The web chap Advertisements
This is the post excerpt.
Italian researchers have developed a Windows drop-in driver and custom filesystem that are capable of detecting the telltale signs of a ransomware infection, stop any malicious actions and even revert any encrypted files to their previous state. Called ShieldFS, this new project is the work of seven researchers from the Politecnico di Milano University and was […]
Hacking is usually meant to break a code. There are three sections of hacking ― Web Hacking, Exploit Writing & Reverse Engineering and each of it requires different programming language 1. Web Hacking Since most of the tech is build around world wide web, it is important to learn web hacking to be a good […]
Petya is a family of encrypting ransomware that was first discovered in 2016. The malware targets Microsoft Windows-based systems, infecting the master boot record to execute a payload that encrypts the NTFS file table, demanding a payment in bitcoin in order to regain access to the system. Here’s a summary of the NotPetya outbreak: The malware uses a bunch of tools to move through a network, infecting […]
Just about any account you own on the internet is prone to being hacked — and one of the easiest ways to add an extra layer of security is to enable two-factor authentication. Also known as two-step verification or 2FA, the process gives web services a secondary access to the account owner (you!) in order […]
Malicious software on popular mobile platforms such as iOS and Android is at best a nuisance and at worst a security threat to individuals and businesses. Known as malware, some perpetrators use it to infect apps and get inside your smartphone. Why do they do it? Money, mostly. The recent Judy malware, for example, was reportedly […]
Deleting traces from old devices When you’re getting rid of your old computer, simply deleting your data from it is not enough. Even if you use the format command to wipe the hard disk clean, the data can be recovered using simple, free software. The only way to make sure your data remains inaccessible is […]