Articles by marojkannaa999@gmail.com

Around The World

A new bug in mac os

A new vulnerability has been found in macOS version 10.13.2 that enables anyone with access to your Mac to unlock App Store system preferences using any username and password as long as you are logged in as a local admin. This means that if your account is an admin and you leave the machine unattended, anyone with malicious intent can change the App Store settings on the Mac without your knowledge. The bug has been…

Around The World

Prisoners made pc from the E-waste in prison

I know it’s hard to imagine your life without the Internet, and the same was the case of two Ohio prisoners who built personal computers from parts from e-waste, hid them in the ceiling, and connected those PCs to the Internet via the prison’s network. The incident occurred in 2015 but has now been made public by the State of Ohio’s Office of the Inspector General, which published a 50-page report  on Tuesday, following almost…

Around The World

Bug Bounty Programs list

Reward Programs AT&T – http://developer.att.com/developer/apiDetailPage.jsp?passedItemId=10700235 (To submit you need to sign up to the free Developer API program) Avast! – http://www.avast.com/bug-bounty Barracuda – http://barracudalabs.com/ Coinbase – https://coinbase.com/whitehat Chromium Project – http://www.chromium.org/ CrowdShield – https://crowdshield.com/ Cryptocat – https://crypto.cat/bughunt/ Facebook – http://www.facebook.com/whitehat/ Etsy – http://www.etsy.com/help/article/2463 Gallery – http://codex.gallery2.org/Bounties Ghostscript – http://ghostscript.com/Bug_bounty_program.html (Mostly software development, occasional security issues) Google – http://www.google.com/about/company/rewardprogram.html Hex-Rays – http://www.hex-rays.com/bugbounty.shtml IntegraXor (SCADA) – http://www.integraxor.com/blog/integraxor-hmi-scada-bug-bounty-program LaunchKey – https://launchkey.com/docs/whitehat Marktplaats – http://statisch.marktplaats.nl/help/ Mega.co.nz – http://thenextweb.com/insider/2013/02/01/kim-dotcom-puts-up-13500-bounty-for-first-person-to-break-megas-security-system/ Meraki…

Around The World

stay alert from wireless Attacks

Three general wireless attacks are to use a fake access point (AP), or use a fake AP with a static extended service set ID (ESSID), or use a fake AP and an “evil twin.” All can be set up and executed instantly. By setting up the fake AP, a hacker can obtain complete control over all TCP/IP connections passing through it. At that point, intercepting network traffic and capturing or changing it becomes useless. With…

Security

Free antivirus software from government of india

The government of India has launched the “Make In India”, “Swachh Bharat” and “Digital India” initiatives with a holistic approach towards all areas. Be it cleaning our environment (Swach Bharat) to launching our own rockets, we are making great progress in all areas of technology. Well, with power comes responsibility. With the advent of 4G and 3G data, our venture into the world of Internet is growing every day. We have over 1 billion mobile…

Hacking News

Apple devices under risk:Turkish crime family

If you use iCloud to sync your Apple devices, your private data may be at risk of getting exposed or deleted by April 7th. It has been found that a mischievous group of hackers claiming to have access to over 300 million iCloud accounts is threatening Apple to remotely wipe data from those millions of Apple devices unless Apple pays it $75,000 in crypto-currency or $100,000 worth of iTunes gift cards. The hacking group, who…

Security

protect your own privacy from ISPs,Advertisers,government

Now more than ever, your online privacy is under attack. ISPs, advertisers and governments around the world are increasingly interested in knowing exactly what you’re up to when you browse the web. How can you stay safe in such times? [tribulant_slideshow gallery_id=”1″] TOR BROWSER Tor is a free web browser for enabling anonymous communication.It aims to conceal its users’ identities and their online activity from surveillance and traffic analysis by separating identification and routing. It…

Around The World

Companies that offers highest paying internships

According to the data and reviews submitted on career website Glassdoor, tech companies like Dropbox, Facebook, and Pinterest offer the highest paying internships. Are you highly qualified and looking for a great tech internship that pays a lot? Well, you’re at the right place. Here, I’m going to tell you about the tech companies that offer highest paying internship programs. Uber – $6,730/month/month A former Nest intern says that the company has really smart engineers…

Technology

Screen recording software for windows

Screenr (Free) Unlike other software screenr has nothing to do with you computer or install on your computer. It is a free online tool where you can record your screen without installing any software on online. It requires Java and you can record upto 5mins maximum. Rylstim Screen Recorder (Free) Rylstim Screen Recorder is simple software that just records your screen after you hit “Start Record” This software does’nt record input device like microphone. Rylstime is…

Around The World

Programming languages useful for Hacking

Since programming is essential for hacking because a hacker is someone who breaks a protocol or an application security which is programmed in a certain programming language and to hack an application a hacker needs to understand the logic of that app, find flaw and the exploit it. So a hacker must learn a couple of programming languages to complete his task. So checkout the important programming languages for hackers and where to apply it….