Thursday 16 January 2020

Who are Hacktivists ? || techtalksgroup ||


Hacking is no longer just about breaking into a computer to steal money or data. Hackers have developed new methods of influencing policy and bringing about change. Especially with society’s heightened sense of political awareness. Subsequently, they are turning internet activism as a way of spreading their idealism. Simply put, a hacktivist is someone who uses hacking to bring about political and social change. The term “hacktivist” traces back to 1994, originating from the hacker group “Cult of the Dead Cow.”

Hacktivism started as a way for people to protest online to affect change. A hacktivist is motivated by civil disobedience and seeks to spread an ideology. In some cases, this ideology includes total anarchy. Still, hacktivists are typically not motivated by malicious intent. Hacktivists also steal money or data in an effort to spread their agenda. However, their motivation is more like that of Robin Hood. They seek to take from those who have and give freely to those who have not. They typically see themselves as vigilantes who use hacking to enact social justice and policy changes.

Hacktivists employ the same tools and tactics as typical hackers. For example, their tactics can range from spreading a message through simple website defacement or exploitation through the use of Doxing. They may even launch a Distributed Denial of Service (DDoS) attack to bring down entire networks. But unlike normal hackers, hacktivists do not always work alone. Hacktivists can also work as part of a coordinated group or organization. These groups can range in size from a few friends in a basement, to an entire decentralized network of hackers around the world.

Anonymous

One of the largest hacktivist groups in the world today, Anonymous is a far reaching organization of hackers around the globe. First appearing in 2008, Anonymous takes their name after the anonymity created by the internet and their desire to remain unknown. As a result, members of the group often do not even know one another outside the internet. Commonly known for launching coordinated attacks. These attacks can be against corporations, individuals and even government institutions and agencies. Their motive is to use hacking to bring about political or social change.

Most members prefer total anonymity. Therefore they do not publicly announce their participation within the group. However, some members can be distinguished by their use of the well known Guy Fawkes mask. This is usually an attempt to hide their identity in public.

There is no formal membership, hierarchy or structure to the group.  Members join Anonymous because the group represents and fights for what the hacktivist believes in. These “hacker ethics” as they are called, include unrestricted access to information and censorship. In addition, Anonymous also fights for human rights and freedom of speech. Many of its’ members are also digital pirates who believe that software and information should be freely distributed.

Wikileaks

Developed in 2006 by Julian Assange, Wikileaks is a multi-national media platform. They are a self-described non-profit organization which publishes news leaks, censored and even classified information. This information can be related to corporate corruption and cover-ups. They also publish restricted information related to spying and even war crimes committed by governments agencies around the world.

Built as a whistle-blowing platform, Wikileaks is completely anonymous. Claiming to be an Open Source Intelligence agency, their sole purpose is to expose cover-ups, war crimes and even covert government activity to it’s readers over the internet. Wikileaks is essentially the largest doxing website on the internet today.

Wikileaks became famous in 2010 after publishing a series of leaks from US Army Intelligence Analyst Bradly Manning, who now identifies as Chelsea Manning. These leaks contained information and videos about airstrikes, diplomatic cables and various other classified information. As a result, the US Military claimed the leaks compromised national security and convicted Manning of espionage and fraud.

Hacking for Change – Case Study

Some hacktivists do have malicious intent. And in some cases, they are looking to change the outcome of an entire election. On March 19th, 2016, Clinton campaign chairman John Podesta received an email masked as a Google Alert. Podesta eventually followed the instructions and reset his password using the email alert. However, the email was actually a phishing scam sent by Russian hacktivists. Podesta had unknowingly granting access to the servers when he reset his password. Having gained access, hackers were able to access sensitive information on the DNC servers. Three months later, Wikileaks was set to publish a collection of Clinton emails it had received from an anonymous source.

After releasing the emails, hacktivists then launched an influence campaign of misinformation aimed against the Clinton campaign. Designed to undermine public faith, with the intention of harming Clinton’s chances of winning the presidency. In October of 2016, a hacktivist group known as DCLeaks published another collection of emails from one of Clinton’s allies. It was later revealed that this group is actually a front for the Russian Military. Russian hacktivists had in fact attempted to influence the 2016 election.

