DEVA DEEP
31 Added | 2 Magazines | 41 Likes | @devadoo | Keep up with DEVA DEEP on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “DEVA DEEP”
Has Your Company Secured These Overlooked Attack Vectors?
If you're a business leader, you've heard, read or thought about it more than you probably want to: the ceaseless war to protect your company's …
Information SystemsHacking Windows 10: How to Capture Keystrokes & Passwords Remotely
Using a keylogger to intercept keys pressed on an infected computer can circumvent encryption used by email and secure chat clients. The collected …
CybersecurityHow to Hack Wi-Fi: Hunting Down & Cracking WEP Networks
While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP …
Information SecurityIntel is bringing its most powerful Core i9 processors to laptops
‘The best gaming and creation laptop processor Intel has ever built’<p>Ever since Intel announced its first Core i9 processor for desktops last year, it’s only been a matter of time until the company brought that branding to laptops, too. Today, Intel is announcing its first Core i9 chip for laptops, …
LaptopsHow We Test VPNs
If you want to protect your online privacy, a good VPN is key. Here at PCMag, we review scores of them to help you find the right one for your needs. …
PrivacyJailed Russian: Here’s How I Hacked The U.S. Election
From a cell in a high-security prison outside Moscow, Konstantin Kozlovsky reveals more about the software he claims disrupted the 2016 election.<p>MOSCOW–Konstantin Kozlovsky is ready to talk. The 29-year-old blonde-haired Russian hacker at the center of the intrigue surrounding the Kremlin’s …
RussiaHackers Breach Rajya Sabha Website, Access Amit Shah’s Account
A group of hackers on Monday, 19 March, claimed to have hacked into the Rajya Sabha website that only members and administrators have access to, …
IndiaPopular Design News of the Week: January 29, 2018 – February 4, 2018
Every week users submit a lot of interesting stuff on our sister site Webdesigner News, highlighting great content from around the web that can be of …
UX DesignPersonal data of a billion Indians sold online for £6, report claims
Newspaper says it bought access to details from world’s largest biometric database, used to administer public services<p>The personal information of more than a billion Indians stored in the world’s largest biometric database can be bought online for less than £6, according to an investigation by an …
IndiaNew Smartphone App to Help Locate People in Areas Without Network
Scientists have developed a smartphone app that can be used in emergency situations arising due to earthquakes, floods or forest fires, where mobile …
AppsBest Anime of 2017
Don’t you just hate it when you’re at a party and everyone’s discussing <b>Kill la Kill</b> and you’re unable to jump in? What about when you’re in the …
What is GnatSpy? Two-tailed Scorpion hacker group's new malware targets your phone's sensitive data
The malware targets a slew of sensitive phone data ranging from battery usage to images, contacts and call history.<p>Security researchers have spotted …
Top 8 Cybersecurity Skills IT Pros Need in 2018
Cloud security architecture skills to customer-service savvy are among the key IT security skills needed next year as CIOs ramp up hiring.<p>1 of 9<p><i>Image</i> …
5 more Windows admin tasks made easy with PowerShell
I’ve written a lot about Microsoft PowerShell on this site, but my favorite thing to do is show how to apply the scripting language to various tasks …
Information SecurityAlmost one billion video stream users exposed to secret cryptocurrency mining
Popular video streaming and ripping services are secretly mining crypto through visitor PC power.<p>A number of popular video streaming and ripping …
Apps Can Track Users Even When GPS Is Turned Off
Princeton researchers have developed a proof-of-concept app that can be used to reliably track users even if an app does not access a phone's GPS …
Apps'Janus' vulnerability allows attackers to modify APKs without changing signature, APKMirror already protected
Since the first release, Android has required developers to sign their applications. When you update an app, Android will compare the update's …
Keylogger Found in HP Notebook Keyboard Driver
HP has released driver updates for hundreds of notebook models to remove debugging code that an attacker could have abused as a keylogger component. …
DebuggingGCHQ figured out how to hack PCs running Windows 10 after finding critical Microsoft bugs
The bugs could have allowed hackers to install programs, delete data and more.<p>Two critical Windows vulnerabilities discovered by Britain's spy agency …
How to Track a Cellphone Without GPS—or Consent
As the Supreme Court mulls over the case of <i>Carpenter v. United States</i>, which may have far-reaching consequences for police who track suspects without …
Princeton University"Process Doppelgänging" Attack Works on All Windows Versions
Today, at the Black Hat Europe 2017 security conference in London, two security researchers from cyber-security firm enSilo have described a new code …
Information SecurityHow I Hacked 40 Websites in 7 minutes
Last summer I started learning about information security and hacking. Over the last year I’ve played in various wargames, capture the flag and …
Information SecuritySecure Your Network. Here’s How
How many of us really know how cyber security works or its priority level in an organisation? To give a broader picture, the rising awareness among …
CybersecurityDark web markets are leaking their real IP addresses, risking police takedowns
Several underground drugs markets have reportedly exposed their IPs.<p>Newly-cropped up dark web markets, run by inexperienced cybercriminals, have …
Chinese hacker group KeyBoy is back with new spy malware targeting Western organisations
The hacker group has been active since 2013, previously targeting organisations in South East Asia.<p>A hacker group known as KeyBoy, believed to be …