Wednesday 8 August 2018

What does Spamming & Doxing means..? Check it Out..!!

                       

Spam, as I’m sure you're aware, is Unsolicited messages most often coming in email, like the one you can see here trying to get you to buy pharmaceuticals or some other nonsense. But they also come through instant messages, forums, social media, even text messages now, blogs, wikis, and pretty much anywhere else that they can think of in order to spam you. Mostly it’s to advertise some sort of product.
You would think that spamming wouldn’t work, but the barrier to entry to become a spammer is low. So spamming remains economically viable because spammers have very small operating costs, and is difficult to hold senders accountable for their mass mailings. It’s relatively easy to hide where the emails are coming from. If you send millions upon millions of emails, enough of a small, small percentage take the bait. The email protocols we use today and have always used were designed
in a time of trust. So there’s little defense built in to those protocols to defend us against spam, and that’s something we’re going to cover a lot more in this section about email security. With spam, or any emails, if you didn’t request it, then you should be suspicious of it.

Doxing, something completely different to spamming. Dox is an abbreviation of document. Doxing is to do research on an individual, or it can be an organization or company, to find personal and private information often in order to cause embarrassment, discredit, extort, coerce, harass, and you know, just generally cause problems for the victim by publicly releasing the information or the threat to publicly release it.

If someone is said to be doxed, it means that information about them has been made public or has been broadcasted in some way. Doxing can be achieved by simply searching on the internet and looking up public records. There’s often lots of information about people out there that they don’t realize.
You could search through social media sites and forums, which is one reason why you should keep anything private private. People are quite surprised at the amount of information that is actually out there on them. It can also be done through contacting your phone company, through IP address
lookups so they know where you are or your general location, looking at browser history, domain name, who is information, basically whatever method the doxer can use based on their level of skill.
It can involve social engineering and tricking people to give away information that they otherwise wouldn’t. It can also escalate to hacking the victim’s computer and accounts.
Examples include Anonymous, releasing the identities of members of the Ku Klux
Klan, and Donald Trump reading out the phone number of senator Lindsey Graham.
The ethics of doxing is obviously considered questionable.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 


Monday 6 August 2018

Nokia 8110 4G phone. Check it out..!!


"Hello, Neo. Do you know who this is? Morpheus!" Ah, the memories. Even in its silly, banana-yellow attire, the new Nokia 8110 4G just seems to tickle the nostalgia bone the right way. After the wave of retro-enthusiasm, sparked by the Nokia 3310 (2017), HMD decided to sink its teeth into the Nokia resurrection game even further.
   
              If nothing else, the Nokia 8110 4G is undoubtedly different and stands out in the never-ending sea of bland "slab" Android smartphones. Physically, it has that undeniable and very distinct 90s appeal. For anybody who grew up back then, this is the proverbial gateway to the Matrix. Mr. Anderson's phone. For many of us, still an object of desire after all these years. Well, preferably one with the spring-loaded mechanism of the Nokia 7110, but you get the idea.


  • Body: Plastic slider feature phone, 133.5 x 49.3 x 14.9 mm, 117g, IP52 drip protection
  • Screen: 2.4-inch, QVGA, curved LCD
  • Rear Camera: 2MP, LED flash
  • Chipset: Qualcomm 205, dual-core 1.1GHz
  • Memory: 512MB RAM, 4GB built-in storage
  • OS:KaiOS
  • Battery: 1500mAh
  • Connectivity: Single SIM (4G) or Dual SIM (Micro-SIM, dual stand-by), FM Radio, Bluetooth 4.1, GPS/AGPS, Wi-Fi b/g/n, Micro USB, 3.5mm headphone jack
  • Misc: Slide to answer a call
But looking beyond the nostalgia train, the fact of the matter is the Nokia 8110 4G is a very different and in a lot of ways interesting 2018 device for other reasons, as well. While its appearance screams featurephone, in reality, it sits somewhere in between traditional featurephone and modern smartphone territory. That's, in part, thanks to its pretty stacked list of connectivity options, including Wi-Fi, Bluetooth 4.1, GPS and, most importantly - LTE. The latter is particularly vital for emerging markets, where most of the communication infrastructure is based on LTE and newer standards. With support for these, the Nokia 8110 4G has all it needs to be a basic gateway to the internet, on a budget.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Sunday 5 August 2018

How can your phone calls and text messages can be hacked..? Check it out..!!


