Windows exploitation in 2015

Hacking Team exploits and new security features in Google Chrome and Microsoft Edge are just a few of the highlights of ESET’s annual Windows exploitation in 2015 report.

Lakka Is A Linux OS That Converts Any Computer Into A Gaming Console

Short Bytes: Lakka is a lightweight Linux distribution for converting any computer into a full-fledged retro gaming console. Based on OpenELEC and RetroArch, it supports a large variety of computer boards. It’s time to go to your basement, clean your dusty old PC and make it ready for something fun. Using the lightweight Linux distro Lakka, […]

GNU Emacs Tutorial: How To Edit A File (Cheat Sheet Included)

Short Bytes: Do you want to learn the basics of Emacs text editor? Well, here is a basic tutorial for you to get started. For those who don’t know, GNU Emacs is a widely popular text editor that comes with a wide range of functionality. I‘ve recently started learning Emacs, and in this post, I will be […]

This New Crashsafari.com Bug Can Crash Anyone’s Smartphone And Computer

Image | Apple Short Bytes: After the mischievous 16-character Google Chrome bug, it’s time to bear the nonsense of crashsafari.com bug. This prank website forces your iPhone to reboot and causes other smartphone and desktop browsers to hang. You are advised to take extra care as it’s being spread on social media via shortened links. […]

Avoid Clicking CrashSafari.com! It Crashes Android, iOS Devices + Web Browsers

Some trolls have been using short URLs to trick users into clicking the link CrashSafari.com that crashes and reboots Android, iOS devices and web browsers — So DON’T FALL FOR IT. Remember last year’s bug that crashed Apple Watch, iPhone and iPads? Well, a similar bug is back but it requires you to click a website link […]

Hacker Claims Breaching FBI Server, Exposes Details of 80 Miami Police Officers

A hacker linked with the ”Cracka with Attitude” group claims to hack FBI’s service and steal personal information of over 80 Miami Police Officers.  A hacker, who has dubbed himself as Lorde Bashtien, has managed to hack the servers of the Federal Bureau of Investigation (FBI) and obtained data of over 80 police officers. The officers […]

41 Toughest Google Job Interview Questions

Short Bytes: What are the toughest questions asked at Google’s job interviews? To give you an idea about how things proceed during a Google interview, we have brought a collection of 41 toughest questions that Google asks.  It’s not a hidden fact that Google asks mind-bending questions at job interviews. These questions are asked to […]

Skype Issues New Update to Hide IP addresses Automatically

Skype finds cure to Online Harassment- Releases new Update to Hide IP addresses automatically In 2015, we reported that scammers/predators are tricking users (mostly males) into extorting money via online video chat on Skype and other chatting software but Microsoft had pledged to offer maximum protection to its users and seems like this year the techno-giant is all […]

The Anonymous Group: What is it and How big is it

Research proved that Anonymous hacktivists group is relatively much bigger than you anticipated and become quite popular among people all over the world but how did it all start? The Anonymous group has been gaining a lot of attention in the past few years. This is mainly due to the way they act and the way they […]

Simple Yet Efficient Linux Backdoor Trojan Discovered

Linux. BackDoor.Xunpes trojan lets cyber-crooks take control and execute commands on your Linux machine. Threats to Linux computers are now appearing on a regular basis, and what was once dubbed a “no-virus zone” has started being targeted by malware authors. The latest of such threats is a trojan with backdoor capabilities named Linux.BackDoor.Xunpes, discovered by Dr.Web security […]

OpKillingBay – Anonymous shut down Japanese airport site to protest against slaughter of Dolphin

OpKillingBay – A group of hackers linked to the Anonymous collective shut down the Japanese Airport Website to protest against the slaughter of Dolphin. The collective Anonymous has launched a DDoS attack that shut down the Website of the Japanese Narita International Airport on Friday night (at around 9:30 p.m) until Saturday (around 1 a.m). The attack has been confirmed by the […]

JavaScript Backdoor

Casey Smith recently shared his research on twitter, which is to reverse HTTP Shell by using JavaScript. I found it rather interesting and further analyzed this technique. 0x01 Introduction Observing the above screenshot, we’ll learn how to use this technique. Use rundll32.exe to load the JavaScript code in cmd and a HTTP Shell is returned […]

10 Most Common Mistakes Every Beginner Java Programmer Makes

Short Bytes: According to you, which is the most common mistake every beginner makes while coding in Java programming language? Well, there are some basic coding mistakes that people make again and again. Know how to spot them and improve your coding skills. Since its advent in 1995, Java has been changing our lives and […]

Apple Can Still See Your iMessages If You Enable iCloud

Apple has taken a strong stance on privacy ever since the FBI began loudly demanding encryption backdoors into its products. The company’s statements about its iMessage service seem plain as day: Apple can’t read messages sent between Apple devices because they’re encrypted end-to-end, decipherable only by you and the intended recipient. “If the government laid […]

This TorFlow Map Shows How TOR’s Data Looks As It Flows All Around The World

Short Bytes: Using the publicly available data, data visualization software firm Uncharted has prepared TorFlow — a map for visualizing how TOR’s data looks as it flows all across the world. It shows TOR network’s node and data movements based on the IP addresses of relays bouncing around the connections of users to avoid spying. TOR […]

EDA2 Open-Source Ransomware Code Used in Real-Life Attacks

Another educational open-source ransomware project goes bad. Cyber-crooks have used the open-source code of the EDA2 ransomware to create the Magic ransomware strain, which has been spotted in real-life attacks against users in the past few days. This is the second time this happens, after the open-sourced code of the Hidden Tear ransomware was also […]

Anonymous Shut Down Japanese Airport Website Against Dolphin Slaughter

Anonymous hackers shut down Japan’s Narita International Airport website against Dolphin slaughter. The online hacktivist Anonymous conducted a powerful DDoS attack on the official website of Narita International Airport of Japan disrupting the service on Friday night to Saturday. The local police and airport authorities have confirmed the attack and stated that a series of DDoS forced the site […]

FBI Randomly Used Malware on TORMail Users While Busting Pedophiles

Report Hints on Possible Invading of TORMail users Privacy for Capturing Global Child Porn Gang by the FBI In 2013, the Federal Bureau of Investigation seized one of the most popular dark web email platform called TorMail and soon after the department began to rifle through the contents of the server. Back then, the researchers […]

John McAfee: “Obama Administration Doesn’t Know The Meaning Of Privacy”

Short Bytes: The maker of McAfee antivirus and privacy advocate John McAfee is again in the headlines. In his latest op-ed, he stresses upon the need of encryption, calling it a necessity. Bashing the governments who demand restrictions on encryption measures, he says that Obama administration lacks the real understanding of privacy. John McAfee, the most […]

5 Tools to protect your Social Media accounts

You should have these five tools to protect your Facebook, Twitter, LinkedIn and other social media accounts Social media has taken the world by storm through dozens of websites, mobile apps, and other forms of technologies improving the way people communicate with each other. There are social media sites that have millions of members allowing […]