Caution! NSA hacking tools for Windows are freely available

If you use Windows well you will be careful in the next time. Hacking tools alleged to belong to the NSA and can violate Windows systems are freely available on the internet by the infamous group Shadow Brokers.

For those who do not know, the team is alleged to have intercepted the tools from the NSA last summer. These tools can be used to violate almost all versions of Windows, except maybe Windows 10.NSA

On the other hand, data leakage seems to include exploits that can bypass Windows 10 security, although the majority of hacking tools have been designed for older versions of the operating system, such as Windows XP, Windows 7, and Windows 8.1. There are also many hacking tools for versions of Windows Server.

Microsoft has not yet released any announcement as the leak occurred during the weekend and Easter holidays. As a result, millions of Windows users are at risk.

Security experts warn that with these hacking tools available online, the number of attacks targeting Windows systems will skyrocket over the weekend, mainly because even novice hackers will be able to violate their operating systems Microsoft.

Edward Snowden also confirmed the leak, explaining that "NSA exploits affect many fully updated Windows systems that circulate freely."

Let's mention its tools NSAs had already been published but were encrypted. The Shadow Brokers simply recalled the file name EQGRP-Auction-Files and provided the code froms: CrDj"(;Va.*NdlnzB9M?@K2)#>deB7mN The Best Technology Site in Greecefgns

Subscribe to Blog via

Subscribe to this blog and receive notifications of new posts by email.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).