produced by chain | 0 replies
Free tool to detect surveillance spyware has been launched by global union of human rights organizations, including Electronic Frontier Foundation and Amnesty International.Detekt as stated is the very first openly available tool that can trace surveillance spyware used by the governments for reading private emails and can remotely turn on the computer’s microphone or camera and record the...
produced by chain | 0 replies
I use AndChat. It does its job so I can recommend it. You can download it form Google Play Store and it is free. Picture GuideAdvanced GuideOnce you are in the app you should see list of available servers. Freenode should be on the list. By long pressing Freenode it should open menu. Press Edit. Fill in missing fields:Nick 1: YourNickNick 2: YourNick2 (You only need first one. 2nd and 3rd one...
produced by chain | 0 replies
Backdoor:Win32/IRCFlood is an IRC-controlled backdoor trojan that allows an attacker unauthorized access and control of an affected machine. In the wild, this trojan has been distributed via spammed email disguised as a greeting card. The email contains a link to the trojan, which may be downloaded with the file name 'postcard.exe'.Threat behavior Backdoor:Win32/IRCFlood is an IRC-controlled...
produced by chain | 0 replies
Infowars   reporter Joe Biggs uncovers the new Facebook policy that will be introduced on January 1, 2015 that will allow third parties like the CIA, FBI,NSA etc. to collect information from your computer, phones and other devices where you can use Facebook
produced by chain | 0 replies
  The popular copy and paste website 'Pastebin' created a decade ago for software developers and even by hackers groups to share source code, dumps and stolen data, has more recently been leveraged by cyber criminals to target millions of users.Compromising a website and then hosting malware on it has become an old tactic for hackers, and now they are trying their hands in compromising vast...
produced by chain | 0 replies
    A new critical security vulnerability in the BASH shell, the command-line shell used in many Unix and Linux operating systems, leaves a large number of systems at security risk. The bug also affects Mac OS X.CVE Number: CVE-2014-6271Technical Details: Here is technical details of the vulnerability, posted by Florian Weimer in Seclists:"Bash supports exporting not just shell variables, but...