Skip to main content

Posts

Showing posts from January, 2015

Facebook Affected by A malware! which affects 110,000 in 2days

Facebook malware outbreak! The world social networking giant Facebook has been hit by a malware! This malware is said to have infected 110,000 accounts within 2dayz alone and the figure is on the rise! People are always tempted to click on links that are shared by friends, which many endup into been hacked or infected by a malware, which sometimes is very frustrating. Imagine having your Parents and relatives on Facebook and malware tagged them on a pornographic post! Disguising as you! Shocked! That will surely be a hell on earth. This is exactly what  the malware does! And who ever click the picture or link is infected! The malware will randomly tagged 20 peoples out of your Facebook friends. Attackers used used malware techniques named magnet. This technique help in tagging facebook friends to such malicious post.  According to Muhammad Faghani a senior consultant at PriceWaterhouseCoopers in an email sent to Full Disclosure infosec hangout. "in the new technique, whi

iTunes Connect is down!

Something is wrong in Cupertino. A number of developers today turned to Twitter to complain that iTunes Connect, a hub for iOS and Mac software makers, was logging them into the wrong accounts.  The service appears to be matching log-ins with the wrong accounts, showing apps and usernames from completely different people. When developers try to access one of the apps, they receive an error message leading them back to their own account. iTunes Connect has since been taken offline as Apple’s engineers presumably set off to fix the problem. We’ve contacted Apple and will update if we hear back. Culled from:  The Next Web

Ethical Hacking Simplified. Applications of Cryptography

Pretty good Privacy PGP This type of cryptographic Application uses Public key encryption system and  is one of the most popular means of encryption in the world. It is used in securing data, data storage, email, Instant Messaging (instant messaging are messaging system that happens in real time, just like whatsApp, Facebook messenger etc.) and other forms of communication. The early version of this cryptographic application was written by Philip Zimmerman and has it public appearance in 1991. it is part of an open-source project with many version where user can choose the best that suit them. This cryptographic application comes with privacy and security measure that are found in many online systems. The data will travel in an encrypted form (chipertext), upon arriving at the receiving end, the receiving will use PGP to decrypt the data back to plaintext. PGP uses the Public/Private key encryption. Where the sender uses his public key to encrypt data, and the receiver uses

YouTube dropped Adobe Flash for HTML5

Youtube the video streaming giant which is part of google has dropped adobe flash for HTML5. The company has been trying to adopt this technology since. Youtube started testing HTML5 in 2010 to see if it can replace Adobe Flash.  Harding said that although HTML5 let YouTube bring videos to devices that don't support Flash Player, such as the iPhone, it did not sufficiently meet the site's needs at the time. 5 years later the company is convinced and has already makes it default on IE 11, Chrome, safari 8 and firefox betas. According to YouTube engineer Richard Leider said the time had come to ditch the aging Flash in favor of HTML5 as the latter, used in smart TVs and other streaming devices, had benefits that "extend beyond web browsers." Benefits of HTML5 over Adobe Flash According to YouTube dev site MediaSource Extensions Adaptive Bitrate (ABR) streaming is critical for providing a quality video experience for viewers - allowing us to quickly and seaml

Facebook lite App for developing countries

Facebook lite Facebook App is really cool and its a best way to enjoy the world largest social networking giant! But to to peoples from developing countries where internet is still expensive, its coolness can turn disturbing. The native android Facebook App do consume a lot of data. People like me after the hotspot in data usage, the next is always Facebook App. A Facebook addict can use nothing less than 1GB of data every month on Facebook alone! In developed countries 1GB is nothing and doesn't count as expensive! But in developing countries its huge and expensive. Here come the good news! Facebook has quietly released a beta (test) version of Facebook lite! And it does so in countries where data is very expensive. Users from Nigeria, Bangladesh, Nepal, South Africa, Sudan, Sri Lanka, Vietnam and Zimbabwe can download are the countries that can officially download this App as for now. Though the interface is a bit different with the native Facebook App, users will find

