Xcode hack confirms 2GB RAM on iPhone 6s, 4GB on iPad Pro

Apple is traditionally mum on some details of its devices’ hardware, preferring to talk about how “B is X times faster than A” than raw numbers. It’s partly a smart marketing move, using more general but easily understood comparisons than cold, impersonal numbers. But it also relieves Apple from having to concede, much less reveal, […]

Yokogawa patches widespread SCADA vulnerability

Networking process crashed by crafted packets. One of the world’s major suppliers of industrial networking kit, Japanese company Yokogawa, has alerted the world to a vulnerability in 21 of its products. The ICS-CERT advisory, here, identifies the company’s CENTUM, ProSafe-RS, STARDOM, FAST/TOOLS and other systems as being at risk. The vulns are “stack-based buffer overflow […]

North Korea Installs Backdoor in South Korea’s Favorite Word Processor

Hackers linked to known North Korean attack points and methods exploited a zero-day vulnerability in the Hangul Word Processor (HWP), widely deployed in the offices of the South Korean government. According to research at cyber-security firm FireEye, the attackers used a known vulnerability (CVE-2015-6585), which was then patched on Monday, September 7. The attack relied […]

GlassWire – Best Firewall Software

GlassWire is a lot more than just a great firewall. The free firewall software monitors your network in an easy to understand way, watches for network related threats, and it lets you know any time something new on your computer is connecting to the Internet. The free version of GlassWire is awesome, but the Pro […]

Getting Started With Raspberry Pi – Knowing Your Pi (Part – 1)

Short Bytes: The credit-card-sized Raspberry Pi was released long back in 2012 and it has grown to become one of the most popular platforms for the developers. This low-cost computer plugs into a monitor and using a standard keyboard and mouse, you can operate it like a regular PC. In part 1 of Getting Started […]

What’s New in iOS 9 SDK?

Short Bytes: iOS 9 SDK includes new APIs and services that are enabling new categories of apps and features. Multitasking and gaming APIs help enhance app functionality and create immersive games. Expanded search capabilities, and new support for CloudKit, HomeKit, HealthKit, and MapKit extend iOS to more places than ever before. In a recent event Apple […]

Smartwatch Users Beware – Report Identifies Vulnerabilities in Wearable Devices

In the past, we reported how your wearable fitness trackers can be hacked. Now, The university of Illinois at Urbana-Champaign’s associate professor Romit Roy Choudhry used a local app on Samsung Gear Live smartwatch to check the way data typed by a user got leaked due to the device’s motion sensors. According to Roy: “The project, called Motion […]

Survey Shows Most Americans are Fine with Backdoor in Their Devices

A recent survey from Vormetric revealed that people in the United States are OK with the addition of backdoors in their devices/software. This startling revelation negated the general perception that Americans greatly value their privacy. The survey was conducted by Vormetric and Wakefield regarding the ongoing debate between tech firms and the US government regarding […]

Top British Ministers Hacked by ISIS in Sophisticated Espionage Operation

Crucial information held by some of the most senior ministers of David Cameron (including Home Secretary Theresa May) has possibly landed in the hands of extremists- claims Intelligence agency GCHQ It was identified in an investigative report from the GCHQ that the so-called Islamic State (IS, previously ISIS/ISIL) group have collaborated to steal sensitive information held by David Cameron’s […]

Searching For Hacking Software Leads to Vulnerable Spammy Sites

Thousands of legit websites’ security has been compromised to secretly redirect the visitors, coming through specific search terms, to prospective fraudulent websites offering hacking schemes and services. This was revealed in a recent investigation by one of the Malwarebytes researcher, Steven Burn, responsible for scrutinizing Facebook hacking frauds. Those readers who are not aware of […]

WordPress High CPU Load Bug After 4.3 “Billie” Upgrade and How to Fix it

Short Bytes: WordPress high CPU load bug – We faced it and I am guessing thousands of other blogs hosted on WordPress faced it too, when they upgraded to WordPress 4.3 “Billie”.  If not a million-dollar bug, I can definitely call it a bug that almost screwed my several nights as I was trying to fix it.  Usually a blog is managed by […]

Microsoft is Force-Downloading Windows 10 on Windows 7 and 8 Machines

As reported previously how Microsoft released updates to spy on Windows 7, 8 and 8.1 Users just like it does on Windows 10. Now the firm has done it once again! The news has been making rounds on the Internet that Windows 10 is being force-downloaded automatically on Windows 7, Windows 8 and Windows 8.1 machines through Windows […]

Crack WPA & WPA2 with Aircrack-ng on Kali Linux

Aircrack-ng best WiFi penetration testing tool used by hackers. In this tutorial we are going to teach you How to Crack WPA & WPA 2 with aircrack-ng on Kali Linux. We high recommend this for research or educational purpose only. Alfa AWUSO36H Wireless Card Windows 7-64bit (works on 32bit) VMware Workstation Kali Linux 2.0

How to Stop Windows 10 Automatic Downloading on Your Windows 7 and 8.1 PC

Short Bytes: It’s reported that some Windows 7 and 8.1 PCs are downloading Windows 10 automatically- even if the users haven’t reserved the upgrade. See how to stop this Windows 10 automatic downloading on your PC. I wrote in my previous Windows 10 article, some users are reporting that Microsoft is forcefully downloading Windows 10 upgrade […]

MIT is the Most Insecure University in the US

Short Bytes: MIT may boast of having one of the smartest bunch of people under one roof, but when it comes to security benchmarks, it does not fair good. In fact, MIT ranks as the worst US university in terms of cyber-security protocols. SecurityScorecard conducted a study of the United States’ universities and looked through the […]

First library to support anonymous Internet browsing effort stops after DHS e-mail

Since Edward Snowden exposed the extent of online surveillance by the US government, there has been a surge of initiatives to protect users’ privacy. But it hasn’t taken long for one of these efforts—aproject to equip local libraries with technology supporting anonymous Internet surfing—to run up against opposition from law enforcement. In July, the Kilton Public […]

Website hackers hijack Google webmaster tools to prolong infections

Webmasters should regularly check the list of verified owners for their websites in the Google Search Console. Hackers who compromise websites are also increasingly verifying themselves as the owners of those properties in Google’s Search Console. Under certain circumstances this could allow them to remain undetected longer than they otherwise would be, researchers warn. The […]

Researchers Outline Vulnerabilities in Yahoo, PayPal, Magento Apps

Researchers recently discovered a smattering of vulnerabilities in web applications and mobile applications belonging to companies like Yahoo, PayPal, Magento, and Shopify that could have led to account theft, session hijacking, and phishing, among other consequences. Hadji Samir, Ebrahim Hegazy, Ayoub Ait Elmokhtar, and Benjamin Kunz Mejri, researchers with Vulnerability Lab, found the bugs earlier this […]