Unlock Netflix’s hidden categories with these secret codes

Here’s a trick that’s been around for a while but may have passed you by: secret category codes added by Netflix engineers that can help you narrow down your on-demand video choices. From classic war movies to Brazilian dramas, here’s how to dig deeper into the Netflix library. Whenever you dive into a genre on […]

Authors digitally signed Spymel Trojan to evade detection

Zscaler ThreatLabZ detected a new infostealer malware family dubbed Spymel that uses stolen certificates to evade detection. In late December, security experts at Zscaler ThreatLabZ detected a new infostealer malware family dubbed Spymel that uses stolen certificates to evade detection. “ThreatLabZ came across yet another malware family where the authors are using compromised digital certificates to evade detection. The malware family in […]

ISIS Terrorists Kill Female Journalist, Hack Facebook Account

The terrorists first murdered the female journalist Ruqia Hassan and then hacked her Facebook account to spy on her contacts. The terrorist from Daesh/ISIS terrorist hacked into the Facebook account of a female journalist (Ruqia Hassan) whose execution was kept secret by the group for 3 months to gain information on her friends and colleague through her […]

Anti-NSA Blackphone Not So Secure After all

A security flaw in Blackphone 1 smartphone allowed anyone to take control of the device Blackphone 1 smartphones, one of many privacy-focused phones in the market was found to have a critical vulnerability which allowed attackers to hijack the phone until a recent fix from the manufacturer. The flaw was discovered by a team of […]

11 Top Technology Predictions For 2016 | fossBytes

Short Bytes: Technologies like IOT, 3D printing, VR camera and Tesla skimmed through entire 2015. But which technology in 2016 is going to make the cut, it has to be seen. See our list of technology predictions for 2016 based upon our in-house research and analysis of current trends. It’s very hard to predict the […]

FBI Hacked Tor To Hunt Down Paedophiles On The Deep Web

FBI has taken down a site involved in Child pornography through some hacking techniques that have never been used in the history of the law enforcement. In October last year, FBI hacked Tor browser and caught thousands of paedophiles. Now, a website by the name of “Playpen” registered in August 2014 for the purpose of […]

Windows 10 usage stats show user privacy is a very real concern

Microsoft has released stats regarding Windows 10 usage worldwide which proves the point that user privacy is a very real concern Although, Windows 10 has been surrounded by controversies since its launch, it’s quickly becoming one of the most used operating systems today. The reason behind this increase in popularity is not the operating system […]

One Javascript Tip A Day, Keeps Code Bugs Away

Short Bytes: In this article, I bring to you a new project called Javascript Tips that promises to deliver you one Javascript tip per day. This project is started by Joel Lovera from Córdoba and he’s right on track from day 1. So, I was having my daily dose of Reddit and I stumbled upon something amazing. I […]

Should I stay or should I go … to Windows 10?

It has been almost half a year since Microsoft released Windows 10, and the decision whether or not to migrate computers to this latest release of Microsoft’s flagship operating system is going to be on the minds of administrators for 2016, says ESET’s Aryeh Goretsky.

Remote Exploitation of Microsoft Office DLL Hijacking (MS15-132) via Browsers

A number of weeks back, security researcher Parvez Anwar posted a number of DLL hijacking vulnerabilities within Microsoft Office on Twitter [1]. The following week, Microsoft released MS15-132, which addressed some of these vulnerabilities, along with a large number of very similar bugs reported by others in various guises. [2] [3]. The vulnerabilities that were […]

CES 2016: Day 1 – surviving the swarm

As ever, ESET is once again in attendance at CES in Las Vegas, offering you expert insight into all the security aspects of this year’s show, which, from what have seen so far, is a key focus for CES in 2016.

Let’s Encrypt Now Being Abused By Malvertisers

Encrypting all HTTP traffic has long been considered a key security goal, but there have been two key obstacles to this. First, certificates are not free and many owners are unwilling to pay; secondly the certificates themselves are not always something that could be set up by a site owner. The Let’s Encrypt project was […]

How Hackers Invaded 30 Million Web Servers On The Internet With A Poem

Short Bytes: From an IP address associated with 32nd Chaos Communication Congress (32c3) taking place in Germany, some unknown hackers sent a poetic message to all the IPv4 addresses on the Internet who left with their web servers port open. Later, the hackers said that they didn’t mean to harm anybody and wished to remind […]

Severe Silent Circle Blackphone vulnerability lets hackers take over

The security-focused smartphone contained vulnerabilities which allow hackers to control the device’s modem and call functions. Researchers have revealed a severe vulnerability in Silent Circle’s Blackphone which could allow attackers to take control of the device’s functions. Silent Circle’s Blackphone, born after former US National Security Agency (NSA) contractor Edward Snowden exposed the intelligence agency’s spying […]

Windows and Linux Malware Linked to Chinese DDoS Tool

Malware was infecting machines, adding them to its botnet.Similar-looking malware targeting both Linux and Windows computers has been linked to a DDoSing toolkit sold by Chinese hackers via the ddos[.]tf service, Malware Must Die! reports. The malware, codenamed Linux/DDOSTF (or Linux/MrBlack) targets mainly Linux machines running Elasticsearch servers, but also attacks and infects Windows systems, […]

TOR Anonymity: Things Not To Do While Using TOR

Short Bytes: Being Anonymous online is the need of the hour, and TOR browser does that job quite efficiently and honestly. But there are some things that you need to keep in mind so that you don’t blow your anonymity cover while using the TOR network.  The internet is awe-inspiring, but it has its nightmares for […]

Exploit Flash Heap Isolation for a chance to “win” $100,000

Exploit Flash Heap Isolation for a chance to “win” $100,000 If you can exploit Adobe’s Heap Isolation mitigation in Flash player version 18.0.0209 – a mechanism deployed to patch the User-After-Free (UAF) vulnerabilities – you’re in for a sweet treat: Zerodium will, in fact, pay you good money. The startup, founded by Vupen, Chaouki Bekrar’s […]

Google fixes vulnerabilities in Android where rooting is a double-edge sword

Google had to intervene to fix a few vulnerabilities that risked exposing its Nexus devices and related Android operating system to remote access – or through malware – by hackers. The tech firm has actually been working on media file related software bugs in Android OS since July last year when Stagefright – a media-parsing […]