Google releases a Chrome extension to fix the critical VPN security hole

vpn-animation-694x336Earlier within the year, we tend to had rumored a significant vulnerability in Google Chrome that leaked user’s real science address even supposing they were employing a VPN.  The vulnerability involving WebRTC might leak users real science of all VPN services users, had cause panic among VPN users attributable to the inherent risks.

Google has currently revealed associate extension for its Chrome browser that fixes this serious WebRTC security hole in Google Chrome.

The WebRTC flaw was exploited by putting a number of lines of code on a web site and employing a STUN server it became potential to reveal not solely users’ true science addresses, however conjointly their native network address too.

At that point, VPN users might install the WebRTC block extension or Script Safe that ought to block the vulnerability. Firefox users, might use the No Script addon or as an alternative, they will kind “about: config” within the address bar and set the “media.peerconnection.enabled” setting to false.

However, currently Google has revealed a little Chrome extension (7.31KB) referred to as “WebRTC Network circuit.” This extension disables the WebRTC multiple-routes possibility in Chrome’s privacy settings whereas configuring WebRTC to not use bound science addresses.

In addition to activity native science addresses that area unit ordinarily inaccessible to the general public net (such as 192.168.1.1), the extension conjointly stops different public science addresses being unconcealed.

“Any public science addresses related to network interfaces that aren’t used for net traffic (e.g. associate ISP-provided address, once browsing through a VPN) [are hidden],” Google says.

“Once the extension is put in, WebRTC can solely use public science addresses related to the interface used for net traffic, generally identical addresses that area unit already provided to sites in browser communications protocol requests.”

While WebRTC Network circuit appears a decent resolution for the WebRTC security hole, Google admits having problems with the extension,

“This extension could have an effect on the performance of applications that use WebRTC for audio/video or period of time digital communication. As a result of it limits the potential network methods, WebRTC could decide a path that ends up in considerably longer delay or lower quality (e.g. through a VPN). We tend to are trying to work out however common this is”.

Samsung’s new sensor to put 16-megapixel cameras into slim phones

MIS_Main-702x336

Samsung has developed a brand-spanking new sensing element to put a 16-megapixel camera into the slim phones just like the Galaxy A8.

The S5K3P3, Samsung’s new one.0μm-pixel-based sixteen megapixel (Mp) CMOS image sensing element utilizes the company’s proprietary ISOCELL technology to activate the high performance one.0μm pixels. Providing an ideal resolution to today’s more and more agent mobile devices, this tiny component reduces the size and height of a picture sensing element module.

“As a trendsetter within the mobile image sensing element business, we tend to area unit happy to be the primary to deliver the foremost advanced one.0μm-pixel imager, that meets each high-resolution and slim style needs for Smartphone cameras,” same Kyushu Hong, vp and Head of S.LSI promoting at Samsung physics. “Starting with 16Mp sensing element, Samsung plans to any expand one .0μm-pixel product class and lead the image sensing element marketplace for high activity slim mobile devices.”

An ISOCELL-based CMOS imager has been engineered by the Korean company that produces use of terribly little one.0-micron (1 micrometer = one thousandth of 1 millimeter) pixels as critical usual sensors of identical size, that keep company with larger one.2 micrometer pixels, captures additional lightweight by giving the photographs additional clarity, and reduction in noise. This leads to a sensing element that’s twenty p.c slimmer, at associate degree adequate 5mm (0.2 inches) height.

The smaller pixels can possibly lead to slightly lowered image quality; the camera wouldn’t be ready to perform furthermore in dimly-lit environments as compared to larger sensors from Samsung. As for the camera itself, the Galaxy A8 can keep company with Samsung’s ISOCELL (LSI3P3) camera sensing element rather than the Sony IMX240 sensing element.

The ISOCELL technology strikingly reduces unwanted color transfer of neighboring components by adding physical obstacle between every pixel. This leads to higher color fidelity even in dimly-lit conditions, because it primarily will increase lightweight sensitivity and expressly controls the gathering of photons.

The combination of ISOCELL technology with the industry’s smallest one.0μm pixels can offer totally different style choice for the manufactures with the news S5K3P3 image sensing element.

Mobile device manufactures will lay their hands on Samsung’s new S5K3P3 image sensing element offered nowadays to style into their next-generation merchandise.

Smartphone-Addiction

Feeling bored to choose up the phone and sort out a reply. Well, currently you don’t need to. Victimization the easy ‘OK Google’ voice command, you’ll currently send messages through WhatsApp, Viber, We Chat, and a spread of different apps, to your friends and close to, dear ones.

In April, Google had launched custom voice action command, that allowed users to regulate choose third-party apps just by beginning with the “Ok Google” command. Until now, this has used Hangouts, Google’s default texting application on robot. Google has currently updated their Android-based voice-command system and expanded that practicality to electronic messaging apps, together with WhatsApp, Viber, We Chat, Next Plus and wire.

This upgrade involves the bottom version of the Google currently Launcher, that is accessible within the Google Play app store to most devices free inside the last few years. This update needs solely the latest version that you just have of all apps concerned, and lets users send messages quickly through a spread of free apps by locution, as an example, “OK Google, send a WhatsApp message to John”, when that you may be asked to dictate the contents of that message. However, if either of the apps area unit noncurrent, you’ll simply get a slip message or a bunch of search results.

In addition to the current update, the Google currently launcher permits users to send text messages, emails, and Hangouts messages via the “Ok Google” voice command.

This will work from your home screen like all Google currently options, if you’ve got listening activated. as an alternative, you’ll simply move into the Google app and begin speaking, or use the Google currently crosscut, if you’ve got AN robot device with software-rendered buttons.

This practicality is just accessible in English; but, the great news is that it’s not restricted to the U.S. as is usually the case with new Google options. The corporate says it’ll be operating to feature additional apps and languages “in the long run.”

In January, Google upgraded its main robot app with a giant improvement to Google Now: Serving cards from third-party apps right once they have timely info to supply. Initially, the new practicality was supported by forty apps, and in Gregorian calendar month, Google another seventy additional apps to the combination.

This integration from Google is so a part of a broader push from it on mobile that it’s not simply restricted to voice commands. By gap up its Google app to third-party services, the corporate isn’t solely providing users with additional options however conjointly providing them with AN expertise they cannot get anyplace else.

Face book is taking a cue from LinkedIn and testing new “Profile Tags” feature

Face book is taking a cue from LinkedIn and testing new “Profile Tags” feature

Have you ever checked out your Facebook profile page and lamented that the one issue it had been missing was — profile tags? You recognize, just like the ones on LinkedIn that purport to list your skilled skills thus colleagues and potential employers will instantly see what you’re sensible at?

Well, apparently Facebook has come back around to thinking that such tags square measure fascinating for your personal profile, and therefore the Verge is coverage that it’s already started testing the idea on accounts in New Island.

When asked by the school journal whether or not this was real or some quite optical phenomenon, Verge reader Luke M. told Verge that regarding Facebook’s new profile tags feature and therefore the company confirmed it had been testing them out with the subsequent statement: “Profile tags square measure an ingenious tool that enables you to and your friends add tags to your profile to focus on the items that describe you and what you’re into.” Created as a part of an inside Face book hackathon, the new feature can allow you to add tags to your own profile, or let your friends add tags for you, that you want to approve before they become in public visible. Tags square measure free-form, which implies you’ll kind in just about no matter you would like, even as well as emojis.

Just like LinkedIn, you’ll assign tags to yourself, or your friends will assign them at your approval. And being Face book, you’ll produce no matter tag you would like — you ought not to decide from a group list. You’ll even use emoji — which can seemingly be the football player. Once the feature is unrolled to everybody, friends will add tags by attending to your profile and tag you victimization words or phrases that describe you, or what you are doing (“happy camper”, “thinker”, “graphic artist” etc.) You’ll receive a notification, prompting you to simply accept or decline your tags. If you settle for, the tags come into view to everyone; if you decline, the tags disappear. Otherwise you might simply ignore the notification (cough, rather like you are doing with sure friend requests), and therefore the tags can stay unfinished, visible solely to you and therefore the friend World Health Organization labeled you. Once approved, different friends will “like” your tags, which is able to seem in declivitous order by the quantity of likes. If you don’t sort of a tag, then you ought not to approve it. Otherwise you will simply leave it hanging and its presence can stay your secret — solely you and therefore the tagger can see it till you resolutely refuse it.

