Sunday 24 July 2016

5 Free Cyber Security Courses That Will Keep You Safe Online

Does ever the thought of your personal details lying unsafe online cross your mind? Have you ever thought of how to keep your personal data secure online? At some point of time, these questions do cross everyone’s mind at one point or the other.
With hacking and data breaches on the rise, internet and information safety is hugely important. As our lives increasingly depend on digital services, the need to protect our information from being maliciously disrupted or misused is really important.
For instance, if your credentials are stolen, there is very little you can do to stop their resale and reuse. However, there are plenty of free online resources designed to teach you about basic information security techniques that can keep yourself safe from criminals who could use them against you. Even though your credentials may be stolen, you can definitely lessen the potential damage that is causes.
In this article, we bring to a list of 5 free cyber and information security courses that you can take, right away to enhance your awareness of your online surroundings. Each course is designed for self-learning MOOCs (Massively Open Online Courses), and come with active communities and lecturers you can direct questions towards.
FutureLean: Introduction to Cyber Security
“Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life.” Anyone who is looking to know more about protecting their digital life, FutureLearn is the course to choose. Designed by the UK government and the Open University using the FutureLearn platform, this is an eight week long MOOC.
This free online course will help you to understand online security and start to protect your digital life, whether at home or work. You will learn how to identify the threats that could harm you online and the steps you can take to lessen the chances that they will happen to you. It basically looks to give you an understanding into basic infosec security principles, and grows on how to keep your personal data safe online.
As it is a MOOC, you will be able to work together with the other students enrolled on the course during the same period as you. Also, it does have a very active Google+ community.
FutureLearn: Cyber Security: Safety at Home, Online, in Life
The University of Newcastle’s School of Computing Science gets across this very short, three-week jaunt through information security in the modern world. This course concentrates on understanding three basic principles of Internet security: Privacy Online, Payment Safety, and Security at Home.
“As the world is increasingly interconnected, everyone shares the responsibility of of securing cyberspace” – Newton Lee, Counterterrorism and Cybersecurity: Total Information Awareness
Coursera: Internet History, Technology, and Security
This course concentrates on a range of Internet technologies, the history behind the Internet, and the requirement of increased and evolving security to remain safe in the 21st century. Instructed by Charles Severance, Associate Professor at the University of Michigan School of Information, the course comprises around 12 hours of video lectures and quizzes.
Some of the early weeks may cover information you already understand, such as how the Internet was developed, and why the Internet transformed business, which depends on your current level of knowledge. However, it all quietly flows toward security, networking, and encryption.
This course isn’t as self-paced as others, as you will be required to submit your coursework to advance to the next segment of the course.
Coursera: Cybersecurity and Its Ten Domains
The Cybersecurity and Its Ten Domains course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. It will give you comprehensive understanding of essential cybersecurity fields, including “governance and risk management, compliance, access control, network security, cryptography, business continuity and disaster recovery, security operations, software development security, physical and environmental security, and security architecture.” Learning will be assessed using strategies aligned to knowledge and understanding.
Coming in at just six hours, this is a slightly shorter course. However, this definitely makes it more manageable for those with time restrictions. Another advantage in this course is the diversity of languages available for learning. The video lectures are delivered in English, but come with subtitles for Dutch, Chinese (Simplified), and Portuguese (Brazilian).
Udemy: Cyber Security
The Udemy Cyber Security course aims to provide well-rounded, entry level information relating to important terms and the ideas supporting Internet security practices. The MOOC is instructed by DeVry University and Professor Robert Bunge. Starting with threat analysis and risk management, additional lessons explore core technologies such as encryption, firewalls, and intrusion detection systems. Cloud security is also featured, as are incident response, disaster recovery, and how to conduct cyber exercises. The course takes around 2.5 hours delivered over 15 lectures.
Learning is self-paced like most MOOCs. The Udemy course takes in an extensive range of security resources, from both the ethical and the hacktivist viewpoints.

