Posts

Anonymous Shares Simple Guide On “How To Hack Donald Trump’s Smartphone”

The notorious hacking group Anonymous has shared a little guide on Twitter, telling how to hack Donald Trump’s Android smartphone. The guide mentions that Trump’s Samsung Galaxy S3, which run Android 4.4, is outdated. It makes Galaxy S3 easily hackable using techniques like Stagefright. Notably, many security researchers have also pointed out this loophole in the past. one of the major factors in the recent US presidential elections were the email leaks of Hillary Clinton’s campaign manager John Podesta, which signaled the weak cyber security measures. Now, Donald Trump is himself a target of popular hacktivist group Anonymous. Anonymous doesn’t have much affection for the United States President Donald Trump. Given the absurd policies of Trump, this stance shouldn’t surprise anyone. The hackers have published a little guide on Twitter, telling how to hack Donald Trump’s smartphone. The notorious group claims that the President is an easy target to hacking attacks. Wondering why? Becau...

How to Prevent Someone From Using Your Firefox Browser

Image
Privacy is a big problem in this age of information technology. In most of the cases, you don’t want someone else to know what we are doing (or we have done) with your personal devices. There are many things you can do to prevent someone else from tracking your behavior on your devices. If it is impossible to lock your device, why not lock a specific app and prevent someone else from using it. Here we do the same with Firefox. By default, Firefox comes with a number lists of security. But, there is no chance to us for protecting it with a password. Thankfully, there are some add-ons that we can use to do that. This article will show you how to protect your Firefox with password using Master Password+ add-on. In this article, I use Firefox 50.1.0 running on Ubuntu 16.04. Step one: Installing the Master Password+ add-on Click on the three-line menu icon on the top right of your Firefox and choose Add-ons. Type “master password” on the search bar and hit enter. Install “Master Passw...

How to Enable Two-Step Verification On WhatsApp

Image
Facebook-owned WhatsApp is the latest in the list of services to add support for two-step verification. The new two-step verification is optional but your WhatsApp account is probably the one you want to secure first. The company assures that once two-step verification enabled, any attempt to verify phone number on WhatsApp will require the six-digit passcode that is created by the user. To set up two-step verification for WhatsApp, you need to take the following steps: Open WhatsApp Go to Settings Go to Account Look for Two-step verification Tap on Enable On the next screen, enter six-digit passcode. Next, re-enter six-digit passcode. Optionally, add your email address on the next screen. In the last step – optional, as mentioned – WhatsApp asks for an email address to link with your account. This email address will let WhatsApp to send a link via email to disable two-step verification in case user forgets the six-digit passcode. Remember that in case you user ...

Histroy of Hacking you should know

[embeddoc url="http://techworldblog.in/doc/hacking_history.pptx" download="all" viewer="microsoft"] Histroy of Hacking After reading this article you guys are going to get the answer of Hackers - innovative or immoral ??? Hackers have always fascinated the public. Films books, and video games have all attempted to explore the hacker psyche - but just who are these mysterious figures ?? Take a look at this timeline of hacking history, from the phone phreaking to corporate theft. 1960s : Hacking begins in the 60s at MIT.

Google launches root certificate authority

In an effort to expand its certificate authority capabilities and build the "foundation of a more secure web," Google has finally launched its root certificate authority. In past few years, we have seen Google taking many steps to show its strong support for sites using HTTPS, like: Giving more preference to HTTPS websites in its search rankings than others.   Warning users that all HTTP pages are not secure. Starting an industry-wide initiative, Certificate Transparency − an open framework to log, audit, and monitor certificates that CAs have issued. However, Google has been relying on an intermediate Certificate Authority (Google Internet Authority G2 - GIAG2) issued by a third party, with the latest suppliers being GlobalSign and GeoTrust, which manages and deploys certificates to Google's products and services. Google announced Thursday the creation of its own certified, and independent Root Certificate Authority called Google Trust Services , allowing the compa...

Police Arrest 5 Cyber Thieves Who Stole 3.2 Million From ATMs

Law enforcement authorities from Europe and Russia have arrested five members of an international cyber criminal gang for stealing $3.2 million cash from ATMs using malware. Three of the suspects, Andrejs Peregudovs (41), of Latvia, Niklae Penkov (34) of Moldova, and Mihail Colibaba (30) of Romania, were arrested in Taiwan by the Taiwanese Criminal Investigation Bureau last summer, have already been sentenced to 5 years in prison for their role in a massive ATM heist operation, involving 22 individuals from 6 countries. The European-based cyber criminal gang used a variety of different hacking techniques to infect ATMs with malware and force them to dispense cash. According to Europol that began its investigation in early 2016, the gang used spear-phishing emails containing malicious attachments to target bank employees and penetrate the bank's internal networks. From there, the cyber crooks then located and hacked into the network of ATMs from the inside, and used a malicious so...

How Your Android’s Pattern Lock Can Be Cracked In Just 5 Attempts

A few days ago, Fossbytes wrote about the list of the most popular (dumbest) passwords of 2016. You might be wise enough to consider a tough password for your devices and online accounts. But if you think that pattern lock is more secure than common passwords, your thinking will change after reading this story. According to a new research published on Phys.org , it possible to crack a smartphone’s pattern lock in around five attempts, after which the device gets locked. It is possible by recording a video of people entering pattern lock on their phone. The story isn’t as childish as it sounds. You’re not supposed to decipher the pattern from the video afterward. But a computer vision algorithm developed by the researchers – from Lancaster University, Northwest University of China, and the University of Bath – is assigned to do this task. The algorithm can work with an accuracy of more than 80 percent for complex patterns and crack them in 5 attempts. In fact, they were able to crack si...