Friday, March 27, 2015

Ubuntu 15.04 Beta 2 Released, Download Now

Ubuntu 15.04 Beta 2 Released, Download Now

After the release of Ubuntu MATE 15.04 Beta 2, Ubuntu 15.04 Final Beta, Ubuntu Kylin 15.04 Beta 2 and Kubuntu 15.04 Beta 2, its time to greet the final beta release of Ubuntu 15.04 (Vivid Vernet). Ubuntu 15.04 Beta 2 has been released and you can download it to test and use. This Ubuntu release is the second release in the Ubuntu 15.04 development cycle. This final beta release will be followed by the final Ubuntu 15.04 release on April 23. And before the final release, you will also get a pinch of a Release Candidate build on April 16.

New Features in Ubuntu 15.04 Beta 2:

It should be remembered that Ubuntu 15.04, codenamed Vivid Vervet is a maintenance release. This is very much similar to the 14.04 LTS release. There are small improvements and bug fixes here and there. The Ubuntu desktop shell Unity is now here with new improvements in this release cycle. The Dash, logout/shutdown dialog and HUD are now displayed properly over the full screen windows. A faster shutdown and startup should be experienced owing to the minor adjustments to the logout and login animations.

Ubuntu 15.04 final beta users will be welcomed by updated versions of Firefox web-browser, Rhythmbox music player and Thunderbird e-mail client as a part of the updated app set. nVidia has given Compiz window manager a fix to solve issues with Nvidia proprietary driver.


Bugs in Ubuntu 15.04 Beta 2 release:

However, there are two bugs in this beta release and they affect all flavors. These are expected to be addressed in the upcoming daily builds:

If you click “reboot now” button after installation, it will eject the installation media and won’t reboot. To deal with this issue, manually turn off they machine and boot it.

Apart from testing purposes, oem-config isn’t recommended to be used with the final beta release because, the OEM user won’t be removed at the final prepare-to-ship stage.
Download Ubuntu 15.04 Beta 2 here:

Download the Ubuntu 15.04 Beta 2 and Flavors from the links given below:



                                                    Ubuntu 15.04 Beta


                                             Ubuntu 15.04 MATE Beta 2


                                                 Kubuntu 15.04 Beta 2


                                              Ubuntu GNOME 15.04 Beta 2


Intel and Toshiba Make 3D SSD With 10TB Capacity at Lower Prices



The future solid state drives are going to be much richer in terms of storage capacity. SSDs have also suffered from the price factor which acts as a disadvantage for them. Intel and Micron have said that new solid state drives with storage capacity as large as 10 TB will be in the market next year. On the other hand Toshiba has separately developed same kind of “3D NAND” technology to support more data storage.

As a result, flash storage devices and SSDs will get cheaper and larger in capacity. Let’s know more about both companies’ inventions one by one:













Intel and Micron:Intel and Micron has unveiled new 3D NAND flash memory technology that will provide three timesmore storage capacity than existing NAND technologies. The new 3D NAND technology uses floating gate cells that make it the highest density flash device.

This tech enables a gum stick-sized SSDs with approx. 3.5 TB storage. The standard 2.5-inch SSDs will have more than 10TB capacity.

In this 3D NAND technology, data storage cells are stored vertically with extraordinary accuracy to create storage devices with 3 times more capacity. Intel and Micron used a floating gate cell design which is refined after years of research.


The BiCS uses 48-layer stacking process that improves reliability and speed. Toshiba was the company that invented flash memory and has the 15nm NAND cells which are the smallest in the world.

Right now company is gearing up for its mass production and giving out samples to the companies.

These new developments made by Micron and Intel, and Toshiba will take about one year to reach the market. These 3D SSDs will give a tough time to the existing players and will provide better speeds and more storage at cheaper rates to users.

Facebook is Currently Down For Many Users


Facebook has recently been down for many users. This happened with me 2 hours ago when I tried to login to my Facebook account. It showed me a message mentioning: “Facebook Will Be Back Soon”. First I thought it is down for all the users, but then I realized that it is down just for some of us. After some time, I was able to login, but that wasn’t the end of the story. An hour ago, I encountered the same problem again.

While performing login, Facebook is showing an error message that it is down for “required maintenance right now.” Also, “you should be able to get back on within a few minutes”, but still I am getting these messages on one of my facebook IDs which means that this problem is not completely solved. They haveprovided a link to see why users are getting these kind of messages.

TechCrunch has reported that people outside the U.S. using Facebook via desktop are facing errors. Also, there are some reports of people outside US facing login problem.


