7 ways hackers can use Wi-Fi against you

Below you will find 7 ways hackers can use Wi-Fi against you

Here are the top 7 ways Hackers / WiFi sniffer could use the WiFi connection against you in a malicious way or hack your wifi router. Causing you headaches and financial loses, So please view this type 7 ways WiFi could be dangerous to you , especially the free hotspots that are all over the city free to use . Stay protected when you are on the go or home , This 7 information was written by Josh Althuser , Feel free to following on twitter https://twitter.com/JoshAlthuser

1) Using Free Hotspots / Wifi

They seem to be everywhere, and their numbers are expected to quadruple over the next four years. But many of them are untrustworthy, created just so your login credentials, to email or even more sensitive accounts, can be picked up by hackers using “sniffers” — software that captures any information you submit over the connection. The best defense against sniffing hackers is to use a VPN (virtual private network). A VPN keeps your private data protected because it encrypts what you input.

2) Banking Online

You might think that no one needs to be warned against banking online using free WiFi, but cybersecurity firm Kaspersky Lab says that more than 100 banks worldwide have lost $900 million from cyberhacking, so it would seem that a lot of people are doing it. If you want to use the free WiFi in a coffee shop because you’re confident it will be legitimate, confirm the exact network name with the barista. It’s pretty easy for someone else in the shop with a router to set up an open connection with a name that seems like it would be the name of the shop’s WiFi.

3) Keeping Wifi On all the time

When your phone’s WiFi is automatically enabled, you can be connected to an unsecured network without even realizing it. Use your phone’s location-based WiFi feature, if it’s available. It will turn off your WiFi when you’re away from your saved networks and will turn back on when you’re within range.

4) Not using a Firewall

A firewall is your first line of defense against malicious intruders. It’s meant to let good traffic through your computer on a network and keep hackers and malware out. You should turn it off only when your antivirus software has its own firewall.

5) Browsing unencrypted websites

Sad to say, 55% of the Web’s top 1 million sites don’t offer encryption. An unencrypted website allows all data transmissions to be viewed by the prying eyes of hackers. Your browser will indicate when a site is secure (you’ll see a gray padlock with Mozilla Firefox, for example, and a green lock icon with Chrome). But even a secure website can’t protect you from sidejackers, who can steal the cookies from a website you visited, whether it’s a valid site or not, through a public network.

Did you know Thirty5Tech NYC Computer Website is encrypted ? Click here https://thirty5tech.com to view our encrypted secure via https

6) Not updating your security software

If you want to ensure that your own network is well protected, upgrade the firmware of your router. All you have to do is go to your router’s administration page to check. Normally, you can download the newest firmware right from the manufacturer’s site.

7) Not securing your home WiFi

Needless to say, it is important to set up a password that is not too easy to guess, and change your connection’s default name. You can also filter your MAC address so your router will recognize only certain devices.

Microsoft JavaScript Browser

Microsoft JavaScript Browser is the latest browser to be made available only to Windows 10 users , If you are running the latest Windows 10 OS, Then you be happy to know that Microsoft latest browser application based on JavaScript and HTML is now available in their Microsoft Store for download . Feel free to read bit more about Microsoft JavaScript Browser below as well follow the source for a bit more information about this latest browser .


The interface looks similar to modern browsers. What you may notice immediately is that it does not support tabs. This means that you can only display a single web page or service in it at all time.

When you play around with the browser for a bit, you will notice that other components are missing. For instance, while settings are available, they are limited to going full screen and clearing the cache and favorites.

Other missing features include extensions, web permissions, Developer tools or on-page search.

The browser uses EdgeHTML, the Microsoft Edge rendering engine, via the WebView control that Windows 10 apps can utilize.

Source of Information and Download

Thanks for reading this article about Microsoft JavaScript Browser , Below you will find the source of this information as well a download link if you like to give the JavaScript Browser a test drive, Remember only compatible with Windows 10 OS.

Download Microsoft JavaScript Browser here : https://www.microsoft.com/en-us/store/apps/javascript-browser/9nblggh1z7vx

Visit Source of Information here : www.ghacks.net

Controversial Data Mining and Privacy Invasions On Win7 & Win8

Controversial Data Mining and Privacy Invasions On Win7 & Win8 that is according to online sources, This is not a pretty good ideal to some users who are paranoid of getting track by Microsoft , This features was introduce to Windows 10 and now it seem Windows 7 and Windows 8 - 8.1 users will now have this feature installed via Windows Update , Feel free to continue below for more information about this new Windows Update for Win7 and Win8 . Also don't forget to visit the source for more information .

Microsoft has been criticized by privacy advocates in regards to the data hunger of its Windows 10 operating system. The operating system slurps data like there is no tomorrow, especially when systems are set up using the express settings.

Experienced users may disable telemetry and data collection partially during setup, and then some more afterwards using the Registry or Group Policy.

What makes this problematic however is the fact that it is nearly impossible to stop all of the data collecting that is taking place.

