Vulnerability in Adobe Flash Player allows to Hijack a System, UPDATE NOW


Flash Player

Its important for Internet users, as Adobe has released critical security updates for Flash Player, and as we said it is critical because it allows an attacker to full hijack or take control of the systems.

Adobe has identified three vulnerabilities in its Flash Player software and It is highly recommended in the security bulletin to update Flash Player Software.

This is not important here to explore more about the exploit or bug inside Flash Player, but your security is really important for us, so below are some steps how you can update your Flash Player to its new safe version:

Windows 8 or Newer: If you are running windows 8 or Google Chrome on it or Internet Explorer 10 or 11—You are safe as these are all modern browsers which automatically updates them to the newer version.

For Older OS: If you are running any older OS then you have download and install the update manually, in case you are running Windows 7 then you also need to check for manual update.

For All Users: You must be clear about the version you are using is newer or Older, you can test for your system here to see which version you are using.

Affected Version:

All of the version below are vulnerable and if your one below this just click here to go to download center for latest release.


Vulnerability in Facebook allows to hack an account in 5 Seconds



Facebook hacked in 5 Seconds

Facebook is the largest social networking website on earth, that is being used by every almost every internet user, and Of course if using facebook, then also you are using login with facebook function somewhere on a website or for an app, but now its time to revoke them all now, as they a new vulnerability found in the Facebook SDK that put users’ authentication token at risk.

The Vulnerability allows an attacker to steal users’ authentication token and use them to login in his/her account, and can steal information, post anything on your behalf.

Roll of Facebook Auth Tokens or Login as Facebook:

First, we start from a website somewhere on a web, which has a Login with Facebook function, that many websites have right now, as you can see in the image below:

login with facebook
So, the Login with Facebook function allows third party to login into their app or websites through your information on Facebook and after just you login with facebook an a website or app, then device will store your access token and other information in unencrypted format, which can be easily accessed by an attacker in just 5 seconds.

5 Seconds sound amazing and scary too :)

This Vulnerability found by Security researchers from MetaIntell, the leader in intelligent led Mobile Risk Management (MRM.)

The 5 Second talk was said by researchers in a talk with the hacker news, they said:

With just 5 seconds of USB connectivity, Access token is available on iOS via juice jacking attack, no jailbreak needed and on Android file system, it can be accessed via recovery mode which is tricker and require more time.

If your access tokens and other information stored on your device, so it can be also stolen by other apps that have permission to access your file system.

Researchers also published a video, how they able to steal Facebook Auth Token from VIBER:



Energy firms hacked by ‘cyber-espionage group Dragonfly



More than 1,000 energy companies in North America and Europe have been compromised in a huge malware attack unearthed by US security firm Symantec.

The hackers are thought to be part of an Eastern European collective known as Dragonfly, which has been in operation since at least 2011.

Targets included energy grid operators and industrial equipment providers.

“Its primary goal appears to be espionage,” Symantec said.

Sabotage operations

Eighty four countries were affected, although most of the victims were located in the United States, Spain, France, Italy, Germany, Turkey, and Poland.

Since 2013 Dragonfly has been targeting organisations that use industrial control systems (ICS) to manage electrical, water, oil, gas and data systems.

Symantec said Dragonfly had accessed computers using a variety of techniques, including attaching malware to third-party programs, emails and websites, giving it “the capability to mount sabotage operations that could have disrupted energy supplies across a number of European countries”.

It had used Backdoor.Oldrea to gather system information, including the computers’ Outlook address book and a list of files and programs installed, and Trojan.Karagany to upload stolen data, download new files and run them on infected computers, Symantec said.

‘Interesting and concerted’

“The way Dragonfly targeted the companies in question was – while not groundbreaking – interesting and concerted. It appears they clearly mapped out their intended plan of attack,” said Rob Cotton, CEO at global information assurance firm NCC Group.

“The increasing frequency and sophistication of these attacks whilst concerning should not be a cause of alarm for the average consumer – yet. Government departments such as the CPNI (Centre for the Protection of National Infrastructure) provide sound advice to all key components of our society, ensuring the lights stay on and similar core services and functions critical to our way of life are available.”

The attack is similar to the Stuxnet computer worm, which was designed to attack similar industrial controllers in 2010 and reportedly ruined almost 20% of Iran’s nuclear power plants.

Symantec said Dragonfly “bears the hallmarks of a state-sponsored operation, displaying a high degree of technical capability”.

Independent computer security analyst Graham Cluley told the BBC that the motivation for the attack was unclear, but agreed that many would suspect the attacks were sponsored by a foreign state, highlighting a new era of online crime:

“There is no doubt that we have entered a new era of cybercrime, where countries are not just fighting the threat – but are also exploiting the internet for their own interests using the same techniques as the criminals.”