Thursday, March 26, 2015

10 Best Coupon Promo Codes Sites


10 Best Coupon Promo Codes Sites





Most of us whenever go for any online shopping, always prefer to look for some coupon or promo codes, which help us save a good amount of money. There are many sites out there, which provide these coupon codes but only few provides best deals. I have listed top 10 best coupon promo codes sites here.
10 Best Coupon Promo Codes Sites
1.The Krazy Coupon Lady: (USA)





This site has deal for anything you can buy online/on-mart. You can print coupons and use those at many stores.

2.Groupon: (International)





Groupon is an easy way to get huge discounts while discovering fun activities in your city. You can get deals for local products as well on other goods. If you are planning for some trip, then don’t forget to have a look on this site, you might get some very good deals. This site also offers chance to make money by selling their coupons codes.

3.Coupons: (USA)





All deals on this site is only available for US audience. This site is the most popular coupon site with thousands of coupons available for hundreds of stores. You can make money on this site by using their affiliate program.
4.Coupon Dunia: (India)





This coupon site is specially for Indians. This site is India’s best coupon site. Before you buy anything online or on-mart just have a look on this site. You might get a deal which can make you save even 50%. it helps you save money through its comprehensive listing of coupons, offers, deals & discounts. Whether it’s shopping from top online brands or eating at your favourite local restaurants, CouponDunia provides you multiple options for easy saving and smart shopping.

5.RetailMeNot: (International)





You can get a very good deal for any retail product on this site. This site has coupons for more than 50,000 stores. It has a database of 5,00,000+ coupons or promo codes for different types of products. Site provides coupons for countries UK, India, France, USA, Canada, Australia buyers.
6.Promotional Codes: (USA)





This site has 20,000+ promotional codes for over 5,000 stores. Average saving per coupon user of this site is around $35. It provides coupons for only USA buyers.
7.eBates: (International)





It offers coupon or promo codes to over 1,000 stores.


You can sort through coupons by store, category, or what kind of deal is being offered, like codes for free shipping, money off, and free gifts. All these coupons codes given you a good cash-back for every purchase you do. Cash-back can anywhere between 2 to 10%.
8.WebbyPlanet: (International)





It is great place to saving, incorporating 30,000 stores and over 1,50,000 coupon or promo codes. It offers coupons for countries UK, USA, Canada and Australia.


The website’s online discount shopping directory allows users to search and shop for items at discounted prices.
9.Coupon Chief: (International)




It is best site for both saving and making money by using coupon codes. You can participate in Pays-2-Share program by entering coupons, and even download a widget to add to your own website or blog. you’ll earn money every time someone uses your coupons. You can make 2% of purchase price by every sell which uses your coupon.
10.Savings: (International)




It’s tag line “Why Pay Full Price?” is best which suggest that you will get best deal here so no need to pay full price instead you can get a discount of even 50% by using coupon code. You can also make money by using its affiliate program.
If you any other best coupon sites then please share with other using comment section.

Outsourcing Sites For Home Based Job Seekers

There are many companies, which prefer employees on part-time(whenever there is requirement or work) than full-time jobs. These companies hire employees from third-party on a contract basis. The hiring of employees from third-party is called outsourcing.

There are many outsourcing sites which connect job seekers to paid employment. A company or individual can post a job on these outsourcing sites and members of outsourcing sites can apply for that job. Then, employer can decide whom to select for the job depending on his/her qualification.

There are many sites which offer outsourcing jobs, however only few are legit and popular among employers. I have listed these site here.
Outsourcing Sites For Home Based Job Seekers

Elance:



Elance is one of the oldest freelancer sites. Its concept is very simple; employerspost their job and afterwards bidders perform biding on that job. Employers after that select a job seeker based on biding price and his qualification. Here is a small snapshot of Elance’s performance:


Craigslist:



World’s largest classified site which allows for a massive range of freedom in posting for and finding talent. The biggest advantage of site is that you can find local employer or a local job on this site. There’s no “reputation” system for contractors, so most of the employers prefer local job seekers.
oDesk:




oDesk focuses on by-the-hour contracting rather than fixed-project pricing. They also strongly push the visibility aspect of the software, which allows you to “watch your contractors work” via remote screen-casting software and tracks hourly progress. So, if you are looking for some serious work then this site is for you. If you own a website then you can participate in their affiliate program also.

Mechanical Turk:



Mechanical Turk is a subsidiary of Amazon. If you are from USA then you can register on this site, it has stopped taking new members from other countries for now. Mturk members are called Turkers, these Turkers work on small tasks which are called hits and get paid once employer approve a task. For non-USA members there are few alternative sites of mechanical turk(mturk).

Freelancer:


As the name suggests, this site is for people who want to work as a part-timer. You can select a task from various categories and bid on it. Once you bid is selected by employers, you can start working on it. An employer has to pay few percentages of total payment before a freelancer starts working on a task. You can withdraw money using Paypal. If you want to know more about this site, then check my other post.

