Showing posts with label Hack. Show all posts
Showing posts with label Hack. Show all posts

Friday, 30 June 2017

Now Tampering With IMEI Numbers Will be a Serious Crime

IMEI (International Mobile Equipment Identification)

The government is making new rules with regard to manipulating numbers IMEI, To tamper with the specific number of 10-15 points under these regulations shall be punishable crime. It is being considered for a jail term of up to three years.

The move would be easier to track the lost mobile, Additionally cracked down on cases involving fake IMEI numbers will be any. an official said that it is quite difficult to track mobile phones due to fake IMEI number. 
Also Read: The Facebook Hacking Tool that Can Really Hack Accounts but..
Indian Telegraph DOT Act is working on rules to make it a punishable offense to tamper with the IMEI numbers. In the case of mobile phone tracking DOT and monitoring team found that nearly 18 thousand handsets is the same being used IMEI number.

What is the IMEI number?

IMEI number means the International Mobile Equipment Identity, which is a specific number of 15-digit mobile phone. Its help can track security agency mobile number. It may be the calls coming into the phone, But if you've been tinkering with this number is difficult to track mobile
Also Read: How to Hack a computer on your network with kali linux

Thanks and stay blessed!

Tuesday, 27 June 2017

Anonymous Hackers claims, NASA can reveal sensational linkages with Aliens!

International hacking group anonymous claims NASA Announce About Aliens
International hacking group anonymous claims NASA Announce About Aliens

Nasa is soon going to make a big announcement to the Aliens. International hacking group Anonymous claims that the US space agency NASA has said could soon disclosed by taking the existence of Aliens.
Also Read: How to hack a Wi-Fi network?
Anonymous also mentioned this on their website. Anonymous said that the basis of these claims is the key find of NASA. A NASA spokesman had given some hints associated with the discovery of the Aliens in April. Professor Thomas Jurbgn told the Congress that began a few days NASA hand Aliens the important information at hand. He also said that NASA is very close to finding important evidence related to the existence of aliens.

Anonymous has posted video

Anonymous has also posted a video on this topic. In which the comments made by people on the discoveries and information related to the universe have been included. Anonymous has written that there is definitely a lot of information in NASA's mission for the search of aliens.

Thanks and stay blessed!

Monday, 9 January 2017

How to Change Your WI-FI into Virtual Router?

You want to use your Internet Connection with your other device, but you do not have a routing device for some reason to share your internet with another instrument. Here is a simple solution to connect your other device through your desktop or laptop WiFi turning into a WiFi hotspot or Virtual Router.

Easy Method You Can Turn Your WiFi Into Virtual Router

In few cases, modern computer and laptop come with an Internal hotspot software included. But this help is only for you who do not have a choice both above. By turning your Desktop or Laptop into a WiFi hotspot, you can connect any device which has a WiFi access capability like as your mobile, another laptop or desktop, iPad, etc.

A router is a device that forward data packet in a packet switching network such as the internet, it's act like a dispatcher, choosing the best path for data packet travel. In some cases, software in a computer does the job to forward the data packet to its destination.

A router located at any gateway where a network meets another network. A virtual router is a software combination which does the same job, packet data transfer to its defined network in packet switching network without any help of a routing device using a WiFi device.

Today modern computers, Desktop or Laptop comes with inbuilt WiFi. If you do not have an inbuilt WiFi, then you can add one from the market as an external USB WiFi or as a network interface card which fits into your PCI slot on your desktop. Here is an easy method how you will turn your WiFi device connectivity into a virtual router.
External wifi device

Steps to Follow: Open Command Prompt in Administrator mode either following method one from pressing Windows Start(Windows) + X or go to start menu then all apps and drop down windows system folder to find the command prompt, right click on command prompt and select run as administrator.
Screenshot

Now type the following command or just copy this and right click on command prompt windows to paste it and press enter to execute the command. Put your SSID name in the ssid=yourssidname place and replace your password in the key=password | A new network adapter
will be added and can be found in network connection setting.
netsh wlan set hostednetwork mode=allow ssid=yourssidname key=password
netsh wlan start hostednetwork 
Screenshot 
    
Network Connection Window: Your Microsoft hosted network virtual adapter is ready.


Screenshot




Now share your default Internet connection. Follow the bellow screenshot for how to share internet connection.
Screenshot


You can use this method in any Windows Operating System Version. Share your whats on your mind in the comment box. Thank you for reading Digital Doubt. Like us on Facebook or subscribe our feed-burner newsletter via email directly in your inbox.

Thanks and stay blessed!

