Ransomware has risen dramatically since last few years… so rapidly that it might have already hit someone you know. With hundred of thousands of ransomware samples emerging every day, it is quite difficult for traditional signature-based antivirus products to keep their signature database up-to-date. So, if signature-based techniques are not …
Read More »WHOLE DISK ENCRYPTION AND FILE SHREDDING
Now that we have PGP figured out, hopefully, I want to remind you that using PGP whenever possible, is very very very important. One of the pitfalls of Silk Road 1, is that some of the administrators, including Ross himself did not always communicate using PGP encryption. Once Ross was …
Read More »Everything You Need to Know on Tor & the Deep Web
Many people think that the whole of the internet can be accessed on their normal browsers such as Chrome, IE or Firefox. This is not the case. These mainstream browsers only give you access to 4% of the actual internet. There is a further 96% of hidden content in a …
Read More »‘CrashSafari’ Links Will Kill Your iPhone
here’s a web page out there called Crash Safari that uses JavaScript to put your browser into a loop, crash it, and potentially crash your device as well. Apple is aware of the page — and more importantly, the code — and is looking into a fix. The internet being …
Read More »The Most Trusted Messenger for Private Chat
Telegram Messenger – what’s good? I’ve been using WhatsApp for more than 3 years now but lately it has been getting slow. A notification will be delayed by a couple of minutes, that funny video shared in the hilarious group will time out – little things like that. Granted, I got …
Read More »How To Install and Configure Elasticsearch on Ubuntu 14.04
Introduction Elasticsearch is a platform for distributed search and analysis of data in real time. Its popularity is due to its ease of use, powerful features, and scalability. Elasticsearch supports RESTful operations. This means that you can use HTTP methods (GET, POST, PUT, DELETE, etc.) in combination with an HTTP …
Read More »How Hackers Can Hack Your Chip-and-PIN Credit Cards
Now, a group of French forensics researchers have inspected a real-world case in which criminals played smart in such a way that they did a seamless chip-switching trick with a slip of plastic that it was identical to a normal credit card. The researchers from the École Normale Supérieure University …
Read More »Google Secretly Records Your Voice
OK, Google is Listening… and Recording too. Google is not just listening to your searches, but the search engine is also recording and storing every single voice search you make. Google is incredibly accurate at understanding your voice. The company secretly stores its users’ searches from its voice-activated assistant Google’s …
Read More »Multiple XSS security vulnerabilities in the Visual Composer WordPress plugin
There are multiple XSS security vulnerabilities in the Visual Composer WordPress plugin versions prior to 4.7.4 (releases prior to October 2, 2015). Finally WP Bakery, the creators of Visual Composer, who have addressed all identified vulnerabilities and undertaken a code audit to ensure that it is as secure as possible.Developers whose …
Read More »How to Backup your WhatsApp data onGoogle Drive
The more we rely on our smartphones for every facet of our lives, the more risk there is of losing important data if your phone gets lost, stolen or destroyed. Android already has some backup services built in, but the massively popular chat client WhatsApp has just announced a partnership …
Read More »