Guru:





This site is like other outsourcing sites. Just like other sites, employers can post a job and then freelancers can bid on that. This site also offers freelancers a chance to post about services they can provide. Here is an example of the same:

If you are not finding any job, which suits you, then try working on some small tasks online. These tasks might not fetch you hundreds of dollars, but it is good to earn some extra bucks while working whenever you have little free time.

p.s. If you’ve had success with outsourcing sites like these (or even if you haven’t), we’d love to hear about it in the comments.

Wednesday, March 25, 2015

Official iCloud Activation Lock Removal Service

Official iCloud Activation Lock Removal Service

You might be aware of the new tool, which was created by two hackers known by doulCi. The tool went viral quickly as it is a free and test-proven method to bypass iCloud activation and unlock the iPhone (please note we are not talking about network unlock). However, customers were facing issues as doulCi servers were offline most of the time.

So if you want a new and proven method, check out the solution being provided by Official iPhone Unlock. Unlock the doulCi servers, which were available for free,


Tuesday, March 24, 2015

Beware Of Worms Being Spread Through Social Media Networks

Facebook users don’t click the Ow.ly links posted anywhere on Facebook, if you have clicked the Ow.ly link (URL shortening service) then you might have gotten your computers infected by a worm.

The link is being spread by attackers through a post that promises one-of-its-kind of pornographic content. The post is being shared via numerous prominent social media networks such as Twitter and Facebook.After infecting the user’s computer it then posts the same link on the walls of all of the user’s contacts and groups.

As per senior security researcher at Malwarebytes Jerome Segura information the attack primarily targets Chrome and
“The goal [of this current attack] is to harvest as many users as possible to create a very large [botnet] consisting of social networks profiles which can be leveraged in various ways, [such as by] reselling Facebook friends and likes, reselling Twitter followers, [and] generating pay per click revenue by visiting sites and clicking ads”.

When a Facebook user clicks on the infamous Ow.ly link that promises “sex photos of teen girls in school,” it redirects immediately to an Amazon Web Services page and then gets redirected to a compromised Box website. Users are then prompted to download a file and when it is installed the system gets infected instantaneously leading to the download of the worm. It then spreads the Ow.ly link to all contacts of the user on Facebook.
Amazon Web Services (AWS) spokesperson in an official statement explained that the“activity being reported is not currently happening on AWS.”

Monday, March 23, 2015

How to make free International calls…just by installing any of the top 5 Apps on your device.



Currently we see lot of family and friends moving to foreign countries for better job prospects or business opportunities and sometimes even to pursue higher studies. Due to exorbitant bills levied on the international calls, people stop themselves from making such calls and speaking to their near and dear ones. The given below article will help us to know certain free services that are available to make the free International calls.

By using special software users can make free International phone calls anywhere by using the Free Internet phone programs. The free phone call applications basically can be categorized into 4 types:


PC to PC Internet calling: In this case the free Internet call is from one computer to another computer.

PC to Phone programs : This helps user to make a free call from computer to actual telephone located internationally though user may not have any telephone at all, this happens through internet.

App to App services: In this case the free Internet calling occurs between 2 smartphone devices and it can happen only if both the devices have the same application installed. This method cannot be used for land lines and also it does not work in cases where caller’s and the recipient’s smartphones do not have same application installed.

App to Phone software: In this case free Internet calls are made from apps in a smartphone to real number, user can make phone calls to any number be it land line or smartphone and even in cases the recipient’s smartphone is not having the app through which user is making the call.

Furthermore, to make a free call using an Internet phone, users might have to download free phone call software or use a soft phone which can be downloaded from an Internet phone provider website:


Google Voice:

Easiest way to make Internet phone calls and it supports free calls to actual phone number; PC to PC calls; PC to phone calls. Google Voice not only helps users to make free calls it also helps users to route any incoming international calls to the phone number provided by Google Voice thus to any phone which user has.

Hence with Google Voice user can get free SMSs, make a free conference call and also get free voice mail services. Free calls with Google Voice can be done only to Canada and US. Google Voice is available easily as smartphone app with Android. iOS, Blackberry and as web app for other smartphone devices. Free calls through Google Voice has been limited to 3 hours at a stretch however it allows user to repeatedly call the same number Users can visit here to download Google voice : https://support.google.com/chat/answer/3379791

Skype:

This is a very popular messaging service between desktops and smartphone devices. To create the contact with recipients it is essential for them to have a Skype account. If a user has a Skype account then they will be available in the Skype directory with user name or they can even be located in the directory using the email address or phone number. Once the contact has been located they can be added in the contact list and connected through Skype.

With Skype all the four types of applications for connections is possible i.e. PC to PC, app to PC, app to app, and PC to app. Skype works on smartphones that support Android, BlackBerry, iPhone, iPad, iPod touch, Kindle Fire HD, PlayStation Vita, and Windows Phone. Desktop versions are also available for Linux, Mac, and Windows. Along with the free Internet phone calls Skype also supports video calls and text messages to any other Skype users. Get connected to Skype through: http://www.skype.com/en/


Yahoo!Messenger:

With Yahoo!Messenger users can use their desktops as well as smartphones to make free Internet phone calls. The iOS and Android devices as well as Mac and Windows based desktops can download the Yahoo!Messenger for making the free Internet phone calls. Just as in Skype users can exchange Video calls, instant messages, and SMS texts with the International recipient’s using the Yahoo! Messenger. User can avail the service by downloading Yahoo!Messenger through : https://messenger.yahoo.com/


Facebook Messenger

Facebook Messenger, this service is provided by Facebook and user can send text messages, videos, images as well make free Internet phone calls using PC to PC and even App to App service. To make the free Internet phone calls it is essential for the caller and the recipient to be user of Facebook as well as they need to have the Facebook Messenger apps installed in their devices.

In case user is using a desktop then proper plugin must be installed and in case user is using smartphone device which has either Android or iOS or Windows then Facebook Messenger app needs to be installed. With Facebook Messenger users can make free International calls to either desktop or smartphones however calling land line is not possible. Android users can download the Facebook Messenger from : https://play.google.com/store/apps/details?id=com.facebook.orca&hl=en while Apple iPhone/iPad users can download it from https://itunes.apple.com/en/app/facebook-messenger/id454638411?mt=8c

BlackBerry Messenger (BBM):

BlackBerry Messenger (BBM) is a mobile application basically used for sending and receiving the text messages. This can also be used for make free Internet phone calls only to users who have installed the BBM app on their smartphone devices. The smartphone devices that support BBM app are Android, iPhone, iPod touch, iPad, and Windows Phone devices.

Blackberry users have BBM as their default app other OS users need to get this app installed. Here once the BBM app is installed it gives an unique PIN number to the user which can be used as the “username”. Using the PIN number other users / contacts can add themselves to the BBM list. Here Internet phone calls can be made only between the BBM app users and the call cannot be made to any land line though there is no restriction on the length of the call made. Smartphone users can get the BBM app downloaded from: http://www.bbm.com/bbm/en.html

Above mentioned are just a few of the applications which are always handy to the users and there are many more to this like the Viber, MagicJack and so on. However, the most common ones have been described for the benefit of the users.

Thursday, March 19, 2015

Sending or receiving money is now easier with Facebook messenger

“Sending and receiving payments is now made easy and more secure with a new feature in Facebook messenger”
Facebook has introduced a new feature today in its Messenger wherein user can send or receive money to their near and dear ones. This service is free, more secured and easy. The Messenger now features a $ sign on the keyboard which takes user directly to the payment page. User needs to follow the below instructions :
For Sending money:
  • Sender needs to start a message with a friend
  • Tap the $ icon and enter the amount which sender wants to send
  • Tap Pay in the top right and add sender’s debit card to send money
For Receiving money:
  • Receiver needs to open the conversation from the friend who is sending the money
  • Tap Add Card in the message and add receiver’s debit card to accept money for the first time


The money is transferred right away from the sender though it may take some time for the receiver to receive the same as per the normal banking regulations of 2-3 days. The first time user sends or receives money in Messenger, user will need to add a Visa or Master Card Debit card issued by a US bank to user’s account as per the instructions. Once the debit card details are added, user can create a PIN to provide additional security the next time user sends the money. On iOS devices user can also enable Touch ID. As always, user can always add another layer of authentication to user’s account at any time. According to Facebook product manager Steve Davis: “If the recipient does not have a card attached to his or her account, Facebook will hold the money until they have set one up.” However Davis said that the Facebook will not charge anything for the transaction and it is totally free of cost.

Facebook has been processing more than a million transactions per day for game players and advertisers since 2007 and all these transactions have been under secured network; hence Facebook ensures a trusted and secured network for the payments. As per Facebook they will be using secure systems to encrypt the connection between the sender and receiver. Facebook also says that the card information would be secured as they will be using multiple layers of software and hardware protection to maintain the highest standards of security. Also the payment transactions will be placed in a secured environment which would be separate from the Facebook’s general network and this payment section would receive additional monitoring and control from specialized team. Furthermore, a special team of anti-fraud specialists would be given the task of monitoring for any suspicious monetary transactions which would further ensure the safety of the accounts.

U.S. will witness the roll out of Facebook Messenger’s new payment feature across Android, iOS and desktops in the coming months. Facebook would now truly connect friends and family not only to share the photos and videos and jokes but also in the moments of troubles and joy by exchange of payments!!

