How to stop hackers from stealing your information on public Wi-Fi

You enjoy “free internet” through Wi-Fi hotspots libraries, coffee shops, at bars, and other public places. It seems harmless. Little do you know, a stranger could know your birthplace, the schools you attended, and your recent search history in 20 minutes. Just a couple of years ago, strangers could login as you on Facebook if you were on the same Wi-Fi network as them. They’d be able to view and send messages from your account, and even post statuses. You don’t have to swear off public Wi-Fi for the rest of your life, and it’s not entirely the venue’s fault….
Read more >>

Why You Should Not Browse the Internet Without a VPN.

  Online surveillance has become the norm. And if you believe you have nothing to hide, that’s usually because you just don’t know yet, or because you are privileged enough to not feel the impact. Keeping yourself safe online is not only important for you alone, but also for your family and friends. The more you protect yourself, the more you protect the people you interact with on a daily basis. It’s no wonder someone asked this question, because according to Google, there are more than 7.19 Billion active devices around the world. With such penetration, problems and vulnerabilities are…
Read more >>

Dutch Hacker Who Almost Broke The Internet Escapes Jail

The Dutch hacker, who in 2013 was accused of launching the biggest cyberattack to date against the anti-spam group Spamhaus, escaped prison Monday even after he was sentenced to nearly 8 months in jail because most of his term was suspended. Sven Olaf Kamphuis, 39, was arrested in April 2013 by Spanish authorities in Barcelona based on a European arrest warrant for launching massive distributed denial of service (DDoS) attack against Spamhaus that peaked at over 300 Gbps. Spamhaus is a non-profit group based in Geneva and London that tracks spam and cyber-related threats, creates blacklists of those sites and…
Read more >>

Elon Musk Plans to Launch 4,425 Satellites to provide Global Internet from Space

Big tech companies, including Facebook, Google, and Microsoft, are in the race of bringing Internet connectivity to unconnected parts of the world through wireless devices, flying drones, high-altitude balloons, and laser beams. But, SpaceX founder Elon Musk has big plans for bringing low-cost Internet service worldwide, and it all starts in space. Private rocket launch service SpaceX has asked the U.S. government for permission to launch 4,425 satellites in orbit to beam high-speed Internet down to the world, according to a newly filed application with the Federal Communications Commission (FCC). That’s a hell of a lot of satellites; in fact,…
Read more >>

In UK, Investigatory Powers Act forces collection of “internet connection records” which allows government to see one year of your internet history

The Investigatory Powers Act replaces existing law under the Telecommunications Act and brings government mass surveillance into the Internet age with a bang. The IP Act made it through both Houses, without adding any of the privacy constraining amendments suggested by the House of Lords Intelligence and Security Committee, and will become law within weeks. Under the new law, the UK government can access 12 months of your Internet history at the drop of a hat. Additionally, they now have the power to infiltrate and infect your computer in the course of an investigation with only the say-so of the…
Read more >>

Dangerous Rootkit found Pre-Installed on nearly 3 Million Android Phones

Here’s some bad news for Android users again. Nearly 3 Million Android devices worldwide are vulnerable to man-in-the-middle (MITM) attacks that could allow attackers to remotely execute arbitrary code with root privileges, turning over full control of the devices to hackers. According to a new report from security rating firm BitSight, the issue is due to a vulnerability in the insecure implementation of the OTA (Over-the-Air) update mechanism used by certain low-cost Android devices, including BLU Studio G from US-based Best Buy. Backdoor/Rootkit Comes Pre-installed The vulnerable OTA mechanism, which is associated with Chinese mobile firm Ragentek Group, contains a…
Read more >>

VPNs for Beginners – What you need to know

What is VPN? Virtual Private Networking (VPN) is a suite of technologies that Provide privacy by hiding your internet activity from your ISP (and government) Allow you to evade censorship (by school, work, your ISP, or government) Allow you to “geo-spoof” your location in order to access services unfairly denied to you based on your geographical location (or when you are on holiday) Protect you against hackers when using a public WiFi hotspot Allow you to P2P download in safety. In order to use VPN you must first signup for a VPN service, which typically cost between $5 – $10…
Read more >>

Wifi Signal Interference Can Leak Your Password and Keystrokes

Hackers can steal your sensitive information, such as your Passwords, PINs and Keystrokes, from your phone by observing changes in the wireless signal as you enter them into your smartphones. A group of researchers from the Shanghai Jaio Tong University, the University of South Florida and the University of Massachusetts at Boston have demonstrated a new technique that can reveal private information by analyzing the radio signal Interference, using just one rogue WiFi hotspot. Dubbed WindTalker, the attack sniffs a user’s fingers movement on the phone’s touchscreen or a computer’s keyboard by reading the radio signal patterns called Channel State…
Read more >>

Active 4G LTE vulnerability allows hackers to eavesdrop on conversations, read texts, and track your smartphone location

Zhang Wanqiao, a Chinese researcher from Qihoo 360 has demonstrated an active 4G LTE vulnerability that allows any dedicated attacker to intercept your calls and texts as well as track your location. The hack was demo’d yesterday at the Ruxcon security conference in Melbourne, Australia. This 4G vulnerability is currently exploitable on any LTE network and is based off a little-known “fail-safe” that is supposed to only be used during emergencies, such as natural disasters, when individual cell phone towers are likely to become overloaded and redirection may be necessary. However, there might be a simpler reason as to why this 4G vulnerability is…
Read more >>

Easily use a VPN for all your Gaming Activities

A VPN can be used for various purposes on games but they are mainly used for the following reasons: to access Geo-blocked games to lower your ping during online game play to protect you from DDoS attacks There are many games that can only be played or downloaded in certain regions. For instance, there are Japanese and Korean games that are only available in their respective play stores. You play and download such games using a VPN service. A VPN also helps you lower your ping while playing online games such as DOTA 2, LoL, and CS:Go. This is achieved…
Read more >>

1 2