Monday, February 16, 2015


Now its easy to find whether the used iPhone you’re buying is stolen or not. iPhone has been an popular target by the thieves which cost more than hundreds of dollars.

Apple attempted to address this issue with the Find My iPhone service in 2010, but that could be defeated by turning the iPhone off or erasing the contents of the phone. Apple made things much harder on thieves when it introduced Activation Lock in iOS 7. This feature made it impossible to activate an iPhone using a new Apple ID without entering the Apple ID and password used to activate the phone originally. Since it’s unlikely that a thief would have access to a person’s Apple ID and password, this helped cut iPhone theft substantially.

But now Apple has created a tool to check a phone’s Activation Lock status to ensure that you’re not buying a stolen device and that the phone you’re getting can be activated.


In order to check a phone’s status, you’ll need to have its IMEI (International Mobile Station Equipment Identity; basically a unique identifier assigned to every phone) or Serial Number.
  • Tap the Settings app
  • Tap General
  • Tap About
Scroll towards the bottom of the screen and you’ll find both numbers

Once you’ve got one or two of those numbers:

  • Go to Apple’s Activation Lock Status website
  • Type the IMEI or Serial Number into the box
  • Enter the CAPTCHA code displayed
  • Click Continue.

The next screen will show you whether the iPhone has its Activation Lock feature enabled.If Activation Lock is turned off, you’re in the clear. If Activation Lock is on, though, a couple of things may be going on:

The Phone Is Stolen—An iPhone being sold with Activation Lock still enabled could mean that the device is stolen since a thief probably won’t be able to disable Activation Lock. Ask the seller to disable the feature and check again. If they refuse or can’t do it, don’t buy that phone.

The Seller Forgot to Turn Off Activation Lock—It’s possible that an honest seller has forgotten to turn off Activation Lock. Ask them to disable the feature. If they do, you’re OK to buy.

Note : When buying a used iPhone, make sure to ask for the IMEI or Serial Number before you buy and use this tool to check the device’s status. It will save you money and frustration.


This tool isn’t connected to any police systems, so it doesn’t cross-reference police reports of stolen devices.
Since Activation Lock was introduced in iOS 7, if the device you’re buying is running iOS 6 or lower the tool can’t help you.
While pretty unlikely, it’s technically possible that a thief could have access to the Apple ID and password associated with the stolen phone they’re selling. In that case, the thief can remove Activation Lock and sell a stolen phone without the tool being able to help you.


According to New York Times reports reported on Saturday, hackers have stolen as much as $1 Billion from more than 100 banks and other financial companies in almost 30 nations, making it the most sophisticated attack the world has seen to date.

An investigation by Kaspersky Lab, a Russian cybersecurity firm, confirmed that it was not the bank’s problem rather the bank’s internal computers had been breached by malware that recorded every move of the bank employees. The malicious malware breached the banks’ system for months, tracking the working process of the employees, sending back video feeds to hackers.
Add caption

In order to infect bank staffs, the hacker group sent malicious emails to hundreds of employees at different banks. Once open, the email downloads a malware program called Carbanak, that allegedly allowed perpetrators to transfer money from the banks to fake accounts or ATMs monitored by criminals. The attackers then set up fake accounts in the United States and China to collect the transferred cash. Two of the banks with fake accounts were J.P. Morgan Chase and the Agricultural Bank of China.

The exact figure of the stolen amount is unclear, though, according to the cybersecurity firm, the total theft could be more than $300 Million. Because, the hackers only swiped $10 million at a time and some banks were targeted more than once.


On 14th February 2015,the valentines day were people were busy with their loved ones; the ISIS Hackers hacked UAE’ Oldest Newspaper Al Ittihad. They also defaced Al Ittihad website with logo of their own including a black flag with Arabic text and three militants dressed in soldiers’ attire holding rifles.

Later the Abu Dhabi based editor-in-chief of Al Ittihad newspaper, Mohammed Al Hammadi, claimed that ISIS hackers defaced the site ( but failed to steal any information from our servers.However they just defaced the site to threat the people of the region he added.Service on the website resumed after a few hours.Service on the website resumed after a few hours.

The first female pilot in the United Arab Emirates, Major Mariam al Mansouri, known for taking part in airstrikes against the ISIS terrorist group.Knowing about this the ISIS uploaded a photograph of her.

However this is not the first attack,recently on Feb 10 2015 Newsweek’s official Twitter account has been compromised by the ISIS hackers.


The most popular Chinese Bitcoin exchange BTER has been recently hacked on Feb 14 2015 and have lost more than £1.1 Million-worth ($1.75 Million; one BTC is about $270) of the digital currency.However no details hasn’t revealed about the suspects who hacked it.

