Ads 468x60px

Social Icons

Friday 16 September 2016

How to Hack ISIS : Using the Internet to fight back

On July 3, hundreds of shoppers thronged the market in the Karrada district of Baghdad. They arrived after sunset, in deference to Ramadan, Islam's holy month, in which eating and drinking is only allowed at night. ISIS was expecting them. A truck laden with explosives pulled up and detonated, killing nearly 300 people.

The attack was part of a larger campaign: In a matter of weeks, violent ISIS operations befell Jordan, Bangladesh, Yemen, Afghanistan, Indonesia and Saudi Arabia. Locals carried out the attacks, but the inspiration and timing came from ISIS leadership.

Fighting such a widespread assault means figuring out how to defeat an enemy that spreads in secret, popping up inside far-flung countries like a viral epidemic. In Paris, Belgium, the U.S., and elsewhere, ISIS has used the global reach of the Internet to gain recruits, funnel money, and coordinate attacks. Now, the U.S. is finally making that shift: using the Internet to fight back.

NOW, THE U.S. IS FINALLY USING THE INTERNET TO FIGHT BACK.

This year, the Pentagon officially sicced Cyber Command on ISIS. "I have given the Cyber Command really its first wartime assignment," Defense Secretary Ashton Carter told reporters after a speech in April. "It means interrupting [ISIS's] ability to command and control their forces, interrupting their ability to plot against us here and anywhere else…[and] interrupting their finances." Admiral Mike Rogers, the dual-hatted chief of Cyber Command and head of the National Security Agency, told Congress there will be 27 combat mission teams ready to launch offensive cyber missions by 2018. Some hackers will even be deployed overseas.

So-called "lone wolf" attacks like the shootings in Orlando and San Bernardino, meanwhile, are perpetrated by ISIS sympathizers with few real ties to the group. These are decentralized actions, and the best ways to stop them haven't changed: following up on leads given to local law enforcement by friends and family. That said, military cyber teams could blunt ISIS's international reach by denying them tools of mass communication. This sort of mischief sounds easy, but quickly identifying and stopping the information flow on social media is a challenge. One 2015 report from the Brookings Institute tallied 46,000 Twitter accounts used by ISIS supporters between September through December 2014.

IT'S A LOT LIKE THE ONLINE RELATIONSHIP CON OF CATFISHING, ONLY AGAINST REALLY BAD GUYS.

To disrupt attacks, the Pentagon is considering some tried-and-true tricks—the ones perfected by crooks. ISIS communicates across nations using the Internet, like everyone else, and like everyone else they can be tricked into downloading tainted programs, what pros call phishing. "Insurgents often send each other e-mail attachments," Borg says. "They are just as likely to be fooled into opening malicious ones as the general population."

Another rich target for cyberattacks is finance. When ISIS has cash in a warehouse, American warplanes bomb it. When that money is stored in a digital form, cyber attackers can clean out those accounts. Even better, almost any cyber attack can be made to look like someone within the organization did it, creating infighting and mistrust.

The idea of the military using cyberspace to attack enemies might put fear in the minds of civil libertarians and Edward Snowden admirers. But the Pentagon's rules of engagement are more strict than the CIA's, which introduces tighter controls over the use of cyber tools than the limits put on spy agencies. Meanwhile, data scientists are getting the opportunity to serve their country in ways that have never before been possible. It may only be a matter of time before someone gets a medal for valor without ever leaving a desk.

Hack a Nexus 6P and 5X and Google will pay you $200,000


Beginning Tuesday and ending on March 14, 2017, Google is launching its Project Zero Security Contest, which will award cash prizes to contestants who can hack a Nexus 6P and 5X by knowing only the devices' phone number and email address.
For the exploit to occur, a user can open an email in Gmail or an SMS text in Messenger. However, no other user interaction beyond that is allowed. Contestants must use the same bug on both Nexus devices, unless it takes advantage of a security feature one handset has that the other does not (in that case, unique bugs can be used).
The winning entry will receive $200,000 (about £151,721, AU$268,391), while the second place winner will get $100,000 (£75,860, AU$134,195). Third prize is worth at least $50,000 (£37,930, AU$67,097). Winners will also write a technical report describing their entry, which will then be featured on the Project Zero blog.
For more information, check out the official rules here.

Monday 12 September 2016

Hacking Pokemon Go game, No Root access required



All you need is any Android smartphone or tablet running on latest Android 6.0 or 6.0.1 Marshmallow.  (You can check this under Settings->About Phone->Android Version, if you have newer devices like Galaxy S7, S7 Edge, Note 7, HTC 10, OnePlus 3, or LG G5, you already have Marshmallow.)
Step 1. Download and install FlyGPS Fake GPS App on the Play Store.  If you do not see it (perhaps the app got removed), you can also download the FlyGPS APK version here and install it manually.

Step 2. Go into Settings->About Phone and hit the “Build number” about 5 times until it says you have enabled Developer mode.

Step 3. Hit the back button once and you will see “Developer Options” menu, tap on that.  Scroll down to “Mock Locations” then choose “FlyGPS” app.

Step 4. Go into your Location settings and set your GPS settings to “High Accuracy”.
Step 5. Also make sure “Location history” is set to ON.

Step 6. Launch FlyGPS app and choose where you want to start the game.  For example, I chose the nearest metropolitan city near where I live in San Francisco downtown where there are a lot of Pokemons and PokeStops.

Step 7.  Tap on the location you set and tap on “GPS Service Run”.

Step 8. Tap on “JoyStick Location Mode – (Pokemon)”.

Step 9. Launch Pokemon Go app and you should now be in the location you set.  You can use the Joystick to move around!

Note: This hack does not hide “Mock Locations” which means Niantic will know you are using this hack.  But Niantic hasn’t permanently banned people for using this hack.  Just use your common sense.  If you use this hack to reach Level 30, they will probably ban you permanently.  However, if you play Pokemon Go occasionally and for killing time entertainment, they won’t ban you.  You may get soft-banned but you can easily spin the wheel at a nearby PokeStop 30+ times to get unbanned or simply wait a few hours which will also unban you. 

Page No:

Copyright

Protected by Copyscape Duplicate Content Detection Software

LinkWithin

Related Posts Plugin for WordPress, Blogger...