The four updates in question and the official Microsoft descriptions are:

  • KB3068708 Update for customer experience and diagnostic telemetry – This update introduces the Diagnostics and Telemetry tracking service to existing devices. By applying this service, you can add benefits from the latest version of Windows to systems that have not yet upgraded. The update also supports applications that are subscribed to Visual Studio Application Insights. (Windows 8.1, Windows Server 2012 R2, Windows 7 Service Pack 1 (SP1), and Windows Server 2008 R2 SP1)
  • KB3022345 (replaced by KB3068708) Update for customer experience and diagnostic telemetry – This update introduces the Diagnostics and Telemetry tracking service to in-market devices. By applying this service, you can add benefits from the latest version of Windows to systems that have not yet been upgraded. The update also supports applications that are subscribed to Visual Studio Application Insights. (Windows 8.1, Windows Server 2012 R2, Windows 7 Service Pack 1 (SP1), and Windows Server 2008 R2 SP1)

Source of Information

Below in this section you will find the source of this story , Feel free to visit the source to read more about this article ,

Link to Source : www.ghacks.net

Scams Allows Caller to Have Access to Victim’s PC

Scams Allows Caller to Have Access to Victim's PC via remote desktop , this new threat is nothing new, It's actually pretty old trick which was first introduce via fake tech support email, which warn victims that their computer are infected with some type of virus or spyware and need to download some program to fix/correct the problem, which is actually a remote desktop software that give scammers complete access to your computer . Feel free to read the article below for more information about this scam .

"According to the BBB, in this tech support scan, often referred to as the Windows or Microsoft scam, the person calling says your computer has a serious virus or other problem that needs to be fixed immediately and directs the person to download a program that gives the caller remote access to log in to the computer.

The BBB said if the victim follows the caller’s instructions, a stranger will be given access to all data on your computer including pictures, passwords, documents, email and other information. This puts the victim at risk for identity theft. These callers do not work for a tech company.

Source of Information

To continue reading more about this story, feel free to visit the source of the information which could be located here connectamarillo.com

Computer Crashes Might Soon Be a Lot Less Catastrophic

Computer Crashes Might Soon Be a Lot Less Catastrophic according to scientist in MIT. This is good news especially for business that runs multiple servers in their corporate infrastructure . Feel free to read below for a bit more information about a new system files that soon will be unveiled to the General Public in the up coming months .

"Whether on a Mac, Windows or Linux machine, operating systems of all sorts contain a “file system” where all user data is stored in an (ideally) reliable and accessible manner. When a computer crashes, however, it’s sometimes the case that data that’s being written or retrieved from that system becomes unexpectedly corrupted, potentially causing all sorts of problems for the rest of the computer and its applications, not to mention the user that’s often left with no recourse for recovering their lost or damaged data.

MIT researchers have reportedly designed a file system that can make these types of issues impossible and claimed to have have mathematically verified its reliability."

Source of Information

Below you will find the source of this Computer Crashes Might Soon Be a Lot Less Catastrophic which was publish online, Feel free to follow the link by clicking here www.washingtontimes.com

Top Worst Computer Viruses in History

Below you will find some of the Top Computer Virus released to the internet since the start of the internet , Feel free to read a list of the most dangerous computer ever to be released to the internet over the years .

1998 - The Morris Worm Virus - In 1988 Robert Morris , a University student released a worm which affected 10 percent of all computer connected to the internet.

1999 - Melissa Virus - Melissa was spread via file to a usernet group called alt.sex and the file contained passwords for 80 pornographic websites.

2000 - I Love You Virus - The I love you virus spread when it was downloaded as an email attachment . it then started copying itseld several times and hiding in folders on the hard drive.

2001 - Anna Kournikova Virus - Jan de Wit created a virus that tricked the reipient into opening a message that strongly suggested they would be privy to a glimpse of Russia Tennis Star Anna Kournikova's curves.

2001 - Nimda Virus - Nimda is a file infecting computer worm. It quickly spread, surpassing the economic damage caused by previous outbreaks such as Code Red. Nimda utilized several types of propagation techniques and this caused it to become the Internet’s most widespread virus/worm within 22 minutes.

2003 - Slammer Virus - It caused about 10 billions worth of damage rapidly infecting networks around the world .

2004 - MyDoom Virus - It was spread through an email attachment which usually had an innocuos title such as Mail Delivery System or Mail Transaction Failed.

2004 - Sasser Virus - Sasser is a computer worm that affects computers running vulnerable versions of the Microsoft operating systems Windows XP and Windows 2000. Sasser spreads by exploiting the system through a vulnerable network port. Thus it is particularly virulent in that it can spread without user intervention, but it is also easily stopped by a properly configured firewall or by downloading system updates from Windows Update.

2006 - Leap_A Virus - It proved that Apple Computer is not safe after all .

2007 - Storm Trojan Virus - Through an email attachment ir inundated thousands of computers creating a huge global network of computers enslaved.

2008 - Conficker Virus - It caused chaos and panic and Microsoft created a high profile industry group to counter the virus attack.

2010 - Stuxnet Virus - The first virus to specifically target critical National infrastructure.

