Showing posts with label News. Show all posts
Showing posts with label News. Show all posts

Torrentz.eu Shuts Down Forever! End of Biggest Torrent Search Engine

Over two weeks after the shutdown of Kickass Torrents and arrest of its admin in Poland, the world's biggest BitTorrent meta-search engine Torrentz.eu has apparently shut down its operation.


The surprise shutdown of Torrentz marks the end of an era.

Torrentz.eu was a free, fast and powerful meta-search engine that hosted no torrents of its own, but combined results from dozens of other torrent search engine sites including The Pirate BayKickass Torrents and ExtraTorrent.

The meta-search engine has announced "farewell" to its millions of torrent users without much fanfare, suddenly ceasing its operation and disabling its search functionality.

At the time of writing, the Torrentz.eu Web page is displaying a message that reads in the past tense:

"Torrentz was a free, fast and powerful meta-search engine combining results from dozens of search engines."

When try to run any search or click any link on the site, the search engine refuses to show any search result, instead displays a message that reads:
"Torrentz will always love you. Farewell."
Launched back in 2003, Torrentz has entertained the torrent community for more than 13 years with millions of visitors per day.

However, today, the popular meta-search engine has shut down its operation from all Torrentz domains, including the main .EU domain (both HTTP and  HTTPS version) as well as other backups such as .ME, .CH, and .IN.

Although many copyright holders were not happy with the site with both RIAA and MPAA have reported the site to the U.S. Government in recent years, says TorrentFreak, there is no news of any arrest or legal takedown of the site in this case.

Still, it would be fair enough to wait for an official announcement from the site owners.

ARM becoming a tough rival for Intel

ARM is now becoming a rival for Intel and Intel has also failed many times to crack lock assembled by British company on smartphone chip.




SoftBank Group Corp. of Japan has announced to buy ARM for $32 billion and has also shown plans to double the workforce of ARM within 5 years of takeover. This extra money for ARM's chip sways can also be used to cause a major revolution in the market, causing Intel a major threat.


Thus, ARM has become a major threat for the Silicon Valley giant, Intel. Rumors were also heard that Intel might try buying ARM so that they won't have to face the war coming in near future if SoftBank goes with the idea of buying ARM. Some analysts have also suggested that this idea is highly unlikely because of the design that Intel technologies have developed over the years and the user's reliability image of Intel.


Intel is a strong company, invented microprocessor, a well known chip maker, a major provider of personal computer and server system chips. In 2015, Intel generated a revenue of $55.4 billion.

Fired From Facebook, Noah Kagan Speaks About His Most Important Lesson

Noah Kagan was only 24 years of age when he was hired at Facebook. According to the news, Noah Kagan was Facebook’s 30th Employee and joined Facebook when it was about one year old. At that time Facebook was only getting few millions new signups per day.
Noah Kagan worked as a product manager. However, due to some fair reasons, he got fired after 9 months. According to Noah Kagan, he made four mistakes and one of the major mistakes was leaking Facebook’s internal developments to TechCrunch.
Noah Kagan is now a founder of the marketing company which is known as AppSumo. AppSumo is a daily deals website for digitally distributed goods and online services. AppSumo was founded in March 2010 by Noah Kagan. Today the company has over 700,000 active subscribers.
During an interview, Noah Kagan recalls the incidence when he used to approach Mark Zuckerberg which his ideas and Mark Zuckerberg used to reply something like “Will it help Facebook Grow?”
During an interview with Ramit Sethi who is an American personal finance advisor and entrepreneur throws a light on what Noah Kagan actually learned during the 8-month period of his Facebook life.
Noah Kagan in an interview said that “I think that’s the biggest takeaway that may be the most successful in the most money is one thing and that one thing is when you are running your business have one goal. That’s it”
Noah Kagan learned an important business lesson to have one goal at a time and also helped Ramit Sethi to build his personal finance book “I will teach you to be Rich” which became a New York Times bestseller.
During an interview with Ramit Sethi, Ramit Sethi told us how Noah Kagan helped him to trim the 37 pages book down to only 5 Page. When Noah Kagan ask Ramit Sethi what his goal was? Ramit answered that he want his book to be in the New york times bestsellers list. Now Ramit Sethi’s book is on New York times bestseller list.
Watch The Interview:
So what we can learn from Noah Kagan! Actually, Multiple goals will always create different thoughts on mind making you unable to focus and will distract you with different thoughts which will hamper your main focus towards achieving what you desire.

