The smartphone maker Samsung has released a nice and colorful infographic telling how your phone will change after Android Marshmallow update.

It has been confirmed that Google will be rolling out the Android 6.0 Marshmallow update from October 5.
Here, we bring to you some of the new features and enhancements Android Marshmallow update is bringing about after its predecessor, Android Lollipop:

Best Features of Android Marshmallow | App Permissions:

If you are not fond of giving excess information to the apps like your images, location etc., then this feature is meant for you. Using this, you can disable such functions in the apps permission lists provided in Android Marshmallow.

Android M App Permissions

Best Features of Android Marshmallow | Memory tracker:

In case you want to track which app is consuming the largest amount of memory, you can simply track it using the latest feature in Android Marshmallow.

Android M Memory Manager

Best Features of Android Marshmallow | Fingerprint access:

This feature of Android Marshmallow will not only help you in logging into a system using your fingerprints but also to log into platforms such as Google play store and you can also authorize your purchases at Play Store.
Android M Fingerprint access

Best Features of Android Marshmallow | Auto Backup:

Now, you don’t have to worry about losing your data anymore, as Android Marshmallow comes with an inbuilt auto backup feature that stores your data on Google drive up to 25 MB per app.
Android M Auto Backup

Best Features of Android Marshmallow | Power Saving:

Android Marshmallow comes with a feature that lets you save on energy consumption upon recognizing that the phone has not been used for a long time. The Doze mode will reduce the background processes and ensure minimal battery usage.

Take a look at this infographic by Samsung about the best features of Android Marshmallow:
Did you like these features of Android Marshmallow? Tell us in the comment below.

By Jeet Rami

Google has announced that it will begin the Android 6.0 rollout on October 5. The update will be coming to many older Nexus devices, read more to know the list.

Google, at its San Fransisco event, released two new Nexus devices. The flagship Nexus 6P is made by Huawei and the smaller model Nexus 5X is made by LG. As usual, these brand new Nexus devices will be running the latest Android 6.0 Marshmallowoperating system.
The new operating system was announced officially at the Google event. The company also mentioned that the older devices will be soon getting the update next week.
Google hasn’t revealed the details of the dates when its partner careers and manufacturers will be releasing the update.
While a very insignificant number of devices are running Android Lollipop, the fate of Android 6.0 Marshmallow update hangs in the balance.
Which Android version are you running? Tell us in the comments below.
By Jeet Rami
Apple Founder Steve Jobs once said in an interview: “I think everybody in this country should learn how to program a computer because it teaches you how to think.”

With the changing environment around us and the inclusion of computers in our personal space, technology and computers are now an integral part of our lives. Learning how to code shouldn’t be looked upon as applied sciences and math because it shows us a path to solve life problems and process our thoughts.
This isn’t just a career making skill, but it’s also an in-demand job skill. If you are proficient in your field and having technical knowledge of your subject, learning how to code can empower you to become different and get more attention.
Today I am sharing an enriching infographics by WhoIsHosting. This telling you about the multiple choices you face as a beginner. Take a look:

By Jeet Rami
What is a data scientist?
IBM defines a data scientist as an individual evolved from the data analyst or business role. The person needs a solid foundation in applications of computer science, mathematics, analytics, stats and modelling. They are “part artist, part analyst.”

Taking a look around on “How To Become A Data Scientist” shows that this concept has a lot many different meanings to different persons.

Keeping all this in mind, DataCamp decided to present its guide “How To Become A Data Scientist?” and help those who find it hard to decipher. Take a look:

By Jeet Rami
Russian Hacker Vladimir Drinkman faces 30 years sentence after pleading guilty to hacking NASDAQ, stealing 160 million credit cards.

Vladimir Drinkman, a 34 year old Russian hacker has pleaded guilty in US Federal Court for his role in hacking NASDAQ, JCPenny, 7 Eleven, Dow Jones, JetBlue and other major organisations in the United States. Reportedly, the hacker admitted his involvement in the world wide scheme that ultimately captured details of more than 160 million credit cards.
Federal attorneys in New Jersey who charged Drinkman with conspiracy charges involving wire fraud and unauthorized access to protected computers said the case was the largest to ever be prosecuted on U.S. soil. They alleged that the American companies and individuals lost more than $300 million because of the date breaches perpetrated by Drinkman.
Drinkman, who was arrested in the Netherlands in 2012 and extradited to the U.S. earlier this year, is scheduled to be sentenced in January.
“Defendants like Vladimir Drinkman, who have the skills to break into our computer networks and the inclination to do so, pose a cutting edge threat to our economic well-being, our privacy and our national security,” U.S. Attorney Paul J. Fishman of the District of New Jersey said in a statement.
Drinkman and his gang, a number of whom remain at large, would monitor the computers of target companies and scan for vulnerabilities in their SQL implementation to create backdoors and ultimately netting the confidential data and later selling it on “underground” forums of the Internet.
Three of his alleged co-conspirators remain fugitives. A fourth, Dmitriy Smilianets, 32, of Moscow, who allegedly sold the stolen information, remains in federal custody.
By Jeet Rami
Aware of the pitfalls of vulnerabilities in its cyberspace following Snowden reports and countless attacks by Chinese hackers on key government websites, Centre has taken a vital step towards having its own operating system (OS) with which it plans to replace all other OSs, including the most popular Microsoft Windows in future.

