Posts

Showing posts from July, 2018

How Gift Cards used by Cybercriminals to fetch personal data.

Image
By creating fake websites for free generation of gift cards, many cybercriminals are tricking users into parting with their time and data, for no return, researchers at cybersecurity firm Kaspersky Lab have warned.   While legitimate apps like Tokenfire and Swagbucks buy card codes from vendors, to then give them to clients as a reward for certain activities, criminals have apparently recognised the popularity of such websites and have decided to deceive users using a simple algorithm. "The success of these new fraud schemes is based on criminals exploiting the drive of users to get something for free," Lyubov Nikolenko of Kaspersky Lab said in a statement this week.  "However, at best they will spend hours of personal time doing worthless tasks, and at worst lose money without receiving anything in return. So, if you want to get your hands on a free gift card, try to earn it on legal and trustworthy sites," Nikolenko added. When on the fake site, the...

How to remove shortcut virus from drive.

Image
What is Shortcut Virus? This is quite a reasonable question regarding the fact if it is the first time that your Windows PC or Laptop has been affected by this shortcut virus. Now if you are one of that new victim of this Shortcut virus then here is what you will need to know about it. Shortcut Virus is one of the new Malware that turns any files on your Windows including folders and files into a shortcut. While hiding the original files on your Computer which is quite irritating the fact that all your important files on your Windows Computer will be inaccessible. Now another important piece of information that you should keep in mind is that most of this Shortcut virus on Windows Computer are undetectable by any of the Antivirus that are currently in the market. So the only option is to remove shortcut virus manually or by using a Shortcut Virus remover. How To Remove Shortcut Virus Permanently in PC/Laptop/Pendrive/Flash Drive: Here are some of the methods that I used ...

Advanced Wi-Fi Jamming Using MDK3.

Image
You may have heard of a signal jammer before, usually referring to a device that blasts out a strong enough radio signal to drown out the reception of nearby devices like cell phones. Purpose-built jammer hardware is outright illegal in many countries, but Wi-Fi is vulnerable to several different jamming attacks that can be done with Kali Linux and a wireless network adapter. Traditional signal jamming has been a cat and mouse game of detecting and disabling signals an opponent is using to communicate. Cutting off a target's ability to communicate leaves them isolated and vulnerable, making jamming these signals a top priority in modern day electronic warfare. Countries today have developed capabilities to jam and spoof cell phones, GPS, Wi-Fi, and even satellite links. Different Types of Jamming There are two main types of jammers: elementary and advanced. Here, we'll be discussing elementary Wi-Fi jamming, focusing on unencrypted management frames. Elementa...

Privacy VS Anonymity VS Security . Whats the difference between them. Check it Out.!

Image
Privacy, Security and Anonymity are common terms used in day to day life by normal people. People use these terms but sometimes get confused between these terms. Privacy: The terms privacy means when the client and the server both knows about each the but the people in the middle doesn't know what they are sending. " Suppose you want to send the letter  from A to C but the B does not know about the content in the letter is that much secured that it is not read by the mediator. Security:  The terms Security in normal means keeping your system secure with outer surrounding like web attacks, wireless attacks etc.. from hackers and crackers . Anonymity:  The terms anonymity means when the client access the services given by the server by keeping his identity anonymous that means the server does not knows about the client. For example the people use TOR browser for keeping their identity anonymous from the internet. So thats it. Hope you guys like it. If yes t...

Singapore's Largest Healthcare Group Hacked, 1.5 Million Patient Records Stolen. Check it Out.!

Image
Singapore's largest healthcare group, SingHealth, has suffered a massive data breach that allowed hackers to snatch personal information on 1.5 million patients who visited SingHealth clinics between May 2015 and July 2018. SingHealth is the largest healthcare group in Singapore with 2 tertiary hospitals, 5 national specialty , and eight polyclinics. According to an advisory  released  by Singapore's Ministry of Health (MOH), along with the personal data, hackers also managed to stole 'information on the outpatient dispensed medicines' of about 160,000 patients, including Singapore's Prime Minister Lee Hsien Loong, and few ministers. The Ministry of Health said the hackers "specifically and repeatedly" targeted the PM's "personal particulars and information on his outpatient dispensed medicine." So far there's no evidence of who was behind the attack, but the MOH stated that the cyber attack was "not the work of casual hackers...

Now Microsoft Powershell Core is now available for Linux OS

Image
Microsoft has released its command-line shell and scripting language PowerShell Core for Linux operating system as a Snap package, making it easier for Linux users to install Microsoft PowerShell on their system. Yes, you heard me right. Microsoft has made  PowerShell Core available to the  Ubuntu Snap Store  as a Snap application. PowerShell Core is a cross-platform version of Windows PowerShell that is already available for Windows, macOS, and Linux OS and has been designed for sysadmins who manage assets in hybrid clouds and heterogeneous environments. Snap  is a universal Linux packaging system, built by Canonical for the Ubuntu operating system, which makes an application compatible for all major Linux distributions without requiring any modification. A Snap package is basically an application compressed together with its dependencies and also includes instructions on how to run and interact with other software on various Linux systems. How to I...

SADD.IO .. A better alternative for VPN. Check it !!

Image
From an anonymity and privacy standpoint, how could an outside entity such as the government identify a specific VPN user? If the government sent out a subpoena to the VPN providers to obtain the crypto-keys to decrypt internet traffic or request logs to view user activity, would the VPN providers dispense that information? Does the VPN store personally identifying information (PII) of its users? From a security standpoint, will the VPN help prevent malicious actors from infecting user machines? These are some important questions that users should ask before determining that a VPN would keep them “safe” on the Internet. So is there a better solution than a VPN lying around somewhere? Yes, the new Internet Anonymity and Privacy startup SADD.IO gets the job done. What is SADD.IO? SADD: Scalable Anonymous Disposable Desktops or simply put SADD.IO , is a free web-based product that allows users to anonymously control self-disposing, Tor routed desktops through their w...

MAC Address..!

Image
MAC (Media Access Control) addresses are permanent by design, several mechanisms allow modification, or “spoofing”, of the MAC address that is reported by the operating system. This can be useful for privacy reasons, for instance when connecting to a Wi-Fi hotspot, or to ensure interoperability. Some internet service providers bind their service to a specific MAC address; if the user then changes their network card or intends to install a router, the service won’t work anymore. Changing the MAC address of the new interface will solve the problem. Similarly, some software licenses are bound to a specific MAC address. Changing the MAC address in this way is not permanent: after a reboot, it will revert to the MAC address physically stored in the card. A MAC address is 48 bits in length. A MAC address is a physical hardware address assigned to each device that has the capability of connecting to a network. The internet is nothing more than a large network. The MAC ad...