Posted by & filed under Spyware Articles.

Hacking TwitterLike other social media accounts, Twitter accounts can be easily hacked.  Here are the five ways on how you can protect you Twitter from being compromised.

1.  Create a strong password
Don””””t use passwords that are easy to guess such as you birthday, pet names, anniversary dates, etc.  As much as possible do not create passwords that are associated to you.  Use a strong and unique password.  It is advisable to combine capital letters, small letters, numbers, and characters.

 

2.  Watch out for suspicious links from untrusted emails or sites.  Make sure that you are logging in to https://twitter.com and not on other sites.  In some instances you might receive an email asking you to follow the link and change your twitter password.  Don””””t click on the link, it is a common phishing email that will you to a fake login. Twitter will not ask you to change your login details unless you requested it.

 

3.  Don””t allow untrusted third party apps to use your login details in return for followers or likes.  Some malicious apps will use your login details to post on your behalf much worse is getting the information from your followers.  You can revoke access of these apps from the settings.

Protect Your Twitter Account

 

4.  Update your computer or devices.  Keeping you computer or devices updated will minimize the risk of being exploited or hacked.

 

5.  Lock you smart phone screen.  Locking your Android or Iphone screen is preventing someone from prying into your social media profiles.  If your phone got stolen it will be hard for the thief to use your social media profile thereby saving you and your friends from being scam.

 

6.  Disable discoverability of email address.  Most phishing and hacking attempts starts at email.  Disabling other users to discover your email address can prevent you from being victimized.

Protect Your Twitter Account

 

7.  Frequently change your password.  Passwords are often stolen without the victims knowledge and at times they are not used immediately.  They are often sold to crime syndicates that will pry into the users information without being notice.  Ideally password should be change every six months.

 

8.  Verify your twitter account using an sms.  This is one of the safest way to protect your account.  Just in case your account has been compromised, you can just need to lock it down and have an sms message sent to your mobile phone for the new password.

 

Following the tips I outlined above can minimized your Twitter account from being hacked or compromised.

Posted by & filed under Security News, Security Threats.

Netgear HackIn a news report from ZDNET, some models of Netgear routers has a vulnerability and hackers are exploiting the flaw. The hackers can route web browsing data to malicious serves, in which they can gather confidential information from the user.

Joe Giron, a security researcher told BBC that the administrative settings on his personal router were changed. The DNS traffic were effectively redirected.

Once an attacker has successfully redirected the DNS to his server, it can track the users browsing history that may lead to stealing of credentials, or other important informations. The attacker can also redirect the user to a malicious sites that contains malware.

According to Netgear that they are already knew the vulnerability and told that fewer than 5,000 units were affected.

Netgear released a patched firmware for at least nine affected routers.

To recreate or to know more about the vulnerability, visit SHELLSHOCKLABS

 

Visit Netgear knowledgeable base on how to upgrade your router.

Posted by & filed under Security News.

Following massive pressure from both local and international rightsholders, 21 months ago Russia took steps to improve its reputation of going soft on piracy.

On August 1, 2013, the country introduced a brand new intellectual property law which provided a mechanism through which sites could be blocked by intermediaries should they not comply with rightsholder takedown requests within 72 hours.

A year later telecoms watchdog Roscomnadzor revealed that during the law’s first year of operation the Moscow City Court imposed preliminary interim injunctions against 175 sites following copyright complaints. It went on to block just 12 file-sharing domains for being unresponsive to takedowns, many of them BitTorrent trackers.

With complaints from copyright holders continuing to mount, Russia decided to make further amendments to the legislation. Initially only video content was covered by the law but with an expansion scheduled for May 1, 2015, all multimedia content (photographs excluded) will receive protection. Furthermore, the law also amends the provisions on preliminary injunctions.

Although it remains unclear how the new system will work in practice, the theory is that intermediaries (ISPs and webhosts) can be ordered by the Court to permanently block websites that continually host or provide access to infringing content. At least at this early stage it appears to be the kind of system U.S. copyright holders are pushing for elsewhere, one in which content that is taken down, stays down.

With the new law just over a week away, State Duma Deputy Speaker Sergei Zheleznyak has been underlining the legislation’s reach.

“The anti-piracy legislation that created the ability to block access to sites that distribute copyright-infringing films and TV shows entered into force on 1 August 2013. On May 1, 2015 amendments to the Act will come into force that apply to music, books and software,” Zheleznyak says.

“This development will mean that the systematic violation of intellectual property rights will result in sites providing access to stolen content being blocked forever.”

Putting operators of torrent and similar sites on notice, Zheleznyak issued a stern warning.

“I would like to warn those who are still abusing piracy: you have until May 1 to try to and enter into constructive dialogue with rightsholders. They are open to cooperation,” he said.

“Our common goal is to ensure that all work is adequately rewarded and that the benefit from successful books, music and wonderful computer programs is enjoyed by those who created them, and not those who stole them. If [site owners] are not interested in legal business, the response of the state will become quite obvious.”

Russia’s first attempt at site blocking legislation failed to produce the apocalyptic conclusion many predicted. Only time will tell what the results of these latest tweaks will mean for local sites.

source: TorrentFreak News

Posted by & filed under Security News.

Famous hacktivist group, Anonymous has launched a massive cyberattack against the terrorist group Islamic State (ISIS). The attack includes taking down social media accounts that promotes the terrorist group's ideology and violent persecution of prisoners.

ISIS is responsible for the brutal killing of a Jordanian pilot, Muath al-Kaseasbeh, by burning him alive. The group uploaded the video on Youtube and Facebook. ISIS also made other inhumane actions against their prisoners and civilian hostages.

Anonymous has promised to take down ISIS' online activities under the hashtag campaign #OpISIS. The following is Anonymous”” video posted on Youtube.

In an excerpt from the Anonymous video, the group says:

“Operation ISIS continues. [..] We are Muslims,
Christians, Jews. We are hackers, crackers,
hacktivists, phishers, agents, spies, or just the guy
next door. [..] We are young or old, gay or straight.
[..] We come from all races, countries, religions and
ethnicity. United as one, divided by zero.”

Aside from video Anonymous also included a pastebin links that contains the social media accounts that they have taken down. Some of the accounts are already suspended while others are still active but have been identified by Anonymous as suspecting in contact with
terrorist organization.

Anonymous struck down French websites believed to be linked to extremists following the attack on Charlie Hebdo.