Skip to main content

Posts

Showing posts from September, 2015

Best iOS 9 Features That Will Change Your iPhone and iPad (CTech)

Take a look at the iOS 9 features and tell us your favorites: 1. Low power mode for extra and better battery life: I decided to write this iOS 9 feature before any other as it will be appreciated and loved by most of you. The new low power mode will make your phone run longer by disabling mail fetch, background app refresh, lower visual effects and automatic downloads. The great news is that you can still use almost all useful features of your phone like Wi-Fi, Location Services, Bluetooth, GPS etc. In the new power saver mode, the screen sleeps a little quicker along with other subtle changes to give you the extra juice. 2. iOS 9 update for everyone and smaller in size: This isn’t exactly an iOS 9 feature, but it’s surely worth mentioning. Usually, every new iOS version isn’t available for all previous generations of iOS devices.  But, iOS 9 will be available for devices like iPad 2, iPhone 4S,  iPad Mini and iPad touch 5th gen- i.e. all will be g

The History of Apple mac OS Malware (CTNews)

Mac Malware : A Brief history of malware for Apple’s Mac OS from 2004 to present Mac users are pretty sure Apple’s integrated systems will never encounter any malware, how true is that? Lets check a brief history of Mac malware. Microsoft Windows users were the ones who were mostly affected with the computer malware, trojans, viruses. Just a few decades back, Mac users, on the contrary, would always feel proud to be using the right equipment because they believed Apple’s integrated systems would never encounter any malware. However, security researchers would tell us a different story.  Few decades back, Microsoft Window’s larger user base made it easy for hackers to target the user of this OS. However, now Apple’s market and in turn Mac users are also growing and at the same time Mac-oriented malware too is gaining popularity. This article is a recap of Apple’s complicated history with malware. 2004: Renepo: A shell script worm : This was designed specific

Hackers Won’t Stop: 888 Data Breaches So Far In 2015 and 246 Million Records Lost (CTNews)

The first half of 2015 has been rocked by 888 incidents data breaches so far, leading to 245.9 million records compromised worldwide, as surveyed by Gemalto. It looks as if there is no end to hack attacks. As of today, data or information values much higher than money. The immense number of security breaches and hack attacks just prove the point. This year has seen a circumstantial increase in the malicious cyber attacks over the several governments  and private firms. Gemalto , a digital security firm has revealed in its study that in the first half of 2015, there were 888 data breaches leading to 245.9 million records compromised worldwide. What’s worrying is that in approximately 50% of the cases, the amount of data exposed is still unknown. According to IBM, hackers frequently use Tor network for launching hack attacks . The biggest data breach of this year exposed 78.8 million identity records from Anthem Insurance comprising 32% of the total theft. This

How to Install and run Kali Linux on any Android Smartphone

Tutorial for installing and running Kali Linux on Android smartphones and tablets Kali Linux is one the best love operating system of white hat hackers, security researchers and pentesters. It offers advanced penetration testing tool and its ease of use means that it should be a part of every security professional’s toolbox. Penetration testing involves using a variety of tools and techniques to test the limits of security policies and procedures. Now a days more and more apps are available on Android operating system for smartphones and tablets so it becomes worthwhile to have Kali Linux on your smartphone as well. Kali Linux on Android smartphones and tablets allows researchers and pentesters to perform ” security checks” on things like cracking wep Wi-Fi passwords, finding vulnerabilities/bugs or cracking security on websites.  This opens the door to doing this from a mobile device such as a phone or a tablet. You can also install Kali Linux Distribution

IBM and GENCI team up to work on next-Gen Exascale Computin (CTNews)

