SimJacker Hack Grants Access to Any Smartphone with SMS Message

Cybersecurity researchers from AdaptiveMobile have found out that SimJacker poses a massive vulnerability in any SIM card on the planet. This opening can be exploited by hackers who could potentially compromise any smart device by sending an SMS.

Simjacker Hack Trick

The SimJacker vulnerability is located at S@T, the SIM alliance Toolbox. This browser’s dynamic SIM utility is equipped in the SIM cards used by service providers in at least 30 countries. The security experts also found that the vulnerability could be used to gain access to any smart device regardless of the brand or model of the user.

One of the most disturbing finds about this investigation is that other private surveillance firms learned about the flaw since it was (more…)

InstaRipper – App That Allows You to Effectively Hack Instagram Account

Instagram Hacking TechnologyHave you have ever dealt with Instagram and their support team when you lose access to your account? If you have, you probably have an idea of how frustrating it is to get it back. Better than dealing with those slowpokes is to hack that thing by yourself! InstaRipper is the way to go, and we are going to tell you how it works right away.

The full tutorial which includes some other methods too, can be found at their website. Link:

According to the developing team of InstaRipper, the app is meant to be used to get access to your personal account if you lose the password. They have a important (more…)

Ethical Hackers Teaches How Easy is to Hack Instagram Accounts

Laxman Muthiyah is a whitehack hacker. A programmer who uses his skills to find failures in the original code of security programs. His kind is also refereed as ethical hackers at times. Facebook recently awarded him $10,000 because he discovered a critical vulnerability that could have been used by potential attackers to break into people’s private Instagram accounts.

Hacking Instagram Accounts

The findings of Muthiyah revealed a failure on Instagram’s password recovery process used on smart devices. Specifically, the procedure that asked for a six-digit code confirmation from the users to change the password. It wasn’t that (more…)

A New Problem Has Surfaced with Telegram’s Privacy Features

A security expert has found out that abusing the delete feature on the message feed of any conversation log on Telegram, threatens the privacy of the user. Apparently is not so much a security issue per-se since the problem is more akin to a privacy issue. The whole motif of Telegram is based on privacy, and with ten million-plus downloads from the Android Play-store, users want some answers.

Telegram Privacy Hack

The glitch, as detected, seems to work like this: It takes place when we delete messages from the log of a conversation. Either because it was sent by mistake or because we mistimed our writing. After the message is sent to the recipient and deleted, the original text still remains in the internal log of the user located at /Telegram/Telegram Images/path.

The Presence of the Issue and Short Term Visible Effects

The glitch being discussed becomes highly problematic in if we belong in any of Telegram’s super communities. It all begins if you are in a (more…)

NetCAT Hack Grants Attackers Access to Sensitive Data from Intel

A team of researchers from VUSec Group in the Vrije Universiteit in Amsterdam have found out a new weakness that could be exploited by remote attackers who are looking to get sensitive information by setting a side-channel attack over a network. The experts discovered this flaw and nicknamed it NetCAT (Network Cache Attack). It can do a great deal of damage to all of Intel server-grade processors, as they get sensitive data sniffed from their networks.

The weakness was tracked and labeled as CVE-2019-11184. It’s located in the performance optimization feature named DDIO (Data-Direct I/O). This is a feature that was created to offer access to CPU cache to network devices and external peripherals.

The team intended to show that NetCAT is a threat that extends to several clients not worthy of trust on the network. They can leak sensitive data such as keystrokes in an SSH session on a remote server with no local access. The cause of (more…)