Posts

Everything Can Be Hacked !!

Image
Mr. Robot does a really good job of hammering home is that everything is vulnerable. Whether it’s your thermostat, your phone, a smart-fridge, or a building holding all of the physical copies of the personal information of those indebted to you, everything is vulnerable. While the connected world we live in today comes with many advantages, it can also be a double-edged sword. The ubiquitous nature of technology today, from our phones, laptops, and even our watches, leaves many avenues and possible vulnerabilities for talented hackers like Elliot to exploit.  -ROBOT

Expert warns many smart devices may stop working next year due to expiring security certificates

Image
Expert warns many smart devices may stop working next year due to expiring security certificates By   Jed John Ikoba -   Jun 13, 2020 Internet of Things  (IoT) is one of the big things that have happened in recent times. Due to its growing popularity, tech companies are now focused on creating an ecosystem of products that can be interconnected and controlled right from a smartphone. However, we may have cause to change the name to “Internet of Troubles” next year. A security researcher and consultant Scott Helme has raised an alarm about the impending issue that may plague a number of gadgets from next year. He told The Register that a lot of smart home and IoT gadgets are going to break down within the next 12 months. These gadgets range from smart TV, set-top box, smart refrigerator and even old Android phones which might lose most of its internet connections in the next year or two. The reason for the potential failures is that the Certificate Authority root security ...

Google Pay not a payment system operator: RBI to Delhi HC

Image
The Reserve Bank of India (RBI) has told the Delhi High Court that Google Pay is a third party app provider (TPAP) and does not operate any payment systems. Reserve Bank of India (RBI) Governor Shaktikanta Das. The Reserve Bank of India (RBI) has told the Delhi High Court that Google Pay is a third party app provider (TPAP) and does not operate any payment systems. Therefore, its operations are not in violation of the Payment and Settlement System Act of 2007, RBI has told a bench of Chief Justice D N Patel and Justice Prateek Jalan. RBI has also told the court that since Google Pay does not operate any payment system, it does not find a place in the list of authorised payment system operators published by the National Payments Corporation of India (NPCI). The RBI's submissions came in response to a PIL by financial economist Abhijit Mishra who has alleged that Google's mobile payment app, Google Pay or GPay in short, was facilitating financial transactions without the requisit...

Whatsapp Messenger Room: How to make video calls with 50 contacts at a time

Image
WhatsApp Messenger Rooms: Users need to have a Facebook account to create a room that takes place outside of WhatsApp. Also, video chats in Messenger Rooms aren’t end-to-end encrypted, unlike WhatsApp video calls. By: Tech Desk | New Delhi | Updated: May 24, 2020 9:07:45 am How to access WhatsApp via Messenger Rooms. (Image: Facebook) Facebook recently launched the Messenger Rooms feature to take on the popular video conferencing platform Zoom and Google Meet. The feature is available for everyone and soon it will be accessible via WhatsApp allowing its users to directly have group calls with friends on Facebook. The option is already available for some beta users and is expected to roll out to a wider user base across the world very soon. The Messenger Rooms shortcut within WhatsApp will switch you to the Messenger app or the Messenger website in your mobile or web browser. Users need to have a Facebook account to create a room that takes place outside of WhatsApp. ...

How to see deleted WhatsApp messages on Android

Image
A few years ago, in 2017, popular instant messaging app WhatsApp introduced a feature allowing its users to delete messages after sending them to other users. Using the feature, the user can delete messages for the receiver on the other end for individual as well as group chats. If the user deletes the sent message, a notification appears that reads “This message was deleted” instead of the actual message of text, audio, photo or video. However, there’s a workaround that lets users see the deleted messages. The workaround is based on a third-party application called WhatsRemoved+. How the app works is quite simple. It gets access to your phone’s data and monitors notifications on the device and stores the content of the notifications which can be then be access by the user. Follow the below steps to install the app and configure it to be able to see deleted WhatsApp messages. 1. Download and install WhatsRemoved+ from the link given below. 2....

