Tag Archives Virus Security Alert

With about 74 percent of the world to be attacked each year and the economic losses by such cyber-attacks to reach $3 trillion by 2030, Microsoft has called on the governments around the globe to create a digital Geneva Convention just like the war weary nations in 1949 came together and drew up Geneva Conventions which now binds 196 countries.…

Ever since its inception in 2006 in Iceland, Wikileaks has released a number of significant documents that have been front-page news items across the globe. Recently this international Non for profit organization that specializes in exposing secrets has dumped thousands of confidential documents detailing the hacking tools and methodologies adopted by Central Investigation Agency of US. While the CIA has…

IDB is a tool to simplify some common tasks for iOS app security assessments and research. It is written in ruby with a Qt GUI front-end and should run on OS X and Linux (with some restrictions). The code is available under the MIT license on GitHub. Salient features Simplified pen-testing setup Setup port forwarding Certificate management iOS log viewer…

A cyber-attack last month, disabled thousands computers across several government ministries in Saudi Arabia. A rare cyber weapon was used to destroy and erase data. Malware used to violate the data of Saudi Arabian Oil Co in 2012 was employed again, this time rendering more than 35,000 computers worthless in a matter of minutes. As the abode of almost half…

The importance of mobile cannot be overemphasized. But the soul of your handy gadget is none other than the data pack. Here are some tips to make the data go way longer. 1. Watch YouTube Videos on Low Resolution YouTube offers a plethora of fun videos to watch and enjoy but watching these on mobile is a guaranteed way to…

Several W-Fi penetration testing tools in the market are employed by hackers. These tools can be effectively used to analyse and protect Wi-Fi networks from attacks and make them secure. Kismet: Kismet is an IEEE 802.11 (Wi-Fi) Layer 2 wireless network sniffing and intrusion detection tool which is typically utilised for Wi-Fi troubleshooting. This tool has client/server modular architecture and…

More than one million accounts hacked, with the number increasing by 13,000 every single day. These are the figures associated with the latest large scale malware attack, known as the Gooligan attack. The Malware, after infecting your mobile phone, roots it, steals authentication data and hacks into your Gmail accounts, including the Play Store. It then starts downloading malicious apps.…

Though email communication could not be more secure than secure messaging, after reviewing different service provides we provide a list that you may select from: Hushmail.com - This email provider has been there for a long time and been offering decent service and better terms and conditions. However, it has implemented features that allow it to access users accounts in…

The fabled television series where a hacker becomes virtually invisible to the mainstream is something many geeks would love to be one if possible. Mr. Robot is a fictional character and the steps he takes to become invisible may well be fictional as well but we can show you how to PWN your spare smartphone using the Kali operating system…

This time it is AdBlock Vs Facebook. So AdBlock makes it quite easy for people to block ads on their devices and this has got Facebook a bit on their nerves. Everyone was thrilled to see this happen on smartphones and devices. However, since then; advertising being Facebook's revenue model, it has found a work around to AdBlock Plus's blocking…

12
Close