2013 - Cryptolocker Virus - CryptoLocker is a ransomware trojan which targeted computers running Microsoft Windows,[1] believed to have first been posted to the Internet on 5 September 2013. CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers.

Miniduke Backdoor Virus

Miniduke Backdoor Virus Information

Well it seem the Ransomware Hackers known as Miniduke are back again with a new damaging virus known as Miniduke Backdoor Virus which is a Cryptolocker type of virus that locks computer users of their important documents , pictures, video and other type of files on their Windows PC , in order for users to gain access to those personal file, They need to pay the hackers a ransom in order for them to received a special code which they enter to unlock their Computer Files that has been infected with the Miniduke Backdoor Virus which is usually infect computers via email attachment using some of Adobe products vulnerability which has not been patch yet .

Feel free to read more blow about this Cryptolocker Virus from Miniduke Ransomware Hackers.

"A unbreakable computer virus on the block called the Cryptolocker has got a large number of Australians shelling out thousands of dollars to retrieve important files from the overseas hackers. The virus hijacks compute files after entering the system and demands a ransom from the owners in exchange for the hijacked files.

The “ransomware,” as it is being termed, enters the system through apparently harmless emails and other programs, and usurps the files including photos that are stored in the computer. An increasing number of Australians are falling victim to the foul program, which is “unbreakable” till now. ABC news reported that the Cryptolocker comes in a number of versions and has been capitalising on the release of the latest Windows 10. It can infect the computer by arriving in the form of an email containing a zip file for installing the operating system."

Source of information for Miniduke Backdoor Virus

Feel free to read the source of this article for more information about this nasty Computer Ransomware virus that has hit the internet last week .

Source located here www.ibtimes.com.au

New computer virus named Goner spreading fast

Computer Virus Goner

This is the latest Computer Virus threat to have cause havoc in countries around the world , If you wondering why your email has been a bit slow in receiving or sending out email, then you might want to read this article below about a new virus called Goner causing issue around the globe .

A powerful new computer virus was today causing havoc with e-mail systems across the world.

Experts described the virus, called Goner, as one of the fastest-spreading they had yet seen and warned computer users to immediately delete it if they received it.

Alex Shipp, spokesman for anti-virus service MessageLabs, said: “It’s spreading with tremendous speed and thousands of users in Britain have already been sent it.

“The virus mass mails itself out through e-mail and attempts to destroy anti-virus software on computers, which could prove extremely problematic for those unfortunate enough to receive it.”

The infected e-mail has the word “Hi” as its subject and body text which reads “When I saw this screen saver, I immediately thought about you. I am in a harry (sic), I promise you will love it.” Its attachment is labelled “gone.scr.”

It was first detected this morning in the US but experts believe it was created in Europe.

Feel free to read more about this article from the source located here www.dailymail.co.uk

Circular PuzzlePhone

Circular PuzzlePhone


This is going to be an interesting smart phone when it becomes available , The Circular Puzzle Phone seem going to be great for those users who are looking for an excited new phone . Feel free to read more below and don’t forget to visit the source for more information about this awesome Circular Puzzle Phone

In the shadow of Google’s Project Ara, Finnish company Circular Devices is making progress on its own modular smartphone, the PuzzlePhone, and will soon reveal details.

For anyone who thinks modular smartphones are a cool concept, the last week has been a downer, with Google postponing tests of Ara until next year.

But Google isn’t the only company working on a modular smartphones.

“I can’t be more specific now, but in September and October we will unveil the way forward in a clear and concrete way,” said Circular Devices spokesman Juan Díaz Díaz via email.

Google and Circular Devices are developing modular smartphones for many of the same reasons, to increase product longevity, let users customize their phones and make them easier to repair.

However, Circular Devices has taken a slightly different, and on the face of it less complicated, approach to building a modular smartphone compared to Project Ara.

The PuzzlePhone concept is made up of three parts: the spine, the brain and the heart.

The spine is the part to which the other two attach and it also includes the screen on the front. The brain contains all the main electronics, including the processor, storage and the rear camera. The last piece, the heart, holds a second set of electronics that can be customized according to user needs, according to PuzzlePhone’s website.

Continue reading from the source here www.pcworld.com

Microsoft Windows 10 OS might disable downloadable Piracy Game

Microsoft Windows 10 OS might disable downloadable Piracy Game according to online sources, If this is true, Then this might be a good thing and a bad thing at the same time . I just imagine how will Microsoft identified which Game are legit and which one are not . Feel free to read a bit more below and visit the source for more information about this .

The clause, which is present in the EULA or “Updates to the Services or Software, and Changes to These Terms” specifies that Microsoft “may automatically check your version of the software and download software update or configuration changes, including those that prevent you from accessing the Services, playing counterfeit games, or using unauthorized hardware peripheral devices.” It means Microsoft may automatically check a user’s PC and may have the authority to remove any software or game that it finds illegal. Microsoft will also be able to do the same for Windows 10 Mobile.

Source of News Information:

In this section you will find the source of this information where the story originally came from . Feel free to visit below for more information ...

Source Link www.bidnessetc.com