Thursday, 5 January 2017

How to Check Windows Version and Build Number?

Whenever we need to install some software or games on our computer, we need to sure about the minimum requirement for successful installation. As a part of those requirements, Operating system version and build no also countable as a vital element. You can not install a game on a non-supported operating system to run the game successfully. I have added two quick way to find your operating system version and their build no.

1. Winver.exe: 
                    It is the simplest way to find your Windows Operating system version and build no. To complete the task press the START button and R to open the Run command window. Type Winver.exe and press enter. Your result is on the screen.



 2. Command Prompt: Command = VER
                     The second quickest quick way to find your Windows Operating system version and build no is from Command prompt. To open Command Prompt open Run command window and type CMD and press enter. In the command prompt window now type VER and press enter.



Look at the screenshot "Microsoft Windows [Version 10.0.10240]" here Version is Windows 10 and Build no is 10240.

Thanks and stay blessed!

Sunday, 23 October 2016

An Army of Million Hacked IoT Devices Almost Broke the Internet Today

A massive Distributed Denial of Service (DDoS) attack against Dyn, a major domain name system (DNS) provider, broke large portions of the Internet on Friday, causing a significant outage to a ton of websites and services, including Twitter, GitHub, PayPal, Amazon, Reddit, Netflix, and Spotify.



But how the attack happened? What's the cause behind the attack?


Exact details of the attack remain vague, but Dyn reported a huge army of hijacked internet-connected devices could be responsible for the massive attack.

Yes, the same method recently employed by hackers to carry out record-breaking DDoS attack of over 1 Tbps against France-based hosting provider OVH.

According to security intelligence firm Flashpoint, Mirai bots were detected driving much, but not necessarily all, of the traffic in the DDoS attacks against DynDNS.

Mirai is a piece of malware that targets Internet of Things (IoT) devices such as routers, and security cameras, DVRs, and enslaves vast numbers of these compromised devices into a botnet, which is then used to conduct DDoS attacks.

Since the source code of Mirai Botnet has already made available to the public, anyone can wield DDoS attacks against targets.

This time hackers did not target an individual site, rather they attacked Dyn that many sites and services are using as their upstream DNS provider for turning internet protocol (IP) addresses into human-readable websites.

Also Read: What will be the future, If Google dies?

The result we all know: Major sites and services including Twitter, GitHub, Reddit, PayPal, Amazon, AirBnb, Netflix, Pinterest, and so on, were among hundreds of services rendered inaccessible to Millions of people worldwide for several hours on Friday.

"Flashpoint has confirmed that at least some of the devices used in the Dyn DNS attacks are DVRs, further matching the technical indicators and tactics, techniques, and procedures associated with previous known Mirai botnet attacks," Flashpoint says in a blog post.

This type of attack is notable and concerning because it largely consists of unsecured IoT devices, which are growing exponentially with time. These devices are implemented in a way that they cannot easily be updated and thus are nearly impossible to secure.

Also Read: HOW TO SUBMIT YOUR BLOGGER SITEMAP TO GOOGLE 
Manufacturers majorly focus on performance and usability of IoT devices but ignore security measures and encryption mechanisms, which is why they are routinely being hacked and widely becoming part of DDoS botnets used as weapons in cyber attacks.

An online tracker of the Mirai botnet suggests there are more than 1.2 Million Mirai-infected devices on the Internet, with over 166,000 devices active right now.

In short, IoT botnets like Mirai are growing rapidly, and there is no easy way to stop them.

According to officials speaking to Reuters, the US Department of Homeland Security (DHS) and the FBI are both investigating the massive DDoS attacks hitting DynDNS, but none of the agencies yet speculated on who might be behind them.

Thanks and stay blessed!

Saturday, 11 June 2016

Police Arrest 16-year-old Boy Who Hacked CIA Director


cia-hacker-arrested
The teenage hacker, who calls himself a member of hacktivist group "Cracka with Attitude," behind the series of hacks on the United States government and its high-level officials, including CIA director, might have finally got arrested.

In a joint effort, the Federal Bureau of Investigation (FBI) and British police reportedly have arrested a
16-year-old British teenager who they believe had allegedly:

  • Leaked the personal details of tens of thousands of FBI agents and US Department of Homeland Security (DHS) employees.
  • Hacked into the AOL emails of CIA director John Brennan.
  • Hacked into the personal email and phone accounts of the US spy chief James Clapper.
  • Broke into the AOL emails of the FBI Deputy Director Mark Giuliano.

Federal officials haven't yet released the identity of the arrested teenager, but the boy is suspected of being the lead hacker of Cracka With Attitude, who calls himself Cracka, the South East Regional Organised Crime Unit (SEROCU) told the Daily Dot.

