Category Archives: Uncategorized

Artificial Intelligence

Category : Uncategorized

     Artifical Intelligence 


Artificial intelligence (AI), sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and other animals. In computer science AI research is defined as the study of “intelligent agents”: any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals.Colloquially, the term “artificial intelligence” is applied when a machine mimics “cognitive” functions that humans associate with other human minds, such as “learning” and “problem solving.
The scope of AI is disputed: as machines become increasingly capable, tasks considered as requiring “intelligence” are often removed from the definition, a phenomenon known as the AI effect, leading to the quip in Tesler’s Theorem, “AI is whatever hasn’t been done yet.” For instance, optical character recognition is frequently excluded from “artificial intelligence”, having become a routine technology. Modern machine capabilities generally classified as AI include successfully understanding human speech, competing at the highest level in strategic game systems (such as chess and Go),autonomously operating cars, and intelligent routing in content delivery networks and military simulations.

artificial intelligence

Artificial intelligence was founded as an academic discipline in 1956, and in the years since has experienced several waves of optimism, followed by disappointment and the loss of funding (known as an “AI winter”), followed by new approaches, success and renewed funding. For most of its history, AI research has been divided into subfields that often fail to communicate with each other. These sub-fields are based on technical considerations, such as particular goals (e.g. “robotics” or “machine learning”), the use of particular tools (“logic” or artificial neural networks), or deep philosophical differences.Subfields have also been based on social factors (particular institutions or the work of particular researchers).
The study of mechanical or “formal” reasoning began with philosophers and mathematicians in antiquity. The study of mathematical logic led directly to Alan Turing’s theory of computation, which suggested that a machine, by shuffling symbols as simple as “0” and “1”, could simulate any conceivable act of mathematical deduction. This insight, that digital computers can simulate any process of formal reasoning, is known as the Church–Turing thesis.[26] Along with concurrent discoveries in neurobiology, information theory and cybernetics, this led researchers to consider the possibility of building an electronic brain. Turing proposed that “if a human could not distinguish between responses from a machine and a human, the machine could be considered “intelligent”.[27] The first work that is now generally recognized as AI was McCullouch and Pitts’ 1943 formal design for Turing-complete “artificial neurons”
The field of AI research was born at a workshop at Dartmouth College in 1956. Attendees Allen Newell (CMU), Herbert Simon (CMU), John McCarthy (MIT), Marvin Minsky (MIT) and Arthur Samuel (IBM) became the founders and leaders of AI research. They and their students produced programs that the press described as “astonishing”computers were learning checkers strategies (c. 1954) (and by 1959 were reportedly playing better than the average human), solving word problems in algebra, proving logical theorems (Logic Theorist, first run c. 1956) and speaking English. By the middle of the 1960s, research in the U.S. was heavily funded by the Department of Defense and laboratories had been established around the world. AI’s founders were optimistic about the future: Herbert Simon predicted, “machines will be capable, within twenty years, of doing any work a man can do”. Marvin Minsky agreed, writing, “within a generation … the problem of creating ‘artificial intelligence’ will substantially be solved”.artificial itelligene


A typical AI perceives its environment and takes actions that maximize its chance of successfully achieving its goals.An AI’s intended goal function can be simple (“1 if the AI wins a game of Go, 0 otherwise”) or complex (“Do actions mathematically similar to the actions that got you rewards in the past”). Goals can be explicitly defined, or can be induced.
AI often revolves around the use of algorithms. An algorithm is a set of unambiguous instructions that a mechanical computer can execute.[b] A complex algorithm is often built on top of other, simpler, algorithms. A simple example of an algorithm is the following recipe for optimal play at tic-tac-toe:
If someone has a “threat” (that is, two in a row), take the remaining square. Otherwise,
if a move “forks” to create two threats at once, play that move. Otherwise,
take the center square if it is free. Otherwise,
if your opponent has played in a corner, take the opposite corner. Otherwise,
take an empty corner if one exists. Otherwise,
take any empty square.
Many AI algorithms are capable of learning from data; they can enhance themselves by learning new heuristics (strategies, or “rules of thumb”, that have worked well in the past), or can themselves write other algorithms. Some of the “learners” described below, including Bayesian networks, decision trees, and nearest-neighbor, could theoretically, if given infinite data, time, and memory, learn to approximate any function, including whatever combination of mathematical functions would best describe the entire world. These learners could therefore, in theory, derive all possible knowledge, by considering every possible hypothesis and matching it against the data. In practice, it is almost never possible to consider every possibility, because of the phenomenon of “combinatorial explosion”, where the amount of time needed to solve a problem grows exponentially. Much of AI research involves figuring out how to identify and avoid considering broad swaths of possibilities that are unlikely to be fruitful.[58][59] For example, when viewing a map and looking for the shortest driving route from Denver to New York in the East, one can in most cases skip looking at any path through San Francisco or other areas far to the West; thus, an AI wielding an pathfinding algorithm like A* can avoid the combinatorial explosion that would ensue if every possible route had to be ponderously considered in turn.


