Sunday, 30 October 2016


The Tencent Keen Security Lab Team from China has won an aggregate prize cash of $215,000 in the 2016 Mobile Pwn2Own challenge keep running by Trend Micro's Zero Day Initiative (ZDI) in Tokyo, Japan.

In spite of the execution of high-efforts to establish safety in current gadgets, the acclaimed Chinese programmers team has effectively hacked both Apple's iPhone 6S and in addition Google's Nexus 6P telephones.

Hacking iPhone 6S

For hacking Apple's iPhone 6S, Keen Lab misused two iOS vulnerabilities – an utilization without after bug in the renderer and a memory debasement imperfection in the sandbox – and stole pictures from the gadget, for which the group was granted $52,500.

Hacking Google's Nexus 6P

For hacking the Nexus 6P, the Keen Lab Team utilized a mix of two vulnerabilities and different shortcomings in Android and figured out how to introduce a rebel application on the Google Nexus 6P telephone without client association. 

The ZDI granted them an incredible $102,500 for the Nexus 6P hack. 

Thus, of the aggregate potential payout of $375,000 from the Trend Micro's Zero Day Initiative, the Keen Lab Team specialists brought home $215,000.

Chinese Hackers won $215,000 for Hacking iPhone and Google Nexus at Mobile Pwn2Own


Presently you can commandeer almost any automaton mid-flight just by utilizing a small contraption.

Security specialist Jonathan Andersson has formulated a little equipment, named Icarus, that can capture an assortment of famous automatons mid-flight, permitting assailants to bolt the proprietor out and give them finish control over the gadget.

Andersson, who is the supervisor of Trend Micro's TippingPoint DVLab division, showed this new hack at the current year's PacSec security meeting in Tokyo, Japan on Wednesday.

Other than Drones, the new device has the ability of completely commandeering a wide assortment of radio-controlled gadgets, including helicopters, autos, pontoons and other remote control adapts that keep running over the most famous remote transmission control convention called DSMx.

DSMx is a convention used to encourage correspondence between radio controllers and gadgets, including automatons, helicopters, and autos.

This is not the primary equipment that can capture rambles mid-flight. There are sticking gadgets accessible in the market that square controlling radio flags and render an automaton pointless. In any case, these gadgets don't give you control like Icarus does.

Icarus works by abusing DMSx convention, conceding aggressors finish control over target rambles that permits assailants to direct, quicken, brake and even crash them.

The proviso depends on the way that DSMx convention does not encode the "mystery" key that matches a controller and specialist gadget. Thus, it is workable for an aggressor to take this mystery key by propelling a few savage compel assaults, Andersson clarified in his presentation.

Once the automaton criminal, Icarus box, snatches the key, an aggressor can send malevolent bundles to limit the first proprietor of the automaton from sending true blue control summons. Rather, the automaton will acknowledge charges from the aggressor.

You can likewise watch the showing video to take in more about Icarus box.

You Can Hijack Nearly Any Drone Mid-flight Using This Tiny Gadget




The programmer who stole bare photos of female superstars two years back in a huge information break — celebrated as "The Fappening" or "Celebgate" embarrassment — has at last been sentenced to year and a half in government jail, powers said on Thursday.

36-year-old Lancaster, Pennsylvania man Ryan Collins was captured in March and accused of hacking into "no less than 50 iCloud accounts and 72 Gmail accounts," the greater part of which claimed by Hollywood stars, including Jennifer Lawrence, Kim Kardashian, and Kate Upton.

Presently, a judge in Harrisburg, Pennsylvania, on Wednesday sentenced Collins to year and a half in government jail subsequent to damaging the Computer Fraud and Abuse Act.

"Celebgate" Hacker Gets year and a half in Prison for Hacking Celebrity Nude Photos

More than 6.7 million Americans work in the tech business today and near 200,000 tech occupations were included 2015 alone, analysts say.

However, keeping in mind the end goal to grab one of those occupations, particularly one with a fat pay and heaps of advantages, you require the right abilities.

In case you're a specialist in an uncommon tech aptitude, you will more likely than not be paid well. However, the employments requiring that aptitude could be harder to discover.

On the other hand, a few aptitudes are required all over the place, but at the same time there's a lot of rivalry for them, keeping pay rates lower.

