Sunday, 25 October 2015

HTC: “It’s Apple That Copied Our Design, We Didn’t”

Short Bytes: Taking inspiration from another’s designs is an old tale in the smartphone industry. The latest controversy is revolving around iPhone 6-inspired HTC One A9. Defending HTC, a top executive said that it was Apple that copied HTC’s design. Read more to know the whole story.

Recently we wrote about HTC One A9 that looks a lot like the iPhone 6. The struggling Taiwanese smartphone maker hinted in the past that the company is looking to drift in a new design direction. But, nobody expected the design pioneer HTC to completely rip-off Apple iPhone 6.
In a surprising move, HTC North Asia President Jack Tong has accused Apple of stealing its ideas.


As reported by WantChinaTimes.com, HTC executive said, “We’re not copying.” Talking about HTC One M7, he said, “We made a uni-body metal-clad phone in 2013. It’s Apple that copies us in terms of the antenna design on the back.”

Arguing about the design breakthrough in radio signals for metal-clad phones, he said,”The A9 is made thinner and more lightweight than our previous metal-clad phones. This is a change and evolution, and we’re not copying.”

It should be noted that HTC One A9 is the first non-Nexus phone that comes pre-installed with the latest Android Marshmallow. It features a 1920×1080, 5-inch AMOLED display and a 13-megapixel rear camera.


“The A9 is made thinner and more lightweight than our previous metal-clad phones,” Tong said. “This is a change and evolution, and we’re not copying.”

Tell us your views about this controversy in the comments below

Continue Reading...

Monday, 19 October 2015

Hacker reveals how to extract PIN of a smartphone from any selfie

Corneal Key Logger can extract PIN of any smartphone using the owner’s selfie

If you thought biometrics was the ultimate weapon of authentication, you may be proved wrong by Starbug. German researcher Jan Krissler, aka Starbug is a hacker whose claim to fame is breaching Apple’s TouchID and recreating the German defense minister’s thumbprint from a high-res image.

Starbug has revealed that he can now decode anyone’s smartphone PIN code from any selfie “image”.  of the owner.

Starbug and his colleagues have extracted the reflection of smartphone screens in the eye whites of “selfie” subjects, then they used an ultra-high resolution image techniques to extract the user’s PIN code. Starbug presented his discovery at the Biometrics 2015 conference in London.

His team also revealed a method to take hi-res images of iris using a high-resolution camera and recreating them using a simple laser printer. They were also able to extract the reflection of phone screens in the eye whites of “selfie” subjects, then using ultra-high res image techniques to glean the user’s PIN code.

Here is an image of the “corneal key logger”

The team then used this technique to extract the iris data of German chancellor Angela Merkel, using a photo taken at a press conference. He said that these images could be printed onto a contact lens and this method can be used to hack any biometric enabled authentication device.

Starbug’s speech also focussed on the vulnerability of fingerprint and facial technology, saying that together with iris these represented “90% of the biometrics market value”. “Everything is spoofable,” he said.

Earlier Starbug had revealed how to make a dummy fingerprint to spoof Apple’s Touch ID sensor, simply by lifting a fingerprint from a basic print scanner and then making a mould. He also revealed how to use a digital SLR camera with a 200ml lens to take fingerprints that can be replicated from a distance – the method used to extract German Defense Minister Dr Von Der Leyen’s thumbprint.

According to Starbug even fingerprint sensors featuring liveness detection are at risk. “I can fool every fingerprint sensor in two hours”, he said, welcoming challenges from manufacturers to beat their technology. Starbug said a simple photo of the users face is often more than enough – even for most infrared devices. Here “liveness detection is very important”, he said.

Starbug also outlined a method to bypass liveness detection that demands that makes users blink, and he closed his presentation defeating a 3D facial recognition by using a papier mache mask.

Starbug said that the current biometrics technology is weak and should improved upon. However, he said he feels that biometrics is the future of the authentication.

Continue Reading...

Sunday, 18 October 2015

Affordable camera reveals hidden details invisible to the naked eye

Compared to an image taken with a normal camera (left), HyperCam images (right) reveal detailed vein and skin texture patterns that are unique to each individual. Credit: University of Washington
Peering into a grocery store bin, it's hard to tell if a peach or tomato or avocado is starting to go bad underneath its skin.

But an affordable camera technology being developed by the University of Washington and Microsoft Research might enable consumers of the future to tell which piece of fruit is perfectly ripe or what's rotting in the fridge.

