Monday, 30 January 2017

How to recover deleted data, free software (iCare Data Recovery Pro 7.9)

It includes 4 Restore Wizards


Partition Recovery” to recover deleted partition

“Deleted File Recovery” to recover deleted files, files from damaged partitions or corrupted boot sector, etc.

“Deep Scan Recovery” for scanning and searching of both existing and deleted files that can be restored

“Format Recovery” to restore files from oftormtirovannyh hard drives, external drives, sd cards, USB Flash Drives

Key Features


Reformatted partition, memory card, camera card by accident?

Corrupted MBR and cannot find your partition or USB not detected?

Accidentally deleted partition, partition lost?

Drive became RAW, chkdsk reports not available for raw drives?

SHIFT+DELETE, emptied Recycle Bin, need file recovery?

Recover files from dynamic disk, RAID?

Data loss without a reason, Need recovery software?

Partition software failure?

Drive/card reports not formatted, do you want to format it now?

Windows 7 compatible data recovery


Preview lost photos, office files before purchase

How to Activate ?

Install the setup

Do not run. If already running then close 

Copy cracked file and replace to installation directory

Run Program and use any key: e.g 1111111111111111111111111111111111111111111111111111111

Done
                                              Downloads

Saturday, 28 January 2017

Warning! Fake Netflix App Takes Control of Android Mobile

The fake Netflix app was supposedly created using an updated version of the SpyNote RAT builder, which leaked online last year, Zscaler reveals. Once installed, the app would display the icon that the legitimate Netflix app on Google Play has, but it should by no means be mistaken for it.

When the user clicks on the icon for the first time it disappears from the homescreen and nothing else seems to happen, a trick commonly used by mobile malware. In the background, however, the malware starts preparing its onslaught of attacks.

Services can perform long-running operations in the background and does not need a user interface. Broadcast Receivers are Android components that can register themselves for particular events. Activities are key building blocks, central to an app’s navigation, for example,” Zscaler researchers note.

Additionally, the malware can uninstall apps from the infected device (such as antivirus protections), was designed to function only over Wi-Fi (to avoid raising suspicion), and can even click photos, the security researchers say. SpyNote RAT also collects the device’s location to identify the exact location of the victim, and packs various data exfiltration capabilities.

According to Zscaler, the SpyNote RAT builder was seen gaining popularity in the hacking community. It can be used to create various fake apps to masquerade the malware, such as WhatsApp, YouTube Video Downloader, Google Update, Instagram, Hack Wifi, AirDroid, WifiHacker, Facebook, Photoshop, SkyTV, Hotstar, Trump Dash, and Pokemon GO (the game was abused for malware distribution even before being launched on Android).

“Furthermore, we found that in just the first two weeks of 2017, there have been more than 120 such spyware variants already built using the same SpyNote Trojan builder as SpyNote RAT and roaming in the wild,” the security researchers say. A similar trend is usually observed after the source code of a piece of malware leaks online.

Thursday, 26 January 2017

Most of Android VPNs is not secure , security and privacy issue:Researchers

A team of experts from the University of California, Berkeley, the Data 61 research unit at Australia’s Commonwealth Scientific and Industrial Organisation (CSIRO) and the University of New South Wales have analyzed 283 Google Play apps that request the BIND_VPN_SERVICE permission, which provides native support for VPN clients.

Experts discovered that more than one-third of these Android VPN apps, including ones that are highly popular, appear to include some malicious code when tested with Google’s VirusTotal service. Worryingly, only a small number of users have raised security or privacy concerns in the comments posted to Google Play when reviewing these applications.


Another problem identified during the study is that 18% of the applications do not provide any information on the entity hosting the VPN server, and 16% of them forward traffic through the devices of other users, which can pose serious trust, privacy and security issues. Furthermore, a small percentage of the apps implemented local proxies designed to inspect user traffic, mainly for filtering and security purposes.

Researchers have analyzed hundreds of virtual private network (VPN) applications for Android and determined that many of them introduce serious privacy and security risks.

