- 77 facts about cyber crimes one should know in 2018 (INFOGRAPHIC)
- How CoffeeMiner Attack Hacks Public Wi-Fi And Uses Your PC For Mining Cryptocurrency
- Meltdown and Spectre exploits: Cutting through the FUD
- WPA2 encryption can now be hacked with new KRACKS method
- 10 private search engines that do not track you
- How to see who viewed your Facebook profile 2,802 visits
- Build own OpenVPN server by using raspberry Pi (Part1/2) 2,751 visits
- How to make SOCKS proxy server by using Raspberry Pi 1,253 visits
- Checkpoint FW GAIA – remote admin/expert password reset 1,005 visits
- Build own OpenVPN server by using raspberry Pi (Part2/2) 924 visits
How many information is out there, purposely being concealed for the sake of greater good, for the sake of our own safety? The number is probably unfathomable. Today, when everything is online, and our lives are intertwined with a world most of us know nothing about, privacy and safety become an issue of epic proportions.
After a series of ransomware attacks capturing the headlines past year, crypto mining malware and cryptojacking attacks came into the play. Just last month, a Starbucks customer found that the infected Wi-Fi hotspot was trying to mine Monero digital coins.
A breakdown of what the Meltdown and Spectre exploits are, what they aren’t, the risks they pose, and what you should do.
Security Researcher Mathy Vanhoef of Imec-DistiNet discovered a weakness within the WPA2 protocol, potentially affecting all the wireless routers supporting WPA2, an attacker can take advantage of this vulnerability by using key re-installation attacks (KRACKS).
Private browsing using the private or incognito modes provided in your browser, does not give you the level of privacy you think it does. If you really don’t want to be tracked and also don’t want anyone tracking your searches, try these search engines.
This exploit takes advantage of the ease of access tool on the login page by ‘tricking’ windows into launching a fully privileged command prompt by selecting ‘make items on the screen larger – magnifier’. By using this method you can simply reset admin admin account password, just by having physical access to the computer.
Cryptocurrency trading can be a lucrative career and has already made many a person very, very rich. Whether you’re a seasoned professional trader or a total cryptocurrency novice who only wants to buy your first cryptocoin, this list has something to suit your needs. Just the same if you want to back the ideals behind decentralized cryptocurrencies and help out the community.
The HBO hackers who have been notoriously leaking unaired TV show episodes and their scripts are acting well on their promise of continuously releasing new material. In the latest wave, the hackers have released more content, but it didn’t include Game of Thrones Season 7 episodes.
Have you ever wondered who viewed your Facebook profile? I know you have done it many a time. Unfortunately, there are no formal ways to get the information of your profile visitors on Facebook. But don’t worry! We got a few unofficial ways to figure out who visited your Facebook profile. You don’t have to rack your brain for doing that.
There are many commands that can irreversibly damage your system. Some are less cryptic than others, some look like plain gibberish. Here is a list of dangerous commands on Linux, some permanent and some that can be recovered from.
Last year the Internet was taken down by cyber criminals through a massive Distributed Denial of Service Attack (DDoS) attack using the infamous Mirai malware. But last Friday afternoon, almost 99 countries including Russia, UK, USA and Australia became victims of a worldwide mass cyber-attack that has been reported to have caused major disruptions to systems that were being used by hospitals, companies, and other institutions.
Earlier today, a massive ransomware campaign hit computer systems of hundreds of private companies and public organizations across the globe – which is believed to be the most massive ransomware delivery campaign to date. The Ransomware in question has been identified as a variant of ransomware known as WannaCry (also known as ‘Wana Decrypt0r,’ ‘WannaCryptor’ or ‘WCRY’).