Showing posts with label Warnings. Show all posts
Showing posts with label Warnings. Show all posts

Learn about USB Killer capable of destroying any computer!

USB Killer


There is no doubt that many things that may seem strange in the digital world or are part of science fiction movies are now a reality. For example, hackers can remotely destroy a user's computer, and it seems that this is no longer impossible today .

"The Hacker News" reported that one of the Russian researchers, nicknamed "Dark Purple" has discovered a new and exciting concept can be invented USB Flash "killer" as it is able to destroy the computer of the user you are connected to, Russian manufacturer of electronics.

USB Killer

Russian researcher Dark Purple and for the achievement of his innovation, "Killer USB" has asked for electronic circuit boards specifically from China and succeeded in that the USB stick operates a simple principle is that it passes an electrical power exceeding 110 volts, causing the destruction of components Sensitive computer.

This innovation brings to mind the Stuxnet computer worm designed by the National Security Agency (NSA) to destroy Iran's sensitive nuclear and nuclear facilities remotely.

Nearly a billion Android devices affected by newly-discovered 'QuadRooter'

Researchers at security firm Check Point have revealed a new flaw that they say affects Android devices powered by Qualcomm chipsets. Dubbed QuadRooter, the flaw is basically a set of four vulnerabilities affecting over 900 million smartphones and tablets running Google's mobile operating system, including Samsung's latest Galaxy S7 flagships as well as the BlackBerry DTEK50, which is claimed to be "the world's most secure Android smartphone."
Nearly a billion Android devices affected by newly-discovered 'QuadRooter'

If exploited, the security flaw can give attackers complete control of affected phone or tablet, including access to sensitive personal and enterprise information stored on the device. To carry out a successful takeover, all the attacker needs is to trick the user into installing a malicious app that wouldn't require any special permissions.

Qualcomm was notified about the vulnerabilities - found in the company's software drivers - back in April this year. The chipmaker says that all the bugs were fixed at its end and patches were handed over to customers. While fix for three vulnerabilities have already made it to recent Android monthly security updates released by Google, one is still outstanding - it'll be be included in the September update.

It's worth mentioning that Check Point has also released a free QuadRooter Scanner app on Google Play, using which you can confirm whether or not these vulnerabilities exist on your device.

Source

Serious gap in the IOS system and MAC OS X: update your devices quickly

Discover the expert in information security systems extremely dangerous loophole that would harm the Mac along with phones iPhone and iPad plates. And following this discovery, you Apple has released a new update (mise à jour), it is absolutely essential that you will if you have downloaded from Apple users.
Serious gap in the IOS system and MAC OS X: update your devices quickly

Tellan Bohan, and is a researcher in information security systems in Cisco Talos company, he found, in fact, a loophole enables hackers to decipher the password for the iPhone and any phone by sending a consignment MMS or iMessage symbols.

And if we want to enter more details, we can say that someone is a bad intention can write a program in the small compact dimensions TIFF image and message through MMS. And what that receives this message, the symbolic code will run automatically without the user can prevent it. And thanks to a vulnerability in ImageIO, and is the address (API), which deals with the image data, the code is capable of malignant impact on access to everything related to your phone iPhone.

As for Mac systems (laptops), this researcher has also discovered that this gap operates in some other way that they can operate through Safari, and is the search engine of the Apple, located arbitrarily in the IOS systems and Mac OSX.

And Tellan Bohan explained that this gap is "a very dangerous software damage" compared to a loophole stagefright that hit the Android devices in the past, and on the level of sub-ports concerned: Such an attack would allow the pirates to get their own personal security information passwords, codes (... ) stored in the device memory and the target, and this can also include all the symbols and codes used daily: passwords to network and meet your own, your e-mail account .... , Ie everything that happens in your browser at any moment.

And researcher explained that the iPhone phones are more prone to this gap of computers Mac. He also stressed that all devices (iDevices) operating under IOS 9.3.2 System and its predecessors on this danger.

And in front of this confusion, Apple introduced a new update at the disposal of its users, and is the IOS 9.3.3. If the firm is very that you will download this update.

Last three versions of Mac OSX is concerned as well as the update is a new and (Mavericks 10.9.5 and Yosemite 10.10.5 and El capitan 10.11.6).

If it is necessary that you will enter these updates so that the internal built promotive that Taatamal with this gap, as well as the reform of other problems related to the security and stability informational on your devices.

Interesting Facts probably do not know about the game Pokemon Go malicious and its relationship with a company Google!