A highly improved version of BOSS (Bharat Operating System Solutions) developed by C-DAC (Centre for Development of Advanced Computing) will be unveiled and discussed in an internal meeting in union home ministry in this week.

The government developed BOSS in order to reduce dependance on foreign operating systems. The OS was first launched back in January 2007, however it lost ground quickly due to the lack of adoption and faster upgrades offered by other operating systems. The official said, “We have no dearth of developers here. BOSS has almost all the features that one can get in, say, Windows. The earlier version was less user-friendly and had few features. We will seek help of Indian software biggies to develop it further.” He also said that the system was tested over the past three months. Many government agencies asked to check for vulnerabilities and the OS worked as it was supposed to.

The new OS – Bharat Operating System Solutions (BOSS) – was originally developed in 2007 by India’s own National Resource Centre for Free/Open Source Software (NRCFOSS). The latest version of the OS was developed in 2013 and has since been tweaked and adapted to suit the government’s purposes.

By Jeet Rami
There is no dearth of instant messaging applications these days and people are addicted to Facebook Messenger, WhatsApp, SnapChat, IM on Twitter, Hangouts and other apps for communicating to each other every moment. Recently, Facebook announced that now you don’t even need a Facebook account to use Messenger. But if you want to create your own DOS style chatroom right from your web browser that destroys itself when chat’s over, Hack.chat is the just the right thing for you.

When you use Hack.chat, there’s nothing to worry about privacy breach or sign-ins. Creating a chat room is dead simple and it could be disposed at any point after the completion of chat. I call it disposable as it doesn’t keep record of all unappropriated and private message you’ve ever sent.

How to create instant disposable chatrooms with Hack.chat?

Creating a private chatroom in Hack.chat is dead simple. All you need to do is go to the website URL and add a ? and the name of your chatroom. This would make the URL looks like this:https://hack.chat/?random-channel and make a personal chat room with name “random-channel.”
After creating that URL, you can send this to anyone and start chatting in moments. Because the channel you created is private and its name or information isn’t stored anywhere, no random person can appear in your Hack.chat.
Hack.chat has also provided some pre-existing channels to try out. Just head to the home page, click on any of them and add your name to start.
Its creator Andrew Belt promises the Hack.chatservers never store any data and chats. So, if privacy is your concern, give it a quick try. Share this article with your friends and chat privately using Hack.chat.
By Jeet Rami

Scientists may without intention send viruses into space while trying to contact aliens


Experts at the Oxford University have cautioned that humans may unintentionally send dangerous computer viruses or spam aliens while trying to contact them.
In the hope of getting in touch with the extraterrestrial life, a working group of astronomers, philosophers and academics are currently making efforts to come up with a universal message to send out.
The UK research network for SETI (the search for ExtraTerrestrial Intelligence) voted in favor of making efforts to reach out to alien life forms in September. However, they are unsure on what is that they need to send. They are also concerned that the technology of other civilizations could be infected, if they accidentally happen to send viruses into space.
Dr Anders Sandberg of the Future of Humanity Institute at Oxford University speaking at the British Science Festival, said humans must be very careful about what digital messages they send into space.
“The classic example of message would be a series of pulses which showed binary numbers, DNA, sketch of solar system or the number of humans,” he said.
“But it turns out there are some security problems. Languages can hide a lot of information. We’re worried about malware being sent to aliens.
“I am kind of split on whether it is a good idea. I see some problems. I favour it a little bit more. But I can see it going either way.
Some people think we’re already spamming the universe with reality soaps.”
To have a say in what message can be send to space, the UK research network for SETI (UKSRN) has joined hands with the Breakthrough Message Initiative and is inviting the public for the same. The best ideas could win a prize amount of $1 million offered by the above duo.
The initiative was significant for supporting humanity to look to itself and make a decision as to how they would want to be seen by extraterrestrial life.
“I am very explicitly in favour. I think it makes us do reflect back on ourselves. I think it would be arrogant to think we were the only ones. But in the timeline of the universe whether we will be around at the same time, that is a different matter.”
Dr Sandburg added: “The search for extraterrestrial intelligence is very relevant because it helps us figure out more about the possibilities and fate of intelligence in the universe.
“The silence in the sky either tells us we are rare and unique, and therefore responsible for the future of life in the universe, a huge burden. Or that there is something very dangerous out there which is worth worrying about.
“Whatever the answer is, it is bound to profoundly affect how we see ourselves and the universe.”
By Jeet Rami

