News: Kaspersky Offs Two Ransomware Strains
According to security firm Kaspersky Lab, CoinVault and Bitcryptor ransomware are officially dead.
According to security firm Kaspersky Lab, CoinVault and Bitcryptor ransomware are officially dead.
Smartphone users often wish for a privacy, where no one is able to poke his/her nose in their personal stuff. Unfortunately, none of the smartphones have been able to guard their privacy in this fashion. Smartphones usually come up with none or almost negligible built-in security to serve your purpose.
Thanks to a couple of photoshopped images that made rounds across Twitter last year, iPhone users were duped into thinking that iOS 8 included a security feature that would lock individual apps. Of course, none of it ended up being true, but we covered other features and apps that could accomplish roughly the same thing.
Beginning with KitKat, I've been used to customizing every aspect of my Android phone, but with the release of Lollipop, there is quite a bit of catching up that developers need to do. Most customization features, like quick settings rearrangement and theme support have already been ported over, but any type of lock screen customization has been noticeably absent.
Yes, "Safer Internet Day" is a real thing, and it's actually been around for 12 years. This year, Google again will be commemorating the event by giving away a 2-gigabyte storage bump for their Google Drive cloud service if you simply run through a security checkup.
Back in August, Google introduced Android Device Manager. This new service allowed you to locate, lock, or wipe a lost or stolen Android device from either a companion app or a web interface. Effectively, this is the "kill switch" that legislators are clamoring for.
Welcome back, my fledgling hackers! Awhile back, I demonstrated one of my favorite little tools, netcat, which enables us to create a connection between any two machines and transfer files or spawn a command shell for "owning" the system. Despite the beauty and elegance of this little tool, it has one major drawback—the transfers between the computers can be detected by security devices such as firewalls and an intrusion detection system (IDS).
Ubuntu isn't just a cool sounding name, but pegs itself as the world's favorite free operating system. It gained its popularity for being lightweight, fast, and visually appealing, and now that great look and speed can be placed right on the lock screen of your Samsung Galaxy S3.
Welcome back, my hacker trainees! A score of my readers have been begging for tutorials on how to hack Wi-Fi, so with this article, I'm initiating a new series dedicated to Wi-Fi hacks. This will probably be around 6-9 articles, starting with the basics of the technologies. I can hear you all groan, but you need to know the basics before you get into more advanced hacking. Then hopefully, developing your own hacks.
You've seen security cameras everywhere in the public space. How many are there? Where are they? This is information that can be difficult to come by. It's not just criminals that are interested in information on this. It's your fundamental human right to be able to go about your daily life without being monitored and watched at every step. You might think that these cameras are for safety, and they can certainly help make people feel secure. Then it automatically follows that these people sh...
Most of us have some sort of malware scanner or antivirus program on our computers, but what about our smartphones? A lot of people don't realize that computers aren't the only devices that are susceptible to malicious software and apps—they can follow you on your smartphone or tablet, too.
Dropbox announced Tuesday that a recent security breach compromised a list that included the email addresses of certain Dropbox users. To avoid future complications, the service announced that it would be implementing two-factor authentication, and even more useful, a security page that lets you monitor all activity on your account. In light of this and other recent web security threats, you might also want to know that services like Gmail, Facebook, and Yahoo! Mail have similar pages where y...
This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing professionals. There are hundreds of tools out there, but I will focus and those that meet four key criteria:
Consider this reason 1,001 why we love the internet: Using Google, you can hack into almost any webcam or security cam, in any part of the world and even control the webcam to move around so you can get your full panoramic shot. Don't believe us? Then check out this video tutorial to learn the steps you need to take.
The passcode, or the four-digit code you enter in order to access an iPhone or iPod touch, was created to ensure security and prevent hacking. But what if you haven't touched your iPhone in a month and you simply don't remember what your passcode is anymore?
Different ways of using a proxy bypass to access blocks sites is shown with ease in this video. Many places explained to be blocked with internet security such as libraries and schools. Using a search engine such as Google you need to search for a proxy site. After a proxy site has been found you will use it to access the blocked websites through another servers internet provider. The narrator explains that proxies are just a way to bypass internet blocks by avoiding using the blocked compute...
