Posts

Oracle's Micros Payement system Hacked

The risks associated with data breaches continue to grow, impacting a variety of industries, tech firms, and social networking platforms. In the past few months, over 1 Billion credentials were dumped online as a result of mega breaches in popular social networks.  Now, Oracle is the latest in the list.  Oracle has confirmed that its MICROS division – which is one of the world's top three point-of-sale (POS) services the company acquired in 2014 – has suffered a security breach.  Hackers had infected hundreds of computers at Oracle's point-of-sale division, infiltrated the support portal used by customers, and potentially accessed sales registers all over the world.  The software giant came to know about the data breach after its staff discovered malicious code on the MICROS customer support portal and certain legacy MICROS systems. Hackers likely installed malware on the troubleshooting portal in order to capture customers' credentials as they logged in.  Thes...

5 Best Hacks From The Black Hat 2016

Image
At the Black Hat 2016 hacker conference in Las Vegas, the world saw a variety of cutting-edge cyber security applications. Some of these hacks stood out from the others and gained widespread praises. Here’s a quick recap of the 5 best Black Hat 2016 hacks, including the likes of famous Jeep Cherokee hackers and a hacking laptop that actually flies. T he annual Black Hat USA  conference is known to welcome thousands of cyber security experts, hackers, and technology enthusiasts. Every year we get to see and learn about new cyber-exploits and hacking threats. At this year’s conference, more than 15,000 hackers and security professional gathered in Las Vegas. The Mandalay Bay hotel witnessed some scary and impressive sights. So, here are some of the best hacks that stood out from the rest: Car hackers were back! Do you remember the hacker duo of Charlie Miller and Chris Valasek who hacked into a Jeep Cherokee by exploiting a zero-day in the system? This year...

Best KickassTorrents Alternatives — Top 10 Torrent Websites Of 2016

We have been regular in publishing the lists of best torrent websites on the internet for the last two years. The year 2016 reached has its second half, so we thought to update the list with any latest additions. Continuing the legacy further, we are now writing about the top 10 most popular torrent websites of 2016 which are also the alternatives to the dead KAT. B efore starting the compilation, let us guide you through the recent updates in the torrent world. We are well aware of the KickassTorrents losing its life and then coming back from the dead with new domain names  Dxtorrent  and KAT.am . This happened due to the arrest of its alleged founder , Artem Vaulin. Following the takedown of KickassTorrents, the movie streaming website Solarmovie also disappeared from the internet.Torrents are a good medium to share files over the internet but people have used them to promote distribution of illegal content and earn money from it. Do keep in mind, using a torr...

Hackers Can Hack Facebook Messenger App To Read Or Alter Messages

Security researchers find hacking backdoor to Facebook Messenger App Private messages that your send through your Facebook Messenger can be read by potential hackers using a hacking backdoor in the app. This backdoor vulnerability was found by the security researchers from Check Point , who will demo it at the Infosecurity Conference to be held today afternoon . The security hole if unpatched could put 900 million people who use Facebook Messenger, at risk. The vulnerability was found by Check Point security researcher Roman Zaikan. Zaikan said that the backdoor allows a potential hacker to launch a man-in-the-middle (MiTM) attack into Facebook Messenger and spy/read messages without either the sender or the reader  knowing it. The hacker could also alter the messages for their own malicious gain. Check Point’s report on the security flaw warns it “could have a severe impact on users due to Facebook’s vital role in everyday activities worldwide.” Fac...

Here Is How Hackers Bypass Google’s Two-Factor Authentication

Hackers Bypass Google’s Two-Factor Authentication By Taking Social Engineering To A New level You may have read reports of Gmail accounts being hacked despite the user having enabled the famed Google 2FA or two-factor authentication. This is because hackers are employing a new strategy to lure gullible users to hand over the 2FA code. Some people can be tricked into disclosing their two-factor authentication code to criminals, as there is a new sly trick that makes them think that are in fact protecting their accounts while doing so. Two-factor authentication (referred 2FA) is an important safety measure current mainstream of online services, from banks to Google, Facebook, and government agencies who have gradually adopted the security measures. In the two-factor authentication to protect the account needs to log operation when you need to enter a verification code to send SMS text messages, or even enter the correct password will be blocked by the system. The l...