The best tech aptitudes strike an adjust: sufficiently high popular additionally sufficiently particular to charge fair pay.

A startup called Paysa, which utilizes computerized reasoning to individuals decide their fairly estimated value and to exhort them on which abilities to figure out how to help their compensations, as of late directed research to locate the most popular occupation aptitudes in the tech business.

It took a gander at the normal compensation and the quantity of occupations accessible for 248 aptitudes, including 29 programming dialects, and in 569 urban areas. From that point, it up accompanied this rundown of abilities that are most sought after.

No. 1: Perl is worth $139,214

No. 2: C++ is worth $133,954

No. 3: C is worth $133,691

No. 4: Java is worth $131,962

No. 5: C# is worth $129,692

No. 6: JavaScript is worth $126,988

No. 7: PL/Sql is worth $126,177

No. 8: SQL is worth $126,532

No 9: PHP is worth $124,475

9 TECH skills that pay over $120,000 and are in demand

Uplifting news for protection concerned individuals! Presently, your online information won't be advertised for business; at any rate by your Internet Service Providers (ISPs).

Yes, it's the ideal opportunity for your ISPs to ask your consent so as to share your touchy information for showcasing or commercial purposes, the FCC rules.

On Thursday, the United States Federal Communications Commission (FCC) has forced new security leads on Internet Service Providers (ISPs) that limit them from offering your online history to outsiders without your assent.

In a 3-2 vote, the FCC affirmed the new guidelines by which numerous security advocates appear to be satisfied, while some of them needed the Commission to try and apply similar tenets to online administrations like Google and Facebook also.

At first proposed not long ago, the new control says: "ISPs are required to get agreed 'select in' agree from customers to utilize and share touchy data."

What does "delicate" data mean here? The lead records the accompanying:


  • Your exact geo-area 

  • Your youngsters' data 

  • Data about your wellbeing 

  • Your money related information 

  • Government managed savings Numbers (SNNs) 

  • Your Web perusing history 

  • Application utilization history 

  • The substance of your correspondence

Note That:

Your broadband supplier can utilize and share this data in the event that you give them express consent. In this way, you have to keep an eye out for those welcomes and tenderly worded discourse boxes.

What's non-touchy is data like your email address, benefit level, IP address, transmission capacity utilized and other data thusly, yet you can at present formally quit. 

The new govern likewise requires Internet suppliers to tell clients with "clear, prominent and industrious notice" about the data they are gathering on them and how/when they share it, and the "sorts of substances" they share it with. 

The ISPs even need to inform its clients in case of an information break. 

The FCC means to give purchasers an expanded decision, straightforwardness, and security online over their own data. This is what the Commission composes: 

"ISPs serve as a customer's "entrance ramp" to the Internet. Suppliers can see a gigantic measure of their clients' close to home data that disregards that Internet association, including their perusing propensities. Purchasers merit the privilege to choose how that data is utilized and shared — and to secure their protection and their youngsters' protection on the web." 

In the interim, the publicists are, obviously, not in any way content with the FCC's turn. The Association of National Advertisers called the new principles "phenomenal, confused and to a great degree destructive," saying the move is awful for customers and also the U.S. economy. 

Notwithstanding, ISPs have a year to follow the new standards. Thus, it won't go live for no less than a year.

New Privacy Rules require ISPs to must Ask you before Sharing your Sensitive Data


The scandalous botnet that was utilized as a part of the late enormous circulated refusal of administration (DDoS) assaults against the well known DNS supplier Dyn, bringing on unlimited web blackout on last Friday, itself is defective.

Yes, Mirai malware, which has as of now oppressed a large number of Internet of Things (IoT) gadgets crosswise over 164 nations, contains a few vulnerabilities that may be utilized against it as a part of request to obliterate botnet's DDoS capacities and relieve future assaults.

Early October, the engineer of the malware publically discharged the source code of Mirai, which is intended to check for IoT gadgets – for the most part switches, cameras, and DVRs – that are as yet utilizing their default passwords and after that oppresses them into a botnet, which is then used to dispatch DDoS assaults.

Be that as it may, after a nearby take a gander at the source code, an analyst found three vulnerabilities, one of which could be utilized to close down Mirai's capacity to surge focuses with HTTP asks.