Yes..!! you are thinking right, Your phone calls and text messages can be hacked now the question arrises, How, how it can, and who can hack it..?
                 A vulnerability means hackers can read texts, listen to calls and track mobile phone users. What are the implications and how can you protect yourself from snooping?

Hackers can read text messages, listen to phone calls and track mobile phone users’ locations with just the knowledge of their phone number using a vulnerability in the worldwide mobile phone network infrastructure.

The exploit centres on a global system that connects mobile phone networks, and can give hackers, governments or anyone else with access to it remote surveillance powers that the user cannot do anything about.

But how can this happen, is it currently being used and what can you do about it?

What is being hacked into?

Signalling System No 7 (SS7), which is called Common Channel Signalling System 7 (CCSS7) in the US or Common Channel Interoffice Signaling 7 (CCIS7) in the UK, is a system that connects one mobile phone network to another.

It was first developed in 1975 and has many variants. Most networks use protocols defined by the American National Standards Institute and the European Telecommunications Standards Institute.


What does SS7 normally do?

SS7 is a set of protocols allowing phone networks to exchange the information needed for passing calls and text messages between each other and to ensure correct billing. It also allows users on one network to roam on another, such as when travelling in a foreign country.

What can access to SS7 enable hackers to do?

Once they have access to the SS7 system, a hacker can essentially have access to the same amount of information and snooping capabilities as security services.

They can transparently forward calls, giving them the ability to record or listen in to them. They can also read SMS messages sent between phones, and track the location of a phone using the same system that the phone networks use to help keep a constant service available and deliver phone calls, texts and data.

Who is affected by the vulnerability?

Should a hacker gain entry to the SS7 system on any number of networks, or if they are used by a law enforcement agency as part of its surveillance, anyone with a mobile phone could be vulnerable.

What’s being done about it?

Since the exposure of security holes within the SS7 system, certain bodies, including the mobile phone operators’ trade association, the GSMA, have set up a series of services that monitor the networks, looking for intrusions or abuse of the signalling system.

Mobile phone networks have also employed security contractors, including the German security researcher, Karsten Nohl, who uncovered the flaw in 2014 and demonstrated it for 60 Minutes, to perform analysis of the SS7 systems in use to try and prevent unauthorised access.

Nothing is hack-proof, however, and their success will likely be on a network-by-network basis. Reportedly, recent security testing of SS7 by an operator in Luxembourg took Norway’s largest network operator offline for over three hours due to an “unexpected external SS7 event”.

What are the implications for users?

The risk of surveillance of your average user, given the billions of mobile phone users across the globe, is small. Those in a place of power, within organisations or government, could be at risk of targeting, as all that’s required to perform the surveillance is access to the SS7 system and a phone number.

One of the biggest dangers, beyond someone listening to calls and reading text messages, is the interception of two-step verification codes that are often used as a security measure when logging into email accounts or other services sent via text message.

Banks and other secure institutions also use phone calls or text messages to verify a user’s identity, which could be intercepted and therefore led to fraud or malicious attacks.

What can I do to protect myself from snooping via SS7?

Given that the vulnerabilities and the possibilities of spying on users relies on systems outside of user control, there is very little you can do to protect yourself beyond not using the services.

For text messages, avoiding SMS and instead using encrypted messaging services such as Apple’s iMessage, Facebook’s WhatsApp or the many others available will allow you to send and receive instant messages without having to go through the SMS network, protecting them from surveillance.

For calls, using a service that carries voice over data rather than through the voice call network will help prevent your calls from being snooped on. Messaging services including WhatsApp permit calls. Silent Circle’s end-to-end encrypted Phone service or the open-source Signal app also allow secure voice communications.

Your location could be being tracked at any stage when you have your mobile phone on. The only way to avoid it is to turn off your phone or turn off its connection to the mobile phone network and rely on Wi-Fi instead.

Why is this happening now?

