Tag Archives Operating System

The Banks are investigating what is being considered as the largest system hack in the country’s history after malware was discovered on various workstations in the Polish banking industry. The malware infection ironically has resulted from the compromised servers at the Polish financial regulator, KNF itself. The KNF decided to take down its entire system after the discovery of suspicious…

With every gap pronounced, Whatsapp is releasing updates to close them and ensure a seamless user experience. Currently, WhatsApp is all set to introduce a new feature which will allow you to recall messages that were sent by mistake. As part of this update, Whatsapp will also allow live location tracking to know your contacts’ whereabouts in real-time. Interesting, isn’t…

The Indian Government plans to start a malware and botnet cleaning centre that aims to automatically clean computing devices such as mobiles and computers making them malware and virus free. This will be a free service offered as part of the cybersecurity initiative of Digital India. Soft Launch of the BotNet cleaning centre of India CERT will start from from…

Linux is an open source operating system which has evolved from its previous version Unix. Though other operating systems offer more user friendliness, Linux has some amazing features that make it a more preferred choice for use by hackers. A few of such features are described below: Strong Access and Control: Linux offers strong access and control to its users.…

Kali Linux is one of the best-known hacking tool collections, and their website provides many how-to hacking links. Brute Force Attack: Brute Force, as the name itself, suggests means, “breaking into” or “cracking into” - is a method used by application programs. This is used to decode encrypted data such as passwords through repeated efforts. It is more of a…

Xcode Ghost is a new type of malware, uniquely created and executed in cracked versions of Xcode, Apple’s tool for iOS and OS X app development. This malware is loaded onto apps, and works in the background of the application, seizing user information, which possibly included usernames and passwords. Apple has long been known to maintain an app store that’s…

Though email communication could not be more secure than secure messaging, after reviewing different service provides we provide a list that you may select from: Hushmail.com - This email provider has been there for a long time and been offering decent service and better terms and conditions. However, it has implemented features that allow it to access users accounts in…

Whatsapp Scams

Whatsapp is now the most popular messaging app across the world and more particularly in India. Everyone with a smartphone and Internet connection must have Whatsapp installed and the app is used in myriad number of ways. And as with any popular software and service, it has also become the target of major scams. So let us check out some…

While most laptop users would not bother about such things as people spying on them, since Facebook's CEO Mark Zuckerberg shared the tit bit about plastering his own laptop's webcam with a tape, people are now more cautious. This has spawned an enterprising industry of designer Webcam tapes and plugins specially geared to the high profile laptop user going from…

The fabled television series where a hacker becomes virtually invisible to the mainstream is something many geeks would love to be one if possible. Mr. Robot is a fictional character and the steps he takes to become invisible may well be fictional as well but we can show you how to PWN your spare smartphone using the Kali operating system…

Close