Dr Andrew Rogoyski, chair of techUK Cyber Security Group, told the BBC that “on the face of it, the attacks seem much more benign than Stuxnet but time and further analysis will tell.”

Chinese Android smartphone comes with preinstalled Trojan.



chinese malware android
If US has banned its several major government departments, including NASA, Justice and Commerce Departments, from purchasing Chinese products and computer technology due to suspected backdoors, then they are not wrong at all.
A popular Chinese Android Smartphone comes pre-installed with a Trojan that could allow manufacturer to spy onto their users’ comprising their personal data and conversations without any restrictions and users knowledge.
According to the researchers at the German security firm G Data, the Star N9500 smartphone, a popular and cheap handset device in China, comes pre-installed with Uupay.D Trojan horse, disguising as a version of the Google Play Store.
The trojan camouflage as the Google Play Store, so it enables Chinese Company to secretly install malicious apps, which creates the whole spectrum of abuse.
The nasty Spyware runs in the background and has capability to steal personal information, copy users’ data, record calls automatically with unlimited time and send costly SMS to premium services, thereby sending all the stolen information to an anonymous server based in China.
The malware is also capable to activate the microphone on users’ smartphone at any time in order to turn users’ smartphone into a bugging device that allows hackers to hear anything you are saying near by the phone.
The spy function is invisible to the user and cannot be deactivated,” reads the blog post published yesterday. “This means that online criminals have full access to the smartphone and all personal data. Logs that could make an access visible to the users are deleted directly.
In addition, the malicious software allow preventing security updates from being downloaded and one can not disable the program. “The program also blocks the installation of security updates,” claimed G Data.
Moreover, it is not possible to uninstall the trojan because it is embedded in the firmware of the Star-phone device.
chinese mobile virus
Unfortunately, removing the Trojan is not possible as it is part of the device’s firmware and apps that fall into this category cannot be deleted,” said Christian Geschkat, Product Manager at G Data. “This includes the fake Google Play Store app of the N9500.
The Star N9500 ​​is an affordable copy of the Samsung Galaxy S4, which can be easily found at various online retailers such as eBay and Amazon for 130 to 165 euros and is also equipped with a variety of accessories, such as a second battery, car charger adapter and a second cover.
But considering the high technological standard of device, the low price comes as a surprise and the security researchers at G DATA believe that it is the cheap price of the mobile device that has made possible by the subsequent selling of data records stolen from the smartphone owner.
We recommend you to download an up-to-date Mobile Anti-virus software and scan your device for the trojan and if found return the device back from where you purchased.
Avoid buying Chinese and cheap products in order to keep your privacy and personal information away from the hands of cyber criminals and prying eyes.


Lenovo A805e With 64-Bit Quad-Core Qualcomm Snapdragon 410 SoC Unveiled



Lenovo A805e With 64-Bit Quad-Core Qualcomm Snapdragon 410 SoC Unveiled



Lenovo has unveiled a large-screen smartphone running a 64-bit Qualcomm Snapdragon 410 processor – the Lenovo A805e – at the Tianyi Mobile Fair & Mobile Internet Forum organised by China Telecom.While the pricing and availability is not officially announced for the Lenovo A805e, reports indicate it might release in the middle July, which is earlier than originally slated, priced under $200 (approximately Rs. 12,000).According to VRZone, the Lenovo A805e is a dual-SIM device with a 5.5-inch qHD (540×960 pixels) display. It is powered by a 64-bit quad-core 1.2GHz Snapdragon 410 processor coupled with 1GB of RAM and Adreno 306 GPU.

The primary rear camera on the Lenovo A805e features an 8-megapixel sensor, however, while a front-facing camera is present, its resolution is not known. The Lenovo A805e is backed by a 2500mAh battery and offers NFC and 4G LTE connectivity. The handset will be available in Black, White or Champagne Gold, and features a faux leather design(see above) by Lenovo.

Other than the Lenovo A805e, LG also showcased the G3 Beat at the exhibition event by China Telecom and Qualcomm, a smartphone that is expected to be called the LG G3 mini when it is launched globally.

With no word on its price and availability, the LG G3 Beat (LGD728) comes with a 5-inch IPS display, contrary to the 4.5-inch display expected on the LG G3 mini. The firm has also dropped the screen resolution from QHD (1440×2560 pixel) on LG G3 to the considerably lower HD resolution of 720×1280 pixels on the LG G3 Beat.


IE11 syncs Web passwords across Windows, Windows Phone 8.1



Password sync, now on IE11 on Microsoft’s newest operating systems, makes moving among PCs, phones, and tablets easier. It’s also handy for Microsoft to keep customers in its ecosystem.


