Skip to main content

Posts

Anonymous Publishes Three Guides To Teach You “How To Hack” And Fight ISIS

The war between the hackers and terrorists is escalating quickly in the wake of the recent Paris attacks. In the short time frame of past two days, Anonymous hacktivist group has  declar ed an open war on ISIS . In response, ISIS was quick to retaliate and   called Anonymous ‘idiots’   who just know how to ‘hack email and Twitter accounts’. In another development, Anonymous has released a series of guides urging the people to take part in their biggest ever operation called # OpParis . The guides include how-to instructions that tell the ways to hack the ISIS-affiliated websites and social media accounts. The rivalry of ISIS and Anonymous dates back to the Charlie Hebdo massacre in January. Anonymous has continued its attacks on ISIS and already exposed more than a thousand Twitter accounts. To train and bring the newer generation of hacktivists, Anonymous has released three how-to guides. These guides were posted on an IRC channel and Anonymous encouraged eve...

How to Build a Successful Incident Response Plan

The fight to protect your company’s data isn’t for the faint of heart. As an embattled IT warrior, with more systems, apps, and users to support than ever before, keeping everything up and running is a battle in itself. When it comes to preventing the worst-case scenario from happening, you need all the help you can get, despite your super-hero status. According to SANS, there are 6 key phases of an incident response plan. Preparation -  Preparing users and IT to handle potential incidents in case they happen Identification -  Figuring out what we mean by a “security incident” (which events can we ignore vs. which we must act on right now?) Containment -  Isolating affected systems to prevent further damage Eradication -  Finding and eliminating the root cause (removing affected systems from production) Recovery -  Permitting affected systems back into the production environment (and watching them closely) Lessons Learned -  Writing e...

Internet of Threats!

T he Internet of Things (IoT) is continuing to gain traction with an ever-increasing number of connected devices coming to market. But as tech-savvy consumers begin investing in their first devices for a connected home, what is to stop them becoming a cyber attacker's next target? While still uncommon, we know that cyber attackers are going after connected consumer devices, demonstrated on a massive scale by the group of Russian hackers who published thousands of live-streaming webcam footage from over 250 countries. Unless the manufacturers of connected devices take a holistic approach to bolstering their cyber security efforts, these types of attacks will increase in number. To gain a greater understanding of the cyber security risks that consumers could be exposing themselves to, research was conducted into the cyber security posture of six ‘always-on’ consumer IoT devices. The results were unsettling. Veracode carried out a set of uniform tests across all the...

How to protect your email from being hacked and from being spammed.

Here are some simple dos and don'ts that will keep your email accounts secured from hackers. First and foremost implement two step verification processes for all emails like Gmail, Yahoo! and Outlook. This will help you protect your account even if the password is compromised. Also while using an enterprise email service - use PGP to encrypt emails which may contain confidential information.  Never post your email account address on social networking websites like Facebook and Twitter or make them public for everyone. Organized cyber criminal use software that harvest email addresses which are further sold to spammers online. Instead of posting your email account on forms and websites as-it-is. You should avoid using the "@" and ".". So instead of writing my email as smit@hacker.com, I write it as smit[at]ha cker.com This is because hackers run automated scripts to gather information about particular domains which copies and text with the "@...

IoT’s Biggest Challenges : Privacy and Security

E verything today from your mobile to refrigerators to cars are interconnected, which made our life easier. This device collectively called IoT. But they have also created new vulnerabilities for hackers. IoT devices are poised to pervasive in our lives than mobile phones and they have access to sensitive personal data may be your credit card number, banking information and many more. As number of IoT devices constantly increase, security risk also increases. Device manufacture’s doesn't care much regarding device security and consumer have to suffer may he can be hacked and there may be severe consequences. A single security concerns on single device can cause multiple concerns when considering multiple IoT devices interconnected together. IoT devices use some form of cloud service and a mobile application use to access and control device remotely. So it’s very important to understand security risk. Current Scenario : Security Risks Privacy Concerns Many devices co...

100,000+ WordPress Websites infected By SoakSoak Malware

WordPress is the Best Content Management System (CMS) and number of bloggers and internet marketers uses WordPress CMS for their blog because of its simplicity and awesomeness. But Recently more than 100,000 WordPress websites/blogs are affected by the SoakSoak Malware. And millions of websites on the internet are currently using WordPress and this Malware can be the great threat. How to know whether your WordPress websites are infected by SoakSoak Malware ? Once you are infected with this Malware then you might experience some unexpected redirection to SoakSoack.ru and you will end up downloading malicious files in your computer without your knowledge.   Google (The Search Engine giant) has added more than 10,000+ WordPress websites to their blacklisted sites to protect the users and that can effect the revenue of the website owners. What dose SoakSoak Malware do to your WordPress Website/blog ? The SoakSoak Malw...

How To Stop People From Being Able To See That You Read Their Facebook Message

We all probably have a friend or two with an iPhone who chooses to leave their "Read receipts" on so you can tell when they've read a text. A lot of people think read receipts are the worst, which is why it's great that Apple allows you to turn them off. Facebook however, does not. When you read someone's Facebook message, they'll always know, seeing the specific time or just the date of when you read the message, depending on when they look back at it themselves. Quite frankly, sometimes you just want to be able to let someone assume that you missed their note. But that "Seen" check-mark makes it impossible to fake: Turns out, there actually  is  a way to disable Facebook read receipts, though not technically through Facebook. You can't avoid read receipts on mobile, but there are a few ways to essentially turn them off on desktop. W Unseen  is a free Facebook app that will let you secretly read messages without the sender...