Tuesday, May 22Care to be aware

Cyber News

Google Drive Will Soon Backup Your Computer’s Entire Hard Drive

Google Drive Will Soon Backup Your Computer’s Entire Hard Drive

Cyber News, In Buzz
Google Drive is one of the most used productivity tools of Google. People use it create backups of their data and make sure that their important data is safe. Now, thanks to a new and upcoming feature, Google will let you backup your entire computer’s storage disk. Due to this change, instead of files needing to be stored inside the Drive folder, Google will be able to backup the files inside any of your folders. Later this month, on June 28th, Google will launch this feature in the form of a new app named Backup and Sync. To use this feature, you’ll need to first download the Backup and Sync tool on your Mac or PC. After signing in, you’ll be able to choose the folders that need to be backed up. After doing so, you’ll be able to access Drive across different devices. In its a
Subtitle Hack: 200 Million Devices Are Vulnerable, Download Fix For VLC, Kodi, Etc

Subtitle Hack: 200 Million Devices Are Vulnerable, Download Fix For VLC, Kodi, Etc

0 Day Attacks, Cyber News, Cyber Security
According to a blog post published by Check Point security, a subtitle file could be modified to create a new attack vector and compromise the devices such as PCs, mobile devices, TVs, etc running vulnerable media players. Once compromised, the attacker can perform remote code execution, steal data, use the device as a pawn in a DDoS attack, and more. The researchers say, delivering a cyber attack when subtitles are loaded onto a media players is a “completely overlooked technique”. Most of the people download subtitles files from repositories on the web without giving a second thought, treating them as no more than innocent text files. The researchers say that attackers can upload a malicious subtitle on a repository and manipulate the rankings to put their results on the top. Th
Bing Search: Microsoft will now be “Paying You To Use It”

Bing Search: Microsoft will now be “Paying You To Use It”

Cyber News, Cyber Security, In Buzz
  Well, it’s not a bribe per se but a Microsoft Rewards program which the company has been running in the US since August 2016. Now, the scheme is being released in the United Kingdom. As part of Microsoft Rewards program, a user gets 3 points for making a Bing search, 1 point per pound spent on the Microsoft Store online. To earn more points, you can participate in various quizzes as well. An individual user can earn a maximum of 30 points per day. That’s 10 searches per day if you don’t make any purchases. Microsoft will double the number of points earned until August 15. However, if you use Edge browser to make those searches and other things, the bar raises to 60 points per day. You won’t be getting any real money but these points can be redeemed to get freebies like Xbox g
Tor 7.0. with updated add-ons, various bug fixes and improved security is now available for download

Tor 7.0. with updated add-ons, various bug fixes and improved security is now available for download

Cyber News, Cyber Security, In Buzz, Uncategorized
The Tor Project has announced the next major release of their anonymity browser in the name of Tor 7.0. The famous browser lets users connect to the Tor network with the help of a modified Firefox ESR web browser which includes add-ons such as TorButton, TorLauncher, NoScript, and HTTPS-Everywhere. Tor 7.0 finds ESR 52.1.2 as its base and leverages the Firefox’s performance and security improvement features like multiprocess mode and content sandbox. The development team says that sandboxing is enabled by default for Linux and MacOS variants of Tor 7.0 while they haven’t finished adding the same for Windows machines. As with ESR 52, Windows machines which doesn’t support SSE2 (Streaming SIMD Extensions 2) won’t be able to run Tor 7.0, And for macOS, the machine should be running
A New Facebook Phishing Technique Named “URL Padding” Is Here To Steal Your Password

A New Facebook Phishing Technique Named “URL Padding” Is Here To Steal Your Password

0 Day Attacks, Cyber News
As we continue to spend more and more hours online, we must up our security game and make sure that we don’t end up losing our data and credentials. However, the reality is grim. Be it the rising threat of ransomware or increasing data theft, the irresponsible security practices of the users are responsible to a great extent. By exploiting the inattentiveness of the users, a new kind of phishing attack is expanding its web to target Facebook users. So, let’s tell you about this attack in detail. What is URL Padding phishing? The notorious hackers have found a new way to fool the users by creating fake and believable URLs. Focused on mobile devices, which have narrow URL bars, the hackers are using real domains within a larger URL. They are padding the larger URL with hyphens to hide t
XOD: A New And Open Source Visual Programming Language