Whatsim? WhatsApp anywhere without data nor wifi

Did you know that  you can now use WhatsApp anywhere in the world without data nor wifi? Yeah! Whatsim is the technology that makes this dream comes reality! With Whatsim you can move around in the world and not loosing that important messages from your loved ones without data. An Italian company zero mobile recently launched whatsim and  promise to make us enjoy WhatsApp flawlessly. According to Manuel Zanella , CEO of Zeromobile and the inventor of the card.  WhatsApp is the future of mobile communications. Its only “limit” is the data connection especially when you are traveling because the roaming charges are expensive and you can’t always find Wi-Fi everywhere and it is not always free. As someone who appreciates and uses WhatsApp, I tried to figure out how to get around this problem. That’s why WhatSim is an extraordinary opportunity for WhatsApp.” Features of WhatsApp sim • Free sending and receiving of whatsapp messages. • Free location updates. • Sending and re

What is Software

What is Software? Software is the collection of programming instructions with the purpose of task completion. It can again be refers of set of machine readable instructions that can control the processor and other hardware to accomplish an operation or task. Impact software is anything that exist in electronic devices that human cannot see physically, feel or touch in any way but can see its impact in todays life. Software is not limited to what we always think ie computer or phones, rather software is present in almost everything that can manipulate itself electronically. Software can be found on television, Cars, digital watch, fridge (fridge? Yeah we have smart fridges and even digital ones), radio and many electronic devices. Types of Software • System Software • Application Software People do get confused what about the difference between the duo! I will try as much as I can to break things and by the grace of God after finish reading this article you will never be

Difference between update and upgrade.

Difference between Update and Upgrade Updates This is the act of making some few changes on the system which will enhances the system performance, bug fixing, security patches, additional features etc. updates are generally free within the same version. Wait!!! what is a bug and why will they bother to fix it! Bugs are errors committed by programmers or designers which makes the system or software performs below expectations or in an unintended manner. Although not all bugs are caused by human errors, some are caused by the computer software (operating system) that manages the application while some are caused by the software compilers by compiling the application wrongly.  Bugs are found in software source code (the raw instructions that makes up a software). Harm caused by Bugs Bugs are very dangerous because they sometimes give hackers or intruders quick access through its vulnerability or weakness. Bug can make computer system or device go sick, by sometimes freezing,

Applications of Cryptography

Cryptography applications Cryptography can be applied in data communications for safety and security purposes. This can be seen in form of IPSec, SSL and PGP. IPSec (Internet Protocol Security) This is a set of protocols designed to protect the integrity and authenticity of data while moving across the network. This set of rules (IPSec) work at the layer 3 of the OSI model. Wait!!! what is layer 3..... brain cracking.... searching my database..... THE NETWORK LAYER! Yeaaaahhhh! If we can recall, network layer deals with IP addressing(logical address). So this protocol is implemented on the IP addressing system? Yeah! This security application uses some sets of rules which govern how data is been successfully flowing over a network. The earliest cryptographic applications are implemented on the layer 7 Application layer. IPSec came into the world with its layer 3 implementation, unlike it predecessors where the policy is been implemented at the Application layer, this security p

WhatsApp now on web!

Whatsapp on web! Yeah you heard me well! The instant messaging giant Whatsapp inc. is coming to web! Are you kidding me? Whatsapp announced that its android and windows users can now access WhatsApp thru their web client! After updating your whatsapp client, an added option of whatsapp web will be spoted right after the “New broadcast" option. On clicking a barcord reader will appear. The barcord scanner can be used when user log into the web.whatsapp.com, you have to scan the barcord on the site which will redirect you to the web client. Their words: “Today, for the first time, millions of you will have the ability to use WhatsApp on your web browser. Our web client is simply an extension of your phone: the web browser mirrors conversations and messages from your mobile device -- this means all of your messages still live on your phone. To connect your web browser to your WhatsApp client, simply open https://web.whatsapp.com in your Google Chrome browser. You will see