The overall research goal of artificial intelligence is to create technology that allows computers and machines to function in an intelligent manner. The general problem of simulating (or creating) intelligence has been broken down into sub-problems. These consist of particular traits or capabilities that researchers expect an intelligent system to display. The traits described below have received the most attention.
Reasoning, problem solving

Early researchers developed algorithms that imitated step-by-step reasoning that humans use when they solve puzzles or make logical deductions.By the late 1980s and 1990s, AI research had developed methods for dealing with uncertain or incomplete information, employing concepts from probability and economics.
Knowledge representation

Knowledge representation and knowledge engineering are central to classical AI research. Some “expert systems” attempt to gather together explicit knowledge possessed by experts in some narrow domain. In addition, some projects attempt to gather the “commonsense knowledge” known to the average person into a database containing extensive knowledge about the world. Among the things a comprehensive commonsense knowledge base would contain are: objects, properties, categories and relations between objects; situations, events, states and time;causes and effects;knowledge about knowledge (what we know about what other people know); and many other, less well researched domains. A representation of “what exists” is an ontology: the set of objects, relations, concepts, and properties formally described so that software agents can interpret them.

artificial intelligence

A hierarchical control system is a form of control system in which a set of devices and governing software is arranged in a hierarchy.
Intelligent agents must be able to set goals and achieve them. They need a way to visualize the future—a representation of the state of the world and be able to make predictions about how their actions will change it—and be able to make choices that maximize the utility (or “value”) of available choices.artificial intelligence

Machine learning, a fundamental concept of AI research since the field’s inception is the study of computer algorithms that improve automatically through experience.
Unsupervised learning is the ability to find patterns in a stream of input, without requiring a human to label the inputs first. Supervised learning includes both classification and numerical regression, which requires a human to label the input data first. Classification is used to determine what category something belongs in, after seeing a number of examples of things from several categories. Regression is the attempt to produce a function that describes the relationship between inputs and outputs and predicts how the outputs should change as the inputs change.
In reinforcement learning the agent is rewarded for good responses and punished for bad ones. The agent uses this sequence of rewards and punishments to form a strategy for operating in its problem space.

artificial  intelligence
Natural language processing

Natural language processing (NLP) gives machines the ability to read and understand human language. A sufficiently powerful natural language processing system would enable natural-language user interfaces and the acquisition of knowledge directly from human-written sources, such as newswire texts. Some straightforward applications of natural language processing include information retrieval, text mining, question answering and machine translation. Many current approaches use word co-occurrence frequencies to construct syntactic representations of text. Modern statistical NLP approaches can combine all these strategies as well as others, and often achieve acceptable accuracy at the page or paragraph level, but continue to lack the semantic understanding required to classify isolated sentences well. Besides the usual difficulties with encoding semantic commonsense knowledge, existing semantic NLP sometimes scales too poorly to be viable in business applications. Beyond semantic NLP, the ultimate goal of “narrative” NLP is to embody a full understanding of commonsense reasoning.

artificial intelligence

Machine perception is the ability to use input from sensors (such as cameras (visible spectrum or infrared), microphones, wireless signals, and active lidar, sonar, radar, and tactile sensors) to deduce aspects of the world. Applications include speech recognition,[115] facial recognition, and object recognition.[116] Computer vision is the ability to analyze visual input.
Requiring the AI to judge the relative likelihood and reasonableness of different interpretations, for example by using its “object model” to assess that fifty-meter pedestrians do not exist.

