Blog Posts - Hacker News



4 Flaws hit HTTP/2 Protocol that could allow Hackers to Disrupt Servers

If you think that the HTTP/2 protocol is more secure than the standard HTTP (Hypertext Transfer Protocol), then you might be wrong, as it took researchers just four months to discover four flaws in the HTTP/2 protocol.HTTP/2 was launched properly j...
by Tech Holics Blog on Aug 10, 2016

Pokémon GO Creator's Twitter Account Hacked — Pika, Pikaaaa!

Twitter account of another high-profile CEO has been hacked!This time, it's Niantic CEO John Hanke, the developer behind the world's most popular game Pokémon GO.And it seems like Hanke is so busy with its newly launched game Pokémon GO t...
by Tech Holics Blog on Aug 3, 2016

MITM Attack — Reverse Engineering an Encrypted Service

Legal disclaimer View Detail...
by What is web development on Jul 29, 2016

Sniffing HTTPS URLS with malicious PAC files

In March this year we discovered an issue with the way many web browsers and operating systems handle Proxy Auto-Config (PAC) files. PAC files are JavaScript code that tell the browser which proxy to use when trying to reach a particular URL. If an a...
by What is web development on Jul 29, 2016

High frequency security bug hunting: 120 days, 120 bugs

1) Intro & Motivations 2) Findings 3) Analysis 4) Methodology 5) Advice 6) Notable bug I: Second order subdomain/page takeovers 7) Notable bug II: DOM Based XSS via subtitle tracks 1) Intro & Motivations At the start of of this year, I set my...
by What is web development on Jul 29, 2016

Uber Hack lets anyone find Unlimited Promo Codes for Free Uber Rides

An Independent Security Researcher from Egypt has discovered a critical vulnerability in Uber app that could allow an attacker to brute force Uber promo code value and get valid codes with the high amount of up to $25,000 for more than one free rid...
by Tech Holics Blog on Jun 30, 2016

Researcher spots an ATM Skimmer while on vacation in Vienna

We have heard a lot about ATM skimmers, but it's nearly impossible to spot one.Some skimmers are designed to look exactly like the card slot on the original machine and attached to the front, and others are completely hidden inside the ATM.But, d...
by Tech Holics Blog on Jun 30, 2016

Dozens of Malicious Apps on Play Store can Root & Hack 90% of Android Devices

It's not at all surprising that the Google Play Store is surrounded by a large number of malicious apps that has the ability to gain users' attention into falling victim for one, but this time, it is even worse than most people realize.Resear...
by Tech Holics Blog on Jun 30, 2016

Global Terrorism Database Leaked! Reveals 2.2 Million Suspected Terrorists

A massive database of terrorists and "heightened-risk individuals and entities" containing more than 2.2 Million records has reportedly leaked online.Researcher Chris Vickery claimed on Reddit that he had managed to obtain a copy of 2014...
by Tech Holics Blog on Jun 30, 2016

135 Million Modems Open to Remote Factory Reset

More than 135 Million modems around the world are vulnerable to a flaw that can be exploited remotely to knock them offline by cutting off the Internet access.The simple and easily exploitable vulnerability has been uncovered in one of the most popul...
by Tech Holics Blog on Apr 10, 2016

Hacker reveals How to Bypass iPhone 6s Lock Screen Passcode

Apple gave you a reason to turn your Siri OFF.A critical security flaw in Apple's newest iPhones running the latest version of the iOS operating system allows anyone to bypass the phone's lockscreen and gain access to personal information.The...
by Tech Holics Blog on Apr 9, 2016

Steal Secret Encryption Keys from Android and iOS SmartPhones

Unlike desktops, your mobile devices carry all sorts of information from your personal emails to your sensitive financial details. And due to this, the hackers have shifted their interest to the mobile platform.Every week new exploits are discovered...
by Tech Holics Blog on Mar 11, 2016

Why being at the top of Hacker News doesn’t mean as much as I’d hoped

Exclusive vertical farming content delivered straight to you? Sign up here. It was 11:46 on a Thursday. A normal day at the office: bad posture despite the ergonomic chair, malfunctioning air conditioning, and me adding to a database on nanotechnolog...
by Pro Vertical Farm on Aug 21, 2015

G20 2014 cyber attacks traffic lights and wi-fi networks

Source Google ImageSpecialists warn that Australia will probably be at a heightened danger of cyber assaults next week when Brisbane hosts the G20 Leaders Summit.The Defence Department’s spy company, the Australian Alerts Directorate (ASD), has w...
by SSH And Proxy on May 9, 2015

Hacker Has Been Hack THE White House’s Computer

THE White House’s unclassified computer network was just lately breached by intruders, with reviews the Russian authorities could have been behind the act.“In the course of assessing current threats, we recognized exercise of concern on the uncla...
by SSH And Proxy on May 9, 2015

G20 2014 cyber attacks traffic lights and wi-fi networks

Source Google ImageSpecialists warn that Australia will probably be at a heightened danger of cyber assaults next week when Brisbane hosts the G20 Leaders Summit.The Defence Department’s spy company, the Australian Alerts Directorate (ASD), has w...
by SSH And Proxy on May 9, 2015

Hacker Has Been Hack THE White House’s Computer

THE White House’s unclassified computer network was just lately breached by intruders, with reviews the Russian authorities could have been behind the act.“In the course of assessing current threats, we recognized exercise of concern on the uncla...
by SSH And Proxy on May 9, 2015

StartJapan — Hacker News for Japan

“ StartJapan is a new community I recently set up to help hackers, designers, and entrepreneurs living in Japan connect with each other. And if you're living abroad but thinking about moving here, feel free to ask your questions about Japan's tech...
by Bir Fikrin mi Var on Apr 5, 2015

The News 2 — Product Hunt + Hacker News + Designer News

“ Hello everyone, super excited to launch the new version of TheNews. Now you can enjoy reading Product Hunt, Hacker News and Designer News side by side with the new design that I’ve worked on with @twnsndco. Don’t forget to adjust your columns...
by Bir Fikrin mi Var on Apr 2, 2015

Hacker News — precursor to Product Hunt

Discussion | Link...
by Bir Fikrin mi Var on Mar 23, 2015


Trending Topics

Close