skip to main |
skip to sidebar
Name |
Author |
Perms |
Com |
Modified |
Label |
Filename |
Hackers Crash Macs Using Dos Attacks |
Permission |
rw-r--r-- |
Author |
Unknown |
Date and Time |
1/11/2017 |
Label |
Cyber News
|
Action |
|
Filename |
Windows 10 preview 15002 Comes With Tons Of New Features |
Permission |
rw-r--r-- |
Author |
Unknown |
Date and Time |
1/11/2017 |
Label |
Cyber News
|
Action |
|
Filename |
Hello Kitty Database Hacked, 3.3 Million User Details Breached |
Permission |
rw-r--r-- |
Author |
Unknown |
Date and Time |
1/11/2017 |
Label |
Cyber News
|
Action |
|
Filename |
ESEA Hacked, 1.5 Million User Records Stolen |
Permission |
rw-r--r-- |
Author |
Unknown |
Date and Time |
1/11/2017 |
Label |
Cyber News
|
Action |
|
Filename |
Why Windows Uninstalls Only One Program At A Time, Not More? |
Permission |
rw-r--r-- |
Author |
Unknown |
Date and Time |
1/10/2017 |
Label |
Cyber News
|
Action |
|
Filename |
Hacker Publishes Open Source Tool For Finding Secret Keys On GitHub |
Permission |
rw-r--r-- |
Author |
Unknown |
Date and Time |
1/10/2017 |
Label |
Cyber News
|
Action |
|
Filename |
How Iran’s efforts to censor porn led to Internet outage in distant Hong Kong - |
Permission |
rw-r--r-- |
Author |
Unknown |
Date and Time |
1/10/2017 |
Label |
Cyber News
|
Action |
|
Filename |
Sophisticated machine intel can be used to track down malware writers and pirates |
Permission |
rw-r--r-- |
Author |
Unknown |
Date and Time |
1/03/2016 |
Label |
Cyber News
|
Action |
|
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking
Wrong doers, sophisticated intel is keeping a close eye on you
Thanks to the use of using stylistic programming traits which in turn transforms into sophisticated intel, individuals anonymous programmers, from malware writers to copyright infringers, along with those who are baiting governments with censorship-foiling software should be warned that their identities will not remain a secret for much longer.
The research that is being conducted is titled ‘De-anonymizing Programmers: Large Scale Authorship Attribution from Executable Binaries of Compiled Code and Source Code’ and in a synopsis form of an explanation, it basically explains that researchers have begun trying to identifying malicious programmers and have stated that there if the writing style of that particular writer is different, it will ultimately lead to their current whereabouts. The research was presented by Aylin Caliskan-Islam to the 32nd annual Chaos Communications Congress on Tuesday. Another publication titled When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries, written by researchers based at Princeton University in the US, one of whom is notably part of the Army Research Laboratory was also presented.
The researchers have stated the following concerning their findings:
“While we can de-anonymize 100 programmers from unoptimized executable binaries with 78 per cent accuracy, we can de-anonymize them from optimized executable binaries with 64 per cent accuracy. We also show that stripping and removing symbol information from the executable binaries reduces the accuracy to 66 per cent, which is a surprisingly small drop. This suggests that coding style survives complicated transformations.”
Naturally, there will be a scenario where the writing style of one malware writer is going to be similar to the writing style of another writer, and that is an element that might not get picked up by the intel, which is where the researchers are introducing several other methods that will allow them to further isolate the writing styles of such individuals in order to their capture malicious individuals much more swift, and obviously much more accurately.
