Tuesday, December 29, 2015

Monday, November 30, 2015

What Is the Difference: Viruses, Worms, Ransomware, Trojans, Bots, Malware, Spyware etc?

If you are among the ones who consider malware, worms, viruses to be the same thing then you’re on the wrong track. Read further, and improve your knowledge about these terms.

If you’re a regular or even an occasional computer user, then you might’ve heard the terms like Viruses, Worms, Trojans, Bots, Malware, Spyware, etc. But honestly speaking, we consider all these to be a Virus, no matter, whatever be their type. But have you ever tried to acknowledge, what is the difference between these terms, although they are meant to harm your device, steal your data or spy on you, have you ever thought why they are named so differently. Basically, terms like Viruses, Trojans are all types of malicious software or simply ‘Malware’. Now, the first and foremost question arises, where did these terms came from?

Friday, November 20, 2015

You Need To Explain Why You Dont Want Your Real Name On Facebook

Facebook Will Soon Allow You to Use Your Alias
In one of the major turnarounds, Facebook is letting go its ‘Real Name’ policy, with a few conditions. Facebook on Friday, announced that it is modifying the terms of its heavily criticised “real name” policy which demands users go by their “authentic name” when on the social network rather than an alias to protect their identity.

Wednesday, November 18, 2015

FBI denies paying $1 MILLION to Unmask Tor Users

#Tor #Privacy

Just day before yesterday, the Tor Project Director Roger Dingledine accused the FBI of paying the Carnegie Mellon University (CMU) at least $1 Million to disclose the technique they had discovered to unmask Tor users and reveal their IP addresses.

However, the Federal Bureau of Investigation has denied the claims.

In a statement, the FBI spokeswoman said, "The allegation that we paid [CMU] $1 Million to hack into Tor is inaccurate."

Friday, October 9, 2015

Cisco Takes Down Ransomware Operation Generating $30 Million in Revenue For Hackers

This will blow the minds of every single cyber criminal group out there – Researchers have discovered a group of hackers that is making an estimated $30 Million a year from their online criminal operation.

Yes, $30 MILLLLLLION annually.

Wednesday, October 7, 2015

The New Microsoft Surface Book :)

#‎Microsoft‬ Launches its 1st Laptop, called "The Surface Book", reportedly 2 times faster than Apple's Macbook Pro.

Thursday, October 1, 2015

Malware Attack to Make ATMs Vomit Cash


Short Bytes: Security firm Proofpoint has noticed some instances of a new ATM malware called GreenDispenser. Hackers can empty the whole ATM machine without leaving any trace as the malware uses a deep delete process to erase itself.

A new type of ATM malware has been detected by security researchers in Mexico. The malware enabled the cybercriminals to take the complete control of the cash dispensing machines.

The security firm Proofpoint has reported that it has noticed some instances of a malware called GreenDispenser that gives a fake error message that reads, “we regret this ATM is temporary of service”. So far the attacks have been centred on Mexico, but the researchers think that it could be easily implemented anywhere in the world.

Friday, September 25, 2015

Best 10 Apps For Android for Pentesters, Hobbyists and Researches

Image result for android pentester

Here’s a look at the Top 10 hacking apps for Android smartphones and tablets

Linux is regarded as the best operating system for ethical hacking and penetration testing also called pentesting. There are various hacking apps available for Android, as it is a Linux based operating system. If you want to test out vulnerabilities and find bugs, you need a solid hacking tool to back your research up.

Below is a list of Android hacking applications that will convert your Android device into a hacking machine.

Thursday, September 24, 2015

Bitcoin is Now a Commodity in US

In a recent report The Hacker News (THN) had mentioned about banks adopting the Blockchain Technology from Bitcoins; to create a safe and secure distributed ledger.

Now, last week U.S. Commodity Future Trading Commission (CFTC), has added Bitcoins and other virtual currencies to the commodities basket which previously includes Gold, Crude Oil, foreign exchange, and Stocks.
CFTC is an oversight committee of the USA, established to protect the interest of the people who have invested in any of the commodities by ensuring the conduct of no malpractices. The commodity swaps are working according to the Commodity Exchange Act (CEA).

BITCOIN - Commodity for the Conduct of Trade

Implying which now the Bitcoins and other virtual currencies, considered as cryptocurrency earlier, are now known as commodities for the conduct of trade.

Moreover, after being tagged as a commodity and making its entry into CEA by CFTC, Bitcoins made it obvious that they are not having any five-year plans to do so rather they have already done it.

Moreover, it is now compulsory for every Bitcoin holder to comply with the CEA, and if not, then CFTC would take strict actions against them.

Considering a scenario, by comparing stolen money and stolen Bitcoin (post becoming a commodity), when stolen cash is reused nobody asks the owner of the cash any question but when a stolen product (commodity) like gold or Bitcoin brought for a reuse, that definitely is followed by a series of question.

Going back to the risks associated with the Bitcoin as a virtual currency, where the World's Largest Bitcoin Exchange Mt. Gox had to shut down its services because of stealing of Bitcoins.

Therefore, Bitcoins being a commodity will ensure its authorized and smooth swapping.

Source: The Hacker News