Who Were the First 10 Employees Of Apple and What Happened to Them?

Image
Each of the first 10 employees of Apple had made outstanding contributions to Apple in the field of design, funding, coding and developing unique power supply. In this article, we are telling you about them and where are they today. W e all know about the heights that Apple has reached today, but not many of us know that even if Steve Jobs was the driving force behind Apple, there was a wonderful team of talented people to support him.This first 10 Apple employee list is prepared by Business Insider and the first Apple CEO Michael Scott.  BI  writes about the employee list, “The Apple employee numbers aren’t the order each person joined the company.” Actually, when the first Apple CEO Michael Scott came to the company, he gave out numbers to each employee to make the “life easier for the payroll department.” In this article, we are telling you about the first 10 employees of Apple and where are they today. Take a look: 1. Steve Wozniak- ...

MIT App Inventor — How To Develop Awesome Android Apps Without Coding

Image
MIT App Inventor is a groundbreaking tool for developing Android applications without any prior programming and coding skills. Using this open source tool, one can convert his/her creative ideas into Android applications. As this utility is browser and cloud-based, you don’t need to download any software or store anything on your computer. A pp development is one of the most in-demand technical skills. However, making a polished and responsive app that’s free from bugs isn’t always simple. To develop a native mobile app , one also needs to have a clear idea of multiple aspects like the market for that app, available resources, and skills needed to write that app.Android app development isn’t any different from this opinion. However, if you’ve got your creative energy flowing and you have a bright idea in mind, all you need to do is grab a proper tool, start learning, and implement your ideas. But, what if you come from a non-coding background? Worry ...

Job Simulator creator Owlchemy Labs raises $5 million for VR games

Owlchemy Labs , the maker of the hilarious Job Simulator virtual reality game, has raised $5 million in funding from Qualcomm and others. The Austin, Texas-based startup aims to create premium VR games across multiple platforms. In addition to Qualcomm Ventures, investors include HTC, The VR Fund, Colopl Next, Capital Factory, and other Austin technology investors. Owlchemy will use this investment to grow its content development teams, create original VR software, and build technology that pushes the limits of VR across multiple platforms. Owlchemy is continuing to expand Job Simulator with new content, and it recently announced a partnership with Cartoon Network’s Adult Swim to bring hit animated series Rick and Morty into virtual reality. “VR has been a deep passion of ours for many years, and being at the forefront of designing new virtual worlds is truly a dream for our whole team,” says Owlchemy Labs CEO Alex Schwartz in a stateme...

900 Million+ Android Phones affected with Quadrooter Flaw, How to Check your Phone

Image
Quadrooter, as the name suggests, is a set of four vulnerabilities affecting Android devices running on Qualcomm chipsets. So using any of these four vulnerabilities, an attacker can exploit a device by gaining root access to users’ phone. It is reported that over 900 million Android devices running on these Qualcomm chipsets. Qualcomm also launched the new Snapdragon 821 recently, which is upto 10 percent powerful than the 820. Yes, that’s a lot of devices, and all these are affected by the ‘high’ risk privilege escalation vulnerabilities. With this, it would be easy for an attacker to trick the user into installing a malicious application. If any of these flaws are successfully exploited, then the attacker can gain root access. This would give a full access to the affected device to the attacker. This also includes all the Data, hardware like Microphone and camera. Popular devices affected by this Vulnerability: So as mentioned earlier, the devices running Qual...

A Malware Infecting More than 10 Million Android Phones and Tablets – Is Yours One of Them?

Image
A malicious program, developed by an extremely ordered Chinese hacking group, has taken the influence of more than 10 million Android phones, which the collective is using to zone more than a $250,000 a month. The group of hackers, which the experts say is in charge of creating the HummingBad malware system, has made a name for themselves in the hacking world. Known as the Yingmob, the hacking organization is also thought to be the people behind the Apple’s malware campaign, generally known as Yispecter. The hacking group is highly organized and operates along with an established Chinese marketing company. SAFE HACKING Image Source: The Guardian – Once malware has control of device it can force it to download apps and tap adverts to generate fraudulent advertising revenue potentially without user’s knowledge. Initially, the malware first came into the spotlight in February this year. The malware also contains a complex program that has the ability to boot up be...