VPN applications are supposed to provide anonymity and security, but researchers found that 18% of the ones from Google Play implement tunneling protocols without encryption, and many of them don’t tunnel IPv6 and DNS traffic.

A small number of Android VPN apps have been found to intercept TLS traffic and even inject JavaScript code for advertising and tracking purposes.

Researchers have contacted the developers of problematic apps and while some of them confirmed the findings and provided arguments in support of their methods, others did not respond.

Monday, 23 January 2017

How to install GBWhatsapp Plus APK V6.11

Features

1.Removed the Redirect link when open the whatsapp

2.Based on 2.16.363 “Play Store”.

3.Never Get Ban.

4.Supports Voice & Video Calls.

5.able to hide your last seen

6.privacy mods added

7.100+ themes mods

8.Theme Server ( to download &apply themes )

9.counter statistics for groups

10.media preview without loading

11.Show Online/last Seen in Main Screen

12.send video with size 1GB instead of 32MB

13.send 90 images at once instead of 10

How to Install ?

Uninstall any previous version of gbwhatsapp plus; if installed

Download GBWhatsapp Plus apk

Install the apk.

Put your number + activation

Enjoy the brand new WhatsApp Plus.

                                        Download GBWhatsapp Plus apk

Sunday, 22 January 2017

Adobe auto-installed a vulnerable Chrome extension on LAPTOP/PC

There was controversy earlier this month when news broke about how Adobe took the opportunity on Patch Tuesday of using its regular security updates to force Adobe Acrobat DC users into silently installing a Google Chrome extension.

The Adobe Acrobat Chrome extension, which converts web pages into PDFs, automatically installed when Adobe patched 29 security vulnerabilities on Jan. 10. The Adobe extension only applies to Windows, and Project Zero researcher Tavis Ormandy found it already had approximately 30 million installations. The installation process happens without the user's consent or knowledge, and only makes an appearance when the browser is restarted and users are asked to give the Adobe extension permission to read and change all the data on the websites they visit, manage all the user's downloads and "communicate with cooperating native applications."

Users are given the option of removing the Adobe extension, but it is enabled by default. Another default setting of the Adobe Acrobat extension is to allow it to "send anonymous usage information to Adobe for product improvement purposes." Adobe claims that no personally identifiable information is collected, so the data is meaningless to anyone outside of Adobe.

Wednesday, 18 January 2017

Android Hacking Ebook

This book give you every detailed knowledge about hacking and rooting of android phone.

Android Hacker's toolkit book has fundamentals of android hacking .So you can gain complete  access of your android device.

1.Hacked wifi in android

2.Hacked android app and games

3.How to root any device

4.Understanding Android OS

Step by step for high end phone like Nexus,Galaxy Tab,LG Optimus and more.

Android Hacking,exploiting,deveoping and rooting.

Android™ Hacker's Toolkit : The Complete Guide to Rooting, ROMs and Theming.

        Download Android Hacking Book :Click Here

Download these hacking ebooks and increase your knowledge. Always stay with@hackerinfoindia and learn more aboutAndroid Hacking.

if you like this post please like & share with your friends... 
& Don't Forget To..




Monday, 16 January 2017

How to hack android Mobile

The Android OS is an open source operating system primarily used in mobile devices. Written primarily in Java and based on the Linux operating system, it was initially developed by Android Inc.
We have compiled here a full collection of Hacking Android apps that can make your Android into a wonderful machine.  it becomes fully featured computer machine when you root your Android phone because you can gain complete access to your Android device. You can run some ethical hacking Android apps on the phone that make your Android phone into a fully-featured hacking machine.

ANDRORAT

AndroRAT, short for Remote Administration Tool for Android, is a client/server application developed in Java Android for the client side and in Java/Swing for the Server, which receive all the connections(control a system without having physical access to the system).

                                                       Download
                                                           Here


if you like this post please like & share with your friends... 
& Don't Forget To..



Sunday, 15 January 2017

Have a 'verified' Twitter account? WikiLeaks may hack you

Sparking a fresh controversy, anti-secrecy site WikiLeaks has threatened to make the private details public of millions of people who have 'verified' Twitter accounts.

"We are thinking of making an online database with all 'verified' Twitter accounts and their family/job/financial/housing relations," the WikiLeaks Task Force said in a tweet, which has now been deleted.

"We are looking for clear discrete (father/shareholding/party membership) variables that can be put into our AI (Artificial Intelligence) software. Other suggestions?" the account tweeted.
An account becomes verified once the identity of the person tweeting is officially confirmed by the micro-blogging site.

"Posting another person's private and confidential information is a violation of the Twitter rules," Twitter said in response to the WikiLeaks' proposal.
Ethan Lawrence, a British actor with a verified account, lashed out at WikiLeaks, saying, "I think this plan is creepy, I think you are creepy and I hope someone breaks into your house and rearranges your sofa cushions."

Thursday, 5 January 2017

KillDisk Malware Targets Linux Machines(PC)

KillDisk is a destructive malware that gained notoriety as a component of the successful attack performed by the BlackEnergy group against the Ukrainian power grid in December 2015. More recently, ESET researchers detected planned cyber-sabotage attacks against a number of different targets within Ukraine’s financial sector. Since then, KillDisk attack campaigns have continued, aimed at several targets in the maritime transport sector.

The attack tool set has evolved and recent variants of KillDisk serve as file-encrypting ransomware. Initially targeting Windows systems, the version targeting Linux machines - not only affects Linux workstations but also servers, amplifying the damage potential.

According to ESET, the malware is associated with a threat group dubbed TeleBots, which is believed to be an evolution of the Russia-linked BlackEnergy (Sandworm) group. The group supposedly targeted Ukraine’s financial sector with various tools, including a newer version of KillDisk set to become active after a specific period of time and to overwrite files that featured specific extensions.

The file-encrypting variant of KillDisk, which was detailed last month, was targeting Windows systems, encrypted files, and demanded $250,000 for the decryption key. ESET, however, stresses on the fact that, even if the victim pays the ransom, the chances that files would be recovered are very slim.

Moreover, the security researchers warn that KillDisk is now targeting Linux systems, including workstations and servers, which is likely to cause even more damage. The ransom message is similar with the one used in the Windows variant, and the same is true for the demanded ransom: it is still 222 Bitcoin, or around $250,000.

The Linux variant of the malware, researchers say, displays the ransom note in an unusual manner: within the GRUB bootloader. What this means is that the malware overwrites the bootloader entries to display the ransom text.

The main encryption routine recursively traverses multiple folders within the root directory up to 17 subdirectories in depth, while files in them are encrypted using Triple-DES applied to 4096-byte file blocks. The threat uses a different set of 64-bit encryption keys for each of the encrypted files, researchers say.

Just as before, however, KillDisk proves highly damaging, as the infected systems can no longer boot after reboot. What’s more, the encryption keys generated on the affected host aren’t sent to the command and control server and aren’t saved locally either, meaning that there’s no way of recovering the files. Thus, paying the ransom is a waste of both time and money, ESET warns.

“Let us emphasize that – the cyber criminals behind this KillDisk variant cannot supply their victims with the decryption keys to recover their files, despite those victims paying the extremely large sum demanded by this ransomware,” the security researchers note.
“Let us emphasize that – the cyber criminals behind this KillDisk variant cannot supply their victims with the decryption keys to recover their files, despite those victims paying the extremely large sum demanded by this ransomware,” the security researchers note.

However, a weakness in the encryption employed in the Linux version of ransomware makes file recovery possible, albeit difficult, ESET says. However, the same does not apply to the Windows variant.

“The group (or groups) of attackers behind these operations has had an interest in various platforms – whether it was Windows PCs controlling SCADA/ICS systems, or workstations in a media agency. With this latest expansion, attackers can use KillDisk to destroy files on Linux systems. Nonetheless, any ties between orchestrators of these attacks remain unclear and purely circumstantial,” ESET says.

What’s unusual regarding KillDisk is the addition of ransomware-like capabilities, given that previous attacks were cyber-espionage and cyber-sabotage operations. In fact, the security researchers say that the added functionality was more likely meant to make the malware more destructive than to provide it with true ransomware features.