Terra Security Blog

Hacking Solved

Shockingly Easy To Break Windows 10 Encryption

What if the supposedly secure Bitlocker encryption on Windows 10 could be completely undone simply by pressing two keys?  It’s actually that shockingly easy, provided you know which two keys to press and when.

Continue reading “Shockingly Easy To Break Windows 10 Encryption”

New Trojan Records Everything

Trojan T9000 records your video, audio, chats, Microsoft Office files, and more.  Meanwhile, it’s undetectable to traditional anti-malware products, including: Norton, McAfee, Bitdefender, and Kaspersky.

How does T9000 avoid detection by all traditional antivirus and firewalls? What can be done to stop sophisticated trojans like T9000?

If you follow this story from beginning to end, you will discover a very surprising method to finally stop even the most sophisticated trojans once and for all.

Continue reading “New Trojan Records Everything”

Myth: Only Complex Trojans Bypass Antivirus

In a previous article, we discussed how trojans routinely bypass antivirus.  In the article, we also showed a teenager using a $50 program to scramble his trojan to make it unrecognizable by all antivirus.  But a hacker recently demonstrated that any trojan could be scrambled beyond recognition with just 10 lines of computer code.

In fact, upon looking at the code, 4 lines are standard requirements for any C++ program.  In other words, the actual code itself is just 6 lines.

Consumers literally pay $billions each year for antivirus programs that hackers can beat with just 6 lines of actual code.  The antivirus industry promotes the myth that only sophisticated hackers can bypass their products.  Meanwhile, hackers can either use a $50 program, or simply do it for free with six lines of actual code.  That’s how useless antivirus truly is.

Note: The researcher not only tested the 10 lines of code on file signatures, but he also tested 10 antivirus programs that use more than file signatures.  The 10 lines of code bypassed the every security technique employed in all 10 antivirus programs.

Security & Convenience: A One-Two Punch

Hacker Deterrent automatically blocks all applications from accessing the internet except for browsers.  Meanwhile, Malwarebytes Anti-Exploit is especially effective for shielding one type of application: browsers. Working together, this powerful one-two punch delivers automatic security and convenience — a winning combination. Continue reading “Security & Convenience: A One-Two Punch”

Hacker Deterrent: Version 1.1

We are pleased to announce the launch of Hacker Deterrent 1.1.  This version adds the following new features over the previous release:

  • Twice as fast
  • Demarcation of app entities for even easier viewing
  • Automatically launching after each computer reboot
  • Encryption for your privacy when using our product on public WiFi
  • Buttons for instant assistance: User Guide, Tutorials, and Customer Support

Continue reading “Hacker Deterrent: Version 1.1”

Cybersecurity’s Dirty Little Secret

“Antivirus software is so universally ineffective that it’s just a waste of money.”
CBS News

The cybersecurity industry has a dirty little secret that hackers don’t want you to know.  What’s the secret?  Cybersecurity no longer protects you like it used to.  Instead of the industry getting better at fending off hackers, it actually lost the battle awhile ago. In fact, antivirus can actually make you less secure than not having antivirus at all.

Continue reading “Cybersecurity’s Dirty Little Secret”

US Govt Warns: Norton Helps Hackers

The US Federal Government recently warned that the products Norton promotes for security can actually help hackers instead:

On Tuesday, the law enforcement agency issued an alert that “all Symantec and Norton branded antivirus products” could allow hackers “to take control” of a computer. — CNN: Symantec – the popular computer protector – may actually help hackers, feds warn

Continue reading “US Govt Warns: Norton Helps Hackers”

140 Million Web-of-Trust Users at Risk

The popular reputation scoring service Web of Trust (WoT) appears to be complicit in identity theft.  According to a German report, extremely personal details of WoT users have been made available, including:

  • Browser surfing activity including all sites visited
  • Mailing address
  • Drug consumption
  • Sexual preferences
  • Confidential company information
  • And much more

According to the NDR research report, the 140 million WoT users were literally being spied upon:

Continue reading “140 Million Web-of-Trust Users at Risk”

Blog at

Up ↑