Vodafone admits to having hacked journalist’s smartphone, who was writing about security flaw in Vodafone network

Vodafone, a telco giant has acknowledged that a Fairfax reporter’s phone was hacked by an employee, as of result of a story she had written about the weaknesses in the company’s security systems.
In January 2011, an isolated employee had gained access to “call charge records and text messages,” the company said on Saturday.
Natalie O’Brien, a Fairfax Media journalist had uncovered a serious security flaw in 2011 in the company’s data storage methods. This meant that all the details of millions of customers that used generic passwords were available online, such as their names, addresses and credit card details.
In 2012, Vodafone Group’s former Australian fraud boss, Colin Yates has sent an email highlighting his concern regarding the hacking of O’Brien’s phone that may become known to the public, disclosed the Internal Vodafone documents obtained by News Limited.
Mr Yates wrote “This could have serious consequences given it is a breach of the Australian Telecommunications Act.”
“And (it) would certainly destroy all of the work done by VHA (Vodafone Hutchison Australia) over the past months to try and restore their reputation.”
The company said in a statement that Vodafone at once instructed a top accounting firm to investigate into the hacking.
“The investigation found there was no evidence VHA management had instructed the employee to access the messages and that VHA staff were fully aware of their legal obligations in relation to customer information,” a spokeswoman said.
The investigation was carried out to find out if the privacy laws were broken by any employee rather than find out the source of the Fairfax story, she said.
“As a result of our investigation, several retail staff were dismissed for breaches of VHA security policies.”
The company “strongly denied any allegations of improper behaviour”.
O’Brien said she was “absolutely outrage,” who was unaware of the incident before the publishing of internal documents by News Limited.
“The shock and anger is only compounded knowing it was because I was doing my job that I was targeted and it was my own telco that was doing it to me,” she wrote in a Fairfax column.
“The accessing of call records and text messages without a legal basis has to stop.
“As a society we need to take a good look at this sort of behaviour and say it is unacceptable.
“Since when did telling the truth become the wrong thing to do?”
By Jeet Rami

Here’s a look at the Top 10 hacking apps for Android smartphones and tablets

Linux is regarded as the best operating system for ethical hacking and penetration testing also called pentesting. There are various hacking apps available for Android, as it is a Linux based operating system. If you want to test out vulnerabilities and find bugs, you need a solid hacking tool to back your research up.
Below is a list of Android hacking applications that will convert your Android device into a hacking machine.

AndroRAT

AndroRAT is a remote administration tool for Android devices. In other words, it is basically a client server application. The aim of the remote administration tool is to give control of the Android system remotely and retrieve information from it.

SpoofApp

(Phone call only) SpoofApp let’s you to place (spoof) calls with any caller ID number. You need SpoofCards to spoof calls, which are sold separately. It also includes some other features such as voice changer, which allows you to change your voice while using it. Additionally, it also allows you to record the whole conversation. You will receive a free 5 minute SpoofCard when you install the app for the first time.

Network Spoofer

Network Spoofer is another good app that allows you to change the website on other people’s computer from your Android phone. You need to download the Network Spoofer app and then log onto the Wi-Fi network. Choose a spoof to use with the app then tap on start. This app is considered as a malicious hacking tool by network administrators. So, it is advisable to not try this on unauthorized networks, as this is not a penetration testing app. It is just to exhibit how susceptible the home network is.

Faceniff

(Facebook only) Faceniff is basically used to sniff the Facebook ID over the same network. For instance, if you are on the same network and your Faceniff is turned on, then it will sniff all the Facebook IDs that are logged in from the same network. Since this is a paid version, you need to pay for this on the internet.

WhatsApp Sniffer

(For WhatsApp only) This tool can be used to hack private WhatsApp chats, pictures, audios and videos of your friends who are using your Wi-Fi Hotspot. Disable your antivirus before using this app, as it is detected by antivirus.

