Browsing tag

Encryption

New “B1txor20” Linux Botnet Uses DNS Tunnel and Exploits Log4J Flaw

A previously undocumented backdoor has been observed targeting Linux systems with the goal of corralling the machines into a botnet and acting as a conduit for downloading and installing rootkits. Qihoo 360’s Netlab security team called it B1txor20 “based on its propagation using the file name ‘b1t,’ the XOR encryption algorithm, and the RC4 algorithm […]

Chinese VPN app Quickfox caught exposing 1 million users’ data

The Quickfox VPN is mainly used by Chinese citizens living abroad who need to access Chinese websites as most of these sites are geo-restricted. Wizcase’s team of ethical researchers, led by Ata Hakcil, discovered a “critical leak” that the researchers found to be exposing personally identifiable information of at least one million users of a […]

How to use VPN to access blocked websites?

Governments and regimes across the globe use censorship as a tool to control the flow of information. This article highlights how one can use VPN to access blocked websites. If your country censors the internet and blocks sites like Facebook, Twitter, or YouTube then a VPN is what you need. When a user visits a […]

800+ criminals arrested after FBI turned Anom app into honeypot

Generally, agencies crack messages or seize an already available encrypted communication platform to keep track of cybercriminals. Two such examples would be Encrochat and Phantom Secure, which were encrypted messaging networks. However, it turns out that, like always FBI has been a step ahead of other agencies as it took control of a full-fledged encrypted […]

Feds Secretly Ran a Fake Encrypted Chat App and Busted Over 800 Criminals

In an unprecedented sting operation, the U.S. Federal Bureau of Investigation (FBI) and Australian Federal Police (AFP) ran an encrypted chat service called ANoM for nearly three years to intercept 27 million messages exchanged between criminal gang members globally. Dubbed Operation Ironside (AFP), Operation Greenlight (Europol), and Operation Trojan Shield (FBI), the long-term covert probe […]

GitHub Will Now Support Security Keys for SSH Git Operations

Around two years back, North Carolina State University researchers discovered [PDF] that over 100,000 GitHub repositories had leaked cryptographic (TLS and SSH) keys and API tokens. The researchers discovered this by scanning only 13% of its public repositories over six months and found that thousands of new repositories were leaking secrets almost daily. GitHub Announces […]

A simple guide to keeping customers safe on your website

Forget about your products and services. Ignore all of your marketing efforts. The most essential aspect of a successful online business is security. If your security is lackadaisical, this could ultimately spell the end for your business – whether it’s due to a loss of finances or because it destroyed your reputation.  As a result, […]

WhatsApp is reportedly working on web version without connected phone

When you think of WhatsApp, other than privacy concerns, the first thing that comes to your mind is chats or free video calls. While it’s not far from the truth at all, the world’s most popular instant messaging app won’t require having a phone connected to work in the near future. You can use WhatsApp […]

Signal CEO hacks Cellebrite cellphone hacking, cracking tool

Moxie Marlinspike, CEO of Signal states that since Cellebrite itself makes a living from undisclosed vulnerabilities, he decided to disclose the vulnerability to the public rather than informing the company. In December 2020, Cellebrite claimed that it could easily crack Signal’s encryption. However, it seems like tables have turned for the Israel-based software maker since […]

Scientists Crack Largest Encryption Key After 35 Million Hrs Of Computing

French scientists have set a world record by cracking the most complex cryptography algorithm to date. The encryption key, in this case, was 240 characters long making it 8 characters longer than the previous record. RSA-240, the encryption key cracked to achieve this feat is 795 bits in size and has 240 decimal digits. To […]

About Internet Anonymity, Our Life and Its Relativity

So, you have some reason to remain anonymous on the net. You open Google, type in something like: “Basics of Internet anonymity” and get some results. One way or another, all the search results offer several basic solutions, including proxy, VPN, Tor, and I2P. These options help to form the basic level of anonymity. Level […]

Police confiscate surveillance van loaded with hacking tools

Earlier this year, the Israeli owner of the van demonstrated how hacking tools in his surveillance van were capable of hacking any smartphone. If there’s one thing that can be detrimental to any cybersecurity expert, it is bragging. Sure, you may have bragging rights but using them can land you in very hot waters – […]

US And UK Ask Facebook To Create A “Backdoor” To Access Encrypted Texts

The US, UK, and Australia are putting pressure on Facebook to create a backdoor in its encrypted messaging apps that would allow the governments to access encrypted texts. The open letter, obtained by BuzzFeedNews, has been signed by the US attorney general Bill Barr, US acting secretary of homeland security, UK home secretary, and the Australian […]

Meet Utopia; a privacy focused decentralized P2P ecosystem

Are you one of those individuals who believe they don’t need online privacy because there is nothing to hide? That is an argument but protecting your data will help limit the power of advertisers and companies who influence you every day. “Why should I care? What services guarantee web-privacy and how?”. That’s what I will […]

Dodging bad passwords with Google’s new tool

Google’s new Password checkup extension checks for leaked credentials and informs whether they have been leaked before in a data breach. In 2019, more than 20 million unique passwords among other credentials were leaked and available online for sale. This fact represents only one year since the advent of the internet and over the years […]

PGP Encryption: How Strong Is PGP Security?

Today, privacy is a huge concern for many internet users. With cybercrime on the rise, hackers are victimizing millions on the internet through fake emails and tapping into unsecured network communications. Because of the rising vulnerability of network-to-network communication over the internet, it’s important to set up Pretty Good Privacy, or PGP encryption and security, […]

Researchers Are Using $10 Raspberry Pi Zero For ‘Cheap Encryption’ In Space

There are several techniques of encryption that are deployed to secure communication protocols and devices but these techniques aren’t effective if you want to secure a satellite or spacecraft in space. Encryption in space is a tad different than how it is deployed on Earth. One of the reasons why encryption in space is challenging […]

Improve security of your Linux OS with simple steps

It’s normal to hear Linux users brag about security and sometimes tease Windows users. Some Linux users have this perception that security is assured simply by running Linux as well as configuring a Linux VPN. According to the Berkeley Linux Users Group, several enterprises have started switching to Linux mainly because of the security challenges […]

Tech Companies “Must” Put Backdoors In Encryption, Demands US Attorney General

Encryption has always irked law enforcement agencies and now William Barr, the US General Attorney, has launched a fresh attack against consumer encryption. He says that tech companies must co-operate with government institutions in bypassing encryption deployed in messages during critical cases. Encryption is ubiquitous as most tech companies including WhatsApp, Facebook, Instagram, and Apple […]

This Is How Your Favorite Netflix Movies And Shows Are Pirated

A person who is a part of the pirate world has revealed that the sites and groups like TBP, YTS, RARBG, etc. we see on the internet are just the tip of the iceberg. There is a lot more about how the pirate world works. How does it obtain copyrighted content from various sources, process […]