Nabeel Ahmed

170 Added | 1 Magazine | 274 Followers | @Lodoss1898 | Keep up with Nabeel Ahmed on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Nabeel Ahmed”

From zero to SYSTEM on full disk encrypted Windows system (Part 2)

Intro<p>This blog post is a continuation of my previous post which can be found here.<br>The reason I devided is because two seperate vulnerabilities come …

Voice assistants like Siri and Google Now could be vulnerable to attack

Joomla bug puts millions of websites at risk of remote takeover hacks | Ars Technica

Just-patched flaw allows outside hackers to gain administrator access.<p>Millions of websites used in e-commerce and other sensitive industries are …

Information Security

Facebook Is Spying On Your Clipboard

Copy a URL and the app for iOS will suggest you share it with your friends. Is this an invasion of privacy?<p>Facebook knows when you copy a link, even …

Cybersecurity

Warning! How Hackers Could Hijack Your Facebook Fan Page With This Trick

Facebook bounty hunter <i>Laxman Muthiyah</i> from India has recently discovered his third bug of this year in the widely popular social network website that …

Encrypted database case #1

Encrypted database case #1

Encryption

German Spy-Agency Trades Citizens' Metadata in Exchange for NSA's Xkeyscore

This is Really Insane!!<p>Germany's top intelligence agency handed over details related to German citizen metadata just in order to obtain a copy of the …

DRDoS, UDP-Based protocols and BitTorrent

On July 1st, 2015, the security team at BitTorrent received a report [1] from Florian Adamsky about Distributed Reflective Denial of Service (DRDoS) …

Information Security

How to hack a Corvette with a text message

Researchers have demonstrated how a simple text message can be used to control a vehicle.<p>Researchers have revealed how they were able to control a …

General Motors

‘The most breathtaking breach of privacy ever’

Government, security agencies and the telecommunications industry will be forced to explain a security hole that allows hackers to listen in to …

Lenovo Caught Using Rootkit to Secretly Install Unremovable Software

Two years ago Chinese firm Lenovo got banned from supplying equipment for networks of the intelligence and defense services various countries due to …

Exclusive: Russian Hackers Target The Pentagon

A sophisticated group of hackers, who earlier targeted the White House, have launched a stealth phishing campaign on the Pentagon.<p>Hackers linked to …

This code can hack nearly every credit card machine in the country

Get ready for a facepalm: 90% of credit card readers currently use the same password.<p>The passcode, set by default on credit card machines since 1990, is easily found with a quick Google searach and has been exposed for so long there's no sense in trying to hide it. It's either <i>166816</i> or <i>Z66816</i>, …

Home Depot

Hackers are draining bank accounts via the Starbucks app

Thieves are stealing money from people's credit cards, bank and PayPal accounts -- by first tapping into their Starbucks mobile app.<p>Starbucks (SBUX) on Wednesday acknowledged that criminals have been breaking into individual customer rewards accounts.<p>The Starbucks app lets you pay at checkout with …

Identity Theft

How China's 'Great Cannon' works -- and why we should be worried

<b>(CNN) —</b> Readers may have heard of the "Great Firewall," the powerful filters that the People's Republic of China uses to prevent Chinese citizens from accessing the whole Internet.<p>The Great Firewall monitors traffic entering and exiting China, and then disrupts prohibited content and connections. …

Information Security

The US will protect Japan against cyberattacks

The US knows that it's not enough to protect its own networks against cyberattacks -- its allies have to be safe, too. Appropriately, it's agreeing to shield Japan from digital assaults against its military and critical systems. The move gives the island nation a big security boost (its online …

Signing Into Websites With Facebook Is Just Asking To Be Hacked

It's so easy and convenient to sign in to multiple secure sites using your social media credentials. Easy, and dangerous. Using social media for …

Social Media

Your Tor-based email isn't as secure as you think

A recent security breach just provided a painful reminder that Tor's anonymity network isn't completely foolproof against truly determined intruders. The email service SIGAINT is warning users that someone recently launched a sustained attempt to break into its servers and snoop on messages. While …

Russia's cyberattacks grow more brazen

Russia has ramped up cyber attacks against the United States to an unprecedented level since President Obama imposed sanctions last year on President …

Cybersecurity

7 easy ways to avoid being hacked

Technically, everything that connects to the Internet can get hacked. But there are several things you can do to protect yourself and your data from an attack.<p>Here are a few tips that will mitigate the risk of getting your personal data stolen.<p>The best way to avoid being scammed by phony emails is …

Information Systems

How can I protect my passwords and personal data without TrueCrypt?

Chris uses TrueCrypt to encrypt sensitive information, but needs an alternative now that program has been abandoned by its developers<p><i>What can you recommend instead of TrueCrypt, which I use for encrypting passwords and personal data. I use the File Container approach, which is all I need and is</i> …

Information Systems

FBI: Hackers Exploiting ISIS Notoriety To Promote WordPress Hacks

Self-described sympathisers of extremist group ISIS have hacked their way into websites to leave messages for visitors, the FBI has warned. The law enforcement agency said yesterday many sites were being attacked because of unpatched flaws in their WordPress content management systems.<p>But the FBI …

Hacking

Cyberwar heats up in the Middle East

Two new malware campaigns have been spotted in the Middle East, according to reports released this week, one targeting energy companies and the other …

Private 'darknet' markets under siege

Darknet marketplaces using the anonymous online network Tor have been under siege this week from “the most serious attack TOR has ever seen,” …

IBM: 'Dyre Wolf' Cyber Gang Stole More Than $1 Million from Businesses

IBM says it has uncovered a sophisticated fraud scheme run by an Eastern European gang of cybercriminals who used a combination of phishing, malware and phone calls to steal more than $1 million from large and medium-sized U.S. companies. The scheme, which IBM security researchers have dubbed "The …

Eastern Europe

The programs with the most security vulnerabilities in 2014 were not the ones you think

Google Chrome, Oracle Solaris and Gentoo Linux all beat Microsoft's Internet Explorer in having the most vulnerabilities last year, according to …

Software