Posts

Showing posts with the label Knowledge

From today, Google Chrome starts marking all non-HTTPS sites 'Not Secure'

Image
Starting today with the release of Chrome 68, Google Chrome prominently marks all non-HTTPS websites as 'Not Secure' in its years-long effort to make the web a more secure place for Internet users. So if you are still running an insecure HTTP (Hypertext Transfer Protocol) website, many of your visitors might already be greeted with a ' Not Secure ' message on their Google Chrome browser warning them that they can't trust your website to be secure. By displaying 'Not Secure,' Google Chrome means that your connection is not secure because there is no SSL Certificate to encrypt your connection between your computer and the website's server. So, anything sent over a non-HTTPS connection is in plain text, like your password or payment card information, allowing attackers to snoop or tamper with your data. The non-https connection has been considered dangerous particularly for web pages that transfer sensitive information—like login pages and paym...

Kali Linux 2017.2 Released with Powerful New Tools

Image
Kali Linux is a Penetration Testing Distribution based on Debian. Developed by Offensive Security. It is the world’s most capable and famous security testing platform, utilized by security experts in an extensive variety of specializations, including penetration testing, forensics, reverse engineering, and vulnerability assessment. Kali Linux 2017.2 With the new release, they have added dozens of Powerfull tools and also updates for existing tools, if you are kali lover then it’s time to Upgrade by using following Commands. First Time users can download from here . Some New Tools hurl  – a beneficial little hexadecimal and URL encoder/decoder phishery  – phishery lets you inject SSL-enabled basic auth phishing URLs into a .docx Word document ssh-audit  – an SSH server auditor that checks for encryption types, banners, compression, and more apt2  – an Automated Penetration Testing Toolkit that runs its own scans or imports results from vario...

Info Security Can Save Your Identity

Image
Cyber security has become a hot topic throughout businesses and organizations as new technology continues to develop. In the past several years the world has evolved around technology tremendously, making it hard for people to keep up and adapt to it. As new phones, computers, automated tellers, and security devices become familiar around the world; there are also people determined to break into them, as opposed to utilizing them correctly. These people are known as hackers, and they are dangerous. Their intention is to steal, bribe, and or threaten technology users for their information. Safety in the household, at work, and in the economy have increasingly developed into daily task items. Whether that means enabling a home safety device, locking a computer at work, or even encrypting bank information. The number of hackers increases daily around the globe and their actions ranging from spamming your email to as far as stealing encrypted data from banks and capital markets. The U...

Wannacry/ WannaCrypt Ransomware First Analysis Report

Image
CRITICAL ALERT Wannacry/ WannaCrypt Ransomware Original Issue Date:- May 13, 2017 Updated On:- May 15, 2017 Virus Type:-  Ransomware It has been reported that a new ransomware named as "Wannacry" is spreading widely. Wannacry encrypts the files on infected Windows systems. This ransomware spreads by using a vulnerability in implementations of Server Message Block (SMB) in Windows systems. This exploit is named as ETERNALBLUE. The ransomware called WannaCrypt or WannaCry encrypts the computer's hard disk drive and then spreads laterally between computers on the same LAN. The ransomware also spreads through malicious attachments to emails. In order to prevent infection, users and organizations are advised to apply patches to Windows systems as mentioned in Microsoft Security Bulletin MS17-010. https://technet.microsoft.com/library/security/MS17-010 After infecting, this Wannacry ransomware displays following screen on infected system: Source: Symante...

