Top 5 Scariest Zombie Botnets

An army of the undead, wreaking havoc on the Internet – it’s a nightmare scenario that has played out many times as the population of humans online has exploded. Some zombie plagues have been particularly troubling, and we will take a look at the worst of the worst.

Top Five Best But Lesser Known Features of Android 5.0 Lollipop

As I’ve written in my earlier posts, Android 5.0 Lollipop is the most significant change in Android line-up since 2011’s Android Ice Cream Sandwich. Lollipop aims at making material design a more prominent feature in looks and feels of the Android OS. Apart from the popular and known features of Android’s new OS, there are […]

Yahoo, Match and AOL hit by ransomware

Cybercriminals taking advantage of a ‘malvertising’ attack on big name sites including Yahoo!, Match.com and AOL were making in the region of $25,000 per day, according to Forbes.

The Evolution of Webinject

Last month, we presented “The Evolution of Webinject” in Seattle at the 24th Virus Bulletin conference. This blog post will go over its key findings and provide links to the various material that has been released in the last few weeks.

Windows 10 to tighten security with prominent 2FA

Microsoft is taking aim at traditional single password systems with the upcoming version of Windows, by including build in two-factor authentication according to ZDNet, which describes the move as “audacious plans to tighten security”.

Learn cyber security fundamentals (Free course) (online classes)

SANS Cyber Aces Online makes available, free and online, selected courses from the professional development curriculum offered by The SANS Institute, the global leader in cyber security training. SANS goal in making these courses available as open courseware is to help grow the talent pool and accelerate the rate at which skilled cyber professionals can […]

Find Out If Any One Opens Your Computer Without Your Permission

How to Know Who Logged into your computer and when? In Windows, there is one in-built too will records all events in your computer called “Event Viewer”. This application records all your computer activities from login to log off etc. The Event Viewer can be accessed in all Windows Operating system including Windows XP, Vista, […]

UK takes aim at serious hacking offenses with planned life sentences

Law makers in Britain are discussing a dramatic increase in sentencing for serious hacking offences, according to The Register. Currently in discussion in the country’s upper house, The House of Lords, the move looks to overhaul the Computer Misuse Act 1990, and includes a possible life sentence for serious hackers.

Botnet malware: What it is and how to fight it

Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.

How to Hack an android phone

In this tutorial i will show you a  guide on how to hack someones android phone. First you will need to root your phone ( I’m not going to show you how to root your phone on this tut , but will post one in the future) for this to work on all 3 methods. […]

Myths about malware: an exploit is the same as malware

In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about.

How to Dox/Trace like a pro.

Firstly what is doxing? Doxing is a technique used to track, trace, and collect information on individuals or organizations online anonymously. So your question is how will we dox like a pro? To be honest it’s quite easy. I’ll show you 2 ways on how to dox like a pro. The first method will concentrate […]

Botnets: remote controls for cybercriminals

As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.

How To Shutdown A Computer With A Cell Phone.

Using this method, a user can shutdown, restart, hibernate, etc. his or her computer, just by sending an email from his or her phone. To do this, all you will need is Microsoft Outlook which should come with Microsoft Office, which most people have. This will need to be on the computer wish you wish […]

5 Geekiest Pick Up Lines That Will Make You Laugh

I was surfing Quora as a part of daily internet habit, when I came across a question ” What is the geekiest pickup line? “. I must have seen it before because I remembered some of the answers, but at that time I didn’t write here at fossBytes. So coming to the point, I could […]