artifciial intelligence
Social intelligence

Moravec’s paradox can be extended to many forms of social intelligence. Distributed multi-agent coordination of autonomous vehicles remains a difficult problem. Affective computing is an interdisciplinary umbrella that comprises systems which recognize, interpret, process, or simulate human affects. Moderate successes related to affective computing include textual sentiment analysis and, more recently, multimodal affect analysis (see multimodal sentiment analysis), wherein AI classifies the affects displayed by a videotaped subject.In the long run, social skills and an understanding of human emotion and game theory would be valuable to a social agent.Similarly, some virtual assistants are programmed to speak conversationally or even to banter humorously; this tends to give naïve users an unrealistic conception of how intelligent existing computer agents actually are.

artificial intelligence
General intelligence

Many of the problems in this article may also require general intelligence, if machines are to solve the problems as well as people do. For example, even specific straightforward tasks, like machine translation, require that a machine read and write in both languages (NLP), follow the author’s argument (reason), know what is being talked about (knowledge), and faithfully reproduce the author’s original intent (social intelligence). A problem like machine translation is considered “AI-complete”, because all of these problems need to be solved simultaneously in order to reach human-level machine performance.
Embodied intelligence

This includes embodied, situated, behavior-based, and nouvelle AI. Researchers from the related field of robotics, such as Rodney Brooks, rejected symbolic AI and focused on the basic engineering problems that would allow robots to move and survive. Their work revived the non-symbolic viewpoint of the early cybernetics researchers of the 1950s and reintroduced the use of control theory in AI. This coincided with the development of the embodied mind thesis in the related field of cognitive science: the idea that aspects of the body (such as movement, perception and visualization) are required for higher intelligence.

artificial intelligence
Intelligent agent paradigm

An intelligent agent is a system that perceives its environment and takes actions which maximize its chances of success. The simplest intelligent agents are programs that solve specific problems. More complicated agents include human beings and organizations of human beings (such as firms). The paradigm allows researchers to directly compare or even combine different approaches to isolated problems, by asking which agent is best at maximizing a given “goal function”The paradigm also gives researchers a common language to communicate with other fields—such as decision theory and economics—that also use concepts of abstract agents.

artificial intelligence
Artificial neural networks

Neural networks, or neural nets, were inspired by the architecture of neurons in the human brain. A simple “neuron” N accepts input from multiple other neurons, each of which, when activated (or “fired”), cast a weighted “vote” for or against whether neuron N should itself activate. Learning requires an algorithm to adjust these weights based on the training data; one simple algorithm (dubbed “fire together, wire together”) is to increase the weight between two connected neurons when the activation of one triggers the successful activation of another. The net forms “concepts” that are distributed among a subnetwork of shared[j] neurons that tend to fire together; a concept meaning “leg” might be coupled with a subnetwork meaning “foot” that includes the sound for “foot”. Neurons have a continuous spectrum of activation; in addition, neurons can process inputs in a nonlinear way rather than weighing straightforward votes. Modern neural nets can learn both continuous functions and, surprisingly, digital logical operations. Neural networks’ early successes included predicting the stock market and (in 1995) a mostly self-driving car. In the 2010s, advances in neural networks using deep learning thrust AI into widespread public consciousness and contributed to an enormous upshift in corporate AI spending; for example, AI-related M&A in 2017 was over 25 times as large as in 2015.
Today, neural networks are often trained by the backpropagation algorithm, which had been around since 1970 as the reverse mode of automatic differentiation published by Seppo Linnainmaa,and was introduced to neural networks by Paul Werbos.

artificial  intelligence

AI is relevant to any intellectual task. Modern artificial intelligence techniques are pervasive and are too numerous to list here. Frequently, when a technique reaches mainstream use, it is no longer considered artificial intelligence; this phenomenon is described as the AI effect.artificial intelligence


