Category Archives: Hackers News
Hackers News
NSA’s Top-Secret SKYNET May Be Killing Thousands of Innocent Civilians
Elementary Errors in SKYNET
“There are very few ‘known terrorists’ to use to train and test the model,” Patrick Ball, the executive director of Human Rights Data Analysis Group, told the site. “If they are using the same records to train the model as they are using to test the model, their assessment of the fit is completely bullshit.”
US Drone Strike Killed Almost 4,000 People
Critical glibc Flaw Puts Linux Machines and Apps at Risk (Patch Immediately)
A highly critical vulnerability has been uncovered in the GNU C Library (glibc), a key component of most Linux distributions, that leaves nearly all Linux machines, thousands of apps and electronic devices vulnerable to hackers that can take full control over them.
How Does the Flaw Work?
Affected Software and Devices
- Virtually all distributions of Linux.
- Programming languages such as the Python, PHP, and Ruby on Rails.
- Many others that use Linux code to lookup the numerical IP address of an Internet domain.
- Most Bitcoin software is reportedly vulnerable, too.
Who are Not Affected
Where glibc went Wrong
“glibc reserves 2048 bytes in the stack through alloca() for the DNS answer at _nss_dns_gethostbyname4_r() for hosting responses to a DNS query. Later on, at send_dg() and send_vc(), if the response is larger than 2048 bytes, a new buffer is allocated from the heap and all the information (buffer pointer, new buffer size and response size) is updated.”
“Under certain conditions a mismatch between the stack buffer and the new heap allocation will happen. The final effect is that the stack buffer will be used to store the DNS response, even though the response is larger than the stack buffer and a heap buffer was allocated. This behavior leads to the stack buffer overflow.”
Proof-of-Concept Exploit Released
Patch glibc Vulnerability
Facebook Offering You $1000 to Run Advertisement Against Terrorism
Facebook Buckled Up to Fight against Terrorism
The First Person to Receive $1000 Credit
How did the idea strike?
“Rather than scream and protest, they got 100,000 people to like the page, who did not like the page and put messages of tolerance on the page, so when you got to the page, it changed the content and what was a page filled with hatred and intolerance was then tolerance and messages of hope” Sandberg stated.
Cyber World Fights Against Terrorism
- Youtube had wiped out more than 1000 dozens of radical videos from its database.
- Twitter had expelled 1,25,000 accounts of Jihadi members since in mid 2015.
- Google also rolled out a special advertising program for terrorist sympathizers who type extremism-related words in the search engine, but the “top” search results display anti-radicalized links.
How-to — Stealing Decryption Key from Air-Gapped Computer in Another Room
Air-gapped computers that are believed to be the most secure computers on the planet have become a regular target for researchers in recent years.
Extracting Secret Decryption Key in Seconds
How Does the Method Work?
“By measuring the target’s electromagnetic emanations, the attack extracts the secret decryption key within seconds, from a target located in an adjacent room across a wall,” reads the recently published paper [PDF].
Equipment Required:
- An antenna
- Amplifiers
- A software-defined radio
- A laptop
“The experiment…was conducted using a Lenovo 3000 N200 laptops, which exhibit a particularly clear signal,” the paper reads. “The attacks are completely non-intrusive: we didn’t modify the targets or open their chassis.”
Future Challenges:
*Note: When the team says the secret key was obtained in ‘seconds’, it is the total measurement time, and not how long the time would take for the attack to actually be carried out.
Wanna Mine Bitcoins Faster? Researchers Find New Way to Do it
A new machine for Bitcoin Mining called “Approximate Hardware” would make Bitcoin mining easier.
Bitcoin had gained tremendous popularity over a few couple of years among the virtual currencies due to its decentralized principle.
Mining a single Bitcoin is not an ice cake walk, as it requires an enormous amount of computing power to dig Bitcoins.
To overcome this issue and mine
This Android Malware Can Root Your Device And Erase Everything
A new Android malware has been making waves recently that have the capability to gain root access on your smartphone and completely erase your phone’s storage.
Dubbed Mazar BOT, the serious malware program is loaded with so many hidden capabilities that security researchers are calling it a dangerous malware that can turn your smartphone into a zombie inside hacker’s botnet.
Mazar BOT
Warning — Setting This Date On iPhone Or iPad Will Kill Your Device Permanently
Don’t Try this at Home!
An interesting software bug has been discovered in Apple’s iOS operating system that could kill your iPhone, iPad or iPod Dead Permanently.
Yes, you heard me right.
An issue with the date and time system in iOS had emerged recently when Reddit users started warning people that changing your iPhone’s or any iOS device’s date to January 1, 1970, will brick
Russia Wants to Kick Foreign Tech Companies Out Of The Nation
Someone wants to kick Microsoft, Google and Apple off from his land, but himself uses Gmail and Mac.
The newly appointed Internet Tsar German Klemenko, who is the first internet advisor of Vladimir Putin, wants to kick off American Giants from Russia.
In a 90-minute interview conducted by Bloomberg, Klemenko expressed his interest to vanish the presence of tech biggies of foreign
Here's How to Decrypt Hydracrypt & Umbrecrypt Ransomware Files
Over the last few years, we have seen several types of Ransomware malware that demand a whopping amount of money from users for the retrieval of their locked, compromised sensitive files.
We have also witnessed the birth of decryption solution for some of the Ransomware like Cryptolocker (partial), Coinvault, Rescue Kit.
One more solution has recently been released for decryption of