Weakness of Cryptography

Weakness of cryptography “A perfect system doesn't exist, it take patience,  skills, determination and resources to hack any system in the world” The main cryptography challenge is bruteforce attack. This attack happens when user tries all possible combination on earth to guess the encryption key combination. This took a very long time to achieve, although this defends on the cryptosystem been targeted and the resources and skills been employed or applied. Bruteforce is the  most common type of attack that we watch in movies, if you do watch films that involve security like 24, Nikita or Chuks TV series, you will notice sometimes they try to access someones data using bruteforce attack. You will see numbers symbols been randomly runned on the screen, this random codes, alphabets and symbols are trying the get the keys by trying all possible combinations. One successful you can access the encrypted key public/private. DES is highly vulnerable to bruteforce attack, while

Microsoft lunched a 84 inch, 4k new surface device!

Microsoft has just unveiled a whole new category of device designed to showcase Windows 10. It's called the Surface Hub. It's the next evolution of the company's  Perceptive Pixel project and features an 84-inch 4K display with support for multi-touch and pen input. The massive screen also includes dual cameras and a wide array of "advanced sensors," Microsoft said. It's a Windows 10 device, but obviously strays far from your typical desktop or tablet experience. Microsoft has customized the Windows interface for such a monstrous display, offering quick access to Skype video calls, a whiteboard for drawing and annotation, and a shortcut for connecting to another nearby Windows 10 device. All that screen real estate allows for some unique things; you can hold video conferences while scribbling on the whiteboard, for instance. (Microsoft seems to be aiming Surface Hub at businesses and conference rooms.) "It will make your meetings productive and enga

WhatsApp ban users for using whatsApp plus.

Today is like a bad day to some  Whastsapp users. If you are still unaware about it then do know that Whatsapp has already placed  temporary ban on the Whatsapp plus users. Whatsapp plus which is a third party app that resembles in many features compared to whatsapp having a pretty good design and different themes. As they were still running it on the Whastapp plus servers its easy for them to figure it out who’s using whatsapp plus. You should know that using whatsapp plus is against the terms and conditions of the Whatsapp messenger. That’s why  it deicded to temporarily ban users using Whatsapp  messenger services. Even the act of unistalling the Whatsapp plus app and installing the Whatsapp didn’t lift the 24hrs ban reports the banned users. Though lucky enough the ban is not forever. Again whatsapp is a corporate and giant company suppose to do something! By not allowing unauthorised software to access their servers. Our take ICTmagazine here sympathise with all the aff

Ethical hacking simplified. cryptographic hashing.

Cryptoghraphy Hashing Hashing is the process of converting plaintext into chipertext. One of the advantage of  hashing is, its  almost impossible to alter. Even if the intruder succeeded in altering the data the receiver will definitely know on receiving the message. Hashing can be seen as a one way encryption process. Its main aim is to confirm the authenticity of data. Hashing output is known as hash, hash value or message digest. How it work When you are sending the message, you will create an encryption with your private key using a particular type of hashing which we will talk about shortly. It will then create gabbled messages which is fixed length and exactly the length of the message. Bundles the chipertext with the plaintext together which are both encrypted. Upon arriving the destination, the receiver will get the public key of the sender and decrypt the message. Mind you hashing is here to confirm the authenticity of the message. After confirming the sender by using

Ethical Hacking Simplified. Cryptography continuation.

Asymmetric Encryption : This type of encryption was fully unveiled in in mid 1970s by Whitfield Diffie and Martin Hellman. This new technology solved the problem of using one key to encrypt and decrypt. Asymmetric cryptography introduces the public key system into encryption, where the key that encrypt is known as the public key and the key that decrypt is known as private key. Who ever is part of the system is having two separate keys i.e. the public and his unique confidential private key. The public key can be access by the team mates but the private key is sorely to the assigned. Take for example, in an ATM (debit)  card, there is a some number on the card which anyone can have access to, but there is always a PIN(personal identification number) which is secret. If one possesses your debit card, he cannot make withdrawals through ATM machine why? Because he doesn't have your private key which is your PIN. Making this more secured than the symmetric metric. Take for example

