Skip to main content

Posts

CBI techie nabbed over software that hacks Railways Tatkal ticket system

CBI techie nabbed over software that hacks Railways Tatkal ticket system      How do some travel agents manage to book confirmed railway tickets under Tatkal category, while thousands of passengers make unsuccessful bids on their computers or at reservation counters? Well, it seems it is all programmed. A software programmer of the anti-corruption agency CBI is alleged to be the brain behind one such illicit software which subverted the Railways reservation system, allowing the agents to book hundreds of Tatkal tickets at a single click of the mouse, officials said on Wednesday in New Delhi.   The Central Bureau of Investigation (CBI) has arrested its assistant programmer Ajay Garg and his front, Anil Gupta, for developing and distributing the software to agents for a price, agency spokesperson Abhishek Dayal said. Besides Garg and Gupta, the agency has booked 13 others, including Garg's family members and travel agents. Garg's par...

1.4 Billion Clear Text Credentials Discovered in a Single Database

Largest Breach A Massive Resource for Cybercriminals Makes it Easy to Access Billions of Credentials. Now even unsophisticated and newbie hackers can access the largest trove ever of sensitive credentials in an underground community forum. Is the cyber crime epidemic about become an exponentially worse? While scanning the deep and dark web for stolen, leaked or lost data, 4iQ discovered a single file with a database of 1.4 billion clear text credentials  — the largest aggregate database found in the dark web to date. None of the passwords are encrypted, and what’s scary is the we’ve tested a subset of these passwords and most of the have been verified to be true. The breach is almost two times larger than the previous largest credential exposure, the Exploit.in combo list that exposed 797 million records. This dump aggregates 252 previous breaches, including known credential lists such as Anti Public and Exploit.in, decrypted passwords of known breaches lik...

Vault 8: WikiLeaks Releases Source Code For Hive - CIA's Malware Control System

Almost two months after releasing details of 23 different secret CIA hacking tool projects under Vault 7 series, Wikileaks today announced a new Vault 8 series that will reveal source codes and information about the backend infrastructure developed by the CIA hackers. Not just announcement, but the whistleblower organisation has also published its first batch of Vault 8 leak, releasing source code and development logs of Project Hive—a significant backend component the agency used to remotely control its malware covertly. In April this year, WikiLeaks disclosed a brief information about Project Hive, revealing that the project is an advanced command-and-control server (malware control system) that communicates with malware to send commands to execute specific tasks on the targets and receive exfiltrated information from the target machines. Hive is a multi-user all-in-one system that can be used by multiple CIA operators to remotely control multiple malware implants used ...

The IP Address ... Public VS Private...

 IP Address. Hey guys its been long time after my previous post, well today we will learn about The IP Address , Public vs Private . About IP addresses An IP address (short for Internet Protocol address) is used to identify computers on the Internet. It works like a return address would on a piece of mail. How IP addresses work When your computer or device sends a request, like a search on Google, it tags the request with your IP address. That way Google knows where to send the response. What an IP address looks like Your IP address will be a number, like 172.16.254.1 or 2001:db8:0:1234:0:567:8:1. Find your IP address When you search  what is my IP  on Google Search, you’ll see the IP address of the computer or device where you did the  search You can even search more about your IP Address and ISP Information here . What are Private IP Addresses? An IP address is considered private if the IP number falls wi...

Santoku Linux – Mobile Forensics, Malware Analysis, and App Security Testing LiveCD

Santoku Linux – Mobile Forensics, Malware Analysis, and App Security Testing LiveCD The word santoku loosely translates as ‘three virtues’ or ‘three uses’. Santoku Linux has been crafted with a plethora of open source tools to support you in three endeavours, mobile forensics, malware analysis and security testing. Boot into Santoku and get to work, with the latest security tools and utilities focused on mobile platforms such as Android and iOS. Pre-installed platform SDKs, drivers, and utilities, plus helpful tools for easy deployment and control of mobile apps. Auto Detection and setup of new connected mobile devices. To make future updating of Santoku WAY easier for users, we’re hosting a repository. Set it up just once and get updates with package management instead of downloading a whole new iso. Mobile Malware Tools for examining mobile malware Mobile device emulators Utilities to simulate network services for dynamic analysis Decompila...

SavetheInternet! OMG What is it ? #NetNeutrality??

Now a days there is alot chaos going On the social walls of Facebook , Twitter , Instagram... What is #NetNeutrality?? Well  lets get easy as a b c.. The internet's success in fostering innovation, access to knowledge and freedom of speech is in large part due to the principle of net neutrality — the idea that internet service providers give their customers equal access to all lawful websites and services on the internet, without giving priority to any website over another. Due to intense lobbying by telecom operators like Airtel and Vodafone, the Telecom Regulatory Authority of India (TRAI) is planning to allow them to block apps and websites to extort more money from consumers and businesses — an extreme violation of net neutrality. TRAI has released a  consultation paper  with  20 questions  spread across  118 complicated pages  and wants you to send them an e-mail by 24 th  of April, 2015. What is net neutrality? Firstly, w...

New Wallpapers

New Wallpapers