The team of computer science and electrical engineers developed HyperCam, a lower-cost hyperspectral camera that uses both visible and invisible near-infrared light to "see" beneath surfaces and capture unseen details. This type of camera is typically used in industrial applications and can cost between several thousand to tens of thousands of dollars.

In a paper presented at the UbiComp 2015 conference, the team detailed a hardware solution that costs roughly $800, or potentially as little as $50 to add to a mobile phone camera. They also developed intelligent software that easily finds "hidden" differences between what the hyperspectral camera captures and what can be seen with the naked eye.

When HyperCam captured images of a person's hand, for instance, they revealed detailed vein and skin texture patterns that are unique to that individual. That can aid in everything from gesture recognition to biometrics to distinguishing between two different people playing the same video game.

As a preliminary investigation of HyperCam's utility as a biometric tool, in a test of 25 different users, the system was able differentiate between hand images of users with 99 percent accuracy.

In another test, the team also took hyperspectral images of 10 different fruits, from strawberries to mangoes to avocados, over the course of a week. The HyperCam images predicted the relative ripeness of the fruits with 94 percent accuracy, compared with only 62 percent for a typical camera.

 
 
In this time-lapse video, HyperCam is able to penetrate the tough skin of an avocado to show how it ripens over a week. The changes are not evident in the images taken by a normal RGB camera. Credit: University of Washington
"It's not there yet, but the way this hardware was built you can probably imagine putting it in a mobile phone," said Shwetak Patel, Washington Research Foundation Endowed Professor of Computer Science & Engineering and Electrical Engineering at the UW.

"With this kind of camera, you could go to the grocery store and know what produce to pick by looking underneath the skin and seeing if there's anything wrong inside. It's like having a food safety app in your pocket," Patel said.

Hyperspectral imaging is used today in everything from satellite imaging and energy monitoring to infrastructure and food safety inspections, but the technology's high cost has historically limited its use to industrial or commercial purposes. The UW and Microsoft Research team wanted to see if they could make a relatively simple and affordable hyperspectral camera for consumer uses.

"Existing systems are costly and hard to use, so we decided to create an inexpensive hyperspectral camera and explore these uses ourselves," said Neel Joshi, a Microsoft researcher who collaborated on the project. "After building the camera we just started pointing it at everyday objects—really anything we could find in our homes and offices—and we were amazed at all the hidden information it revealed."

A typical camera divides visible light into three bands—red, green and blue—and generates images using different combinations of those colors. But cameras that utilize other wavelengths in the electromagnetic spectrum can reveal invisible differences.

Near-infrared cameras, for instance, can reveal whether crops are healthy or a work of art is genuine. Thermal infrared cameras can visualize where heat is escaping from leaky windows or an overloaded electrical circuit.

 
   
HyperCam uses 17 different wavelengths along the electromagnetic spectrum to illuminate a scene and reveal differences that are invisible to the naked eye. Credit: University of Washington
"When you look at a scene with a naked eye or a normal camera, you're mostly seeing colors. You can say, 'Oh, that's a pair of blue pants,'" said lead author Mayank Goel, a UW computer science and engineering doctoral student and Microsoft Research graduate fellow. "With a hyperspectral camera, you're looking at the actual material that something is made of. You can see the difference between blue denim and blue cotton."

HyperCam, which uses the visible and near-infrared parts of the electromagnetic spectrum, illuminates a scene with 17 different wavelengths and generates an image for each.

One challenge in hyperspectral imaging is sorting through the sheer volume of frames produced. The UW software analyzes the images and finds ones that are most different from what the naked eye sees, essentially zeroing in on ones that the user is likely to find most revealing.

"It mines all the different possible images and compares it to what a normal camera or the human eye will see and tries to figure out what scenes look most different," Goel said.

One remaining challenge is that the technology doesn't work particularly well in bright light, Goel said. Next research steps will include addressing that problem and making the camera small enough to be incorporated into mobile phones and other devices, he said

Continue Reading...

Wednesday, 7 October 2015

Hack WiFi Network and Crack WiFi Password from Android Mobile in Just Two Minutes


What you really need for Hacking WiFi from Android 

Android Phone with good Processor and RAMYour Android Phone Must be Rooted (Rooting Guide and advantages of Rooting )Good WiFi network signal (which you wanna hack)


There are many apps on Google Play for hacking WiFi  from android mobile but believe me guys most of it is fake or pranks. 