This approach can also be used for a variety of different applications ranging from the preservation and strengthening of encryption methods. However, since the research is still in its nascent stage, it will obviously take a while before sophisticated intel will be able to bring down justice swiftly.
www.extremehacking.org
CEH v9 CHFI v8 ECSA v9 CAST ENSA TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, Center For Advanced Security Training in India, IT Security Training Information Security Traning Courses in Pune, Ethical Hacking Institute in Pune, Ethical Hacking Course in Pune, Ethical Hacking Training in Pune, ceh certification in pune
Filename |
Google Search declines as Microsoft’s Bing search engine keeps growing |
Permission |
rw-r--r-- |
Author |
Unknown |
Date and Time |
12/29/2015 |
Label |
Cyber News
|
Action |
|
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking
Google Search goes down, Microsoft’s search engine Bing is now at 20.9 percent market share in the US beating Google and Yahoo
The new statistics in the search business show that while Microsoft is continually growing in the search business, Google is rapidly losing users year-over-year (YOY). However, Bing adoption is on the rise.
According to the comScore data for the month of November 2015 in the United States, where on one hand, Google and Yahoo have stagnated in terms of performance, on the other hand, Microsoft’s search engine is the only one among the giants that has been able to improve its share during the month.
In November, with 63.9 percent, Google continued to be number one in the US of the searches in the United States performed on its sites. Whereas, Microsoft came second with 20.9 percent, and Yahoo came third with 12.5 percent.
Even though both Google and Yahoo had the same performance as in October 2015, Microsoft was able to improve its share by 0.1 percentage points. The figure may not seem much, but what is interesting to note is that Bing is slowly but steadily growing over the 20 percent share that was achieved in summer.
While for Microsoft it is surely a significant milestone to reach 20 percent in the search business, but at the same time, Google also lost its grip in the last few months.
Google is now at 63.9 percent, down from no less than 67 percent a year ago, due to its flat performance in the last couple of months. There is no doubt that Microsoft is also partly responsible for this fall.
One of the reasons behind Bing’s increase on the desktop is clearly Windows 10, the new operating system from Microsoft, which not only uses it as the default search engine, but it also packages it into Cortana, the company’s personal assistant available on PCs and mobile devices.
The coming months is expected to see a rise in Bing’s search share, as more people are expected to migrate to Windows 10. Hence, it will be interesting to see how Google responds to slow down it’s descend.
www.extremehacking.org
CEH v9 CHFI v8 ECSA v9 CAST ENSA TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, Center For Advanced Security Training in India, IT Security Training Information Security Traning Courses in Pune, Ethical Hacking Institute in Pune, Ethical Hacking Course in Pune, Ethical Hacking Training in Pune, ceh certification in pune
Filename |
The guy who invented USB is not getting a single cent for it |
Permission |
rw-r--r-- |
Author |
Unknown |
Date and Time |
12/28/2015 |
Label |
Cyber News
|
Action |
|
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking
Used in more than 10 billion devices throughout the world, the USB turned 20 years old last week. However, the man who discovered the technology has not made a single penny off it and he is fine with it.
Ajay Bhatt, Intel’s Chief Systems Technologist, who’s largely responsible for inventing the USB technology, told Business Insider, “I don’t do these things for money. I did this to bring about change, and it’s not very often that somebody gets a chance to bring about this big a change.”
As a matter of fact, the USB technology did not make money for anyone. This is because Intel, who was the first one to back Bhatt’s USB idea and who owns all patents to the technology had decided from the start to make it open and royalty free.
Bhatt believed that Intel had every right to do so.
The USB which is now regarded as the standard for connecting different devices, was once met with a lukewarm response from tech companies, including Apple and Microsoft, in the early ’90s when Bhatt had first proposed the idea to them.
Creating a single connector was a smart idea that basically bypassed the need for a separate driver or floppy disk to install each application. However, the basic fear of breaking the existing compatibility functions kept the companies from investing in his idea. But Intel was the only company that was bold enough to make the investment in his idea at the time.
“As an engineer, I’ve been handsomely rewarded by the company,” Bhatt added. “And I couldn’t do this kind of work anywhere else. I have nothing to complain.”
Even though Intel was the first to support the idea and has started building support for it into its chips, actually it was Apple who first shipped a USB compatible product – the iMac G3 – for end users in August 1998. Immediately, Microsoft followed suit when it provided USB support for Windows 98’s second edition.