With the latest versions of its desktop and mobile operating systems, Microsoft synchronizes passwords for websites people visit with the Internet Explorer browser.

The sync service means that a password entered on IE11 on Windows 8.1 will be migrated to IE11 running on Windows Phone 8.1, Microsoft said in a blog post on Monday.

IE11 also does a better job of detecting login pages so that users will be prompted to save passwords more often.

Passwords, although an onerous part of the computing world, are ever more common as companies try to build direct relationships with customers through user accounts. Making passwords easier to handle — especially on mobile devices where it’s harder to type oddball combinations of letters, numbers, and punctuation — is a significant time-saver for people.

Sync services are also a good way to encourage people to keep using the same browser. Once a browser remembers how to log in automatically on a lot of sites, moving to another browser is more of a hassle. That’s especially true when people forget their passwords.

Microsoft is no doubt keen on keeping its IE users loyal as it faces strong desktop competition from Google Chrome and Mozilla Firefox and strong mobile competition from Chrome and Apple Safari.

Microsoft has another lever to push here, too: Windows apps distributed through its app store. These apps can use Web technology for login through Microsoft technology called the Web authentication broker.

Browser sync services have become a bigger deal as computing companies branched out to tablets and smartphones. With browsers spanning those machines and others like TVs, cars, and game consoles, sync services can ease the difficulties people have moving from one machine to another.

Popular Messaging app YO hacked by college students



Yo hacked
Newly Launched App named ‘Yo’ has been hacked, which had became a popular messaging App since last month. Official behind the app, confirmed the hack Today(Friday.)

Arbel (Creator of this App,) said in a conversation with the TechCrunch that the app was “having security issues,” and that specialists were working to alleviate the problems in the next few hours.

TechCrunch also got an email from the group of college students claiming to have hacked the Yo App. The group said that we are able to access any Yo’s user phone number and send Yo’s and push notifications to users. It means they could also push notification of any Malicious URL too.

This security breach was in public in the last few hours, one of the user on twitter posted a status with the pic says, “wow. many 1337. such bad security. I hacked Yo. Use #YoBeenHacked to talk about it.”

I know, some of you don’t know about this App, like me, because this app is shining like a star from Last month, when its creators raised over $1 million from investors and the number of users has skyrocketed to over 50,000 in the last month.

This app is used to send the word ‘YO’ to another user, :)

Need to move to IPv6 highlighted as Microsoft runs out of U.S. address space


Microsoft has been forced to start using its global stock of IPv4 addresses to keep its Azure cloud service afloat in the U.S., highlighting the growing importance of making the shift to IP version 6.

Microsoft doesn’t mention IPv6 in the blog post, but the use of the protocol would make its address problems disappear. The newer version of the Internet Protocol adds an almost inexhaustible number of addresses thanks to a 128-bit long address field, compared to the 32 bits used by version 4. Since every connected device on the Internet needs an IP address, there will be increasing pressure to move to IPv6 as more non-computer devices come online in the so-called Internet of things.

[ PathSolutions solves the network monitoring maze — and nets an InfoWorld Test Center Editor’s Choice. | Pick up expert networking how-to advice from InfoWorld’s Networking Deep Dive PDF special report and Technology: Networking newsletter. ]

The IPv4 address space has been fully assigned in the U.S., meaning there are no additional addresses available, Microsoft said in a blog post earlier this week. This requires the company to use the IPv4 address space available to it globally for new services, it said.

Microsoft makes it clear that the IP address registration origin does not equate to the physical location. For example, you can have an address registered in Brazil but allocated to a device or service physically located in Virginia. When Azure users install a new server it is still hosted in U.S. and data will remain stateside, Microsoft said.

Smaller companies are already doing this to keep their businesses going, and we’ll likely see more of it in the future, according to Jörgen Eriksson, project manager for IPv6 at .SE, the organization in charge of the Swedish top domain.

The adoption of foreign IP addresses gives some breathing room, but there are also drawbacks. It will become more difficult to use geolocation services that rely on IP addresses. Geolocation and ad revenue are such a powerful driving forces that they may help speed up the implementation of IPv6, Eriksson said.

Moving to IPv6 may stimulate more competition among ISPs, as new competitors will be able to get all the addresses they need more easily.

As the RIRs (Regional Internet Registries) have started to run out of version 4 addresses, the need to implement IPv6 has become more acute. The RIR’s job is to manage, distribute, and register IP addresses within their respective regions.

In April, ARIN (American Registry of Internet Numbers) said it was down about 16.8 million addresses. It will now be extra frugal, and there may be circumstances where it can no longer fulfill qualifying requests due to a lack of inventory.

