background preloader

Technology

Facebook Twitter

TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows 7/Vista/XP, Mac OS X and Linux. Grams - First Underground Black Market Search Engine - Freedom Hacker. The dark net, or underground web is a mysterious hidden part of the internet. Its hidden to the point where it can’t be found in search engines, and its hard to access. Once users gain access to the deep web, it may be hard to find whats online. Black markets, and various other sites run under the Onion network, and many users don’t know how to reach what they are searching for. If they do find something on the underground, it may be hard to determine the legitimacy of the product or service. Underground markets offer a trove of illegal services. Popular services include high quality drugs, weapons, hacking tools, illegal services, and more. None of that will be a problem anymore. There is no setup, or extra settings that need to be check in TOR or elsewhere.

The anonymous creator of Grams posted on Reddit, “I am working on the algorithm so it is a lot like google’s it will have a scoring system based how long the listing has been up, how many transactions, how many good reviews. TrueCrypt Secure, Encryption Tool Passes First Audit With No Backdoors - Freedom Hacker. TrueCrypt the popular freeware to encrypt hard drives and operating systems ranging from Linux, to Mac OSX, to regular Windows had been under heat for some time. The public believed that the freeware encryption tool may be easily cracked or a government operation. Well, TrueCrypt has successfully passed its first audit phase. Analysts have tested over 70,000 lines of the source code, and TrueCrypt has successfully passed its first audit. TrueCrypt is a popular freeware tool to encrypt virtually any operating system or hard drive. The tool is not the average file encryption tool. The anonymous developers of TrueCrypt run under aliases “ennead” and “syncon”.

The popular freeware trusted by millions seems to have nearly a clean slate. Researchers stated none of found vulnerabilities seem to be intentional to flaw or help a third party exploit the software. The first audit phase focused on TrueCrypt’s boot loader and Windows kernel driver, or architecture and code review. Angry Birds Selling Personal User Data to Marketers - Freedom Hacker. Widely popular, Angry Birds, the seemingly innocent game where you shoot birds into towers to defeat little green pigs, may not be so innocent after all. While you launch the birds at towers, Angry Birds is launching your data at advertisers worldwide. Many mobile applications are known to be insecure, and the NSA has been caught invading mobile games to spy on peoples private life. While this may be a privacy intrusion, it can be fixed seemingly easily. But while the NSA is utilizing their precious time backdooring mobile applications for data, Rovio is selling it, FireEye reports.

Data hungry applications are not much of a new concept, data hungry applications were begin reported on just last year in mid October. Again with ties to the National Security Agency. Reports made it to news networks ranging from ProPublica, to U.K. The Android version of the popular Angry Birds in the Google Play store continues to share personal information. What information is begin shared? Unique Steam Phishing Campaign Targeting Steam Guard - Freedom Hacker. The popular PC gaming platform known as Steam, has been a constant target to hackers and malicious attacks. Many players use steam guard to protect their accounts from unauthorized access. But what if hackers could indirectly hijack your account, and make their computer appear as yours and completely circumvent steam guard?

Steam, the PC gaming program is a large community of online computer gamers. It is one if not the most popular systems for gamers to connect, buy games, and play online with friends. With something the size of steam, obviously hackers will target users with phising campaigns, viruses, among numerous other attack methods. While steam guard is begin used by a large number of gamers, hackers have launched a new phishing campaign targeting Steam Guarded accounts. Picture Credit to This pop-up is not asking for the steam guard token, this reads, We see you’re logging in to Steam from a new browser or a new computer. What is the SSFN file? Heartbleed maliciously exploited to hack network with multifactor authentication. Demonstrating yet another way the catastrophic Heartbleed vulnerability threatens users, malicious hackers were able to exploit the bug to successfully bypass multifactor authentication and fraud detection on an organization's virtual private network (VPN), security researchers said.

When the critical flaw in the OpenSSL cryptographic library came to light 11 days ago, it was best known as a dangerous hole that allowed attackers to siphon out user names, passwords, and even private encryption keys processed by vulnerable Web servers. More recently, researchers confirmed that Heartbleed could be exploited to steal the private keys underpinning the widely used OpenVPN application and likely software for other VPNs that rely on a vulnerable version of OpenSSL. Instead of probing the client's VPN for passwords or encryption keys, the attackers looked for session tokens set by the targeted concentrator, which relied on a vulnerable version of OpenSSL. 'The Matrix' First Appeared 15 Years Ago Today - Transforming The Career Of Keanu Reeves. It was 15 years ago today that 'The Matrix' first embedded itself in our consciousness, imprinting its lasting impact on our sense of what's real, what might not be, and lending itself to many an occasion when we can say, "this feels like something out of the Matrix.

" Keanu Reeves' name was made as confused hacker turned revolutionary Neo Keanu Reeves, Carrie-Ann Moss, Hugo Weaving and Laurence Fishburne were the stars of the Wachowski siblings' deeply original sci-fi outing, where Neo (Reeves) is a humdrum computer hacker, until he learns the nature of his 'reality' and his place in the war against the uber-controllers. WATCH the video of the best bits from the Trilogy - do you think it's dated, or does it still hold up? Since then, the names Neo, Trinity, Morpheus and, most enigmatically of all, Agent Smith, instantly conjure up visions of white rooms, post-apocalyptic basements and lots and lots of black leather and Lycra. Loading Slideshow 10 Captain Picard - Star Trek9. Two Zombie Lord Computers In London Just Hijacked The Internet For 300,000 Machines.