A stack cradle flood powerlessness was found by Scott Tenaglia, an analyst at endpoint security firm Invincea, in the section of the Mirai's code that completes HTTP surge assaults.

In any case, if abused, the powerlessness could crash the assault procedure, in this way ending the assault from that bot (tainted IoT gadget), yet leaving that traded off gadget in place and running.

Tenaglia has publically discharged the endeavor, saying his adventure would not have helped in the late DNS-based DDoS assault against Dyn that rendered significant sites unavailable, however would likewise close down Layer 7 assault abilities show in Mirai.

That is on account of Mirai is equipped for propelling HTTP surges and additionally different system DDoS assaults, including DNS surges, UDP surges, SYN and ACK surges, GRE IP and GRE ETH surges, STOMP (Simple Text Oriented Message Protocol) surge assaults.

"This straightforward "adventure" is a case of dynamic resistance against an IoT botnet that could be utilized by any DDoS relief administration to make preparations for a Mirai-based HTTP surge assault progressively," Tenaglia writes in a blog entry. "In spite of the fact that it can't be utilized to expel the bot from the IoT gadget, it can be utilized to stop the assault starting from that specific gadget."

Mirai Botnet Itself is Flawed; Hacking Back IoTs Could Mitigate DDoS Attacks

Simply a month ago, scientists clarified how an aggressor can thump the 911 administration disconnected in a whole state by propelling mechanized Distributed Denial of Service (DDoS) assaults utilizing a botnet of only 6000 cell phones.

Be that as it may, doing as such, as a general rule, couldn't just land open in threat however the assailant too.

The same happened to a 18-year-old adolescent from Arizona, who was captured for this present week taking after a serious interruption of 911 crisis frameworks created because of one of his iOS abuses.

Meetkumar Hiteshbhai Desai found an iOS defenselessness that could be misused to control gadgets, including trigger pop-ups, open email, and mishandle telephone highlights, as indicated by a public statement from the Cyber Crimes Unit of Maricopa County Sheriff's Office.

With a specific end goal to demonstrate the blemish, Desai purportedly made a few endeavors and presented a connection on one of his JavaScript misuses on his Twitter account and different sites.
Individuals getting to the endeavor connect from their iPhones and iPads were compelled to call 911 relentless, which overflowed a 911 call focus with more than 100 hang-up calls inside a "matter of minutes" prior this week.


In the wake of being informed of interruption to the 911 administration around the Phoenix, Arizona, zone, specialists instantly propelled an examination and followed the Twitter interface back to a page enlisted to 'Meet Desai.'

The powers recognized Desai as the conceivable suspect behind the assault against the 911 administration and arrested him late Wednesday.

On his part, Desai guaranteed he just intended to transfer a script that basically showed pop-ups and made iOS gadgets reboot, however he erroneously distributed a connection to an endeavor that made iOS gadgets dial 911 and hang up consistently.

As per powers, Desai shared the basic iOS abuse on Twitter with more than 12,000 adherents, out of which more than 1,849 tapped on that connection.

Maricopa officers captured Desai, took him to imprison and booked him on three tallies of lawful offense PC altering charges, on Monday, October 24.

Young Hacker Arrested For Disrupting 911 Service With DDoS Attack



Bora-class guided-rocket air cushion vehicle: This ship is really a sailboat with a base that transforms it into an air cushion vehicle. Furnished with eight Mosquito rockets and 20 against flying machine rockets, the ship has a team of up to 68 mariners and a cruising velocity of 100km every hour.



The Pantsir-S1: A joined short-to-medium range surface-to-air rocket and hostile to air ship rocket framework. The framework comprises of 12 surface-to-air guided rockets and two 30-mm programmed firearms viable against planes, helicopters, ballistic rockets, and journey rockets.



A for all intents and purposes imperceptible submarine: The first of six diesel-electric stealth submarines, the Novorossiysk was propelled from a St. Petersburg shipyard a year ago. Its fashioners say its stealth innovation makes it practically imperceptible when submerged.



The Mig-35 multirole fly contender: Effective both in aerial battle and exactness ground strikes. Equipped for achieving paces of up to 2,400 km for every hour in spite of being 30% bigger than its antecedent, the Mig-35 is capable both to dogfight and wreck ocean and surface focuses from long range, and additionally lead air observation missions.