APK Inspector

The goal of this project is to aide analysts and reverse engineers to visualize compiled Android packages and their corresponding DEX code. APKInspector provides both analysis functions and graphic features for the users to gain deep insight into the malicious apps. You can also get the source code of any android application and edit it in order to remove credits and license.

dSploit

dSploit is a free penetration testing suite developed for the Android operating system, which comes with all-in-one network analysis capabilities. It can be used by anyone in order to perform a number of advanced network related tasks. It also contains a number of powerful functions that allow you to analyze, capture, and manipulate network transactions. You can scan networks for connected devices, identify the operating system, running services and open ports on each device, as well as check them for vulnerabilities. The app is designed to be very fast, handy and easy to use.

Wi-Fi Killer

This app allows you to block a person from using your Wi-Fi network. You can disable internet connection for any device that is present in your Wi-Fi network.

DroidSheep

DroidSheep is also one of the free best application for sniffing the sessions over the network. Similar to Faceniff, it not only sniffs the Facebook sessions but also other sessions.

Eviloperator

(Phone call only) This app connects two person automatically in a phone call, which makes them believe that they have called each other. The advantage of this app is that you can record and save the conversation.
Some of the apps given above may work only on rooted Android smartphones. We have given links for the App download, however download the app at your own risk. If you are not familiar with pentesting, theses apps will do you no good.
Kindly mention any other app which you may like for research/hacking/pentesting and we will include it in our future posts.
By Jeet Rami

Researchers have found that hackers have stolen more than 250,000 valid Apple accounts using an iOS malware named KeyRaider. However, this threat only affects the jailbroken devices.

Here is a news that might worry you if you recently jailbroke your iPhone. The research team at Palo Alto networks and WeipTech have unveiled a new iOS malware named KeyRaider that has helped the hackers to steal 250,000 valid Apple accounts. This iOS malware heist is the largest of its kind.

Recently, the researchers have identified about 92 samples of a new iOS malware family in the wild. They analysed the suspicious Apple iOS tweaks reported by users and found a numerous number of Apple accounts and passwords stored on a server. The KeyRaider iOS malware targets the jailbroken iOS phones and is spread using the widely popular Cydia app repositories. This app is used to download apps and manage the jailbroken iPhones.
According to the Palo Alto networks, this threat has impacted users from 18 countries that include the likes of France, Russia, USA, China, UK, Germany, Canada, Australia, Israel, Italy, Spain, Singapore, and South Korea. This iOS malware hooks system process through MobileSubstrate and takes away account usernames, passwords and GUID by listening to iTunes traffic on the device.
The malware was reported due to weirdly behaving App Store as after finding multiple unauthorised App Store purchases, a student from China noticed that one tweak was uploading data to an unknown database. Actually, the KeyRaider iOS malware has stolen this data and uploaded the data to its command and control (C2) server.  This server itself contains flaws and exposes the information.
KeyRaider iOS malware can be used to buy apps and remotely lock an iOS device and ask for ransom.
It should be noted that this iOS malware only works in jailbroken devices and most of the users seem to be located in China. Thus, jailbreaking your iOS device could be a great way to bring new apps and icons, but it’s equally dangerous.
By Jeet Rami

Sending 33 HD films in a sec! Huawei and Proximus successfully transfer 1 Tbps data over optical signal