Ransomware Virus Also Strikes India, Systems Of Andhra Pradesh Police Hit

Image
An unprecedented global wave of cyberattacks, which affected over 45,000 computers in at least 74 countries since Friday evening, has also spread to India. NEW DELHI:   The unprecedented global wave of cyberattacks, which have affected over 45,000 computers in at least 74 countries since Friday evening, have also spread to India. Over 100 systems of the Andhra Pradesh police have been affected by the virus, called ransomware. Confirming the attack, Gulshan Rai, Director General of the Indian Computer Emergency Response Team (CERT-In), said "We held an assessment meeting today and have found that 102 systems of Andhra Police have been infected with ransomware, particularly those using the Windows operating system." Mr Rai added that it is not just the Andhra Pradesh Police system that would be affected but "while our experts are trying to debug the hacked systems, we will only know the real magnitude of the damage once offices re-open on Monday and systems are...

Google releases DIY open source Raspberry Pi 'Voice Kit' hardware

Image
Google has long been focused on artificial intelligence. Its Google Now and voice assistance projects have used AI to better the lives of users. The Google Home voice-based hardware unit brings its assistant to life, making traditional inputs and displays unnecessary. With just the power of your voice, you can interact with the device -- nothing else is needed. The search giant has decided to take artificial intelligence to the maker community with a new initiative called AIY. This initiative (found  here ) will introduce open source AI projects to the public that makers can leverage in a simple way. Today, Google announces the first-ever AIY project. Called "Voice Kit," it is designed to work with a Raspberry Pi to create a voice-based virtual assistant. Please keep in mind that the Pi itself is not included, so you must bring your own. For this project, you can use a Pi 3 Model B, Pi 2, or Pi Zero. Want a Voice Kit? Here's how to get it. Heck, you might be g...

WhatsApp lets you pin 3 chats to the top

Image
Those of us who use WhatsApp a lot know that the conversation list can get pretty crowded very fast with groups, plenty of family and friends, and random individual chats. That leads the important chats, the ones you come back to many times during the day, to always change their order in the list and jump up and down depending on when the most recent message was sent. So you're left skimming the list with your eyes, and sometimes scrolling down, to find that conversation you need. (Or you add a chat shortcut to your homescreen.) WhatsApp beta 2.17.162 (and now 163) solves that by adding one very handy little feature: pinned chats. Tap and hold on any chat and you get a new pin icon in the action bar next to the delete, mute, and archive functions. Once pinned, a conversation stays on top of the list regardless of the recency of the last message compared to other chats. You can only pin 3 chats after which you get a small toast notification message sayin...

Learning to code using bad web tutorials may be the reason for most security vulnerabilities

Image
The German cybersecurity researchers have found that many security vulnerabilities in many websites could, in fact, be due to people learning to code from popular online tutorials which are riddled with many mistakes. The Computer scientists from the Saarland University, the Technical University of Braunschweig, Technical University of Berlin, and the cybersecurity firm Trend Micro have analysed thousands of PHP programming projects on the  GitHub  and they have cross-referenced the code against a bunch of popular coding tutorials which rank at the top of Google. Most of the popular tutorials online focus on teaching the new coders how to perform a particular task, like how to create a search form in PHP or how to accept the user’s input from a HTML form /message box and output it in the JavaScript; or the tutorials on how to start using an open source database management system like  MySQL . These tutorials offer coding examples that people can copy, but more...

March 2017: The Month in Ransomware

Image
Whatever the reason is, ransomware activity skyrocketed last month. An influx of crude, unprofessionally tailored samples bombarded home users and enterprises, sometimes simply destroying data beyond recovery due to broken crypto. Meanwhile, high-profile threats like Spora, Sage, Cerber and Jigsaw became more sophisticated. The statistics for March are as follows: threat actors released 46 new strains and updated 20 existing ones. Although anti-malware labs and security enthusiasts were able to devise seven free decryptors, that’s still a disproportional achievement. Read this report to stay on top of the current ransomware trends. MARCH 1, 2017 The comeback of Crypt0L0cker A new wave of the Crypt0L0cker, or TorrentLocker, ransomware campaign breaks out after a lengthy standstill since mid-2015. The updated strain primarily  zeroes  in on European countries. Clever AV evasion by Locky According to Microsoft Malware Protection Center (MMPC),  the latest O...