security ⌛︎ 2 min read 10 ways to protect Social Profiles from Hackers Some ways to protect your social profiles from Hackers called Black Hats or Crackers in a digitally open and social world
linux ⌛︎ 7 min read List of Linux Distros for Hacking These distributions are mainly used for pen-testing & to reveal & fix the vulnerabilities. Here is list of Linux Distros for Information Security & Hacking
Android ⌛︎ 1 min read Android apps collect questionable amount of user info: Research Thousands of smartphone applications available for download from Google’s Play Store may be collecting too much data from users, a security firm has said.
security ⌛︎ 1 min read Bulgarian blogger buys 1.1 million Facebook users' data for $5 A Bulgarian digital rights activist is the proud owner of your Facebook name, username, and email today. Bogomil Shopov bought this information for 1.1 million Facebook users for $5. According to Forbes [http://www.forbes.com/sites/andygreenberg/2012/10/25/facebook-investigating-how-bulgarian-man-bought-1-1-million-users-email-addresses-for-five-dollars/] , Shopov purchased the data on Gigbucks [http:
security ⌛︎ 2 min read IEEE accidentally reveals nearly 100K user passwords The IEEE is a well-known organization for technologists and has over 400,000 members. A Romanian programmer discovered unencrypted IEEE login credentials left publicly available on its FTP server
Android ⌛︎ 4 min read Research Shows Serious Problems With Android App SSL Implementations Thousands of apps in the Google Play App Store contain serious mistakes in the way that SSL/TLS is implemented, leaving them vulnerable to man-in-the-middle attacks.
password ⌛︎ 2 min read Soon, eye movements can be your new password Taking cue from iris scans used in UID in India, researchers are developing a new biometric system that can identify people with their eye flicker pattern.
security ⌛︎ 1 min read Government plans cyber surveillance agency to monitor the web Idea is to keep a watch on web content in ‘public’ domain & has potential to create law & order problems like what India witnessed in recent Assam violence
security ⌛︎ 2 min read New encoding to make emails hacker-proof Computer scientists Duncan Wong and Xiaojian Tian of City University of Hong Kong, explain how the attempts of realizing perfect email privacy with PGP by developing a technique to do so.
security ⌛︎ 1 min read Symantec reports a new malware for Mac Symantec has reported a new malware for Mac called OSX.Crisis. This malware has capability to spread to following: Mac, Windows, VMs, & Windows Mobile
security ⌛︎ 1 min read Key facts about virus that can steal banking credentials A new computer virus, dubbed Gauss, has been discovered in the Middle East. Researchers say can it steal banking credentials and hijack login information for social networking sites, email and instant messaging accounts. Cyber security firm Kaspersky Lab said Gauss is the work of the same “factory” or “factories” that
security ⌛︎ 5 min read How to keep yourself safe on the internet If we follow a few golden rules, we can easily protect our personal information and greatly reduce the possibility of fraud.
security ⌛︎ 2 min read 90% SSL websites are vulnerable to the BEAST SSL attack Trustworthy Internet Movement (TIM), 90% of the websites running on HTTPS enabled secure protocol are vulnerable to the SSL attack, BEAST.
security ⌛︎ 2 min read Apple is '10 years' behind Microsoft on security: Kaspersky As per Kaspersky, Apple is a long way behind Microsoft when it comes to security and will have to change the ways it approaches updates following the recent malware attacks.
security ⌛︎ 3 min read Thousands may lose internet in July Most victims don’t even know their devices have been infected, although malicious software probably has slowed their web surfing & disabled their antivirus
security ⌛︎ 1 min read Lost your USB Drive? Destroy it! If you have lost your memory stick, holding vital or sensitive information, you can easily destroy it by remote control after tracking it by GPS.
security ⌛︎ 2 min read 'Password1' is the No. 1 Password Employed by Business Users The business world has a password problem—starting with the fact that the No. 1 computer password employed by business users is, wait for it: “Password1”. Unfortunately, that’s just the most cringe-worthy example of bad enterprise security cited by Trustwave in its recently released Global Security Report for 2012.
security ⌛︎ 1 min read Indian Wi-Fi Networks Under Threat Indian computer security analysts have detected and alerted Wi-Fi users in the country against a possible virus attack that could lead to crashing and hacking of secure networks
security ⌛︎ 2 min read Koobface computer virus gang unmasked Online security researchers claimed to have identified the members of a Russian gang of cybercriminals behind the Koobface computer virus which has attacked Facebook and other sites.
security ⌛︎ 1 min read Facebook 'security glitch' reveals Mark Zuckerberg's private photos Even Facebook founder Mark Zuckerberg has become a victim of privacy loopholes in the social networking site, after some of his private pictures were posted online. The bug in the website’s photo reporting tool, which Facebook says was only temporary and has now been fixed, meant that users could
adobe ⌛︎ 1 min read Adobe warns Android, Mac, and PC users of Flash security hole Adobe is warning Android handset and Windows, PC, Linux, and Solaris users out there about a new security hole in Flash 10.3. The glitch makes it possible for malware-infested sites to manipulate a users’ computer or Android device and run wild with it. If your device is infected, malicious
security ⌛︎ 2 min read Second computer worm hits Iran Iran has been hit with new malicious software as part of cyber attacks against the country, a military officer told Mehr news agency on Monday without specifying the target.
linux ⌛︎ 1 min read The Blackbuntu: Ultimate Os For Hacking! Blackbuntu is a penetration testing distribution specially designed for security training students and practitioners of information security.
Mozilla ⌛︎ 1 min read Mozilla Exposes Add-On Developer User Data User data for some registered developers of Mozilla Add-ons was temporarily exposed by mistake. Mozilla has disabled those users’ accounts and informed them
security ⌛︎ 2 min read Stuxnet virus could target many industries A malicious computer attack that appears to target Iran’s nuclear plants can be modified to wreak havoc on industrial control systems around the world