blog trackingRealtime Web Statistics Browser Archives | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Browser’

Browser study aims to stop hackers in their tracks

103196581-hacker-CARS-large_trans++Igboy7m2Vnp-xkpo1Nlwzstztl2Kz9ZfXMh380NPxSE

Source: National Cyber Security – Produced By Gregory Evans

Browser study aims to stop hackers in their tracks

Browser fingerprinting is an increasingly common tracking technique that collects contextual data from a person’s computer without their knowledge. Hackers have been able to obtain private information such as browsing history, computer clock and even the unique identity of the computer from a user’s internet browser. Researchers at the University of Adelaide in South Australia […]

The post Browser study aims to stop hackers in their tracks appeared first on National Cyber Security.

View full post on National Cyber Security

This crazy Chrome extension lets your friends take over your browser

Shove Chrome extension lets you hijack your friend’s browser

Shove, a browser extension for Chrome that was officially released late last month, allows users to immediately open tabs on one another’s browsers without any warnings or prompts. Not only that, the other person can also do the same to you.

Other than the security measures that are built into Chrome, there are no security measures built into Shove. If someone tried to load a nefarious page in your browser, you would see a warning page and you would have to make a choice if a site wanted to fire up your camera and mic. However, other than that, Shove leaves the options wide open.

All you have to do is create an account once you have installed Shove, and add a few friends. Although, the friends you add have to accept your friend request. So, if someone adds you, or the other way around, you would have to know the person and accept their request before anything can be shoved. Once a few names are populated in your friend list, you can click the Shove button in the top right corner of the screen and start “shoving” tabs to their browsers any time you want once you have navigated to the website you want to share.

This could be a great way to share information if you are working with a large group on a research project remotely, as you would not have to wait for your partners to click a link in a chat room that you all are sharing. Also, it will also let group members share websites and online journals with each other.

It can also be a great way to play plenty of pranks with Shove and the various embarrassing situations that you could put your friends in, especially at work or at school.

“At first, we thought this would be a pretty funny and dangerous game,” designer Mike Lacher told Wired. “But once we built it and played around with it, it became less of a prank and more an easy way to share things back and forth… It was about having a creative conversation, where the domain name is the message. Or if you want to tell your friend ‘no way’ about something, sending them a link to a Google Image search is a lot more interesting.”

It does sound like a a fun, creative way to speak to one another using the wholeness of the Internet, only if you can actually trust your friends or colleagues with this extension.

You can now download the Shove extension free from the Chrome Web Store.

The post This crazy Chrome extension lets your friends take over your browser appeared first on TechWorm.

View full post on TechWorm

Photoflow for Mac may be the desktop Instagram browser you’re looking for

While Instagram on the web might be plenty for many users, for some, it just doesn’t offer what they’re looking for. If you want a native way of experiencing Instagram on your Mac, you might want to check out Photoflow.

Photoflow for Instagram lets you view all of your basic Instagram activities, from viewing your feed to searching for new photos. You can receive notifications for new photos, likes, and comments, view popular photos on Instagram, and see photos and videos from nearby.

In addition to these features, Photoflow for Mac offers something that Instagram doesn’t: easy account switching. Simply click your avatar in the top left corner of the app and select the account you want to use.

You can check out everything Photoflow has to offer by downloading it from the Mac App Store.

View full post on MobileNations

How to download Windows Phone apps using this Chrome browser QR code generator

Earlier this year, I wrote a tip for those using Google Chrome as their primary web browser. Although Microsoft’s Edge is getting extension support later this year, including the porting of Chrome extensions, Chrome has them right now.

The extension that I am talking about simply auto-generates a localized QR code in the Windows Phone Store. However, Microsoft recently unified the Store and as a result, the extension broke. Today, however, it is updated and works flawlessly.

View full post on MobileNations

Man In The Browser attack and OTP (Banking Institutions)

The view of security experts and financial services professionals considers the Man in the browser as the greatest threat to online banking, cybercrime increases its use.

Man in the Browser attack, DDoS attacks, phishing, are more important and insidious cyber threats against banking institutions. Latest statistics proposed by leading security companies confirm that online banking is considered a lucrative business for cybercrime.
In contrast, the response of the banking world was improving authentication processes, a classic example is represented by the rapid diffusion for multi-factor authentication, such as OTPs.
Classic for the “Man in the Middle” attack the attacker scheme is between the client and server banking victim, it is clear that the introduction of encrypting traffic could make the technique ineffective.
In the financial services sector in a survey Man In The Browser considered to be the greatest threat to online banking, malware, such as Zeus, Carberp, Sinowal and Clampi have capabilities MITB.

Security: the most effective preventive measure is considered out transaction verification band containing the transaction details along with OTP and the side of the bank to adopt a fraud detection based on the behavior of user profiles.

View full post on Who Got Hacked – Latest Hacking News and Security Updates

Apple store serving spyware, Tor browser for IOS is Fake , apple love to keep it in its store

http://media.nu.nl/m/m1mx50fa0945_wd640.jpg/anoniem-browsen-in-ios-via-tor-app.jpg 
 Members of Tor anonymity network has warn that the Tor browser application which is available in Apple store since november. or published this announcement on there official website by a high ranked volunteer Phobos.
Phobos said:
“It’s full of adware and spyware. Two users have called to complain. We should have it removed.”
Till now application have not been removed from the official apple store , it seems apple is not worry about users privacy as its still serving spyware .

View full post on Who Got Hacked – Latest Hacking News and Security Updates

[remote] – Squiggle 1.7 SVG Browser Java Code Execution

Squiggle 1.7 SVG Browser Java Code Execution
View full post on Exploit-DB updates

View full post on National Cyber Security

Twitter Backs Browser Privacy Project

View full post on News ≈ Packet Storm

View full post on National Cyber Security

TheHackersNews: RT @w3af : How unique and trackable is your web browser? http://t.co/bB9tHPV0

TheHackersNews: RT @w3af : How unique and trackable is your web browser? http://t.co/bB9tHPV0
View full post on Twitter / TheHackersNews

View full post on National Cyber Security

Orion Browser Dumper v1.0 released

Orion Browser Dumper v1.0 released
Jean-Pierre LESUEUR (DarkCoderSc) releases another Browser Forensic tool for Community called “Orion Browser Dumper v1.0″. 
<!– adsense –>
This software is an advanced local browser history extractor (dumper), in less than few seconds (like for Browser Forensic Tool) it will extract the whole history content of most famous …

View full post on National Cyber Security » Computer Hacking

Page 1 of 3123»

My Twitter

  • RT @GregoryDEvans: Good Cybersecurity Can Be Good Marketing https://t.co/UqreHFsdIH https://t.co/CkjWdrFdPp
    about 10 hours ago
  • RT @GregoryDEvans: Good Cybersecurity Can Be Good Marketing https://t.co/UqreHFsdIH https://t.co/CkjWdrFdPp
    about 10 hours ago
  • RT @GregoryDEvans: Good Cybersecurity Can Be Good Marketing https://t.co/UqreHFsdIH https://t.co/CkjWdrFdPp
    about 10 hours ago
  • RT @GregoryDEvans: Good Cybersecurity Can Be Good Marketing https://t.co/UqreHFsdIH #security #hacker #HTCS
    about 10 hours ago
  • RT @GregoryDEvans: : : ProtectMyID: FBI Friday: Deceased victimized by identity theft ring #FBIFriday #truestory http://t.co/XWZ5PUHP http:…
    about 11 hours ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans