Some Geeky DuckDuckGo Tricks That Make It Better Than Google

Short Bytes: DuckDuckGo is an anti-Google search engine that claims that it doesn’t track you. In this article, we’ll be telling you some cool DuckDuckGo tricks that will change the way you use your search engine. You might have heard about DuckDuckGo search engine. If not, it’s the search engine that doesn’t track you at all. […]

Pro-Palestinian Hackers Took over Twitter Account of Israeli Ha’aretz Newspaper

Pro-Palestine activists Hacked Ha’aretz Newspaper’s Twitter Account and Posted: “Our martyrs’ mothers will drink your soldier’s blood.” The Twitter feed of Israeli Ha’aretz newspaper website was hacked by pro-Palestinian hacktivists on Tuesday, in response to which the publication officially released a statement confirming the hack. The hack attack occurred on the day of the 100th […]

How to Install Linux On Your Android Phone Without Rooting

Short Bytes: Installing some distribution of Linux on Android phone generally needs an ARM-supported distro and root permissions. As rooting a phone voids the warranty and opens backdoors for potential attacks, here’s a simple way to install a Linux distro on Android without rooting. So, let’s get started. Canonical is betting big on its official […]

Anonymous Hacks National Agriculture Library Domain for OpMonsanto

The online hacktivist Anonymous breached into the subdomain of the National Agriculture Library (NAL) and leaked personal details of staff and other users. The attack was conducted 28th October 2015 under the banner of operation OpMonsanto in which NAL, a subdomain of the official website of the U.S. Department of Agriculture was under attack.  Anonymous hackers […]

The Economist’s Ad-Blocker was Hacked, Delivered Malware to Windows Users

Economist’s anti-ad blocking analytics service got hacked on 31st October (company’s officials didn’t disclose until 5th November) and the exposed site made users download a malware into their systems. The Economist runs a service for publishers that provides statistics on the percentage of users reading their content with ad blocking services on their site. The […]

Which Programming Language Is Perfect For Me?

Short Bytes: Learning the programming is something that you can do at your own terms – either in the best universities of the world or even sitting on the couch and learning on your smartphone. In this article, I’ll be telling you the perfect programming language that you need to learn right now, depending upon your […]

New Android Malware Surfaced, Only Way Out Throw Away Your Phone

Researchers at Lookout Security have found a Shuanet malware that masquerades as some of the most downloaded apps like Facebook, Twitter, and Snapchat. Android devices are always under attack, from IQ Testing App infecting millions of users worldwide to gaming apps like Candy Crush and Plants vs Zombies each and every one of them played their […]

Ransomware Found Targeting Linux Servers and Coding Repositories

Malware operators are taking aim at Web developers. A newly discovered ransomware is attacking Linux Web servers, taking aim at Web development environments used to host websites or code repositories. Russian antivirus maker Dr.Web came across this malware and said that the ransomware needs root privileges to work. Additionally, the company also says it does not […]

HIDDEN IN PLAIN SIGHT: BRUTE FORCING SLACK PRIVATE FILES

Last year we switched to using Slack for all our internal communication and it’s working out nicely. It’s very developer centric in that it offers integrations with lots of services like Travis CI, GitHub, etc. When we started using Slack one of our developers was sending a file, had his Developer console open and noticed […]

The Vulnerability That Will Rock the Entire Java World

Major bug goes unnoticed in one of Java’s most popular libraries, despite getting a CVSS vulnerability score of 10 Back in late January, two security researchers (Gabriel Lawrence and Chris Frohoff) uncovered an RCE (Remote Code Execution) vulnerability in one of the most used Java libraries around, the Apache Commons Collections. Because the vulnerability is […]

CIA Email Hackers Return With Major Law Enforcement Breach

HACKERS WHO BROKE into the personal email account of CIA Director John Brennan have struck again. This time the group, which goes by the name Crackas With Attitude, says it gained access to an even more important target—a portal for law enforcement that grants access to arrest records and other sensitive data, including what appears […]

FCC fines Cox for falling for Lizard Squad scam, exposing customer data

“Hi, I’m from IT” call yielded access to customer records, lulz; Cox fined $596k. What’s the cost of giving up customers’ information because of weak information security practices? For Cox Communications, the answer is a half-million dollar fine and having the Federal Communications Commission watching its every information security move for the next seven years. […]

How An SQL Injection Attack Works: Infographic

Short Bytes: Just like DDoS attacks, SQL injection attacks too are pretty infamous in the internet world. They are responsible for about 27% of the total online attacks and thus they demand your attention. Read more to know different aspects and how an SQL injection attack works. SQL injection attacks are one of the most […]

Bosnian Band Releases Epic Video Song in Support of The Pirate Bay

A Bosnian music group has released a song in support of The Pirate Bay (TPB) and bashing the authorities on copyright related rules and regulations. A Bosnian music band Dubioza Kolektiv on Friday released  the official video of their song “Free.mp3 (The Pirate Bay Song)” which the band has dedicated to the founders of the […]

UK companies have ‘misplaced confidence’ on cyber security

A majority of British businesses are convinced that they won’t fall victim to a damaging cyber attack, despite that fact that high-profile hacking incidents are increasingly grabbing headlines in the UK and around the world. That’s according to research conducted by the identity and access management firm Ilex International, which is warning that there is […]

NSA-proof ProtonMail Service DDoSed, Forced to Pay $6000 as Ransom

In 2014, a team of privacy advocates launched ProtonMail and claimed that it’s an NSA-proof email service. The service was such a massive hit that the developers came up with its Android and iOS apps. But something went wrong this week with ProtonMail when it got under powerful DDoS attacks by unknown cyber criminals and forced to […]

How Search Engine Works and Makes Your Life Easier?

Short Bytes: Search Engine is a software that allows the display of relevant webpage results based on the search query input by the use of Web Crawling and Web Indexing, some fat formulae and intelligent algorithms in order to gather the appropriate data. A few thousand searches were made in the time this webpage got […]

Quick Q&A with the Author of Mabouia, First Mac OS X Ransomware

Rafael Salema Marques is a Brazilian cyber-security researcher and, above all, a devoted Mac user. Today, Mr. Marques published a LinkedIn blog post and proof-of-concept video on YouTube, detailing a fully functional Mac OS X ransomware piece that works just like its more dangerous Windows counterparts. But don’t panic, Mr. Marques did not release his […]