Info 

4 Reasons Not to Use Google for Search

Google is pretty much everywhere. It’s in your smartphone, car, and maybe even your watch— but there’s still nothing like searching Google on a desktop computer. To this day, about 64 per cent of US web surfers use Google as their primary search engine. If you still haven’t asked anyone but Google to answer your search queries—it’s time to rethink your approach to web browsing. Here are four reasons to start using search engines other than Google for your queries. * Read the full article here

Read More
Info 

All of the Creepy Things Facebook Knows About You

Facebook knows more about your personal life than you probably realise. As part of the company’s increasingly aggressive advertising operation, Facebook goes to great lengths to track you across the web. The company compiles a list of personal details about every user that includes major life events and general interests. For years, details have been murky about how exactly the social network targets ads—but the company has finally given us a glimpse into how the secret sauce is made. * Read the full article here

Read More
News 

Keep using password managers — bugs and all

Bugs in several password managers, including the vulnerabilities discovered in LastPass in late July, have scared away some users. But such fears go too far. Millions of users rely on password managers to keep track of passwords for applications and online services, and by all indications, they work better than trying to do it on your own. * Read the full article here

Read More
News 

Hackers Trick Facial-Recognition Logins With Photos From Facebook (What Else?)

Facial recognition makes sense as a method for your computer to recognise you. After all, humans already use a powerful version of it to tell each other apart. But people can be fooled (disguises! twins!), so it’s no surprise that even as computer vision evolves, new attacks will trick facial recognition systems, too. Now researchers have demonstrated a particularly disturbing new method of stealing a face: one that’s based on 3-D rendering and some light Internet stalking. * Read the full article there

Read More
News 

Security researcher turns the tables on cyber-scammers

Have you ever gotten a phone call, email or pop-up from someone trying to scam you with an obviously non-existent problem with your computer that will be expensive to solve? French security researcher Ivan Kwiatkowski knows how you feel, but he wasn’t content with hanging up or uttering a few choice words of reprimand. He decided to give them a taste of their own medicine, as he described in a blog earlier this month. * Read the full article here

Read More
Info 

10 Best Password Cracking Tools Of 2016 | Windows, Linux, OS X

Password cracking is an integral part of digital forensics and pentesting. Keeping that in mind, we have prepared a list of the top 10 best password cracking tools that are widely used by ethical hackers and cybersecurity experts. These tools–including the likes of Aircrack, John the Ripper, and THC Hydra–use different algorithms and protocols to crack the passwords on a Windows, Linux, and OS X system. * Read the full article here

Read More
News 

Cloud hacking trick allows undetectable changes to VM memory

Hacking researchers have uncovered a new attack technique which can alter the memory of virtual machines in the cloud. The team, based at Vrije Universiteit, Amsterdam, introduced the attack, dubbed Flip Feng Shui (FFS) in a paper titled Flip Feng Shui: Hammering a Needle in the Software Stack. They explained hackers could use the technique to crack the keys of secured VMs or install malicious code without it being noticed. * Read the full article here

Read More
Skip to toolbar