Pages

Tuesday, December 29, 2015

Monday, November 30, 2015

What Is the Difference: Viruses, Worms, Ransomware, Trojans, Bots, Malware, Spyware etc?

If you are among the ones who consider malware, worms, viruses to be the same thing then you’re on the wrong track. Read further, and improve your knowledge about these terms.

If you’re a regular or even an occasional computer user, then you might’ve heard the terms like Viruses, Worms, Trojans, Bots, Malware, Spyware, etc. But honestly speaking, we consider all these to be a Virus, no matter, whatever be their type. But have you ever tried to acknowledge, what is the difference between these terms, although they are meant to harm your device, steal your data or spy on you, have you ever thought why they are named so differently. Basically, terms like Viruses, Trojans are all types of malicious software or simply ‘Malware’. Now, the first and foremost question arises, where did these terms came from?

Friday, November 20, 2015

You Need To Explain Why You Dont Want Your Real Name On Facebook


Facebook Will Soon Allow You to Use Your Alias
In one of the major turnarounds, Facebook is letting go its ‘Real Name’ policy, with a few conditions. Facebook on Friday, announced that it is modifying the terms of its heavily criticised “real name” policy which demands users go by their “authentic name” when on the social network rather than an alias to protect their identity.

Wednesday, November 18, 2015

FBI denies paying $1 MILLION to Unmask Tor Users



#Tor #Privacy

Just day before yesterday, the Tor Project Director Roger Dingledine accused the FBI of paying the Carnegie Mellon University (CMU) at least $1 Million to disclose the technique they had discovered to unmask Tor users and reveal their IP addresses.

However, the Federal Bureau of Investigation has denied the claims.

In a statement, the FBI spokeswoman said, "The allegation that we paid [CMU] $1 Million to hack into Tor is inaccurate."


Wednesday, October 7, 2015

The New Microsoft Surface Book :)

#‎Microsoft‬ Launches its 1st Laptop, called "The Surface Book", reportedly 2 times faster than Apple's Macbook Pro.


Thursday, October 1, 2015

Malware Attack to Make ATMs Vomit Cash

atm-hack-malware-greendispenser


Short Bytes: Security firm Proofpoint has noticed some instances of a new ATM malware called GreenDispenser. Hackers can empty the whole ATM machine without leaving any trace as the malware uses a deep delete process to erase itself.

A new type of ATM malware has been detected by security researchers in Mexico. The malware enabled the cybercriminals to take the complete control of the cash dispensing machines.

The security firm Proofpoint has reported that it has noticed some instances of a malware called GreenDispenser that gives a fake error message that reads, “we regret this ATM is temporary of service”. So far the attacks have been centred on Mexico, but the researchers think that it could be easily implemented anywhere in the world.

Friday, September 25, 2015

Best 10 Apps For Android for Pentesters, Hobbyists and Researches

Image result for android pentester

Here’s a look at the Top 10 hacking apps for Android smartphones and tablets

Linux is regarded as the best operating system for ethical hacking and penetration testing also called pentesting. There are various hacking apps available for Android, as it is a Linux based operating system. If you want to test out vulnerabilities and find bugs, you need a solid hacking tool to back your research up.

Below is a list of Android hacking applications that will convert your Android device into a hacking machine.


Thursday, September 24, 2015

Bitcoin is Now a Commodity in US

In a recent report The Hacker News (THN) had mentioned about banks adopting the Blockchain Technology from Bitcoins; to create a safe and secure distributed ledger.

Now, last week U.S. Commodity Future Trading Commission (CFTC), has added Bitcoins and other virtual currencies to the commodities basket which previously includes Gold, Crude Oil, foreign exchange, and Stocks.
CFTC is an oversight committee of the USA, established to protect the interest of the people who have invested in any of the commodities by ensuring the conduct of no malpractices. The commodity swaps are working according to the Commodity Exchange Act (CEA).


BITCOIN - Commodity for the Conduct of Trade

Implying which now the Bitcoins and other virtual currencies, considered as cryptocurrency earlier, are now known as commodities for the conduct of trade.

Moreover, after being tagged as a commodity and making its entry into CEA by CFTC, Bitcoins made it obvious that they are not having any five-year plans to do so rather they have already done it.

Moreover, it is now compulsory for every Bitcoin holder to comply with the CEA, and if not, then CFTC would take strict actions against them.

Considering a scenario, by comparing stolen money and stolen Bitcoin (post becoming a commodity), when stolen cash is reused nobody asks the owner of the cash any question but when a stolen product (commodity) like gold or Bitcoin brought for a reuse, that definitely is followed by a series of question.

Going back to the risks associated with the Bitcoin as a virtual currency, where the World's Largest Bitcoin Exchange Mt. Gox had to shut down its services because of stealing of Bitcoins.

Therefore, Bitcoins being a commodity will ensure its authorized and smooth swapping.

Source: The Hacker News

Wednesday, December 3, 2014

MVA Life Events: PHP for Azure

PHP for Azure
Looking to extend your coding toolbox with a tried and true language? Check out one of the most popular server side scripting languages, the easy-to-learn PHP, which is used in many blogging platforms. Hear about the history of PHP, explore its pros and cons, and take a look at configuration and debugging.

In this Jump Start training, join popular presenters Stacey Mulcahy and Jamie Kosoy, as they show you how to set up your development environment, teach you to write a basic blogging application, and step through deployment on Azure. You might be surprised at how quickly you can take an idea and get it up and running in PHP on Azure!


Course Outline: A History of PHP​
Getting Started
Convert Simple Static Website to Use PHP
Adding Custom Content and Databases
Making APIs with PHP
Deploying to Azure
Where to Go from Here


Instructor Team
Stacey Mulcahy | Microsoft Technology Evangelist Mulcahy is a developer, writer, tinkerer, speaker, and teacher, in addition to being a Microsoft Technology Evangelist. Her work has earned her well-deserved admiration in the technology community. She has spoken at more than 45 events all over the world, including FITC in Toronto. Stacey has been published in Slate and Huffington Post and has contributed to several O'Reilly publications as a technical editor. She teaches in academic programs and industry workshops, and she regularly hosts technology webcasts.

​Jamie Kosoy | Arbitrary, Founder | @jkosoy Jamie Kosoy is the Founder of Arbitrary, an inventive digital agency. Equal parts creative thinker, educator, and programmer, Jamie brings more than 10 years of experience leading digital teams on projects with unique challenges or new technologies. Prior to founding the company, Jamie was Technology Directory at Big Spaceship, helping to grow the company into the digital powerhouse it is today. Jamie also taught for more than five years in the MFA Design + Technology Program at Parsons.


Register Here