Monday, 19 September 2016
Paytm Recharge Free Promo code Latest Trick
How to Hack someone's WhatsApp Account
There is a method to hack WhatsApp known as Mac address spoofing which involves spoofing the Mac address of the target phone on your own phone. Unlike using spy apps, this one is somewhat time consuming and requires technical skills to implement. To spoof the Mac of the target WhatsApp phone address, follow the below mentioned steps:
- Find out the Mac address of the target phone on which you need to hack WhatsApp account:
- For Android – Navigate to Settings —> About Device —> Status—> Wi-Fi MAC address
- For iPhone – Navigate to Settings—> General —> About —> Wi-Fi address
- Once you’ve the Mac address of the target WHatsApp phone, you can spoof the Mac address as mentioned in my post: How to Spoof the MAC address.
- Next, install WhatsApp on your phone using the target phone number and verify it.
- Now, you’ve an exact replica of the target WhatsApp account and you should receive all the conversation and updates on your phone as well.
How to Spoof MAC Address on Android Phones
Spoofing MAC Address on Android Devices
- On the Home Screen of your phone, tap Menu button and go to Settings.
- Tap About Device and go to Status
- Now scroll down to record the 12-digit code shown under Wi-Fi Mac address. An address would read something like:
Requirements for Spoofing the MAC Address
- Rooted Android Phone
- BusyBox app installed on your phone
- Once BusyBox is installed, you need to install Terminal app
- Open the Terminal app and type the commands as listed below:
(This will show your current MAC address, just for your confirmation)
2. Now, type the following command:
Friday, 16 September 2016
How to Hack ISIS : Using the Internet to fight back
The attack was part of a larger campaign: In a matter of weeks, violent ISIS operations befell Jordan, Bangladesh, Yemen, Afghanistan, Indonesia and Saudi Arabia. Locals carried out the attacks, but the inspiration and timing came from ISIS leadership.
Fighting such a widespread assault means figuring out how to defeat an enemy that spreads in secret, popping up inside far-flung countries like a viral epidemic. In Paris, Belgium, the U.S., and elsewhere, ISIS has used the global reach of the Internet to gain recruits, funnel money, and coordinate attacks. Now, the U.S. is finally making that shift: using the Internet to fight back.
NOW, THE U.S. IS FINALLY USING THE INTERNET TO FIGHT BACK.
This year, the Pentagon officially sicced Cyber Command on ISIS. "I have given the Cyber Command really its first wartime assignment," Defense Secretary Ashton Carter told reporters after a speech in April. "It means interrupting [ISIS's] ability to command and control their forces, interrupting their ability to plot against us here and anywhere else…[and] interrupting their finances." Admiral Mike Rogers, the dual-hatted chief of Cyber Command and head of the National Security Agency, told Congress there will be 27 combat mission teams ready to launch offensive cyber missions by 2018. Some hackers will even be deployed overseas.
So-called "lone wolf" attacks like the shootings in Orlando and San Bernardino, meanwhile, are perpetrated by ISIS sympathizers with few real ties to the group. These are decentralized actions, and the best ways to stop them haven't changed: following up on leads given to local law enforcement by friends and family. That said, military cyber teams could blunt ISIS's international reach by denying them tools of mass communication. This sort of mischief sounds easy, but quickly identifying and stopping the information flow on social media is a challenge. One 2015 report from the Brookings Institute tallied 46,000 Twitter accounts used by ISIS supporters between September through December 2014.
IT'S A LOT LIKE THE ONLINE RELATIONSHIP CON OF CATFISHING, ONLY AGAINST REALLY BAD GUYS.
To disrupt attacks, the Pentagon is considering some tried-and-true tricks—the ones perfected by crooks. ISIS communicates across nations using the Internet, like everyone else, and like everyone else they can be tricked into downloading tainted programs, what pros call phishing. "Insurgents often send each other e-mail attachments," Borg says. "They are just as likely to be fooled into opening malicious ones as the general population."
Another rich target for cyberattacks is finance. When ISIS has cash in a warehouse, American warplanes bomb it. When that money is stored in a digital form, cyber attackers can clean out those accounts. Even better, almost any cyber attack can be made to look like someone within the organization did it, creating infighting and mistrust.
The idea of the military using cyberspace to attack enemies might put fear in the minds of civil libertarians and Edward Snowden admirers. But the Pentagon's rules of engagement are more strict than the CIA's, which introduces tighter controls over the use of cyber tools than the limits put on spy agencies. Meanwhile, data scientists are getting the opportunity to serve their country in ways that have never before been possible. It may only be a matter of time before someone gets a medal for valor without ever leaving a desk.