A few weeks back, Blooomberg had reported that Chinese spies had compromised more than 30 US companies. This was apparently done by planting malicious chips into their servers while they were being manufactured in China. Through this chip, hackers where then able to create a backdoor into any networks running on the said server. The list of companies also includes tech giant Apple which has denied all the claims made by the report. Furthermore, Apple CEO Tim Cook had now asked Bloomberg to take down the report.
The incident took place back in 2015, and according to the report, Apple had discovered the said ‘breach’. The report also states that Apple had cut ties [...]
Twitter was ablaze with users commenting about how they had suddenly been logged out of their Facebook apps. This seemed to be faced by a lot of users, and you might be one of them too. The reason is the latest breach into Facebook’s security system which affected almost 50 million accounts.
Also Read: Sony Introduces PlayStation Classic, With 20 Pre-Loaded GamesThe Hack:
The breach was detected by Facebook on 25th September. A hacker or some hackers had used a vulnerability in the code of the social networking giant to gain access to user accounts. This was done by gaining control of the access tokens for the accounts. The access tokens are basically what allow [...]
Alphabet’s Google, along with a few other security researchers published a document which chronicled two major flaws found in nearly all modern CPUs. The reason this flaw is much more complex than the usual software or hardware bugs is that it’s more than just a bug that can be fixed with an update. The flaw lies in the middle, at the level of the processors’ “architectures,” in the way all the millions of transistors and logic units work together to carry out tasks.
In the architecture of modern CPUs, there are unpenetrable spaces where data passes through in raw, unencrypted form, such as inside the kernel, the most central software unit, or in system memory [...]
What seemed like a hack affecting only the verified accounts on Instagram, has turned out to be equally dangerous to millions of other users, as well. A bug in the social media company’s API reportedly allowed hackers to gain access to account holders’ phone numbers and email addresses. Following this report, Instagram assured everyone on August 30 that it was only the celebrities who were targeted during the attack. But, new reports suggest that as many as 6 million accounts were affected, including the non-celebrity users.
It’s worth noting that Instagram has about 700 million active monthly users and any percentage of users affected by a hack is still a [...]
A new report originating from the LA Times claims that while Apple and FBI were taking matters to court and creating a public issue over iOS privacy. Los Angeles police investigators obtained a method to open a locked iPhone 5s.
The LAPD was able to unlock and access information on the iPhone 5s which belonged to April Jace, wife of actor Michael Jace, accused in her killing at their South L.A. home in 2014.
The report mentions that LAPD found a “forensic cellphone expert” who could “override the locked iPhone function,”. There is no other information on how the iPhone was actually unlocked and it looks like only those involved will know [...]
The Indian Revenue Service (IRS) website has been hacked and reports suggest that a Pakistani group is behind the hack. According to Indian Express, after hacking the website http://www.irsofficersonline.gov.in, the hackers reportedly wrote ‘Pakistan Zindabad’ and ‘We are cyber attack team of Pakistan’.
After the hack, the website put up a message saying, “We’ll be back soon! Sorry for the inconvenience but we’re performing some maintenance at the moment.” The IRS site is used as an official communicator for official work between the Central Board of Direct Taxes and the IT department field offices in the country.
As per the Daily, the [...]
Line-cutting, is by far the most annoying thing on earth. This happens at banks, colleges, restaurants, coffee shops etc. and now it has happened on the, already miles long, OnePlus 2 sales line.
How did this happen? We are all aware that OnePlus has an exclusive system in place, if you want to get a hold of its new device – OnePlus 2. This system needs one to score an invite to avail the new device. The invites are limited in number and tough to get a hold of. However, even after registering for the device there are a couple of other things one needs to do in order to get ahead. For example- one has to be up to [...]
In a post-Snowden world, privacy has become an integral part of our lives. We have seen in TV shows and movies where the protagonist and spies carry an uncrackable, heavily encrypted phone. Turing Robotics Industries has launched a smartphone, the Turing Phone, which the company claims is unhackable and unbreakable. Appropriately named after Alan Turing, the first person to develop cryptographic machines, otherwise known as computers, the device will launch in India by the first week of September, starting at a price of Rs. 55,000.
If the price seems too steep, there is a reason behind it. The Turing Phone has been [...]
The Facebook Page feature helps businesses, brands and other organisations create public profiles. They use this to gain followers or fans, with people who ‘like’ their page. Now if you ever thought of converting your page into a full fledged website, you may very well have a chance of doing so. An experimental app is being worked upon that shows potential of achieving this feat.
The app, named Pager, has been developed by a team of three engineers. The rough framework was developed within 24 hours. All you need to do is link your Facebook account, and a list of pages owned by you pops out. You can then choose your desired page and save it, after which the site [...]
Thanks to a newly discovered security flaw, millions of users surfing through mobile browsers of two top companies are now vulnerable to hackers. Codenamed as FREAK (Factoring RSA Export Keys) attack, the flaw allows hackers to intercept the electronic communication of Apple’s Safari and Andriod browsers from Google.
As of now, researchers haven’t found any evidence of the flaw being exploited by any hacker, but the companies don’t wish to take a chance. The internet search giant, as well as Apple, are working in a direction to fix it.
According to the researchers, the problem has its roots in a [...]
Last year saw some mega hacks attacking some of the most prominent names in the world. First there was the iCloud hack which led to a leak of personal images of Hollywood actresses. Then came the supposed attack from North Korea on Sony Pictures, which did some considerable damage to the production house. But today something even unprecedented happened; social media pages belonging to US Military establishment have gotten hacked by alleged ISIS sympathizers.
The Twitter and YouTube accounts of US Central Command (Centcom) were hijacked by the hackers who claimed allegiance to the Islamic State. They started posting [...]
We recently decided to build us up a hackintosh, and while the project is slightly time consuming and laborious, the outcome truly makes it worth your while.
We were highly conflicted between a mac-pro and a hackintosh, and the latter made sense for the kind of ‘on the fly’ upgradability we need.
Here are the parts that we used, and we are listing both INR and Dollar Prices for the convenience of easy purchase.1. Corsair Graphite 600T Cabinet
Currently under construction, the ultimate #Hackintosh! #TechinConstruction #TechLife #iGyaanLife #NewOffice #iGyaanShit