Caution! NSA hacking tools for Windows are freely available

If te Windows you will do well to be careful in the next period. Hacking tools allegedly owned by the NSA that can break into Windows systems are freely circulating online by the notorious group Shadow Brokers.

For those who do not know, the team is alleged to have intercepted the tools from the NSA last summer. These tools can be used to violate almost all versions of Windows, except maybe Windows 10.NSA

On the other hand, the leak seems to include exploits that can bypass it 10 although the majority of hacking tools are designed for older versions of the operating system such as Windows XP, Windows 7 and Windows 8.1. There are also many hacking tools for Windows Server editions.

Microsoft is yet to issue any announcement yet as the leak happened on of the weekend and the Easter holidays. This has put millions of Windows users at risk.

Security experts warn that with these hacking tools available online, the number of attacks targeting Windows systems will skyrocket over the weekend, mainly because even novice hackers will be able to violate their operating systems Microsoft.

O also confirmed the leak, explaining that "NSA exploits affecting many fully updated Windows systems are freely circulating."

Let's mention its tools NSAs had already been published but were encrypted. The απλά υπενθύμισαν το of the EQGRP-Auction-Files file and provided the decryption code: CrDj"(;Va.*NdlnzB9M?@K2)#>deB7mN

iGuRu.gr The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive notifications of new by email.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).