Browsing author

root

Java Deserialization Vulnerability Found in More Java Libraries

Initial issues trickle down to other Java toolkits.Exactly a month ago, we were reporting on an issue that exposed many Java applications to security holes thanks to how developers handled user-supplied deserialized data via the Apache Commons Collections library. The vulnerability caused some waves in the Java community, but since the issue was not a […]

France proposes to ban Tor and forbid free Wi-Fi

Proposed French Law Would Ban TOR In Response to Paris Terror Attacks France is looking to tighten its censorship laws after the gruesome Paris terror attacks. According to French newspaper Le Monde, authorities in Paris are considering banning the use of TOR anonymity service and ban free Wi-Fi service across France. French authorities hope to […]

Infostealers, Exploit Kits & Ransomware, Just Your Typical Malware Campaign

A look inside your typical malware campaign.In an optimal scenario, when you get infected with malware, you think it’s only one virus. Unfortunately, in the real world it’s not so, and security analysts from Heimdal Security have unveiled details about a malware campaign that starts with infostealers, goes through exploit kits, and finishes with computers […]

3-Year-Old Vulnerability Affects Millions of Smart TVs, Phones, and Routers

Trend Micro reports that 6.1 million devices are affected.A 3-year-old bug in the Portable SDK for UPnP Devices, also called libupnp, is present in millions of modern-day smart TVs, Internet routers, and smartphones, security research firm Trend Micro reports. Ironically, the bug itself was patched in December 2012, but developers of various mobile applications, smart […]

Proposed Laws Can Result In Banning Tor And Free Wi-Fi In France

Short Bytes: The French government is actively researching the options to make its surveillance options more effective. In the wake of recent attacks on Paris, the government is proposing laws to ban free Wi-Fi and Tor to counterattack terrorism and any possible state of emergency. If these proposed laws are passed, France could become the first […]

Hackers Build Rootnik Trojan on Top of Android Rooting Toolkit

Why create your own rooting functions when someone else has already put the effort into doing the same thing Security researchers have detected a new trojan targeting Android devices, but this one is unique in its own right because its creators have built it on top of an Android rooting utility called Root Assistant. The […]

Unwanted Browser Ads, A Sign Your PC is Infected with Malware

If your browser displays unwanted and wrongly placed ads such as an adult website ad on a website for kids or showing an ad where it simply cannot appear like on a government website then this means trouble. Such unwanted ads sometimes contain hidden software, which often are malicious or infected with malware which can […]

Join Anonymous on 11 December, It’s The Official ISIS Trolling Day

After creating havoc among ISIS circles by hacking their social media accounts, Anonymous is back again and this time it aims at sabotaging the militant group’s image for good. As per Anonymous’ statement, December 11 will see a formal launching of ISIS trolling campaign. The militant group that claims to be warriors taking actions to […]

Now Run Apple’s Swift Programming Language Online In IBM Swift Sandbox

Short Bytes: To make learning Apple’s programming language Swift easier, IBM has launched an online Swift Sandbox. Here, you can write and run Swift programs and execute them on top of Linux. Just a couple of days ago, Apple made its Swift programming language open source. Apple released the language last year at WWDC 14 […]

Arab Coalition Forces Let You Watch Yemen War on Snapchat

Do you want to watch the Saudi Arabian-led war in Yemen on your mobile device? Well, there is a guy who is officially posting everything about Yemen war on his Snapchat account. Saudi Arab’s military action is open for all and the pictures are being posted on Snapchat. The account is regularly updated which lets followers […]

Crooks Targeting LinkedIn Users with Fake Profiles

LinkedIn can be a hacker’s treasure trove and job seeker’s nightmare. The IT security company Symantec revealed that dozens of fake accounts on social networking sites are being used by hackers pretending to be recruiters. The accounts holders let hackers plot a network of business professionals and achieve the professional’s trust. By building a connection […]

Canadian Police Vow to Hunt Cyber Criminals and Anonymous

Will Canada’s new Cybercrime division Curb Cybercrimes and capture Anonymous? Since the approval of Canadian Anti-Terror Bill C-51, online privacy is in question. Anonymous at the other end furious over the bill hacked Police Association of Ontario and ministry websites to mark their protest, but nothing changed and its that time of the year where Canadian authorities […]

New Ransomware Exploit Kit Blends with Credential Theft Ability

A new campaign has come to light that spreads the CryptoWall 4.0 (file-encrypting ransomware program) using Angler exploit kit by inserting malicious coding into hacked web pages. This campaign was exposed by Denmark-based IT security firm Heimdal Security that involves installing various malware on the already compromised computer. Initially the notorious data stealer Pony is […]

Dorkbot and associated Botnets Temporarily Disrupted

The world’s most widely proactive malware group Dorkbot and all of its associated Botnets have been disrupted. This disruption was made possible by the combined efforts of international law enforcement agencies with the support of prominent security and technology companies including Microsoft. According to Wil van Gemert, the Europol deputy director of operations who was […]

Google Is Powering A New Search Engine That Digs Internet’s Dirty Secrets

Short Bytes: Ever heard of Shodan and ‘appreciated’ its capabilities? Here, you are going to read about another similar, but a smarter hacker’s search engine. This search engine is called Censys and powered by Google’s infrastructure. Read more to know how it works and its strengths. If you consider the usability and security factors, the humble routers […]

World’s Fastest Password Cracking Tool Hashcat Is Now Open Source

Short Bytes: The world’s fastest cracking tool Hashcat is now open source. The company has called it a very important step and listed out the reasons that inspired them to take this step. If you are into password cracking, you might be aware of the fact that Hashcat is one of the most popular CPU-password recovery […]

How to Hack Smartphones

More and more, the world is turning to and adopting the smartphone platform as the digital device of choice. People are not only using smartphones for voice communication, but also web services, email, SMS, chatting, social networking, photography, payment services, and so on. There are 2.6 billion smartphone subscriptions in the world today, and that […]

Relentless Sofacy APT Attacks Armed With Zero Days, New Backdoors

A new analysis of the Sofacy APT gang, a Russian-speaking group carrying out targeted attacks against military and government offices for close to a decade, shows a relentless wave of intrusions peaking this summer against victims in a number of NATO countries and the Ukraine. Researchers at Kaspersky Lab this morning released their update on […]

Switch your computer into Iron Man’s J.A.R.V.I.S

JARVIS is Iron Man’s personal assistant. With the help of a few windows utilities we can create our own JARVIS system.   Here are the essential things you will need: A Computer/Laptop having Windows 7 8 or 8.1. (XP or Vista won’t work) Microphone (If you don’t have one, buy it! It doesn’t cost much!) […]

How to Hack TOR Hidden Services

A lot of people think that TOR services are unhackable because they are on a “secure environment”, but the truth is that those services are exactly the same that run on any normal server, and can be hacked with the same tools (metasploit,hydra,sqlmap…), the only thing you have to do is launch a transparent proxy […]

Variety Jones, Alleged Silk Road Mentor, Arrested in Thailand

MORE THAN TWO years after Ross Ulbricht was arrested in a San Francisco and accused of creating and running the Dark Web drug bazaar known as the Silk Road, a manhunt on the other side of the world has found the man believed to be Ulbricht’s closest adviser and mentor: Variety Jones. On Friday evening, […]