$120 IP-Box can be used to hack iPhones and iPads with brute force



iPhones and iPads vulnerable to brute force attack using £120 IP-Box freely available online

You can crack any 4 digit pin code on iPhone and iPad even when they have enabled the anti brute force attack ‘attempts limiter’ option with IP-Box according to British security consultancy company MDSec.

MDSec which has been testing the hardware called “IP-Box iPhone Password Unlock Tool” says the hardware is freely available online on sites such as fotofunshop and needs to be sued with a adapter also available on fotofunshop, to crack any pin code on iPhone and iPad even if they are running on iOS 8.1.

The IP-Box cracks any 4 digit iPhone/iPad pin code by exploiting a known vulnerability ‘CVE-2014-4451′ in Apple’s operating system upto version 8.1. Apple has patched this vulnerability in its iOS 8.1.1 which it released in November 2014, but MDSec says that millions of iPhone/iPad users have still not updated their smartphones and pads making them vulnerable to IP-Box brute force attack.

MDSec on its blogs states that IP-Box uses simple technique “that it simulates the PIN entry over the USB connection and sequentially brute forces every possible PIN combination”.

What makes IP-Box more unique is that it works even after the iPhone/iPad user enables the attempt limiter option with “Erase data after 10 attempts” option turned on.

The company successfully tested the device on an iPhone 5s running iOS 8.1 and has stated that it will be testing the IP-Box on iOS 8.2 in coming days.

The IP Box works by bypassing the attempt limiter measure and connecting directly to the iPhone/iPad’s power source and “aggressively cutting the power after each failed PIN attempt, but before the attempt has been synchronised to flash memory”.

According to MDSec, the way the iPhone/iPad works each attempt could take upto 40 seconds which means that the potential hacker can crack any four digit code in as long as 111 hours which it says is longer than Apple advertised time of between “6 seconds and 17 hours”.

You can see the PoC video posted by MDSec below :https://youtu.be/meEyYFlSahk

As said above, Apple has fixed the vulnerability detailed in CVE-2014-4451 but many users are still to update their iPhone/iPad/iPod to it, further, many models such as iPhone 4 and the original iPad dont allow updating to the latest OS can be exploited with IP-Box easily.

Apple is yet to come out with the statement regarding IP-Box.

Facebook Vulnerability Leaks Users' Private Photos

If you have enabled automatic Facebook Photo Sync feature on your iPhone, iPad or Android devices, thenBeware! Hackers can steal your personal photographs without your knowledge.

In 2012, the social network giant introduced Facebook Photo Sync feature for iPhone, iPad and Android devices which, if opt-in, allows Facebook to automatically sync all your photos saved on your mobile device with your Facebook account.

The photos that you have synced from your phone are automatically uploaded in the background to a private Facebook album, which is not visible to any of your Facebook friends or other Facebook users. However, you may can choose then to share photos from the album on your Facebook timeline or send them as a message to a friend.

A bug bounty hunter, Laxman Muthiyah, discovered a critical flaw in the Facebook Photo Sync feature and Facebook API that could allow any third-party app to access your personal photos from the hidden Facebook Photo Sync album.

It's something that reminds me of "The Fappenings" and "The Snappening" -- in which nude and personal photographs of top celebrities were leaked due to a security flaw in Apple's iCloud file storage service and unofficial Snapchat messaging service app, respectively.

In a blog post published today, Laxman explained that the vulnerability resides in the privilege mechanism that which applications are allowed to access sync photos using vaultimages API.

"The vulnerable part is, it just checks the owner of the access token and not the application which is making the request. So it allows any application with user_photos permission to read your mobile photos," Laxman wrote in a blog post.
Technically, Synced private photo album should be accessible by only Facebook's official app, but the vulnerability allows any 3rd party apps to get permission to read your personal synced photos.:https://www.youtube.com/watch?v=uChTQb5T-uQ

Laxman previously disclosed a vulnerability in Facebook Graph API mechanism that allowed him to delete any photo album on Facebook owned by any user, any page or any group.
HOW TO DISABLE AUTO-SYNC
Though, Facebook has patched the vulnerability reported by Laxman and rewarded him with $10,000 under it’s bug bounty program, Facebook users are advised to turn off Facebook Photo Sync feature just to be on the safer side.


In order to do so, just go to Facebook mobile app menu, scroll down and select Account > App Settings > Sync Photos, then Choose 'Don't sync my photos.'

Meet 'Cartero' - A Simple Mailing Phishing Framework.

Cartero


Description

A simple Phishing Framework Library with a CLI tool. The project was born out of necessity on projects. Even though there are many projects out there, we were not able to find a suitable solution that gave us both easy of use and customizability.