So, does Bhatt believes that he may have missed out on a chance to make hundreds of millions of dollars? No. He believes that his contribution to the overall computer industry is what makes up for it. The basic purpose was to make the PC easier for regular users, and expand the overall PC market, and the USB undoubtedly helped the cause.
“If computers are seen to be easy, then we’ll sell more computers, and as part of that, we’ll sell more chips. It’s a much bigger picture that Intel saw,” Bhatt said. “As the pie gets bigger, we get a piece of the pie, and we’re happy with it.”
Whats Next
So will there ever be another technology that would be available everywhere as the USB? Bhatt thinks he found one: the stylus.
Currently, Bhatt is working with 35 companies to create a standard for stylus pens, so they could all work under one universal technology. If his vision comes true, then it would be mean that an Apple stylus pen could be used in a Microsoft Surface, and vice versa.
“We are defining a standard to make the stylus more ubiquitous, more responsive, and address the entire handwriting experience,” Bhatt said. “It’s the next frontier.”
www.extremehacking.org
CEH v9 CHFI v8 ECSA v9 CAST ENSA TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, Center For Advanced Security Training in India, IT Security Training Information Security Traning Courses in Pune, Ethical Hacking Institute in Pune, Ethical Hacking Course in Pune, Ethical Hacking Training in Pune, ceh certification in pune
Filename |
Top 5 simple tips that can spread Wi-Fi throughout your house |
Permission |
rw-r--r-- |
Author |
Unknown |
Date and Time |
12/28/2015 |
Label |
Cyber News
|
Action |
|
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking
The biggest problem with modern Wi-Fi is that it still doesn’t spread throughout the entire house. Here are five easy steps to make sure you can get it done.
The last few years have seen the sudden rise and use of wireless networks. Wireless networks can be a lifesaver like most advanced technologies. In comparison to wired networks, the speeds are either equal or in some cases even faster.
However, on the other hand, it becomes very frustrating when your home wireless network is moving at a snail’s pace. The speed of wireless network connection in reality actually depends on your proximity to the router. For instance, if you are on the farther side of the house, you might get slow Internet or nothing at all. Such a connectivity when you are trying to check an important email or trying to send an important file. So, how do you take full advantage of the home tech? Well, the solution is simple.
Provided below is the five-step guide that will help solve your wireless networking problem, when you find yourself overwhelmed by bad reception and painfully slow download speeds:
Step 1: Figure Out The Right Network Standard For You
There are five wireless network standards: 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac. Any of them can be used, while keeping in mind the below:
- 802.11a is particularly used by large corporate networks.
- 802.11b is low-cost, but it has a slow maximum speed (11 Mbps) and tends to get some interference from home appliances. Provide enough space in-between your router and objects like cordless phones and microwaves to avoid this problem.
- 802.11g is the newest of the three standards, and it combines the best aspects of 802.11a and 802.11b. It’s also backward-compatible with everything that runs on 802.11b. 802.11g has a maximum speed of 54 Mbps, which is solid for most home use.
Recently finalized with a top speed of 600 Mbps, 802.11n standard is the best so far. The N routers are still new and may have problems with devices configured for 802.11b/g networks.
Irrespective of the standard, ensure that all your equipment like computer, router, etc. runs on the same one. For instance, an 802.11g router won’t run with an 802.11a range extender. You can get away with 802.11g for personal use, or some 802.11ac equipment, if you want to be fancy.
Step 2: Design Your Network
The next step is to decide where to place the gear and how much of your house to cover. Majority of users dont give a damn to this all important aspect. Normally the Wi-Fi router is placed in a prominent position without consideration for the size of the home, material used to construct the walls or the walls that could interfere with the signals. Brick or concrete walls, for instance, will need a different layout than a wood-frame home. Depending on your home’s size (for anything under 1200 square feet, a router alone should be fine), you should plan to buy one wireless router as well as at least one range booster. Placing the gear in central locations would be the best option: The router should go within easy wiring distance of your ISP’s Ethernet modem, with the range booster accessible to force out greater coverage.
