Tuesday, May 22Care to be aware

Author: admin

HBO Tries To Defeat Game Of Thrones Torrent Pirate Army, Sends Warning Messages

HBO Tries To Defeat Game Of Thrones Torrent Pirate Army, Sends Warning Messages

Cyber News, In Buzz
HBO renewed their popular TV show last week for Season 7 and we aren’t much surprised to see the pirate world’s quickness in trying to grab a free copy of their favorite TV show. The first episode of the Game of Thrones Season 7 was uploaded to various platforms on the web on Sunday, the same day the episode was premiered. And the pirates across the globe spent no time in downloading the episode. But HBO isn’t blind; it can very well see all of the illegal stuff going right under its nose. Similar to what happened last year, HBO’s anti-piracy partner IP Echelon has started sending DMCA notices to the ISPs of the alleged pirates in question who are then asked to notify the concerned pirates. TorrentFreak notes in their report that according to the US copyright law, it isn’t obliga
GhostCtrl Android Malware Steals Your Private Data And Records Audio, Video

GhostCtrl Android Malware Steals Your Private Data And Records Audio, Video

0 Day Attacks, Cyber News
In late June, the Trend Micro security researchers were able to find an information stealing malware named RETADUP. As per further research, it was found that RETADUP was accompanied by an even more dangerous malware that targets Android devices. This Android malware has been named GhostCtrl as it can take control over your Android smartphone. This malware is based on the popular RAT (Remote Access Trojan) OmniRAT, which has the power to remotely control machines running Windows, Linux, and macOS. Like many other Android malware, GhostCtrl also hides behind the curtains and masquerades as popular apps like WhatsApp, MMS, Pokemon Go, etc. The main APK of the malware has backdoor functions, which are named com.android.engine to mislead the users. After connecting to Control &
How To Get Faster Internet Connection Speed – The Complete Guide

How To Get Faster Internet Connection Speed – The Complete Guide

Life Hacks, Tips & Tricks
There isn’t a single way to avoid the slow connection. So, in this in-depth tutorial, I’m going to tell you almost every single possible way to check and increase your internet connection speed. And, this article should be able to provide solutions like making the Wi-Fi speed faster and increasing the internet connection speed.  Software fixes for increasing internet speed: Take your internet speed test The very first step that we are going to do here is to take the internet speed test and ping test. I think most of you have already heard about the world’s best internet speed test by Ookla i.e. speedtest.net. The company recently dropped Adobe Flash and launched another internet speed test written in HTML5. Take the old Ookla’s internet Speedtest here and Ookla’s HTML 5 Spe
GlassWire : A Must Have Network Security Tool

GlassWire : A Must Have Network Security Tool

Networking, Useful Applications
Who is your computer talking to? Your browser isn't the only application that's sending data online. Your word processor might be phoning home; a file undelete utility might be talking to its mother ship, and even Windows' own services may surprise you. These are not necessarily nefarious actions, but they're worth knowing about. GlassWire is a free and beautiful utility that lays all of this bare. GlassWire makes network traffic fun to watch. One of the most important things about GlassWire is that it's beautiful. This isn't a minor detail: For many users, network security is equal parts daunting and tedious. Having a tool that's just fun to pop open and watch throughout your day makes a big difference. The graph scrolls in real-time, and there's a zoom slider across the bottom of t...
Microsoft Is Giving Away Millions Of E-Books For Free, Download Them Right Now

Microsoft Is Giving Away Millions Of E-Books For Free, Download Them Right Now

Cyber News, Cyber Security, In Buzz
Ligman says it has been several years since he started giving e-books for free and the response has been quite good. This year’s giveaway includes more e-books, and he has also streamlined the list to make it easier for the users to find relevant ones and their download links. There are approximately 300 titles which are meant for various Microsoft products and services including: E-Books For Windows 10, Windows Server E-Books For PowerShell E-Books For Azure E-Books For Cloud E-Books For Microsoft Office 2013, 2016, and 365 E-Books For Power BI E-Books For Microsoft SharePoint E-Books For SQL Server E-Books For Microsoft System Center   How to download the free Microsoft e-books? There are two ways to download the free e-books available as a p
How To Schedule Jobs in Linux | Cron and Crontab Commands

