Thursday, 29 March 2018

A Major Loophole in WhatsApp Allows Hackers to Take Over Your Account - SAMHACKERSWORLD



A recent finding by Check Point Software Technologies Ltd. throws light on how susceptible messaging apps are to hacking and data theft. The discovery by Check Point, mentioning especially Whatsapp and Telegram, which contain a critical security flaw in their end-to-end message encryption process. This makes both their online platforms – WhatsApp Web and Telegram Web – vulnerable to outside access.


To make their point clear, Check Point designed a malicious, innocuous file to take full control over Whatsapp and Telegram user accounts. In order to gain access, all an attacker would have to do is fake a MIME type, by crafting the HTML file to display an image preview. Once the victim clicks on the HTML file, the attacker would gain access, and the victim’s account would be taken over by the attacker completely.


The alarming case-in-point here is that while most such attacks over either Whatsapp or Telegram will give attackers access to only tidbits of the users’ data, there is also the possibility for attackers to gain absolute control over the victim’s account.


Once a hacker has full control of the victim’s account, he/she will be able to download the victim’s previously shared photos, videos, contact information, and will also have access to the victim’s friends’ information. This means attackers would be able to post the victim’s photos online, message on the victim’s behalf, and would even be able to take over the victim’s friends’ accounts.


Concerns regarding user privacy over messaging apps was brought to the fore by the recent WikiLeaks publication, which talked about the possibility for government organisations to access Whatsapp, Telegram, or any other end-to-end encrypted chat app. Encryption is primarily designed to ensure that only the people communicating can read the messages. But since over Whatsapp and Telegram, messages are encrypted even before they were validated, it was easy for both chat applications to turn a blind eye towards the issue. The encryption had essentially made them unable to prevent any malicious content from being sent.


After Check Point having disclosed their alarming findings to both companies’ security teams, the security teams have acknowledged that there are security and data threat issues. Both companies have now developed a fix for their web clients. Both Whatsapp and Telegram are now validating content over their platforms before the encryption process itself, allowing them to block out any seemingly malicious files. It would, however, be safer to err on the side of caution as a user and avoid downloading any content and opening any links sent by unknown users. Additionally, periodically cleaning logged-in computers from the Whatsapp and Telegram log will allow you more control over the devices that have the option to host your account.




Meanwhile, cyber-security continues to remain an issue garnering growing concern and attention. The increasing number of internet-connected devices around us allows hackers to employ a broad range of tactics to pry into hapless victims’ lives. Further, the sheer large amount of data of personal/private/confidential nature that is exchanged over networks brings with it the risks of data leakage, data theft, and cyber attack by hackers.


Interestingly, Telegram, which accounted for about 87% of downloads worldwide in 2016, not only makes it the most downloaded messaging app in 2016, but is also what users considered the most secure. Even though Whatsapp also uses an end-to-end message encryption technology, users seem sceptical about the amount of security the app can really offer.


As of January 2017, however, Whatsapp, with over 1.2 billion monthly active users is the still most popular mobile messaging app, followed very closely by Facebook messenger. Telegram, with just about 100 million monthly active users is slowly gaining popularity and catching up with Whatsapp, thanks to the amount of security it provides.


With about $5.75 billion being the estimated size of the global mobile security market in 2019, one can only imagine the proportionate growth in security breaches and data thefts over the next three years. Let’s not forget the growing security concerns for mobile applications in general, and specifically to Instant messaging applications.


SOFTWARE LOOPHOLES AND FLAWS - SAMHACKERSWORLD

SOFTWARE LOOPHOLES AND FLAWS


Rather than trying to get a password, many hackers take the alternative (but not always reliable) route of trying to exploit a flaw in the operating system or application server, thus bypassing the target computer's security altogether. Exploits (called 'sploits among hackers) that use software flaws are especially popular with novice hackers, called script kiddies, because they can use them to sneak into a system without knowing much about the system they're breaking into. In fact, script kiddies are often more dangerous than more technically skilled hackers because a script kiddie may damage or delete files through sheer clumsiness, while a more technically sophisticated hacker would know how to avoid causing accidental damage (although he would know how to do even more serious damage if he wanted).


Buffer overflows


Perhaps the most common flaw in many operating systems and in server software is the buffer overflow, which occurs when you feed a program too much data, or sometimes a type of data that the program isn't expecting. In many cases, overflowing a computer with data simply crashes it.

While crashing a computer might be fun for some people, buffer overflows have a potentially dangerous flaw. If a hacker floods a target computer with too much data along with a program, the overload of data tricks the computer into running the program, which can tell the computer to open a port, wipe out files, or give the hacker access to parts of the computer that only an administrator should be allowed to modify.

To see how prevalent buffer overflow vulnerabilities are in a variety of programs, including ICQ, Microsoft Internet Information Server (IIS), WS-FTP, Macromedia Flash, HP Tru64 UNIX, and AOL Instant Messenger, visit the CERT Coordination Center (http://www.kb.cert.org/vuls) and search for "buffer overflows" as shown in Figure 12-6.