And rather like all different things individuals increase your timeline; this may be one more occasion for a Facebook notification.

With this new feature, Facebook is each pull options from different sites however conjointly adding associate degree other yet one more one more} layer to an already complicated expertise — the social network appears to need to be your one stop-shop for connecting with friends, catching informed news, looking videos, and, with this latest update, perhaps even connecting with strangers World Health Organization have similar interests. However tags can truly be used although, there’s no word however on once Facebook are testing or rolling out the new profile tags elsewhere. per Face book, this feature is presently solely being tested in New island, with no word on once different countries may get to do it.

Why Bit coin Cloud Mining Service Hacked; Database on Sale for Just 1 Bit coin

Why Bit coin Cloud Mining Service Hacked; Database on Sale for Just 1 Bit coin

Bitcoin Cloud Mining service Cloudminr.io has been hacked and its whole user’s information is on sale for one Bitcoin.

The unknown hackers have with success taken full management of web site the web site’s server and damaged the homepage of the website.

Users visiting the web site area unit greeted with a damaged homepage showing the partial information of around one thousand shoppers as well as their usernames and unencrypted passwords in utterly plain text format.

This clearly indicates that the corporate isn’t following the simplest security practices to secure their users personal information because the passwords weren’t even hashed before storing into the information.

Hackers giving around 80,000 user’s information for 1BTC

The information of one thousand users shown on the web site homepage is simply a sample given by the hackers whereas they need compromised around 80,000 user’s information in total from the cloud mining service.

The hackers area unit giving the complete information of thousands of users for the simply 1BTC, that can be a goldmine for cyber-criminals and spammers.

So far, there are not any details on whether or not Bit coin wallets or just elements of the web site server were compromised.

Now You Can Use How To Whatsapp without Any Number

Now You Can Use How To Whatsapp without Any Number

Do you wish to use Whatsapp while not mobile number? If you are doing then I’m sharing a guide with you nowadays which is able to assist you the way to use Whatsapp while not exploitation your number. Nowadays whatsapp is one in all the vital a part of our life as we tend to daily create chats with our friends through this app. As you all apprehend that you just need to register your variety to access whatsapp. However suppose if you may be able to use it while not registering any variety, looks not possible, however it’s potential. You’ll be able to register your whatsapp with none coming into the quantity details within the whatsapp. Simply follow up the below post to proceed.

Just accept exploitation whatsapp while not registering any variety, which will be terribly cool as you may be exploitation the whatsapp anonymously.

Steps to Use Whatsapp while not Registering any variety:-

1. First of all, Save your complete Whatsapp information to your phone and uninstall the prevailing Whatsapp account.

2. Now, switch your phone to heavier-than-air craft Mode then transfer and Install new Whatsapp on your phone.

3. After that, go along with on-screen directions and place your number there, don’t it’ll not send the message as your phone is on flight mode.

4. Now, it’ll raise you to pick an alternate methodology to pick for verification of your variety. Then you would like to pick Check through SMS.

5. Afterwards, enter your email address and click on Submit button. Then at once click on Cancel button.

6. Now you would like to put in spoof messages apps for your device. If you have got

IPhone then install Fake-A-Message and

If you have got humanoid phone then install Spoof Text Message.

7. After that, attend Outbox and send the detail to spoofed verifications. Use these details for that; to: +447900347295 From: Country Code, Mobile variety and Message: You’re Email ID.

8. Now, these details are going to be sent thereto false variety and you will use that variety for the verification of your Whatsapp account.

9. Done!

So on top of is all concerning the strategy for a way To Use Whatsapp while not registering any variety? By this methodology you be able to simply use whatsapp while not registering any variety as you’ll be able to chat anonymously together with your friends. And you’ll be able to merely implement this methodology by simply following the few steps that we have mentioned on top of. Hope you prefer the trick and don’t forget to share this cool whatsapptrick together with your friends. Leave a comment below if you facing any bother at any step.