“All wallets have been shut down and withdrawals of unaffected coins will be arranged later,” the official website of BTER Bitcoin exchange states.

Internet sleuths are already on the hunt to trace the missing Bitcoin. Because of the way the digital currency works, it is possible to trace any transaction or funds easily by using public available service, called “blockchain”.The bitcoins appear to have been split into a number of separate wallets since the alleged intrusion.

According to the announcement, the stolen Bitcoin cryptocurrencies were broadcast through the transaction given below:

The Bitcoin Exchange has also not revealed, how the cold wallets were compromised, except that 7,170 Bitcoin cryptocurrency was stolen from the company’s cold wallets. Cold wallets are a way of storing the digital currency offline.The BTER Bitcoin Exchange is now offering a bounty of 720 BTC – roughly $170,000 – to whoever can retrieve the stolen currency back

This is the second major Bitcoin hack in past two months. Bitstamp based in UK was hacked at the beginning of this new year.

Tuesday, February 10, 2015

Researcher Publishes 10 Million Usernames and Passwords from Data Breaches

A security researcher has publicly released a set of 10 Million usernames and passwords, which he collected from multiple data breaches over the last decade for the purpose of his research.

These 10 million usernames and passwords are collective of leaked database dumps those were already available publicly on the Internet. However, Mark Burnett, a well-known security consultant who has developed a specialty collecting and researching passwords leaked online, marked his decision to publish the password dump as legally risky, but necessary to help security researchers.

The researcher says the released set of passwords and usernames is like a sample data, which is important for other researchers to analyze and provide great insight into user behavior and is valuable for encouraging password security.

Also, the researcher was frequently receiving lots of requests from students and other security researchers to submit a copy of his password research data for their own analysis.
At the time, he typically decline to share the passwords because he was worried that if he do so, it might harm him legally given the recent five-year sentence handed to former Anonymous activist and journalist Barrett Brown, for sharing the hyperlink to an IRC (Internet Relay Chat) channel where Anonymous members were distributing stolen information from the hack.

However, at the same time, Burnett wanted to share his password research data with the world in order to study the way people choose pass phrases.
Burnett has collected the data from major data breaches at big companies including Adobe Data Breach and Stratfor hack, all of which have already been publicly available over the Internet, which could be easily found through Web searches.

According to the researcher, most of the leaked passwords were "dead," meaning they had been changed already, and he has scrubbed other information such as domain names to make it unusable for cyber criminals and malicious hackers. However, usernames or passwords found on the list that are still in use should be changed immediately.

Burnett also explains the fact that he is not supposed to be arrested by the law enforcement agencies.

In a quick Interview on an email chat, I personally asked Mark few questions about exposing usernames/passwords publicly, and his answers are as follows:

Q: Could exposing the passwords publicly cause any threat to Online users?
A: As I said, "If a hacker needs this list to hack someone, they probably aren't much of a threat." It is important to note that I didn't leak these passwords, they are already out there.

Q: Have any Law enforcement agencies approached you yet?

A: Not yet, but its still early.

Q: Are these Usernames/Passwords include data from Adobe and 

LinkedIn breaches?
A: I only included breaches where there was both a username and password so that I could combine data from multiple sites. This would exclude LinkedIn and a few others. I also did not release any passwords that were not already available publicly unencrypted so that would exclude Adobe. Other than that it includes a bit of everything.

Q: Is there any strong reason behind sharing passwords publicly?

A: The primary purpose is to get good, clean, and consistent data out in the world so others can find new ways to explore and gain knowledge from it. I am frequently asked for my data but I have always been hesitant to share it due to privacy issues. While not perfect, this is a consistent data set we can all use to help further security.


"Although researchers typically only release passwords, I am releasing usernames with the passwords. Analysis of usernames with passwords is an area that has been greatly neglected and can provide as much insight as studying passwords alone," Burnett wrote.

"Most researchers are afraid to publish usernames and passwords together because combined they become an authentication feature. If simply linking to already released authentication features in a private IRC channel was considered trafficking, surely the FBI would consider releasing the actual data to the public a crime."

Almost 10 million passwords released by the researcher, for instance, could help other researchers to determine how often users include all or part of their usernames in their passwords. However, 10 Million is a very big number, but Burnett defended that all of the leaked data was already available online

Facebook Launches App and Free Access to 38 Websites in India

What is is Facebook’s project which aims at providing basic mobile services for free to the users. does this by partnering with the telecom industry partners. Last year when Facebook hosted the first Summit in Indian capital New Delhi, people were expecting the launch of the service in India pretty soon.