IBM and GENCI collaborate to work on Next-Gen Exascale Computing The Joint venture aims at developing scientific applications that would succeed in taking the supercomputing to a billion calculations per second which is also termed as “Exascale computing”. International Business Machines Corporation, commonly known as IBM, is a well known American multinational corporation which has teamed up with a French high-performance computing agency known as GENCI, to work on next-Gen “Exascale Computing”. GENCI was established by the government of France in the year 2007. The main aim behind this establishment was to ensure proper coordination of the major equipment of the high performing computing centers of France by providing them the essential funds. Besides France also wanted to be among the leading international countries who were into the development of next-Gen computing technologies. What is Exascale computing:  Computer scientists explain that if a compu

How To Access Blocked Websites? 6 Easy Ways

If you also feel stifled by the blocked websites then here are some ways to access blocked websites: 1. Become Anonymous: Use Proxy Websites A proxy website becomes a moderator between the user and server site. The proxy website camouflages the blocked site from the ISPs and allows you to access blocked websites. To get a proxy website for any blocked site, just perform the Google search. Eg: Facebook Proxy Server. In case, Facebook is blocked in your institution, or you can go to http://www.spysurfing.com / http://proxify.us/p / and more… 2. Use VPN VPN or Virtual Proxy Network allows you to connect your device to a secure connection to another network over the internet. VPN enables you to access blocked websites from your home network and puts your IP address in a land far away. You can also download the apps or open the sites blocked in your country. 3. Use IP Rather Than URL The blocked website sometimes are stored as a list of URLs and usin

The Top Ten Hacker Tools of 2015 (CTNews)

Cyber Hacking (“Cyber Security” formally) there are millions of tools which are available on the Internet either as Freewares or as Sharewares. If you are security researcher, pentester or a system admin, you need to have this on your PCs/laptops to find the vulnerabilities and plug them.  Concise Courses conducted an online poll to determine top ten hacking tools out of some of the famous ones. Here is the list which came out the winner on the poll. 1. Nmap:  Network Mapper Abbreviated as nmap is a versatile tool for Network Security, plus it is free and open source.It  is largely used by network administrators for network discovery and security auditing. System admins use nmap for network inventory, determining open ports, managing service upgrade schedules, and monitoring host(A term used for “a computer on a network”) or service uptime. The tool uses raw IP packets in many creative ways to determine what hosts are available on the network, what servic

Meet Mycroft – World’s 1st Open Source Artificial Intelligence Based on Linux, Raspberry Pi and Arduino (CTNews)

Mycroft makes use of natural language processing for listening to your commands and run world’s first open source and open hardware home A.I. platform. Talking about the plus points, this state of art A.I. based on the world’s most popular open development platforms-  Arduino  and  Raspberry Pi. You can use Mycroft to control your music streaming apps, YouTube playback and your smart devices. The  Internet of Things  devices  could be easily integrated with Mycroft.  On its Kickstarter page, Mycroft writes: Mycroft is an open source, open hardware platform that allows the makers and developers to fiddle with their innovative ideas and use Mycroft to turn those into reality. Since Mycroft is powered by Raspberry Pi 2 and makes use of an Arduino powered display, there are tons of tutorials and other useful material online to learn from. Let’s know some more facts about Mycroft and how it’s going to change the things in the AI market: Mycroft is affordable and price

Top 5 Supercomputers Of The World (CTNews)

Supercomputers of today are the retrogressive image of the one’s in 1960s i.e. a gigantic machine racking up an entire room with a huge screen and hundreds of wires and buttons. S ure, modern computers look like a stack of books in a library, but the computing prowess of these babies is outrageous. The processing power of the latest Supercomputers  is calculated in Petaflops ( ability to do one quadrillion floating point operations per second). Let’s begin the top 5 list of Supercomputers of this generation. 5. Mira (USA) Mira is IBM’s self-built Supercomputer that has the peak performance of 8.6 petaflops. At Argonne National Laboratory, US, it uses IBM’s BlueGene/Q platform with 786,000 core processors. 4. K Computer ( Japan) A t 10.5 petaflops, Fujitsu’s K computer is located at Japan’s RIKEN Advanced Institute for Computational Science. With 705,000 SPARC64 VIIIfx octo-core processors, K computer performs scientific operations including g