Google Appoints VMware co-founder to Charge Up Cloud Ventures

Diane Greene, well-known tech expert and co-founder of  VMware, is now senior the vice president for Google’s enterprise businesses. The New York Times reported that Google has also acquired Bebop Technologies, Greene’s startup and pioneer in cloud technology. Ms. Greene, is a graduate of Massachusetts Institute of Technology and UC Berkeley and is one of […]

Dell, The Latest in The List of Pre-Rooted PC and Laptop Sellers

Dell is found to be shipping laptops having eDellRoot certificate installed by default. The certificate is through trusted but has all the permissions. Shipping laptops with pre-installed stuff is nothing new; Lenovo has been shipping laptops having pre-installed bloatware. Now, a user on twitter (Joe Nord) recently ordered a new Dell laptop and tweeted screenshot […]

Anonymous Now Plans to Start Offensive Hacking To Kill ISIS Online

Short Bytes: After facing backlash over the “wildly inaccurate” accounts reported to Twitter, Anonymous has decided to switch to their area of expertise i.e hacking websites and DDoSing them. Read ahead to know more about their plan of “Rickrolling” ISIS’ online presence. After targeting ISIS Twitter handles, Anonymous hackers are now using a new weapon […]

GlassRAT Zero-Detection Trojan Targets Chinese Nationals

A previously undetectable remote administration tool has been uncovered, dubbed “GlassRAT” The zero-detection Trojan appears to have operated stealthily for three years, according to RSA, and evidence suggests it is being used as part of a very targeted campaign, focused on Chinese nationals in commercial organizations. GlassRAT employs many of the telltale signs of good, at […]

Catching Up With The ‘EITest’ Compromise, A Year Later

We are seeing dozens of WordPress sites compromised recently with the same malicious code redirecting to the Angler exploit kit. The attack involves conditionally embedded large snippets of code at the bottom of the sites’ source page. It is important to stress this is a conditional injection because webmasters trying to identify the issue may not see it […]

Documents demonstrate NSA continued mass surveillance

Newly disclosed documents show that the NSA had found a way to continue spying on American citizens’ email traffic from overseas. The NSA continued to spy on the email messages of Americans, once again the US government has conducted a massive surveillance on the US soil. To curb internal law the US intelligence has is […]

Researchers Find Multiple Chrome Extensions Secretly Tracking Users

Hidden analytics code tracks everything users do, EVERYTHING Analytics code deeply hidden in popular Google Chrome extensions is being used to track users across the Web, in different browser tabs, and without user consent. Swedish company Detectify Labs made this discovery, and its researchers are pointing the finger at popular extensions like HooverZoom, SpeakIt, ProxFlow, […]

Dell does a Superfish, ships PCs with easily cloneable root certificates

Root certificate debacle that hit Lenovo now visits the House of Dell. In a move eerily similar to the Superfish debacle that visited Lenovo in February, Dell is shipping computers that come preinstalled with a digital certificate that makes it easy for attackers to cryptographically impersonate Google, Bank of America, and any other HTTPS-protected website. […]

This Group Spies on ISIS Rather Than Exposing Twitter Handles

The readers know about Anonymous waging war against ISIS, but hardly anyone knows about a group which has been working quietly (well, sort of) against the terror group and claims to have averted least one terror attack from ISIS. Anonymous has been largely involved in identifying and taking down of ISIS member accounts, but this […]

Anti-NSA Phone Developers Vow to Keep Their Product Away From Terrorists

Silent Circle, the developer of the self-proclaimed NSA-proof smartphone has announced that it is making sure to distances itself from criminals and terrorists like the ISIS. The rapid rise in surveillance and spying from governments and hacking groups challenged IT professionals to come up with solutions that can restrict all this stuff and keep cyberspace safe. […]

ISIS Moving To The Dark Web To Escape Hackers And Spread Its Message

Short Bytes: In order to protect its online operations from security agencies and hackers, and to propel its propaganda, ISIS is looking to find shelter in the Dark Web. It should be noted after the recent attacks on Paris, the terrorist group is facing more surveillance and cyberattacks. The Islamic State terrorists are learning new […]

ISIS Releases Another Kill List of US Military and Security Officials

ISIS has unveiled list of U.S. officials who are on their target — The list includes names of both current and former government officials and military personnel. Late on Saturday, a group of hackers calling themselves “Islamic State Cyber Army,” unveiled a list of officials who are either currently working for or have in past […]

‘Spying’ on Islamic State instead of hacking them

In the wake of the Paris attacks, the vigilante hacker group Anonymous has declared war on so-called Islamic State using the internet and claims to haveshut thousands of Twitter accounts used by IS operatives. But a much smaller online group has also emerged, with quite a different strategy – and they claim they’ve already thwarted […]

Here’s the ISIS OPSEC Manual Used to Train Recruits About Cyber-Security

ISIS hijacks Kuwait security firm’s OPSEC manual.Yesterday, various Twitter accounts were tweeting about an ISIS OPSEC manual describing the terrorist group’s cyber-security practices. The document, embedded below in a translated form, details various techniques recommended by the group to its new recruits. While initially we thought the ISIS OPSEC manual was uncovered by the recent […]

Hacking and exploiting Active Directory Permissions

PowerView is a PowerShell tool to achieve network information on Windows domains for cyber security services and ethical hacking training professionals. It implements diverse practical meta-functions, including some user-hunting functions which will discover where in the network explicit users are logged in. It can also find which machines in the domain network the user has […]

Researchers say they’ve cracked the secret of the Sony Pictures hack

Log wipers, timestompers may have helped hackers stay quiet in terabyte raids. Damballa researchers Willis McDonald and Loucif Kharouni say the attackers who flayed Sony Pictures with disk-cleansing malware may have stayed hidden using newly-uncovered anti-forensics tools. The pair found the updated weaponry in the latest version of the Destover malware, best known as the […]