Friday 9 May 2014

Get job at the NSA by cracking coded tweets

Decode NSA Tweet to get a job
 It is known that job applicants can extremely ingenious when it comes to finding new ways to make their CV’s stand out of the crowd but it’s not that common to hear about unconventional methods when it comes to employers methods of hiring.

This is the case of the National Security Agency (NSA) which are interested in hiring people with outstanding potential. Their method is at least interesting as they cut off the classic process: the typical job application, the CV and the covering letter. These been said, you might ask yourself how could you take a shot at a job at NSA.

Your answer awaitson Tweeter as NSA posted last night onits @NSACareers account a tweet containing a series of what seemed at first sight random letters and spacing followed by the hashtags #MissionMonday #NSA #News. At first this lead to confusion, some users even suggested that he feed was hacked or maybe an employee played a prank.

Later, the NSA confirmed the tweet and stated that it was part of a month long campaign of coded tweets to “explore careers essential to protecting our nation”. “As part of our recruitment efforts to attract the best and the brightest, we will post mission related coded Tweets on Mondays in the month of May” an NSA representative said. Well, NSA is known as the code makers and code breakers.

Within minutes after the tweet was posted, the code was cracked and translated simply as: “Want to know what it takes to work at NSA? Check back each Monday in May as we explore career essentials to protect our nation.”

The puzzles are expected to get harder in the coming weeks. Those who are able to crack the most complex codes are likely to be of interest to the NSA’s recruiters.

Apple on the way to Buy Beats Electronics for $3.2 Billion

Apple Logo

Earlier this year, Jimmy Iovine, founder of headphones giant Beats Electronics with rapper Dr. Dre, gave a clue as to what Apple was missing in its computer empire. He recalled that when iPods first came out more than a decade ago, they were linked to white earbuds with tinny sound, providing room for Beats to make a less flimsy product. "Apple wasn't focused on sound," Jimmy said at the time. "They were selling an iPod."

Things You Should Know About Beats Music

If Apple buys Beats for $3.2 billion, as some reports have suggested, the iconic computer company will suddenly have the high-level sound hardware to go with its numerous music products, from iTunes to the iPod to the iPhone.

Although Beats is the best-selling headphones maker, bringing in more than $500 million in revenue in 2012, one of the most important facets of the deal could be the company's launch of Beats Music in January. The subscription service, which charges a $10 monthly fee and competes with Spotify, Rhapsody, Rdio and Deezer, would give Apple a powerful foothold in a part of the music industry that is slowly becoming dominant. Sales of both albums and tracks have plunged over the past two years — including those sold via iTunes, the top music retailer — and on-demand subscription services are growing.

According to reports, the Beats executive team would report to Tim Cook, Apple's chief executive. This would put Iovine, who still moonlights as the head of Interscope Records, home of Eminem and U2, in an interesting position — an Apple executive who remains part of the record industry.

Neither Beats nor Apple would comment on the reports.

Friday 14 February 2014

Bill Gates spends his entire First Day back in Office only in Trying to install Windows 8.1

Bill Gates In Tension

On the first day of Bill Gates for the recently made part of engineering guide began with a troubleshooter sort, as the unparalleled organizer of Microsoft battled for a long time to introduce the Windows 8.1 update on the PC.

The thing is, Gates begun early to overhaul, however he got a blunder which we discover commonly on our PC , 'PC ran into an issue that it couldn't deal with and required to restart,' which normally resembles this:


Windows 8.1 Upgrade Error

What's more Gates was neglected to introduce the overhaul by Lunchtime, after that new Microsoft C.e.o Satya Nadella helped him and consequence was none, he additionally fizzled and got confounded.

"Bill is typically a really quiet fellow, so it was irregular to hear some of that dialect leaving his mouth," the source said.

A Microsoft representative said just that Mr. Doors' first day in his new employment had been "a taking in experience" and that, for the instantaneous future, he might backpedal to running Windows 7.

Edward Snowden obtained classified NSA documents by stealing coworker's password

Snowden Stealing Coworker Password
 We are very cognizant of the releases that the Whistleblower Edward Snowden did against the US National Security Agency (NSA) and in the wake of perusing each related redesign, viewing each report that he gave to different news sites, every one of you are left because of an address that, How he could complete this entire operation without any making a difference?

Yes, you are correct! The previous NSA builder Edward Snowden supposedly figured out how to gain entrance to many the ordered records by taking one of his colleague's passwords, as per an unclassified NSA notice got by the NBC News.

Three Members, one NSA's regular person representative, a dynamic obligation part of the U.s. Military and a builder were discovered included in the activities that may have helped Snowden's operation; from which NSA's regular person worker has been stripped of his exceptional status and has surrendered.

Other two has been impeded from entering National Security Agency (NSA) offices, the reminder states showing that their status is under survey as of now.

The colleague said that he permitted Snowden to utilize his Public Key Infrastructure (PKI) endorsement to gain entrance to the grouped data on "Nsanet" that was formally denied to enter by Snowden.