Hack WiFi Network and Crack WiFi Password from Android Mobile in Just Two Minutes 


WPS Connect (Crack or Hack WiFi Password)


Many Guy says this is the fake app but hey guys this is not a fake app, this is working app for hacking wi-fi password from android mobile. Basically, you can  hack WiFi network with this app, which hasWPS enabled in security.


Hack WiFi Password from Android Mobile in Just Two Minutes





WPS Connect for Crack WiFi Password from Android Mobile


If you found any wi-fi network in your android mobile, which shows WPS security . You can easily connect with any WPS  security wifi without given any type password. WPS Connect bypass WPS security and give you access to connect with wi-fi without typing any type of password.



DownloadQR-Code


WPS Connect


Developer: FroX


Price: Free 


REQUIRED TO BE ROOT !!!!

With this app you’ll can connect to WiFi networks which have WPS protocol enabled. This feature was only available in version 4.1.2 of Android.

App developed with educational purposes. I am not responsible for any misuse.

WPS: http://es.wikipedia.org/wiki/Wi-Fi_Protected_Setup

WPS Connect is focused on verifying if your router is vulnerable to a default PIN. Many routers that companies install own vulnerabilities in this aspect. With this application you can check if your router is vulnerable or not and act accordingly.

Includes default PINs, as well as algorithms such Zhao Chesung (ComputePIN) or Stefan Viehböck (easyboxPIN).


 Download WPS Connect Android App


Also Read: 


Must Have WiFi Apps for Android MobileTop 20 Best Wifi Tricks and Hacks for Android Mobile and PC


WiFi Kill (Disable Other User WiFi Connection)


WiFi Kill disable other userwifi connection and you can loot wholewifi internet speed in your android mobile. If you experience slowwifi internet speed in your android mobile because of an too many users on samewifi network. Download WiFi kill and Kick off otherwifi user from yourwifi network.



WiFi Kill


 Download WiFi Kill Android App


Also Read: 


WiFi Protector protect from WiFi Kill attacks ,MITM and exploit attacksAndroid Mobile Security Tricks and Apps


 ZAnti (Penetration Testing Android App)


ZAnti is also capable of hacking wi-fi network password from android mobile. Basically this app is made for checking security of your wi-fi network. With this app you can disable other wi-fi connection likewifi kill.ZAnti is like a hacking mobile toolkit for hackers. If you really want a hacking android app which can hack other userwifi network and you can do everything you want.



ZAnti


With this app you can hack


Change Google Result on whole wifiChange Website Images on Whole WiFiCheck other user mac address or ip addressSession Hijacking on NetworkMany More things. Downlaod ZAnti Android App


Also Read:


Must Have 25 Android App for Smart Mobile UserDownload Android Hacking & Security Apps – Series 1Download Android Hacking & Security Apps – Series 2Download Android Hacking & Security Apps 2015 – Series 3Turn your Laptop into WIFI hotspot in One Click Without SoftwareView and Retrieve Save WIFI Password in Android Mobile


Note: Use these apps only for educational purpose. Never Harm other people or wifi network from these wifi hacking android apps. 


Like we always android is not just a phone. It’s much more than an average phone. Now here we come with another trick , that you gonna do with your android phone. Nowadays I receive 10-20 messages on email, Dude how  I hack wi-fi password from android mobile. It is possible or not.

Now I write this post for my readers who daily read my blog and want clear your doubts about wi-fi hacking from android mobile. In this post, we briefly describe you how you hack wi-fi network and crack the password of any wi-fi from android mobile.

Hack WiFi from Android Mobile


Continue Reading...

How to Crack WinRAR Password Protected Files In Simple Steps

Short Bytes: Here, I’m going to tell you how to crack WinRAR password protected files. Losing/forgetting your WinRAR password could be a headache, but here’s a simple method.

WinRAR is a great utility to compress your files and protect it using a password. You can keep your data safe and save storage space by keeping it compressed in .RAR format. However, what to do if you forget the password of your WinRAR password protected file?

To crack WinRAR password protected file password, you need to recover the WinRAR file password and use it to unlock the file. There are some methods to crack WinRAR password using the command prompt, but they just work on integers and other combinations of characters.

So, all you need is a 100% working method that cracks the WinRAR password. In this detailed tutorial, we’ll be using a simple password recovery tool to recover your lost/forgotten WinRAR file passwords.