Way To run pokemon Go in pakistan

"Now Pokemon Go is in Pakistan"



Pokemon Go is here, the fulfillment of many dreams for catching those magical little creatures in real life (or as real as it could be). However, the thing with Pokemon Go is that catching Pokemons in the game is only half the fun (or well, three-quarters of fun).
Note: Although the application is not officially available in Pakistan but you can download it through our guide.
So without further ado, here’s a simple step by step process: 
Android:
  • Download the APK for the game on your device
  • Go to the Downloads folder using any file explorer
  • Click on the downloaded file
  • Tap on install
  • Pokemon Version


iPhone:
  • Open App Store and tap on Apple ID (your current email)
  • Tap on Sign Out.
  • Go to the Settings app.
  • Tap on General.
  • Tap on Language & Region near the bottom.
  • Tap on Region
  • Check off United States.
  • Go to the Pokรฉmon Go listing on the App Store on your iPhone or iPad. (Tap Change Store if it stays stuck on your old region and says the item isn’t available in the current store.)
  • Tap on Get and then on Install.
  • Tap Create New Apple ID.
  • Check United States if it isn’t already checked.
  • Fill out the required information.
  • Tap None for billing information (Pokรฉmon Go is free).
  • Verify your email address by opening the verification email sent to you.
  • Download Pokรฉmon Go.
  • Login to your new US iTunes Account if you aren’t already logged in.

If you follow these steps correctly, you should be well on your way to becoming a Pokemon trainer.
Getting Started
Now that you have the app installed, it’s time to sync an account with the app to keep track of your Pokรฉmon. You can either sync it with your Google account, or if you’re a super nerd and have a Pokรฉmon Trainer Club account, you can use that to sign in.

Once you sign in, you might get this error message about server issues. Unfortunately, there are too many people trying to play and this is not something that has been worked out at the moment. If you are unlucky enough to experience this saddest of all screens, I’m afraid you have no choice but to wait a little while before checking again. When you’re signed in, you will be asked to customize your avatar before the game play begins.

Now it’s time for the real fun to begin.

Gyms
Like pokestops, Pokรฉmon gyms are also located at different public places.  Once you reach level 5 by gaining XP through finding Pokรฉmon and visiting pokestops, you can go to a gym and join one of three teams: Valor, Mystic, or Instinct, each represented by red, blue and yellow respectively. You can then battle different Pokรฉmon at the gyms.
The entire concept of the game is really cool and something that shows just how far technology has come. We went from trying to catch Pokรฉmon in the games to watching the anime and trading Pokรฉmon cards to now actually being able to catch Pokรฉmon in the (somewhat) real world. Now all that’s left is to wait for real Pokรฉmon to come into our world (let’s do this, science).

Top 10 Online Activities That Could Send You In Jail

Any of these 10 online activities could land you in jail in some part of the world

Internet is an unrestricted realm for its users. It brings you latest information, allows you to share movies, images and music without any bounds, allows you to communicate in a split second and share files. It is a medium which is full of advantages, but there are some disadvantages that come with it in some countries. Particularly if you don’t follow certain rules and regulations laid down by these countries while using the Internet.


Cyber crimes and terrorist attacks have dramatically increased over the years and that may be one of the reasons that if one is seen violating rules of Internet, he/she may be put behind the bars.

So, see the below activities that can get you arrested in some parts of the world.

10 Online Activities That Can Get You Arrested

#1 Having An Open Wi-Fi

Have an Open Wi-Fi

Keeping your WiFi Open and not keeping it password protected can sometimes land you in prison. Your open Wi-Fi connection can be used by criminals or terrorists without your knowledge and this can land you in trouble with the law in almost any country.

This happened with a person name Barry Covert whose open WiFi was used by his neighbor to access child pornography websites. Though, police arrested his neighbour after investigations, Barry had to face the police questioning for a month before the correct person was arrested.

It is always better to password protect your Wi-Fi with WEP, WPA (WPA-Personal), and WPA2 (Wi-Fi Protected Access version 2).

#2 Deleting Your Search History

Deleting Your Search History
Sometimes erasing your search history can also land you behind bars. This happened in United States, when a person namely David Kernell was arrested for deleting information on his computer. A University of Tennessee student, Kernell was being investigated by federal authorities for allegedly hacking Yahoo Account of the then vice presidential candidate, Sarah Palin.

