Facebook says new hack leaked data of 30 million users

At the end of last month, Facebook made a bombshell disclosure: As many as 90 million of its users may have had their so-called access tokens—which keep you logged into your account, so you don’t have to sign in every time—stolen by hackers. Friday, the company put the actual number at 30 million.

To see if your account has been effected click here.

Tags: , , ,

Edge browser stopped working after upgrading to Windows 10 October 2018 Update (version 1809)

Alongside the TCP/IPv4 protocol, it appears that now, Microsoft Store apps and Microsoft Edge also require the TCP/IPv6 protocol to be enabled in the network card to connect to the internet.

“Microsoft is aware of an issue after installing the Windows 10 October 2018 update (version 1809) that prevents Microsoft Store apps from connecting to the Internet on devices that have disabled IPv6. Microsoft is working on a solution that is planned to be released in a future Windows update,” Microsoft employee Paul and forum moderator explains.

To learn more: Windows 10 October 2018 Update common problems and fixes

Tags: , ,

5G Will Change The World

The transition from 4G to 5G will allow wireless technology to surpass three technical thresholds: 1) wireless internet speeds will surpass cable broadband and potentially also fiber optic cable; 2) the “internet of things” will have mass industrial applications for the first time; and 3) communication lag will fall to one millisecond—faster than the speed at which humans perceive touch response as instantaneous—giving rise to new, “tactile internet” applications such as remote surgery.

To learn about 5G click here.

Tags: ,

Getting Started with Metasploit

The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

Its best-known sub-project is the open source[2] Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.

The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.

Getting Started with Metasploit