Android rooting explained

What is Android rooting? Using the word root, we can imagine or have some clue about what rooting is all about. Rooting is the ability of a user to have super user privilege. User user privilege give the user administrative access which is restrictedon the default settings or stock Os of almost every android devide.  With super-User  you have access to the entire operating system and you can be able to customize almost everything on your device. If you can have  the super-user privilege access, you can bypass any restrictions that your manufacturer or carrier may have applied on your device. Additional advantages are  you can run more apps than before, overclock your processor and use custom Rom cutomised operating system. Rooting an Android phone allows Android users to boost their handset’s operating performance, install non-approved applications and otherwise modify their phone to their taste. Non-experienced users are likely to “damage” their device. If they try the rooting pro

This massive Phone want you to carry your world in your pocket with 320GB Memory support.

You may not be familiar with the company behind the V2 phone, and that is no surprise as Saygus is hardly a household brand. However, their new multimedia phone may just put them on your radar, with up to 320GB of internal storage and all the right specs to make a splash in the market. Saygus is showing off their V2 Android powered smartphone at CES 2015, and we are on site to check it out. Stay tuned for a full video rundown to see how we feel about this 5-inch device. In the same way we suspect Saygus started off when they began designing this phone, let’s dive straight into the specifications. Starting with a 5-inch 1080p display, the Saygus V2 packs a Snapdragon 801, 2.5GHz quad-core processor, 3GB of RAM and runs Android 4.4.4 KitKat. We know its got a 21MP rear camera with dual LED flash and a 13MP front shooter as well. Fingerprint scanner and Wireless Qi charging are a nice touch. Focusing on the media side of things, sound comes to you out of Harmon Kardon spe

New Bluetooth® Specifications Enable IP Connectivity and Deliver Industry-leading Privacy and Increased Speed

​The Bluetooth Special Interest Group (SIG) officially adopted version 4.2 of the Bluetooth core specification this week. Key updates in 4.2 improve privacy and increase speed, and a soon-to-be ratified profile will enable IP connectivity. Bluetooth 4.2 opens up new opportunities for developers, OEMs and the industry to build a better user experience for consumers while creating use cases never before imagined. Kirkland, WA - December 03, 2014 “Bluetooth 4.2 is all about continuing to make Bluetooth Smart the best solution to connect all the technology in your life – from personal sensors to your connected home. In addition to the improvements to the specification itself, a new profile known as IPSP enables IPv6 for Bluetooth, opening entirely new doors for device connectivity,” said Mark Powell, executive director of the Bluetooth SIG. “Bluetooth Smart is the only technology that can scale with the market, provide developers the flexibility to innovate, and be the foundation for

Ethical hacking simplified (System fundamentals) OSI reference model continuation

  This article is continuation.... For Application layer to session layer click here   Transport layer: I know you have start guessing what this layer will be like! Since any thing transport involves movement of “something” from one form to another. Transport layer ensures data is been transported successfully between source and the destination. To complete it task it needs to check errors, data dropping etc. T ransport layer uses TCP (transmission control protocol) and UDP (user dat agram protocol). The first is connection oriented and the later is connectionless. TCP/IP (connection oriented): This makes sure data reached to its final destination without dropping. It uses flow control, connection oriented communication windowing and acknowledgment to make sure communication is successful. Flow control: This is proce ss of controlling the flow of data between the sending end and the receiving end. It prevents the sender to send too much data that the receiver cann

Ethical hacking simplified! (System fundamentals ) OSI reference Model explained continuation.

continuaton N etwork addressing A router must keep record of all its routing protocols differently in its routing table. Every routing protocol keep track of a network with different addressing scheme(IP,IPX and IPv6). For example when sending letter to humans of different languages, the letter has to read the language of the destined person, so that the message would serve its purpose. Interface: This is the exit interface of the network on the router, to reach to the destined network. It can again be referred to the interface on the router, which packet took to reach to its destination. Metric: This refers to the distance between to transmission network and the destined network. This distance is measured using hop(number of routers packet passed before reaching to the destined network) count. Router is the device that works in this layer. An article will be published about the networking devices. Stay turned! Data Link Layer This layer is in-charge