Cartero is a modular project divided into commands that perform independent tasks (i.e. Mailer, Cloner, Listener, AdminConsole, etc...). In addition each sub-command has options.

For example, if we wanted to clone gmail.com, we simply have to perform the following commands. Download

❯❯❯ ./cartero Cloner --url https://gmail.com --path /tmp --webserver gmail_com
❯❯❯ ./cartero Listener --webserver /tmp/gmail_com -p 80
Launching mongodb
Puma starting in single mode...
* Version 2.8.2 (ruby 2.1.1-p76), codename: Sir Edmund Percival Hillary
* Min threads: 4, max threads: 16
* Environment: production
* Listening on tcp://0.0.0.0:80
Use Ctrl-C to stop

Beware of Skimming Devices Installed on the ATM Vestibule Doors

Despite anti-skimmer ATM Lobby access control system available in the market, we have seen a number of incidents in recent years where criminals used card skimmers at ATM doors.


Few years back, cyber criminals started using card skimmers on the door of the ATM vestibule, where customers have to slide their credit or debit cards to gain access to the ATM.

The typical ATM Skimming devices are used by fraudsters capture both magnetic stripe data contained on the back of a debit or credit card as well as the PIN number that is entered by the customer when using the ATM.

In recent case discussed by Brian, cyber criminal installed the card skimming device on the ATM Lobby Card Access Control and a pinhole hidden camera pointed at the ATM's keyboard. Basically, it's an ATM skimmer that requires no modification to the ATM.

The card skimmer hidden on the ATM door records the debit and credit card information, and the pinhole camera records the PIN number the victim enters. Using this information, a thief can easily run you out of cash in a matter of minutes.


PROTECT YOURSELF FROM CARD SKIMMERS
The easiest way to protect yourself is simply to cover the keypad with your other hand when you enter your PIN or simply use a different card (any gift card or store card with a magnetic stripe) to open the lobby doors. Also, if keyboard of the ATM looks different, do not use that ATM.


If you think your password or PIN has been compromised, change it immediately. Make sure to check your financial reports regularly and for any strange activity and in case of unusual patterns of transactions, inform your bank immediately.

NEXT GENERATION CARDLESS ATMs
To ensure users secure transaction over ATM, a Canadian bank have come forward to adopt and launch the U.S.'s biggest cardless ATM network that allows its customers to withdraw cash within seconds without the need of any debit or credit cards, but only their smartphones.

BMO Harris Bank says there is no need to enter PIN and instead of swiping the card, customers have to sign into mobile banking app "Mobile Cash", hold their smartphones over the QR code on the ATM screen and the cash gets delivered.

Tuesday, March 17, 2015

OuterNet : Free Internet to Everbody,Anywhere, Anytime Via “Lantern”



You may find it hard to believe, but a US based
company Outernet is aiming for providing free
Wi-Fi to every person on earth using low-orbit
earth satellites. Outernet, also calling
themselves as Humanity’s Public Library, is a
global broadcast data startup currently being
incubated by the Media Development
Investment Fund (MDIF), a United States-based
impact investment fund and non-profit
organization established in 1995 by Saša
Vučinić and Stuart Auerbach.
They recently began providing free Wi-Fi to 1.3
billion people across North America, Europe
and most of the Middle East. They have
covered regions of Asia Pacific by end of 2014
and by June 2015 the company aims to provide
free internet to everybody across the globe.
Currently, it is  providing 200 MB of data per
day through its high-speed signals, but soon it
would be upgraded to 1 GB. The company is
eying on providing 100 GB of data per day to
users across the globe.

Friday, March 13, 2015

Top 5 Tricks that will help you in reducing battery consumption on Android smartphones and tablets

Top 5 Tricks that will help Android smartphone and tablet users in reducing battery drainage and save battery life

Android phones are currently the most widely used smartphones but all users face a unique problem. The battery drains too quickly for comfort. Especially when you go for a long ride, your phone battery goes dead without even using it many times. The battery draining also leads to a very short life cycle for the battery itself.

Android devices are known to be battery guzzlers and occasionally suffer a bad rap for short battery life. Even if you stick to default Android settings, the phone battery, with no abuse by the owner, suddenly drains for no apparent reason.

As a user, you aren’t doing anything differently when it strikes, so it’s unexpected and quite frustrating. This can have serious consequences, especially for workers needing to stay in touch with the office or you need to be in contact with someone over health issues.

So here are some tips which will help you in saving your battery life on an Android device.

Less Apps Means Less Battery Consumption

The first and foremost tip is to use lesser no of apps. The lower the number of apps installed on your Android device, the more battery you can dig out from it. This is probably the best way to save a lot of battery life. Dump all unnecessary apps that you had installed but never used them again, remove them ASAP. This will help you in saving almost 50% of your device battery as maximum battery is used by unnecessarily installed apps.

