Browsing category

Data Security

North Korea’s Linux-based Red Star OS is as oppressive as you’d expect

North Korea’s homegrown computer operating system mirrors its political one – marked by a high degree of paranoia and invasive snooping on users, according to two German researchers. Their investigation, the deepest yet into the country’s Red Star OS, illustrates the challenges Pyongyang faces in trying to embrace the benefits of computing and the internet […]

Gadget Hacks’ Favorite Must-Have Android Apps of 2015

Here at Gadget Hacks, we spend countless hours scouring the web to find the most interesting apps as they make their debuts, so the recent influx of new software has certainly kept us busy. And while many great apps from big companies debuted or received major updates throughout the year—like Facebook’s Messenger, Google’s Photos, and […]

ProxyBack Malware Converts Your PC Into Proxy

Palo Alto Networks researchers have identified a unique malware that infects home PCs and transforms them into internet proxies using HTTP tunnel. As per Palo Alto researchers, a Russian company’s domain is being used by attackers, which inherently is a patent Web proxy service. The malware has been named ProxyBack and it was firstly discovered […]

Common payment processing protocols found to be full of flaws

Stealing PINs and pillaging bank accounts are both trivial. Credit card users could have their PINs stolen, and merchants could have their bank accounts pillaged, in a set of attacks demonstrated by researchers Karsten Nohl and Fabian Bräunlein at the Chaos Computing Club security conference. Much research has been done into the chips found on credit […]

North Korea’s Linux (Red Star OS) is a nut hard to crack

North Korea is known as an authoritarian state but researchers have found their technological systems to be following the same path. Researchers have scrutinized the Linux distribution, Red Star OS, in North Korea and found it to be very restrictive. Previously, the operating system was found to be watermarking all the files on the USB […]

How the Internet of Things Got Hacked

THERE WAS ONCE a time when people distinguished between cyberspace, the digital world of computers and hackers, and the flesh-and-blood reality known as meatspace. Anyone overwhelmed by the hackable perils of cyberspace could unplug and retreat to the reliable, analog world of physical objects. But today, cheap, radio-connected computers have invaded meatspace. They’re now embedded […]

China passes controversial anti-terrorism law to access encrypted user accounts

China’s legislature unanimously passed a controversial anti-terrorsim law on Sunday despite months of objections from major tech firms and Washington alike. Among other requirements, the new rules state that telecom operators and internet service providers must “provide technical support and assistance, including decryption” to Chinese authorities to help prevent and investigate terrorist activities. The new […]

Hack Like a Pro: Using Sparta for Reconnaissance

As all of you know, reconnaissance is critical to being successful in a pentest or hack. Recon is where we gather all the information we need to determine the best strategy for hacking. Without good recon, we are likely to waste many hours and be unsuccessful. Professional hackers know that good recon is key to […]

Adware Sneakily Turns Off Firefox Safe Browsing

Mintcast adware uses user.js settings files for persistence.Two PUPs (Potentially Unwanted Programs) are secretly turning off Safe Browsing support in Firefox to make sure they can deliver unsolicited ads and even malware if their creators ever wish to do so. The two PUPs are Shell&Services and Mintcast 3.0.1. These are browser add-ons for Firefox, Chrome, […]

Decade Old Software Bug Sets 3000 US Prisoners Free

A software bug in Washington State Department of Corrections (DoC) has been handing freedom to the inmates well before their sentence was due to end — Each year, over 3200 prisoners benefitted from this bug since 2002. Supreme Court ruling- The starting point All this started when a Supreme Court amended the 1995 law on […]

How to Become a Hacker

Presently, there is a worldwide shortage of skilled hackers and salaries are rising rapidly. This is a great time to pursue a career in hacking—and this is a good time to discuss how to become a hacker. Education vs. Experience There are many paths to entering this profession. Unlike, say medicine, where there is a […]

Spying using Smartwatches and other wearable devices

Wristband and armband devices such as smartwatches and fitness trackers could be used by attackers to spy on you! We have discussed several times about the possibility to exploit IoT devices to spy on individuals. Lack of security by design and poor security settings could open the door to hackers. A Smartwatch or afitness tracker can […]

India temporarily bans Facebook’s controversial free internet service

Facebook’s plan to bring limited, free internet access to India has hit a hurdle: a regulator in the country wants it blocked. India’s telecom regulator has asked that the service be disabled while investigating whether it poses a threat to net neutrality. In particular, the regulator is concerned about whether phone carriers should be allowed to […]

New Bug Lets You Crush Anyone’s WhatsApp with 4000 Smileys

Do you know crashing Whatsapp desktop or mobile version doesn’t require advanced hacking skills or machinery, what you need is 4000 smileys? Yes, it’s true, you need 4000 smileys to crash WhatsApp. This bug was exposed by a security researcher (Indrajeet Bhuyan) who during his experiments typed in 4000 smileys and the WhatsApp’s desktop version got […]

Whatsapp Crash V2 – crashing PC browser and mobile app

Last year I together with my friend Sourav Kar made the world’s smallest code which could crash whatsapp. In a video demonstration, we have showed that how a 2000 words (2kb in size) message in special character set can crash Whatsapp messenger app. Previous it was discovered that sending a huge message ( greater than […]

HACKERS GRAB DELUGE AND QBITTORRENT USER DATABASES

The websites of the torrent clients Deluge and qBittorrent, as well as the torrent site SumoTorrent, have reportedly been compromised. Access to the stolen user information including emails and hashed passwords is being sold online. Several torrent related websites have reportedly been compromised by hackers, exposing the personal details of thousands of members. Among the […]

Oracle settles with FTC over Java’s “deceptive” security patching

Commission faults Oracle’s Java SE update process with making consumers’ computers insecure. Oracle received a public slap on the wrist from the US Federal Trade Commission over Java SE, the desktop runtime for Java. The FTC announced today that it had reached a settlement with Oracle Corporation over a complaint not about the security of Java […]