Posts

Showing posts with the label TECH NEWS

Wannalocker: Android Users Wanna'Cry'

Image
Wannalocker: Android Users Wanna'Cry'. After the terror we saw with the dangerous Wannacry ransomware, another ransomware is on play. Unlike the wannacry, those ransomware is specialized for infecting android phones. Although, now the attack is spread only among Chinese users. Connection to Wannacry When it infects, the message screen coming by may scare you. Because it has a most familiar look we all saw presently. That’s why it is called as a Copycat of Wannacry Ransomware. Also the security company Avast named it as “wannalocker”. But the point is, the ransomware could spread havoc among the infected people and it can easily get famous. Only the name is enough, WANNACRY. We can understand that the attacker expects a quicker transfer of money. That might be the reason why the attacker decided to design the message screen display to look alike wannacry. [caption id="attachment_3655" align="aligncenter" width="422"] wannalocker display photo: avas...

Britney Spears' Instagram Used By Russian Hacker Group

Image
The social media giants like Instagram, which is on its way to hitting a billion users this years, surely have a number of harmless comments posted each day. But, will be there some occasional moments when some clever hacker posts some comments that instructing a malware how to get in touch with its controllers or servers?! A latest report says a Big yes! The Slovakian security company ESET said on Tuesday that a Russian espionage hacker group called, Turla has created such cleverly hidden comment. The interesting thing is that it was on the popular American singer Britney spears. Instagram comments on the American singer just got used to store the location of a C&C server (command & control server) of the 'Turla' hackers. The shocking operation was made by using a Mozilla firefox extension, in which a hidden backdoor in it. The team said it is one of the tool owned by the group, which is believed to be funded by the Russian government. Off course, The singer might not ...

Top Indian Hackers You Should Know

Image
Top Indian Hackers Top Indian Hackers  Computer hackers are almost always celebrated, whether they fall in the ‘black’ or ‘white’ side of the law. But you rarely get to hear about Indian hackers in our own media. And especially when these hackers are decisively helping organizations and governments in positive ways they ought to be celebrated. Here are 11 best Indian hackers we all should know of. 1. Rahul Tyagi [caption id="attachment_16103" align="aligncenter" width="613"] Top Indian Hackers[/caption] Rahul Tyagi | Source: twitte Aside from being an expert on breaking and entering computers Rahul Tyagi is also an author and a talented actor. With over a hundred training sessions under his belt this guy is as versatile as it gets. 2. Pranav Mistry [caption id="attachment_16104" align="aligncenter" width="610"] Top Indian Hackers[/caption] Source: vulcanpost.com This hacker extraordinaire is also famous for the invention of ...

Good News for Wannacry Victims: Your Files Are Easy to Recover!

We all know about the panic made by the infamous ransomware worm wannacry. It hit more than 3lakhs of systems within 72 hours. The latest reports says that there are some errors found in the wannacry code and it might allow the victims to restore the files without any decryption keys. Senior researcher at security company kasperkey lab Anton Ivanov, along with his team mates’ fedor sinitsy and orkhan mamedov explained thursday that some critical errors in the code made by wannacry developers. They made mainly 2 types errors. While deleting the original file. While processing the read-only files. By utilizing these errors, the victims can restore their files using just a recovery software. 1.Error in the removal logic When wannacry encrypts a file it first reads the original file, encrypts it and save it to an extension .WNCRYT. Then it moves to another extension .WNCRY and deletes the original file. Our issue resides in this area that is in the way the ransomware deletes the orig...

