Saturday 31 October 2015

CYPTOWALL RANSOMWARE GENERATED $325 MILLION IN REVENUE

 
hackers primarily (literally) gain access to a user's computer system using a ransomware malware, which encrypts all files with a strong cryptographic algorithm, and demand a ransom money to be paid in Bitcoin, in most cases between $200 and $10,000.
A (pdf)  Report published by Cyber Threat Alliance (CTA), an industry group formed last year to study emerging threats, researchers have discovered:
  • 406,887 CryptoWall infection attempts
  • Total of 4,046 malware samples
  • 839 command-and-control server URLs to send commands and receive data
  • 5 second-tier IP addresses
  • 49 different CryptoWall distribution campaigns
  • Out of 49, a single campaign, dubbed as "crypt100", infected as many as 15,000 computers worldwide
  • cybercriminals behind the ransomware are likely to a singular group due to several similarities
  • Same hacker group generated more than $18 Million in the past year alone from previous versions of CryptoWall.
In summary, this single cybercriminal ring has generated as much as $325 million from the money paid by hundreds of thousands of CryptoWall 3.0 victims around the world to get their encrypted files unlocked.
 

Friday 30 October 2015

Tor Just Released an Anonymous Messenger - see how to use


#Who Knows!
#Should We Trust this? :)
The Tor Project  claims to have launched the first beta version of Tor Messenger, its open source and Encrypted instant messaging client that works with the Tor network.
The team claimed that their app encrypts the content of instant messages as well as makes it very difficult for snoopers and eavesdroppers to identify the user sending them.
i will quote from the Tor messenger site below
Tor Messenger is a cross-platform chat program that aims to be secure by default and sends all of its traffic over Tor. It supports a wide variety of transport networks, including Jabber (XMPP), IRC, Google Talk, Facebook Chat, Twitter, Yahoo, and others; enables Off-the-Record (OTR) Messaging automatically; and has an easy-to-use graphical user interface localized into multiple languages.
This App tried to put simplicity and privacy in one and
HOW IT WORKS
 The Messenger integrates the "Off-the-Record" (OTR) to encrypt messages and then routes them over Tor network in the same manner as the Tor Browser does for the web.
The app was built on Mozilla's instant messaging client Instantbird
HERE IS AN INSTALL GUIDE



tor messenger
  • Jabber (XMPP) chat protocol
  • IRC (Internet Relay Chat)
  • Facebook Chat
  • Google Talk
  • Twitter
  • Yahoo!
  • Desktop clients like Adium for Mac and Pidgin for Windows

The Tor team's future Tor Messenger versions will include support for:
  • Sandboxing (for increased security)
  • Automatic updates
  • OTR for Twitter DMs
  • Better support for Tor's protocols
  • Secure multi-party communication (np1sec)
  • Encrypted File Transfers



Thank you! I hope this article helped a lot! you can always check back for more interesting articles. Thank you! #tekspy

Thursday 22 October 2015

FACEBOOK TO ROLL OUT DISLIKE BUTTON SOON

Welcome!

How does it sound?
your relation pass on and you get likes instead of a "take-heart" kinda comment...
You where involved in an accident ... tell friends on FB, and you still get likes!!!
Gush... sometimes i wonder if the literal meaning of like changed overnight.

Some people will flood your timeline with ugly pics, you don't have the energy to tell them how ugly the picture is, and hitting the like button will give them an impression that you probably fancy the pics.

Spam messages spread fast on FB because of the "like button".

Wednesday 21 October 2015

CIA Directors email hacked; to be published shortly




HACKERS CAN CONTROL YOUR IPHONE OR ANDROID FROM 16 FEET AWAY- (SEE HOW)


A man once said "as long as we are on this earth, there is no security whatsoever"
imagine your phone making calls, sending sms, or visiting malicious websites without your consent... you will be like gush! and that will throw you of balance for a while.
hackers are now able to hack your iphone or android using your personal assistant Siri or Google Now.
this hack can only be possible when you have a headphone plugged into your headphone jack.......
as technology gets more advanced, the more insecure it becomes (it seems)

this hack, in its smallest form can be carried out within a range of six and a half feet.
A more powerful hack that ranges to more than 16 feet requires larger batteries and could only fit inside a car, the researchers say.

What exactly do you need to carry out this hack:

    1. An iPhone or Android handset with headphones plugged in
    2. A radio transmitter


The radio transmitter sends radio waves to silently trigger voice commands on any iPhone or Android phone (with a pair of microphone-enabled headphones plugged in) that has Siri or Google Now enabled respectively.

Where the headphones’ cables act as radio antennas, which can be exploited to trick an iPhone or Android phone user into believing that the voice commands are coming from the user’s microphone.

This could leverage a hacker to do whole lots of things on victim's mobile phone without even speaking a word, including:

    Make calls
    Send text messages
    Dial the hacker's number to turn victim's phone into an eavesdropping device
    Browse to malware websites
    Send phishing and spam messages using Facebook, Twitter or email


Monday 19 October 2015

Twitter has laid off 8% of its employees

Twitter has cut off 336 staff members, the cut was majorly from product and engineering teams,

Is this actually necessary?
is this Dorsey's first major action as CEO?
is it what the management is to be concerned with?


I know these questions and many more should be running through your mind as well