 Figure 12-6: An ever-growing list of known buffer overflow vulnerabilities.

Hidden back doors


When creating software, programmers often create back door or default accounts and passwords to test their software, so they can bypass the login process and quickly access and test other portions of the program. Before the company ships the finished program, the programmers need to remove any back door accounts and passwords, but inevitably they forget a few, which leaves a back door open to any hacker who can find it.

When Red Hat shipped its Linux Virtual Server (LVS) software (nicknamed "Piranha"), the developers inadvertently left in an undocumented backdoor account with the username set to "piranha" and a password set to "q", giving anyone who knew of this exploit access to servers running on Red Hat's LVS.

The piranha problem highlights the double-edged nature of open source software, such as Linux. While revealing the source code can help strengthen its security by allowing others to study the program, it also allows hackers the chance to find flaws they might not otherwise have been able to discover and exploit.

Default settings


Many programs, such as operating systems or webserver software, come packed with plenty of built-in security. The only problem is that when you install the software, it fails to install any of its security features unless you specifically tell it to do so. Since most people rarely customize the installation of their software, it's possible and common for someone to install a perfectly secure program with all the security features turned off.

If you're using Windows XP, you may not realize that it comes with a built-in Internet firewall to protect your computer from unauthorized access over the Internet. Unfortunately, many manufacturers install Windows XP with the firewall turned off, because it can interfere with someone's Internet connection if they don't realize that the firewall is turned on.

To turn on (or off) the Windows XP firewall, follow these steps:

Click the Start button and click Control Panel.


Click Network and Internet Connections.


Click Network Connections.


Click the Local Area Connection icon.


Click Change Settings of This Connection, which appears in the left side of the Network Connections window. A Local Area Connection dialog box is displayed.


Click the Advanced tab.


Click in the "Protect my computer and network by limiting or preventing access to this computer from the Internet check box." (If the check box already has a check mark in it, the firewall is already turned on.)


Click OK.


Click the close box of the Network Connections window.


Finding more software exploits


Every program has flaws, and someone discovers a new one practically every day, so website administrators spend much of their time just keeping up with the latest information and installing the latest patches. Inevitably, some administrators won't hear about a particular patch, which means that a commonly known exploit can often be found in computers years after the vulnerability has been discovered. Sometimes installing a patch to fix one flaw accidentally creates and opens up another flaw, which means installing another patch again in the future.

To exploit these flaws, hackers create tools that allow anyone to probe a computer and test for commonly known flaws, which is how novices (script kiddies) can access a computer without even understanding what they're doing.

To read about the latest security exploits for Windows, visit Microsoft's Security & Privacy site (http://www.microsoft.com/security) and download patches, or read bulletins describing just how insecure your Windows network may really be.

To stay up to date with the latest security breaches in products as diverse as Windows 2000, Linux, ColdFusion, Solaris, FreeBSD, and Unix, visit these sites:

Insecure.org

http://www.insecure.org

Security Administrator

http://www.ntsecurity.net

SecurityFocus

http://www.securityfocus.com

Packet Storm

http://packetstormsecurity.nl

SecuriTeam

http://www.securiteam.com

Linux Security

http://www.linuxsecurity.com

Zone-H

http://www.zone-h.org

SOFTWARE LOOPHOLES AND FLAWS - SAMHACKERSWORLD

SOFTWARE LOOPHOLES AND FLAWS


Rather than trying to get a password, many hackers take the alternative (but not always reliable) route of trying to exploit a flaw in the operating system or application server, thus bypassing the target computer's security altogether. Exploits (called 'sploits among hackers) that use software flaws are especially popular with novice hackers, called script kiddies, because they can use them to sneak into a system without knowing much about the system they're breaking into. In fact, script kiddies are often more dangerous than more technically skilled hackers because a script kiddie may damage or delete files through sheer clumsiness, while a more technically sophisticated hacker would know how to avoid causing accidental damage (although he would know how to do even more serious damage if he wanted).


Buffer overflows


Perhaps the most common flaw in many operating systems and in server software is the buffer overflow, which occurs when you feed a program too much data, or sometimes a type of data that the program isn't expecting. In many cases, overflowing a computer with data simply crashes it.

While crashing a computer might be fun for some people, buffer overflows have a potentially dangerous flaw. If a hacker floods a target computer with too much data along with a program, the overload of data tricks the computer into running the program, which can tell the computer to open a port, wipe out files, or give the hacker access to parts of the computer that only an administrator should be allowed to modify.

To see how prevalent buffer overflow vulnerabilities are in a variety of programs, including ICQ, Microsoft Internet Information Server (IIS), WS-FTP, Macromedia Flash, HP Tru64 UNIX, and AOL Instant Messenger, visit the CERT Coordination Center (http://www.kb.cert.org/vuls) and search for "buffer overflows" as shown in Figure 12-6.

 Figure 12-6: An ever-growing list of known buffer overflow vulnerabilities.

Hidden back doors


When creating software, programmers often create back door or default accounts and passwords to test their software, so they can bypass the login process and quickly access and test other portions of the program. Before the company ships the finished program, the programmers need to remove any back door accounts and passwords, but inevitably they forget a few, which leaves a back door open to any hacker who can find it.

When Red Hat shipped its Linux Virtual Server (LVS) software (nicknamed "Piranha"), the developers inadvertently left in an undocumented backdoor account with the username set to "piranha" and a password set to "q", giving anyone who knew of this exploit access to servers running on Red Hat's LVS.

The piranha problem highlights the double-edged nature of open source software, such as Linux. While revealing the source code can help strengthen its security by allowing others to study the program, it also allows hackers the chance to find flaws they might not otherwise have been able to discover and exploit.

Default settings


Many programs, such as operating systems or webserver software, come packed with plenty of built-in security. The only problem is that when you install the software, it fails to install any of its security features unless you specifically tell it to do so. Since most people rarely customize the installation of their software, it's possible and common for someone to install a perfectly secure program with all the security features turned off.

If you're using Windows XP, you may not realize that it comes with a built-in Internet firewall to protect your computer from unauthorized access over the Internet. Unfortunately, many manufacturers install Windows XP with the firewall turned off, because it can interfere with someone's Internet connection if they don't realize that the firewall is turned on.

To turn on (or off) the Windows XP firewall, follow these steps:

Click the Start button and click Control Panel.


Click Network and Internet Connections.


Click Network Connections.


Click the Local Area Connection icon.


Click Change Settings of This Connection, which appears in the left side of the Network Connections window. A Local Area Connection dialog box is displayed.


Click the Advanced tab.


Click in the "Protect my computer and network by limiting or preventing access to this computer from the Internet check box." (If the check box already has a check mark in it, the firewall is already turned on.)


Click OK.


Click the close box of the Network Connections window.


Finding more software exploits


Every program has flaws, and someone discovers a new one practically every day, so website administrators spend much of their time just keeping up with the latest information and installing the latest patches. Inevitably, some administrators won't hear about a particular patch, which means that a commonly known exploit can often be found in computers years after the vulnerability has been discovered. Sometimes installing a patch to fix one flaw accidentally creates and opens up another flaw, which means installing another patch again in the future.

To exploit these flaws, hackers create tools that allow anyone to probe a computer and test for commonly known flaws, which is how novices (script kiddies) can access a computer without even understanding what they're doing.

To read about the latest security exploits for Windows, visit Microsoft's Security & Privacy site (http://www.microsoft.com/security) and download patches, or read bulletins describing just how insecure your Windows network may really be.

To stay up to date with the latest security breaches in products as diverse as Windows 2000, Linux, ColdFusion, Solaris, FreeBSD, and Unix, visit these sites:

Insecure.org

http://www.insecure.org

Security Administrator

http://www.ntsecurity.net

SecurityFocus

http://www.securityfocus.com

Packet Storm

http://packetstormsecurity.nl

SecuriTeam

http://www.securiteam.com

Linux Security

http://www.linuxsecurity.com

Zone-H

http://www.zone-h.org

Saturday, 24 March 2018

If You Are Using Facebook? Then Immediately Delete This Information - SAMHACKERSWORLD

If You Are Using Facebook?




Mark Zuckerberg has accepted the mistake of breaking his silence on Facebook's data leak scandal in Facebook. At the same time, he has also said that some steps should be taken to maintain the privacy of the users. At the time, we are going to tell you some things that you can save your profile on Facebook.


Location Share



Users usually share their location on Facebook. Avoid doing this, because anyone can know where you are and it can be misused. Avoid photographing the airport and holidays, especially when you are out of the house.


Phone Number



In Facebook, your phone number should be removed from Facebook. The reason is that someone can misuse it. Therefore, you must remove the phone number from your personal profile.


Personal Photos



Many times it happens if we go to the party then after drinking the alcohol, the photographs are put in the fb profile. A family member may see these pictures and they may be disappointed.


Date Of Birth



The date of birth is also not needed on Facebook. Hackers can use hackers to access various types of information. So remove your date of birth from Facebook.


Thursday, 22 March 2018

Jio BIG dhamaka: FREE 1024GB data - SAMHACKERSWORLD



New Delhi, March 22: Reliance Jio is once again planning to give a very big gift to its users and therefore announced to give 1TB or 1024 GB of free data.


Users are entitled to 1TB (1024 GB) of 4G data, unlimited voice calls and messages with a 1-year validity at Rs. 4,999 along with complimentary access to all the Jio apps and a Jio Prime membership. If your data gets expired before 1 year, even then you will continue to receive 2G data.


The free data offer can be availed when you purchase Samsung Galaxy S9 and S9 Plus from Jio's official website.


Reliance Jio is giving this offer on these smartphones given below:


Galaxy S9 (64GB) : Rs 57,900 (MRP 62,500)
Galaxy S9 (256 GB) : Rs 65,900 (MRP 71,000)
Galaxy S9+ (64GB) : Rs 64,900 (MRP 70,000)
Galaxy S9+ (256 GB) : Rs 72,900 (MRP 79,000)


Thanks...
Visit Again...
...SAMHACKERSWORLD...