How to prevent HSTS tracking in Firefox

HTTP Strict Transport Security (HSTS) was designed to help secure websites (those using HTTPS) by declaring to web browsers that they should communicate only via HTTPS with the server to protect connections against downgrade attacks and cookie hijacking. Mozilla implemented support for HTST in its current form in Firefox in 2014 and it has been […]

Facebook Scans Your Phonebook To Guess Who You Are Dating Online

Short Byte: In a bizarre incident, Facebook users are reportedly seeing increasing friend suggestions of the people they have dated before through Tinder. Is it six-degree separation or mere intrusion? In the 21st century, striving for privacy is a mind-numbing struggle. As much as fossBytes along with several international privacy and security-concerned platforms has stressed […]

Best Flying Cars of The Future, Pick Your Ride

Short Bytes: Flying cars dream would soon change into a reality. So, get ready and pick your ride in advance. Good luck ? Most of us, in fact, all of us have dreamt about owning a flying car at one point of time (not everyone can buy a private jet or chopper, right?) and fly […]

WordPress Fixes Critical Stored XSS Error in Akismet

Developers at Automattic, the parent company behind the blogging platform WordPress, fixed a nasty stored cross-site scripting error this week in Akismet, an anti-spam plugin that figures into millions of websites. The bug was fixed Tuesday in an update, 3.1.5, according to Christopher Finke, an engineer at Automattic that works on Akismet. Akismet filters spam […]

Brolux trojan targeting Japanese online bankers

A banking trojan, detected by ESET as Win32/Brolux.A, is targeting Japanese internet banking users and spreading through at least two vulnerabilities: a Flash vulnerability leaked in the Hacking Team hack and the so-called unicorn bug, a vulnerability in Internet Explorer discovered in late 2014. Both exploits are (still) distributed through an adult website and try […]

How the NSA can break trillions of encrypted Web and VPN connections

Researchers show how mass decryption is well within the NSA’s $11 billion budget. For years, privacy advocates have pushed developers of websites, virtual private network apps, and other cryptographic software to adopt the Diffie-Hellman cryptographic key exchange as a defense against surveillance from the US National Security Agency and other state-sponsored spies. Now, researchers are […]

Hackers show Google Now and SIRI can be hacked via Radio waves

Hacking SIRI and Google Now silently from 16feet away now possible via Headphones, claim ANSSI Researchers. French researchers at the government’s information security agency ANSSI have surpassed everyone else in the field of technology.. or so it seems… since they have managed to hack Apples personal assistant SIRI without even speaking a word. Not to […]

Everything in New York to be X-rayed as NYPD brings in X-ray vans

Extremely secretive spy vehicles equipped with X-ray facility, Z Backscatter, will now be seen patrolling the city streets — NYPD hasn’t disclosed anything yet regarding why and how these vehicles will be used. It is understood that these vehicles will be capable of monitoring the contents of your car’s interior and also of your homes. […]

Post popularity exposed on Facebook, thanks to a new bug

For a Facebook marketer, the most important statistic is how many people have viewed their post and although Facebook provides details regarding how many people the post had reached, it does not highlight how many people have viewed the post. However, a recent bug on Facebook’s mobile website allowed users to see how many times […]

Explained: How Criminals Hack Your Chip And Pin Card

Short Bytes: EMV credit cards have till now been assumed to be unhackable. The security professor from the University of California explains how it is NOT so. With the advancing technology and due time has given anything and everything can be hacked. We have already seen some of such events like the car-hacking, whole corporates brought […]

Prices of stolen data on the Dark Web

Over the years, the McAfee Labs team has worked with IT security vendors, law enforcement and others to identify and evaluate numerous websites, chat rooms, and other online platforms, communities, and marketplaces where stolen data is bought and sold. Drawing on this experience, its researchers can now provide an overall assessment of the “state of […]

Here’s How Hackers Can Control Your Entire Digital Life in Minutes

Short Bytes: Continuing our “steps to effective security” series, we are here with a true story that tells about the basic security precautions we forget to take and risk our digital lives. Read this article and stay informed. In the previous articles, I described the ways to protect yourself from hackers and how to detect […]

How to scan whole Internet 3.7 billion IP addresses in few minutes?

Cyber security audit and ethical hacking training professionals normally use scanner to scans the networks. Scanning every IP address on the internet isn’t an easy job, and if you don’t have the resources of a botnet, a single scan can take months. If you want to take snapshots of the internet it will be very […]

Hackers being hunted after stealing $30.7M via malware

Global law enforcement agencies have arrested a gang member behind the theft of £20 million ($30.7 million) via a piece of malicious software that records banking details, and are on the hunt for the remaining members. The malware – known as Dridex – is believed to be developed by in eastern Europe and it’s able […]

5 Free PDF Password Remover Software to Crack Any Protected File

Short Bytes: Forgetting PDF passwords is something that happens to us all the time. In this article, I’m here with the 5 best free PDF password remover software that will help you instantly. Take a look. Password protected PDF files add an extra layer of security to your documents. But, what if you forget the […]

Downloading movies, music can hand you the status of a criminal under TPP

The Internet will soon be quite different, as downloaders of illegal software, movies and songs will be seen as criminals and will be cracked down as criminals under the TPP. You might be wondering how come this will happen? Well, the WikiLeaks documents dump from Trans-Pacific Partnership trade (PDF) calls for internet service providers to provide […]