Step 3: Purchase Your Gear
Cisco, Netgear, and Alfa are just a few of the wireless networking gadgets names available on the market. Note that there is no perfect way to run this, as every router can come with its own set of problems. However, you need not worry too much as long as you stay within the same family, since the wireless standards are fairly common.
If you have got a small studio apartment, then probably you don’t need that range extender, and can get away with a less expensive wireless router. However, on the other hand, if you want better-quality coverage through an entire house, then, in that case, you may likely want to jump for a higher-end system. All boils down to budget, but when it comes to wireless networking equipment, you get what you pay for.
Step 4: Hook Up Your Network
The simplest part is installation, irrespective of which router and repeater you choose. Power down your ISP’s modem, plug your new router into the appropriate output port, and then plug your router into your primary computer. Power everything up and wait for the on-screen instructions to appear and help you set up the router. It will take a few minutes, but once the lights blink green on the router, you are good to go on at least one floor of your home.
Your repeater/range extender installation runs much the same way. However, before keeping the extender where you want, ensure that is recognized on your network. You can do this by getting the extender into the same room as the router and powering it on. Once your extender is identified by the router and the software has been installed to make them talk to each other, you can move the device where you actually want it. Note that radio interference can cause havoc with your network.
Step 5: Secure Your Network
Simply installing your router can result in an unsecured network that anyone can get access to, which in turn can kill your bandwidth and potentially make your files fair game for theft. To make it secure, create a network password and encryption profile. All you need to do is enter the admin dashboard for your router, which can be done in any one of two ways: Either through the software package that came with your router, or by visiting www.routerlogin.com and entering the default username and password (found in manufacturer instructions).
Follow the on-screen instructions, set a strong and proper password. It’s done.
From now on, you should have a secured wireless network that is available throughout your house and, if done right, maybe into your yard too.
www.extremehacking.org
CEH v9 CHFI v8 ECSA v9 CAST ENSA TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, Center For Advanced Security Training in India, IT Security Training Information Security Traning Courses in Pune, Ethical Hacking Institute in Pune, Ethical Hacking Course in Pune, Ethical Hacking Training in Pune, ceh certification in pune
Filename |
Torrents leak : Hive-CM8 to leak 40 top Hollywood movie screener versions in coming days |
Permission |
rw-r--r-- |
Author |
Unknown |
Date and Time |
12/28/2015 |
Label |
Cyber News
|
Action |
|
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking
A movie piracy release group, which calls itself Hive-CM8, has illegally stolen not less than 40 of Hollywood’s biggest films to be released this summer and is promising to release them online over the next few weeks.
The group claims to have obtained high quality versions of films such as Tarantino’s The Hateful Eight, The Revenant starring Leonardo Di Caprio and Will Smith’s NFL-based drama Concussion.
Several of the highest-profile films of the year, including recent releases like Creed, Joy, and Steve Jobs, In the Heart of the Sea, The Danish Girl, and Bridge of Spies are among the films already available to download on various piracy sites.
The leaks began on December 20th with a note saying The Hateful Eight was just one of 40 screeners that the so-called CM8 “scene group” would be releasing. “Will do them all one after another, 9th hot title,” reads the documentation accompanying the most recently leaked film, Spotlight, according to Motherboard. All but The Revenant have been leaked under the name “Hive-CM8.”
The films are all high-quality DVD screeners, which are copies sent to people like journalists, award judges, and other industry professionals for evaluation purposes.
Some members of the public have delighted in the torrent of free entertainment, prasing the group for boosting their holiday plans. But of course the hack has drawn criticism from frustrated industry insiders.
The leaked version of The Hateful Eight has been traced back to a top Hollywood executive, co-CEO of Alcon Entertainment, Andrew Kosove. according to The Hollywood Reporter. Kosove says he never saw the DVD, whose delivery was accepted by an office assistant. The screener was sent to Kosove for awards consideration and identified by invisible watermarks embedded in the playback.
