Security

Around The World

A new bug in mac os

A new vulnerability has been found in macOS version 10.13.2 that enables anyone with access to your Mac to unlock App Store system preferences using any username and password as long as you are logged in as a local admin. This means that if your account is an admin and you leave the machine unattended, anyone with malicious intent can change the App Store settings on the Mac without your knowledge. The bug has been…

Around The World

Bug Bounty Programs list

Reward Programs AT&T – http://developer.att.com/developer/apiDetailPage.jsp?passedItemId=10700235 (To submit you need to sign up to the free Developer API program) Avast! – http://www.avast.com/bug-bounty Barracuda – http://barracudalabs.com/ Coinbase – https://coinbase.com/whitehat Chromium Project – http://www.chromium.org/ CrowdShield – https://crowdshield.com/ Cryptocat – https://crypto.cat/bughunt/ Facebook – http://www.facebook.com/whitehat/ Etsy – http://www.etsy.com/help/article/2463 Gallery – http://codex.gallery2.org/Bounties Ghostscript – http://ghostscript.com/Bug_bounty_program.html (Mostly software development, occasional security issues) Google – http://www.google.com/about/company/rewardprogram.html Hex-Rays – http://www.hex-rays.com/bugbounty.shtml IntegraXor (SCADA) – http://www.integraxor.com/blog/integraxor-hmi-scada-bug-bounty-program LaunchKey – https://launchkey.com/docs/whitehat Marktplaats – http://statisch.marktplaats.nl/help/ Mega.co.nz – http://thenextweb.com/insider/2013/02/01/kim-dotcom-puts-up-13500-bounty-for-first-person-to-break-megas-security-system/ Meraki…

Around The World

stay alert from wireless Attacks

Three general wireless attacks are to use a fake access point (AP), or use a fake AP with a static extended service set ID (ESSID), or use a fake AP and an “evil twin.” All can be set up and executed instantly. By setting up the fake AP, a hacker can obtain complete control over all TCP/IP connections passing through it. At that point, intercepting network traffic and capturing or changing it becomes useless. With…

Security

Free antivirus software from government of india

The government of India has launched the “Make In India”, “Swachh Bharat” and “Digital India” initiatives with a holistic approach towards all areas. Be it cleaning our environment (Swach Bharat) to launching our own rockets, we are making great progress in all areas of technology. Well, with power comes responsibility. With the advent of 4G and 3G data, our venture into the world of Internet is growing every day. We have over 1 billion mobile…

Hacking News

Apple devices under risk:Turkish crime family

If you use iCloud to sync your Apple devices, your private data may be at risk of getting exposed or deleted by April 7th. It has been found that a mischievous group of hackers claiming to have access to over 300 million iCloud accounts is threatening Apple to remotely wipe data from those millions of Apple devices unless Apple pays it $75,000 in crypto-currency or $100,000 worth of iTunes gift cards. The hacking group, who…

Security

protect your own privacy from ISPs,Advertisers,government

Now more than ever, your online privacy is under attack. ISPs, advertisers and governments around the world are increasingly interested in knowing exactly what you’re up to when you browse the web. How can you stay safe in such times? [tribulant_slideshow gallery_id=”1″] TOR BROWSER Tor is a free web browser for enabling anonymous communication.It aims to conceal its users’ identities and their online activity from surveillance and traffic analysis by separating identification and routing. It…

Around The World

Programming languages useful for Hacking

Since programming is essential for hacking because a hacker is someone who breaks a protocol or an application security which is programmed in a certain programming language and to hack an application a hacker needs to understand the logic of that app, find flaw and the exploit it. So a hacker must learn a couple of programming languages to complete his task. So checkout the important programming languages for hackers and where to apply it….

Hacking News

Tools to protect your system from attackers

There are lots of tools available in the market to help individuals or network administrators secure their systems. Some tools are free, while others are paid and some are open source. KeePass KeePass is free and open source software to manage all your passwords in one place, securely. Sometimes we use the same passwords for different accounts on different websites, which could lead to a serious problem. If someone cracks that password and has your…

Security

Stay anonymous – Browse with Brave Browser

Brave is a free and open-source   web browser based on the Chromium web browser and its Blink engine, announced by the co-founder of the Mozilla Project, Brendan Eich. It claims to block website trackers and remove intrusive internet advertisements, replacing them with ads sold by Eich’s company. The browser also claims to improve online privacy by sharing less data with advertising customers, although the browser itself targets web ads through analysis of users’ anonymized…

Hacking News

What is White Hat, Black Hat, Grey Hat Hackers ?

 Not all hackers are inherently bad. When used in mainstream media, the word, “hacker,” is usually used in relation to cyber criminals, but a hacker can actually be anyone, regardless of their intentions, who utilizes their knowledge of computer software and hardware to break down and bypass security measures on a computer, device or network. Hacking itself is not an illegal activity unless the hacker is compromising a system without the owner’s permission. Many companies…