Ofer For You (1)

Wednesday, 31 December 2014

Microsoft Courting App Developers, Eyeing Android App Support: Report

The Windows Phone app ecosystem falls well behind Android and iOS, and Microsoft is obviously looking at ways to boost it. The company has reportedly ordered its Developer Experience (DX) team, a.k.a Developer and Platform Evangelism (DPE), to lure more Windows and Windows Phone app developers. The firm is also reportedly planning to give Windows 10 native Android app support.
Microsoft in November revealed it had over 525,000 apps in the Windows Store and Windows Phone Store combined. To put that in perspective, both Google Play and App Store have over 1.3 million apps.
Microsoft has previously taken several strides towards improving the Windows Phone and Windows app offerings and experience. The firm had recently started accepting 'Universal Apps' for its app stores, letting developers create an app once and scale it accordingly as per the platform and device, instead of creating separate versions for separate devices. ZDNet's Mary Jo Foley, a long-time Microsoft watcher, claims this is still 'Plan A' in Microsoft's strategy to boost the Windows and Windows Phone app ecosystem.




By linking two apps across the two stores, developers were able to offer the 'get once and download for all compatible Windows devices' experience, apart from being able to link in-app purchases, and both Windows 8 and Windows 8.1 apps. Linked apps also give developers the ability to roam application data across form factors, and a single notification channel. Microsoft has also outlined consolidated price tiers and consistent certification policies between the Windows Store and Windows Phone Store.
The DPE/DX team is now reportedly been ordered to aggressively attract eye independent software vendors (ISVs), from startups to more established companies. The team is said to also be looking to recruit students, and also developers not currently supporting Microsoft platforms. ISV outreach teams across the company are apparently also being consolidated, apart from plenty of other reorganisation within Microsoft to achieve the same effect. The outreach teams are reportedly also looking to work with venture capital firms to get an inside track on app development startups, with Microsoft Ventures Accelerators also being roped in.
Foley adds that Microsoft's 'Plan B' is to enable native support for Android apps on its Windows and Windows Phone platforms. Sources close to the matter have added that it can be a possibility in Windows 10, which was unveiled this year in September and the consumer preview of which is expected to be unveiled at Microsoft's January 21 event.

Tuesday, 30 December 2014

HTC Teases Launch of New Desire Series Smartphones at CES 2015

HTC has started sending invites for a CES press event on January 5 in Las Vegas, where it is now expected to unveil new Desire series smartphones, and not the rumored HTC One (M9) a.k.a HTC Hima.
The company posted the CES 2015 invitation poster image on its official Weibo account (via upleaks) that reads, "2015.1.6 CES Always Desire more", hinting towards Desire series devices to be announced at this event. The invite notably mentions two dates, though they are thought to be pointing to the same event occurring in different time zones (in Las Vegas and Taiwan).
Notably, a recent report had tipped HTC to launch the One (M9) or HTC Hima smartphone at CES 2015, though the latest official social media post seems to contradict this. The same source had also pointed to the purported specifications of the smartphone on AnTuTu benchmarks.
Last week though, HTC was tipped to launch the Hima aka One (M9) in March, alongside the anticipated Sense 7 UI on Android 5.0 Lollipop. This time period fits with HTC's regular flagship refresh cycle, with the Taiwanese firm launching its flagship smartphones in the month of March for the past two years.
While at this point of time it's not known that what devices the Taiwanese giant will introduce at CES, it was only last week when @upleaks had tipped the specifications of a mid-range smartphone, dubbed the HTC A12, which will feature a 64-bit processor.
The alleged HTC A12 is said to include a 4.7-inch (720x1280 pixels) display; a 64-bit Qualcomm Snapdragon 410 MSM8916 quad-core chipset clocked at 1.2GHz; 1GB of RAM; 8-megapixel rear camera; a 1.3-megapixel front camera; dimensions of 139.8x69.5x9.5mm; a 2100mAh battery, and Android 4.4 with HTC Sense UI.
(Also see: HTC Sense 7 UI With Android 5.0 Tipped to Launch With HTC Hima in March)

Last week, HTC's North Asia President, Jack Tong, had said the firm would be expanding its 4G entry-level smartphone portfolio in the first quarter. The DigiTimes report citing Jack Tong had noted that HTC will stress on promotion of affordable HTC handsets over the Internet, similar to Xiaomi.
The report had added that Tong also expects that HTC handset shipments will grow by a double-digit rate next year.

Sunday, 28 December 2014

Facebook Apologises After 'Year in Review' Stirs Up Bad Memories for Some Users



Facebook has apologised for the grief its "Year in Review" app caused some of its users while dishing out good memories along with the bad ones.
The social working site compiled a "Year in Review" video for every user, allowing them to reminisce over the highlights of the past year as calculated by Facebook's algorithm.
While some people's highlights included a wedding or a trip, others contained more devastating highlights like the death of a loved one, Jezebel reported.
Writer and web design consultant Eric Meyer wrote a poignant response to the "Year in Review" app after viewing the picture of his daughter, who died of brain cancer earlier this year, in his news feed.
In reply to this, Jonathan Gheller, product manager for the app at Facebook, apologised for the pain the app caused.
"[The app] was awesome for a lot of people, but clearly in this case we brought him grief rather than joy," he told the Washington Post.
"The team behind the app is considering ways to improve it and will take Meyer's concerns into account," he added.
Many users were also annoyed at how pushy the feature is, constantly reminding users of its existence.
The algorithm chooses default photos and moments that captured the most interaction.
Users are, however, given the option to customise their "Year in Review" prior to sharing, the report added

Sunday, 21 December 2014

WhatsApp Bug Leads Community in loss(Reported by H2K)

Dear Readers,


It's been so long we haven't posted anything new here because if queries month. But with the end of the year team H2K brings a great way to hack WhatsApp account of your friends in just few minutes.


After successful report of Facebook bug its time for WhatsApp.


This is the bug reported by team H2K and accepted by WhatsApp community.


So, very first question is what this bug is doing?


Well it will swap expiry date of your account with any other WhatsApp account within minutes and you don't have to purchase service further.


We are sharing below as it is reported mailed by us to the community


Report:-
=>
Kunal Vohra
Nov 23 06:33


Dear Sir
Greetings Of The Day!!!
I have just discovered a bug in the WhatsApp. Suppose my account is
expiring tomorrow (*e.g. 24/12/14*) and I don't want to pay the money to
WhatsApp to renew my account. What I have to do, Simply I would use the *change
number* feature of my WhatsApp account. I would enter an existing and
active number of my friend which has any expiration date ( *e.g. 15/12/15*
). I would just ask the person to give me verification code. I would enter
that code and my account would be changed. Same way other person would
enter my number and follow the same procedure. Means now I am using my
friend's number and my friend is now using mine. After that both of us will
again change the number to it's normal. Now if we would see my account
expiry date is *15/12/15* and my friend's account expiry is *24/12/14. *Simply
it is voiding security of two customers and giving benefit to a hacker or
to a social expert. But for the time I am that social expert. My friend's
account is expiring soon. Please have a look on it and please let me know
on the successful fix of the bug. I can also provide the screenshot but as
I am using Lumia so those would be of no use, that's why I haven't attached
anything.


Regards
Kunal Vohra
Director@H2K



For future reference, your ticket ID for this request is: #16175535. To update, simply reply to this email.
This email is a service from WhatsApp Support. <=


Well WhatsApp don't pay bounty and Facebook refused to take this bug by replying " please report this issue directly to WhatsApp, we don't accept WhatsApp issue here".




Bug is successfully tested on all the available platform I.e. Windows, Android & iPhone.


bug is still in pending stateand needs to be fixed and WhatsApp refused to give any statement about its fixing.


so just try it enjoy it but we request don't misuse it.


Nice time guys. Keep hacking

Wednesday, 17 December 2014

The Hackers Street 1.4 in store now

Update to latest version of H2k cyber security app now. Latest version available in store now.


Click here to update.

so many new features are waiting for you.

Tuesday, 16 December 2014

Queries Month (December 15-January 15)

Dear Readers





From the day 1 when app was launched we are daily taking the queries id readers and follower. Success rate if H2K can be described by last 60 days traffic which is 1Lakh+. We are thankful to all the contributors and follower for having faith in us. Daily we receive 50+ queries from our users which is just 2% of our daily traffic but now it's difficult for our help desk to manage all queries in one day as almost every one un the team is student and giving us their time.


just to overcome this long and pending que of queries we are announcing ""Dec- Jan"" as our month of queries. During this period very less updates would be provided and maun focus would be on taking new queries and solving all the pending queries.


you can ask your queries directly from contact us page in website or by using " your queries" page of the app.


Type anything, ping us we don't bite!!!


Direct queries to admin:- Vohra.Kunal3@gmail.com


Regards
Kunal Vohra
Director@H2K

Wednesday, 10 December 2014

Adobe Releases Emergency Flash Player Update to Address Critical Vulnerability

By "Kunal Vohra", Director@H2K


Adobe Releases Emergency Flash Player Update to Address Critical Vulnerability
Adobe has rolled-out an urgent out-of-band update for a critical remote code-execution vulnerability in its popular Flash Player that is currently being exploited by hackers.

The critical vulnerability (CVE 2014-8439) in Flash Player for Windows, Mac and Linux was originally mitigated more than a month ago in October 14, 2014 patch release, but a French researcher Kafeine found its exploits in the Angler and Nuclear malware kits after Adobe released a patch, according to security vendor F-Secure.
"The vulnerability is being exploited in blind mass attack. No doubt about it : the team behind Angler is really good at what it does," Kafeine said in a blog post.
The vulnerability allows an attacker to execute arbitrary code due to a weakness in the way a dereferenced pointer to memory is handled. An attacker could serve a specially crafted Flash file to trigger the vulnerability, which would lead to the execution of attacker's code in order to take control of a target system.

Adobe rated the vulnerability as critical and recommended users and administrators to update their software on Windows, Mac OS X and Linux systems to the latest iteration as soon as possible.
"We considered the possibility that maybe the latest patch [from October] prevented the exploit from working and the root cause of the vulnerability was still unfixed, so we contacted the Adobe Product Security Incident Response Team," Timo Hirvonen, a senior researcher at F-Secure, wrote on Tuesday.
"They confirmed our theory and released an out-of-band update to provide additional hardening against a vulnerability in the handling of a dereferenced memory pointer that could lead to code execution."
According to the recent security bulletin, Adobe has released the latest update for its Flash plugin, version 15.0.0.239 for Windows and Mactintosh users, version 13.0.0.258 for those that use the Adobe Flash PlayerExtended Support Release, and version 11.2.202.424 for Linux users.

Microsoft will soon be releasing security updates for Internet Explorer 10 and 11 and Google will be releasing for Chrome to fix the Flash Players embedded in them.

This will be Adobe's second attempt to snap shut this particular security vulnerability in Flash, and the company said the updates for the Windows, Linux and Apple OS X versions of Flash Player will "provide additional hardening" against the previous CVE-2014-8439 flaw that was patched in the past.

In order to know the version of Flash Player you are running currently, visit the About Flash Player page. Users can update the latest iterations from Adobe Flash Player Download Center, or via the update mechanism within the product when prompted.


Still Having Problem..!!! Connect with Admin 

 Kunal Vohra
Download Our Official Android App & Get Free Internet
"The Hackers Street"

For Daily Updates 

Monday, 8 December 2014

Help Us Running ( Donate )

We are working hard to write for our users. Support us by chipping in any amount.
It is now difficult for us to work continuously. Support us.








                                                              Choose Atleast 1 Option                                                                                 
Chip In $1 To Help Us Running




Regards
Kunal Vohra
Director@H2K

Saturday, 6 December 2014

CryptoPHP Backdoor Hijacks Servers with Malicious Plugins & Themes

By "Kunal Vohra", Director@H2K





Security researchers have discovered thousands of backdoored plugins and themes for the popular content management systems (CMS) that could be used by attackers to compromise web servers on a large scale.

The Netherlands-based security firm Fox-IT has published a whitepaper revealing a new Backdoor named"CryptoPHP." Security researchers have uncovered malicious plugins and themes for WordPress, Joomla andDrupal. However, there is a slight relief for Drupal users, as only themes are found to be infected from CryptoPHP backdoor.

In order to victimize site administrators, miscreants makes use of a simple social engineering trick. They often lured site admins to download pirated versions of commercial CMS plugins and themes for free. Once downloaded, the malicious theme or plugin included backdoor installed on the admins’ server.
"By publishing pirated themes and plug-ins free for anyone to use instead of having to pay for them, the CryptoPHP actor is social-engineering site administrators into installing the included backdoor on their server," Fox-IT said in its analysis on the attack.
Once installed on a web server, the backdoor can be controlled by cyber criminals using various options such as command and control server (C&C) communication, email communication and manual control as well.

Other capabilities of the CryptoPHP backdoor include:

  • Integration into popular content management systems like WordPress, Drupal and Joomla
  • Public key encryption for communication between the compromised server and the command and control (C2) server
  • An extensive infrastructure in terms of C2 domains and IP’s
  • Backup mechanisms in place against C2 domain takedowns in the form of email communication
  • Manual control of the backdoor besides the C2 communication
  • Remote updating of the list of C2 servers
  • Ability to update itself
Miscreants are using CryptoPHP backdoor on compromised Web sites and Web servers for illegal Search Engine Optimization (SEO), which is also known as Black Hat SEO, researchers said in its report. It is because the compromised websites link to the websites of the attackers appear higher in search engine results.

Black hat SEO is a group of techniques and tactics that focus on maximizing search engine results with non-human interaction with the pages, thus violating search engine guidelines. These include keyword stuffing, invisible text, doorway pages, adding unrelated keywords to the page content or page swapping.

The security company has discovered 16 variants of CryptoPHP Backdoor on thousands of of backdoored plugins and themes as of 12th November 2014. First version of the backdoor was appeared on the 25th of September 2013. The exact number of websites affected by the backdoor is undetermined, but the company estimates that at least a few thousand websites or possibly more are compromised.

Still Having Problem..!!! Connect with Admin 

 Kunal Vohra
Download Our Official Android App & Get Free Internet
"The Hackers Street"

For Daily Updates 

Friday, 5 December 2014

Adobe Releases Emergency Flash Player Update to Address Critical Vulnerability

By "Kunal Vohra", Director@H2K


Adobe Releases Emergency Flash Player Update to Address Critical Vulnerability
Adobe has rolled-out an urgent out-of-band update for a critical remote code-execution vulnerability in its popular Flash Player that is currently being exploited by hackers.

The critical vulnerability (CVE 2014-8439) in Flash Player for Windows, Mac and Linux was originally mitigated more than a month ago in October 14, 2014 patch release, but a French researcher Kafeine found its exploits in the Angler and Nuclear malware kits after Adobe released a patch, according to security vendor F-Secure.
"The vulnerability is being exploited in blind mass attack. No doubt about it : the team behind Angler is really good at what it does," Kafeine said in a blog post.
The vulnerability allows an attacker to execute arbitrary code due to a weakness in the way a dereferenced pointer to memory is handled. An attacker could serve a specially crafted Flash file to trigger the vulnerability, which would lead to the execution of attacker's code in order to take control of a target system.

Adobe rated the vulnerability as critical and recommended users and administrators to update their software on Windows, Mac OS X and Linux systems to the latest iteration as soon as possible.
"We considered the possibility that maybe the latest patch [from October] prevented the exploit from working and the root cause of the vulnerability was still unfixed, so we contacted the Adobe Product Security Incident Response Team," Timo Hirvonen, a senior researcher at F-Secure, wrote on Tuesday.
"They confirmed our theory and released an out-of-band update to provide additional hardening against a vulnerability in the handling of a dereferenced memory pointer that could lead to code execution."
According to the recent security bulletin, Adobe has released the latest update for its Flash plugin, version 15.0.0.239 for Windows and Mactintosh users, version 13.0.0.258 for those that use the Adobe Flash PlayerExtended Support Release, and version 11.2.202.424 for Linux users.

Microsoft will soon be releasing security updates for Internet Explorer 10 and 11 and Google will be releasing for Chrome to fix the Flash Players embedded in them.

This will be Adobe's second attempt to snap shut this particular security vulnerability in Flash, and the company said the updates for the Windows, Linux and Apple OS X versions of Flash Player will "provide additional hardening" against the previous CVE-2014-8439 flaw that was patched in the past.

In order to know the version of Flash Player you are running currently, visit the About Flash Player page. Users can update the latest iterations from Adobe Flash Player Download Center, or via the update mechanism within the product when prompted.


Still Having Problem..!!! Connect with Admin 

 Kunal Vohra
Download Our Official Android App & Get Free Internet
"The Hackers Street"

For Daily Updates 

Thursday, 4 December 2014

Martian Notifier smartwatch review: True to its name

Martian Notifier smartwatch review: True to its name

New smartwatches are bringing innovative features and functionality but one of the basics that each of them focuses on is notifications. 

The smartwatch essentially started as an extension of the smartphone making notifications easily accessible. Not everyone needs fitness trackers or music players or wrist cameras on their watches. Also, a large number of users want their smartwatch to look more like a watch than anything else. 

US based company Martian Watches introduced the Martian Notifier to target users who want their smartwatch to look like a conventional analog time piece and still fetch notifications from their smartphone. We try to find out if it's worth a buy, in our review. 

Design Without doubt, the Martian Notifier is primarily an analog wristwatch when it comes to design. The watch sports a silicone band with a stainless steel clasp and has an anti scratch, acrylic crystal face. With its plastic frame, it doesn't really exude a premium feel but manages to look elegant albeit a little chunky. The back has a stainless steel plate. The wristbands are changable and costs Rs 1,200 (Flipkart is offering a free strap for the first 1000 customers). The strap is comfortable to wear and at 52gram, the watch is pretty lightweight and doesn't feel cumbersome. The watch is splash resistant but you'll not be able to wear it to the pool.

 

The right side of the watch sports a conventional watch crown for setting the time and a flap that houses the micro-USB port for charging and firmware updates. The port is deep and requires a special micro-USB cable supplied in the box. This means you can't charge it with just any micro-USB to USB cable. The left side features two metal push buttons - one for the menu and the other one to select. The other button can also invoke the phone's voice assistant though the watch doesn't feature a microphone.

 

The watch face sports a 96x16p graphic OLED display located at the bottom, which is essentially the 'notifier' window of the watch. There's an LED notification light just above the display. Other than these two components, the Martian Notifier looks like any other analog watch with two hands to tell the time. 

Setting it up Martian Notifier works with all Android smartphones running version 2.3.3 or later version of the OS and iPhone 4S or later iOS smartphones (It also works with the 5th Generation iPod Touch, iPad Air, iPad Mini, 3rd Generation iPad). 

We used the watch with an iPhone 5S and a Lenovo Vibe X2. We faced some issues while initially pairing the Notifier with the Vibe X2 but after that it worked fine. 

By default the watch is set to pair with iOS devices and you need to go to the 'Setup' menu and check 'Android' to enable Android pairing. You can download the 'Martian Notifier' app on your smartphone and simply search, connect and pair the watch through the app, following which you'll be able to receive almost all phone notifications on the watch. 

The app also allows you to enable or disable notifications for individual apps and set the intensity and pattern of the vibration alert. The app offers controls for all watch settings, ability to set up alarms and control 'do not disturb' settings. 


Read More:- How to transfer balance from one mobile to another. , Domains For Sale Only Via H2K App , HTC Desire 820 review


Using the Notifier True to its name, the Martian Notifier alerts you whenever you receive a notification with soft vibration pulses while the actual notification scrolls like a ticker in the OLED screen on the watch face with the LED notification light blinking along. 

Interestingly, you can even tap on the watch face to dismiss or view the notification again (for up to 5 minutes) and see past notifications by pressing the menu button. However, the notifications are not really actionable. For instance, when you receive a text message, an e-mail or a WhatsApp message, you can't open it on the connected phone without touching the latter. Similarly, when you receive a phone call, the only thing you can do is reject it (by the press of the menu button). 

While a number of people would wonder why we'd expect the watch to perform this action when the phone is in the vicinity, if you're used to an Android Wear watch, you're more likely to miss it. 

Besides notifications, the Martian Notifier can also display time for a different timezone and weather along with forecast. It also has the ability to fire up the camera app even when the phone is locked (and not password protected) and invoke the shutter button. You can also set a 3 second timer. This is particularly helpful when you're trying to capture a group selfie. The watch can also help you locate your phone (if in Bluetooth range of 30 feet) by sounding an alert. While this feature works without problems, we found the piano alert to be soft especially when there's ambient noise.

 

There's also a leash feature that alerts you when you've moved out of Bluetooth range. 

The watch's select button can also be pressed to launch Siri on the iPhone and Voice Dialer on Android. But remember, you'll need to use the phone's microphone to give the command. 

The watch has a conventional battery that powers the timepiece and another rechargeable one for the smart functionality. The conventional watch battery lasts up to two years while the other one offers a backup of roughly five days. The backup offered by the Martian Notifier is still better compared to Android Wear watches and Samsung Gear 2.

Having said that, we have to acknowledge that the Martian watch offers limited functionality compared to other smartwatches. For instance, you can't control your music or track the number of steps travelled or reply to messages via voice. 

Overall, the Notifier performs its limited function set well and presents all notifications just a second after it arrives on your phone. 

Should you buy the Martian Notifier? The Notifier is now available at a discounted price of Rs 8,495. At this price, it is a good option if you're looking to buy an analog timepiece which is also capable of becoming your phone's extension without sporting an intimidating design. The Notifier is more of a 'semi-smartwatch,' if we may use that term. 

But will you save on your smartphone's battery with notifications being displayed on the watch? We don't think that it helps in tackling this problem. Firstly, your phone battery will take a hit with Bluetooth being constantly on. The other issue is that you'll end up using your phone for things like checking emails and messages. 

If you're looking for a smartwatch with more functionality, you could perhaps look at the LG G Watch or Moto 360. The G Watch is being sold online at prices close to Rs 7,000. There's no doubt that these devices are first-generation offerings and are far from perfect but offer a wider feature set. 




 
                                                              Choose Atleast 1 Option                                                                                 
Chip In $1 To Help Us Running

Wednesday, 3 December 2014

NSA, British spy agency have secret access to Deutsche Telekom: Report

BERLIN: The US National Security Agency and British intelligence services are able to secretly access data from telecoms giant Deutsche Telekom and several other German operators, according to Der Spiegel weekly. 

An NSA programme called "Treasure Map" gives the US agency and Britain's electronic eavesdropping GCHQ near real-time information about the operators' networks, right through to end users on computers, smartphones or tablets, Der Spiegel said in a report to appear in its Sunday edition. 

It is the latest in a string of revelations based on documents leaked by former NSA contractor Edward Snowden. 


Spiegel said the tracking programme, which it dubbed "the Google Earth of the Internet", can be used to plan cyber attacks. 

The magazine said it did not receive any immediate comment from the NSA or GCHQ in response to the claims. 

Satellite ground station operator Stellar, which according to Spiegel was among the German firms targeted, responded angrily to the revelation. 

Read More:- Spy Planes Equipped with Dirtbox Devices Collecting Smartphone Data

"A cyber attack of this kind clearly violates German law," said Stellar boss Christian Steffen, after Spiegel presented it with a GCHQ document said to contain the passwords of some of its clients. 

In response to the Spiegel report, Deutsche Telekom and regional operator Netcologne said they had not identified any data breaches. 

But Deutsche Telekom's IT security head Thomas Tschersich said: "The access of foreign secret services to our network would be totally unacceptable." 

"We are looking into any indication of a possible manipulation. We have also alerted the authorities," he told the weekly. 

The Snowden leaks, which began last year and have revealed massive surveillance by the United States, have provoked outrage in Germany and damaged ties with Washington following disclosures that the NSA tapped Chancellor Angela Merkel's mobile phone.






                                                              Choose Atleast 1 Option                                                                                 
Chip In $1 To Help Us Running
 

Tuesday, 2 December 2014

Cyberspying tool could have US, British origins

Cyberspying tool could have US, British origins
A sophisticated cybersespionage tool has been stealing information from governments and businesses since 2008, researchers said.

WASHINGTON: A sophisticated cybersespionage tool has been stealing information from governments and businesses since 2008, researchers said, and one report linked it to US and British intelligence.

The security firm Symantec identified the malware, known as Regin, and said it was used "in systematic spying campaigns against a range of international targets," including governments, businesses, researchers and private individuals.

The news website The Intercept reported later Monday that the malware appeared to be linked to US and British intelligence, and that it was used in attacks on EU government networks and Belgium's telecom network.

The report, citing industry sources and a technical analysis of the malware, said Regin appears to be referenced in documents leaked by former National Security Agency contractor Edward Snowden about broad surveillance programs.

Asked about the report, an NSA spokeswoman said: "We are not going to comment on speculation."

Symantec's report said the malware shares some characteristics with the Stuxnet worm — a tool believed to have been used by the US and Israeli governments to attack computer networks involved in Iran's nuclear program.

Because of its complexity, the Symantec researchers said in a blog post that the malware "would have required a significant investment of time and resources, indicating that a nation state is responsible."

The researchers added that "it is likely that its development took months, if not years, to complete and its authors have gone to great lengths to cover its tracks."

"Regin's developers put considerable effort into making it highly inconspicuous," Symantec said.

"Its low key nature means it can potentially be used in espionage campaigns lasting several years. Even when its presence is detected, it is very difficult to ascertain what it is doing. Symantec was only able to analyze the payloads after it decrypted sample files."

The researchers also said many components of Regin are still probably undiscovered and that there could be new versions of this tool which have not yet been detected.

The infections occurred between 2008 and 2011, after which the malware disappeared before a new version surfaced in 2013.

The largest number of infections discovered — 28% — was in Russia, and Saudi Arabia was second with 24%. Other countries where the malware was found included Mexico, Ireland, India, Afghanistan, Iran, Belgium, Austria and Pakistan. There were no reported infections in the United States.

Around half of all infections occurred at addresses belonging to internet service providers, but Symantec said it believes the targets of these infections were customers of these companies rather than the companies themselves.

Telecom companies were also infected, apparently to gain access to calls being routed through their infrastructure, the report noted.

Regin appeared to allow the attackers to capture screenshots, take control of the mouse's point-and-click functions, steal passwords, monitor traffic and recover deleted files.

Symantec said some targets may have been tricked into visiting spoofed versions of well-known websites to allow the malware to be installed, and in one case it originated from Yahoo Instant Messenger.

Other security experts agreed this was a dangerous tool likely sponsored by a government.

"Regin is a cyberattack platform, which the attackers deploy in victim networks for total remote control at all levels," said a research report from Kaspersky Lab.

Kaspersky added that Regin also appears to have infiltrated mobile communications through GSM networks, exposing "ancient" communication protocols used by cellphone networks.

Antti Tikkanen at Finland-based F-Secure called it "one of the more complex pieces of malware around," and added that "our belief is that this malware, for a change, isn't coming from Russia or China."

The news comes amid heightened concerns on cyberespionage. Last month, separate teams of security researchers said the Russian and Chinese governments are likely behind widespread cyberespionage that has hit targets in the US and elsewhere.


Monday, 1 December 2014

Mobile app that dials police in emergencies

VADODARA: If you are in some trouble and need police help or if you want to find emergency numbers, all you have to do is open a mobile application and press a single button. Vadodara police will launch a mobile application Vadodara Setu' on Tuesday. The application will be available for free on the mobile phones. According to the police, the application will have phone numbers of senior police officials in its emergency category and direct dial of police control room number in Vadodara police category.

Citizens will also be able to click images and videos and send them through the application. People will also be able to inform police about missing or wanted persons through the app that will also provide live news. "The application will also provide platform to social networking sites and link to Vadodara police website," police said.

Read More:- How to transfer balance from one mobile to another. , Domains For Sale Only Via H2K App , HTC Desire 820 review