According to the report, Cracka is the same teenage hacker who recently leaked the personal information of 31,000 government agents belonging to nearly 20,000 FBI agents, 9,000 Department of Homeland Security (DHS) officers and some number of DoJ staffers.

Crime Unite Released a Statement

In a statement, the SEROCU confirmed that the unit had arrested a teenager on Tuesday in the East Midlands on suspicion of:

  • Conspiracy to commit unauthorised access to computer material contrary to Section 1 Computer Misuse Act 1990.
  • Conspiracy to commit unauthorised access with intent to commit further offences contrary to Section 2 Computer Misuse Act 1990.
  • Conspiracy to commit unauthorised acts with intent to impair or with recklessness as to the impairing operation of a computer contrary to Section 3 Computer Misuse Act 1990.

Accused Teen: Authorities Ruining My Life

The unit declined to provide any further information on the arrest, but while speaking to Motherboard, the arrested teenager denied being Cracka, saying "I am not who you think I am ;) ;) ;)"

"I am innocent until proven guilty so I have nothing to be worried about," the teen said. "They are trying to ruin my life."
Neither the Department of Justice (DoJ) nor the FBI have yet responded to comment on it.

Thanks and stay blessed!

Thursday, 9 June 2016

Your TeamViewer Account has Been Hacked? Here's What to Do Immediately

Do you have remote login software TeamViewer installed on your desktop?

If Yes, then it could be possible that your system can be accessed by attackers to steal your personal details, including your bank and PayPal accounts, as several reports on Reddit and Twitter suggests.

According to recent reports, the popular TeamViewer software that is used to remotely control PCs appears to have been HACKED!

Over the past few days, a number of users headed on to the Internet forums to report that unknown attackers are taking control of their computers through their TeamViewer accounts and, in some cases, trying to steal money through services like eBay or PayPal.

This same behavior has also been reported by the IBM security researcher Nick Bradley, who said:
"In the middle of my gaming session, I lose control of my mouse, and the TeamViewer window pops up in the bottom right corner of my screen. As soon as I realize what is happening, I kill the application. Then it dawns on me: I have other machines running TeamViewer!"
But, the question still remains: What really happened to TeamViewer?

Actually, no one knows, at least, for now.

Because no evidence indicates a system-wide security breach at TeamViewer that could have given the attackers some sort of backdoor into users' PCs.

TeamViewer has also reacted by strongly denying the claims that the intrusions are the result of a hack on TeamViewer's network.

Instead, the account takeovers are the result of end users' carelessness. Moreover, the company referred to the recent widespread "mega breaches" that have dumped over 642 Million passwords over the past month.


"As you have probably heard, there have been unprecedented large-scale data thefts on popular social media platforms and other web service providers," the company wrote. 
"Unfortunately, credentials stolen in these external breaches have been used to access TeamViewer accounts, as well as other services."
However, TeamViewer stands strong by its statement that a Denial of Service (DoS) attack knocked some of its servers offline on Wednesday, but the company managed to bring them back online after a few hours.

The company advised its users to avoid careless use of its service and always:


  • Use a different password for each account.
  • Use two-factor authentication.
  • Use a password manager.
  • Don't tell other people your passwords.

Moreover, TeamViewer also announced two new features on Friday aimed at boosting its users' security after numerous users flocked online to complain about getting hacked through its service.

The two new features are:

  • Trusted Devices
  • Data Integrity

The Trusted Devices feature is specifically designed to prevent hackers from taking over your TeamViewer account. The feature allows you to approve the new device as trusted before it can access an existing TeamViewer account for the first time.

The device approval process is conducted by clicking a validation link sent to the account owner's email address.

The second feature, dubbed Data Integrity, works by automatically monitoring a user's account activity. If it detects any unusual behavior that might suggest account has been hacked, the service forces users to reset their password.


Here's What you should do:


TeamViewer users are strongly recommended to change their account passwords and use a strong one, and of course, NOT to use the same credentials across multiple sites.

I know, remembering different passwords for different accounts is a real pain, but you can use a good password manager to solve this issue.

Meanwhile, users should also ensure their TeamViewer accounts are protected with a randomly generated password that is at least 10 characters long, contains numbers, symbols, and uppercase and lowercase letters, and is unique.

It is always a good idea to run the TeamViewer software only when it's truly needed, instead of allowing it to auto-start each time your PC is turned on.

If you have also experienced something fishy with your TeamViewer account, let us know in the comments below.

Thanks and stay blessed!