DEVA DEEP

31 Added | 2 Magazines | 41 Likes | @devadoo | Keep up with DEVA DEEP on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “DEVA DEEP”

Has Your Company Secured These Overlooked Attack Vectors?

If you're a business leader, you've heard, read or thought about it more than you probably want to: the ceaseless war to protect your company's …

Information Systems

Hacking Windows 10: How to Capture Keystrokes & Passwords Remotely

Using a keylogger to intercept keys pressed on an infected computer can circumvent encryption used by email and secure chat clients. The collected …

Cybersecurity

How to Hack Wi-Fi: Hunting Down & Cracking WEP Networks

While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP …

Information Security

Intel is bringing its most powerful Core i9 processors to laptops

‘The best gaming and creation laptop processor Intel has ever built’<p>Ever since Intel announced its first Core i9 processor for desktops last year, it’s only been a matter of time until the company brought that branding to laptops, too. Today, Intel is announcing its first Core i9 chip for laptops, …

Laptops

How We Test VPNs

If you want to protect your online privacy, a good VPN is key. Here at PCMag, we review scores of them to help you find the right one for your needs. …

Privacy

Jailed Russian: Here’s How I Hacked The U.S. Election

From a cell in a high-security prison outside Moscow, Konstantin Kozlovsky reveals more about the software he claims disrupted the 2016 election.<p>MOSCOW–Konstantin Kozlovsky is ready to talk. The 29-year-old blonde-haired Russian hacker at the center of the intrigue surrounding the Kremlin’s …

Russia

Hackers Breach Rajya Sabha Website, Access Amit Shah’s Account

A group of hackers on Monday, 19 March, claimed to have hacked into the Rajya Sabha website that only members and administrators have access to, …

India

Indian government rejects Google Street View proposal

Google Street View

Popular Design News of the Week: January 29, 2018 – February 4, 2018

Every week users submit a lot of interesting stuff on our sister site Webdesigner News, highlighting great content from around the web that can be of …

UX Design
Web Design

Personal data of a billion Indians sold online for £6, report claims

Newspaper says it bought access to details from world’s largest biometric database, used to administer public services<p>The personal information of more than a billion Indians stored in the world’s largest biometric database can be bought online for less than £6, according to an investigation by an …

India

New Smartphone App to Help Locate People in Areas Without Network

Scientists have developed a smartphone app that can be used in emergency situations arising due to earthquakes, floods or forest fires, where mobile …

Apps

Best Anime of 2017

Don’t you just hate it when you’re at a party and everyone’s discussing <b>Kill la Kill</b> and you’re unable to jump in? What about when you’re in the …

What is GnatSpy? Two-tailed Scorpion hacker group's new malware targets your phone's sensitive data

The malware targets a slew of sensitive phone data ranging from battery usage to images, contacts and call history.<p>Security researchers have spotted …

Top 8 Cybersecurity Skills IT Pros Need in 2018

Cloud security architecture skills to customer-service savvy are among the key IT security skills needed next year as CIOs ramp up hiring.<p>1 of 9<p><i>Image</i> …

5 more Windows admin tasks made easy with PowerShell

I’ve written a lot about Microsoft PowerShell on this site, but my favorite thing to do is show how to apply the scripting language to various tasks …

Information Security

Almost one billion video stream users exposed to secret cryptocurrency mining

Popular video streaming and ripping services are secretly mining crypto through visitor PC power.<p>A number of popular video streaming and ripping …

Apps Can Track Users Even When GPS Is Turned Off

Princeton researchers have developed a proof-of-concept app that can be used to reliably track users even if an app does not access a phone's GPS …

Apps

'Janus' vulnerability allows attackers to modify APKs without changing signature, APKMirror already protected

Since the first release, Android has required developers to sign their applications. When you update an app, Android will compare the update's …

Keylogger Found in HP Notebook Keyboard Driver

HP has released driver updates for hundreds of notebook models to remove debugging code that an attacker could have abused as a keylogger component. …

Debugging

GCHQ figured out how to hack PCs running Windows 10 after finding critical Microsoft bugs

The bugs could have allowed hackers to install programs, delete data and more.<p>Two critical Windows vulnerabilities discovered by Britain's spy agency …

How to Track a Cellphone Without GPS—or Consent

As the Supreme Court mulls over the case of <i>Carpenter v. United States</i>, which may have far-reaching consequences for police who track suspects without …

Princeton University

"Process Doppelgänging" Attack Works on All Windows Versions

Today, at the Black Hat Europe 2017 security conference in London, two security researchers from cyber-security firm enSilo have described a new code …

Information Security

How I Hacked 40 Websites in 7 minutes

Last summer I started learning about information security and hacking. Over the last year I’ve played in various wargames, capture the flag and …

Information Security

Secure Your Network. Here’s How

How many of us really know how cyber security works or its priority level in an organisation? To give a broader picture, the rising awareness among …

Cybersecurity

Dark web markets are leaking their real IP addresses, risking police takedowns

Several underground drugs markets have reportedly exposed their IPs.<p>Newly-cropped up dark web markets, run by inexperienced cybercriminals, have …

Chinese hacker group KeyBoy is back with new spy malware targeting Western organisations

The hacker group has been active since 2013, previously targeting organisations in South East Asia.<p>A hacker group known as KeyBoy, believed to be …