Skip to content
greennortherner

greennortherner

greennortherner

  • dark web
  • Hidden network
  • Anonymity Online
  • Security
  • Helpful
  • News
  • Contact

Author: greennortherner

Why is Facebook user data leakage so dangerous and how to find out if your account has been stolen 6.4

Why is Facebook user data leakage so dangerous and how to find out if your account has been stolen 6.4

By greennortherner December 16, 2022

In recent weeks, the Internet has been full of reports of personal data leaks again, and this time everything is bigger than ever: Facebook has failed to protect more than […]

Read More
“Apple” smartphones are hacked all over the world

“Apple” smartphones are hacked all over the world

By greennortherner December 4, 2022

Owners of iPhones and iPads have faced cases of their devices being blocked by intruders. Has the hacker attack already reached our country ? last week, several cases were recorded […]

Read More
Hackers threatened family members of Sony Pictures employees

Hackers threatened family members of Sony Pictures employees

By greennortherner December 3, 2022

It is reported that hackers sent Sony Pictures employees letters threatening their family members. The attackers call themselves “Guardians of Peace”. The hacking of the Sony Pictures Entertainment website occurred […]

Read More
The Rowhammer attack was adapted to virtual machines

The Rowhammer attack was adapted to virtual machines

By greennortherner December 2, 2022

Dutch cybersecurity experts have developed a new technique for hacking a cloud virtual machine, which allows you to get full access to it using data deduplication. This is reported on […]

Read More
A way to hack a phone using sound is proposed

A way to hack a phone using sound is proposed

By greennortherner December 1, 2022

  A group of researchers from Lancaster University showed how to use the microphone and speaker of a smartphone on Andriod in order to steal a graphic key. Android smartphones […]

Read More

Recent Posts

  • Why is Facebook user data leakage so dangerous and how to find out if your account has been stolen 6.4
  • “Apple” smartphones are hacked all over the world
  • Hackers threatened family members of Sony Pictures employees
  • The Rowhammer attack was adapted to virtual machines
  • A way to hack a phone using sound is proposed

Categories

  • Anonymity Online
  • Helpful
  • Hidden network
  • News
  • Security

Archives

  • December 2022
Copyright © All rights reserved.