India to had brought about laws making it mandatory for users to save their browsing history for 3 months. But the same was scrapped after there was huge public outcry against it.

#3 Offensive Posts, Messages or Tweets



Making offensive posts or tweets or sending offensive messages can land you in trouble in any part of the world. Two persons from Leigh Van Bryan aged 26 and Emily Bunting aged 24 tweeted about their upcoming visit to USA, “Free this week for a quick gossip/prep before I go and destroy America”.
They were interrogated for about five hours by the authorities. Bryan and Bunting tried to convince the police that “Destroying” was a British  slang for “Partying.”

#4 Using VOIP services



This issue is country specific and only limited to Ethiopia. Using VOIP services like Skype is strictly prohibited in Ethiopia and can land you in prison (An user from Ethiopia has contradicted this). The country’s new telecommunications law strictly prohibits VOIP services, which consist of audio and video communication and transfer of information over VOIP clients. We advise you that if you are citizen or tourist of Ethiopia, kindly check up with authorities before using Skype or any other VOIP services.

#5 Dancing in a Video



This is a serious offence in Iran. In fact, six persons were arrested for dancing to a video from Pharrell Williams song “Happy”. The Iranian judiciary found them guilty and they received 91 lashes as well as year’s prison sentence. Though later, the sentences were suspended and they were let off in six months.


In Russia, a youth was jailed in Russia for 15 days and two women were jailed for 10 days after they were found to be allegedly dancing and making a video near a second world war memorial.

#6 Leaving Internet Comments



Syria is now a battlefield between different warring factions for control of territory. Even then, commenting on the Internet is a crime in Syria. Human Rights Watch reported that in 2007, Syrian authorities arrested two person and they were shifted to unknown place, apparently for offering their comments about the censorship laws in Syria on a website.

#7 Translating Articles



Translating banned books can land you in jail in any country. Thailand authorities arrested an American citizen who translated one such article on his blog. The article was termed as “offensive to the autocracy” by the Thai authorities who consider their King as a supreme being. Even posting on Facebook/tweeting against the King can land you in jail in the Lese Majeste laws.

In Indonesia, a person was put behind bars for two years after he posted “God does not Exist” on “Facebook”.

#8 Gambling



Online gambling is banned in many countries across the globe and can land you behind the bars. This includes if you organize gambling or play online games like Poker, Blackjack etc.

#9 File Sharing

File sharing is a contentious issue. In some countries you are free to share movies, images or files without the worry of the law but in many countries it is illegal to share what is considered as pirated content. In some places even downloading torrents is considered as being unlawful.

#10 Posting Lyrics on Facebook

This may have happened only once. Unites States authorities arrested rapper and school student, Cameron D’Ambrosio for posting rap lyrics on Facebook. The police allege that D’Ambrosio made terrorist threats under the garb of rap. Prosecutors sought to charge D’Ambrosio with threats to make a bomb or hijack a vehicle, carrying a maximum sentence of 20 years in prison.
There are many such laws which can put in a spot of bother while surfing online. Making racist comments or hurting religious sentiments is a strict taboo online like it is in the real world. If you know of any other such unknown laws exist in some country, kindly note them down in the comments section.

Hackers Can Steal Your ATM PIN from Your Smartwatch Or Fitness Tracker

smartwatch-hacking-atm-pin
As your day-to-day apparel and accessories are turning into networked mobile electronic devices that attach to your body like smartwatch or fitness band, the threat to our personal data these devices collect has risen exponentially.

A recent study from Binghamton University also suggests your smartwatch or fitness tracker is not as secure as you think – and it could be used to steal your ATM PIN code.

The risk lies in the motion sensors used by these wearable devices. The sensors also collect information about your hand movements among other data, making it possible for "attackers to reproduce the trajectories" of your hand and "recover secret key entries."

In the paper, titled "Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN," computer scientists from the Stevens Institute of Technology and Binghamton University used a computer algorithm that can guess your password and PIN with about 80% success rate on the first attempt, and over 90% of the time with 3 tries.

Retrieving Passwords and PINs Using this Algorithm


Researchers say their "Backward PIN-Sequence Inference" algorithm can be used to capture anything a person type on any keyboard – from automatic teller machine or ATM keypads to mobile keypads – through infected smartwatches, even if the person makes the slight hand movements while entering PINs.