In this video from apexcctv we learn how to find your public IP address and then use dynamic DNS to keep it updated in regards to your security needs. If you go to Whatismyip.com you will see your IP address. You can also go to Google and search for "find my IP address." A service called Dynamic DNS keeps track of your customers IP address. It will map a name to an IP address. Static DNS entries do not change. To set up DNS you can go to CCTV tutorials on the ApexCCTV website. You should set ...
This video tutorial is in the Computers & Programming category which will show you how to hack a wireless network with WEP encryption. This video is intended only as a means of testing the security of your own network. Go to Backtrack Linux, download the backtrack4 and burn it to a DVD. Now put it in a computer with a wireless card and restart the computer so that it boots to the DVD. When it boots up, type "startx" to start the interface. Bring up the command prompt and type in "/etc/init.d/...
In this video, we learn how to access Facebook at school using "https". You don't have to go to any website to do this, it's simple and easy. All you have to do is type in "https" into your browser before you type in the website you want to visit. Make sure you type in this extra "s" or the website will not work. This should bypass the security settings your school has set so you can access your Facebook account. If you happen to end up on a page when it doesn't work, just make sure the "s" i...
In this tutorial, we learn how to sync iPhoto albums with Facebook. First, open up iPhoto on your computer and highlight all of the pictures that you want to import into Facebook. Once you've done this, go to the top of the window and click on "share". Next, click on "share with Facebook" and then choose who you want the pictures viewable to. After this, click on the "publish" button and wait for the program to load the pictures. After this, go to your Facebook account and see the pictures th...
In this tutorial, we learn how to change your IP address in five different ways. First, go to your security settings and clear all cookies, then start to browse the internet with private browsing from your internet browser. You can change your IP address by going onto your internet browser and changing the LAN settings. Type in your address and port, then bypass the proxy server. Next, go to options and then advanced on your browser. Type in the proxy and port, then click where it says no pro...
In this tutorial, we learn how to perform a master hand reset on your Blackberry Pearl. First you will need to go to the options menu on your phone, then click on security options. Next, you will go to general settings, and then hit the Blackberry menu button and click on "wipe handheld". A prompt will show up and tell you to enter in a confirmation word, then enter that and your phone will now start to go through the process of wiping out all information. When this is finished, your phone wi...
In this tutorial, we learn how to set up and secure a wireless router. First, take your cable and plug it into your modem from your computer. After this, plug in an Ethernet cable into your modem to a wireless router. Now, plug the wireless router and modem into the wall. Now, look for the icon on your computer that says you have connected a new device to it. Go through the set up wizard to make a new wireless network, once it doesn't find one, connect a USB to the computer. Now, click on the...
In this video, we learn how to understand the triangles on the lines while palm reading. The triangle on the lifeline shows that any obstacles the person goes through will be in their thirties. It will also say that they can get back onto their feet quite easily. Any set backs or accidents are minor and they won't have distress for too long. If the triangle is on the heart line, it will show that the person has a certain mount of security in friendships and/or relationships, that can help the...
In this video, we learn how to work with Stretch Magic. This is a beading technique that is very easy to use. It's great for making bracelets, because no clasp is required. First, cut a piece of Stretch Magic 4-5 inches longer than you want it. Now, string your favorite beads onto the Stretch Magic. When you are finished with this, connect the ends with a square not and add a drop of super glue for added security. After this, cut off the excess strings from the end and you will be able to wea...
Your Windows computer may be experiencing some issues, and those issues may be a direct result of computer viruses and malicious software from the internet. One of the simplest ways to find these issues and repair them is by using a freeware program called System Repair Engineer (SREng). But that's not all it can do… check out the video to see a basic overview for using SREng.
This video tutorial is in the Computers & Programming category which will show you how to set up a Linksys WR54g or WRT54g2 wireless router. First you connect to your Linksys router. Then go to http://192.168.1.1 and type in "admin' as your password in to log in window and click "log in'. then go to the "wireless' tab and enter your wireless network name. In the wireless channel select '11 2.462GHz' and click save. Next go to "wireless security' and type in the wireless network key. This is t...
In this video tutorial, viewers learn how to data clear and erase an LG CU720 Shine mobile phone. This task is very fast, easy and simple to do. Begin by clicking on the Menu button and select Settings. Then scroll down the list or press the # sign to select Reset Settings. Now select Master Clear and select Handset. If there is data in the memory card, clear it as well. Click on Yes to confirm the resetting and type in your security code. This video will benefit those viewers who have a LG S...