Conclusion

Hacktivism is hacking for political and social change. Most hacktivists do so seeking to spread an ideology. Most fight against censorship and in favor of freedom of information. But there are those who do so for personal and or political gain. Some hacktivists spread their own ideology, but others do so collectively within a group such as Anonymous. These groups often employ the use of organizations such as Wikileaks to anonymously post information in favor of their ideas and beliefs.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

Tuesday 19 November 2019

Most Hackable Neaby Devices and Gadgets. || techtalksgroup ||

Electrical grids, traffic lights, highway signs, air-traffic control, and even hospital networks—they're the large-scale operating systems we rely on to make our lives easier and better. And believe it or not, they're all connected to the Internet.

These web-connected systems are so diverse in what they do, they fall into a very nondescript category called the "Internet of Things" (IoT). You might have heard of IoT. It's the same term thrown around to describe those cool gadgets that help us track our fitness, drive our cars, share our photos, stream our music, and check our email from almost anywhere. Chances are, no matter what you've done today, you've taken advantage of some device or system connected to the worldwide "web" of the Internet of Things.

However, despite IoT's promising future, it has one very serious setback: it's vulnerable to attack. As much as 70 percent of IoT devices contain security flaws, which means that billions of devices—including yours—could get hacked by online criminals. Here are the devices you own that might be at risk for a cyber attack, and how you can secure them.

Your PC
Every time you connect your PC to the Internet, it's a possible target. Click on a suspicious link from an email or social media message, and your computer could be taken over by malicious software. Cyber criminals could use that malware to download your personal files, steal your banking information, or even spy on you.

How To Protect Your PC: Keep your computer and antivirus software up-to-date. Avoid clicking on links sent by spammy email or social media messages, since they might contain malicious software.

Your Mac
If you're a Mac groupie, you might have been convinced by those smooth-talking reps at the Apple store that your Mac is pretty much invincible. Sure, Apple's built in operating system (called OS X) is very secure—possibly more secure than Microsoft's OS. However, Macs aren't 100% resistant to viruses; they just haven't (yet) been hit by large-scale attacks.

Since PCs have been part of the computing ecosystem for much longer than Macs, cyber crooks have had more time and incentive to exploit their enormous consumer base of individuals, big businesses, and government agencies. As Apple's consumer base continues to grow worldwide, don't be surprised if hackers start looking for ways to infiltrate your Mac.

How To Protect Your Mac: When Apple's operating system (OS X) gets a security bug, Apple typically updates it. Make sure you're running the most recent version of Apple's OS X.

Your Android
Google's Android system lets anyone create and upload an app; it's up to the user to decide whether to trust it. To infiltrate your Android device, hackers just have to create malware that seems legit. That's why, after 79% of Flappy Bird's clone apps were found to contain malware, the game was pulled from app stores last year. Flappy Bird's malicious clone apps allowed cyber criminals to remotely hijack users' phones to steal their contact list, track their location, make phone calls, and even record, send, and receive text messages.

How To Protect Your Android: When you download an app, it's up to you to understand what personal information you're letting the app access from your phone. Take a few minutes to read the app's permissions request. You might see some red flags that indicate it's a malicious app created to steal your phone's personal data.

Your iPhone
While Google leaves their apps open to developers, Apple's mobile iOS builds a "closed garden." That means all apps and accessories they offer in their store have to be approved by Apple.

While that definitely adds a safety net for iPhone and iPad users like you, it doesn't mean you're free from cyber threats. Last year, Apple released a software patch to fix security issues in the iOS 7, its most recent operating system at the time. The security lapse allowed would-be hackers to potentially impersonate a trusted website, without the software flagging the connection as insecure.

Another glitch last year allowed would-be hackers to potentially use website pages, emails, and text messages to trick users into downloading fake apps that could steal their personal information. According to a research study last year, Apple products could also be vulnerable to malware when they're connected to a malware-infected Windows device.

How To Protect Your iPhone or iPad: As with the Mac, make sure you're running the most recent version of Apple's mobile operating system (iOS) on your iPhone or iPad. Also, avoid clicking on any suspicious links or sharing sensitive data on a public Wifi network.

Your Cloud Accounts
Think of the "Cloud" as a storage facility in cyber space. So long as you have a Wifi connection and login information, you can access it from anywhere. But beware: the Cloud's convenience factor also makes it very appealing to hackers. If they find out your login credentials, your personal data is up for grabs.