Security holes within SS7 were first uncovered by security researchers, including Nohl, and demonstrated at Chaos Communication Congress hacker conference in Hamburg in 2014. The hacking of Italian surveillance software vendor Hacking Team last year highlighted the continuing use of the SS7 system in government and criminal snooping, both on users and mobile phone operators.

But it is Nohl’s demonstration of remotely surveilling a US congressman in California from Berlin for CBS’s 60 Minutes that has brought SS7 under the spotlight once again. Since the programme aired, congressman Ted Lieu has called for an oversight committee investigation into the vulnerability.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 


Friday 3 August 2018

Motorola Moto Z3 Specifications. Check it out.!


Moto Z3 was launched on Thursday at an event in Chicago, the company's headquarters. The new smartphone, which sits above the Moto Z3 Play that debuted in June, comes with a splash-resistant build and delivers a pure Android experience. It also continues the Moto Z-Series legacy of supporting Moto Mods through a dedicated pogo-pin connector at the back. Lenovo-owned Motorola has additionally partnered with Qualcomm to launch a 5G Moto Mod that will enable the next-generation network access on the Moto Z3. The 5G Moto Mod uses a Snapdragon X50 modem and "millimeter wave components" to offer 5G access on Verizon network. Alongside announcing the launch of the Moto Z3, the company has revealed that it has no plans to bring the anticipated Moto Z3 Force. The smartphone was well expected as the successor to the Moto Z2 Force and the company's next-generation flagship. However, it eventually confirmed that no more Moto Z-Series models will debut this year. This means, unlike the last year Moto Z family that included the Moto Z2 Force and Moto Z2 Play, there will be the Moto Z3 and Moto Z3 Play this year.


  • Body: Gorilla Glass 3 front and back, aluminum frame; p2i water repellent nano coating Display: 6.01-inch, 18:9, FHD+ 2160x1080, Super AMOLED, MAX Vision
  • OS: Android 8.1
  • Chipset: Qualcomm Snapdragon 835, Octa-core (4x2.35 GHz Kryo & 4x1.9 GHz Kryo) CPU, Adreno 540 GPU, 4GB RAM
  • Storage: 64GB internal, microSD expansion (dedicated slot)
  • Rear Camera: 12 MP, f/2.0, 1/2.9", 1.25µm, PDAF & laser AF + 12 MP B/W, f/2.0, 1/2.9", 1.25µm, PDAF & laser AF, two-tone LED, 4K video
  • Front Camera: 8 megapixels, f2.0, 1080p video
  • Connectivity: 4G VoLTE (optional upgrade to 5G though Moto mod), Nano-SIM, Bluetooth 5.0, dual-band Wi-Fi 802.11ac, A-GPS/GLONASS, NFC, USB-C port, FM radio
  • Battery: 3,000mAh non-removable, Motorola TurboPower 15W fast charging support
  • Misc: Fingerprint sensor, Moto Display, Moto Mod support
That can only be properly answered once we get the phone in for review and test it out. If the Z2 Force is any indication for camera performance, we were, indeed, quite impressed with the level of resolved detail on it, as well as the low noise. However, color capture and reproduction was unreliable and the dynamic range left more to be desired on that phone.
Perhaps a year's worth of camera software development might have helped improve on those problem areas. If nothing else, the camera on the Moto Z3 does have a few new shooting modes to play around with, like cinemagraph and a background cutout feature.
While on the subject of software, as a side note, the Motorola experience is still a very clean, nearly AOSP one. So, no change there.
As for selfies, you get the same 8 MP, f/2.0, 24mm, 1.12µm from the Z3 Play, which is an overall upgrade, compared to the Z2 Force. Except for the dedicated LED selfie flash, which is now gone and has been replaced by a screen-flash solution.
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Xiaomi Mi A2 Features and Specifications.Check it out.!



For one, this year's chipset is a notch (or several) up - the Snapdragon 625 in the Mi A1 was all about endurance, while the Snapdragon 660 in the Mi A2 is similarly frugal, only vastly more powerful.

Speaking of notches, there isn't one to spoil the top of the Mi A2's display. It's a contemporary 18:9 unit, the almost-6-inches in diagonal FullHD+ LCD that Xiaomi's already used on a bunch of smartphones. So, that's another one where A2>A1.