Disable GPS after its use
GPS is a huge battery guzzling app, as it harnesses data from the phone’s GPS chip, cell phone towers, and Wi-Fi hotspots to find your location. The more a phone surveys your location, the more battery it uses. And that goes beyond just Google Maps.

Location reporting and location history are two GPS-based services with somewhat unclear motives. According to a Google Help page, the services can be used in conjunction with any other Google Apps, and may be used to improve your experience. GPS is a good tool but it has major impact on battery life. So use it only when you absolutely need it.

Reduce your Cloud access usageThe Cloud is everywhere. It handles our backups, it syncs our documents, and it delivers us news, entertainment and information. It also requires lots of bandwidth and makes our devices go the extra mile when everything we own data-wise resides in the cloud.

Everyone love to use the cloud storage, but it can chew up battery life drastically. Even if you are a cloud user, you have some options to save on battery life. You can set it to sync only while your Android is using Wi-Fi but another good option is to store all files locally if you can so you can reduce the amount of back-and-forth needed by pulling data down from the cloud.
Use of Battery Saving Apps
There are certain Android apps such as DU Battery Saver, which will help you to manage your battery consumption and thus extend your device’s battery life. These battery saving apps have profiles or modes in which that they can toggle Wi-Fi, GPS, Mobile data, Sync etc. They automatically turn on and off such things that drains battery. You can easily find these battery saving apps on Play Store.

Use a dark colour background
In the Smartphone market, the majority of displays are either AMOLED or LCD, however not many people know that the wallpaper colour you choose can actually make a difference to your smartphone battery life.

Pure black wallpaper or a dark-colour background in general, can actually save you a significant amount of battery life. LEDs require less current when less brightly lit and black pixels are just LEDs that are turned off, therefore requiring no power at all. LCD displays, on the other hand, use a backlight that is on even when displaying black pixels. Instead the light filter blocks light coming from the backlight, but power is still being consumed.
Ergo, AMOLED is more energy efficient that LCD when displaying blacks.
Conclusion
Battery life is one of the big things that we look out for while examining a device when we buy. Yet, we should never fall into the false trap of a limitless supply of Android battery power, since no battery is developed so far which can provide limitless power. If we consider those limits, and adjust our usage habits accordingly, we just might be able to squeeze more power out of our battery packs.

AN ESSENTIAL GUIDE TO BECOMING AN ETHICAL HACKER

AN ESSENTIAL GUIDE TO BECOMING AN ETHICAL HACKER


I often get a number of people ask for guidance about how they can become an ethical hacker. I also receive even more requests about how to become a black hat hacker. The latter requests are ignored. below is a definition of an ethical hacker

Ethical hacker

noun
  1. a person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent
So if you want to be an ethical hacker the truth is there is no easy method to become a skilled hacker…… it’s easy to be a script kiddie and load up Armitage or Fast-track and fire every exploit known to man at a target. But what’s the point at firing Linux exploits at a Windows box!


.You need essential prerequisite knowledge
If you want to get into the IT security world as a white hat you must be competent in the following areas:
  • Networking
  • Programming
  • Databases
Once you have a fairly good knowledge of the above points THEN it would a good idea to learn about hacking. So now you have a good understanding of the fundamentals of IT, you can now understand how to break some of the underlying vulnerabilities within computer architecture. The following activities should help you with this:

What areas to concentrate on in order to build a foundation
Networking – Cisco courses seem to be really good. I undertook all the CCNA courses available.
Programming – Focus on learning C++, Python/Ruby and PHP.
Databases – Play around with MySQL and MSSQL and make your own database to understand how it works.


Read books about hacking (Here are some good examples of some) -

  • Hacking: The Art of Exploitation, 2nd Edition
  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
  • Metasploit: The Penetration Tester’s Guide
  • BackTrack 5 Wireless Penetration Testing Beginner’s Guide
  • CEH Certified Ethical Hacker All-in-One Exam Guide
  • Google Hacking for Penetration Testers
  • The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws
Undertake various online courses
  • CEH
  • OSCP
  • CISSP

Communicate and follow other fellow IT security enthusiasts through the following mediums
  • Facebook (https://www.facebook.com/pages/Hacking-News-Tutorials/252350961471136 )
  • Google+
  • Twitter

Self learn by reading and watching online tutorials
  • www.securitytube.net
  • youtube.com

Download practice environments to practice and hone newly learned skills
  • DVWA (Dam Vulnerable Web Application)
  • Metasploitable
  • Samurai WTF
Final note: Hacking is something that takes A LOT of your time!, be prepared to sacrifice friendships, relationships and that awesome social life you used to have! ;)

Thursday, March 12, 2015

This 'Killer USB' can make your Computer explode








Can Hackers turn a remote computer into a bomb and explode it to kill someone, just like they do in hacker movies? Wait, wait! Before answering that, Let me tell you an interesting story about Killer USB drive:

A man walking in the subway stole a USB flash drive from the outer pocket of someone else's bag. The pendrive had "128" written on it. After coming home, he inserted the pendrive into his laptop and instead discovering any useful data, he burnt half of his laptop down. The man then took out the USB pendrive, replaced the text "128" with "129" and put it in the outer pocket of his bag… Amen!