How To Protect Your Cloud Storage Accounts: If you don't really need certain photos or personal files stored online, don't keep them in the Cloud. Store them on a hard drive instead. If you do use cloud-based software, set up a secure, unique password for each account.

Your Car
Almost 100% of new cars on the market have some type of wireless connection. That's great news if you want to use GPS, connect to Bluetooth, or stream movies to keep your kids quiet on road trips. It's terrifying news if you have any concerns over your security.

Most newer cars use computerized parts that run on the same network. If a hacker got remote access to that network, they could potentially take over the car's operating system. That means you could lose all control over your steering, acceleration, and brakes, even while you're still behind the wheel.

Luckily, the hackers who discovered these security flaws weren't criminals; they were actually funded by the Defense Department to expose automakers' dangerous security oversight. Besides, the hack is still pretty difficult for cyber crooks to pull off on a massive scale, since not all cars use the same operating language or run their parts on a single network. However, it's a scary enough scenario that legislators are asking automakers to step up their car security measures.

How To Protect Your Car: There's not much you can do here. If you're curious about your car's security risks, ask your dealer for more information.

Your At-Home Gadgets (And Home Router)
Think about how often you connect to the web, even when you're unwinding at home. You check email, upload photos, play video games, stream music, and watch movies from your SmartTV. You might even use a home automation system to control your thermostat, alarm system, security cameras, and front or garage doors. When you connect all your gadgets to your home Wifi, do you know how secure they are.

Most likely, they're not nearly as protected as you think. Many of the "smart" devices you use to protect your home have little to no built-in security. Plus, many home networks use passwords that are easily hacked into. Allow cyber crooks to access your home Wifi network, and you might as well hand over the keys to your home. These hackers can now potentially manipulate any devices connected to your home Wifi network.

How To Protect Your Home Gadgets: Secure your router. If you have a default password for your home Wifi network, change your network name and password. Only use apps and features on your smartphone that require a passcode to access them.

Shield Your Devices From Cyber Hackers
As cool as it sounds to have the latest wireless technology in your car, home, and at your fingertips, technology that falls under the umbrella of the "Internet of Things" is just too new and expansive to keep it 100% safeguarded from attack. These ground-breaking devices are developed to stay ahead of the curve, so they're put on the market before cyber security experts can even assess the extent of their security flaws.

In other words, IoT devices are the "gateway gadgets" for hackers to make their move. If you take the right preventive measures, you have a fighting chance to protect your most valuable (and hackable) devices from getting attacked.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.


Wednesday 2 October 2019

What are Red Rooms.? Do they really Exist in the Dark/Deep Web. ?


Red Rooms are basically one of the darkest places on the deep web. It basically charge money in bitcoins for viewing unimaginable videos like murders, rapes etc...

‘Red Room’ sites, the story goes, are darkweb sites where users pay thousands – or tens of thousands – to watch rapes and murders live. Urban legends about the existence of ‘Red Rooms’ have circulated for years – but as yet, there’s no evidence that they exist. If ‘Pay per View’ torture sites do exist, it’s almost certain that they don’t work via Tor (the software used to access dark web sites) – which is too slow to stream video live. The term ‘Red Room’ has been around on the internet for more than  decade – thought to originate either from ‘red rum’/’murder’, or from the 1983 horror film Videodrome, where torture is shown live on satellite TV in a red-painted room.

The video Daisy’s Destruction – widely discussed on forums and on Reddit – is not actually a snuff film, but features horrifying abuse and sexual assault of a young child. It was streamed on so-called ‘Hurtcore’ paedophile sites – where paedophiles watch torture and abuse of children and babies. Its creator, Peter Scully, is in jail in the Philippines. The video called ‘Daisy’s Destruction’ showed the baby girl being tied upside down by her feet, sexually assaulted and beaten by Scully and a masked woman.