Yet another set of Android security vulnerabilities has been discovered in Qualcomm chipsets that affect more than 900 Million Android smartphones and tablets worldwide.

Android has Fallen! Yet another set of Android security vulnerabilities has been discovered in Qualcomm chipsets that affect more than 900 Million Android smartphones and tablets worldwide. What's even worse: Most of those affected Android devices will probably never be patched. Dubbed " Quadrooter ," the set of four vulnerabilities discovered in devices running Android Marshmallow and earlier that ship with Qualcomm chip could allow an attacker to gain root-level access to any Qualcomm device. The chip, according to the latest statistics, is found in more than 900 Million Android tablets and smartphones. That's a very big number. The vulnerabilities have been disclosed by a team of Check Point researchers at the DEF CON 24 security conference in Las Vegas. Critical Quadrooter Vulnerabilities: The four security vulnerabilities are: CVE-2016-2503 discovered in Qualcomm's GPU driver and fixed in Google's Android Security Bulle...

Best CMD commands used in hacking

Top CMD or MS-DOS prompt commands which every hacker should know If you have been following Techworm regularly, chances are you are a very versatile hacker in your own right and don’t need to know these commands. But many of our readers who are beginners and want to learn hacking always ask us for the top Dos Prompt (C:/ or CMD commands in Windows 10/7/8.1) they should know. So here goes. CMD is a power tool which lets you do almost anything with your PC/laptop. There are common commands like CD.. and MD etc which you probably know so we wont get into that. Here are some really useful things a hacker can do with CMD commands. First, open your Network Connection and right click and select Properties . Then Select TCP/IP and click Properties again. Now Click on Advanced and WINS tab. Select Default for NeBIOS . Now back to the main Local Area Connection window, select File and Print Sharing for Microsoft Networks and hit enter. This is just to make sure you have ...

C++17: New Features Coming To 33-Year-Old Programming Language

The C++17 standard is taking shape and adding new features to the vintage programming language. This major update aims to make C++ an easier language to work with and brings powerful technical specifications. I f you are fond of the relatively newer programming languages like Apple’s Swift, you might be too comfortable calling C++ a bloated programming language. To tackle such questions and improve the support for large-scale software, C++17 is expected to ship in 2017.At the recent standards meeting in Oulu, Finland, the actual and final features list of C++ has been finalised. As a result, C++17 has become a major release just like C++98 and C++11. The new C++ 17 standards are introducing new features like structured bindings and if initialisers, making this vintage programming language “feature complete”. The C++ community is calling C++17 the start of a new era that will bring powerful technical specifications. The non-C++17 features will be released la...

This Guy Hacks A Hydro-Electric Generator To Charge His Smartphone

Real-Life MacGyver Hacks Together a Hydro-Electric Generator To Charge His Device One of the most common problems that one faces with its smartphone is the battery life. Thanks to the numerous social media, games and other apps that one has on its smartphone, the battery keeps getting drained secretly while running these apps in the background. As a result, we end up charging our smartphones more than two to three times in a day. So, what do you do when you are out trekking, or on a wildlife expedition and your smartphone is running out of battery and there are no power outlets to charge your device? In such a scenario, all you require is a little inventiveness that can turn random junk into a working hydro-electric generator. That is what YouTuber Thomas Kim showed in a video posted on YouTube. In the video, he demonstrated how he MacGyver’d some water bottles, disposable platters, 3 Phase stepping motor, rectifier circuit, metal pipes, and other materials into t...

This lady is paid to create earthquakes and terrorist attacks at Google

Meet the Director of DiRT team at Google who is paid to create worst chaos scenarios How would Google employees react if aliens were to invade earth, or an earthquake destroyed California? Tomorrow if an asteroid were to strike Earth, Google wants you to know that it will still be there for you. For this purpose, it has a special chaos creating a team made up of  a group of 10 Google engineers go around purposely wreaking havoc just to see what happens. The woman behind this team called DiRT (Disaster Recovery Testing) Team is Kripa Krishnan and through this process, the team makes sure that Google can keep itself running no matter what happens. Kripa and her team create all kinds of doomsday scenarios possible for Earthlings. Sometimes DiRT makes Martians invade the earth. Other times they create earthquake or a chemical attack. The DiRT teams work is to strik internally at Google targets without giving a warning just like your local police con...