PM eVidya Programme for digital education in India: Everything you need to know

Image
PM eVidya programe: In order to promote digital education in the country and make e- learning feasible for students and teachers,union finance minister Nirmala Sitharaman on Sunday launched PM eVidya programme. Here’s everything you need to know about the programme. Updated: May 17, 2020 16:26 IST By hindustantimes.com| Edited by Nandini, Hindustan Times New Delhi In order to promote digital education in the country and make e- learning feasible for students and teachers, Union finance minister Nirmala Sitharaman on Sunday launched PM eVidya programme. With this scheme, students and teachers will get multimode access to digital education. Over 100 universities will be permitted to start courses by May 30. What is PM eVidya Programme:  A programme for multimode access to digital/ online education that will consist of: Top 100 universities will be permitted to automatically start online courses by May 30. This was announced in the union budget also. “To provide...

Mahira Kannada Movie

Image
ಮಹೀರ  Mahira || Suspense movie || Thriller movie || Thriller movie || Kannada movie

Regularities impact eye movements during book reading

A story about statistical learning in a story: Regularities impact eye movements during book reading Joshua Snell, Jan Theeuwes Highlights • How statistical regularities impact our eye movements during text reading is unknown. • Here we investigated the influence of regularities at the level of sentence structures. • Repeatedly encountering given combinations of word lengths or syntax eases reading. • Learning curves are steeper for more frequent structures. • Effects were observed in both English and Dutch reading. Abstract A wealth of research attests to the key role of statistical learning in the acquisition and execution of skilled reading. Little is known, however, about how regularities impact the way readers navigate through their linguistic environment. While previous studies have mostly gauged the recognition of single words, oculomotor processes are likely influenced by multiple words at once. With these premises in mind, we performed an...

Track The COVID

Image
Click HERE 👇

ಭಾರತೀಯ ಸಂಗೀತಕ್ಕಿದೆ ಆಲ್ಜೀಮರ್ಸ್ ಗುಣಪಡಿಸುವ ಶಕ್ತಿ

Image
ಭಾರತೀಯ ಸಂಗೀತಕ್ಕಿದೆ ಆಲ್ಜೀಮರ್ಸ್ ಗುಣಪಡಿಸುವ ಶಕ್ತಿ: ಅಮೆರಿಕ ಸಂಶೋಧಕರು ಸಾಮಾನ್ಯವಾಗಿ ಹಿರಿಯರಲ್ಲಿ ಕಂಡು ಬರುವ ಮರವಿನ ಕಾಯಿಲೆ ನಿವಾರಿಸಲು ಸರಳ ಧ್ಯಾನಾಭ್ಯಾಸ ಅಥವಾ ಸಂಗೀತ ಚಿಕಿತ್ಸೆ ಸಹಕಾರಿಯಾಗುತ್ತದೆ ಎಂದು ಅಮೆರಿಕದ ವೆಸ್ಟ್ ವರ್ಜಿನಿಯಾ ವಿಶ್ವವಿದ್ಯಾಲಯದ ಸಂಶೋಧಕರು ಕಂಡುಕೊಂಡಿದ್ದಾರೆ. ವಾಷಿಂಗ್ಟನ್: ಸರ್ವ ರೋಗ ನಿವಾರಿಸುವ ಸಾಮರ್ಥ್ಯ ಭಾರತೀಯ ಸಂಗೀತಕ್ಕೆ ಇದೆ ಎನ್ನುವುದು ಸುಳ್ಳಲ್ಲ. ಹೌದು, ಕೀರ್ತನ ಕ್ರಿಯಾ ಎಂಬ ಪುರಾತನ ಧ್ಯಾನ ತಂತ್ರವು ಮೆದುಳಿನ ಕಾರ್ಯವನ್ನು ಚುರುಕುಗೊಳಿಸುವುದರ ಜತೆಗೆ ವಯಸ್ಸಾದವರಲ್ಲಿ ಕಂಡು ಬರುವ ಮರವಿನ ಕಾಯಿಲೆ (ಆಲ್ಜೀಮರ್ ಕಾಯಿಲೆ) ನಿವಾರಿಸಲು ನೆರವಾಗುತ್ತದೆ ಎಂದು ಅಧ್ಯಯನದ ವರದಿಯೊಂದು ತಿಳಿಸುತ್ತಿದೆ. ಕೀರ್ತನ ಕ್ರಿಯೆ ಎನ್ನುವುದು ಧ್ಯಾನದ ಒಂದು ಪ್ರಕಾರವಾಗಿದ್ದು, ಬೆರಳುಗಳ ಪುನರಾವರ್ತಿತ ಚಲನೆಯೊಂದಿಗೆ ಹಾಡುವುದಾಗಿರುತ್ತದೆ.ಸಾಮಾನ್ಯವಾಗಿ ಹಿರಿಯರಲ್ಲಿ ಕಂಡು ಬರುವ ಮರವಿನ ಕಾಯಿಲೆ ನಿವಾರಿಸಲು ಸರಳ ಧ್ಯಾನಾಭ್ಯಾಸ ಅಥವಾ ಸಂಗೀತ ಚಿಕಿತ್ಸೆ ಸಹಕಾರಿಯಾಗುತ್ತದೆ ಎಂದು ಅಮೆರಿಕದ ವೆಸ್ಟ್ ವರ್ಜಿನಿಯಾ ವಿಶ್ವವಿದ್ಯಾಲಯದ ಸಂಶೋಧಕರು ಕಂಡುಕೊಂಡಿದ್ದಾರೆ. 'ಜರ್ನಲ್ ಆಫ್ ಆಲ್ಜೀಮರ್ಸ್ ಡಿಸೀಸ್‌'ನಲ್ಲಿ ಪ್ರಕಟವಾಗಿರುವ ಅಧ್ಯಯನದ ಪ್ರಕಾರ, ಸರಳ ಧ್ಯಾನ ಅಥವಾ ಸಂಗೀತ ಚಿಕಿತ್ಸೆಯೂ ನೆನಪಿನ ಶಕ್ತಿ, ಗ್ರಹಣ ಶಕ್ತಿ, ನಿದ್ರೆ, ಮನಸ್ಥಿತಿ ಹಾಗೂ ಜೀವನ ಗುಣಮಟ್ಟ ಸುಧಾರಣೆಗೆ ...

