Posts

Just Pressing Shift+F10 During Windows 10 Update Makes Your PC Super Easy To Hack Don't leave your machines unattended during the update.

Image
Just Pressing Shift+F10 During Windows 10 Update Makes Your PC Super Easy To Hack Don't leave your machines unattended during the update. Short Bytes:  A security researcher named Sami Laiho has found a simple flaw in the Windows 10 update procedure that can let a hacker bypass BitLocker and access elevated Command Line. To do so, one needs to hold Shift+F10 during the update process. Laiho advises the users to avoid leaving their PCs unattended during the update process. B y taking the advantage of an underlying bug in the new build of Windows 10, an attacker can access an elevated Command Line interface in the Windows Preinstallation Environment by simply holding Shift+F10 during the update process. As the Command Line interface grants the administrative privileges, the hacker can access the computer’s hard drive by automatically bypassing BitLocker encryption–a feature that’s supposed to add an extra layer of security to your personal files.. This is possible due

Windows 10 in-place upgrades make this Issue Easy to Exploit

Image
If your computer's security relies on Windows BitLocker Hard Drive Encryption software, then Beware! Because anyone with physical access to your PC can still access your files within few seconds. All an attacker need to do is hold  SHIFT+F10  during Windows 10 update procedure. Security researcher Sami Laiho  discovered  this simple method of bypassing BitLocker, wherein an attacker can open a command-line interface with System privileges just by holding SHIFT+F10 while a  Windows 10  PC is installing a new OS build. The command-line interface (CLI) then grants the attacker full access to the computer's hard drive, even when the victim has enabled BitLocker disk encryption feature. Laiho explains that during the installation of a new build (Windows 10 upgrade), the operating system disables BitLocker while the Windows PE installs a new image of the main Windows 10 OS. "The installation [Windows 10 upgrade] of a new build is done by reimaging the machine and the ima

How To Find If Someone Logged Into Your Windows PC At A Given Time?

Image
How To Find If Someone Logged Into Your Windows PC At A Given Time? Short Bytes:  Do you ever wish to know if someone used your Windows computer without your permission? Few people know that an inbuilt utility named Event Viewer can help them out and tell lots of information like the start-up and shutdown time of their computers. To do this, one simply needs to open Event Viewer and filter the logs to see the required details. V ery often we share login credentials of our Windows PCs with others, just to let them access it for a limited period of time or due to some other unavoidable reason–and forget to change the password. Without a doubt, it’s a very poor security practice. This also makes us wonder how can we know if something is being done to our computers in our absence. To accomplish this task, one can use the inbuilt Windows Event Viewer feature. It’s useful for system error logging, warnings, and informational events etc. However, very few people know about it.

How To Enable/Disable Secure Boot In Windows 8, 8.1, And 10?

Image
How To Enable/Disable Secure Boot In Windows 8, 8.1, And 10? Short Bytes:  Windows 8 and later versions of Windows come with UEFI Firmware settings which allow a user to disable any external intervention via USB, external drive etc. This is called Secure Boot option in Windows 8 operating system. Disabling the secure boot option in the Windows 8, or later, can help you interfere externally with your Windows and install operating systems other than Windows. S ometimes, we want  two operating systems to run on our PCs- -Windows and Ubuntu, or Windows and Fedora. If the secure boot option is enabled on your computer, it might not allow booting two operating systems. So, you need to disable secure boot on your personal computer in order to do some external intervention in Windows. Secure Boot option is integrated with BIOS of your PC. So, in short, you need to restart your PC in the BIOS mode and change the secure boot option there. Here’s how to do it– What is the sec

“Gooligan” Malware Hacks 1 Million Google Accounts, Here’s How To Check If You’re Affected

Image
“Gooligan” Malware Hacks 1 Million Google Accounts, Here’s How To Check If You’re Affected Short Bytes:  A new Android malware, named Gooligan , is here to compromise your Google accounts. It steals the account authorization keys and installs malicious adware on devices. With a 1 million infected devices, Gooligan continues to infect 13,000 new devices each day. Check Point has released an online tool to check if your Google account has been compromised by this dangerous malware. R eputed  security firm Check Point  has found a new malware in the wild that’s being exploited to hack the user accounts of Google users. This attack has been named Gooligan and it has already breached the security of more than 1 million Google accounts. The researchers have published a blog post detailing how Gooligan malware roots the infected devices and steals authorization tokens. As a result, the attacker can access a user’s various Google accounts like Gmail, Play, Photos, Docs, Drive, et

Chrome’s Hidden Reload Menu: “Normal Reload”, “Hard Reload”, and “Empty Cache”

Image
Chrome’s Hidden Reload Menu: “Normal Reload”, “Hard Reload”, and “Empty Cache” Short Bytes:  Do you know about the “Normal Reload”, “Hard Reload”, and “Empty Cache with Hard Reload” option in your web browser? These options allow one to ensure that locally cached files aren’t served after reloading the page. It can be easily accessed by opening the developer tools option from the Chrome Menu. I f you visit  fossbytes.com  often, there are chances that the website loads faster for you as compared to the first time visitors. This happens due to the browser cache feature that automatically saves the image, JavaScript, and CSS files etc. in the local cache. A webmaster has the option to specify the expiration date so that your browser will load the latest version. The web browser cache is a useful function that allows the user and server to save bandwidth and time. It also makes the user experience better. However, this causes problems when some bad results are cached

What Is The Difference Between Google Chrome And Chromium Browser?

Image
What Is The Difference Between Google Chrome And Chromium Browser? Short Bytes:  Google Chrome is a web browser developed and maintained by tech giant Google. Chrome uses the open source web browser Chromium’s source code and adds a bunch of features developed by Google and some nonfree components. C hromium is an open-source web browser developed and maintained by The Chromium Project. The git rolling release web browser was first introduced in 2008 and its different parts are released under different free software licenses which include BSD License (for the portion written by Google) and MIT License, LGPL, etc for other portions. Google Chrome, also released in 2008, is a proprietary web browser developed and maintained by Google. The reason why Chrome and Chromium are tied to each other is that Chome borrows Chromium’s source code. You can differentiate Chrome and Chromium by looking at their logo, Chrome is colorful and Chromium is blue. However, that’s not the only dif

50+ Best Hidden Android Secret Codes (Latest)

50+ Best Hidden Android Secret Codes (Latest) list of top and best latest  Best Android Secret Codes in 2016: here we collect some Secret Hidden Codes for Android.  May be some of them not work on specific device but you can try it if you can ! Contents  [ hide ] 1  Best Hidden Android Secret Codes 2016 :  1.1  #2 WLAN, GPS and Bluetooth Test Android Secret Codes 1.2  #3 Firmware version information: 1.3  #4 Factory Tests: 1.4  #5 PDA and Phone: 1.5  #6 Other Android Secret Codes: HOME SMARTPHONES 50+ Best Hidden Android Secret Codes (Latest) Best Hidden Android Secret Codes 2016 :  Codes Functioning *#*#7780#*#* Factory restore setting Clear all application and data. Remove Google account setting. Remove System, application data and settings. *2767*3855# Reinstall the phones firmware. Used for factory format. Remove all files and settings including the internal storage. Reinstall the firmware. *#*#197328640#*#*