How To Schedule Jobs in Linux | Cron and Crontab Commands

Ethical Hacking, General, Knowledge Base
Quite like the TaskScheduler utility of Windows, one can utilize the Cron utility to schedule jobs in Linux to run periodically at fixed intervals of time. Used typically for automating system maintenance or administration jobs like backing up data, updating packages and much more, any Linux sysadmin would vouch for its importance. Job scheduling in Linux: Basic Guide What is Cron? The Cron service is a time-based job scheduling service that is typically started when the system boots. It checks every minute for any scheduled jobs and runs them if they exist. What is Crontab? In order to manipulate the job schedules, we use the Crontab program in Linux. Crontab, short for ‘cron table,‘ is a configuration file. Each line of the Crontab represents a job and contains information on what t
SpyDealer Malware Hacks Your Facebook, WhatsApp, Web Browser, And Other Android Apps

SpyDealer Malware Hacks Your Facebook, WhatsApp, Web Browser, And Other Android Apps

0 Day Attacks, Cyber News, Cyber Security
A few days ago I told you about the CopyCat malware for Android smartphone that infected about 14 million devices and the malware authors earned about $1.5 million via fraudulent ads. Now, the security researchers at Palo Alto Network have identified a malware that has the power to hack 40 or more social media accounts. Before going ahead and tell you the details of the malware, let me inform you that this malware, called SpyDealer, affects only the Android versions between 4.4 KitKat and 2.2 Froyo. These users account for about 25% of the total Android users, i.e., 500 million. What does SpyDealer malware do? SpyDealer has advanced capabilities like exfiltrating data private data from more than 40 popular apps. The list of the targeted apps includes the following: WeChat, Face...
This Website Auto Sends Spoilers To Your Enemies, Ruins Their Life

This Website Auto Sends Spoilers To Your Enemies, Ruins Their Life

Cyber News, Cyber Security, In Buzz
Benitez has created a website named Spoil Your Enemies and it does what is says; it destroys the life of your enemies and even friends by sending them TV show spoilers. What’s more is the information is sent via SMS, so, if the other person is isolated from the internet to protect himself, he/she still not safe. Also, the sender being anonymous makes the target totally unsuspecting of what’s coming. It appears our post about blocking movie and TV show spoilers won’t work in this case because the website uses the vintage Short Message Service to deliver the spoilers. On the about page, he says that his motivation behind creating such thing is his friends who constantly told him spoilers about his favorite TV shows. “They drove me nuts,” he adds. It took around two weeks for
World’s First Wireless Charging Laptop Launched By Dell

World’s First Wireless Charging Laptop Launched By Dell

Cyber News, In Buzz
The first laptop in the world to feature the wireless charging feature is the Dell Latitude 7285 which is now available with a price tag of $1,199.99 for the starting model and $2,139 for the highest priced. The 2-in-1 hybrid device was first announced at the CES 2017 event in January earlier this year. The company had partnered with the American company WiTricity whose wireless charging tech has been included in the device. Although, the laptop can be charged without wires but requires an external detachable keyboard unit and a wireless charging mat achieve the functionality. These accessories are sold separately and put an extra burden of $549.99 in your pocket. The specification for $1,199 Latitude 7285 include an Intel Core i5-7Y54 processor, 128GB SSD, 8GB RAM, 12.3-inch
Make sure you’re using the real Tor Browser

Make sure you’re using the real Tor Browser

0 Day Attacks, Cyber News, Cyber Security
Dark Web is the part of the world wide web which is beyond the reach of normal search engines and is accessible with the help of specific tools like the Tor Browser. The dark web has a lot of shady and illegal stuff. But what’s shadier is a fake Tor browser that’s being promoted among the users in the form of YouTube videos. The fake Tor Browser was spotted last week by Lawrence Abrams of Bleeping Computer. The said YouTube videos are tutorials to teach users about buying stuff from a Dark Web marketplace known as The Rodeo. Fake Tor Connection The only way you can relate the imposter web browser to Rodeo is that it carries the name in the title bar. After further digging, it was found that the software carries Tor’s UI and houses .NET code under the hood. Most of the options and b