Posts

Showing posts from February, 2017

Google achieves first ever SHA-1 collision attack

Image
Researcher unveiled on Thursday the first practical collision attack for cryptographic hash function SHA-1. SHA-1,Secure Hash Algorithm 1,is popular hashing function used in many websites. Google researchers and academics have today demonstrated it is possible – albeit with a lot of computing power – to produce two different documents that have the same SHA-1 hash signature. How is SHA-1 Used? One real-world example where SHA-1 may be used is when you're entering your password into a website's login page. Though it happens in the background without your knowledge, it may be the method a website uses to securely verify that your password is authentic. In this example, imagine you're trying to login to a website you often visit. Each time you request to log on, you're required to enter in your username and password. If the website uses the SHA-1 cryptographic hash function, it means your password is turned into a checksum after you enter it in. That checksum is then compa

Facebook Will Soon Pay You Money For Your Videos, Trying To Become “Next YouTube”

Facebook is all set to ditch the cloak of a social media company and turn itself fully into a media company. Its investments in videos will be further pushed in near future. During Facebook’s Q4 earning announcement, Zuckerberg told that Facebook is planning to start sharing its ad revenue with content creators. This strategy will attract more content creators to Facebook.   Facebook has defied the predictions made by economists and revealed that its growth isn’t going to stop anytime soon. On Wednesday, the company said that its revenue grew 51% in 2016’s fourth quarter. Zuckerberg’s company was also able to convert 52 cent of every dollar into operating profit. But, before Facebook’s growth stumbles, what’s next? Last year, Facebook made big bets on video by pushing live videos like crazy. This year things won’t slow down. Instead, the company is expected to invest more money to create its new moneymaking machine. Zuckerberg himself considers video a mega trend. “That’s why we’re goi

Pentagon Servers are Flawed and Easy to Hack

The U.S. Department of Defense can be at a huge risk of being attacked by hackers very easily, a security researcher warns. According to the  ZDNet , who cites the Dan Tentler, the founder of cybersecurity firm Phobos Group, there are several misconfigured servers run by Department of defence could allow attackers an easy access to the internal government systems. This includes eagerness of foreign actors to find a way to get into U.S. systems, especially since they can easily make it look as if the attacks are from within the United States. Dan said that he’s probably not the first to discover these flaws since they are particularly easy to discover. He added that they are probably already being exploited now. “There were hosts which were discovered having serious technical misconfiguration problems that can be easily abused by an attacker outside or inside of the country, they could implicate the US as culprits in hacking attacks if they desire so,” Tentler told ZDNet. They have info

Raspberry pi: A pocket sized computer-Greatest invention in technology !

Image
RASPBERRY PI : A credit card-sized computer !! What is RASPBERRY PI..?? Raspberry pi, The latest invention in tech world, the pocket sized computer that has been exceptionally well in getting the appreciation from techies around the globe. This is the series of the credit card-sized Single-board computers, that are designed in United Kingdom by the RASPBERRY PI FOUNDATION to promote the teaching of basics of computer science in schools and in developing countries. Hardware used: Raspberry Pi : CPU architecture : ARMv6 CPU                        :  ARM11 700MHz GPU                        : Videocore IV CACHE                  : 1. Level 1 : 16kb 2. Level 2 : 128kb   Raspberry Pi 2 : CPU architecture : ARMv6 CPU                        : ARM Cortex A7 900MHz GPU                       : Videocore IV CACHE                  : Combined L2 cache :256Kb Raspberry Pi 3 : CPU architecture : ARMv6 CPU                        :  ARM Cortex A53 1.2GHz GPU                        : Videocore IV CACHE   

Check If Your Netgear Router is also Vulnerable to this Password Bypass Flaw

Image
Again bad news for consumers with Netgear routers: Netgear routers hit by another serious security vulnerability, but this time more than two dozens router models are affected. Security researchers from Trustwave are warning of a new authentication vulnerability in at least 31 models of Netgear models that potentially affects over one million Netgear customers. The new vulnerability, discovered by Trustwave's SpiderLabs researcher Simon Kenin, can allow remote hackers to obtain the admin password for the Netgear router through a flaw in the password recovery process.  Kenin discovered the flaw ( CVE-2017-5521 ) when he was trying to access the management page of his Netgear router but had forgotten its password. Exploiting the Bug to Take Full Access on Affected Routers So, the researcher started looking for ways to hack his own router and found a couple of exploits from 2014 that he leveraged to discover this flaw which allowed him to query routers and retrieve their login creden