The FBI, working in conjunction with major Hollywood studio The Weinstein Co., were able to pinpoint his copy of the film as the source of the leak from a watermark on the DVD sent to him. However he has denied ever receiving the film. He said that the DVD was accepted by an office assistant.
“I’ve never seen this DVD… It’s never touched my hands. We’re going to do more than co-operate with the FBI. We’re going to conduct our own investigation to find out what happened,” he told The Hollywood Reporter. The origins of the other leaks are unknown at this time.
According to reports in TorrentFreak, “The Hateful Eight” was downloaded over 300,000 times after the first day of the leak, which combined with the other movies released by CM8, almost guarantee that Hollywood will pursue legal repercussions.
Last year, The Expendables 3 was leaked online nearly a month before its official release. The movie was downloaded by more than 10 million people causing it to lose a claimed $250 million in revenue.
The Hive-CM8 group, whose slogan appears to be “doing it right the first time,” has been around for at least five years and in the past has been responsible for leaking films such as The Hobbit, 12 Years a Slave, The Social Network and Interstellar.
It is not uncommon for a string of high profile movies to be leaked in the lead up to awards season but the claimed size and coordination of the latest hack is exceptional.
Discussing the leaks, one of the reddit user noted on a thread: “Screener season is officially in full swing.”
www.extremehacking.org
CEH v9 CHFI v8 ECSA v9 CAST ENSA TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, Center For Advanced Security Training in India, IT Security Training Information Security Traning Courses in Pune, Ethical Hacking Institute in Pune, Ethical Hacking Course in Pune, Ethical Hacking Training in Pune, ceh certification in pune
Filename |
DNA Hard Drive Capable of Holding Data for One MILLION YEARS |
Permission |
rw-r--r-- |
Author |
Unknown |
Date and Time |
12/28/2015 |
Label |
Cyber News
|
Action |
|
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking
Our conventional hard drives stores up to, well, a terabyte of data or two? What would you say if I say that this very capsule could store data so much as billions of terabytes? What if I say that it is possible to code DNA so that it could store such vast amount of information?
Interestingly, storing information on DNA is quite simple. One simply has to program the A and C base pairs of DNA as a binary ‘0’, and the T and G as a ‘1’. The question is, how long would the data be stored?
In 2013, scientists managed to sequence genetic code in 700,000-year-old bones of a horse. The problem is the storage of the code. The conditions of storage must be well defined. Otherwise, on exposure to the environment, it can change and breakdown. Recently another type of data storage method was being talked about- the IBM’s racetrack memory to kill the hard drive is invented.
In order to do that, scientists encoded ‘Switzerland’s Federal Charter of 1921’ and ‘The Methods of Mechanical Theorems’ by Archimedes onto a DNA strand. That sums up to 83 kilobytes of data. These strands of DNA were then encapsulated into tiny glass spheres, about 10 nanometers in diameter. Then this glass packaging was compared to other methods of packaging by subjecting each package to temperature conditions about 60 to 70 degree Celsius conditions that replicated the chemical degradation that would usually occur over hundreds of years, all crammed into a few destructive weeks.
Even after this sped-up degradation process, it was found that the DNA inside the glass spheres could be recovered using a simple fluoride solution. The data could still be read. The glass spheres in this case worked pretty much like fossilized bones.
It is predicted that the data on the DNA strand could be preserved for more than a million years provided it is stored below -18 degrees Celsius. It could be stored for more than a thousand years if stored below 10 degrees at specific conditions.
The major setback to this DNA hard drive is its cost- one hard drive could be as expensive as $1500. Researchers and scientists are already storing data into these DNA hard drives. And the band OK Go are also storing their records in it.