AI is being applied to the high cost problem of dosage issues—where findings suggested that AI could save $16 billion. In 2016, a ground breaking study in California found that a mathematical formula developed with the help of AI correctly determined the accurate dose of immunosuppressant drugs to give to organ patients.
X-ray of a hand, with automatic calculation of bone age by computer software
Artificial intelligence is breaking into the healthcare industry by assisting doctors. According to Bloomberg Technology, Microsoft has developed AI to help doctors find the right treatments for cancer. There is a great amount of research and drugs developed relating to cancer. In detail, there are more than 800 medicines and vaccines to treat cancer. This negatively affects the doctors, because there are too many options to choose from, making it more difficult to choose the right drugs for the patients. Microsoft is working on a project to develop a machine called “Hanover”.

artificial intelligence
Finance and economics

Financial institutions have long used artificial neural network systems to detect charges or claims outside of the norm, flagging these for human investigation. The use of AI in banking can be traced back to 1987 when Security Pacific National Bank in US set-up a Fraud Prevention Task force to counter the unauthorised use of debit cards. Programs like Kasisto and Moneystream are using AI in financial services.
Banks use artificial intelligence systems today to organize operations, maintain book-keeping, invest in stocks, and manage properties. AI can react to changes overnight or when business is not taking place. In August 2001, robots beat humans in a simulated financial trading competition.AI has also reduced fraud and financial crimes by monitoring behavioral patterns of users for any abnormal changes or anomalies.

artificial intelligence
Video games

In video games, artificial intelligence is routinely used to generate dynamic purposeful behavior in non-player characters (NPCs). In addition, well-understood AI techniques are routinely used for pathfinding. Some researchers consider NPC AI in games to be a “solved problem” for most production tasks. Games with more atypical AI include the AI director of Left 4 Dead (2008) and the neuroevolutionary training of platoons in Supreme Commander 2 (2010).artificial intelligence

For financial statements audit, AI makes continuous audit possible. AI tools could analyze many sets of different information immediately. The potential benefit would be the overall audit risk will be reduced, the level of assurance will be increased and the time duration of audit will be reduced.

Are there limits to how intelligent machines – or human-machine hybrids – can be? A superintelligence, hyperintelligence, or superhuman intelligence is a hypothetical agent that would possess intelligence far surpassing that of the brightest and most gifted human mind. ‘’Superintelligence’’ may also refer to the form or degree of intelligence possessed by such an agent.
Technological singularity

If research into Strong AI produced sufficiently intelligent software, it might be able to reprogram and improve itself. The improved software would be even better at improving itself, leading to recursive self-improvement.[358] The new intelligence could thus increase exponentially and dramatically surpass humans. Science fiction writer Vernor Vinge named this scenario “singularity”.Technological singularity is when accelerating progress in technologies will cause a runaway effect wherein artificial intelligence will exceed human intellectual capacity and control, thus radically changing or even ending civilization. Because the capabilities of such an intelligence may be impossible to comprehend, the technological singularity is an occurrence beyond which events are unpredictable or even unfathomable.
Ray Kurzweil has used Moore’s law (which describes the relentless exponential improvement in digital technology) to calculate that desktop computers will have the same processing power as human brains by the year 2029, and predicts that the singularity will occur in 2045.

artificial intelligence
In fiction

The word “robot” itself was coined by Karel Čapek in his 1921 play R.U.R., the title standing for “Rossum’s Universal Robots”
Thought-capable artificial beings appeared as storytelling devices since antiquity,and have been a persistent theme in science fiction.
A common trope in these works began with Mary Shelley’s Frankenstein, where a human creation becomes a threat to its masters. This includes such works as Arthur C. Clarke’s and Stanley Kubrick’s 2001: A Space Odyssey (both 1968), with HAL 9000, the murderous computer in charge of the Discovery One spaceship, as well as The Terminator (1984) and The Matrix (1999). In contrast, the rare loyal robots such as Gort from The Day the Earth Stood Still (1951) and Bishop from Aliens (1986) are less prominent in popular culture.
Isaac Asimov introduce the Three Laws of Robotics in many books and stories, most notably the “Multivac” series about a super-intelligent computer of the same name.

artificial intelligence

In short, most neural networks use some form of gradient descent on a hand-created neural topology. However, some research groups, such as Uber, argue that simple neuroevolution to mutate new neural network topologies and weights may be competitive with sophisticated gradient descent approaches. One advantage of neuroevolution is that it may be less prone to get caught in “dead ends”.

artificial intelligence

Noriben: Portable, Simple, Malware Analysis Sandbox

Category : Uncategorized


Noriben   is a Python-based script that works in conjunction with Sysinternals Procmon to automatically collect, analyze, and report on runtime indicators of malware. In a nutshell, it allows you to run your malware, hit a keypress, and get a simple text report of the sample’s activities.

