Showing posts with label news. Show all posts
Showing posts with label news. Show all posts

Saturday, April 25, 2015

Google 'Project Fi' : 10 Amazing Facts


Recently Google has launched its wireless cellular service that comes up to give a tough competition for AT&T and Verizon communication.
Google Project Fi

Earn $15,00 for Hacking Microsoft Spartan Browser

Earn $15,00 for Hacking Microsoft Spartan Browser





You have time beginning today till June 22, 2015 to submit your bug reports to the company. So don’t be late.
Also, those hackers and researchers who submitted vulnerability reports since the beginning of 2015 would also be rewarded if the discovered vulnerabilities meet the eligibility criteria.
This new bug bounty program also offers payouts for vulnerabilities in Microsoft’s Azure cloud platform, and Sway Web application tool, Jason Shirk of Microsoft’s Security Response Center says in a blog post.
The bug bounty offer for Azure will cover cloud services, virtual machines, Active Directory, storage and much more.
Microsoft is also offering up to $100,000 USD to bypass active mitigations (such as ASLR and DEP) in the company’s latest released version of the operating system, and "a bonus of up to $50,000 USD for actionable defense techniques to the reported bypass," Microsoft says.

Saturday, March 28, 2015

Top Female Hackers in World

Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network.Basically when we talk about Ethical Hacker..we start thinking about a Male body.But it is not true because there are many top level Female ethical hackers in world.So in this post i am going to make you aware about these Female Ethical hackers.

Top Female Hackers in World

1. Susan Headley
Susan Headley has undergone her fair share of nicknames including both Susy Thunder and Susan Thunder. Going all the way back to 1970s, Headley was one of the first females to join one of the most renowned hacking groups in history, Cyberpunks.
 
2. Natasha Grigori
Known simply as Natasha Grigori, a name partially taken from Bullwinkle’s nemesis in the classic children’s cartoon, very little information has been revealed to the world about this famous hacker. Her career as a hacker begun in the 1980s but she did not receive fame until the early 1990s with a bulletin-board website for amateur programmers and hackers.
  
3. Joanna Rutkowska
Joanna Rutkowska is further proof that not all hackers are bad, and few specialists have done more for operating system security than this notorious hacker.

 
4. Ying Cracker
When it comes to the world of female hackers, Ying Cracker can be seen as the professor that gives students their first taste of this unique field. Often referring to herself as an educator, Ying Cracker is a resident of Shanghai and believes that hacking is a useful skill that can be learned by anyone. 


5. Jude Milhon
 Before passing away in 2003, Jude Milhon was a hacker and author best known under the pseudonym St. Jude. She began her career as a computer programmer in 1967 working with some of the earliest incarnations of the internet. As time went on, she began her slow transition into the life of a hacker and eventually started the hacking group Cypherpunks, not to be confused with cyberpunks. Milhon was one of the primary activists that stated hacking was nothing more than bringing out the potential of software and continued to lobby against all those that believed hacking was nothing more than a criminal act.



Thursday, March 12, 2015

Some Amazing facts in world

In this post i will make you aware about some amazing facts in world,which you never heared about.Just spend your 5 minutes to read these important and amazing things.
Some Amazing facts in world
  1. Octopus has three hearts.  
  2. Bill Gates earns Rs 12,000 every second around Rs 102 crore per day.
  3. Parachute was discovered before one century  plane.
  4. Kangaroo can not walk Reverse .
  5. In China, a 17-year-old boy sold his kidney for Iphone  and Ipad .
  6. President George Bush had vomited once in chair of Japan's PM.
  7. Only the female mosquito sucks your blood. Male mosquitoes are just voices.
  8. fish's brain's memory is just about a seconds.   



Friday, February 6, 2015

Why facebook is blue in color

As we can see that facebook is Blue from Login page to its all pages,groups etc.So the question is that "Why it is blue in color".
The reason for this is that  Mark Zuckerberg, the young founder of Facebook is red-green color-blind and blue is the richest colour for him which he confirmed in an online interview with Leo Laporte.
Why facebook is blue in color
Another important commercial factor for using blue color is the fact that most colors tend to distract the viewers. Blue on the other hand acts as a transparent background to the main content as visible to the human brain due to which most popular websites tend to use the blue color. It can easily be called a webmaster's favorite color. Blue color is also sometimes referred to as 'Nirvana' for the brain.All these factors make blue a prominent color on Facebook.

Friday, January 23, 2015

Oracle releases 169 Updates, Including 19 Patches for JAVA Vulnerabilities


The United States software maker Oracle releases its security updates every three months on Tuesday, which it referred to as "Critical Patch Updates" (CPU). Yesterday, Oracle released its first quarterly CPU-date of this year, issuing a total of 169 security fixes for hundreds of its products including Java, Fusion Middleware, Enterprise Manager and MySQL.
The security update for Oracle’s popular browser plug-in Java addresses vulnerabilities in the software, 14 of which could be remotely exploitable without authentication, that means an attacker wouldn't need a username and password to exploit them over a network.
- See more at: http://thehackernews.com/2015/01/java-update-patch-vulnerability.html#sthash.pqOr9QAf.dpuf

The United States software maker Oracle releases its security updates every three months on Tuesday, which it referred to as "Critical Patch Updates" (CPU). Yesterday, Oracle released its first quarterly CPU-date of this year, issuing a total of 169 security fixes for hundreds of its products including Java, Fusion Middleware, Enterprise Manager and MySQL.
The security update for Oracle’s popular browser plug-in Java addresses vulnerabilities in the software, 14 of which could be remotely exploitable without authentication, that means an attacker wouldn't need a username and password to exploit them over a network.
- See more at: http://thehackernews.com/2015/01/java-update-patch-vulnerability.html#sthash.pqOr9QAf.dpufThe United States software maker Oracle releases its security updates every three months on Tuesday, which it referred to as "Critical Patch Updates" (CPU). Yesterday, Oracle released its first quarterly CPU-date of this year, issuing a total of 169 security fixes for hundreds of its products including Java, Fusion Middleware, Enterprise Manager and MySQL.

The security update for Oracle’s popular browser plug-in Java addresses vulnerabilities in the software, 14 of which could be remotely exploitable without authentication, that means an attacker wouldn't need a username and password to exploit them over a network.
The United States software maker Oracle releases its security updates every three months on Tuesday, which it referred to as "Critical Patch Updates" (CPU). Yesterday, Oracle released its first quarterly CPU-date of this year, issuing a total of 169 security fixes for hundreds of its products including Java, Fusion Middleware, Enterprise Manager and MySQL.

The security update for Oracle’s popular browser plug-in Java addresses vulnerabilities in the software, 14 of which could be remotely exploitable without authentication, that means an attacker wouldn't need a username and password to exploit them over a network.

A 7 year old Girl hacked WiFi within 11 minutes.

Just two days after an investigation revealed how much personal information public Wi-Fi networks can ‘suck’ from phones, a child has shown how easy the hotspots are to hack.
A seven-year-old broke into a Wi-Fi hotspot in just 10 minutes and 54 seconds after watching an online video tutorial.
The ethical hacking demo was carried out under the supervision of an online security expert to highlight just how vulnerable the networks are.

Blog Archive