Auto-pilot saved my life says Tesla car owner

Man says Tesla Autopilot saved his life by driving him to the hospital While we were all dissing Tesla for the death of a car owner due to Tesla’s autopilot, there is some good news from another part of United States. A Tesla owner from Missouri man says that the Tesla Autopilot helped saved his life by driving him to the hospital during a life-threatening emergency. Joshua Neally is a lawyer and Tesla owner from Springfield, Missouri, who often uses the semi-autonomous driving system called Autopilot on his Tesla Model X. One fine day, when Neally was driving his Tesla Model X, he developed a potentially fatal blood vessel blockage in his lung. The disease is called pulmonary embolism and could have taken his life but for Tesla’s autopilot. Neally told Slate that Autopilot drove him 20 miles down a freeway to a hospital. The hospital was right off the freeway exit, and Neally was able to steer the car the last few meters and check himself into the emergenc...

Microsoft won’t fix Windows flaw that lets hackers steal your username and password

The flaw, which allows a malicious website to extract user passwords, is made worse if a user is logged in with a Microsoft account. A previously disclosed flaw in Windows can allow an attacker to steal usernames and passwords of any signed-in user — simply by tricking a user into visiting a malicious website. But now a new proof-of-exploit shows just how easy it is to steal someone’s credentials. The flaw is widely known, and it’s said to be almost 20 years old. It was allegedly found in 1997 by Aaron Spangler and was most recently resurfaced by researchers in 2015 at Black Hat, an annual security and hacking conference in Las Vegas. The flaw wasn’t considered a major issue until Windows 8 began allowing users to sign into their Microsoft accounts — which links their Xbox, Hotmail and Outlook, Office, and Skype accounts, among others. Overnight, the attack got larger in scope, and now it allows an attacker to conduct a full takeover of a Microsoft account.

How To Free Up To 20GB Space After Windows 10 Anniversary Update?

Image
The Windows 10 Anniversary update is huge and comes with lots new features. But, a lot of space is consumed by the leftover Windows files. You can delete them by using the Disk Cleanup utility present in Windows 10 and free up to 20GB space. W indows 10 Anniversary Update was released on August 2 with some freezes and crashes . The update comes with a plethora of features which were not a part of earlier Windows versions.After a large Windows update, a huge amount of space is consumed by the files from the previous Windows installation. This happens if you use the internal Windows update for upgrading rather performing a clean install using a bootable disk. You can rid of the unnecessary data and free some space on your computer using the Disk Cleaner Utility: Open This PC/My Computer . Right Click on your Windows installation drive (For example, C in my case). Click Properties . Click Disk Cleanup . In the Disk Cleanup window, click Clean up system files . Make ...

Why Do All Airplane Windows Have A Tiny Hole In Them?

Having a hole anywhere on a plane seems a terrible idea, so why there is a tiny gap in the windows? The experts explain the crucial role they play If you’ve ever stared out the window as your plane takes off, you will have seen a tiny hole in your window. At first, it may seem like a weird addition, especially in something that’s carrying a lot of people at a great height, but they’re there for a very important reason: to stop the cabin from depressurizing. ADVERTISING inRead invented by Teads Cruising at 10,600 meters (35,000 feet), the pressure is around 1.5 kilograms (3.3 pounds) per square inch. This is too low for the human body to stay conscious, so the pressure is artificially maintained at around 3.5 kilograms (8 pounds) per square inch. But of course, if you increase pressure inside, the structure has to be strong to hold the difference between the external pressure and internal pressure. The difference between the two puts physical stress on the w...

Best 5 IT Security Certifications

Top 5 IT Security Certifications To Enhance Your Career While not having an IT security certification doesn’t disqualify you from getting a job offer or promotion, but prospective employers looking for industry-leading credentials look at it as one measure of qualifications and commitment to quality. As the market for information security talent heats up and the skills shortage continues, infosec experts who have the right combination of credentials and experience are in remarkably high demand. “A certification today is like a college degree,” says Grady Summers, America’s leader for information security program management services at Ernst & Young. “You may not hire a candidate just because they have one, but it is something that you come to expect in this field.” “There is no replacement for real-world experience,” Summers says. “However, certifications are important and have become de facto minimum criteria when screening resumes.” Here is a list of top fi...