Noriben allows you to not only run malware similar to a sandbox but to also log system-wide events while you manually run malware in ways particular to make it run. For example, it can listen as you run malware that requires varying command line options, or user interaction. Or, to watch the system as you step through malware in a debugger.

Noriben solely requires Sysinternals procmon.exe (or procmon64.exe) to function. It requires no pre-filtering (although it might tremendously assist) because it incorporates quite a few white record gadgets to scale back undesirable noise from system exercise.



Cool Features of Noriben:

If  you will have a folder of YARA signature information, you’ll be able to specify it with the –yara choice. Every new file create shall be scanned towards these signatures with the outcomes displayed within the output outcomes.

If you will have a VirusTotal API, place it right into a file named “virustotal.api” (or embed immediately within the script) to auto-submit MD5 file hashes to VT to get the variety of viral outcomes.

You can add lists of MD5s to auto-ignore (resembling your entire system information). Use md5deep and throw them right into a textual content file, use –hash to learn them.

You can automate the script for sandbox-utilization. Using -t to automate execution time, and –cmd “pathexe” to specify a malware file, you’ll be able to routinely run malware, copy the outcomes off, after which revert to run a brand new pattern.



Bypassing Anti-Sandboxing

One   common instance to use Noriben is with malware that is VM and Sandbox aware. Throwing the sample into any existing sandbox will most likely result in a report with no artifacts as the malware didn’t run. Some applications look for manual user activity, such as mouse movement and clicking. Other malware may infect the WinHTTP stack and only trigger when a web browser is used. By just launching Noriben in the background, all of the system behavior is logged as the analyst manually controls the system to give the impression of a normal user. Once the file has been detonated, the results can be reviewed as a standard sandbox report.



Command Line-Based Applications


In   rarer cases are malware samples that require command line options in order to run. Launching these executables within a sandbox would immediately fail as the malware does not have the arguments to operate. However, an analyst manually controlling the malware while Noriben is running can quickly gather all system artifacts from various command line options.



General Attack Artifacts

Even   more interesting, Noriben has been used by pentesters to determine what system artifacts exist when launching an attack against a system or service. By monitoring files created or registry entries modified, a security analyst can determine all artifacts that result from running an attack, a PowerShell command, or a Javascript-based web page.



Perfect for Malware Analysis on the Road

It’s    commonly a scenario where an analyst may have a proper sandbox environment in a home lab but on the road has only a laptop. In working with various Sales Engineers and Support individuals from security companies, there were many times where they needed an immediate malware answer out of their hotel room. Noriben was designed to be used with little effort, little setup, and little maintenance. Even if you don’t have a dedicated malware VM, any Windows VM will do! Even <a snapshot copy of> your corporate environment!




Highest Selling Technical Courses of Indian Cyber Security Solutions:

Certified Ethical Hacker Training in Bhubaneswar

Certified Ethical Hacker Training in Bangalore

Ethical Hacking Training in Bangalore

Ethical Hacking Training in Hyderabad

Certified Ethical Hacker Certification – C | EH v10

Summer Training for CSE, IT, BCA & MCA Students 

Network Penetration Testing training

Ethical Hacking  training

Python Programming training

Diploma in Network Security Training

Secured Coding in Java

Certified Network Penetration Tester 

Certified Web Application Penetration Tester 

Certified Android Penetration Tester 

Certified Python Programming 

Advance Python Training 

Reverse Engineering Training  

Amazon Web Services Training  

VMware Training 


Cybersecurity services that can protect your company:

Web Security | Web Penetration Testing

Network Penetration Testing – NPT

Android App Penetration Testing

Source Web Development

Source Code Review

Android App Development

Digital Marketing Consultancy

Data Recovery


Other Location for Online Courses:





Retailer Debenhams's Flowers website hacked

Retailer Debenhams’s Flowers website hacked

Category : Blog , Uncategorized

Retailer Debenhams’s Flowers website hacked

Retailer Debenhams’s Flowers website hacked. The news came that Retailer Debenhams’s Flowers website was hacked and up to 26,000 customers, personal data has been compromised.

