Posts

Showing posts from 2019

Most Hackable Neaby Devices and Gadgets. || techtalksgroup ||

Image
Electrical grids, traffic lights, highway signs, air-traffic control, and even hospital networks—they're the large-scale operating systems we rely on to make our lives easier and better. And believe it or not, they're all connected to the Internet. These web-connected systems are so diverse in what they do, they fall into a very nondescript category called the "Internet of Things" (IoT). You might have heard of IoT. It's the same term thrown around to describe those cool gadgets that help us track our fitness, drive our cars, share our photos, stream our music, and check our email from almost anywhere. Chances are, no matter what you've done today, you've taken advantage of some device or system connected to the worldwide "web" of the Internet of Things. However, despite IoT's promising future, it has one very serious setback: it's vulnerable to attack. As much as 70 percent of IoT devices contain security flaws, which means that billions...

What are Red Rooms.? Do they really Exist in the Dark/Deep Web. ?

Image
Red Rooms are basically one of the darkest places on the deep web. It basically charge money in bitcoins for viewing unimaginable videos like murders, rapes etc... ‘Red Room’ sites, the story goes, are darkweb sites where users pay thousands – or tens of thousands – to watch rapes and murders live. Urban legends about the existence of ‘Red Rooms’ have circulated for years – but as yet, there’s no evidence that they exist. If ‘Pay per View’ torture sites do exist, it’s almost certain that they don’t work via Tor (the software used to access dark web sites) – which is too slow to stream video live. The term ‘Red Room’ has been around on the internet for more than  decade – thought to originate either from ‘red rum’/’murder’, or from the 1983 horror film Videodrome, where torture is shown live on satellite TV in a red-painted room. The video Daisy’s Destruction – widely discussed on forums and on Reddit – is not actually a snuff film, but features horrifying abuse and sexual ...

What is Cookie Stuffing and Ad Fraud Scheme ? || techtalksgroup ||

Image
Cookie Stuffing, also known as Cookie Dropping, is one of the most popular types of fraud schemes in which a website or a browser extension drops handfuls affiliate cookies into users' web browser without their permission or knowledge. This type of SIVT involves inserting, deleting, or misattributing cookies to manipulate or falsify the prior activity of users. Also known as ‘cookie dropping,’ it pertains to the fraudulent manipulation of visitor cookies to disguise or conceal legitimate user cookies. Often considered a black hat online marketing technique, cookie stuffing can potentially generate fraudulent affiliate income for the cookie stuffer by overwriting legitimate affiliate cookies. A website visitor may unknowingly receive a third-party cookie from a website unrelated to the one actually visited. Later on, if the visitor goes to a targeted website and completes a qualifying transaction or makes a purchase, the cookie stuffer illegally earns a commission from the...

eMMC vs SSD ?? What's the Difference. Check it Out.!! || tech talks group ||

Image
If you're shopping for a new laptop, there are a lot of factors to think about. One of the most important aspects to consider is the kind of storage a laptop offers. Your average laptop (whether it's a 2-in-1, big and expensive, or budget-friendly and compact) will most likely sport either eMMC storage or SSD storage, but how are they different? Keep reading to learn more about eMMC hard drives vs. SSD hard drives. What Is eMMC Storage and How Does It Work? eMMC (embedded MultiMediaCard) storage is a form of internal storage made up of a controller and NAND flash memory, both of which are located in one integrated circuit. eMMC storage chips are usually embedded in a given device's motherboard. The controllers housed within eMMC chips have the ability to put data into storage, which, according to SearchStorage, allows the device's CPU to conserve its already limited speed and power for other computing tasks. In addition, eMMC's use of NAND flash memory also r...

Security Bugs and Vulnerability - The Vulnerability Landscape

Image
Cyber security is an arms race between offensive and defensive capabilities, and unfortunately, we are losing this battle. As users, we want better technology doing cooler things enabling us to do more. But the more we have, the more we rely on it,  and the more complex these systems become. Complexity is the enemy of security. In fact, complexity is a nemesis of security, which is one of the main reasons why we’re losing this arms race. I’m going to get you up to speed on security bugs and vulnerabilities and how they affect your security. A security bug and a vulnerability are actually the same thing. So they’re synonyms for each other. So if I say security bug or vulnerability, it’s the same thing. And it’s an error. It’s an error written into software that creates a potential for a threat agent, such as a hacker, to exploit it. So an example might be the recent Heartbleed bug which you may have heard about because it was on mainstream news. This is a bug in something ...

Spyware, Adware, Scareware, Pups & Browser Hijacking || tech talks group ||

Image
Spyware have its main purpose is to gather information and send it back to the attacker, well, to spy. The attackers don’t generally want to cause damage directly, but want to compromise your privacy and anonymity based on some agenda they’ve got. Spyware is intelligence gathering malware. For example, a rootkit can also be a Trojan horse, someone could call spyware a virus. The point is just to understand the variants that exist and the possible purpose of the malware.  Adware , which some people consider it to be a form of spyware. Is undesirable software that forces advertisement on you. There are millions of different variants of this. One of the most annoying and destructive form of adware is called Cool Web Search. You may even have encountered it yourself, but there’s nothing cool about it at all. Know Your Enemy - The Current Threat and Vulnerability Landscape It hijacks your default search engine, it ...

AWS vs Azure vs Google. Which is best for Cloud Computing.? || techtalksgroup ||

Image
Having taken over our daily communications almost entirely, the web is constantly evolving and expanding. With this continuous expansion, it provides you with more and more data which you consume daily. However, all the information that appears on the web, every like, subscription, tweet, downloaded video or uploaded vlog, making all of this possible requires a highly sophisticated computational process working behind it, constantly. The smooth functioning of the web has more to it than just the computational procedure. Current web services operate through a solid and intricate network of RAM, containers, database engines as well as machine learning skills. Importance Of Cloud Technology Due to continuous technological growth and advancements, the demand for cloud computing services is increasing, too. It has become essential for individuals and businesses to have a better storage space with increased security and faster service. There is no doubt about the fact that Goog...