Microsoft Open Sources Visual Studio Code, Supports Linux App Debugging

Short Bytes: Microsoft has made tons of announcements and launches at its Connect(); Developers Conference 2015. The company has open sourced its Visual Studio Code and released a new and free program for developers called Visual Studio Dev Essential. At its Connect(); Developers Conference 2015 in New York City, Microsoft had a lot to share. The company […]

How to Hack ISIS

Encouraging the people to join the cyber-war against ISIS, hacktivist group Anonymous has published three hacking guides. These guides have instructions regarding recognizing ISIS-affiliated websites, using a Twitter bot to uncover social media accounts of ISIS, and learning how to hack using a “NoobGuide”  The war between the hackers and terrorists is escalating quickly in […]

Birds of a feather code together

Lysa Myers, a security researcher at ESET, looks at the diversity challenges and opportunities in information security – while there is much to be done, there’s a lot to be optimistic about she says.

CloudFlare CEO Denies Anonymous’ allegation of protecting ISIS sites

In a reaction to Paris Attacks last Friday, Anonymous declared a war against the ISIS on Monday and were determined to knock ISIS-linked sites and hack their social media accounts which are a big medium of spreading their false ideology and of choosing their sympathizers to spread it. While fighting this war, the Anonymous yesterday […]

Seized: Fake EFF .org linked to hackers hitting NATO, White House PCs

Digital rights group takes down Pawn Storm base. The (EFF) has been awarded control of its namesake domain, which was being used to install malware on people’s computers. The EFF used the official uniform dispute resolution process (UDRP) run by UN agency WIPO to take control of ElectronicFrontierFoundation.org – the EFF’s real website is at […]

5 Most Useless Yet Awesome Inventions Ever

Short Bytes: Ever came across a creative invention and questioned its use? Well, you are at the right place as we have brought to you the 5 most useless yet awesome inventions ever. There is a great story behind every useful invention and every time it’s somehow related to a human need that inspired that […]

Why Algebraic Eraser may be the riskiest cryptosystem you’ve never heard of

A potential standard for securing network-connected pacemakers, automobiles, and other lightweight devices has suffered a potentially game-over setback after researchers developed a practical attack that obtains its secret cryptographic key. Known as Algebraic Eraser, the scheme is a patented way to establish public encryption keys without overtaxing the limited amounts of memory and computational resources […]

Anonymous Publishes Three Guides To Teach You “How To Hack” And Fight ISIS

Short Bytes: Encouraging the people to join the cyber-war against ISIS, hacktivist group Anonymous has published three hacking guides. These guides have instructions regarding recognizing ISIS-affiliated websites, using a Twitter bot to uncover social media accounts of ISIS, and learning how to hack using a “NoobGuide”  The war between the hackers and terrorists is escalating […]

French Blogger Accuses Anonymous of Impeding Police in Fight Against ISIS

Anonymous has declared full-time war against ISIS and warned the terrorist group to expect the worse. In a recent video, they left a message for ISIS “You should know that we will find you and we will not let you go under #OpISIS.” The operation has become a success among followers of the Anonymous group but […]

Gmail to Alert Users Upon Receiving Unencrypted Messages

Google has decided to tighten up those loose strings that hinder their efforts to offer comprehensive protection to its users against internet attacks and phish campaigns. In this regard, Google has added a new feature to Gmail, which will notify you whenever an unencrypted email lands into your inbox. This new feature is aimed at […]

ISIS Calls Anonymous Hackers “Idiots” For Declaring War

Short Bytes: ISIS has responded to Anonymous’ declaration of war and threat of hunting them down from all over the world. The terrorist group has referred to them as “idiots” who just hack “twitter accounts and emails.” In a development in the hackers vs. terrorists story, the terrorists have labeled the hackers as ‘idiots.’ Yes, […]

Why Is Edward Snowden Being Blamed For Paris Attacks

Short Bytes: The security agencies have accused the NSA whistle blower Edward Snowden for the terrorist happenings in the city of Paris. CIA Director John Brennan and ex-CIA director James Woosley, blamed the failure on “a number of unauthorized disclosures” and the attacks on Edward Snowden. The dust from the bomb attacking in the city […]

Researcher Claims Dark Web is the next safe haven for the ISIS

Al-Hayat, an agency that spreads all the content relevant to ISIS on different online platforms has announced the ISIS intentions on moving their operations to Dark web. There are a number of blogs and forums the agency posts regarding ISIS activities. Most significant of them are the Ansar Khilafah blog and the Shamikh forums. In […]

Anonymous Expose and Shutdown 8824 Pro-ISIS Twitter Accounts

The online hacktivist group Anonymous has declared a “total war” against the terrorist group and so-called Islamic State (IS, previously ISIS/ISIL) group. To keep up with their words, the hacktivists have exposed a list of hundreds of Twitter users allegedly sympathizing or having a soft corner for the group and helping it to spread its ideology. Anonymous has also […]

ISIS May Have Used Sony PS4 to Plan Paris Attacks

French authorities after the Paris attacks are busy trying to find the source using which the whole massacre was planned. Last Friday, Paris went under seven attacks at different places where there was a rush of people leading to 129 dead and more than 415 injured. French authorities are showing some interest in the world’s […]

How To Activate Windows 10 Using Windows 7 or 8.1 Product Key

Short Bytes: Microsoft has finally responded to the user feedback in the form of recognizing Windows 7 and 8.1 product keys to activate Windows 10 directly after the installation. Now you can just perform a clean install and then use the key for activation – i.e. no need to perform an upgrade. With Windows 10 […]

XSS in Hidden Input Fields

At PortSwigger, we regularly run pre-release builds of Burp Suite against an internal testbed of popular web applications to make sure it’s behaving properly. Whilst doing this recently,Liam found a Cross-Site Scripting (XSS) vulnerability in [REDACTED], inside a hidden input element: <input type=”hidden” name=”redacted” value=”default” injection=”xss” /> XSS in hidden inputs is frequently very difficult […]

A Guide to Malware Binary Reconstruction

Often we come across times where binary reconstruction while analyzing malware / unpacking malware is required . Taking leverage of automated tools is not always useful, sometimes manual reconstruction is required. In this blog we will cover up manual and automated binary reconstruction . Reconstructing IAT from stolen API code This technique is used to […]

BitLocker popper uses Windows authentication to attack itself

Microsoft squashes offline logic flaw that makes lost laptops dynamite. Blackhat Europe Synopsys security boffin Ian Haken says un-patched PCs in enterprises are at risk of having user accounts popped and Bitlocker bypassed, in an attack he describes as “trivial” to perform. The attack vector, sealed off in the latest round of Redmond patches (MS15-122), […]