More of side step than a definitive improvement is the camera. Gone is the 12MP telephoto module that offered 2x zoom, substituted by a 20MP secondary camera for improved low-light performance (OnePlus-style). The main cam on the back is still 12MP, but now gets a 2/3 of a stop brighter lens (f/1.8 vs. f/2.2). Over on the front, a 20MP selfie cam (same sensor as the one on the rear) replaces the basic 5MP shooter of the Mi A1, and comes with an added flash too.

  • Body: Aluminum body.
  • Display: 5.99" IPS LCD, 1,080x2,160px resolution, 18:9 aspect ratio, 403ppi.
  • Rear camera: Primary 12MP, Type 1/2.9" sensor, 1.25µm pixel size, f/1.75 aperture, PDAF; Secondary 20MP for low-light, Type 1/2.8" sensor, 1.0µm pixel size, f/1.75 aperture, autofocus, pixel binning. 2160p/30fps.
  • Front camera: 20MP, 1.0µm pixel size, f/2.2 aperture, Auto HDR, pixel binning. 1080p/30fps video recording.
  • OS: Android 8.1 Oreo (part of Android One).
  • Chipset: Qualcomm Snapdragon 660: octa-core CPU (4x2.2 GHz Kryo 260 & 4x1.8 GHz Kryo 260), Adreno 512 GPU.
  • Memory: 4/6GB of RAM; 32/64/128GB storage; no microSD slot.
  • Battery: 3,000mAh Li-Po (sealed); QuickCharge 3.0 fast charging.
  • Connectivity: Dual-SIM; LTE, USB-C; Wi-Fi a/b/g/n/ac; GPS; Bluetooth 5.0, IR blaster.
  • Misc: Rear-mounted fingerprint reader; single down-firing speaker; no 3.5mm jack (adapter in the box).


Which brings us to the changes that can't really be interpreted as an improvement. Xiaomi might want you to believe that the Mi A2 is now even more affordable, because there's a 32GB storage version, and you also get the option for a fully tricked out 6GB/128GB one for a price premium (the original was only offered in 4GB/64GB trim). What doesn't make it to the press materials is that the microSD slot is now gone. Boo!

Another victim with this generation is the 3.5mm headphone jack - and we thought midrangers were immune from this spreading fad. At least there's an adapter in the bundle.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Bank Data For Sale on the Dark Web Rises by 135% Every Year


Insights Cyber Intelligence a cyber-security firm that offers cyber threat intelligence to enterprises released its Financial Services Threat Landscape Report (July 2018). To acquire cyber threat intelligence, Insights engages in dark web monitoring, phishing and fraud detection and brand protection.
The research resulted in a number of key findings:135% increase in bank data available for sales on dark web marketplaces over the last one year, 149% increase in credit card stolen information, 91% increase in the number of corporate email addresses targeted by phishing scams, and 151% increase of attack probability per bank.
Stolen data posted for sale on the dark web, mainly credit card information, has been landing many buyers into trouble. Most of the people who buy credit card information end up using it to purchase goods online or physically in stores. Unable to cover their tracks some credit card buyers end up arrested and charged with fraud and identity theft.
The report attributed the rise in the number of exposed information to the change of tactics used by cybercriminals. As banks and financial institutions up their cyber security game, cybercriminals change the way they carry out attacks to be able to bypass security measures taken by their target corporations. According to the report, the following trends in the cybercrime world have resulted in more stolen data.

Phishing-as-a-service

Phishing attacks have proved to be the most effective ways of acquiring information from unsuspecting targets. Dark web marketplaces as always provide all sorts of goods and services including phishing kits. Availability of phishing kits for sale on demand have lowered the entry bar to phishing attacks. These kits enable cybercriminals with little knowhow to launch cyber-attacks that result in the exposure of large quantities of sensitive information.