XOD: A New And Open Source Visual Programming Language

Cyber News, Cyber Security, In Buzz
                                                                                                                    Compared to the older times when learning to use a computer was complicated due to lack of GUI elements, today, machines and software operating them have become easier. Now, you can build websites using WordPress, create Android apps using MIT App Inventor — all without mastering some programming language. However, when it comes to hardware tinkering, programming knowledge is a must. To take care of this issue, developers have been trying to create what’s called visual programming languages. Many of them are already popular, including the likes of Node-Red and NoFlo, and others are budding. One such new visual programming language for Raspberry Pi, Arduino, and other
Google For Jobs: A New Search Engine Launched For Job Seekers

Google For Jobs: A New Search Engine Launched For Job Seekers

Cyber News, Cyber Security, In Buzz
Google announced today it’s launching a jobs search engine in the U.S. The service will focus on all types of jobs – from entry-level and service industry positions to high-end professional jobs. It will also leverage Google technologies like machine learning and A.I. to better understand how jobs are classified and related, among other things. Google CEO Sundar Pichai gave a brief preview of the job search engine, called “Google for Jobs,” at Google’s developer conference I/O this afternoon. “46% of U.S. employers say they face talent shortages and have issues filling open job positions,” explained Pichai. “While job seekers may be looking for openings right next door – there’s a big disconnect here…We want to better connect employers and job seekers through a new initiative, Google f
MasterCard launches Credit Card with Built-In Fingerprint Scanner

MasterCard launches Credit Card with Built-In Fingerprint Scanner

Cyber News, In Buzz
MasterCard has unveiled its brand new payment card that has a built-in biometric fingerprint scanner, allowing customers to authorize payments with their fingerprint, without requiring a PIN code or a signature. The company is already testing the new biometric payment cards, combined with the on-board chips, in South Africa and says it hopes to roll out the new cards to the rest of the world by the end of 2017. Don't Worry, It Still Supports PIN-based Transactions as Fallback Wait — If you think that this feature would not allow you to share your card with your child and spouse, don’t worry — Mastercard has a solution for this issue as well.=  The company has confirmed that even if the card is configured to expect the fingerprint for authenticating a purchase, but i
Free hacking tools ‘help young into cyber-crime’

Free hacking tools ‘help young into cyber-crime’

Cyber News, In Buzz
Free, easy-to-use hacking tools help many young people slip into a life of cyber-crime, according to a report. The National Crime Agency (NCA) has detailed the "pathways" taken by people who become criminals. Many started by getting involved with game-cheat websites or forums that talked about ways to change or "mod" games, its report said. Mentors, role models and positive opportunities could deter people from committing cyber-crime, the NCA added. Social club The report is based on a small number of interviews with people arrested or cautioned for carrying out computer-based crimes as well as analyses of academic studies of offenders. It also draws on information resulting from many more "cease and desist" visits to people the NCA identified as being on the periphery of m...
Wikileaks Releases “Guide: How To Hack Windows” Secret  By CIA

Wikileaks Releases “Guide: How To Hack Windows” Secret By CIA

Cyber News, In Buzz, Knowledge Base
As part of its Vault 7 series of leaked documents, whistleblowing website WikiLeaks today released a new cache of 27 documents allegedly belonged to the US Central Intelligence Agency (CIA). Named Grasshopper, the latest batch reveals a CLI-based framework developed by the CIA to build "customised malware" payloads for breaking into Microsoft's Windows operating systems and bypassing antivirus protection. All the leaked documents are basically a user manual that the agency flagged as "secret" and that are supposed to be only accessed by the members of the agency, WikiLeaks claims.  Grasshopper: Customized Malware Builder Framework According to the leaked documents, Grasshopper framework allows the agency members to easily create custom malware, depending upon the te