A joint trial in the backbone of Proximus that occurs in speeds over an optical signal, a so called super-channel, of up to one Terabits per second (Tbps) has been successfully finished by Huawei and Proximus. This speed has a close similarity with the process of sending 33 HD films in a single second.
A new round of digital movement has already begun and the future of the world will be super-connected. More and more bandwidth will be required to stay forward of the needs of the customers and the telecom industry will have to be prepared to deal with these growing demands. The backbone, which is the true central part of a telecom network is an important element to make this possible.
The trial is the first result of the association on a new method that Huawei and Proximus have been occupied in January. It is the first time that this Huawei technology has been carried out with an operator throughout the world: a single super-channel OTN Card with a transmission speed of 1 Tbps on Proximus’ optical backbone.
The objective of the test was to find out whether this technology can be combined into the central network, to expect the continuous and increasing customers demand for more bandwidth. Thanks to this Huawei technology, the successful trial shows that the Proximus future optical backbone with a capacity of 200Gbps channels can develop rapidly and effectively to 400Gbps channels and even 1Tbps super channels in the future. Therefore, we can upgrade the transmission capacity of the central network links from 16Tbps to 20Tbps by using the current optical platform, slot and chassis again.
Using an advanced ‘Flexgrid’ infrastructure with Huawei’s ‘Optical Switch Node OSN 9800 platform, the record transmission speed was performed over a 1,040 kilometer fiber link. This strategy increases the capacity on a fiber cable by squeezing the gaps between transmission channels. The approach increases the density of the transmission channels on fiber, making it around 150% more effective than today’s typical 100Gbps core network links.
What is particularly remarkable was that the test was performed with the Huawei 1Tbps OTN line card. OTN stands for Optical Transport Network and provides the functionality for flexible, effective and data agnostic filling of high speed signals.
Jeffrey Gao, President of the Huawei transmission network product line says “The network is turning to DC (Data Center) centric, which brings a boost demand for increased bandwidth. Businesses are currently undergoing a digital transformation and consumers require always-on connectivity. Huawei supports its customers through innovation; together we build simplified networks ensuring the best user experience towards end users. This trial is testimony of Huawei’s engagement to innovation.”
“At Proximus we pledge to satisfy the evolving customers demand by investing in new technologies to offer them the best quality and service. Together with Huawei we want to let our network infrastructure evolve to support current and future bandwidth demands and offer our customers an outstanding user experience,” says Geert Standaert, Chief Technology Officer at Proximus.
By Jeet Rami
A developer named Yusheng has created an amazing infographic that shows the entire JavaScript language syntax into one single image. Take a look and save it for a quick reminder.

What if you had to study one single page to get the complete idea of a programming language? Well, along the similar lines, today we are sharing an educative infographic that encapsulates the entire JavaScript programming syntax into one single image.

A China-based developer Yusheng has created this amazing interactive infographic that paints the entire JavaScript on a single canvas. You must be aware that JavaScript is the hottest programming language right now and it’s a language that could earn you big bucks.
This mind map for JavaScript is here for you with code examples and it covers ES5. Yusheng is developing the ES6 syntax and we’ll be sharing it with you soon.
You can save the image below to have a quick look to brush up your memory.

The Entire JavaScript Language in a Single Image (click to enlarge)

By Jeet Rami

Microsoft is heading to the court to battle the U.S. Department of Justice to protect a user’s data stored in the Irish data centers. The company calls it a threat to privacy and international sovereignty.

While Microsoft is being targeted forstealing the user data with the newWindows 10 OS, the company is once again returning to the court to continue its battle with the US government. The company is resisting the demand that it should hand over some emails stored at a data center in Ireland.
The emails involved belong to an alleged crime suspect. In the past two judgments, Redmond has faced defeats in the lower courts. For the third time, the company is challenging the US government in the U.S. Court of Appeal for the Second Circuit.
Microsoft said that it is fighting this case on behalf of everyone and calls this a fight to protect the fundamental right to privacy and international sovereignty. However, the US Department of Justice says that it’s necessary to access the data stored in foreign data centers as it would be helpful in the prosecution of criminals.
Microsoft has showed off letters of support from the likes of Apple, Amazon, HP, AT&T, Verizon and others. Also, Microsoft has the Irish government on its side. It’s being seen as a move to retain the trust of the customers who keep complaining that the tech companies and governments is sniffing their activities and data.
These emails were first sought in 2013 and the judge will be deciding their fate very soon.
The hearing will take place today and we’ll keep you updated.
What are your thoughts? Should the government be allowed to access the user data stored in overseas data centers?

By Jeet Rami
According to the latest documents revealed by NSA whistleblower Edward Snowden, the National Security Agency (NSA) and its British counterpart, Government Communications (GCHQ) Headquarters have reverse engineered the popular security firm Kaspersky Lab and other security solutions providing companies.

The US and British spy agencies have launched this attack on the anti-virus companies since 2008 to track users and breach the networks. According to the Snowden documents revealed by The Intercept, NSA  and GCHQ have reverse engineered popular security software products under “questionable legal authority” and kept an eye the web and email traffic of the users.
While different companies have been under attack, the company which is mentioned repeatedly in the report is the Russia-based Kaspersky Labs. The company is one of the leading security solutions providers, and has more than 270,000 corporate clients and claims to protect more than 400 million spread across the globe.
The attack on the antivirus companies like Kaspersky makes perfect sense as they are responsible for defending the users from inbound threats. The Intercept says that spy agencies and anti-virus companies share a cat and mouse relationship. If a spy agency is able to find weaknesses in the anti-virus software and hack it, it gives it them the obvious advantage.

By Jeet Rami