Two IP addresses based in London have managed to hijack more than 300,000 internet routers, according to security researchers in Wales. A paper by 'Team Cymru' said that the massive hack had been carried out on targets around the world. This type of hack is relatively rare, in that it was aimed at routers instead of computers. But in essence it was similar to other botnet hacks, in that the aim was to direct traffic from legitimate sites to spoof versions which look the same, but can be dangerous or deliberately fraudulent.

(The Verge points to a similar attack in Poland, where hackers using the same exploit were able to steal bank account details (and the contents of those accounts). Team Cymru's Steve Santorelli said that it still wasn't sure where the traffic in this case was supposed to be directed, or what the ultimate goal for the hackers was. "This is a logical evolution from traditional botnet technology," Santorelli said, according to The Verge. Net neutrality loss: What it has in common with SOPA. Photo by Gary Cameron/Reuters Life before the Internet sucked. My life as a kid growing up in suburban Michigan consisted of urban sprawl, shopping malls, and bad television (except 30 minutes of Seinfeld every Thursday).

Adults told you that educated people followed the news, but most small towns had one mediocre newspaper, and local TV news had cats stuck in trees and house fires. (Thanks, adults.) To learn anything, you had to drive to a bookstore; subscribe to a stack of magazines; or schlep to a library, go through a card catalog, discover a book that someone had already checked out and was overdue, request the book back from that person or order it through interlibrary loan, and wait a few more weeks for the book to come while watching bad sitcoms (Seinfeld notwithstanding) with loud commercials. Then everything changed. From the beginning, the open Internet has had its enemies. 1. 2. The same thing is happening with net neutrality. 3. There’s a similar disconnect today. Net neutrality loss: What it has in common with SOPA. Apple's security flaw SSL vulnerability: How do I protect myself? Flappy Bird scammers pounce on unsuspecting users. 11 February 2014Last updated at 12:39 ET Dong Nguyen said the game's success had been keeping him awake at night Scam artists seeking to capitalise on the demise of popular mobile game Flappy Bird have released harmful clones.

Apps that appeared to be identical to the original have been designed to trick users into sending premium rate text messages. The malicious apps were found in Google's Android store, security firm Trend Micro reported. The real Flappy Bird creator said he deleted the app as it was "addictive". In an interview with Forbes, the "stressed" 29-year-old developer Dong Nguyen said: "Flappy Bird was designed to play in a few minutes when you are relaxed. "But it happened to become an addictive product. Data leakage Quick to seize an opportunity, scammers have created clone apps containing malicious software. The malicious app asked for more permissions to be granted by the user Flappy knock-offs Flappy Bird shot to the top of app store charts. 'Tainted Love' Played By Floppy Disk Drives Is Possibly The Best Use Of Technology Ever. CES 2014: Phones morph into 'stun guns' and 'tricorders'

9 January 2014Last updated at 03:23 ET By Leo Kelion Technology reporter The Yellow Jacket smartphone case has the power to deliver a 650,000 volt electric shock - and would be illegal to own in the UK Add-ons that turn smartphones into Star Trek-like tricorder medical diagnostic kits, Predator-style thermal vision cameras and even electric "stun guns" are being promoted at the Consumer Electronics Show. The inventions join a growing list of hardware that adds abilities to existing handsets. Most will go on sale this year. But one expert said the ambition of many was to see themselves taken over by one of the big manufacturers.

That is what happened to Authentec, which attended CES for several years before its fingerprint tech was acquired for use in Apple's iPhone 5S. "If you come up with a good idea the reality is that you're going to get sold for a high price," explained Ben Wood from the tech consultancy CCS Insight. Tricorder tech At least that's the theory.

Sound and vision Touch my back. NSA 'developing code-cracking quantum computer' 3 January 2014Last updated at 06:30 ET The NSA wants to use its quantum computer to break encryption used to protect online communication The US National Security Agency is building a quantum computer to break the encryption that keeps messages secure, reports the Washington Post. The NSA project came to light in documents passed to the newspaper by whistle-blower Edward Snowden. The spying agency hopes to harness the special qualities of quantum computers to speed up its code-cracking efforts. The NSA is believed to have spent about $80m (£49m) on the project but it has yet to produce a working machine. If the NSA managed to develop a working quantum computer it would be put to work breaking encryption systems used online and by foreign governments to keep official messages secure, suggest the documents excerpted in the Post.

The quantum computer is being developed under a research programme called Penetrating Hard Targets and is believed to be conducted out of a lab in Maryland. Flash for the iPad (All Gens) – Play Facebook Games on your iPad – iPad Nerds. There were many reasons why the iPad was intentionally designed not to support flash, including security issues, battery consumption, and flash is not really designed for touch screens.