Warning! You Are Being Watched Without Your Knowledge

Image
When NSA contractor the famous(' infamous', 'the hero' ) Edward Snowden revealed that the US government is watching us through the yahoo web chat in a project called, 'Optic Nerve', we got really scared. A Developer from AOL, Mr.Ran Bar Zik has reported the similar situation Now. He insists we could get spied, watched without our knowledge through a UX design flaw in google chrome. If any hacker with malicious intention exploit this flaw, yes. it is possible. User will be not aware that they are being spied. How it Works Presently the modern web browsers like google chrome and mozilla firefox uses a collection of protocols called, webRTC(Web real time communication) protocol for real time audio video communication. Web browsers doesn't need a plugin if they are using webRTC. To protect from unauthorized audio and streaming using this webRTC, browser requests the users to allow particular websites to use webRTC and then to access devices camera and microphone...

How to hack Facebook using phone number

The social media giant facebook is very well known for its security features. The number of google searches on how to hack facebook is enormous. But do you know that an old but still working flaw can exploit to hack our facebook accounts using just our phone number?! But here the flaw is not actually relies on facebook. Its on our tele communication ss7 network(signaling system 7). SS7(signaling system 7) Flaw Ss7 is a set of protocols that are used to control world’s pstn(public switched telephone network is the world's collection of interconnected voice-oriented public telephone networks, both commercial and government-owned.) the ss7 technology is responsible for mobile number portability, prepaid payments, SMS and number translation. The messaging service highly relies on ss7. The flaw was actually discovered in 2008 but it was publicly published in 2014. And a real world attack was reported in this year for stealing money from the bank accounts. It is been said that the govern...

Download Latest GBWhatsapp +5.60

Image
GBWhatsapp is a moded whatsapp facilitated for using more awesome options. It is actually a whatsapp but it have many edits and options that may be very cool for us. GBWhatsapp have the following functions: *Possibility to hide appearing * privacy options * Possibility to distinguish between collective messages and regular * Possibility to know who visited your profile or become connected to * the possibility of setting lock Watts August password * Possibility to send a video size of 30 MB instead of 16 MB * possibility of sending an audio clip size up for 100 MB instead of 16 MB * the ability to send 90 image at one time without 10 * possibility of a case of the number of dependent characters 250 instead of 139 characters * the possibility of pressure on the links without storing the message sender or number owner * counter statistics for groups * preview media without loading * ability to hide the name and the date when copying letters or more * possibility of copies pressed Machine ...

NASA Internet Connection Speed Is 13,000 Times Faster Than Yours

NASA Internet Connection Speed Is 13,000 Times Faster Than Yours NASA Internet Connection Speed Is 13,000 Times Faster Than Yours , hello friends i am BLOGGER ASHOK & i am back with new Tech New . If there’s one organization that never has to worry about streaming videos in glorious HD, it’s NASA. The space organization's  shadow network can transfer 91 gigabits per second, or 91,000 megabits per second. For comparison, the average broadband connection speed in the U.S. is 6.6 megabits per second - or more than 13,000 times slower. Read  Major Security Flaws on Popular Mobile Wallets – Digital Wallets Scam What is a shadow network? It's like the Internet, but only connects a few research facilities and organizations around the world. It's meant to share huge data files from science experiments. In other words, it's like the original Internet back when it was ARPANet. NASA's shadow network, on the other hand, is called the Energy Science Network, or ESnet. Bes...

Google Just Killed What Might Be The Biggest Android Ad Fraud Ever

Image
Google has thrown more than 40 apps out of its Play store after it emerged they were quietly forcing Android users to click on ads. As the apps been downloaded  as many as 36 million times, s ecurity researchers said it appeared to be the biggest ever case of ad fraud perpetrated via Google Play and probably the most successful malware in terms of installs from the official store. Security firm Check Point  revealed  the campaign Thursday, claiming a South Korean company, Kiniwini, hid an illegitimate ad clicking function inside 41 apps, most of which were games. Google's Bouncer, a technology designed to keep such so-called "adware" out of its store, wasn't able to pick up on the feature as it was downloaded after installation. Once the rogue code was added to the apps, they would secretly open webpages in the background, via software that imitated a PC browser. "Once the targeted website is launched, the malware uses the JavaScript code to locate and...