Department store chain Debenhams has issued a statement on the data breach, revealing payment details, names and addresses were potentially taken , which targeted Ecomnova, a third party e-commerce company that owns and operates the flower and gifting website. Debenhams said it has contacted customers whose data was accessed. While, customers of, which is a separate website, have not been affected.

On  24 February , the company noticed the cyber attack for the first time and then again on  11 April from then Debenhams Flowers website is offline.

Retailer Debenhams's Flowers website hackedDebenhams stated, “Our communication to affected customers includes detailing steps that we have taken and steps that those customers should take”.

In an interview with BBC, a spokeswoman has said that they have sent emails to up to 26,000 customers and informed them about the cyber attack followed up with a letter in the post.

Customers who suspect they’ve been the victim of fraud must immediately contact their bank or credit card provider, as well as Action Fraud, the UK’s national fraud and internet crime reporting centre, on 0300 123 2040 or online.

Debenhams chief executive Sergio Bucher said in a statement “As soon as we were informed that there had been a cyber-attack, we suspended the Debenhams Flowers website and commenced a full investigation”.

“We are very sorry that customers have been affected by this incident and we are doing everything we can to provide advice to affected customers and reduce their risk” , they said.

The Information Commissioner’s Office (ICO) has already been informed about the incident.


Most Popular Training Courses at Indian Cyber Security Solutions

Summer Training for CSE, IT, BCA & MCA Students 

Network Penetration Tester Training

Ethical Hacking  training

Python Programming training

CEH V9  training

Diploma in Network Security Training

Secured Coding in Java

Certified Network Penetration Tester 

Certified Web Application Penetration Tester 

Certified Android Penetration Tester 

Certified Python Programming 

Advance Python Training 

Reverse Engineering Training  

Amazon Web Services Training  

VMware Training 

facebook spam

Facebook spam – New way to hack Android Devices – Be aware

Category : Uncategorized

Facebook spam to hack your android devices


Facebook spam with a news of DONALD TRUMPH dead in a heart attack is new way to hack into your android device.


What it Does ?

Victims if click on the Facebook spam post are redirected to new page and the phone starts vibrating.

Victim is forced to click OK button and the application gets downloaded in the device.

The application automatically shares its post on the timeline of the victim.


Facebook spam


This post is harmless if you open it from your laptop or Desktop.


Clever and a new way to hack into your android devices.


Following are the screen shots on the Android devices after you click on the post

After You Click on the post 

hacking news Kolkata

After you click on the cross button on the pop up option of Facebook Share 

facebook phishing

The previous page automatically redirects to this page and the option pops up and your Smart Phone starts vibrating

facebook hacking

Ethical Hacking Training in Kolkata


Get hired by MNCs as a security professional. According to NASSCOM research 77,000 ethical hackers are demanded in India every month. Due to high rise in cyber attack all over the world MNCs are attacked by malware’s and are facing huge risk.

Get the best training in Kolkata

  1. CEH v9 | Global certification by EC Council
  2. CCNA training in Kolkata
  3. Diploma in Network Security
  4. Android Penetration Testing 


Free online LIVE training video of Indian Cyber Security Solutions | CEH v9 Training


DDoS attack

DDoS attack

Category : Blog , Uncategorized

DDoS attack set Liberia out of internet- culprit Mirai Botnet


DDoS attack had put the whole country of Liberia under distress, when people of the country could not access to internet. The culprit used Mirai malware to shut down the internet of insecure IoT devices. Mirai malware is remotely controlled by the bots, the systems that runs on Linux and have tendency to attack in large scale network.


It started just after, when a cyber-criminal published the source code of Mirai Malware that is designed to target IoT devices that exploits into botnet network; this leads to the attack and affects massively.

An enormous DDoS attack had caused internet outage of a DNS provider called Dyn using same Mirai which was later reported that approximately 100,000 were IoT devices were infected.

DDoS attack

Few days back, past a week hackers have taken down the internet of entire Liberia using another botnet that is known as Botnet 14. Major concern of attacks had been briefed by the experts that 10Tbps DDoS attacks can happen which is too large a number that can make whole country go out of internet. Again, in another incident Keivin Beaumont, security researcher did notice that a telecommunication company, Lonestar Cell MTN has faced faced the same, that provides internet services in Liberia to 10-15% from undersea fiber cable via single entry point.


