The art of Phishing Attacks

The art of Phishing Attacks.

3/22/2012

Taliban splinter cell training army of Sasquatch

News reports are flooding in regarding a rogue Taliban splinter cell who is training an army of Sasquatch. this has created a backlash of angry mothers using social media tools like Twitter and Google+. Most comments are angry over the fact that most Sasquatch are babies. while they are 12 feet tall, they only have the equivalent mindset of a 10 year old Canadian child, and are mostly just playful rather than vicious and dangerous. this raises...

3/21/2012

True story about the CubeCart Hack

For those of you following the CubeCart Hack that has left roughly 64,000 ecommerce businesses open to full database leaks, including personal details like credit card data. It was not my intention to publish intimate the details of this case to the world as the truth will very likely create ripples through the shopping cart vendor CubeCart. We have made multiple requests to contact us regarding this issue, all of which had been received, but...

3/20/2012

Anonymous Hackers turn Remote Viewers into Weapons

Anonymous Hackers are having a difficult time working alone after the recent FBI raid that left core members behind bars. most are confused as to what direction they should go, who they should attack, and who will teach them the skills to gain access to systems with secure passwords.After many ideas were passed around, a hacker that assisted wikileaks who goes by the name as b1gmonieZ came up with a unique solution to the problem. he suggested...

3/04/2012

Anonymous Hackers Discuss total Satellite Takeover

Anonymous Hackers discussed what to do with information obtained from NASA computer systems after they were able to gain access to sensitive information. the hackers now have the ability to access communication systems that control most satellite systems for broadcast media, weather, and military equipment. Some ideas were shuffled around as to crash them all into the lower earth atmosphere and let them burn up, other ideas were to ram them...

3/01/2012

Operation Sticky Fingers takes down Anonymous Wannabe Hackers

How did we catch us some dirty would be hackers? To catch a would be Anonymous Hacker is not very difficult. first you need an idea on what you are targeting. lets take the #interpol attack for example. we first setup a virtual linux server on the cloud that would be ready for the job of being a trap.  we went to work throwing together a very simple html page, with a php script that records the ip to file. nothing more, nothing less. On...