No one can ignore the overwhelming success of the game Pokemon Go and rapid spread, which I knew about the world in a short time, yes, it can be considered a quantum leap in the world of applications of mobile and gaming, the fact that it has created a new style and Msthdta from playing video games saluting brought together all that is concrete and realistic by the visionary from the world of animation. In these article will identify with you on some facts serious about the game's controversial Pokemone Go and also we will reveal about her relationship malicious company Googleplex and how to exploit these circumstances the last game to collect larger amounts of data to users of those related images and GPS coordinates, especially.!

Interesting Facts probably do not know about the game Pokemon Go malicious and its relationship with a company Google!

Malignant relationship game PokemonGo company Google !!

Game PokemonGo rely mainly on phone camera and GPS own to play the spectrum inadvertently Find Pokemon around the city or the country or the world sometimes, and thus the user these circumstances the game he has to make the camera phone in action constantly and also must activate the GPS for the duration of the game to these circumstances game and what does not teach a large segment of users of these circumstances the game that all what is being filmed during play whether it's the bedroom or the office (staff) or the street who inhabit it or archeological located in your city Ooger spectrum. All of this is stored in the company's servers developed for the game. And that have a close relationship with a company Google, the spectrum if not it of its projects. Last used all these circumstances the data that is collected in the increase of profits by employing in the field of advertising and the development of some of its metal Google Maps service and is well known to everyone the great rush by governments to like this kind of sensitive data!

Really all playing a game Pokemon Go is Hacos to $ 0. Imagine that you spend an important aspect of your valuable time in the search for Pokemon around your city and your area, the spectrum using a camera phone and GPS coordinates, and when we talk about the geographical area we are talking primarily about sensitive places in countries such as archaeological sites and the whereabouts of the headquarters of the ministries and government institutions Loyalty to those areas where government does not wish to see them metal military barracks! The company is then developed for these circumstances game win millions of dollars through new and innovative style of advertising. He saluted the users of these circumstances the game became forced to go to a certain restaurant (on a prior agreement with it) or a particular hotel to find some distinctive Pokemon. And of course these circumstances Hotels, restaurants and other nonprofit institutions pay large sums of money to these circumstances the developer of the game for inclusion in its space by contracting with it!
This was a simple personal analysis accumulated in a short time by searching for what these circumstances and the fact that the game's controversial explicitly. Some had me might be different in the feasibility of these circumstances that the facts stated and may agree with me some others. On the whole visions differ, and I respect her all, of the piece if you have any point of view on this subject, please partnering him and will try to build a constructive discussion get out of it a good result!

Dangerous : method was able to penetrate any Facebook account in seconds !!

Penetrate the Facebook of the most queries that people are looking for in the Internet daily, and very hard to find how to penetrate a Facebook account, but this week, enables one of the researchers from the control of any Facebook account, whatever the password used, or protection measures taken, the aid of only a phone number victim of piracy and some skills.

Dangerous : method was able to penetrate any Facebook account in seconds !!

If you believe that your account on Facebook is protected adequacy and no one can break it, then you are wrong, yes completely wrong because there is no way they can do so regardless of how the word used password strength.

Pirates were able to do this by a set of skills and Dvoha to exploit the SS7 network and thus access to any account, all they would need is also the phone number of the victim.

Global communication network SS7 own set of vulnerabilities that allow hackers and pirates, as well as communication agencies to spy on the phone calls and SMS messages, but more than that, they can also penetrate your social networks that the phone number.

Or SS7 Signalling Systeme Number 7 and is sending protocol telephony and transfer information from contacts and messages from one person to another, with the billing signals, and other features.

So how then to use this protocol in the breach? SS7 network trust in text messages without making sure of the source, and thus enables the hacker to exploit the SS7 to convert text messages into their devices.

All you need to do is target phone number and some information about the victim's body to begin the breakout quietly. It is worth mentioning that he had previously and then to penetrate all of the accounts WhatsApp and Talegram the same way.

Now that you interpret you how the hack process explanation Technically, the tiger now to interpret Ttabkie it, do not not not broke through any account, because the gap will have been repaired, especially that she has terribly proliferated in the past two days ..

Method as follows:

A hacker would need to start clicking on the button "Forgot Account" from the main Facebook page "facebook.com", now will be asked to enter your email or phone number connected to their account, the thing that requires the hacker to enter the phone number is valid and genuine private and it has inevitably one, and so on, and previously mentioned manner will convert the message that the activation code to his computer and then access the victim's account.

It did not absorb it well? Well, then see the following video, which explains everything about how to penetrate the Facebook: