Stagefright Attack It Takes Only A Single Text Message To Hack An Android Smartphone

Joshua Drake from Zimperium Mobile Security discovered six + one critical vulnerabilities in the native media playback engine called Stagefright. He calls this weaknesses ‘Mother of all Android Vulnerabilities’. Drake said that the vulnerabilities can be exploited by sending a single multimedia text message to an unpatched Android smartphone. While the exploit is deadly, in some cases, where phones parse the attack code prior to the message being opened, the exploits are silent and the user would have little chance of defending their data....

December 18, 2022 · 4 min · 710 words · Burt Crawford

Technology Is Changing The Way We Think About Finance Techworm

However, P2P lending is a growing and thriving niche in fintech. It has the potential to transform the way loans are executed across the board. This transformation would benefit lenders and borrowers alike. New P2P Decentralized Finance Technology One of the most appealing new platforms is Constant. Built on a decentralized platform that is free of third party oversight and powered by blockchain technology. Constant offers loans at custom rates, matching borrowers and lenders....

December 18, 2022 · 4 min · 676 words · Jorge Mikell

Teen Wins 400K For His Video Explaining Special Relativity

Besides winning that money for himself, Chester, from Ohio in the US, also won $US100,000 for a new science lab at his school in the Cleveland suburbs, North Royalton High, and $US50,000 for his physics teacher, Richard Nestoff. In the video above, he uses his parent’s house and a couple of other neat little graphical stunts to explain the theory’s two main postulates: The laws of physics are the same in all inertial frames of reference....

December 18, 2022 · 2 min · 379 words · Shirley Reedy

Teenaged Student Shuts Down 444 School Websites To Tell Teachers They Are Incomptent Techworm

The teenager has been arrested on May 11 and Osaka Police have filed a case of obstruction of business charges against him. The police say the teen launched a denial-of-service (DoS) attack against the Osaka Board of Educations server which holds the webpages of 444 elementary, junior high, and high schools in the area. Although in high school now, at the time of the attacks last November, the student was in junior high school....

December 18, 2022 · 1 min · 207 words · Amelia Shields

Telegram Launches Chat Themes Interactive Emoji Read Receipts In Groups More

Let’s have a look at the new Telegram features announced: Chat Themes In this update, coordination and decoration come together with new themes for individual chats. Telegram users will now be able to apply new Chat themes to specific private chats. There are 8 new themes that feature colorful gradient message bubbles, beautifully animated backgrounds, and unique background patterns. To set a theme for your chat on Android, tap the Chat Header > 3 dots > Change Colors....

December 18, 2022 · 2 min · 358 words · Rachel Kimpton

The Daily Dot Hacked News About Sea Removed By Syrian Electronic Army Techworm

December 18, 2022 · 0 min · 0 words · Eugene Wang

The Internet Era Before Facebook Altavista Geocities Lycos Netscape And Other Giants Of Web 1 0

Once upon a time Internet was ruled by AltaVista, GeoCities, Lycos, Netscape & Other Giants Of Web 1.0, do you even remember them?YahooAltaVista GeoCitiesLycosAngelfireTripodNetscapeCompuServeAsk Jeeves ExciteProdigy Yahoo Yahoo Inc and styled as Yahoo! was founded in January 1994 and incorporated in March 1995. Globally known for its web portal and its famous Yahoo! Search engine. From 1997 till 1997 Yahoo remained among the top 3 most visited sites. Till the onset of Google, Yahoo was the most successful sites and ultimately it succumbed to Google’s search engine....

December 18, 2022 · 10 min · 1991 words · Terry Wright

Thermaltake Level 10 M Advanced Gaming Mouse Looks Permium Comes Cheap Techworm

This includes a five-axis button that you can depress as well as move in four directions and is powered by a 32-bit ARM-based microcontroller along with 64 KB of flash memory. The sensor is a laser one, and is an Avago 9800 that has a maximum DPI value of 16,000. Moreover, depending on the user, they can adjust the sensitivity up to four different DPI settings, along with messing with these settings while they are in between their gaming sessions so that users do not get disturbed while playing the latest games....

December 18, 2022 · 2 min · 280 words · John Estep

This Guy Made A Whatsapp Group Of All His Ex Girlfriends And Lived To Tell The Tale Techworm

Many of us are a part of some WhatsApp group or the other and most of us take due care to keep separate groups for family, friends and work. Because combining them could give us serious headaches in long run. But this guy named Tom from United Kingdom had other ideas. He created a group called Merry EX-Mas’ and added all his four ex-girlfriends to the group. Some would find what followed as funny....

December 18, 2022 · 1 min · 207 words · Shari Wright

This Inventor Who Inspired Elon Musk And Larry Page Predicted Smartphones Nearly 100 Years Ago

By the time he died, the world-famed engineer had learnt to communicate in eight languages, held 300 patents and had an eidetic memory. His name was appropriated for the red-hot car and energy storage company created by entrepreneur Elon Musk. Google co-founder, Larry Page has quoted him as an inspiration. It looks like Tesla had anticipated the creation of the smartphone in an interview with John B. Kennedy in 1926....

December 18, 2022 · 1 min · 133 words · Michelle Mcfarland

This Iphone Hack Will Give You Tons Of Emoticons Techworm

Basically, in your iPhone’s settings, just head to General, Keyboard, Keyboards, then scroll down to Japanese. Select “Kana.” Now, when you’re typing something out, you can hit the globe icon to swap through your keyboards (the same way you’d access the emoji keyboard) to get to the Kana keyboard. Mashable has made a video tutorial for the same. In the lower left, you see an emoticon face (^_^). Tap that, and you’re given a side-scrolling list of various cute and quirky emoticons you can insert into your conversation....

December 18, 2022 · 1 min · 106 words · Martin Lindberg

This Twitter Account Tweets Whenever A Rare Pokemon Is Spawned Techworm

Cythia and gang have created an ultimate Pokemon Tracker program that tweets whenever a rare Pokemon spawns. This is the first program that scans, finds and then alerts users whenever a rare Pokemon appears. It also gives the Pokemon’s location and how long the Pokemon will remain active. — Pokémon Tracker NYC (@PokeTrackerNYC) July 27, 2016 — Pokémon Tracker NYC (@PokeTrackerNYC) July 27, 2016 The tweets make it possible for Pokemon Go players to conserve their battery life....

December 18, 2022 · 1 min · 206 words · Robin Noe

Thousands Of Private Zoom Videos Can Be Found Online

However, with the increase in usage, the Zoom app has also seen an increase in security and privacy compromises. In yet another privacy blow, there are thousands of recorded Zoom video calls that are publicly viewable on the open web, according to a report from the Washington Post. The exposed video calls on the internet include elementary school classes, therapy sessions, casual friend conversations, small business meetings and recordings involving nudity....

December 18, 2022 · 2 min · 324 words · Sharon Mccauley

Three Teen Students Livestream Sex On Facebook Cops Seek Details Techworm

The incident happened at a public school in Milwaukee, Wisconsin in January but reports about it have only surfaced now. According to a report by CBS Local , one of the girl was 14-year-old while the other was 15. They both went to the Barack Obama School while the boy in the video was from some other school. The teenage girls live-streamed the threesome sex through Facebook and the cops are now asking Facebook to hand over all the information from the account of the 14-year-old including pictures, status history, videos and user information like name, email, and IP address....

December 18, 2022 · 2 min · 280 words · Jimmie Thomas

Tips And Tricks For Getting Most Out Of Google Photos App

Tips and tricks for getting most out of Google Photos appUploading pics to Google Photos App: Arranging the Google Photos app: Assistant feature of Google Photos app: Recognition of Duplicate and Near Duplicate Photos:Deletion of Files by the Google Photos app: Sharing the photos from Google Photos app to other messaging apps: Editing Photos in Google Photos app: Well, lets also check certain tips and tricks which can help users to use the app to its utmost: Though Google Photos service has been available for a while, it was integrated into Google+ and one could avail this service only by signing up for Google+....

December 18, 2022 · 7 min · 1423 words · Kenneth Donze

Top 7 Frameworks That Make You Forget About Ugly Ux Ui Prototypes

Why do people positively react to an appealing prototype? The secret lies in the human’s nature of perception. According to research data, we perceive up to 70% of information by our vision. If a person sees a beautiful UI prototype, he or she is more likely to believe that this IT team are real masters of their craft. Unfortunately, many software development companies misuse the opportunity to impress their potential clients with a UX prototype....

December 18, 2022 · 3 min · 559 words · Charlene Mason

Top Free Games For April 2015 For Android Smartphones And Tablets And Ios Devices

Marvel Mighty Heroes: This game is a free download for both the Android as well as iOS devices. This game is a Real time four players Co-op action that means user would need three other players to play this game online. Basically the game is suppose to be played by group comprising of four Marvel Super Heroes who are defending the world from the evil’s wrath and complete destruction. The team could be of four heroes or four villains because it is sometimes bad to be good....

December 18, 2022 · 5 min · 987 words · Vera Sheffield

Top Web Hacking Techniques Of 2015 Techworm

Here are the top 10 hacking techniques discovered in 2015HackingHere are the top 10 hacking techniques discovered in 2015 :#1 FREAK Attack#2 LOGJAM vulnerability#3 Web Timing Attacks#4 Evading All* WAF XSS Filters#5 Abusing CDN’s with SSRF Flash and DNS#6 IllusoryTLS#7 Exploiting XXE in File Parsing Functionality#8 Abusing XLST#9 Magic Hashes#10 Asynchronous Vulnerabilities Hacking Hacking was a term that originated in 1990s and is associated with the unauthorized use of computer and network resources....

December 18, 2022 · 4 min · 839 words · Tammie Estrada

Turn Your Smartphone Into A Drone With Phonedrone

To send your smartphone to aerial journey all you need to do is to slot your smartphone into the PhoneDrone Ethos. The smartphone shell is also a high tech smartphone case to keep your phone safe during the flights. The drone is not powered by your phone but only uses your smartphone for taking aerial photo or video shots. To help it fly, the drone is attached with 4 powerful propellers that can help it reach speeds of up to 35 miles per hour....

December 18, 2022 · 1 min · 208 words · Howard Tune

Twitter Is Testing An Untag From Mention Feature Techworm

The “Leave this conversation” feature will allow you to untag your Twitter handle (@username) from the original tweet and all the replies, stop anyone in the Twitter thread from retagging you once you have left the conversation, and prevent you from receiving notifications from that Twitter thread. According to Jane Manchun Wong, the reputable reverse engineer who discovered the new feature “Leave this conversation”, this feature allows users who do not wish to be a part of a Twitter thread to untag themselves in which they have been tagged or mentioned....

December 18, 2022 · 1 min · 202 words · Albert Chausse