However, there are ways to use Flash on your iPad. Since the iPad does not natively support Flash, you will need to download and install a flash supported browser. This means that you will have to use a different web browser whenever you want to run flash sites. There are many Flash supported browsers available to download in the App Store. Here are some of the best one’s that will allow your iPad to view flash websites, play flash games, and watch flash videos. Puffin Web Browser The free version comes with a free two week trial and if you are satisfied with the product you can purchase the full version for $2.99.

iSwifter iSwifter is a free Flash supported browser and is probably the best free browser out there. Photon Flash Player This is another great alternative. Choose a browser and go! Massive 'Botnet' Virus Targets Shopping Tills, Steals Credit Cards. A botnet which targets shopping tills has been discovered - and it could be responsible for stealing a "titanic volume" of credit card details. Ars Technica reports that researchers from Intel Crawler found the problem after infiltrating one of the computers behind the scam. A botnet is a distributed network of computers infected with viruses or malware, which are used to harvest data and send it back to scammers. But in this instance the viruses also compromised 'point of sale' (PoS) machines, or shopping tills, and managed to send back details of payments taken by unwitting staff.

Up to 20,000 payment cards since August may have been compromised by the botnet, researchers said, though the number could be much higher. Hacking of payment machines is not unusual - a previous hack targeting Subway managed to collect 146,000 cards' worth of data from just 200 individual shops, Ars Technica pointed out. The difference is that the latest scam appears to be much more advanced, researchers said. Microsoft disrupts ZeroAccess web fraud botnet. 6 December 2013Last updated at 01:46 ET Infected computers dupe online advertisers by generating fraudulent ad clicks ZeroAccess, one of the world's largest botnets - a network of computers infected with malware to trigger online fraud - has been disrupted by Microsoft and law enforcement agencies.

ZeroAccess hijacks web search results and redirects users to potentially dangerous sites to steal their details. It also generates fraudulent ad clicks on infected computers then claims payouts from duped advertisers. Also called Sirefef botnet, ZeroAccess, has infected two million computers. The botnet targets search results on Google, Bing and Yahoo search engines and is estimated to cost online advertisers $2.7m (£1.7m) per month. Microsoft said it had been authorised by US regulators to "block incoming and outgoing communications between computers located in the US and the 18 identified Internet Protocol (IP) addresses being used to commit the fraudulent schemes".

Continue reading the main story. Data haul by Android Flashlight app 'deceives' millions. 6 December 2013Last updated at 06:42 ET The "brightest flashlight" app was downloaded to millions of Android devices Tens of millions of Android users have been "deceived" by a developer who covertly gathered personal data, the US Federal Trade Commission (FTC) said. GoldenShores Technologies took ID and location data from the millions using its Brightest Flashlight app.

The developer shared the data with ad networks but did not tell users about this practice, an FTC statement said. To settle the charges, GoldenShores has agreed to give users more control over what happens to their data. In its statement, the FTC criticised GoldenShores for its poor privacy policy, which did not let people know that the app was logging their precise location and a unique identifier for their phone and was then sharing that information with advertisers. 'Left in the dark' "But this Flashlight app left them in the dark about how their information was going to be used," she added.

BitCoin meets Google Trends and Wikipedia: Quantifying the relationship between phenomena of the Internet era : Scientific Reports. Singularity University plots hi-tech future for humans. Time To Move To Hong Kong: U.S. Internet Is Stupidly Slow, Report Finds. The internet mystery that has the world baffled. Photons Seen Without Being Destroyed For First Time Ever. Aluminium: The metal that just keeps on giving. Science & Environment - Doctor Who: 50 years of time travel in the TARDIS. LG investigates Smart TV 'unauthorised spying' claim. Police warn of 'ransom' spam targeting UK users. Quantum memory 'world record' smashed.

Trending: The infuriating future of spam... "twam"? 'BadBIOS' Virus Might Be Able To Infect PCs Through Their Speakers. Technology - Moocs data offers promise of perfect teaching. 'For The Players Since 1995': This Nostalgic PS4 Advert Might Just Make You Cry. Valve video shows Steam Controller working with a variety of games. NY Comic Con tells attendees not to fret after it ghost-tweets for them.

Tor Browser Bundle. John McAfee: Addict, coder, runaway. One button to silence all distractions: the latest in 'conscious computing' | News. Google buys human-gesture recognition start-up Flutter. Space Pilot for Computers -- Ergonomists Reduce Repetitive Stress with Computer-Mouse Alternative. Facebook Will Send Conversation Data To Select TV Networks. Why Isn’t Sony’s Waterproof Super-Cameraphone More Amazing? Hackers Courted by Government for Cyber Security Jobs - Rolling Stone. Hackers Courted by Government for Cyber Security Jobs - Rolling Stone. Snowden leaks: US and UK 'crack online encryption'

Patents: A beginner's guide to intellectual property. Steve Wozniak: Microsoft resting on its laurels. Web Scammers Are Trying to Scare You Into Paying Fines for Illegal Downloads. XKeyscore: NSA tool collects 'nearly everything a user does on the internet' Eve players stage giant online space battle. JaiRo - Open Source x86 Router Platform by Sabai Technology. Swedes Create Impossible Material by Mistake.