Drive-by downloads

Drive-by DownloadsIt’s 4:37 a.m, I am woken up by a continuous humming noise coming from my phone. I try to ignore the unending vibrations but after gathering the courage to get out of bed, I grabbed my phone and immediately realised the vibrations where not due to the reminders set on my phone, neither were they being triggered by an active phone call, I discovered the vibrations were due to the SMSes I kept receiving continuously.  The SMSes were being generated in real-time from my Online Banking Portal and the notifications kept

Read moreDrive-by downloads

Torrents, what you need to know!

TorrentsLike the most wildly used word on the web for 2013, torrents have similarities with “Error Code 404.” Normal day to day browsing or searching for items on the web, be it, reviews for books, movies or music via any search engine will likely return or list an alternative link to a torrent file readily available for download for the queried item.

Torrents enable users to share files or distribute large media files. It is because of this reason why torrents are so popular and are the primary means of sharing or trading movies, software, music, electronic books to name a few. The problem with torrents 

Read moreTorrents, what you need to know!

TrueCrypt Audit

TrueCrypt AuditTrueCrypt better known for its real-time ‘on the fly’ and transparent encryption recently fell under the radar mainly because of the the fact that, not only does the source code behind it need to be reviewed but also the custom licensing governing it.

TrueCrypt is an open source based disk encryption and decryption software that runs on Windows, Mac OS X and Linux Operating systems. Some of its features are entire drive or storage encryption, that is, full hard drive or USB drive encryption. With TrueCrypt one can also encrypt a partition or drive where Windows is installed and even created a hidden partition within another partition, let alone hide volumes on data discs. I have personally and still use TrueCrypt and I must admit this software works like a dream. However, the major concern is the controversial

Read moreTrueCrypt Audit

CryptoLocker Ransomware

Since the discovery of the unforgiving CryptoLocker ransomware in the wild late last year, sometime in September 2012, the Internet has been gripped by one kind of a mysterious and malicious program! But what is ransomware? What is CryptoLocker really capable of? Before I explain any further, we need to understand that this deadly malware is spreading in the form of spam emails. The spam emails appear to be coming from financial institutions and contain attachments which in actual fact is the CryptoLocker ransomware.

Ransomware comprises, I quote from Wikipedia a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order for the restriction to be removed.” Assuming the spam email recipient opens the attachment, the CryptoLocker immediately

Read moreCryptoLocker Ransomware