I saw websites offering “hacker hiring” services via the Tor browser. A cybersecurity expert YouTuber said that some of these “hire-a-hacker” sites are real. They claim to do things like hacking phones or stealing social media accounts. So how is that even possible? Imagine you pay them to hack a phone. How could they locate the target phone? Let’s say they do find the target—how can they hack it remotely, from miles away, without social engineering?
[link] [comments]
from hacking: security in practice https://ift.tt/O9wXTPt
Comments
Post a Comment