Linguistic Dileep Ghosh

Image
Learn Intresting Languages For Free _________________________________________ Easy to learn and use for improve your knowledge It's a great opportunity • Portuguese • Italian • Spanish • German • Greek • Kannada • Hindi • Sanskrit • Dhivehi Lang from maldives By Dileep Ghosh ***************** 👉  NOW Learning languages is also a art of science!

Reason Behind All Startups

Image
"Reason Behind All Startups" 2nd Episode Is Out

BANGARDA MANAS

Image
"ಬಂಗಾರ್ದ ಮನಸ್ದ" ತುಳುವಪ್ಪೆ ಬಾಲೆಲೆಗ್ ಈ ಕಬಿತೆನ್ ಅರ್ಪಿಸಾವೊಂದುಲ್ಲ....ಎನ್ನ ತುಳುನಾಡ್...ಎನ್ನ ತುಳು ಭಾಸೆ...ಎನ್ನ ಅಭಿಮಾನೊ...

Aarogya Setu App Is Hacked !!

Image
# Aarogya Setu: The story of a failure In order to fight Covid19, the Indian government released a mobile contact tracing application called Aarogya Setu. This application is available on the PlayStore and 90 million Indians already installed it. Aarogya Setu – Apps on Google Play Aarogya Setu is a mobile application developed by the Government of India to connect essential health services with the… play.google.com This application is currently getting a lot of attention in India. In Noida, if people don’t have the app installed on their phone, a person can be imprisoned up to 6 months or fined up to Rs 1000. No Aarogya Setu app?  Pay Rs 1,000 fine or face 6 months jail in Noida “If people download it instantly, we will let them go. We are doing this so that people take the order seriously and… indianexpress.com Access to app internal files On April 3, 2 days after the launch of the app, I decided to give a look at the version 1.0.1...

Stealing Data from Air-Gapped Devices • Hackers News •

Image
New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers Cybersecurity researcher Mordechai Guri from Israel's Ben Gurion University of the Negev recently demonstrated a new kind of malware that could be used to covertly steal highly sensitive data from air-gapped and audio-gapped systems using a novel acoustic quirk in power supply units that come with modern computing devices. Dubbed 'POWER-SUPPLaY,' the latest research builds on a series of techniques leveraging electromagnetic, acoustic, thermal, optical covert channels, and even power cables to exfiltrate data from non-networked computers. "Our developed malware can exploit the computer power supply unit (PSU) to play sounds and use it as an out-of-band, secondary speaker with limited capabilities," Dr. Guri outlined in a paper published today and shared with The Hacker News. "The malicious code manipulates the internal switching frequency of the power supply and hence co...