Ways to secure yourself against hackers

Deleting traces from old devices When you’re getting rid of your old computer, simply deleting your data from it is not enough. Even if you use the format command to wipe the hard disk clean, the data can be recovered using simple, free software. The only way to make sure your data remains inaccessible is… Continue reading Ways to secure yourself against hackers

Wannacry : Detailed Analysis ( part 1 of 3 )

Main Launcher: The Killswitch effect The main launcher has a curious feature, where, before it does anything else, it checks connectivity to a certain domain. Ifthat domain resolves, the binary exits and does nothing further. This has been dubbed the killswitch. The killswitch domains below that have been found so far have been registered by… Continue reading Wannacry : Detailed Analysis ( part 1 of 3 )

Cyberduck FTP 6.0 offers Cryptomator cloud encryption

​Cyberduck, the file transfer protocol client, now offers transparent, client-side encryption for all data stored on servers or in the cloud. The new encryption tool allows users to create securevaults of data on any server or cloud storage program compatible with Cyberduck. The new encryption tool, available at no charge to Cyberduck users, was created… Continue reading Cyberduck FTP 6.0 offers Cryptomator cloud encryption

JavaScript framework smartens up Firefox

Mozilla’s Fathom framework helps browsers understand web pages the way people do. With its Fathom JavaScript framework, Mozilla wants to extract meaning out of web pages and produce a more intelligent browser.Positioned as a “mini language” for writing semantic extractors,Fathom already is in productionwith Firefox’sActivity Streamweb traffic tracker, picking out page descriptions, images, and other… Continue reading JavaScript framework smartens up Firefox

Remarkable revelations of the‘dark web’ 

​Most of the world wide web is invisible. Beyond the “surface web”—the parts accessible to searchengines—there is a “deep web” containing (by one estimate) 500 times the content, secured in databases and hidden behind login screens. And within this deep web isa tiny corner known as the “dark web,” which requires special, anonymizing software such… Continue reading Remarkable revelations of the‘dark web’