You Are Browsing ‘Hacking and Security’ Category

So the NSA is at it again, they have recently wanted to hijack the Google App Store to spy on you.  This was all reviled by a top secret document, that was released by Edward Snowden.  During a conference the NSA and its counter part “Five Eyes” wanted to find new ways to exploit smartphones to be able to spy on people.  Your government wanted to spy on you by hacking your phone and putting spyware on it. Not only would they be able to see your text messages, but anything you do on your phone. That does include pictures...

There has been a new attack on the rise called the logjam attack. This attack mostly threatened https websites, mail servers, and some other web services are threatened by this attack. The vulnerability affects an estimated 8.4 percent of the top one million websites and a slightly bigger percentage of mail servers populating the IPv4 address space, the researchers...

Posted on May 16 2015 - 7:55pm by TekGuru

  So many of us have had malware. It seems to be an ever growing problem lately, so what should you do when your are faced with some nasty malware? Here is  basic guide to help you get rid of malware and get back up and running in no time at all.   Always remember to always back up your data on an external hard rive. I would recommend something like wdmycould it has many great features that can help you back up your data. I would also recommend that you back up your data to a regular external hard drive as well (just in case,...

Facebook can track you even if you’re not registered,says Belgian data protection watchdog The Belgian Privacy Protection Commission (CPVP/CBPL) launched the scathing attack after carrying out an investigation into the US tech giant’s practices. Preliminary recommendations were published on Friday. Facebook would not explain in detail how it uses the data it collects from individuals online and there are also problems with plug-ins, some of which can affect people who don’t even have a Facebook account, the commission said. One...

A recently discovered vulnerability in Apple’s new watch let theifs use apple pay without your pin.  The basic idea behind the watch’s security is that the Watch can detect when it is removed from a wrist, and automatically requires a passcode to be entered if removed (if one is set up, which is a requirement for using Apple Pay).   How it works On the back of the Apple Watch are four specifically designed rings which contain the 4 components of the heart rate sensor—2 green/infrared LEDs and 2 photodiode sensors. While...

A new malware that destroys the computer it infected if detected is making its way around and wreaking havoc on the computers it infects. A new malware called Rombertik as it was nicknamed by Cisco Systems was designed to intercept plain text entered into a browser window. The way it is being spread is like every other malware, through spam and phishing messages....