Scammers Targeting Facebook Users with Dislike Button Scam

New Dislike button scam has started to make rounds on the Facebook, one of the most popular and widely used social media networks. This scam is expected to spread far and wide because of its nature and how the Facebook users are anxiously waiting to get their hands on the dislike button. For those readers […]

Getting Started With Docker – Intro to Containers World (Part -1)

Short Bytes: Linux containers (LXC) are very popular these days among developers and companies (perhaps due to Docker, which leverages LXC on the back-end). LXC, as a lightweight, serves as an alternative to full machine virtualization such as those provided by “traditional” hypervisors like VirtualBox, VMWare, KVM, Xen, or ESXi. Today, we are starting a complete […]

How Your ATM Card Data Could Get Hacked

Security experts have warned ATM (Automated Teller Machine) users to stay clear from suspicious ATMs for past several years because of numerous security vulnerabilities but people are still carrying out transactions from hacked and infected ATMs, only to later find out that their accounts are emptied unknowingly. As new methods to hack ATMs are being […]

“My First Line of Code”: Linux Creator Linus Torvalds

Short Bytes: Linus Torvalds is the creator of Linux and he still decides what will happen in the world of Linux. Read more and watch an amazing video in which Linux talks to Bloomberg about his first line of code. Linus Torvalds is the king of all geeks. You instantly know that he thinks in […]

Anonymous Hacks Vietnam Govt websites Against Human Rights Abuse

The online hacktivists affiliated to Anonymous, AntiSec and HagashTeam conducted a cyber attack on Vietnamese government websites against online censorship and human rights violations in the country. The hacktivist groups left a deface page along with a message on 8 Vietnamese government websites against the imprisonment of thousands of political prisoners. Anonymous, AntiSec and HagashTeam […]

Screenshot Malware Spying On Online Poker Players

A unique malware has been found by security experts which spies on the players of online poker gaming sites, specifically Full Tilt Poker and PokerStars and is encoded to take screenshots of a victim’s game and then send it to the attacker, states a security researcher Robert Lipovsky at ESET. Various kinds of malware and Trojans have been […]

How and Why Crash Google Chrome With These 16 Characters in 2 Seconds

Short Bytes: Do you want to crash someone’s Google Chrome just for the heck of it? Here’s how to do it with 16 simple characters. Due to a bug in Chromium engine, you can crash someone’s Google Chrome browser just by adding a NULL char in the URL string. The bug was discovered by Andris […]

Microsoft Windows Devices Responsible For 80% of Malware Infections

Microsoft Windows, in spite of having an insignificant share in the mobile market, is the leading operating system that is responsible for mobile device malware infections that is carried through mobile networks, according to the latest malware periodic report prepared by Alcatel-Lucent’s Motive Security Labs on Tuesday. The report suggests that during the beginning of the second […]

Phishing Attack Causes Bitcoin Payment Processor BitPay to Lose $1.8M

BitPay the Atlanta-based Bitcoin payment processor had been hit by a massive phishing attack costing the company $1.8 million. Verified by the documents owned by the Atlanta Business Chronicle, in this massive con pulled by a hacker pretending to be BitPay CFO Bryan Krohn, sent fake emails from his account in December sanctioning the transfer […]

Hackers Hold Silicon Valley’s Hometown Newspapers Hostage

Sometime yesterday, 17 September, hackers took over the websites of Silicon Valley’s Embarcadero Media Group, publisher of the Palo Alto Weekly, theAlmanac, the Mountain View Voice, the Pleasanton Weekly, and Palo Alto Online. The group’s newspapers and websites are a key source of local news for Silicon Valley residents, and the Palo Alto Weekly is […]

AT&T Employees Installed Malware on Their PCs to Aid Phone Unlocking Service

AT&T has filed a lawsuit against 3 former call center employees, accusing them of installing malware on their servers with the purpose of aiding a phone unlocking service in obtaining AT&T unlock codes. Almost all mobile carriers around the globe sell phones together with their mobile plans. These phones are usually locked, so customers won’t […]

Hack Brief: Malware Sneaks Into the Chinese iOS App Store

THE APPLE ECOSYSTEM is well known for very rarely letting any dodgy apps enter it because of the company’s stringent security checks. But recently, nearly two dozen malicious pieces of software managed to get hosted on the App Store, and subsequently downloaded by Chinese users. This is because attackers found an unorthodox route to exploit: […]

New PoS Trojan Can Download Other Malware, Launch DDOS Attacks

The world of computer viruses and antivirus solutions is in a constant change, with cyber-crooks evolving their code and cyber-security firms trying to keep up but always being two steps behind. In recent years, malware targeting PoS (Point of Sale) stations has been constantly evolving, with new versions coming out almost each month, with businesses […]

D-Link Accidentally Leaks Private Code-Signing Keys

A simple mistake by networking gear manufacturer D-Link could have opened the door for costly damage. Private keys used to sign software published by D-Link were found in the company’s open source firmware packages. While it’s unknown whether the keys were used by malicious third parties, the possibility exists that they could have been used […]

10 Windows Commands you need to know for Troubleshooting

The command line is an interface for typing commands directly to a computer’s operating system. It is usually used to resolve Microsoft Windows problems. These useful commands will speed up your troubleshooting tasks on windows computers. 1 – System File Checker Malicious software will often attempt to replace core system files with modified versions in […]

“seL4” is an Unhackable Kernel for Keeping All Computers Safe From Cyberattack

Short Bytes: The Australian national research agency Data61 has developed an unhackable kernel named seL4 and proved its unhackable property mathematically. The kernel does this job by separating the critical systems and data from the kernel.  Today, the threat of cyber attacks isn’t just limited to computers and smartphones. With the ever-increasing intrusion of computers and […]

Save your eyes from Computer Strain

No more watery eyes, when you wake up from sleep in the middle of the night to work on your bright computer screen. Your eye savior, f.lux is here. First things first, what is f.lux and why do you need it?   Why do you need f.lux ? Decreasing the brightness is not that attractive […]

Remove Libraries, Network, Homegroup and other links from File Explorer

When you open File Explorer in Windows 10, the system’s default file browsing and management tool, you will notice immediately that it displays two panes in the main interface. The left pane lists mostly hardcoded links to system locations such as Libraries, This PC, Network, Homegroup, One Drive or Quick Access while the right the […]

3D printed TSA Travel Sentry keys really do open TSA locks

Last year, the Washington Post published a story on airport luggage handling that contained unobscured images of the “backdoor” keys of the Transportation Safety Administration, along with many other security agencies around the world, used to gain access to luggage secured with Travel Sentry locks. These locks are designed to allow travelers to secure their suitcases […]