On Wednesday, LACNIC (Latin America and Caribbean Network Information Center) announced that IPv4 can now be considered exhausted in its service region. The organization will continue to distribute IPv4 addresses, but also at a greatly reduced rate.

To get around this shortage, a market for IPv4 addresses has been created where some companies even make acquisitions to get their hands on more addresses, according to Axel Pawlik, managing director of the RIPE NCC (Réseaux IP Européens Network Coordination Centre). But in the long run rolling out IPv6 is the only sensible solution, he said.

Microsoft says like most other vendors that it’s committed to the rollout of IPv6. The foundational work to enable IPv6 on Azure is well underway, according to an FAQ. However, it’s unable to share a date when IPv6 support will be generally available at this time, it said.

They key to handling this transition as smoothly as possible is planning, which does not seem to be happening with consistency.

“People are distracted by trying to make money, and only looking at next week’s priorities. But at some point IPv6 will be next week’s priority, and there will be some problems,” Pawlik said.

There is a wealth of material online for people who want to learn more about the protocol. RIPE has posted a manual on its website for network architects and network managers who need help implementing IPv6 in their organizations.


Here’s How A Hacker successfully made a tool to hack New Facebook Accounts in just 15 Minutes

Facebook hacker

Many Hackers able to find bugs inside Facebook that could allow them to hack a Facebook account, and again in the hacking world, one of the Indian hacker able to make a facebook hacking tool that was able to hack any newly created Facebook accounts.

Hacker named “Abhibandu” demonstrated on his personal blog ‘How i hacked your unverified Facebook accounts.’

What is the process?

For a new account you have to signup over there and Facebook sends a verification code on to your email account and Abhibandu made a handsome code to easily crack that code in just 15 minutes.

Python Script that could hack a newly created Facebook accounts:

#!/usr/bin/env python

def add_zeros(end,tot):
while (len(zeros)<(len(tot)-len(end))):
return zeros+end

path=raw_input(” where do you want to store your dictionary file. eg. D:\derp\foo.txt “)
for i in range(0,loop_range):

for i in range(0,nine+1):
if len(j)<len(nines):
print ‘Generated and Saved!’

This attack could takeover on those Facebook accounts that doesn’t verified their accounts, so the next question is—how can we find an account which is unverified?

Abhibandu was able to do so either by guessing with an email address until Facebook asked to confirm the account, or by searching for emails on Facebook to see if they were verified. Either way, it wasn’t too hard for Abhibandu.

At Last, Abhibandu reported the hack to Facebook and within eight hours, he got a response from the fb security team. In the meantime this loop hole has been fixed by Facebook and Abhibandu received a nice bounty payout for notifying Facebook.

Chinese Military hacking and Spying in US Since 2007


Last month it was revealed that some of the Chinese officials hacked US companies to acquire trade secrets ,and now again a revelation comes out against China that its hacking group linked to Shanghai-based unit 61486 of the People’s Liberation Army 12th bureau may have targeted U.S. defense and European satellite and aerospace industries since 2007, according to network security company CrowdStrike Inc.

Chinese Hackers

The hacking group known as Putter Panda and continuing its spying since 2007. CrowdStirke were tracking them from several years and they decided after the indictment of the Chinese officers to publish a report on their findings, to call attention to the breadth of the military’s actions.

It is opening more truths and evidence behind the last hack, which was completely denied by the Chinese Government by saying “America should stop playing victim because America is the No. 1 hacking empire in the world.”

Ministry spokeswoman Hua Chunying told journalists, “Instead of reflecting on its own mistakes, the American side has intensified its behaviour. I don’t think this is very constructive.”

Hacking Command Room:

The Putter Panda said to be a part of the 12th Bureau of the PLA’s 3rd General Staff Detaprtment based in Shanghai, CrowdStrike said.

They Identified Chen Ping (cpyy)—Responsible for administration behind the malware used in the attacks and for the domains too which being used in exploiting the popular productivity applications such as Adobe (ADBE) Reader and Microsoft Office to deploy custom malware through targeted e-mail attacks, domains are registered by Chen Ping.

How they cyber-attacking?

According to the CrowdStrike research the group targeted victims with custom malware disguised as emails that containing PDF Invitations to aerospace and satellite conferences, job postings and also used the brochure of a Yoga Studio in Toulouse.

Once clicking the Files, they download malicious programs onto victim’s computer and after that they can see other devices and networks you connected to and eventually steal trade secrets and design schematics for satellite and aerospace technology.

Action of Reaction:

Just after few days of news came out that China is accused of hacking into US companies, It was the headline that the United States government may use visa restrictions to prevent Chinese hackers from attending the most important hacking conferences that will be held in Las Vegas this August: DefCon and Black Hat. Read a Full Report HERE.

You can read and download a Full Report from CrowdStrike Here.