IF like me you have moved from one service to another over the years, you have probably exported a calendar or two and imported it, right? We’ll I did just that, but one of my events was a reoccurring event, so when it was imported it was added as 10,000 […]

How to delete multiple Google Calendar events


Day 2 at Blackhat EU 2016 and had a great day. This talk Breaking Big Data: Evading Analysis of the Metadata of Your Life was very interesting by a former NSA professional talking about a variety of the techniques used by the mass surveillance industry to analyse an individual’s metadata […]

BlackHat Europe 2016: Day 2 of 2


Today was day 1 of 2 for me at BlackHat Europe 2016, one of my highlights was the tool Bloodhound  located in the Arsenal section. BloodHound uses graph theory to reveal hidden relationships and attack paths in an Active Directory environment. Basically it shows the quickest way to get domain […]

BlackHat Europe 2016: Day 1 of 2



The hacker group calling itself the Shadow Brokers, who previously claimed to have leaked a portion of the NSA’s hacking tools and exploits, is back with a Bang! The Shadow Brokers published more files today, and this time the group dumped a list of foreign servers allegedly compromised by the […]

Shadow Brokers leak list of hacked NSA Servers


So today i go home and fired up the Windows 10 PC with all of my drives Bitlockered. Long story short, one of my drives was throwing up some I/O error and i was unable to open the drive. At this point, I was thinking, hmm ok , let’s just […]

Recovering Data from a bit-lockered drive that is dying


Yeah, thanks a lot…. in-case you can’t tell its my sarcasm kicking in. After doing heavy damage to KrebsOnSecurity and other web servers the creator of the Mirai DDoS botnet, a program designed to harness insecure IoT devices to run massive Distributed denial of service attacks, has apparently released the […]

Well thanks anna-senpai for the Mirai source code release



On october 19 2016, the Dirty Cow vulnerability went public (which is kernel privilege escalation vulnerability) . From what I have read and test, the exploit is working only on Centos 7/ RHEL7 / Cloudlinux 7 distros . CVE-2016-5195 Why is it called the Dirty COW bug? “A race condition […]

Testing for the dirty cow CVE-2016-5195?


Linux running web servers appear to be at risk of a new strain of ransomware called FairWare. Three Linux administrators, at least for now, have already complained about being targeted by the malicious newcomer.   People, who were having trouble with ransomware support thread and posted their quandary on the […]

Potential Ransomware Hits Linux Servers


Kelihos is one of the oldest botnets, first spotted way back in 2008, but it has managed to survive a couple of sinkhole attempts and it is still active. MalwareTech, both owner and operator of the Botnet Tracker project, says that Kelihos devs saw this change as an opportunity and […]

Kelihos Botnet now dishing out Ransomware



It seems that the NSA has been hacked. This is being speculated after a group of hackers going by the name “The Shadow Brokers” has claimed to breach an NSA-controlled hacking organization. The hacking group has  leaked some private hacking tools and exploits. The hackers are also asking for 1 […]

NSA potentially hacked by The Shadow Brokers


From September 1, you’ll need a TV licence if you stream catch-up or on-demand TV from the BBC’s iPlayer service, regardless if you’ve got a television set or not – phone, computer, potato, whatever, you’ll have to cough up the reddies. See this Freedom Of Information Request for further information . […]

BBC sniffing Wi-Fi packets to detect BBC iPlayer users without ...


Everyone knows about the joint USA and Israeli malware called Stuxnet that was designed to put a halt to the Iranian nuclear program. According to the new Documentary film Zero Days http://www.imdb.com/title/tt5446858/ Stuxnet was really called Operation Olympic Games. This was from an Anonymous NSA employee that work in TAO, which […]

Stuxnet : Operation Olympic Games NSA Codename



A zero-day vulnerability affecting the latest version of Adobe Flash Player and all previous ones is being actively exploited in limited, targeted attacks, the company has announced on Tuesday. The flaw (CVE-2016-4171) exists in Adobe Flash Player and 21.0.0.242 and earlier versions for Windows, Macintosh, Linux, and Chrome OS, and […]

Adobe Flash zero-day actively exploited in targeted attacks


The Romanian hacker who first exposed Hillary Clinton’s private email address is making a bombshell new claim — that he also gained access to the former Secretary of State’s “completely unsecured” server. “It was like an open orchid on the Internet,” Marcel Lehel Lazar, who uses the devilish handle Guccifer, […]

Hacker ‘Guccifer’: I Got Inside Hillary Clinton’s Server


Well, not really a security related post but just found out that you can play chess in Facebook Messenger.. Like this   You just need to load Messenger and click on a person and type @fbchess. You will get a chess board come up and to make a move you […]

Facebook Chess