Someone Hacked Glorious Leader, Kim Jong-un Game and Destroyed it

The Glorious Leader game which lets you control North Korean dictator Kim Jong Un has been hacked, according to its developers. The game was first announced in May 2014 and moved to Kickstarter�just last month in the hopes of getting the funding it needed to finish it. The creators, Moneyhorse Games, pulled it a week […]

The drones are coming, what could go wrong?

Continuing from Consumer Electronics Show 2015 here in Las Vegas where we were covering this week the first impresisions of the show and also some lessons that this digital invasion is leaving us. Now, we will approach another interesting topic that involves privacy and new technology: drones.

Linux Basic Commands

mkdir – make directories Usage: mkdir [OPTION] DIRECTORY… eg. mkdir lhn ls – list directory contents Usage: ls [OPTION]… [FILE]… eg. ls, ls ­l, ls lhn cd – changes directories Usage: cd [DIRECTORY] eg. cd lhn pwd ­-  print name of current working directory Usage: pwd vim – Vi Improved, a programmers text editor Usage: vim [OPTION] [file]… eg. vim lhn.txt cp – copy files and directories Usage: cp [OPTION]… SOURCE DEST eg. cp sample.txt sample_copy.txt cp sample_copy.txt target_dir mv – move (rename) files Usage: mv [OPTION]… SOURCE DEST eg. mv source.txt target_dir mv old.txt new.txt rm ­ remove files or directories Usage: rm [OPTION]… FILE… eg. rm file1.txt , rm ­rf some_dir find – search for files in a directory hierarchy Usage: find [OPTION] [path] [pattern] eg. find file1.txt, find ­name file1.txt history – prints recently used commands Usage: history cat – concatenate files and print on the standard output Usage: cat [OPTION] [FILE]… eg. cat file1.txt file2.txt cat ­n file1.txt echo – display a line of text Usage: echo [OPTION] [string] … eg. echo I love India echo $HOME grep ­- print lines matching a pattern Usage: grep [OPTION] PATTERN [FILE]… eg. grep ­i apple sample.txt  wc ­- print the number of newlines, words, and bytes in files Usage: wc [OPTION]… [FILE]… eg.  wc file1.txt wc ­L file1.txt sort – sort lines of text files Usage: sort [OPTION]… [FILE]… eg. sort file1.txt sort ­r file1.txt tar – to archive a file Usage: tar [OPTION] DEST SOURCE eg. tar ­cvf /home/archive.tar /home/original tar ­xvf /home/archive.tar […]

CISPA Is Being Revived in Wake of Sony Hack

Leading Democratic Congressman, Dutch Ruppersberger, is calling for the revival of CISPA, The Cyber Intelligence Sharing and Protection Act. The Maryland Congressman and top-level Democrat on the House Intelligence Committee made this statement following recent cyber-attacks including the one on Sony Pictures Entertainment, which the FBI openly blames on North Korea. Read More: FBI formally blames North Korea for […]

Los Angeles Traffic Sign hacked with an awesome message for everyone

If you’ve ever sat in Los Angeles traffic, you probably have a good idea of what it’s like to lose the will to live. That’s why the mysterious and mischievous person who’s behind this story is such a damn hero. Someone recently hacked into an electronic traffic sign in downtown L.A. to display a very […]

Digital Invasion: 3 things we learned from CES 2015

Ever lost a kid somewhere? Not anymore if the gadget vendors have anything to say about it. Now you can digitally strap your kid to your tablet and keep track of them. Kids not running enough to stay trim? There’s an app for that that works the same way. Got high blood sugar? You can keep track of that too using the sensor-du-jour highlighted at CES 2015 in Las Vegas.

Pro-Russian Hackers Take Down German Govt. Websites

A group of pro-Russian hackers is claiming responsibility for recent attacks that brought down German government websites including the page for Chancellor Angela Merkel, the foreign ministry and the lower parliament. The group calls itself CyberBerkut and claims itlaunched those cyber-attacks over Germany�s supporting stance towards the �criminal regime in Kiev�. The timing of the […]

Windows exploitation in 2014

Today, we published our research about Windows exploitation in 2014. This report contains interesting information about vulnerabilities in Microsoft Windows and Office patched over the course of the year, drive-by download attacks and mitigation techniques.

Phish Allergy – Recognizing Phishing Messages

While phishing-related malware is still mostly Windows targeting, attacks that rely purely on social engineering and fake web sites might be delivered by any platform, including smartphones and tablets. The more cautious you are, the better informed you are, and the more you think before you click, the more chance you have of leaving phishing craft stranded.

Several Electronic Arts Origin accounts may have been hacked

The gamers at Electronic Arts are finding purchases they didn’t make on their accounts. This news comes in right after the Lizard Squad hackers attacked and brought to a stop the PSN and Xbox live services while the H4lt squad leaked the Xbox One SDK online, allowing the development of Homebrew Apps to be run on […]