Posts

Showing posts from July, 2018

Singapore under cyber attack: About 1.5 million health database steal including PM by the hackers

Image
SINGAPORE (Reuters) - A major cyberattack on Singapore’s government health database stole the personal information of about 1.5 million people, including Prime Minister Lee Hsien Loong, the government said on Friday. Singapore under cyber attack-www.itechblog.net The attack, which the government called “the most serious breach of personal data” that the country has experienced, comes as the highly wired and digitalized state has made cyber security a top priority for the ASEAN bloc and for itself. Singapore is this year’s chair of the 10-member Association of Southeast Asian Nations (ASEAN) group. “Investigations by the Cyber Security Agency of Singapore (CSA) and the Integrated Health Information System (IHiS)confirmed that this was a deliberate, targeted and well-planned cyberattack,” a government statement said. “It was not the work of casual hackers or criminal gangs,” the joint statement by the Health Ministry and the Ministry of Communications and In

How to Fix iPhone X Battery Life Problems With These 10 Tips

Image
According to Apple, iPhone X offers up to 2 hours longer battery life than iPhone 7. It is one of my favorite things about the iPhone X. But if you’re having battery life problems with your iPhone X then check out the tips below to see how to troubleshoot and fix the battery life issues on your new iPhone. I’ve noticed that people are quite cynical about such articles as most of them tell you to disable features. The aim of the article is not to tell you to disable features on your iPhone, but the purpose is to provide you information about the various settings that are available, so you can disable the features that you don’t use as it would help in extending your iPhone’s battery life. I will promise you that you will learn something new that will help you extend your iPhone X’s battery life whether you are a long time iPhone user or a new iPhone user. Settings Expectations Before we proceed further giving you tips on how to improve battery life, we think it is

DomainFactory Hacked—Hosting Provider Asks All Users to Change Passwords

Image
Besides  nother data breach was discovered last week that affects users of one of the largest web hosting companies in Germany, DomainFactory, owned by GoDaddy The breach initially happened back in last January this year and just emerged last Tuesday when an unknown attacker himself posted a breach note on the DomainFactory support forum. It turns out that the attacker breached company servers to obtain the data of one of its customers who apparently owes him a seven-figure amount, according to  Later the attacker tried to report DomainFactory about the potential vulnerability using which he broke into its servers, but the hosting provider did not respond, and neither disclosed the breach to its customers. In that situation, the attacker head on to the company's support forum and broke the news with sample data of a few customers as proof, which forced DomainFactory to immediately shut down the forum website and initiate an investigation. At

Not Android: Google just invested in a new mobile os

Image
Google invested in a mobile OS called KaiOS this month, and it’s no secret that it’s not based in Android. What we’re looking at here is a company that makes an operating system that’s focused on feature phones – but feature phones that are smart. Sort of like bridging the gap between non-smart and smart phones. KaiOS might well be a big part of Google’s future in emerging markets around the world. According to KaiOS representatives, this operating system already works with a wide variety of manufacturers and carriers. Both inside and outside of the USA, KaiOS is established. You and I might have never heard of them before, but they’re out there! KaiOS worked in the past – and present – with manufactuer partners TCL, HMD Global, and Micromax. They’ve worked with Reliance Jio, Sprint, AT&T, and T-Mobile. They operate out of San Diego, Hong Kong, Taipei, Shanghai, Paris, and Bangalore. They’re ready to roll, basically. “We want to ensure that Google apps and servi

How to Crack WinRAR Password Protected Files In Simple Steps

Image
W inRAR is a great utility to compress your files and protect it using a password. You can keep your data safe and save storage space by keeping it compressed in .RAR format. However, what to do if you forget the password of your WinRAR password protected file? To crack WinRAR password protected file password, you need to recover the WinRAR file password and use it to unlock the file. There are some methods to crack WinRAR password using the command prompt, but they just work on integers and other combinations of characters. So, all you need is a 100% working method that cracks the WinRAR password. In this detailed tutorial, we’ll be using a simple password recovery tool to recover your lost/forgotten WinRAR file passwords. You need to use the  to crack WinRAR password and .ZIP Password Genius to crack the WinZIP Password. Let’s get started To crack the WinRAR passwords, you need to download the WinRAR Password Genius from and install it on your PC

Since 2012 RAMpage – A Vulnerability Affecting Every Android Device Built

Image
We already know about the infamous Rowhammer vulnerability in DRAM (dynamic random access memory). Now, researchers have discovered another hardware vulnerability working similarly. The newly identified RAMpage vulnerability could allow hackers to take complete control of your smartphones. Posing a threat to all Android devices for the past six years. RAMpage Vulnerability – A Rowhammer Variant A team of eight researchers have discovered a hardware flaw that puts all Android devices at the risk of hacking. The team calls it RAMpage as it exploits memory pages in RAM.  primarily makes Android phones vulnerable to hacking attacks as it provides to the device. Researchers have published a  in which they have explained about the flaw, and have proposed a solution too. The paper is available online in a one statement from it states: “While apps are typically not permitted to read data from other apps, a malicious program can craft a rampage exploit to