I’m sure, you would really not imagine yourself being the 130th victim of this Killer perdrive, neither I.

This above story was told to a Russian researcher, nicknamed Dark Purple, who found the concept very interesting and developed his own computer-frying USB Killer pendrive.

He is working with electronic manufacturing company from where he ordered some circuit boards from China for creating his own USB killer stick.


"When we connect it up to the USB port, an inverting DC/DC converter runs and charges capacitors to -110V," the researcher explained. "When the voltage is reached, the DC/DC is switched off. At the same time, the field transistor opens."

At last, he successfully developed a well functioning USB killer pendrive which is able to effectively destroy sensitive components of a computer when plugged-in.
"It is used to apply the -110V to signal lines of the USB interface. When the voltage on capacitors increases to -7V, the transistor closes and the DC/DC starts. The loop runs till everything possible is broken down. Those familiar with the electronics have already guessed why we use negative voltage here."
It is not possible for hardware to prevent all damage to physical systems in some scenarios. It may be possible for an attacker to exploit SCADA vulnerabilities and remove safety controls used by power plants or put it into an unstable state.

Stuxnet worm is one of the real example of such cyber attacks, which was designed to destroy centrifuges at the Nuclear facility and all this started from a USB drive.
Also in 2014, a security firm demonstrated an attack on Apple’s Mac computer by overriding temperature controls, which can actually set the machine on fire.


So if we say that a computer could be converted into a bomb, then of course it’s true, a hacker can probably make your computer explode as well.


Therefore, next time when you find an unknown USB flash drive, just beware before inserting it into your laptop. Because this time it will not fire up your important files or data stored on your laptop like what malwares do, instead it will fire up your Laptop.

Monday, March 2, 2015

$3 MILLION REWARD FOR ARRESTING A RUSSIAN HACKER – FBI



The US State Department and the Federal Bureau of Investigation has offered a $3m (£1.94m) reward for information on a Russian hacker Evgeniy Mikhailovich Bogachev, one of the most wanted hacking suspects.This is the highest reward offered by the US authorities in a cybercrime case.

Bogachev, whom FBI agents describe as “brilliant,” is believed to be living openly in the Russian beach town of Anapa, on the Black Sea east of Crimea. He is known to sail his yacht between resorts, the bureau said.The FBI distributed “Wanted” posters around the world showing Bogachev leaning back in a striped polo shirt, smiling, with his head shaved.




Evgeniy Mikhailovich Bogachev, also known under the aliases “lucky12345,” “Slavik,” and “Pollingsoon,” was the mastermind behind the GameOver Zeus botnet, which was allegedly used by cybercriminals to infect more than 1 Million computers and resulted in more than $100 Million in losses since 2011.

The authorities charged Bogachev with conspiracy, computer hacking, wire fraud, bank fraud and money laundering under a 14-count indictment last year.


“We are turning to the world again for assistance in locating Bogachev,” said FBI assistant director Joseph Demarest. “While he is known to reside in Russia, he may travel. With this $3 million reward incentive, someone, somewhere may see him and let the authorities know his whereabouts.”


Uber, a private international transport company headquartered at San Francisco, announced on Friday that the company had suffered a massive data breach.The company said that their website was accessed by an unauthorized third party and sensitive data of about 50,000 drivers were stolen.

It develops, markets and operates the mobile-app-based transportation network also called Uber. The Uber app allows consumers to submit a trip request, which is routed to crowd-sourced taxi drivers.The service is available in 53 countries and more than 200 cities worldwide

Uber takes seriously our responsibility to safeguard personal information, and we are sorry for any inconvenience this incident may cause. In addition, today we filed a lawsuit that will enable us to gather information to help identify and prosecute this unauthorized third party,the company told.

The Uber’s Managing,Katherine Tassi Counsel of Data Privacy said that:
Uber has notified the impacted drivers and is providing a free one-year membership of Experian’s® ProtectMyID® Alert. They have also filed a lawsuit to identify the third-party perpetrator.

Adblock is enabled

We have detected that you are using adblock on your web browser. Please disable adblock or simply disable your ad blocker only on 'CodingCrazy.com' and reload this page to hide this.
Thanks.

No popup. We promise!