SP flash tool is an application which essentially encourages you to flash Stock ROM, Custom recovery and fixing in some extreme cases ( firmware update, Flash recovery, unbrick bricked Android device etc.). SmartPhone FlashTool is working with MediaTek Android smartphones.
SP Flash Tool features:
you can upgrade or downgrade device version quickly.
you can flash custom recovery simply.
SP Flash Tool can test your memory and allow you to check and verify your device RAM.
it allows you read and write the parameter on the device.
SP Flash Tool allows you to format your Android device
Features of SP Tool
1. Flash stock Rom</strong>: You can flash ROM, update your Android devices and most important unbrick your android phone by using SP Tools. This tools only support Scatter File format and it is easily Run this utility for your computer or laptop
2. Flash resources file</strong>: This tool allows to install resources files (img) on your Android phone. Resources files are recovered.img, boot.img, userdata.img and system.img etc
2. Flash resources file</strong>: This tools allows to install resources files (img) on your Android phone. Resources files are recovered.img, boot.img, userdata.img and system.img etc
Coinsecure, an Indian cryptocurrency exchange, said almost $3 million was stolen from its bitcoin wallet, the biggest reported so far in the country’s fledgling virtual currency market.
In a statement posted to its website Thursday, Chief Security Officer Amitabh Saxena was obtaining a cryptocurrency known as bitcoin gold in order to assign it to customers . But Coinsecure demanded the funds were lost in the method.
The company has started a charge with the Cyber Cell in Delhi and is also leading an inquiry with the help of cybersecurity experts. Though, a survey at the police complaint points to an inside job as the company’s director Mohit Kalra stated in the complaint that:
As the private keys are kept with Dr. Amitabh Saxena, we feel that he is making a false story to divert our attention and he might have a role to play in this entire incident,”The incident reported by Dr. Amitabh Saxena does not seem convincing to us. Dr. Amitabh Saxena also has an Indian passport and he might fly out of the country soon. Therefore, his passport should be seized so he cannot fly out of the country.”
It is remarkable that Coinsecure conflict has happened days after the Reserve Bank of India (RBI) prohibited banks and financial organizations from bargaining in cryptocurrencies from April 6th, 2018.
We have decided to ring-fence the RBI regulated entities from the risk of dealing with entities associated with virtual currencies. They are required to stop having a business relationship with the entities dealing with virtual money forthwith and unravel the current relationship within a time of three months,” said BP Kanungo, deputy governor India.
Consequently, in Asia, Vietnam and South Korea have also suffered millions of money worth of fraud and stealing in unusual of the cryptocurrency exchanges. Shortly this year, one of Japan’s cryptocurrency exchanges was hit by a daring $530 million theft of digital money.
OMY YOUTUBE HACKED! Yesterday Midnight Hacker Most Popular Youtube Channel due to Youtube Bug
One of the big breach of youtube, yesterday midnight many celebrity youtube official channel has been hacked by Prosox,Kuroi’SH,Shade,Akashi IT group. it’s unclear if a bug on youtube have led those channel hacked, hackers gain access their e-mail.However, below the list of celebrity accounts were hacked.
A Twitter account that apparently belongs to one of the hackers posted: “It’s just for fun, I just use [the] script ‘youtube-change-title-video’ and I write ‘hacked’.”
“Don’t judge me I love YouTube,” it added
According to youtube, Many videos Hackers have been changed renamed and thumbnail, Hacker asking for Palestine’s independence by using the “FreePalestine” tags while some videos had a title with “Shade F**k Illuminati.
As soon as possible we are trying to more update on this breach! stay connect
A new ATM malware has been identified by security researchers at Netskope Threat Research Labs. Dubbed ATMJackpot, the malware appears to be still under development and to have originated in Hong Kong. There are no current details of any deployment or use.
It has a smaller footprint than earlier efforts of jackpotting malware but serves the same purpose: to withdraw money from automated teller machines (ATMs)
ATM jackpotting also called a logical attack, it is the control of malware to measure security assigning from individual ATMs. The malware can be managed locally to each ATM via a USB port, or remotely by negotiating the ATM operator network.
Netskope didn’t explain whether ATMJackpot’s deployment was the effect of standard installation through USB on ATMs. The case then it wouldn’t have been challenging for the criminals because installing malware on an ATM materially isn’t difficult at all.
The malware then populates of the choices on the window and initiates a connection with the XFS manager. The malware then frees a session with the co-operation providers and also the registers to monitor events. It opens a session with the cash machine, the card reader & PIN pad service providers.The malware download has been detected by Netskope as Gen: Variant.Razy.255528.It is before able to monitor events and issue commands. It can read data from the PIN pad, dispense cash, and eject cards.
This Year January 2018, the US beheld the first ever jackpotting attack ATMs. it announced an oversubscribed Series E funding round that raised $100 million in June 2017.A defense signal was dispensed by the Secret Service and a worldwide operation against the members of the notorious Carbanak group, thought to be implicated in attacks on ATMs and keeping up $1.24m, was launched.
Yesterday Virustotal announce the biggest and most popular multi androids apps scan tools that launch today a unique android sandbox services, which dubbed Virus total Droidy to help ward to security malware android apps base on performance analysis
Also, android sandbox perform both motionless and dynamic analysis to detect irregular apps by performing and maintained the application in a few apk and iso setting
Owner of the virus total, Google says is a free service where any use to upload and check them for virus and against dozens of antivirus
Substituting the actual system of virus total droid has been united in the setting of multi-scan sandbox project such as
Network communications and SMS-related activity
Java reflection calls
SQLite database usage
Services started, stopped
Here Few Link you can check behavioral inquiry opinions of some malware Android apps
Why “VirusTotal Droidy” Is Better Than Older “VirusTotal Sandbox”
For multiple individuals, VirusTotal further allows reports from multiple sandboxes, including Tencent HABO, a setting individually generated by Chinese Antivirus firm Tencent.
The richer the information that we generate for individual data set items, the greater the telescopic capabilities of VirusTotal,” the company said. “This is how we manage to fill in the dots and quickly see all activity tied to certain resources that often show up in malware investigations
Report created working new VirusTotal Droidy Android sandbox technology also includes interactive data from other services such as VirusTotal Intelligence and VirusTotal Graph.
Peer-to-peer is a form of computer networking whereby all computers share same ability for processing data. the individual of which serves as a node for sharing/ linking files within the group. Rather of becoming a primary server to act as a shared drive, the personal computer acts as the server for the data stored upon it.When a peer to peer network is set over the Internet, the necessary server can be handled to index files, or a shared network can be built wherever the sharing of files is divided among the users in the web that are collecting a given file and there is no central administrator device in the center of the network.
This plan shows how a Peer-to-peer network operates. The solid lines betoken physical, hard-wired network cables. The dotted lines show that each PC can transfer and share files with every other PC on such a network.A printer attached to one PC can be used by other PCs on the network—if that printer’s PC allows such use.
A peer-to-peer network works completely negatively. While a client/server network is composed to support everywhere from medium-sized organizations to global teams, a peer-to-peer network is reserved for very small organizations or for a close operation group of people inside a general system.
Each user is responsible for controlling path to the devices that live on his or her own computer.
Let’s assume Billy, Jeremy, and Kendall all have computers on a peer-to-peer network. If Billy must check out something of Kendall’s, Kendall would make it available to him. Apart then could Billy access resources on Kendall’s machine?
Furthermore, Jeremy could also make the resources on his device available to Billy. As you can see, in a peer-to-peer network, there’s no real redemption, because each user decides what he or she wants to make possible—and to whom.
Peer-to-Peer and Ad Hoc Wi-Fi Networks
Wi-Fi wireless systems maintain ad-hoc fastenings within a device. Ad hoc Wi-Fi networks are transparent peer-to-peer associated to these that use broadcast routers as an intermediary device. Devices that form ad hoc networks need no foundation to communicate.
P2P networks have a few characteristics that make them useful:
Peer-to-peer networks are extremely scalable. Adding new peers is easy as you do not need to do any central configuration on a central server.
They are difficult to reach down. Also if you shut down one of the peers, the others proceed to work and write. Y’all have to lose hair all the companions for the system to stop managing.
When it comes to data-sharing, that higher a peer-to-peer network is, the lasting it is. Should be the same file stored on many of the peers in a P2P system indicates that when someone needs to download it, the file is downloaded from multiple positions together.
Why we need peer-to-peer networks? Legal use-cases for P2P
Kickass is back to the original KAT stuff, atmosphere general and most famous BitTorrent distribution site KickassTorrents (KAT) with millions of unique daily visitors were shut down by the U.S. authorities following the arrest of its alleged owner Artem Vaulin report.
Also, that last part is whatever exactly performs this new site stand out from all the others deciding to bring KAT back. Should numerous of the original torrent uploaders mean fresh content that millions of users — as well as other torrent sites, from kickass torrents, is back of the group of original stuff — will want to grab?
The hackers have stolen the billing data of the (UHBVN)Uttar Haryana Bijli Vitran Nigam, The New Indian Express (TNIE) reports that hackers stole billing data from UHBVN computer systems and are demanding 1 Crore Indian rupee ($153,800) in Bitcoin from the state government for decrypting the files and restoring access to the AMR system.
A case has been registered in Sector 5 Police Station of Panchkula under IT Act but TNIE hasn’t named the sections in its report.
UHBVN one of the two power Discoms of Haryana monitor online electrick billing of nine districts Haryana.attacker occurred on 21 March midnight. Hackers uploaded a ransom message to the UHBVN head office
According to News India Express, On March 22, when the head office of UHBVN in Panchkula opened as a message was flashed on computer screens in which the hacker demanded Rs One crore in form of bitcoins from the state government in order to retrieve the data.
Report by Office stuff the attacked ARM system was installed, Operated by Tata Consultancy Services Ltd, It was installed in 2010 and since then the electricity billings of the 9 districts namely Ambala, Karnal, Kaithal, Kurukshetra, Panchkula, Panipat, Sonepat, Rohtak, and Yamunanagar were managed by this system.
The cyber experts of Haryana Police are now investigating the matter. We are trying to trace the IP address from where the attack was initiated,’’
However, experts suspect that it may not be an easy feat to pull off considering that theIP address can be modified in merely seconds so the attacker(s) might have faked the IP address. According to the officials, no billing data was lost because a backup was already present and consumer billings remain unaffected too
Uttar Haryana Bijli Vitran Nigam Office has now uploaded data there system, Reports though claim that the Uttar Haryana Bijli Vitran Nigam now doesn’t possess users’ power bill reports and just the records of the arrears remain with the facility UHBVN officials state that none of the 4,000 manufacturing consumers have been pretended.Uttar Haryana Bijli Vitran Nigam Cyberattack
Facebook knows a lot about you, your likes and dislikes and More information —it’s no surprise.
Still, do you know if you have installed Facebook Messenger app on your Android Mobile, there are chances that the Facebook had been collecting your contacts, SMS, and call history data at least until late last year
The data Facebook collected from its Android user base was found to have call-log data, along with SMS and MMS message metadata, usually dating back to a couple of years or even more.
Facebook was collecting this data on its users from last few years, which was even reported earlier in media, but the story did not get much attention at that time.
As arstechnicareported, in older versions of Android when permissions were a lot less strict, the Facebook app took away contact permission at the time of installation that allowed the company access to call and message data automatically.
Eventually, Google changed the way Android permissions worked in version 16 of its API, making them more clear and granular by informing users whenever any app tries to execute permissions.
what exactly is going on here ?
If you had granted Facebook permission to read your contacts through its Android app a few years ago, especially on Android 4.1 (Jelly Bean), that permission also allowed Facebook to access your call and message Lesson learned? Don’t let Facebook or any other app access to your address book, contacts list
If u want check what data the social network has collected on you so far by going to your Facebook’s Settings→Download a copy of your Facebook data→Start My Archive.
Update, March 25, 2018, continued:
Facebook responded to reports that it collected phone and SMS data without users’ knowledge in a “fact check” blog post on Sunday. In the response, a Facebook spokesperson stated:
Call and text history logging is part of an opt-in feature for people using Messenger or Facebook Lite on Android. This helps you find and stay connected with the people you care about, and provide you with a better experience across Facebook. People have to expressly agree to use this feature. If, at any time, they no longer wish to use this feature they can turn it off in settings, or here for Facebook Lite users, and all previously shared call and text history shared via that app is deleted. While we receive certain permissions from Android, uploading this information has always been opt-in only.
On the off chance that you don’t need Facebook to store or ceaselessly transfer your contacts to its server, you can kill the persistent transferring setting in the Messenger application. This change will likewise erase all your beforehand transferred contacts.
Facebook clients on Apple gadgets are on the more secure side, as iOS has never enabled noiseless access to call information
WhatsApp messaging service co-founder Brian Acton has urged users to “delete” Facebook amid a massive data harvesting scandal in which information of 50 million people was leaked allegedly to influence the 2016 US presidential election
WhatsApp co-founder Brian Acton left Facebook in September 2017 and joined a foundation. “It is time. #deletefacebook,” CNN quoted Acton as saying. Brian co-founded WhatsApp with Jan Koum which was acquired by Facebook in February 2014 for $19 billion., In the UK, members of the Parliament summoned Facebook’s chief executive Mark Zuckerberg to give evidence to a select committee investigating fake news.
UK’s Information Commissioner Elizabeth Denham earlier said she would be applying to the court for a warrant to search the offices of Cambridge Analytica—the UK-based political consulting firm accused of using the data of 50 million Facebook members to influence the 2016 US presidential election
Facebook has found itself in deep trouble after it emerged that data analytics company Cambridge Analytica allegedly misused the data of 50 million Facebook users.
That data may or may not have been used to help the Donald Trump election campaign and Vote Leave
Brian who founded a non-profit organization “The Signal Foundation” expressed his view on Twitter with a brief tweet It is time.#deletefacebook