In the series of videos, she is whipped and assaulted with sex toys by Peter Scully’s girlfriend – who he met when she herself was a child prostitute. According to the Sydney Morning Herald, the footage was so horrific police called it ‘the worst we have encountered in our years campaigning against child pornography.’ Reports that the video feature ‘Daisy’ being killed are inaccurate – while human remains were discovered at one of Peter Scully’s homes, the girl from the film was rescued alive. The videos were streamed via a paedophile website which hosted torture videos, called Hurt 2 The Core – which boasted 15,000 videos downloads daily. The worst paedophiles – those who uploaded their own material – gained access to a Producer’s Lounge, with the most offensive material.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

Friday 20 September 2019

What is Cookie Stuffing and Ad Fraud Scheme ? || techtalksgroup ||



Cookie Stuffing, also known as Cookie Dropping, is one of the most popular types of fraud schemes in which a website or a browser extension drops handfuls affiliate cookies into users' web browser without their permission or knowledge.


This type of SIVT involves inserting, deleting, or misattributing cookies to manipulate or falsify the prior activity of users. Also known as ‘cookie dropping,’ it pertains to the fraudulent manipulation of visitor cookies to disguise or conceal legitimate user cookies.

Often considered a black hat online marketing technique, cookie stuffing can potentially generate fraudulent affiliate income for the cookie stuffer by overwriting legitimate affiliate cookies. A website visitor may unknowingly receive a third-party cookie from a website unrelated to the one actually visited. Later on, if the visitor goes to a targeted website and completes a qualifying transaction or makes a purchase, the cookie stuffer illegally earns a commission from the targeted site and deprives the legitimate affiliate of its referral commission.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

Acer Nitro 5, A budget gaming latop yet realased. || techtalksgroup ||


Enjoy premium looks without the premium price with the Acer NITRO Gaming notebook (model AN515-52), which features a beautiful exterior. It features a 15.6-inch high-def. display giving you ample space for opening multiple windows and digital entertainment. It's powered by Intel i5 8300H Enjoy smooth multitasking and excellent performance with 8GB installed RAM and 1TB HDD + 256GB SSD with NVIDIA GTX 1050 (4 GB Dedicated GDDR5).

lets take a review of the specifications in detail:-

Technical Details

  • Brand                                         Acer
  • Series                                       Nitro 5
  • Colour                                     Shale Black
  • Item Height                           26 Millimeters
  • Item Width                           39 Centimeters
  • Screen Size                             15.6 Inches
  • Maximum Display Resolution  1920 x 1080 (Full HD)
  • Item Weight                                2.5 Kg
  • Product Dimensions           26.6 x 39 x 2.6 cm
  • Batteries: 1 Lithium ion batteries required. (included)
  • Item model number            AN515-52
  • Processor Brand                          Intel
  • Processor Type                   Core i5 8300H
  • RAM Size                                    8 GB
  • Memory Technology                    DDR4
  • Maximum Memory Supported   32 GB
  • Hard Drive Size                             1 TB
  • Hard Disk Technology                   Mechanical Hard Drive
  • Speaker Description                Optimized Dolby Audio Premium
  • Graphics Coprocessor                    NVIDIA GeForce GTX 1050
  • Graphics Card Ram Size                      4 GB
  • Connectivity Type                        Wi-Fi, Bluetooth-V4, Infrared
  • Wireless Type                                      802.11a/b/g/n/ac
  • Number of USB 2.0 Ports                          2
  • Number of USB 3.0 Ports                          1
  • Number of HDMI Ports                                  1
  • Number of Audio-out Ports                          1
  • Number of Ethernet Ports                          1
  • Voltage                                                         220
  • Card Reader                                           Secure Digital Card
  • Operating System                              Windows 10 Home 64-bit
  • Supported Software                                AcerTrueHarmony
  • Average Battery Life (in hours)                7 Hours
  • Lithium Battery Energy Content             48 Watt Hours
  • Number of Lithium Ion Cells                          4
  • Included Components             Laptop, Battery, AC Adapter, User Guide, Manuals


So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

Friday 6 September 2019

Repeater Vs Hub Vs Bridge Vs Routers Vs Gateway Vs Brouters ... || tech talks group ||

1. Repeater – 

A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before the signal becomes too weak or corrupted so as to extend the length to which the signal can be transmitted over the same network. An important point to be noted about repeaters is that they do not amplify the signal. When the signal becomes weak, they copy the signal bit by bit and regenerate it at the original strength. It is a 2 port device.