Today, Indian telecom provider Reliance Communications and Facebook has made the free internet available to the billion-plus population of India with the launch of the free basic internet services and app. At last year’s summit, Facebook launched a $1 million fund committed to making apps for India.

Till now this service was available to few African nations and Columbia, and the launch of in India is certainly the biggest step for this non-profit organization.

The free internet service will be available to Reliance customers in six Indian states: Tamil Nadu, Gujarat, Kerala, Maharashtra, Andhra Pradesh and Telangana. These services will be available in English, Hindi and five other local languages: Tamil, Gujarati, Malayalam, Marathi and Telugu.

How to get free internet via

Free internet can be accessed by Reliance countries in above states by following ways.

- You can download the Android app.

- You can access the free internet on Opera Mini browser or UC Browser’s home screen.

The free services being provided to the users will cover a vast variety of about three dozen services with topics like news, travel, jobs, sports, communication, government information etc.

The full list of services is below:
Aaj Tak
AP Speaks
BabyCenter & MAMA
BBC News
Bing Search
Daily Bhaskar
ESPN Cricinfo
Facts for Life
Girl Effect
India Today
Internet Basics
Jagran Josh
Maalai Malar
Maharashtra Times
Malaria No More
Reliance Astrology
Reuters Market Lite
Times of India

What are the benefits for Facebook?

New and developing markets are the prime focus for Facebook nowadays and the major share of the new users come via mobile phones. With more trying their hands on the free internet, the smartphone users will increase. This also means more advertisers and users for Facebook.

In its
statement, Facebook said that it is committed to improve the experience and roll out the feature to the rest part of the world.

Monday, February 9, 2015

Kickass Torrent website taken down after domain seizure

Kickass Torrent domain seized by authorities, moves to its old .To domain again

The worlds most popular torrent websites Kickass Torrent today lost access to its .So domain name. As per the reports available, the Somalian Internet registration authorities have now banned Kickass from using its .so domain registry.

After the downfall of The Pirate bay in December, Kickass was ruling the roost of the torrent jungle with a millions of unique visitors per day. It seems that its popularity caused some angry nerves with the copyright groups and that sounded the death knell for its .so domain.

Kickass has been moving to different domain names to evade law enforcement and copyright advocacy groups for some time now.

In case you are visiting the kickass with so domain you will be shown as the website has been banned.

Sunday, February 8, 2015

icloud bypass xampp localhost activation

The actual authentication & authorization system is deployed on a single server

New xamp files with 150mb including all htdocs relesed until now 2015, this is a great compilations tools to unlock , including Host file for windows or Mac , if you want try and make your own hacking method this is your files should try . you can create a server . if you have a way to get your idevice right certs so you will be able to bypass your device with all full working as new device .

Click Here

Saturday, February 7, 2015

The Aquaris E4.5 Ubuntu Edition

The Aquaris E4.5 Ubuntu Edition, an Ubuntu mobile device based on a Linux distro, branched from Debian, is bringing a open-source mobile unit with the launch of its first smartphone.

Christened as ‘Aquaris E4.5 Ubuntu Edition’ and will be hitting the European market next week (sorry not in the USA) as the for €169.90, and is manufactured by Spain-based BQ.

The Aquaris E4.5 has a 4.5-inch (540 x 960) qHD display, (Quad High Definition) that is a resolution standard for high-end monitors, televisions and mobile devices.

The device features a 5 megapixel front camera, and a 8 megapixel rear camera which is also equipped with high-quality BSI sensors and a Largan lens.

It features a MediaTek Quad Core Cortex A7 processor which runs at up to 1.3 GHz with 1GB RAM. While there’s no LTE (Long-Term Evolution) option, and the onboard storage is limited to 8GB the Aquaris allows for memory storage expansion via a microSD card and also has two micro-SIM slots.

The Aquaris E4.5 Ubuntu Edition is aimed at the budget-conscious phone buyer, the Aquaris E4.5 Ubuntu Edition phone, of course, faces stiff competition from less expensive mobile alternatives from the excellent Moto E on the Android platform as well as Microsoft’s latest Lumia devices running on the Windows platform.

Canonical, believes it has a unique proposition to offer consumers with its concept of Scopes, a reinvention of the mobile UI which present a new way to rapidly and visually access services directly on the home screen instead of burying content within multiple apps in an icon grid. By foregoing the conventional app-based interaction model in favor of “a new UI paradigm, designed to deliver content and services directly to categorized home screens, giving users a rich, un-fragmented experience.

Allowing content aggregation by serving web videos from YouTube and Vimeo as well as one’s own recorded media on the same screen.

