacktimes.com/mackeeper-0-day-flaw-more-than-20-million-users-affected/ titleMacKeeper 0-day flaw more than 20 million users affected>.../a>/div> /li> li classcp-wrap cp-large clearfix> div classcp-thumb-xl>a hrefhttps://thehacktimes.com/hola-vpn-turns-7-milion-users-into-legitimate-botnet-network/ titleHola VPN Turns 9 Milion users into Legitimate Botnet Network>img width300 height128 srchttps://thehacktimes.com/wp-content/uploads/2015/05/Hola-Vpn-botnet.jpg classattachment-cp_large size-cp_large wp-post-image alt loadinglazy />/a>/div> div classcp-data> h3 classcp-xl-title>a hrefhttps://thehacktimes.com/hola-vpn-turns-7-milion-users-into-legitimate-botnet-network/ titleHola VPN Turns 9 Milion users into Legitimate Botnet Network>Hola VPN Turns 9 Milion users into Legitimate Botnet Network/a>/h3> p classmeta>May 28, 2015 /p> /div> div classmh-excerpt> Free VPN with over 9 Million exit nodes – total anonymity and free surfing of any blocked website. Sounds good? Think again. Israeli based corporation Hola VPN used its sophisticated system to exploit its end users and apparently made the biggest legitimate botnet network on the internet. Hola VPN, a previously legitimate and actually quite good VPN service seems to have a hrefhttps://thehacktimes.com/hola-vpn-turns-7-milion-users-into-legitimate-botnet-network/ titleHola VPN Turns 9 Milion users into Legitimate Botnet Network>.../a>/div> /li> li classcp-wrap cp-large clearfix> div classcp-thumb-xl>a hrefhttps://thehacktimes.com/radio-waves-of-doom/ titleRadio Waves of Doom>img width300 height128 srchttps://thehacktimes.com/wp-content/uploads/2015/09/FM-Radio-Waves-used-to-Hack-Air-Gapped-Systems.jpg classattachment-cp_large size-cp_large wp-post-image alt loadinglazy />/a>/div> div classcp-data> h3 classcp-xl-title>a hrefhttps://thehacktimes.com/radio-waves-of-doom/ titleRadio Waves of Doom>Radio Waves of Doom/a>/h3> p classmeta>September 1, 2015 /p> /div> div classmh-excerpt>We thought the day and age for the good old Radio signals were done and dusted, didn’t we? Long gone are the days, when we had to tune in to find the right frequency on your FM receiver to hear that favourite song or show. Well, according to research done in Israel, the days of FM radio waves are coming back – with a sinister twist to them. To break it down: Mobile phones (or any a hrefhttps://thehacktimes.com/radio-waves-of-doom/ titleRadio Waves of Doom>.../a>/div> /li> li classcp-wrap cp-large clearfix> div classcp-thumb-xl>a hrefhttps://thehacktimes.com/hacker-news-portal/ titleHacker News Portal!>img width300 height150 srchttps://thehacktimes.com/wp-content/uploads/2015/02/nsa-Tor.jpg classattachment-cp_large size-cp_large wp-post-image alt loadinglazy />/a>/div> div classcp-data> h3 classcp-xl-title>a hrefhttps://thehacktimes.com/hacker-news-portal/ titleHacker News Portal!>Hacker News Portal!/a>/h3> p classmeta>February 16, 2015 /p> /div> div classmh-excerpt>The Hack Times The Hack Times is a leading platform that delivers information related to cyber security, cyber attacks, hacker news, ddos attack, network security, completely run & maintained by one individual involved in this project. History of the idea: The idea was originally developed in early 2005 when I first attempted to create and run a social news website called a hrefhttps://thehacktimes.com/hacker-news-portal/ titleHacker News Portal!>.../a>/div> /li> /ul>/div> /div> /div>footer classrow clearfix> div classcol-1-4 mq-footer> div classfooter-widget footer-1>h6 classfooter-widget-title>Authors/h6> ul classuser-widget row clearfix> li classuw-wrap clearfix> div classuw-avatar>a hrefhttps://thehacktimes.com/author/vlada/ titleArticles by vlada>img alt srchttps://secure.gravatar.com/avatar/0eb1af84edc83caa26afb61b8095bf63?s48&dmm&rg srcsethttps://secure.gravatar.com/avatar/0eb1af84edc83caa26afb61b8095bf63?s96&dmm&rg 2x classavatar avatar-48 photo height48 width48 loadinglazy/>/a>/div> div classuw-text> a hrefhttps://thehacktimes.com/author/vlada/ titleArticles by vlada classauthor-name>vlada/a> p classuw-data>published 12 articles/p> /div> /li> li classuw-wrap clearfix> div classuw-avatar>a hrefhttps://thehacktimes.com/author/ronika/ titleArticles by SubMar>img alt srchttps://secure.gravatar.com/avatar/ffb7a90be314c7c4b16644527bd1a239?s48&dmm&rg srcsethttps://secure.gravatar.com/avatar/ffb7a90be314c7c4b16644527bd1a239?s96&dmm&rg 2x classavatar avatar-48 photo height48 width48 loadinglazy/>/a>/div> div classuw-text> a hrefhttps://thehacktimes.com/author/ronika/ titleArticles by SubMar classauthor-name>SubMar/a> p classuw-data>published 16 articles/p> /div> /li> /ul>/div> /div> div classcol-1-4 mq-footer> div classfooter-widget footer-2> div classtextwidget>/div> /div> /div> div classcol-1-4 mq-footer> div classfooter-widget footer-3> div classtextwidget>/div> /div> /div> div classcol-1-4 mq-footer> /div> /footer> div classfooter-mobile-nav>/div> nav classfooter-nav clearfix> div classmenu-footer-container>ul idmenu-footer classmenu>li idmenu-item-642 classmenu-item menu-item-type-post_type menu-item-object-page menu-item-642>a hrefhttps://thehacktimes.com/contact-us/>Contact Us Page/a>/li>li idmenu-item-472 classmenu-item menu-item-type-custom menu-item-object-custom menu-item-472>a hrefhttps://thehacktimes.com/privacy.html>Privacy/a>/li>/ul>/div> /nav>div classcopyright-wrap> p classcopyright>Copyright © 2020 | thehacktimes.com/p>/div>/div>script typetext/javascript srchttps://thehacktimes.com/wp-includes/js/comment-reply.min.js?ver5.7.12 idcomment-reply-js>/script>script typetext/javascript srchttps://thehacktimes.com/wp-includes/js/wp-embed.min.js?ver5.7.12 idwp-embed-js>/script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]