Login / Register

Tech News

  • Top Famous and Interesting Bugs in Computer Science World

    1. Ariane 5 Crash

    Ariane 5 was a rocket used to launch spacecrafts. It was exploded only about 40 seconds after its launch. The crush was due to very common bug known as Integer Overflow. It happens when we try to store a number greater than the maximum number that can be stored in a memory. This incident resulted in the loss of $370 million.

    2. Patriot Missile Software Failure

    28 American soldiers were killed and 98 were injured when an Iraqi missile hit their barracks. The patriot missile system failed to track and intercept an incoming missile due bug in patriot’s radar and tracking software.

    3.Y2K Bug

    During 1960s the computer engineers used 2 digits to represent years. So 1970 would be represented as 70. They used only 2 digits to reduce the size to store the data. This method worked fine till 31 Dec, 1999. But on 1 January, 2000 many computers would have read the year as 1900. To fix this little bug the engineers have to do lot of extra work.

    4. PayPal Error

    Chris Reynolds from Pennsylvania became world’s richest man when PayPal erroneously credit about $92 quadrillion in his account.

    5. Gangnam Style broke YouTube

    When YouTube was developed a 32 bit signed integer was used to store the video’s view count. At that time nobody thought that a video would get views more than maximum size of 32 bit singed integer. But Gangnam Style video got views more than this limit. After the limit was exceeded the view count started showing some negative value. Google fixed the bug by changing the view count to a 64 bit signed integer.

    6. Bug in Windows calculator

    Windows calculator doesn’t give correct answer for square root(9)-3. The answer should be 0 but it doesn’t give 0 as an output. See following snapshot. This is true for any other number. For example answer of sqrt(4)-2 should be 0 but it won’t give 0 as an answer. Remember this bug exists in all versions of windows & it is possible that you may see different outputs on different versions of windows See the snapshot:

    Read more »
  • Top 5 hacker groups that made the internet a battleground in 2016

    IBTimes UK looks back at the top 5 elite hacker groups that are believed to be responsible for conducting some of the most prominent cyberattacks of the year.

    1.The Kremlin hackers – Fancy Bear and Cozy Bear

    Throughout the US presidential elections, Russian state-sponsored hackers featured prominently in allegations Putin's government was interfering with the elections. US authorities have now officially accused Russian hackers of the election cyberattacks. Here's looking into what the groups have been up to the past year.

    1.1.Fancy Bear

    The Fancy Bear hacker group – which is also known as APT 28, Sednit, Sofacy and Pawn Storm, among others – made headlines this year after security researchers identified the group as being responsible for conducting the high-profile hack of the Democratic National Committee (DNC). The group is believed to be affiliated with the Russia's Main Intelligence Agency (GRU).

    According to CrowdStrike, the group has been active since early 2000 and is believed to have been actively engaged in cyberespionage activities. Other security researchers believe that the group has been actively conducting cyberattacks on targeted individuals and organisations. According to ESET, in one of their active campaigns, Fancy Bear hackers were found to have a set 9-5 working period, likely indicating that the group was a state-sponsored outfit.

    Some of Fancy Bear's most notable cyberattacks, apart from the DNC hack, include the Wada hack, the series of zero-day cyberattacks and the recently uncovered targeted attacks against a Ukrainian artillery unit, which saw the threat actors deploy customised Android malware to collect information.

    2.Cozy Bear

    The Cozy Bear hacking group, which is also believed to be involved in the DNC hack, are considered to be a separate unit of Kremlin hackers, allegedly affiliated with the Russian Federal Security Service (FSB – the successor of the infamous KGB). The threat actors are also believed to have launched long-term cyberespionage campaigns, aimed at gathering sensitive intelligence.

    In the months leading up to the US presidential elections, security researchers uncovered that the hacking group was targeting prominent Washington-based think tanks which focus on Russia.

    The group is also believed to have launched a wave of cyberattacks, targeting non-government organisations' US government entities, hours after Donald Trump was declared victorious in the 2016 presidential elections.

    3.Shadow Brokers NSA cyberweapons hack

    In August, the mysterious hacker group dubbed Shadow Brokers claimed responsibility for stealing and leaking National Security Agency (NSA) cyberweapons. The group claimed to have hacked the NSA elite hacker group known as the Equation Group, only to steal powerful hacking tools and put them up for auction on the dark web (an encrypted internet network).

    The attack made headlines, highlighting how even the most notorious government intelligence agencies in the world could potentially be targeted by cybercriminals.

    Despite the notoriety of the hack and various security experts having confirmed that the stolen cyberweapons appeared to be legitimate, Shadow Brokers have not found any buyers.

    The group eventually abandoned its auction and now appears to have moved to directly selling the stolen goods on an underground hacker site ZeroNet. It remains to be seen whether the move actually garners any further interest from buyers.

    4.Cyber thieves hacking banks

    The year 2016 saw several high profile bank hacks, which led to millions of pounds stolen by hackers.

    Although most of the investigations into the global bank hacks remain ongoing, with little to no new intel on the identity of the hacker groups responsible for the thefts, cyber thieves played a prominent role in ramping up cybercrime this year.

    The Bangladesh Bank hack tops the list of the most notable attacks. However, it has been a busy year for cyber thieves. Hackers even hit ATMs across the globe, deploying customised malware to trick machines into spitting out large amounts of cash. ATMs in Thailand and Taiwan, among others were affected.

    Meanwhile, hackers also successfully conducted cyberheists against banks in Ukraine, Ecuador and more. In Britain, the recent Tesco Bank hack made headlines after it was uncovered that hackers successfully stole £2.5m ($3.09m) from 9,000 customers.

    5.Islamic State hackers

    The year 2016 saw many "kill lists" and cyberthreats brought forward by hackers working for Islamic State (Isis).