Fake sites and Apps

To acquire information from clients of institutions with established brands, cybercriminals are creating sites that resemble legit site doubles. The fake sites are used to steal the credentials of clients of the targeted institutions. These criminals may also create mobile banking apps that look like the actual ones and use them to collect login details of the users of targeted banks.
Decentralization of dark web markets
Vendors on the dark web are getting more concerned over their anonymity and security of their funds in centralized marketplaces. This has prompted most vendors to move into decentralized marketing which offers more privacy and guarantees against surveillance by LE. Vendors and buyers have been using private messaging apps to carry out trades for some time now. Decentralization makes it impossible to monitor cases of leaked or stolen data, or to even learn of planned cyber-attacks.

Advanced Persistent Threat (ATP) Groups

Cybercriminals have joined to form groups that wage cyber-warfare against financial institutions either for monetary gain or to acquire intellectual property mainly when sponsored by states. The kind of motivation portrayed by ATPs makes it hard to entirely prevent cyber-attacks since ATPs launch well timed attacks. The year 2017 witnessed a large number of ATP attacks.

Cyber-extortion

Cyber criminals are using extortion attacks to threaten financial institutions into paying large sums of money in cryptocurrencies or risk exposure of the credentials of their clients. Cyber-extortion is very effective because institutions are always willing to do anything to protect their image and clients’ information.
A gang of hackers known as Rex Mundi used extortion to threaten firms that it hacked.
All these and many other developments have empowered cybercriminals making them feel invincible while intimidating their targets into feeling helpless.

Wednesday 1 August 2018

Check out features of Asus ZenFone Max Pro M1.


Taiwanese smartphone maker ASUS debuted in India in 2014 with its Zenfone 4, Zenfone 5 and Zenfone 6 devices which were essentially low-cost phones that catapulted the otherwise not-so-popular brand to recognition.
According to International Data Corporation (IDC), the Indian smartphone market is poised to grow in double digits in 2018 on the back of the popularity of budget devices and vendors increasing their focus to make phones, as well as high-value components in the country. 
The Taiwan-based handset maker now seems to be following a similar sentiment and has launched ZenFone Max Pro M1 in India at Rs 10,999 for the 3GB RAM+32GB onboard storage variant and Rs 12,999 for the 4GB RAM+64GB internal storage variant to primarily compete with the likes of Xiaomi Redmi Note 5 and Redmi Note 5 Pro.
According to the company, the smartphone has been made specifically for India -- which is a key market for it -- and its launching price and specifications have intrigued us. Let us find out if the smartphone is worth your time and money.
What works?
Unlike most smartphones in the market today, this smartphone is not a typical glass sandwich design. The device was quite pleasant to look at and has an ergonomic rear.
Despite a taller-than-wider frame and an 18:9 aspect ratio screen for immersive viewing and gaming experience, the smartphone was easy to operate with one hand.
A 5.99-inch FHD+ "Full View" display takes up most of the front along with rounded corners and narrow borders on both the sides. 
The power and volume keys sit on the right and are easy to reach.
A fingerprint sensor is placed at the back below which sits the minimalistic ASUS logo. The scanner was quick to unlock the device.
We were impressed to see the almost 6-inch display sans a "notch" which was popularised by Apple iPhone X.
The display is bright with accurate colours under normal daylight conditions with decent sunlight legibility. 
The viewing angles of the device were also good and we particularly liked the inclusion of "night mode" and a manual colour temperature adjustment under "settings".
A Qualcomm Snapdragon 636 chipset, which is essentially designed for premium mid-range devices, powers the smartphone. This is a major high point considering the price of the device.
Notably, Xiaomi's Redmi Note 5 Pro is also fuelled by the same processor.
We were impressed by the company ditching its own ZenUI interface in favour of a near-stock interface which offered smooth experience.
We got close to two days of battery life on a single charge with 4G running on one SIM slot.
The device has 13MP primary sensor and a 5MP secondary sensor that can take decent photos in normal lighting conditions.
The front camera is an 8MP shooter which took some good self-portraits.
What does not work?
Despite accommodating a hefty 5,000mAh battery inside the phone, the company did not include fast-charging technology alongside which can be a bummer.
Charging the battery was painfully slow and it took us more than two hours to completely charge the device.
Conclusion: ASUS ZenFone Max Pro M1 is a capable all-rounder in this price segment. We would recommend the device to those looking for great battery 

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms.