follow

help me to improve quality

donate

Pages

Thursday, 29 June 2017

Telegram Agrees to Register With Russia to Avoid Ban, But Won't Share User Data

After being threatened with a ban in Russia, end-to-end encrypted Telegram messaging app has finally agreed to register with new Russian Data Protection Laws, but its founder has assured that the company will not comply to share users' confidential data at any cost.Russia's communications watchdog Roskomnadzor had recently threatened to block Telegram if the service did not hand over information required to put the app on an official government...

Tuesday, 27 June 2017

Petya Ransomware Spreading Rapidly Worldwide, Just Like WannaCry

Watch out, readers! It is ransomware, another WannaCry, another wide-spread attack.The WannaCry ransomware is not dead yet and another large scale ransomware attack is making chaos worldwide, shutting down computers at corporates, power supplies, and banks across Russia, Ukraine, Spain, France, UK, India, and Europe and demanding $300 in bitcoins.According to multiple sources, a new variant of Petya ransomware, also known as Petwrap, is spreading...

Saturday, 24 June 2017

how to delete windows.old folder and files (windows 10)

in this video, i have shown you "how to remove windows.old in windows 10" but this same method will work for "deleting windows.old folder in windows 8.1, windows 7.Every time you upgrade your PC from an older version of Windows to Windows 10 without first formatting the hard drive, or when you install a new Windows Insider Preview test build, the install wizard will save a copy of the previous version inside of the "Windows.old" folder on your computer. What is Windows.old? it’s important to note first that Windows.old isn’t a new feature...

Monday, 19 June 2017

Web Hosting Company Pays $1 Million to Ransomware Hackers to Get Files Back

South Korean web hosting provider has agreed to pay $1 million in bitcoins to hackers after a Linux ransomware infected its 153 servers, encrypting 3,400 business websites and their data, hosted on them. According to a blog post published by NAYANA, the web hosting company, this unfortunate event happened on 10th June when ransomware malware hit its hosting servers and attacker demanded 550 bitcoins (over $1.6 million) to unlock the encrypted...

Saturday, 17 June 2017

how to draw a line at an angle in autocad

if you want to learn "how to draw a line at angle to another line using Polar Coordinate system in autocad 2018 with an example" then you came to right place because here you will find "AutoCAD line command tutorial with example".there are basically 4 methods to draw line in autocad and i have already shown two methods in previous tutorial, and i this video i have shown one method to "draw angled line in autocad 2018".which is: 1) polar coordinate system in autocad In the polar coordinate system, you define the location of a point by entering...

Friday, 16 June 2017

New Fileless Ransomware with Code Injection Ability Detected in the Wild

It is no secret that hackers and cybercriminals are becoming dramatically more adept, innovative, and stealthy with each passing day. While new forms of cybercrime are on the rise, traditional activities seem to be shifting towards more clandestine techniques that come with limitless attack vectors with low detection rates. Security researchers have recently discovered a new fileless ransomware, dubbed "Sorebrect," which injects malicious...

25-Year-Old Hacker Pleads Guilty to Hacking U.S. Military Satellite Phone System

A British computer hacker who allegedly hacked a United States Department of Defense satellite system in 2014 and accessed the personal information of hundreds of military personnel has pleaded guilty on Thursday. Sean Caffrey, a 25-year-old resident of Sutton Coldfield in the West Midlands, has admitted to breaking into a US military communications system in June 2014 and stealing usernames and email addresses of over 800 employees and...

Monday, 12 June 2017

Dangerous Malware Discovered that Can Take Down Electric Power Grids

Last December, a cyber attack on Ukrainian Electric power grid caused the power outage in the northern part of Kiev — the country's capital — and surrounding areas, causing a blackout for tens of thousands of citizens for an hour and fifteen minutes around midnight. Now, security researchers have discovered the culprit behind those cyber attacks on the Ukrainian industrial control systems. Slovakia-based security software maker ESET and...

Saturday, 10 June 2017

how to install all drivers on windows 10 / windows 8 / windows 7 without cd after formatting with offline driver installer software on a new pc 2017

if  you just formatted your windows 7, windows 8.1 & windows 10 laptop/pc and within the format you lost all your drivers. Now you realise that you dont even have the basic network drivers to get internet access onto the laptop/pc. The laptop also has no optimal drive so using a CD is out of the question as well. then you must be in big trouble,but do not worry because i gave solution of this problem in this videoyou can get driver pack from https://drp.su/download.htmDriverPack Solution Offline is a program that automates the process...

22 Apple Distributors Arrested for Selling Customers’ Data in $7.4 Million

Chinese authorities have announced the arrest of around 22 distributors working as Apple distributors as part of a $7 million operation, who stole customers’ personal information from an internal Apple database and illegally sold it to Chinese black market vendors. According to a report from Chinese media, this underground network reportedly consisted of employees working in direct Apple suppliers, and other outsource firms in the Zhejiang,...

Thursday, 8 June 2017

First Android-Rooting Trojan With Code Injection Ability Found On Google Play Store

A new Android-rooting malware with an ability to disable device’ security settings in an effort to perform malicious tasks in the background has been detected on the official Play Store. What's interesting? The app was smart enough to fool Google security mechanism by first pretending itself to be a clean app and then temporarily replacing it with a malicious version. Security researchers at Kaspersky Lab discovered a new piece of Android...

Hard-coded Passwords Make Hacking Foscam ‘IP Cameras’ Much Easier

Security researchers have discovered over a dozen of vulnerabilities in tens of thousands of web-connected cameras that can not be protected just by changing their default credentials. Vulnerabilities found in two models of IP cameras from China-based manufacturer Foscam allow attackers to take over the camera, view video feeds, and, in some cases, even gain access to other devices connected to a local network. Researchers at security...

Monday, 5 June 2017

Over 8,600 Vulnerabilities Found in Pacemakers

"If you want to keep living, Pay a ransom, or die." This could happen, as researchers have found thousands of vulnerabilities in Pacemakers that hackers could exploit. Millions of people that rely on pacemakers to keep their hearts beating are at risk of software glitches and hackers, which could eventually take their lives. A pacemaker is a small electrical battery-operated device that's surgically implanted in the chest to help control...