Skip to main content

Posts

Showing posts from July, 2017

DoubleAgent Attack Turns Your Antivirus Into Malware And Hijacks Your PC

  anshul   Short Bytes: Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn it into a malware. Called DoubleAgent, this attack exploits an old and undocumented vulnerability in Windows operating system. This Zero Day code injection technique affects all major antivirus vendors and has the power to hijack permissions. The security researchers from Cybellum have found a new technique that can be used by the cybercriminals to hijack your computer by injecting malicious code. This new Zero-Day attack can be used to take full control over all the major antivirus software. Instead of hiding from the antivirus, this attack takes control of the antivirus itself. Called DoubleAgent, this attack makes use of a 15-year-old legitimate feature of Windows (read vulnerability)–that’s why it can’t be patched. It affects all versions of Microsoft Windows. Cybellum blog mentions that this flaw is still unpatch

8 favourite mozilla addons used by the Hackers

 by  anshul   Ethical hacking could be great fun if you know about these add-ons. The creation of penetration testing labs in Kali Linux or Backtrack, has been a popular topic for a long time, but the fact remains that all challenges, practice, and hacking need tools. One of the better known tools is the Addons which comes in many types and forms. We thought it would be fun to bring to you a list of important add-ons for hackers and pentesters. Here are the top 7 that we shortlisted: 1. Tamper Data:  This is one of the most used Addons for Pentesters, who traditionally make use of it for viewing and modifying HTTP/HTTPS headers and post parameters, trace and time HTTP response or requests, security test web applications by modifying POST parameters and a lot more.  The add-on can be downloaded here. 2. Hack Bar:  Another well known and very often used tool, it is mostly used for security audit , and comes strongly recommended for installation and XSS, SQL En

10+ Best Deep web Search Engines of 2017

 by  rakesh sharma   In the previous post, we’ve shown you how to access the deep web using tor browser without revealing your original identity. Today in this post we’ll see  top deep web search engines  that you may not have known before, but can help you to search deep web easily and safely.Deep web links: Our Expert team is keen on finding New Deep Web Links which are found to be interesting. These deep web links is a great source of new information such as for discovering deep websites and further go down into deep web research. Follow the security tips recommended by our team as follow. Note:  Some deep web search engines are accessible only via Tor browser. So if you don’t have the one, then head over to Tor browser site and download it. Best Deep Web search engines of 2017 Below is the list of top 10 best deep web search engines of 2016 which is selected based on the  quality  of the search results. So you don’t have to worry about whether the below Onion li

15 Vulnerable Sites To (Legally) Practice Your Hacking Skills – 2017 Update

  rakesh sharma   As technology grows, so does the risk of getting hacked. So, it should come as no surprise that InfoSec skills are becoming more important and more in demand. No matter if you’re a beginner or an expert, nor if you’re a security manager, developer, auditor, or pentester – you can now get started by using these 15 sites to practice your hacking skills – legally. They say the best defense is a good offense – and it’s no different in the InfoSec world. Here’s our updated list of 15 sites to practice your hacking skills so you can be the best defender you can – whether you’re a developer, security manager, auditor or pen-tester. And remember – practice makes perfect! Are there any other sites you’d like to add to this list? Let us know below! 1 bWAPP bWAPP, which stands for Buggy Web Application, is “a free and open source deliberately insecure web application” created by Malik Messelem, @MME_IT. Vulnerabilities to keep an eye out for include over 100

Russia will ban VPNs and proxies to block "unlawful content" It will also require chat app users to hand over their phone numbers

Rob Thubron   We’re used to hearing about China’s continuing  crackdown  on VPNs, but it seems that Russia is going down the same route. President Vladimir Putin has just signed a new law prohibiting the use of technology that allows access to banned websites. The legislation, which was signed over the weekend and has already been approved by Russia’s lower house of parliament (the Duma), is ostensibly designed to block “unlawful content” rather than place restrictions on citizens, according to Leonid Levin, the head of Duma's information policy committee. But, much like China, it’s more likely that the move is a way of preventing Russians from viewing content that criticizes the government. With presidential elections set to take place in March, Putin wants to ensure voters can’t see any online material that hasn’t been approved by the state - even though he’s widely expected to win a new six-year term. The VPN and proxy ban comes into effect on November 1, but t

Romanian cave sealed for 5.5 million years is full of strange creatures

BY  RYAN WHITWAM   As humans were  evolving  in the plains of Africa, a different kind of evolution was taking place in Romania. The insectoid residents of Movile Cave were cut off from the outside world more than five million years ago, and that made for a very unusual ecosystem when the cave was discovered and opened up in the late 1980s. Movile Cave is believed to be the most isolated ecosystem in the world, and scientists are only just beginning to unravel its secrets. It has taken years to begin cataloging the creatures in Movile Cave for several reasons. First, it’s a dangerous environment with a poisonous atmosphere. Getting into the cave requires some familiarity with spelunking and diving, too. You have to go down a narrow 20-meter shaft, then climb through tiny limestone tunnels before reaching the main cavern. The Romanian government has also been very selective about who is permitted in the cave for fear of upsetting the delicate ecological balance.  Only a few

This Is How Your Fear and Outrage Are Being Sold for Profit

This Is How Your Fear and Outrage Are Being Sold for Profit by  Tobias Rose-Stockwell Follow In search of hard questions. Seeking human improvement. The story of how one metric has changed the way you see the world The world feels more dangerous. Our streets seem less safe. The assault on our values is constant. The threats feel real. The enemy is out there — just check your feed. O ne evening in late October 2014, a doctor checked his own pulse and stepped onto a subway car in New York City. He had just returned home from a brief stint volunteering overseas, and was heading to Brooklyn to meet some friends at a bowling alley. He was looking forward to this break — earlier that day he had gone for a run around the city, grabbed coffee on the High Line, and eaten at a local meatball shop. When he woke up the next day exhausted with a slight fever, he called his employer. Within 24 hours, he would become the most most feared man in New York. Hi