Top 2 must-have FREE tools for hackers and security researchers

Here are two must-have free tools that every hacker must know and have

Hacking is one of the most abused term in the tech world today. Hacking was a term that originated in 1990s and is associated with altering to the code to suit a particular objective. By definition, hacking is the practice of altering the features of a system, to accomplish a goal which is not in scope of the purpose of its creation.
Hacker” was a term used to denote a skilled programmer who had competency in machine code and operating systems. Such individuals were proficient in solving unsatisfactory problems and often interpreted competitors’ code to work as intelligence agents for small software companies.
Many young enthusiasts want to learn hacking and take up hacking and security research as a career choice. The first step to being a good hacker is to know all that is happening in the security world. Cybersecurity conferences such as Black HatDefConBSides and the Chaos Communication Conferencecan provide the latest security research, demonstrations and theoretical knowledge for you to move forward.
Next step would be to enroll for online certification programs. One way to ensure you have proper training, Read this report to know how to become a better security researcher. Next, come the tools. Having knowledge of these two must-have hacking tools is necessary for every hacker and security researcher.

Metasploit

Metasploit, which has been labeled the Attacker’s Playbook by many in the cybersecurity community, offers a rich library of exploits you can run on a number of different servers. You can use Metasploit to stimulate various steps of APT attacks so that in future you can spot the attack paths and vulnerabilities that might have otherwise allowed major data breaches.
However, before you can start using Metasploit to its fullest potential, you will need specific training. Offensive Security offers a free training program for the toolkit called Metasploit Unleashed.

Cobalt Strike

Cobalt Strike is another such must-have hacking tool used by hackers to emulate real network threats. You can use the tools within Cobalt Strike to conduct penetration testing. The toolkit’s website says the software includes functionality for:
  • Network reconnaissance
  • Attack packages for Java Applet, Microsoft Office, Microsoft Windows, website cloning and more
  • Spear phishing
  • Collaboration within the penetration team
  • Post exploitation (execute PowerShell scripts, log keystrokes, take screenshots, download files, and spawn other payloads)
  • Covert communications to evade security systems
  • Browser pivoting to avoid two-factor authentication
  • Reporting and logging to analyze the results of the exercise
While Metasploit offers a collection of exploits for hackers to use, the tools and functionality in Cobalt Strike helps hackers gather information and move laterally without exploits. With the combination of an exploit toolkit and a set of tools reconnaissance and lateral movement, you can successfully carry out pentesting and uncover even the deepest layer of vulnerabilities.

Top 5 Most Popular Alternatives To KickassTorrents

KickassTorrents is dead, here are top 5 Torrent site alternatives to that was once world’s most popular torrent website

With the demise of KickassTorrents the search for alternate torrent websites has already begun.

Following the shut down of kickassTorrents after its alleged founder Artem Vaulin got arrested in Poland and an order given by a federal court in Chicago which led to the seizure of all official KAT domain names including kickasstorrents.comkastatic.comthekat.tvkat.crkickass.tokat.ph andkickass.cr. The torrent community has now come in need of finding top alternatives to KickassTorrents aka KAT.
Since KickassTorrents has lost its position forever after its deadly demise, Torrentz has taken its place totop the list of the top most popular torrent websites of 2016
Below is the top 5 torrent site alternatives to the KickassTorrents based on various traffic reports and stats. The ranking is listed in order of the torrent websites popularity on Alexa.
1. Torrentz  (Alexa rank-188) / Most popular alternative to KickassTorrents
Torrentz has been the top BitTorrent meta-search engine for many years, unlike other torrent websites it does not have any torrent or magnet links hosted on it instead it directs users to proper search results from other torrent websites.
While Torrentz started this year with ranking at 3rd in the list of most popular torrent websites it took over the rankings to beat The Pirate Bay and now has topped the chart after the demise of KickassTorrents.
2. The Pirate Bay (Alexa rank-329) / Most popular alternative to KickassTorrents
The Pirate Bay started its journey long back in 2003 and since then has faced several ups and downs with its co-founders getting arrested and facing lawsuits worth in millions of $. It made a comeback of sorts after the Swedish police raided its data center in Nacka and arrested one of the admins in 2014. The Pirate Bay is popularly known as HYDRA due to its various domains. It  has switched several domains time to time to avoid the authorities. Currently, it is using its original .org domain.
3. ExtraTorrent (Alexa rank-449) / Most popular alternative to KickassTorrents
ExtraTorrent is well-known torrent website with its website design and interface making it easier to search for the content with proper category wise listing. ExtraTorrent has maintained its 3rd position in the list of top most popular torrent websites, starting from 2015. this site is also the home of the most popular torrent release groups including ETTV and ETRG release groups.
4. YTS aka YIFY (Alexa rank-690) / Most popular alternative to Kickasstorrents
yts.ag is not the original YTS or YIFY group. After the demise of original YIFY/YTS this website took its place and since it has gained lots of popularity with its unique style website look.
5. RarBG (Alexa rank-768) / Most popular alternative to KickassTorrents
Founded in 2008, RarBG gained quick popularity and provides torrent files and magnet links to facilitate p-p  file sharing, the site has been blocked by UK, Saudi Arabia, Denmark, Portugal and several other countries though has managed to make it to 5th rank in top most popular torrent websites.
In addition to the above list of most popular torrent website alternative to KickassTorrents, few newcomers has also tried to clone and take place of the popular KickassTorrents.
  1. DXTorrent
  2. Kat.am
Users are advised to block popups and not to provide their login credentials on any of the KickassTorrents clones
A member of IsoHunt team has also launched an unofficial working mirror of the KickassTorrentsas kickasstorrents.website
A redditor has given his list for Kickasstorrents alternatives which is as follows :
General purpose :
https://kat.al/
https://zooqle.com
https://www.torrentdownloads.me/
https://www.demonoid.pw/
http://www.btstorr.cc/
https://rarbg.to/top10
https://www.torlock.com/
https://extratorrent.cc/
https://www.torrentfunk.com/
https://www.limetorrents.cc/
https://1337x.to/
https://bit.no.com:43110/zerotorrent.bit
TV Shows torrents :
http://showrss.info/browse/all
https://eztv.ag/
Remember the above websites are also unverified by torrent users and you may block popups while surfing them.