"The team was able to record millimeter-level information of fine-grained hand movements from accelerometers, gyroscopes and magnetometers inside the wearable technologies regardless of a hand's pose," reports Phys.org.

Although the researchers do not name specific wearable devices that are vulnerable, they note that attackers can record information about your hand movements...

...either directly by infecting your wearable device with malware or remotely by intercepting the Bluetooth connection that links your wearable device to your phone.

The bottom Line:


The team says it doesn't have any robust solution to prevent this attack but recommends manufacturers and developers to confuse attackers by inserting "a certain type of noise data" that would allow the device to be still used for fitness tracking, but not for guessing keystrokes.

Another way is to take a low-tech approach – Always enter your passwords or PINs with the hand that is not having a wearable device with the highly sophisticated motion tracker.
Google protects Chrome against quantum hacking before it can even happen

Google protects Chrome against quantum hacking before it can even happen

James Martin
Worried about quantum computers accessing your precious, precious encrypted data? Well, you're probably not worried about that yet, but Google wants to make sure you never will be.
The search giant is working on post-quantum encryption for its Chrome internet browser, it announced today in a blog post from software engineer Matt Braithwaite.
Quantum computers, while still only in their infancy, use advanced aspects of quantum physics to solve problems exponentially faster than today's binary computers. That means that modern encryption, like the current internet go-to of HTTPS, wouldn't stand up to quantum attacks.
Quantum computers are still extremely experimental today, and there's no guarantee that a large quantum computer capable of that kind of attack will ever be built. The issue is that even a hypothetical quantum computer could "retrospectively decrypt any internet communication that was recorded today...thus even the possibility of a future quantum computer is something that we should be thinking about today," wrote Braithwaite.
Enter Google's post-quantum cryptography. Rolled out over a small number of connections between Chrome and Google's servers already, the new style of encryption key is being tested alongside current security measures. If the key is successful, Google says, it should stand up to future quantum computers.

Apple Patents Technology to remotely disable your iPhone Camera at Concerts

apple-camera
Here's something you'll not like at all:

Apple has been awarded a patent for technology that would prevent you from snapping pictures and shooting videos with your iPhone or iPad at places or events, like concerts or museums, where it might be prohibited or inappropriate.

The patent, granted on Tuesday by the United States Patents and Trademark Office, is highly technical.

Apple's latest patent describes an iPhone or iPad camera receiving coded infrared signals beamed from emitters in public places would temporarily disable device camera functionality, preventing any photography or recording for as long as the signal is on.
"An infrared emitter can be located in areas where picture or video capture is prohibited," reads the patent. "An electronic device can then receive the infrared signals, decode the data and temporarily disable the device’s recording function based on the command."
The technology patented by Apple could also be used to beam information about an object or a place to a lot of people iPhones at the same time when they are in the same location -- like providing tour guide for a museum exhibit, or offering coupons in a store or retail outlet.
apple-iphone-camera
Titled 'System and methods for receiving infrared data with camera designed to detect images based on visible light', the patent was first filed in September 2014.

Indeed, it is pretty common to be asked or requested to turn off all electronic devices while attending any concert or show. But, majority of audience ignore the request and snap photographs and record video throughout the show.

Many musicians and comedians get upset about such practices.

With this technology, the company wants to help singers, actors and performers prevent illegal photos or streams from being uploaded online. Also, it would be helpful for customs officials to block anyone taking photos at a port of entry or a border.

But what if people with more nefarious intentions used this technology?


The technology can be used by police to limit smartphone filming of acts of brutality or protests, or it could even help a government shut off filming in certain locations.

Moreover, it’s not even hard to imagine a government like North Korea or China using the technology to blackout social media coverage of the protests.

Anyway, you do not need to worry too much about seeing your iPhone camera disable at certain events. Because technology companies like Apple and Google files for patents all the time, but only a few of its ideas are actually commercialized.

This Android Hacking Group is making $500,000 per day

android-hacking-tool
Own an Android smartphone?

Hackers can secretly install malicious apps, games, and pop-up adverts on your smartphone remotely in order to make large sums of money.

Security researchers at Cheetah Mobile have uncovered one of the world's largest and most prolific Trojan families, infecting millions of Android devices around the world.