2. Hub – 

 A hub is basically a multiport repeater. A hub connects multiple wires coming from different branches, for example, the connector in star topology which connects different stations. Hubs cannot filter data, so data packets are sent to all connected devices.  In other words, collision domain of all hosts connected through Hub remains one.  Also, they do not have intelligence to find out best path for data packets which leads to inefficiencies and wastage.

Types of Hub

Active Hub :- 

These are the hubs which have their own power supply and can clean , boost and relay the signal along the network. It serves both as a repeater as well as wiring center. These are used to extend maximum distance between nodes.

Passive Hub :- 

These are the hubs which collect wiring from nodes and power supply from active hub. These hubs relay signals onto the network without cleaning and boosting them and can’t be used to extend distance between nodes.

3. Bridge –

 A bridge operates at data link layer. A bridge is a repeater, with add on functionality of filtering content by reading the MAC addresses of source and destination. It is also used for interconnecting two LANs working on the same protocol. It has a single input and single output port, thus making it a 2 port device.

Types of Bridges

Transparent Bridges :- 

These are the bridge in which the stations are completely unaware of the
bridge’s existence i.e. whether or not a bridge is added or deleted from the network , reconfiguration of
the stations is unnecessary. These bridges makes use of two processes i.e. bridge forwarding and bridge learning.

Source Routing Bridges :- 

In these bridges, routing operation is performed by source station and the frame specifies which route to follow. The hot can discover frame by sending a specical frame called discovery frame, which spreads through the entire network using all possible paths to destination.

4. Switch –

 A switch is a multi port bridge with a buffer and a design that can boost its efficiency(large number of  ports imply less traffic) and performance. Switch is data link layer device. Switch can perform error checking before forwarding data, that makes it very efficient as it does not forward packets that have errors and  forward good packets selectively to correct port only.  In other words, switch divides collision domain of hosts, but broadcast domain remains same.

5. Routers –

 A router is a device like a switch that routes data packets based on their IP addresses. Router is mainly a Network Layer device. Routers normally connect LANs and WANs together and have a dynamically updating routing table based on which they make decisions on routing the data packets. Router divide broadcast domains of hosts connected through it.

6. Gateway – 

A gateway, as the name suggests, is a passage to connect two networks together that may work upon different networking models. They basically works as the messenger agents that take data from one system, interpret it, and transfer it to another system. Gateways are also called protocol converters and can operate at any network layer. Gateways are generally more complex than switch or router.

7. Brouter –

 It is also known as bridging router is a device which combines features of both bridge and router. It can work either at data link layer or at network layer. Working as router, it is capable of routing packets across networks and working as bridge, it is capable of filtering local area network traffic.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

Sunday 1 September 2019

Top 10 Countries with highest number of Jobs.


One of the most important decision a person has to take is finding a good job and professional environment. Long time ago people used to work for one employer their entire life and usually it used to be where they were born. Nowadays technology and modern way of life gives the opportunity to have much more options to choose from. More liberal Legislations and democracy gives a lot to people who want to have the career and professional development they want in the country they want to live and have happy life. Boundaries are not obstacles any more Visa and work permits are not obstacles as well/check visafirst.com/

There are a number of countries which economies are growing and they need professionals to help fill their needs of good work force. In this research the top 2 positions are occupied by Asian countries.


  • Singapore
  • Hong Kong
  • United Arab Emirates
  • Australia
  • USA
  • France
  • China
  • Netherlands
  • UK
  • Mexico


The leader in this research Singapore has huge needs in telecommunications and IT sector. The stable economy and good business relations of the country on global level creates a lot of opportunities for qualified people.

The runner up Hong Kong is famous for its global trading and business environment as well as great tourist destination which provides a lot of opportunities for young and ambitious people who want to explore new culture and have some Asian experience with global business environment.

3rd place is for United Arab Emirates. This country has a lot of resources mainly thanks to its oil. There are a lot of huge projects financed by the government and a lot of opportunities in the oil and engineering sectors as well as construction building. The huge demands of those industries and endless resources leads to good salaries for people that are not afraid of the hot climate.

Number 4 is for Australia a vast country with endless needs for people in any sector of business and skill sets.

The surprising country here is Mexico. Famous for its culture, good climate and famous tourist destination. The country has 14th largest economy and is in top 10 for production of electronics and computers globally. The oil industry is very well developed taking 6th place in the world. This makes this economy appealing for qualified workers.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit