HIDDEN IN PLAIN SIGHT: BRUTE FORCING SLACK PRIVATE FILES

Last year we switched to using Slack for all our internal communication and it’s working out nicely. It’s very developer centric in that it offers integrations with lots of services like Travis CI, GitHub, etc. When we started using Slack one of our developers was sending a file, had his Developer console open and noticed […]

The Vulnerability That Will Rock the Entire Java World

Major bug goes unnoticed in one of Java’s most popular libraries, despite getting a CVSS vulnerability score of 10 Back in late January, two security researchers (Gabriel Lawrence and Chris Frohoff) uncovered an RCE (Remote Code Execution) vulnerability in one of the most used Java libraries around, the Apache Commons Collections. Because the vulnerability is […]

CIA Email Hackers Return With Major Law Enforcement Breach

HACKERS WHO BROKE into the personal email account of CIA Director John Brennan have struck again. This time the group, which goes by the name Crackas With Attitude, says it gained access to an even more important target—a portal for law enforcement that grants access to arrest records and other sensitive data, including what appears […]

FCC fines Cox for falling for Lizard Squad scam, exposing customer data

“Hi, I’m from IT” call yielded access to customer records, lulz; Cox fined $596k. What’s the cost of giving up customers’ information because of weak information security practices? For Cox Communications, the answer is a half-million dollar fine and having the Federal Communications Commission watching its every information security move for the next seven years. […]

How An SQL Injection Attack Works: Infographic

Short Bytes: Just like DDoS attacks, SQL injection attacks too are pretty infamous in the internet world. They are responsible for about 27% of the total online attacks and thus they demand your attention. Read more to know different aspects and how an SQL injection attack works. SQL injection attacks are one of the most […]

Bosnian Band Releases Epic Video Song in Support of The Pirate Bay

A Bosnian music group has released a song in support of The Pirate Bay (TPB) and bashing the authorities on copyright related rules and regulations. A Bosnian music band Dubioza Kolektiv on Friday released  the official video of their song “Free.mp3 (The Pirate Bay Song)” which the band has dedicated to the founders of the […]

UK companies have ‘misplaced confidence’ on cyber security

A majority of British businesses are convinced that they won’t fall victim to a damaging cyber attack, despite that fact that high-profile hacking incidents are increasingly grabbing headlines in the UK and around the world. That’s according to research conducted by the identity and access management firm Ilex International, which is warning that there is […]

NSA-proof ProtonMail Service DDoSed, Forced to Pay $6000 as Ransom

In 2014, a team of privacy advocates launched ProtonMail and claimed that it’s an NSA-proof email service. The service was such a massive hit that the developers came up with its Android and iOS apps. But something went wrong this week with ProtonMail when it got under powerful DDoS attacks by unknown cyber criminals and forced to […]

How Search Engine Works and Makes Your Life Easier?

Short Bytes: Search Engine is a software that allows the display of relevant webpage results based on the search query input by the use of Web Crawling and Web Indexing, some fat formulae and intelligent algorithms in order to gather the appropriate data. A few thousand searches were made in the time this webpage got […]

Quick Q&A with the Author of Mabouia, First Mac OS X Ransomware

Rafael Salema Marques is a Brazilian cyber-security researcher and, above all, a devoted Mac user. Today, Mr. Marques published a LinkedIn blog post and proof-of-concept video on YouTube, detailing a fully functional Mac OS X ransomware piece that works just like its more dangerous Windows counterparts. But don’t panic, Mr. Marques did not release his […]

Top FBI lawyer: You win, we’ve given up on encryption backdoors

We’re your servants, says general counsel unconvincingly After spending months pressuring tech companies to add backdoors into their encryption software, the FBI says it has given up on the idea. Speaking at a conference in Boston on Wednesday, the bureau’s general counsel James Baker even used the term that has been repeatedly used to undermine […]

jQuery.min.php Malware Affects Thousands of Websites

Fake jQuery injections have been popular among hackers since jQuery itself went mainstream and became one of the most widely adopted JavaScript libraries. Every now and then we write about such attacks. Almost every week we see new fake jQuery domains and scripts that mimic jQuery. For example, one of the most prevalent malware infections […]

Crypto e-mail service pays $6,000 ransom, gets taken out by DDoS anyway

Follow-on attacks show capabilities “commonly possessed by state-sponsored actors.” A provider of end-to-end encrypted e-mail said it paid a ransom of almost $6,000 to stop highly advanced denial-of-service attacks that knocked its networks, and the networks of some of its upstream providers, offline. In a blog post published Thursday, officials of Switzerland-based ProtonMail said they […]

Anonymous stands true to its words, leaks more data on alleged KKK members

The online hacktivist Anonymous released what they called a list of Ku Klux Klan members and sympathizers on Thursday. As reported earlier, the Anonymous hacktivists are leaking personal information of the members belonging to the white supremacist Christian organization the Ku Klux Klan (KKK).  Now, in the second phase of their OpKKK the hacktivists have leaked a trove of […]

UK cyber-spy law takes Snowden’s revelations of mass surveillance – and sets them in stone

IPB The encryption bothering parts of the UK’s Investigatory Powers Bill have left IT security experts flabbergasted. Introducing the draft internet surveillance law in the House of Commons on Wednesday, Home Secretary Theresa May presented it as consolidating and updating existing investigatory powers. She spun it as a break from measures in the ultimately unsuccessful […]

Top 10 Coolest Notepad Tricks and Hacks for Your PC

Short Bytes: The humble Notepad of your laptop goes unappreciated many times. This little tool is capable of doing some amazing tricks with just few simple steps. In this article, I’m going to tell you my 10 favorite Notepad tricks. What work do you perform with Notepad? Nothing much? Well, Notepad is a lot more […]