Shocking isn’t it?


Liberia has faced civil war in past decade which has unestablished the telecommunications infrastructure of the country. Very small amount of citizen could actually access to internet through satellite communication. However the country is trying well to rebuild the infrastructure undersea fiber optics.

5.12 Tbps is the total capacity of the cable of 23 countries, since a massive DDoS attack has just turned down the IoT devices using Mirai botnet which leads capability of hacking of almost 1 million IoT devices.

With these capacity not the attackers could

disrupt not only Liberia bot all of Europe and Africa that completely thrives on internet of ACE fiber cable.


Know the cause

Vulnerable IoT devices leads to insecurity that will build more Mirai bots. Questions is how to protect your device? Answer to that will be be more alert towards to the smartness of the devices that is use because u must remember that they can be tracked down.




You may also like

WhatsApp hacking- Your privacy is at stake

Hackers targeting the election system of United States


Courses Indian Cyber Security Solutions (ICSS) offers



Unreal Tournement Hacked

Unreal tournament gaming hacked, Epic gaming forum hacked

Category : Uncategorized

Unreal tournament gaming hacked

Unreal tournament gaming hacked, Epic gaming forum hacked!!!!

Till now the gamers have ‘hacked’ their way through the game but now the gamers themselves have been compromised by a real band of hackers.

It seems that more than 8, 00,000 forum accounts of Unreal Engine and its creators Epic Games’ forum have been compromised by a hacker or a group of hackers. It has been known that by exploiting a known vulnerability that resided in an outdated version of vBulletin forum software the hacker(s) were able to accomplish their intended malicious activities.

Hacking, system compromise and data breaches to be stopped in this present scenario would require not only a lot of effort and awareness but also terrific skills. Well trained individuals with good command in Ethical Hacking are very much required in this scenario to effectively fight against this.


Unreal Turnament compromised

Big Element of Risk for Epic Games Players as Epic gaming forum hacked big time!!

It is believed by Epic that various sensitive registration information like that of user names, scrambled passwords, dates of birth, email addresses, IP addresses etc. may have got disclosed with the attack. However, in an official announcement on the Unreal Engine forum website reads that although the forum has been compromised with email addresses and other data that were available in the forum but no passwords in any form (salted, hashed, plain text) have been leaked.

Though most of the passwords that have been stolen are scrambled, still there remains a good chance of systems of the forum members’ getting affected and infected by ransomware or other malicious software. This is because the hackers can exploit the other stolen data to send phishing messages to other forum members’ email addresses as a malicious endeavour.

Some other games in the affected list as well as Unreal tournament gaming hacked, Epic gaming forum hacked using an SQL security flaw

There is further bad news for gamers of Infinity Blade, Gears of War and also older versions of Unreal Tournament games because hackers may have compromised their salted hashed passwords along with their e-mail address and other data entered that are entered into the forums.

The forums of both Epic Games’ forum and Unreal Engines forum were down after the incident.

Possible Mitigation:

LeakedSource has already added the breached data from the Epic Games’ forum into its database including the password hashes so as to enable its users to search for their stolen data.

Precautionary Measure:

So in this precarious circumstance do change your password right away if you have ever taken part in online forums of the Epic games or have been associated with Unreal Tournament and particularly if you are using the same password for multiple websites.



Android Devices

Android devices vulnerable to Linux Kernel flaw

Category : Blog , Uncategorized

Android devices vulnerable to Linux Kernel flaw

Android devices running Android 4.4 KitKat and higher are vulnerable to a recently disclosed Linux Kernel flaw and guess what even the latest, updated and improved technology of Android Nougat Preview also seem to have not been able to evade it. This vulnerability is estimated to be present on 80% of Android smartphones and tablets which amounts to nearly 1.4 billion devices. It provides the hacker with the opportunity to terminate connections, unencrypted traffic or inject malware into the parties’ communications. The vulnerability (CVE-2016-5696) shortcoming that was first visible in the execution of the TCP (Transmission Control Protocol) protocol in all Linux systems deployed since 2012 (Android Smartphones) (version 3.6 and above of the Linux OS Kernel) and the Linux Foundation has already patched the Linux Kernel on July 11, 2016. As it stands out, hackers are able to spy on your communications without even compromising your network via man-in-the-middle-attack.