    In April, pro-IS hackers made headlines by publicly releasing a hit list of thousands of New Yorkers. However, according to non-profit organisation Ghost Security Group (GSG), which monitors terrorism-related activity online, these hit lists are not real.

    Instead, GSG analysts claimed that these lists were more often created by script kiddies – novice hackers – attempting to build a reputation by publically displaying their skills.

    Read more »
  • Locky Rises to the Top of the Email Threat Heap

    The Locky ransomware has become the No. 1 email-borne threat, overtaking Dridex and making good use of JavaScript attachments to lead an explosion of malicious message volume.

    According to the latest Proofpoint Threat Summary, malicious mails were up 230% quarter-over-quarter, with campaigns peaking at hundreds of millions of messages per day. Among email attacks that used malicious document attachments, 69% featured the new Locky ransomware in Q2, versus 24% in Q1.

    The report noted that the Necurs botnet went offline in June, silencing the massive Locky and Dridex campaigns that defined the first half of 2016. But by the end of that month, the first large Locky email campaigns began again, with all signs pointing to a regrowth of the Necurs botnet.

    The report noted that despite the volume of messages, threat actors were able nonetheless to conduct highly personalized campaigns—even at scales of tens to hundreds of thousands of messages. There is also a trend towards variety in approaches to increase the effectiveness and scale of the attacks. Bad actors repeatedly shifted tactics with new loaders, document attachment types, and obfuscation techniques to evade detection. Also, social media phishing attempts rose by 150%, due to the proliferation of things like fake customer service Twitter accounts and the like.

    Read more »
  • TOP 5 Favourite Operating Systems Of Hackers of 2017

    So check out 5 best Linux distro for hacking purposes :

    1. Kali Linux

    Kali Linux maintained and funded by Offensive Security Ltd. is first in our list. Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. Kali is the one of the best and favourite operating systems of hackers.

    2. BackBox

    BackBox is an Ubuntu-based Linux distribution penetration test and security assessment oriented providing a network and informatic systems analysis toolkit. BackBox desktop environment includes a complete set of tools required for ethical hacking and security testing

    3. Parrot Security OS

    Parrot Security OS (or ParrotSec) is a GNU/LINUX distribution based on Debian. It was built in order to perform penetration tests (computer security), Vulnerability Assessment and Mitigation, Computer Forensics and Anonymous Surfing. It has been developed by Frozenbox’s Team. Like Kali Linux Parrot Security OS is also hackers favourite operating system.

    4. DEFT Linux

    DEFT stands for Digital Evidence and Forensic Toolkit and it’s an open source distribution of Linux built around the DART (Digital Advanced Response Toolkit) software and based on the Ubuntu operating system. It has been designed from the ground up to offer some of the best open source computer forensics and incident response tools that can be used by individuals, IT auditors, investigators, military, and police.


    Pentoo is a Live CD and Live USB designed for penetration testing and security assessment. Based on Gentoo Linux, Pentoo is provided both as 32 and 64 bit installable livecd. Pentoo is also available as an overlay for an existing Gentoo installation. It features packet injection patched wifi drivers, GPGPU cracking software, and lots of tools for penetration testing and security assessment. The Pentoo kernel includes grsecurity and PAX hardening and extra patches – with binaries compiled from a hardened toolchain with the latest nightly versions of some tools available.


    Read more »
  • Reasons You NEED A VPN In Your Digital Life

    Why do you need a VPN in your life? The most obvious reasons are as follows: 

    • Anonymity: VPNs keep all your online activity and communications secure, along with your identity making them a must-have for anyone that is concerned about hackers, snooping or their privacy online. They also prevent your ISP from tracking your activities and allowing you to visit websites that aren’t allowed in your country, like Pirate Bay or streaming sites.
    • Different IP Addresses: You can browse the web from different IP addresses, which is great for when you’re traveling. For instance: say you’re a British national in the US and you want to watch the BBC. Simple, just login in with a UK IP and you can. And it works the same in reverse, giving US citizens access to US content while outside the US.
    • Wi-Fi Security: If you’re logging onto public Wi-Fi networks like the ones used inside airports and coffee shops, a VPN will keep your details secure, hiding you behind a layer of encryption thereby making it impossible for hackers to access your personal data.

    For Mobile:

    1.Psiphon: Open source web proxy designed to help Internet users affected by Internet censorship securely bypass content-filtering systems

    Download Psiphon Pro

    2 SUPER VPN FREE VPN CLIENT:Super VPN proxy app is the choice of millions of people because it is reliable, fast and secure. It converts your identity into someone else and allows you to open the prohibited websites in any country.

    3. HOTSPOT SHIELD FREE VPN PROXY: Hotspot Shield is the most standardized proxy server app for android. You can easily open the banned websites and restricted mobile applications.

    4. PROXYDROID: ProxyDroid offers the same features like the above proxy apps. The unique feature of this proxy app is that it will not drain your battery power as compare to other proxy apps for android.

    For Computers:
    1.Hotspot Shield: The most famous proxy software Hotspot Shield requires no introduction. The application is available in 2 different versions: an ad-supported free version and an add-free paid version. Despite the version, the proxy tool is available for an unlimited use and helps you access blocked websites and links. Hotspot Shield lets you take on a random IP from a number of countries, including America, Russia, China and Spain.
    2.Spotflux: Spotflux is a US-based proxy software. The proxy software is available for free and doesn’t serve any ads. Unblock and access all blocked sites with Spotflux, all without any kinds of ads or restriction.

    3.Tor:Tor is one of the most widely used and trusted proxy software. In addition to allowing you access for the restricted Internet spaces, it also provides traffic analysis and continuously monitors your Internet connection. The software is freely available for personal as well as commercial use.

    Read more »