The BUK-2 rocket framework: This is the battery that professedly cut down a Malaysian carrier over Ukraine in 2014. Its 9M317 rockets can achieve 46,000 feet at Mach 3, conveying 154-pound warheads.



The RS-24 Yars



The Russian Concorde



The T-90



The Russian Mi-28 Havoc attack helicopter



The S-300: Another long-run surface-to-air rocket framework, the S-300 is a brute at cutting down air ship. Truth be told, it can take out six planes in the meantime, with 12 rockets for each objective. Anything noticeable all around inside 300km ought to keep an eye out.

10 MOST staggering weapon frameworks utilized by the Russian army

Saturday, 29 October 2016

APPLE HELD A squeeze occasion Thursday morning in Cupertino, California. Middle of everyone's attention was the new MacBook Pro, which now has a touchscreen strip at the highest point of the console. Perfect! In any case, that is not all. Here are all the huge declarations.

01

        New MacBook Pro




02

      The Touch Bar


03

A New Smaller MacBook Pro


04

Touch ID Moves to the Mac


05

A New App Called TV


06

Apple Watch Nike+ Is Shipping


07

Portrait Mode on iPhone 7 Plus

Everything Apple Announced Today, From Macs to Apps

Apple Macintosh has expanded the costs of its portable workstation and desktop PCs in the UK by several pounds.




On Thursday, the organization divulged new Mac-book Pro portable PCs, with costs like the US after coin transformation and expansion of UK VAT.

In any case, the organization additionally expanded the costs of its more seasoned PC items, including the three-year-old Mac Pro, by many pounds.

One examiner said buyers ought to expect advance cost increments.

"Apple needs to recalibrate costs after noteworthy money variances, and since the EU submission, UK costs are out of adjust with the dollar," said Patrick O'Brien, expert at the Verdict Retail consultancy.

"Apple has taken the hit as of not long ago. While cost increments won't look great to the purchaser, it's hard to point the finger at Apple.

"When you strip out UK deals assess (VAT) and the cash change, the new UK costs could at present be seen as reasonable."





Various innovation organizations have expanded their costs in the UK, mirroring the lower estimation of the pound.

Mac's minimum costly portable PC - the 13in Macbook Air, last redesigned in March 2015 - now costs £949, up from £849.

Its Mac Pro desktop PC - last overhauled in December 2013 - now costs £2,999, up from £2,499.

"Apple recommends item costs universally on the premise of a few elements, including money trade rates, neighborhood import laws, business rehearses, charges, and the cost of working together," the organization told the BBC.

"Global costs are not generally equivalent to US recommended retail costs."



Match Microsoft has officially declared UK cost increments for some of its business administrations.

Earlier in October, the organization said some administration costs would go up by 22% in 2017, mirroring the pound's debilitated esteem against the euro.

"We intermittently survey the effect of nearby evaluating of our items and administrations to guarantee there is sensible arrangement over the area and this change is a result of this appraisal," the organization said.

Mr O'Brien said it was "inescapable" that more organizations would build the costs of items and administrations.

"Retailers are battling with expanded expenses to import products, and it's something they can't stand to swallow themselves," he told the BBC.

"We will see advance value rises, so if individuals are in the market for first-class things, for example, portable PCs, it may be an insightful thought to purchase now instead of later."

Apple raises computer prices in UK

Friday, 28 October 2016


In the event that YOU THINK the main reason for crossing points is to move autos past each other, you take care of issues like a handyman: with greater channels. In any case, wide, infertile avenues loaded with activity don't make a decent city. One arrangement would be nothing. No lights, no controls, no walkways—simply shaded pavers. It works. Mishaps decay, movement moderates, and property estimations rise. "You'll never benefit as a vocation as two ­people utilizing non-verbal communication and eye contact," says Sam Goater, a senior partner at the Project for Public Spaces. In any case, don't tear out the framework just yet. Urban fashioners have a decent arrangement of traps to transform a city crossing point into something more like a square and less like a road exchange. Autos pass, individuals walk, bikers bicycle, and everybody's lives stream all the more easily.



































16 Ways to Design a Better Cities And Better Intersection