I wonder if you can handle the overwhelming awesomeness when you realize that the whole of Wikipedia and Facebook could be stored in one small time capsule.
www.extremehacking.org
CEH v9 CHFI v8 ECSA v9 CAST ENSA TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, Center For Advanced Security Training in India, IT Security Training Information Security Traning Courses in Pune, Ethical Hacking Institute in Pune, Ethical Hacking Course in Pune, Ethical Hacking Training in Pune, ceh certification in pune
Filename |
India says goodbye to GPS, to have its own desi navigation system, IRNSS |
Permission |
rw-r--r-- |
Author |
Unknown |
Date and Time |
12/28/2015 |
Label |
Cyber News
|
Action |
|
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking
Bye bye GPS, India to soon have its own position determination system
The Indian Space Research Organisation (ISRO) is developing an indigenous position determination system that will replace the American Global Positioning System (GPS) used to get the time and place information anywhere on or near the earth and will also have enhanced access in remote areas.
“We will have our own position determination system using our own navigation constellation, the IRNSS series which will be operational by middle of next year. It is a kind of replacement GPS…The US is offering the GPS navigation, IRNSS is indigenous,” said Deviprasad Karnik, the director of publication and public relations, ISRO.
It will also aid in navigation and monitoring of fleet (trucks and ships) movement, the official added.
Developed by ISRO, Indian Regional Navigation Satellite System (IRNSS) is a regional navigation satellite that would provide accurate position information to users in the country, and will be under complete control of the Indian government.
“Once the constellation is completed, we need some time to establish the accuracy part, validation and other things. The advantage is that the navigation range has been designed to span around 1,500 km radius around India,” he said.
“GPS is not available at all places. Signal is weak in remote areas but our own signal will be available in remote areas with better accuracy.”
As an example of the app-based positioning service, Karnik said, it will help in effective management of fleet movement.
“Monitoring and effective management of fleet of trucks or ship monitoring will be done through spacecraft. For example, for ships the system can inform which route will be more effective. That will save time and fuel,” he said.
IRNSS is needed because the foreign government-controlled global navigation satellite system does not guarantee service in all situations.
The two types of services provided by IRNSS are as follows:
• Standard Positioning Service (SPS) – This will be provided to all users
• Restricted Service (RS) – This is an encrypted service that will be provided to authorised users only.(Including the military)
The applications of IRNSS include disaster management, vehicle tracking and fleet management, integration with mobile phones, terrestrial navigation aid for travellers, visual and voice navigation for drivers, and more.
With this system, the ISRO will provide GPS connectivity to most of the rural part in India by 2016. For this mission, ISRO will be using seven satellites namely IRNSS-1A, 1B, 1C, 1D, 1E, 1F and 1G out of which IRNSS-1A, 1B, 1C, 1D are already in the Orbit. The remaining three satellites including 1E, 1F and 1G will be launched in January, February and March respectively.
Meanwhile, the ISRO organization is hoping to get the IRNSS fully operationable by next year July. Moreover, the ISRO is requesting the device manufacturer’s to incorporate the additional hardware, so that the device can receive the signals from IRNSS.
As per the official, the so-called IRNSS will provide location accurately to almost 20 meters. This data from IRNSS can be used in all the devices, which supports the additional hardware.
“Both these L and S band signals received from seven satellite constellation of the IRNSS are being calculated by special embedded software which reduces the errors caused by atmospheric disturbances significantly. This in turn gives superior quality location accuracy than the American GPS system”, said a senior ISRO official in an interview.
ISRO also aims to make signals available not only to India and surrounding countries but also to the entire globe, said ISRO Chairman Kiran Kumar. “As we make it global, global users will be able to take advantage. Otherwise, now only regional users can take advantage of IRNSS”, he added.
www.extremehacking.org
CEH v9 CHFI v8 ECSA v9 CAST ENSA TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, Center For Advanced Security Training in India, IT Security Training Information Security Traning Courses in Pune, Ethical Hacking Institute in Pune, Ethical Hacking Course in Pune, Ethical Hacking Training in Pune, ceh certification in pune