The reminder's record doesn't furnish much detail, consistent with NBC, however experiencing the entire notice, Snowden's by one means or another got one of his non military person NSA workers and associates to enter his watchword "onto Snowden's work station," the update states. "Unbeknownst to the regular person, Mr. Snowden was equipped to catch the secret key, permitting him significantly more terrific access to arranged data"

The update additionally states that the citizen colleague was not cognizant of Mr. Snowden's propositions that he "proposed to unlawfully unveil ordered data," and imparted his PKI authentication, an arrangement of greatly secure qualifications that furnished more stupendous access to NSA's inside machine framework, and "neglected to follow security commitments," that made him leave.

This was not the first occasion when we caught wind of the inclusion of the associate of NSA in the matter of purported country's pride. Heat in the month of November, the update has all the earmarks of being the first official affirmation of a Reuters report in November; Reuters reported that a percentage of the workers, the same number as 20 to 25 specialists who imparted their passwords had been distinguished, addressed, and evacuated from their assignments, yet the NSA never openly remarked on that report and Snowden seemed to deny it throughout an open Google talk simply a month ago.

Right away this is the thing that NSA should very attentive to the control supported by the laborers who work at NSA to complete the most refined undertaking to spy on every person, while their inbuilt risk may pass their head over.

Wednesday 22 January 2014

23-Tear-old Russian Hacker admitted to be unique creator of Blackpos Malware

Russian Hacker
 In the past reports of Cyber Intelligence firm "Intelcrawler" named Sergey Tarasov, a 17-year-old teen behind the handle "ree[4]", as the designer of Blackpos malware.

Blackpos otherwise called "reedum" or "Kaptoxa" is a viable crimeware unit, utilized as a part of the huge heist of perhaps 110 million shoppers' Credit-Debit cards, and individual data from the TARGET.

Later Researchers' examination uncovered that the definitive coder of Blackpos Malware was really a 23-year-old junior programmer named Rinat Shabayev and the youngster, Sergey Taraspov is the incharge for the specialized help office.

In a meeting with Russian channel 'Lifenews', Rinat Shabayev conceded that he had advanced the Blackpos crimeware unit. He elucidated that the system advanced by him was not implied for any sort of information robbery, rather the project was composed for the security testing.

He advanced the malware with the assistance of an alternate programmer with unknown character, whom he had met on the web. His unique arrangement was simply to offer the adventure, not to utilize it for pernicious aim without anyone else present.

His companion took the readymate codes from him and added more characteristics to it. Notwithstanding this data, he additionally admitted that the endeavor could be utilized for malignant purposes as well.

Analysts at Intelcrawler say that the same malware may have likewise been included in the Neiman Marcus ambush as well.

Whatever be the expectation of the programmer, however now more than 110 million individuals are enduring Visa burglary on account of his programming. Significantly in the wake of realizing that the malware has capability to order an enormous fiscal robbery, his supports are insufficient to be guiltless.

Monday 13 January 2014

How to hack a Wireless DSL Router, Exploit posted online


Hack Wireless DSL Router

A hacker from France named “Eloi Vanderbeken”found a way to hack NetGear and Linksys wireless routers on Christmas, and as well as, he distributed that secret exploit in public also.
The secret exploit allows an attacker to change the admin panel password to default without any admin authentication.

Eloi forgot his Linksys WAG200G router’s password and was trying to crack that , he scanned that and found a suspicious open TCP port. He researched on the part deeply and downloaded the copy Linksys firmware and then reverse-engineered that.

After a research 0n that port, he found that was a secret backdoor that allows anyone to send commands on admin basis without admin authentication. Well, it’s a cool exploit for- who really forgot the password, but may be dangerous for them where- Near-by “Hackers situated.”

 Eloi tried to describe you what and how he found the secret exploit, below are the routers which are affected by the Exploit:
  • Cisco RVS4000 fwv 2.0.3.2
  • Cisco WAP4410N
  • Cisco WRVS4400N
  • Cisco WRVS4400N
  • Diamond DSL642WLG / SerComm IP806Gx v2 TI
  • LevelOne WBR3460B
  • Linksys RVS4000 Firmware V1.3.3.5
  • Linksys WAG120N
  • Linksys WAG160n v1 and v2
  • Linksys WAG200G
  • Linksys WAG320N
  • Linksys WAG54G2
  • Linksys WAG54GS
  • Linksys WRT350N v2 fw 2.00.19
  • Linksys WRT300N fw 2.00.17
  • Netgear DG834[, GB, N, PN, GT] version < 5
  • Netgear DGN1000
  • Netgear DGN1000[B] N150
  • Netgear DGN2000B
  • Netgear DGN3500
  • Netgear DGND3300
  • Netgear DGND3300Bv2 fwv 2.1.00.53_1.00.53GR
  • Netgear DM111Pv2
  • Netgear JNR3210
May be affected:
  • all SerComm manufactured devices
  • Linksys WAG160N
  • Netgear DG934 probability: probability: 99.99%
  • Netgear WG602, WGR614 (v3 doesn’t work, maybe others…)
  • Netgear WPNT834
Here is the Exploit code, if you are looking for, and you can find a detailed list of routers which are affected or not HERE.