Dubbed Hummer, the notorious mobile trojan stealthily installs malicious apps, games, or even porn apps onto victim's phones and yields its creators more than $500,000 (£375,252) on a daily basis.

First discovered in 2014 by Cheetah Mobile, Hummer gained traction in early 2016 when the Trojan family was infecting "nearly 1.4 Million devices daily at its peak" with 63,000 infections occurring daily in China, according to researchers at Cheetah Mobile Security Research Lab.
"This Trojan continually pops up ads on victims' phones, which is extremely annoying," researchers wrote in a blog post. "It also pushes mobile phone games and silently installs porn applications in the background. Unwanted apps appear on these devices, and they are re-installed shortly after users uninstall them."
Even after the number of phones infected has declined, Hummer is still infecting nearly 1 Million new devices per day, making it the most widespread trojan family in the world.

Every time Hummer installs a new app on the infected devices, it's developers make 50 cents. Therefore, the group behind this Trojan is believed to be making more than half a million dollars (over $500,000) daily.

...and over $15 Million per month.

Here's How Hummer Work:


Once a device is infected with Hummer, the Trojan proceeds to root the phone to gain administrator privileges, which allowed it to discreetly install unwanted apps, games, porn apps as well as malware in the background.

This Android Hacking Group is making $50,0000 per day
These apps and malware end up consuming large amounts of network traffic, potentially affecting the victims with large bills from their Internet providers.
"In several hours, the trojan accessed the network over 10,000 times and downloaded over 200 APKs, consuming 2 GB of network traffic," the researchers noted.

Hummer is almost Impossible to Uninstall


The bad news for affected Android users is that Hummer is extremely difficult if not impossible to get rid of, because the Trojan takes control of the phone at admin level, making it impossible for traditional antivirus tools to uninstall Hummer.

The dangerous part: It is impossible to delete the Trojan through a factory reset due to the fact Hummer comes equipped with up to 18 different separate rooting exploits that allow it to root itself on a phone, the researchers said.

Recently, Trend Micro researchers also detected a similar threat known as Godless that came with Android rooting exploits, affecting 90 percent of all Android devices available in the market today.

Hummer spreads itself using a different number of domain names and third-party app stores, tricking users into downloading malicious apps or fake versions of popular apps like Facebook or Twitter.

The researchers claim to have traced the source of the Trojan family to an "underground internet industry chain" in China, based on an email address linked to the domain names used by the malware.

India (154,248), Indonesia (92,889), Turkey (63,906), China (63,285) and Mexico (59,192) are the top five countries where Hummer has made most of its victims, but the Trojan is also infecting Android users in the U.S. and Europe.

Google’s Android mobile platform has been a primary target of attackers, so it's better for you to avoid downloading apps from outside of the Google Play Store or untrusted sources. Moreover, always "review the developer" even if downloading apps from official app store.
Teenaged student shuts down 444 school websites to tell teachers they are incomptent

Teenaged student shuts down 444 school websites to tell teachers they are incomptent

Teen student from Japan says that he DDoSed 444 school websites to make teachers aware of how incompetent they were

Teenaged student shuts down 444 school websites to tell teachers they are incomptent
A 16 year-old student from Japan DDoSed websites of 444 elementary, junior high, and high schools in the area just to ‘remind teachers they are incompetent.’
The teenager has been arrested on May 11 and Osaka Police have filed a case of obstruction of business charges against him. The police say the teen launched a denial-of-service (DoS) attack against the Osaka Board of Educations server which holds the webpages of 444 elementary, junior high, and high schools in the area.
Although in high school now, at the time of the attacks last November, the student was in junior high school. According to police, he said his own school environment is what motivated his actions.
“I hate how the teachers talk down to us and never let us express ourselves. So, I thought I would remind them of their own incompetence. It felt good to see them have problems. I did it several times,” the boy said.
Police seized the student’s computer and some books about hacking. It is believed that he downloaded a DDoS tool which sent large volumes of data to the Board of Education servers, rendering access impossible for periods of about an hour. He would then confirm the take-down by monitoring the websites with his smartphone.
He also told police that he had wanted to join the hacking group Anonymous and that he didn’t know schools other than his own would be affected in the attack.
This incident would mark the first time in the history of Japan that a cyberattack was launched against a local government, and punishments for such a crime include a maximum three-year-prison sentence or 500,000 yen fine.