Internet Security Blog - Hackology

[Video] Hackers Steal Tesla Model S using a Relay Attack

A car theft was caught on a security cam, which was no ordinary theft as car-jackers used Relay Attack on a Tesla vehicle to unlock the car and drive it away, the complete attack is clearly visible although thief had a hard time unlocking the...

Why your Birth Date is Important to HACKERS?

Even today, several online services ask users to submit important personal data such as their birth dates. This may be done for keeping records, for ensuring that a user is above a certain age or simply for a user’s verification. Considering that...

PITB Leaks: NADRA Database of 200M User Hacked

Biggest information breach in the history of Pakistan In November 2011, Mr. Umar Saif took the charge of chairman PITB (Pakistan Information Technology Board) with a vision that he bring about a digital revolution in Punjab. As a result decades old...

Category - Hacking

In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term hacking historically referred to constructive, clever technical work that was not necessarily related to computer systems.

Pin It on Pinterest