New Stegosploit Tool Hides Malware Inside Internet Images For Instant Drive-by Pwning

Monday, June 1st, 2015

Go online for five minutes. Visit a few webpages. How many pictures do you see? With the media rich nature of the web, chances are your answer is in the hundreds. It is in this space the future of malicious cyber attacks could be embedded. In a presentation at Hack In ...

Beware: Hola VPN turns your PC into an exit node and sells your traffic

Thursday, May 28th, 2015

Hola is a popular virtual private network (VPN) provider that is available for various web browsers including Google Chrome, Mozilla Firefox and Internet Explorer, as well as desktop and mobile operating systems. It is free to use and if you check ratings and users on Chrome's Web Store alone, you will ...

Astoria — Advanced Tor Client Designed to Avoid NSA Attacks

Saturday, May 23rd, 2015

In response to the threat of intelligence agencies like NSA and GCHQ, Security researchers from American and Israeli academics have developed a new advanced Tor client called Astoria specially designed to make eavesdropping harder. Tor (The Onion Router) is the most popular anonymity network that is intended to allow a user to browse ...

Android factory reset not enough to keep data secure

Friday, May 22nd, 2015

If you sell or gift your old Android phone to someone, is it enough to do a factory reset to wipe all your sensitive data? And if your Android gets stolen, how sure are you that your anti-theft solution will do a good job wiping it and/or locking the device? Consumers ...

A first aid kit for ransomware infections

Thursday, May 21st, 2015

You've been hit by ransomware and you don't know what to do? Jada Cyrus has assembled a helpful "Ransomware Removal Kit" which contains decryption tools for CryptoLocker, CoinVault, TeslaCrypt and FBIRansomWare, along with instructions on how to use them. "You should never pay the ransom. This will only reinforce this type of ...