Monthly Archives: October 2016

Podcast For October 26 , 2016

Take a look at the best antivirus, anti-malware, anti-spy, etc. software Powered by WPeMatico

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Podcast For October 26 , 2016

Dangerous Dirty Cow Vulnerability in Linux OS

A dangerous bug has been found in Linux operating system. This vulnerablity is a Linux kernel security flaw that allows privilege-escalation – a user can gain root priveleges in less than 5 seconds. Scary isn’t it! Cyber security experts have … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Dangerous Dirty Cow Vulnerability in Linux OS

Technology Bytes November Geek Gathering

We will be meeting at our regular hangout, Khon’s Wine Darts And Coffee located at 2808 Milam. There’s plenty of free parking and Khon’s offers a great beer and wine selection with many dining options nearby. The event starts around … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Technology Bytes November Geek Gathering

Technology Bytes Links – Oct 26, 2016

News Google Fiber division cuts staff by 9%, “pauses” fiber plans in 10 cities Google Pixel cameras are experiencing excessive lens flare Refreshing your browser made that huge DDoS attack seem much worse Friday’s DDoS attack came from 100,000 infected … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Technology Bytes Links – Oct 26, 2016

Sophisticated Linux Trojan Self-Deletes to Elude Detection

A new Linux trojan exploits weak security in Internet of Things (IoT) devices to infect those devices and allow them to be utilized as part of a Bot network. The trojan has been named ELF Linux/NyaDrop. This trojan specifically targets … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Sophisticated Linux Trojan Self-Deletes to Elude Detection

Hackers are now Hacker-Spies – How to stay protected

Hackers are not just hackers anymore, they have become hacker-spies. In the cyber criminal world hacking has advanced to spying and spear phishing is the potent weapon used in cybercrime. The skill and sophistication of hackers has increased over the … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Hackers are now Hacker-Spies – How to stay protected

Android Devices Affected With BadKernel Vulnerability

More than 6% of Android devices worldwide (as it is known as of now) have been affected with malicious code through BadKernel vulnerable apps. This infection occurred by exploiting the BadKernel vulnerability in Google’s V8 JavaScript engine. The malware infection … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Android Devices Affected With BadKernel Vulnerability

How to remove Odin ransomware and decrypt .Odin files

What is Odin Ransomware Odin Ransomware is an advanced version of Locky virus. We have already learned about .locky, .zepto and .cerber extension files that are created by their respective viruses. In this latest ransomware, it will create .odin file … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on How to remove Odin ransomware and decrypt .Odin files