HackRead - Security is a Myth # Around the Web

HackRead is your gateway to the world of the Internet that centers on Technology, Security, Privacy, Surveillance, Cyber warfare, Cybercrime and first hand Hacking News, with full-scale reviews on Social Media Platforms. We are a leading, reliable and authentic news source for core topics related to Technology, InfoSec, Cyber Security, Warfare, and Hacking.

16-year old compromised Apple networks to steal GBs of sensitive data

By Waqas Generally, Apple Inc. is believed to be very strict and reliable in matters pertaining to cyber-security. Its servers are regarded as virtually unhackable. Perhaps, (...)

17 August
Instagram acknowledges & addresses hacking spree against user accounts

By Carolina If you are unable to access your Instagram account, then it is quite possible that your account has been hijacked. Reportedly, in the past few days, hundreds of (...)

16 August
Ex-NSA hacker proves how easily macOS user warnings can be bypassed by malware

By Uzair Amir Apple is generally considered reliable in making safe and secure software. It is widely believed that the company works really hard to make the defense (...)

16 August
New Intel chip flaw “Foreshadow” attacks SGX technology to extract sensitive data

By Waqas Security fraternity is still dealing with the adverse consequences and versatile range of threats caused by the Spectre and Meltdown vulnerabilities. But, to add to (...)

15 August
Millions of Android Devices At Risk of Man-in-the-disk Attack

By Waqas Thanks to Ignorant App Developers At Defcon 2018, we have so far witnessed many innovative forms of compromising devices including electoral voting machines. (...)

14 August
Faxploit: Hackers can use Fax machines to inject malware into a targeted network

By Waqas Think twice before sharing your fax number with someone. Many corporations provide their fax number in the contact information page on the websites. After all, it is (...)

14 August
Defcon: 11-year-old modifies Florida Presidential voting results

By Waqas At the largest hacking conference in the world, Defcon 2018, there have been many surprising discoveries. However, the news that has shocked the United States is the (...)

13 August
Hackers can manipulate Police body cam footages

By Waqas Kiss goodbye to crucial evidence. Body cameras used by the law enforcement nowadays have already remained controversial but no one has, so far, attempted to assess (...)

13 August
PGA Golf Championship hit with Bitcoin ransomware

By Waqas Hackers Demand Ransom to Unlock Hijacked Files of Upcoming PGA Golf Championship. Hackers seem to have a penchant for targeting high-profile events. After (...)

10 August
Sensitive data on 31,000 GoDaddy servers exposed online

By Waqas All thanks to Unsecure AWS S3 Bucket. GoDaddy is the latest victim of cybercriminals and has joined the league of companies that got confidential data leaked due to (...)

10 August

Latest articles

Barrett Brown's criticisms of Julian Assange are valid

Barrett Brown’s criticisms of Julian Assange are valid

A message from the Jeremy Hammond Defense Committee. Dear Courage Foundation: As an org that seeks to defend and protect whistleblowers and champion the rights of free (...)


Barrett Brown's statement about Julian Assange

Barrett Brown’s statement about Julian Assange

Regarding my banishment from the Courage Foundation at the behest of Julian Assange. This is the full statement I provided to The Daily Beast on the matter of the board of (...)


Naomi Colvin: I have been obliged to resign from Courage

Naomi Colvin: I have been obliged to resign from Courage

Naomi Colvin: “rather unfortunately, I have been obliged to resign from Courage.” On Thursday afternoon three of Courage’s trustees wrote to me demanding that I inform Barrett (...)


The Circle Of HOPE - A Hacker's Dozen

The Circle Of HOPE - A Hacker’s Dozen

Hacking Extradition: Fighting the Long Arm of U.S. Law (July 20th-22nd New York City). Speakers: Nathan Fuller, Grace North, Lauri Love, Barrett Brown. The United States (...)


Join the resistance

Tor hidden-service - IRC.CyberGuerrilla

Tor Socks5: 9050 - Host: 6dvj6v5imhny3anf.onion - Port: 6697 - SSL
Webchat #OpNewBlood
Tor protects your privacy - Tor Browser is an easy-to-use, portable package of Tor. By downloading and using Tor, you can protect the people who need anonymity, like activists, journalists and bloggers...

Anonymous t-shirt

T-Shirt and Hooded Jacket
T-Shirt and Hooded Jacket
Tails
Tails is an irreplaceable security tool as it allows anyone to use computers safely
Tor Browser
Tor Browser
Tor protects your privacy
NordVPN
NordVPN
Protect your privacy

Secure your Internet Connection.

Read more Close