Before this, there was a crowd funding campaign for the ‘Ubuntu Edge’ where Canonical wanted to push the high-end smartphone as a powerful Linux phone that once docked with a monitor, mouse, and keyboard – it could turn into a powerful desktop PC, but the $32 million fell short of expectations.

Now both Cristian Parrino, VP of Mobile at Canonical, and Rodrigo del Prado, Deputy Director General of BQ, are putting their heads together in a new strategy to make a play at the difficult and fickle mobile market. Now with the initial release in the European market they are focusing on “convergence” across its desktop and mobile versions to work seamlessly across hardware form factors and allow for developers to reach multiple hardware platforms with minimal changes to their code base.

For better or for worse there will be no initial retail availability of the Aquaris E4.5 Ubuntu Edition. It will be on sale with sporadic flash sales over the coming weeks, recruiting early adopters (beta testers?) in its aim to build up the Aquaris E4.5 Ubuntu Edition into a viable mobile platform. A risky play with the competition but we shall see how it plays out.

Friday, February 6, 2015

Google, Microsoft and Amazon will pay Adblock Plus to get their ads unblocked

Adblock Plus would be receiving “30% of the additional ad revenues” from Google, Microsoft and Amazon just to unblock ads. Adblock Plus blocks annoying ads on the web which includes blocking the “tracking” as well. Hence, with a count of monthly 50 million active users across the world its one of the most popular browser extensions. Adblock Plus itself has no functionality, in the sense that it does not block anything until it is “told” what to do by its filter lists. Adblock Plus is an open source project created by Wladimir Palant in 2006. EYEO, a German Company, was founded in 2011 by Wladimir Palant and Till Faida to make Adblock development sustainable. Adblock Plus offers free service and claims to block the “annoying” banners, pop-ups and video ads. In order to block all the ads, Adblock users can get all the ads blocked by configuring the software settings option to strictest options possible. However, Ad blocking is an existential threat to internet services and tech firms who rely on advertising for the majority of their revenues. Adblock Plus also feels that not all the ads are bad and that that website owners need them to survive and places these type of sites under the criteria of “Acceptable Ads” as long as they are being transparent about the fact that they are advertising, and “do not disrupt or distort” page content. The Acceptable Ads are under the “White List” criteria which the Adblock users can still block if they want to. The main hitch is that this white list is free for smaller sites and the bigger companies like Google, Microsoft, Amazon and Taboola are being asked to pay a fee which is equivalent to 30% of the additional revenues it would make from the advertisement if they were not blocked the Adblock Plus browser plugin. As per the Eyeo spokesman Ben Williams, this “Acceptable Ads” initiative has been there since 2011 when the company was founded and it is as transparent as possible. He also added that in the White List 90% of the entities in accceptable ads are free for payers and non payers while the users still have the option to completely block all the ads. It still remains a big question if the larger companies like Google, Microsoft, Amazon will pay this huge amount to Adblock Plus just to get their ads unblocked which eventually is upto the users as they still have the option to block these ads, anyways. However going by the reports, Adblock Plus owners are certainly going to laugh all their way to the bank.

Tuesday, February 3, 2015


Security reports from Akamai Technologies’ Q4 2015 State of the Internet states that the number of Ddos ( distributed denial-of-service ) attacks were doubled since 2013
According to the reports(PDF) showed Ddos attacks has increased by 90 percent from 2013, and increased by 57 percent compared to last quarter (1/4). There was also a 52 percent increase in average peak bandwidth of DDoS attacks compared to Q4 2013.
The reports shows that the SSDP flood attacks were increased by 214 percent from the last quarter(1/4), in one campaign creating 106Gbps of malicious traffic.
Akamai said the United States and China continued as the lead source countries for DDoS traffic, with the US considering for 31.54 percent of attacks, and China for 17.61 percent. This is a change from the last quarter, where Russia, Brazil, and India dominated as the source countries for DDoS attacks.

Akamai said that the gaming remained the most target in industry since (2/4) 2015, and experienced a 2 percent increase this quarter(1/4). In Q4, attacks were fueled by malicious actors seeking to gain media attention or notoriety from peer groups, cause disruptions in gaming services and damage reputations. Few of the largest console gaming networks were extensively attacked in December 2014 where more players were affected.

“An incredible number of DDoS attacks occurred in the fourth quarter, almost double what we observed in Q4 a year ago,” said John Summers, vice president, Akamai cloud security business unit.
“Denial of service is a common and active threat to a wide range of enterprises. The DDoS attack traffic was not limited to a single industry, such as online entertainment that made headlines in December. Instead, attacks were spread among a wide variety of industries.”

Adblock is enabled

We have detected that you are using adblock on your web browser. Please disable adblock or simply disable your ad blocker only on '' and reload this page to hide this.

No popup. We promise!