Skip to main content

Posts

Best iOS 9 Features That Will Change Your iPhone and iPad (CTech)

Take a look at the iOS 9 features and tell us your favorites: 1. Low power mode for extra and better battery life: I decided to write this iOS 9 feature before any other as it will be appreciated and loved by most of you. The new low power mode will make your phone run longer by disabling mail fetch, background app refresh, lower visual effects and automatic downloads. The great news is that you can still use almost all useful features of your phone like Wi-Fi, Location Services, Bluetooth, GPS etc. In the new power saver mode, the screen sleeps a little quicker along with other subtle changes to give you the extra juice. 2. iOS 9 update for everyone and smaller in size: This isn’t exactly an iOS 9 feature, but it’s surely worth mentioning. Usually, every new iOS version isn’t available for all previous generations of iOS devices.  But, iOS 9 will be available for devices like iPad 2, iPhone 4S,  iPad Mini and iPad touch 5th gen- i.e. all will be g
Recent posts

The History of Apple mac OS Malware (CTNews)

Mac Malware : A Brief history of malware for Apple’s Mac OS from 2004 to present Mac users are pretty sure Apple’s integrated systems will never encounter any malware, how true is that? Lets check a brief history of Mac malware. Microsoft Windows users were the ones who were mostly affected with the computer malware, trojans, viruses. Just a few decades back, Mac users, on the contrary, would always feel proud to be using the right equipment because they believed Apple’s integrated systems would never encounter any malware. However, security researchers would tell us a different story.  Few decades back, Microsoft Window’s larger user base made it easy for hackers to target the user of this OS. However, now Apple’s market and in turn Mac users are also growing and at the same time Mac-oriented malware too is gaining popularity. This article is a recap of Apple’s complicated history with malware. 2004: Renepo: A shell script worm : This was designed specific

Hackers Won’t Stop: 888 Data Breaches So Far In 2015 and 246 Million Records Lost (CTNews)

The first half of 2015 has been rocked by 888 incidents data breaches so far, leading to 245.9 million records compromised worldwide, as surveyed by Gemalto. It looks as if there is no end to hack attacks. As of today, data or information values much higher than money. The immense number of security breaches and hack attacks just prove the point. This year has seen a circumstantial increase in the malicious cyber attacks over the several governments  and private firms. Gemalto , a digital security firm has revealed in its study that in the first half of 2015, there were 888 data breaches leading to 245.9 million records compromised worldwide. What’s worrying is that in approximately 50% of the cases, the amount of data exposed is still unknown. According to IBM, hackers frequently use Tor network for launching hack attacks . The biggest data breach of this year exposed 78.8 million identity records from Anthem Insurance comprising 32% of the total theft. This

How to Install and run Kali Linux on any Android Smartphone

Tutorial for installing and running Kali Linux on Android smartphones and tablets Kali Linux is one the best love operating system of white hat hackers, security researchers and pentesters. It offers advanced penetration testing tool and its ease of use means that it should be a part of every security professional’s toolbox. Penetration testing involves using a variety of tools and techniques to test the limits of security policies and procedures. Now a days more and more apps are available on Android operating system for smartphones and tablets so it becomes worthwhile to have Kali Linux on your smartphone as well. Kali Linux on Android smartphones and tablets allows researchers and pentesters to perform ” security checks” on things like cracking wep Wi-Fi passwords, finding vulnerabilities/bugs or cracking security on websites.  This opens the door to doing this from a mobile device such as a phone or a tablet. You can also install Kali Linux Distribution

IBM and GENCI team up to work on next-Gen Exascale Computin (CTNews)

IBM and GENCI collaborate to work on Next-Gen Exascale Computing The Joint venture aims at developing scientific applications that would succeed in taking the supercomputing to a billion calculations per second which is also termed as “Exascale computing”. International Business Machines Corporation, commonly known as IBM, is a well known American multinational corporation which has teamed up with a French high-performance computing agency known as GENCI, to work on next-Gen “Exascale Computing”. GENCI was established by the government of France in the year 2007. The main aim behind this establishment was to ensure proper coordination of the major equipment of the high performing computing centers of France by providing them the essential funds. Besides France also wanted to be among the leading international countries who were into the development of next-Gen computing technologies. What is Exascale computing:  Computer scientists explain that if a compu

How To Access Blocked Websites? 6 Easy Ways

If you also feel stifled by the blocked websites then here are some ways to access blocked websites: 1. Become Anonymous: Use Proxy Websites A proxy website becomes a moderator between the user and server site. The proxy website camouflages the blocked site from the ISPs and allows you to access blocked websites. To get a proxy website for any blocked site, just perform the Google search. Eg: Facebook Proxy Server. In case, Facebook is blocked in your institution, or you can go to http://www.spysurfing.com / http://proxify.us/p / and more… 2. Use VPN VPN or Virtual Proxy Network allows you to connect your device to a secure connection to another network over the internet. VPN enables you to access blocked websites from your home network and puts your IP address in a land far away. You can also download the apps or open the sites blocked in your country. 3. Use IP Rather Than URL The blocked website sometimes are stored as a list of URLs and usin

The Top Ten Hacker Tools of 2015 (CTNews)

Cyber Hacking (“Cyber Security” formally) there are millions of tools which are available on the Internet either as Freewares or as Sharewares. If you are security researcher, pentester or a system admin, you need to have this on your PCs/laptops to find the vulnerabilities and plug them.  Concise Courses conducted an online poll to determine top ten hacking tools out of some of the famous ones. Here is the list which came out the winner on the poll. 1. Nmap:  Network Mapper Abbreviated as nmap is a versatile tool for Network Security, plus it is free and open source.It  is largely used by network administrators for network discovery and security auditing. System admins use nmap for network inventory, determining open ports, managing service upgrade schedules, and monitoring host(A term used for “a computer on a network”) or service uptime. The tool uses raw IP packets in many creative ways to determine what hosts are available on the network, what servic