Android Devices

As per a blog post released on Monday by Lookout, a mobile security firm, all Android devices having KitKat 4 .4 and above possess this Linux flaw which also includes the latest developer preview of Android Nougat. Lookout has also mentioned in their blog post that though man-in-the-middle attack is not required in this scenario, however, in order to successfully carry out the attack it is imperative on the part of the attacker to know the source and destination IP (Internet Protocol) address. Windows and Macs are free from this vulnerability. The good news of course is that a patch for this vulnerability may be just around the corner as according to Google, engineers are already aware of it and working on it as well to come up with the much-needed solution. As for temporary mitigation, do ensure that you use a VPN (Virtual Private Network) and that your internet traffic is encrypted.

In today’s environment of ever-so frequent hacks and compromise it is possible to stand affirm against these attacks and lay a good chance for yourself in being resilient to it if you are well versed with Android App Penetration Testing.

Android Security

Push notification enhances android security

Category : Uncategorized

Push Notification Enhances Android Security

Push notification is Google’s next endeavour in keeping its security as tight as possible in Android phones. After the recent announcement of already implementing some vital security features in the next Android OS version Android Nougat it is now on its way to bring to the table a new feature named Native Android Push Notification. With this feature if a new device is added to your Google account i.e. to say when a new device accesses your account, you would be instantly notified through a push notification as to whether you have signed in. If the activity somehow appears suspicious to you will just need to tap the “Review account activity” button to know the details of the newly logged in device on your Google account.

Push Notification in android

The e-mail notifications for Google is not new anymore and with the company believing that people generally pay four times more attention to push notifications on their mobile devices in comparison to email notifications this is probably the best foot forward in tightening the security on Android devices even further. This will always provide you with the opportunity to change your password before an intruder gets in. Or even if the situation is a little different and you are worried if someone has actually accessed your account already you can immediately change your password and add two-factor authentication while being on the go. This 2-factor authentication has again been made much easier for the user by Google recently as you can log in by simply by a single tap instead of typing codes. This is called “Google Prompt”. So as Google has mentioned in its official blog that with this new feature on board the transparency of the users would also be increasing automatically as they get to see the actions they have performed. This new feature will be taking around about two weeks to spread totally all across the globe.

Israeli Hacker Hacks Again

Category : Uncategorized

Israeli Hacker Hacks Iranian ISP ‘Daba’

Israeli Hacker does it again, Iranians exposed to privacy breaches, yet once more!!

The login credentials of thousands of online registered users of an Iranian Internet Service Provider (ISP) called Daba have been leaked earlier today by a hacker operating by the name of Zurael_sTz after who was able to hack the official website of Iranian Internet services provider Daba. This hacker Zurael_sTz is no new to the hacking world and has been doing the same in the recent past by hacking Palestine, Egyptian and Jordanian sites. And now he has taken his latest breach to twitter and shared 3 files containing data acquired from the Daba domain. ( The hacker has been identified as a pro-Israeli and from the tweet information it can be comprehended that there are 52K users in the list.

Israeli Hacker

However, courtesy to Israeli data mining company Hacker-DB it has been learnt that though the hacker is claiming to have leaked 52,000 users’ credentials but post-scanning the leaked files the claimed number of data was not found.  It is however possible though that his assertion is true and he might post the remaining data in the future. It doesn’t end here. The administrator account is also exposed in the leak which includes the username, password, e-mail address and name.

The data breach exposed sensitive data such as hashed passwords, bank account numbers, email addresses, telephone and mobile address besides exposing 342 e-mail accounts with 2960 usernames.

It is indeed a huge blow to numerous innocent Daba users as the company provides dial-up, voice services, ADSL communication, Internet cards and other services to users in Iran. It’s also a matter of grave concern to the entire nation of Iran as it is constantly facing cyber attacks for it was just in the last month that an Internet bot exposed the personal details of thousands of telegram users in Iran containing personal information like full names, phone numbers and personal address of registered telegram users.

WhatsApp WhatsApp Live Chat