Hacking TOR Hidden Services

Hacking TOR Hidden Services What is Tor ? Tor stands for The Onion Route it aims to conceal its users identities and their online activity from various surveillance and traffic analysis algorithms. Tor network uses an implement of .onion routing for sites and web applications hosted on the Tor hidden network. Tor encrypts and randomly […]

10 Android Developer Options Hidden Features For Advanced Users

Short Bytes: At some point, you would have owned an Android device, but have you ever managed to scratch the surface of its capabilities? Probably not, and that is where Android Developer options come into play. Here, I’m going to tell you about the 10 Android Developer options hidden features. By enabling or disabling them, you […]

Ransomware hidden inside a Word document that’s hidden inside a PDF

SophosLabs has discovered a new spam campaign where ransomware is downloaded and run by a macro hidden inside a Word document that is in turn nested within a PDF, like a Russian matryoshka doll. The ransomware in this case appears to be a variant of Locky. Most antivirus filters know how to recognize suspicious macros in documents, but […]

Create TOR’s Hidden .Onion URL Of Any Site With Free EOTK Tool

Short Bytes: Want to create Tor’s hidden .onion URL of a website? A free tool named Enterprise Onion Toolkit (EOTK) can help you out with this process by creating a man-in-the-middle proxy between the website and users. It should be noted that his tool only adds a .onion URL for anonymous users; it doesn’t hide your […]

Android Smart Lock: 8 Hidden Ways To Unlock Your Android Smartphone

Short Bytes: Google’s Smart Lock includes various methods to unlock an Android device. You can use voice recognition, facial recognition or a Bluetooth-connected device to gain access to your phone. Using smart lock, you can also keep your phone unlocked while it is in your hands or automatically unlock your phone when you reach a […]

Hidden backdoor discovered in Chinese IoT devices

Researchers at Trustwave have uncovered a backdoor in IoT devices from a Chinese manufacturer that could leave them open to exploitation. The backdoor is present in almost all devices produced by VoIP specialist DBLTek, and appears to have been purposely built in for use by the vendor. It uses a simple challenge and response mechanism […]

Steghide – Tool To Find Hidden Information And Password In A File

Steghide, is a tool that executes a brute force attack to file with hide information and password established.   Linux operating system Steghide Python     Step 1: Download and install Steghide from GitHub or enter the following command on your Linux terminal: git clone https://github.com/Va5c0/Steghide-Brute-Force-Tool.git   Step 2: Now run the script by typing: python steg_brute.py [option] […]

FBI operated 23 Tor-hidden child porn sites, deployed malware from them

Researcher: FBI was likely enabled to run half of all child porn sites on the servers. As Ars has reported, federal investigators temporarily seized a Tor-hidden site known as Playpen in 2015 and operated it for 13 days before shutting it down. The agency then used a “network investigative technique” (NIT) as a way to ensnare site users. […]

15 Hidden Features in Facebook Messenger You Might Not Know

Short Bytes: Messenger is a popular instant messaging platform. It supports text messaging, voice, and video calls. People can also send photos, emojis, stickers, voice messages, etc. in their conversations. But, there are some features in the Facebook Messenger which many people don’t know about. Facebook has promoted its Messenger as a separate platform in […]

10 Signs That Show There’s A Hidden Coder Inside You

Short Bytes: What are the signs that you should look for before joining a coding class? Apart from the love for programming, there are some other points that could become a reason for learning programming. These reasons include the problem-solving skills, will to create something new and having a better control over one’s work and […]

Hands-on: Blue Hydra can expose the all-too-unhidden world of Bluetooth

Bluetooth Low Energy devices like smart watches, “wearables,” give you up all day. My new neighbor was using AirDrop to move some files from his phone to his iMac. I hadn’t introduced myself yet, but I already knew his name. Meanwhile, someone with a Pebble watch was walking past, and someone named “Johnny B” was idling […]

Risk From Linux Kernel Hidden in Windows 10 Exposed at Black Hat

LAS VEGAS–Microsoft’s Windows 10 includes many innovative security features that are intended to help minimize risk and improve user experience. One such feature is Credential Guard, which aims to protect users against attacks. However, according to security firm Bromium, many risks remain.In a video interview with eWEEK ahead of a session on Aug. 4 at […]

Is Hidden Linux Subsystem In Windows 10 Making Your PC Unsafe?

Short Bytes: A security researcher has claimed that the newly-introduced Linux subsystem in Windows 10 could prove to be a risky affair by acting as a new attack layer. As this port of Ubuntu doesn’t run inside a Hyper-V hypervisor, the researcher claims that any malicious code injection in Linux applications can affect all files and […]

Voice Commands Hidden In YouTube Videos Can Hack Your Smartphone

Short Bytes: A combined research has been conducted by UC Berkeley and Georgetown University to demonstrate how distorted voice commands hidden in YouTube videos can be used to attack a smartphone. The research shows that certain harmful commands that can be understood by our voice assistants can be hidden inside a YouTube video. Speech recognition systems […]

Hidden Voice Commands Embedded in YouTube Videos Can Hijack Your Smartphone

Some attacks are hard to spot even by human subjects. A series of distorted voice commands surreptitiously hidden in YouTube videos can force unprotected Android or iOS smartphones to carry out malicious operations, researchers have discovered. Controlling smartphones with voice commands was already done last year when two security researchers from French agency ANSSI have used […]

How To Play Facebook Messenger’s New And Hidden Football Game

Short Bytes: Thanks to Euro 2016 season, Facebook has rolled out a new easter egg in the form of Messenger Football. All you need to do is send a football emoji to your friend and tap on it in the chat to start playing. It’s time to waste some time again as there’s a new […]

Crouching Tiger, Hidden DNS

An interesting DNS hijack that sets the victim’s computer to use specific DNS servers has emerged. Here are the key details of this intriguing threat.