IsoHunt launches a working mirror for KickassTorrents

IsoHunt launches unofficial KickassTorrents mirror, after its demise

The United States Department of Justice arrested Artem Vaulin, the kingpin of KickassTorrents (KAT) in Poland on Wednesday and shut down the widely popular file-sharing website. Now, the world’s number one BitTorrent site is back online, thanks to one of the member of IsoHunt. This torrent site has launched an unofficial mirror for KAT. It might look like the original KAT site, but upon a keen observation, it’s just a basic mirror.
IsoHunt is the file sharing organisation, which revived The Pirate Bay in April this year after Swedish government authorities raided its office.
The site, which is accessible at kickasstorrents.website, was setup yesterday and features an older copy of KAT’s database. The IsoHunt team has been hosting files on the KAT mirror only from the last one and a half years, but lacks the forums, community and support of KAT. Having said that, it does have most of the functionality that is needed for a typical torrentor and certainly looks the part.
It’s not perfect but if users need to save and archive something it’s time. We don’t know how long it can last, but at least it’s something,” the IsoHunt told VentureBeat.
It goes without saying too that uploading of new contents cannot be accommodated by the mirror at the moment as the site is far from being robust, but is certainly functional.
Besides putting the KAT mirror up, IsoHunt has called the arrest of Vaulin another attack on freedom and rights of the internet users all across the world. Therefore, IsoHunt’s team has created two petitions, with Change.org and the White House, with the hope of raising enough signatures to get Vaulin out of jail.
It’s highly unlikely the petitions will be able to achieve anything, but the U.S. government does have a rule that states petitions with over 100,000 signatures in 30 days must receive an official response.
Currently, the Change.org petition has 221 supporters while the White House petition only 69 signatures.
Below is the IsoHunt statement demanding KAT founder’s freedom, which appears the first time you access the KAT unofficial mirror.
“This morning the founder of kat.cr was arrested in Poland. It is another attack on freedom of rights of internet users globally. We think it’s our duty not to stand aside but to fight back supporting our rights. In the world of regular terrorist attacks where global corporations are flooded with money while millions are dying of diseases and hunger, do you really think that torrents deserve so much attention? Do you really think this fight worth the money and resources spent on it? Do you really think it’s the real issue to care of right now? We don’t!
“Kat.cr is a website we all know and love, and the world will never be the same without it. That’s why before it will come back we’ve made the mirror of Kat.cr with all the torrents we could find. It’s not perfect but if you want to save and archive something, now it’s the time! We don’t know how long it can last, but at least it’s something. We will continue to fight for our freedom and you’re welcome to join us! Sign this petition on Change.org and let everybody know that there are many of us who refuse to be silent.
“Our freedom is to share the human right which Artem Vaulin has been providing to millions of users from all over the world. By arresting him our rights are violated.”