In this video tutorial, viewers learn how to enable JavaScript and update Flash in Internet Explorer. To update the Flash player, go to the link provided in the description and install it. To update JavaScript, click on Tools and select Internet Options. Then click on the Security tab and click on the Custom Level button. Now scroll down the list and find Active Scripting Option. Check Enable and click OK. When the Prompt window pops up, click Yes and click OK in the Internet Options window. ...
There are 10 major ways to protect your PC. Disable Autorun, in Windows. Make sure that your system is up to date, by setting automatic updates. Always use a log on for your computer that does not have administrative privileges. Use different passwords, and change your passwords on a regular basis. Don't use simple passwords. Be careful of using links sent to you via email. Never disclose your sensitive information in public forums: e.g. social networks. Encrypt sensitive data on your compute...
In this tutorial, we learn how to apply for unemployment in New York. You can do this either by phone or by going online. You will need personal information to file, including: social security number, drivers license number, mailing address, phone number, and W-2 form. Even if you don't have every item on the list, you can still file a claim. You will get a four digit pin number, then have an agent gather all of your information. If you do call to file, there are people who work there that sp...
In this tutorial, we learn how to save drive space using Firefox. If you want to change the cache folder location, whether it's for security or just because, it's very simple. First, type in "about:config" into your internet browser. A new page will appear, right click your mouse and select "new" and then "string". When the page asks for the preference name, type in "browser.case.disk.parent_directory". Then, type in the name of the folder where you want the cache to go. Next, Firefox will cr...
In this tutorial, we learn how to find the hidden browser cache on Firefox. First, log onto a website that you use often and if you want to see how many times you have visited it, right click on an empty space on the page. Next, click on "view page info", then click on the "security" tab. When you click on this, you will be able to see how many times you have visited that website, and if they are storing cookies on your computer. You will also be able to see if you have stored passwords throu...
In this video tutorial, viewers learn how to pack lampshades. Most lampshades are packed into 4 cu ft cartons. Begin by placing crushed paper into the bottom of the box. Then place clean sheets of packing paper over each side of the box, making sure that the flaps and inside wall of the box is covered. Now carefully place the lampshade top-down into the box. Then spread clean packing paper over the shade. Now gently place the smaller shade into the larger shade and pack in the remaining packi...
In this tutorial, we learn how to erase cell phone information on a Blackberry 7290. First, go to the home page of your screen the scroll to "options" and hit okay. Now, go to "security options" and click okay again. Now, click on "general settings" and click okay, then click on okay once more, and click on "wipe handheld". You will now see a warning, and click "continue" and type in the word to confirm you want to wipe your information. It will now take a couple of minutes to wipe the inform...
This clip discusses how authorization roles work and their role in the security of the latest release of the F5 Networks Management Pack suite. It also touches on the creation and use of user roles within Operations Manager console and how to apply the authorization tasks to those roles. Whether you're new to F5 Networks' popular network appliance or are a seasoned network administrator just looking to better acquaint yourself with F5 Networks Management Pack suite, you're sure to benefit fro...
Looking for somewhere to hide your things so that no thieves will take them? Why not try hide them inside that old Hanson or Backstreet Boys CD? If you have out of date CDs that you are no longer listening to, check out this tutorial. In this video you will learn how to use ordinary CDs and turn them into mini-safes for your valuables. These are easy to make and are great for security. So, whether you are hiding things from your parents, siblings, roommates or strangers, have a look at this s...
Project Linus is an organization that provides security blankets for seriously ill or traumatized children. In this tutorial, learn how to make an easy fabric panel quilt to donate to a child in need. Project Linus is a great organization that provides warmth to every child, no matter what the season. So, if you would like to donate to this worthwhile cause, follow along with this video and learn how to make an easy but comforting cover that any child will love.
This video instructs you on how to backup your files on windows 7. To do this, first you must go to Start>Control Panel. After that you must look at System and Security, and click on back up your computer. Next you must click set up back up, then pick where you want to save your files and click next. In the video, ComputerRepairexpert uses a external hard drive, which is strongly suggested. On the next screen you must pick how you want it backed up. Click on Let me choose and click next. Afte...
In the homepage at the left handside of the facebook account, a click is made on group. The name, description, group type,email address and website information of the group are filled in. A click is then made on the "create group" button. The security details which appear on the window appear after the "create group" option was selected and saved by clicking the "saved" option. The group is published to the facebook wall, after which the group is customized . The group can be personalized and...