London Railway System Passwords Exposed During TV Documentary

The Weakest Link In the Information Security Chain is still – Humans. And this news has ability to prove this fact Right. One of London’s busiest railway stations has unwittingly exposed their system credentials during a BBC documentary. The sensitive credentials printed and attached to the top of a station controller’s monitor were aired on Wednesday night on BBC. What […]

» Read more

Mumblehard Malware Targets Linux and FreeBSD Servers

Thousands of computers and web servers running Linux and FreeBSD operating systems have been infected over past five years with sophisticated malware that turn the machines into spambots. The new Linux malware, discovered by the security researchers from the antivirus provider Eset, has been dubbed “Mumblehard” because it is Muttering spam from your servers, says Eset 23-page long report ( […]

» Read more

Hacker Finds a Simple Way to Bypass Google Password Alert

Less than 24 hours after Google launched the new Phishing alert extension Password Alert, a security researcher was able to bypass the feature using deadly simple exploits. On Wednesday, the search engine giant launched a new Password Alert Chrome extension to alert its users whenever they accidentally enter their Google password on a carefully crafted phishing website that aimed at […]

» Read more

Fastest Operating System for Quantum Computing Developed By Researchers

So far, we just have heard about Quantum computing that could make even complex calculations trivial, but there are no practical Quantum computers exist. However, the dream of Quantum computers could become a reality in coming future. Cambridge Quantum Computing Limited (CQCL) has build a new Fastest Operating System aimed at running the futuristic superfast quantum computers. The new operating […]

» Read more

How to check installed perl modules on a cPanel server ?

Login to your Server via SSH with root login . Run below command instmodsh root@ashishkale [~]# instmodsh Available commands are:    l            – List all installed modules    m <module>   – Select a module    q            – Quit the program cmd? l Installed modules are:    CPAN    Compress::Raw::Bzip2    Compress::Raw::Zlib    Crypt::PasswdMD5    DBI    Digest::SHA1    Encode::Locale    […]

» Read more

£300 Apple Watch might not Work If You've Got Wrist Tattoos

Credit: mirror.co.uk If you love wearing tattoos and have one on your wrist, then the Apple Watch won’t work for you. Yes, you heard that right. Apple watch is unable to figure out your blood pressure or even sense your skin contact if you wear the watch on a tattooed wrist. Generally, the Apple Watch automatically detects your wrist by your […]

» Read more

Password Alert Chrome Extension to Protect your Google Account from Phishers

As cybercriminals have started using sophisticated phishing techniques in an attempt to hijack online users’ account, Google on Wednesday launched a new Chrome Extension to fight against Phishing. The search engine giant has launched a new Password Alert Chrome extension that will alert you whenever you accidentally enter your Google password on a carefully crafted phishing website that Source: Hacker […]

» Read more

Microsoft Edge: The Windows 10 Web Browser

Meet Microsoft’s replacement to its old web browser Internet Explorer. The Project Spartan Web browser for Windows 10 has now an official name — Microsoft Edge. Yes, Microsoft’s new web browser shipping on all Windows 10 devices, from computers to smartphones and tablets, is dubbed Microsoft Edge. The company just announced in its Build developer conference that Edge is going […]

» Read more

8 Best Android Apps To Improve Privacy and Security in 2015

Just to have a good anti-virus protection app in your smartphone doesn’t mean a complete Security. As Mobile Device Security is comprised of security of different features, such as: Data privacy and security features Permission restrictions for snoopy apps A blacklist for undesired calls An excellent backup capability, in case your smartphone gets deteriorated. As well as encryption Source: Hacker […]

» Read more

The Great… Great… Firewall of China Hijacks Facebook Connect Plugin

From past few days, Internet Users in China are dealing with a weird redirection of traffic nationwide while accessing any website that makes use of connect.facebook.net resource. Great Firewall of China, which is infamous for the Internet censorship by Chinese government, believes to be intercepting the JavaScript module used by Facebook Connect Login, which is meant to allow third-party Source: […]

» Read more
1 2