You need to use the .RAR Password Genius to crack WinRAR password and .ZIP Password Genius to crack the WinZIP Password.

In the steps described ahead, I’ll describe how to crack WinRAR password. WinRAR Password Genius is a tiny but powerful password recovery tool that is famous for high speed and guessing the complex password algorithms. It supports all the software that create the .RAR archives.

Let’s get started:

To crack the WinRAR passwords, you need to download the WinRAR Password Genius from this link and install it on your PC. This software is the solution to all your worries and it works in three steps to complete the WinRAR password recovery.To start WinRAR recovery process, you need to fire-up the software and import the .RAR file into the WinRAR Password Genius. You can do this by hitting the Open button and look for the .RAR file on your computer to bring it in the Encrypted File box.The software uses multiple attack techniques to crack the WinRAR password. Different kinds of attacks are Brute-force, Mask, Dictionary and Smart. These are used to guess different types of passwords and you need to use these methods accordingly. Read more about thesehere to select the type and settings.Now after choosing the Type of attack from the drop-down list, select the attack type and crack WinRAR password by pressing the Start button.After this, the software will start its process and recover the WinRAR password for you. As the software cracks the file, a pop-up will appear showing you the password.Now, open the password protected .RAR file in WinRAR and you’ll see a dialog that asks for the password. Now, enter the recovered password and hit enter. This will bypass the password and now you can access your files and extract them.

To crack the WinZIP password protected files, you need to use the WinZIP Password Genius.

Also Read: How To Schedule A Shutdown For Windows OS?

Did you find this how crack WinRAR password protected file tutorial helpful? Tell us in the comments below.

Continue Reading...

Monday, 5 October 2015

How to become an ethical hacker

An essential guide to becoming an ethical hacker

I often get a number of people ask for guidance  about how they can become an ethical hacker. I also receive even more requests about how to become a black hat hacker. The latter requests are ignored. below is a definition of an ethical hacker

Ethical hacker

noun

a person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent.

So if you want to be an ethical hacker the truth is there is no easy method to become a skilled hacker…… it’s easy to be a script kiddie and load up Armitage or Fast-track and fire every exploit known to man at a target. But what’s the point at firing Linux exploits at a Windows box!.

You need essential prerequisite knowledge

If you want to get into the IT  security world as a white hat you must be competent in the following areas:

NetworkingProgrammingDatabasesOperating systems (Linux and Windows)

Once you have a fairly good knowledge of the above points THEN it would a good idea to learn about hacking. So now you have a good understanding of the fundamentals of IT, you can now understand how to break some of the underlying vulnerabilities within computer architecture. The following activities should help you with this:

What areas to concentrate on in order to build a foundation
Networking – Cisco courses seem to be really good. I undertook all the CCNA courses available.
Programming – Focus on learning C++, Python/Ruby and PHP.
Databases – Play around with MySQL and MSSQL and make your own database to understand how it works.
Operating systems – Most flavours of Linux are the similar to one another, I use Debian on a lot of servers and of course Kali. Additionally it is worth understanding the more obscure areas of Windows such as the registry.

- Advertisement -

Read books about hacking (Here are some good examples of some) –

The Web Application Hacker’s Handbook: Finding and Exploiting Security FlawsHacking: The Art of Exploitation, 2nd EditionThe Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made EasyMetasploit: The Penetration Tester’s GuideCEH Certified Ethical Hacker All-in-One Exam GuideGoogle Hacking for Penetration Testers

Undertake FREE ethical hacking courses. 

These are very good for learning but won’t give you an industry recognised qualification, however they will teach you a lot about different areas of ethical hacking which will help towards recognised qualifications.

You can register for a free Cibrary account to do a free ethical hacking course at the following link –

Click Here to register

Undertake Recognised Online courses

These course are all paid for, however they are industry recognised and will help you find a job in the IT security sector.

CEHOSCPCISSP

Communicate and follow other fellow IT security enthusiasts through the following mediums

Facebook (https://www.facebook.com/pages/Hacking-News-Tutorials/252350961471136 )Google+Twitter

Self learn by watching online tutorials

www.securitytube.netwww.youtube.com

Download practice environments to practice and hone newly learned skills

DVWA (Dam Vulnerable Web Application)Metasploitable2Samurai WTF

 

 

Final note: Hacking is something that takes A LOT of your time!, be prepared to sacrifice friendships, relationships and that awesome social life you used to have! ;)

Continue Reading...

Advertising

Advertise Here

Blogroll

About