Chinese ISPs Caught Injecting Ads and Malware into Web Pages
Chinese ISPs had set up many proxy servers to pollute the client's network traffic not only with insignificant advertisements but also malware links, in some cases, inside the websites they visit.
In general, 14 different ISPs had been discovered with malicious background, and out of these 10 are from China, 2 from malaysia, and 1 each from India and United States.
Tor Project Accuses CloudFlare of Mass Surveillance, Sabotaging Tor Traffic
Tor Project maintainers are saying that CloudFlare's anti-DDOS technology often malfunctions and forces users to fill in CAPTCHAs multiple times over before reaching their desired website. This issue is also confirmed by your reporter who often times had to fill in CloudFlare CAPTCHAs for more than ten times before finally being redirected to a desired website.
Currently, Tor Project maintainers are thinking of adding a message that would read "Warning this site is under surveillance by Cloudflare," whenever Tor users would be accessing a CloudFlare-protected website.
Twitter shares drop on faltering user growth
Twitter reported a net loss of $90m (£62m) for the last three months of 2015 versus a loss of $125m a year ago.
This is the first quarter in Twitter's history that the number of monthly active users has not grown.
Investors had been anticipating the announcement of major changes to Twitter's product offerings to increase the user base.
Gmail to warn you if your friends aren’t using secure e-mail
Google has confirmed a number of changes to Gmail with the arrival of two new features that will let you know if the people you’re corresponding with aren’t hip with TLS encryption.
In 2014, the company announced that its search engine would be using HTTPS as a ranking signal. A year after, it revealed it would be adjusting its indexing system to look for more HTTPS websites.
Mysterious spike in WordPress hacks silently delivers ransomware to visitors
It's still not clear how, but a disproportionately large number of websites that run on the WordPress content management system are being hacked to deliver crypto ransomware and other malicious software to unwitting end users.
People running WordPress sites should take time to make sure their servers are fully patched and locked down with a strong password and two-factor authentication.
YouTube stars U-turn on trademarks after online fury
Some of The Fine Brothers' most successful series include Kids React, Teens React and YouTubers React.
In reaction videos, people - from children to celebrities - are shown an object or video clip and their response is filmed.
For example: a child in 2015 marvelling at the size of an old style printed encyclopaedia.
Using IPv6 with Linux? You’ve likely been visited by Shodan and other scanners
By setting up an IPv6-based network time protocol service most Internet-connected devices rely on to keep their internal clocks accurate, the operators can harvest huge numbers of IPv6 addresses that would otherwise remain unknown. The server operators can then scan hundreds or thousands of ports attached to each address to identify publicly available surveillance cameras, unpatched servers, and similar vulnerabilities.
Within seconds of one of the Shodan's NTP servers receiving a query from an IPv6 device, Shodan's main scanning engine would scan more than 100 ports belonging to the device. The Shodan scanner would then revisit the device roughly once a day.
NSA’s top hacking boss explains how to protect your network from his attack squads
“If you really want to protect your network you have to know your network, including all the devices and technology in it,” he said. “In many cases we know networks better than the people who designed and run them.”
To protect against this admins need to lock things down as far as possible; whitelisting apps, locking down permissions, and patching as soon as possible, and use reputation management. If a seemingly legitimate user is displaying abnormal behavior, like accessing network data for the first time, chances are they have been compromised, he said.
Hackers try to con the wrong mom. Knitting circle not the same
Char, noticed the padlock icon -- the way your computer tells you your connection is private -- was missing from the top left corner of a shopping website she was visiting. Worried, she got in touch her son.
He took a look at the code behind the suspicious website and it turned out hackers behind a Russian website were receiving a copy of everything his mom typed into the checkout form. That included her credit card information, which Char immediately canceled.
Android Ransomware Threatens to Share Your Browsing History With Your Friends
When everything has finished, the ransomware uses its administrative permissions to push a permanent message to the user's screen, asking the user to pay a ransom to recover his encrypted files.
To make the threat more convincing, the Lockdroid ransomware also threatens the user to pay the ransom or it will send all his browsing history to all his contacts.