Critical OpenSSL Flaw Allows Hackers to Impersonate Any Trusted SSL Certificate

Critical OpenSSL Flaw Allows Hackers to Impersonate Any Trusted SSL Certificate

The mysterious security vulnerability within the wide used OpenSSL code library is neither HeartBleed nor FREAK, however it’s essential enough to be patched by sysadmins with none delay.

OpenSSL Foundation frees the secure patch against high severity vulnerability in OpenSSL versions one.0.1n and 1.0.2b, partitioning a certificate forgery issue within the implementations of the crypto protocol.

The essential vulnerability might enable man-in-the-middle attackers to impersonate cryptographically protected websites, virtual non-public networks, or e-mail servers, and eavesdrop on encrypted web traffic.

The vulnerability, (CVE-2015-1793), is because of a retardant lies within the certificate verification method. A slip-up in its implementation skipped some security checks on new, untrusted certificates.

By exploiting this vulnerability, associate offender might circumvent certificate warnings that change them to force applications into treating associate invalid certificate as a legitimate Certificate Authority.

“An error within the implementation of this logic will mean that associate offender might cause sure checks on untrusted certificates to be bypassed,” associate consultative by OpenSSL explains, “such because the CA flag, sanctionative them to use a legitimate leaf certificate to act as a CA associated “issue” an invalid certificate.”

This downside impacts any end-user application that verifies certificates together with Transport Layer Security (TLS) or Secure Sockets Layer (SSL) or DTLS purchasers and SSL/TLS/DTLS server’s victimization consumer authentication.

This security issue was discovered by Adam Langley and David Benjamin of Google BoringSSL, Google’s own version of the OpenSSL toolkit. The developers rumored the flaw to OpenSSL on twenty four Gregorian calendar months so submitted a fix to deal with the difficulty.

The security flaw affects OpenSSL versions one.0.1n, 1.0.2b, 1.0.2c, and 1.0.1o. Thus we tend to suggest users of OpenSSL version one.0.2b/1.0.2c to upgrade their system to version one.0.2d and users of OpenSSL version one.0.1n/1.0.1o to upgrade to version one.0.1p.

Click This

How to 7nm IBM Chip is the Most Powerful Chip Ever Created

How to 7nm IBM Chip is the Most Powerful Chip Ever Created

With the dimensions of the process chips shrinking unendingly and presently with elements of concerning 14nm dimension, individuals thought that we’ve got reached the top of the Moore’s curve. So, technology pioneer IBM thought, let’s prove everybody wrong with our 7nm chip!

IBM has simply declared that that they had upraised up the record of the tiniest chip by thinning out the dimensions to 7nm in breadth. whereas the chip designers across the planet were grading for the 10nm scale and regarded 7nm chips too troublesome to fabricate, IBM has passed the technical issues and created a chip whose elements square measure concerning identical size because the red somatic cell.

The company says it achieved the 7nm chip achievement by mistreatment silicon-germanium channels within the chip’s parts. Until currently solely element had been utilized in chip styles. The new combination of semiconductors permits the chip to method quicker. It implies that the transistors within switch at a quicker rate than in previous chips and additionally use less energy.

For fabricating this 7nm chip, IBM used a slender wavelength of light for the fine etching of the elements and stacked the transistors nearer while not interference.

IBM has currently begun to work on producing the new 7nm chips on an outsized scale. They need tested variety of styles to create the producing of chips efficient. IBM plans to create a fabrication plant for $3 billion in any state, with investors like Samsung et al… The chips square measure believed to come back because the new process brains for machines from 2018.

Intel now, the one4nm scale chips had 1.9 billion transistors whereas IBM’s 7nm chips can have concerning twenty billion. This development would drastically improve the speed of the processors.

News ON

How To Download SoundCloud Songs for Free

How To Download SoundCloud Songs for Free

Hello, readers! As several of you’re already aware of the actual fact that I oft write how-to articles, I carry on obtaining user requests. Today, I’m here with another how-to post requested by one amongst our readers on our Face book page.

Sound Cloud is one amongst the simplest places on web to pay attention music and revel in it. a whole lot and thousands of individuals use Sound Cloud a day and it helps the users to transfer, promote and share the music. If you’re a registered user (it’s free!), you’ll be able to stream unlimited music and truthfulness your senses. However what if you wish a song and want to transfer it? Sound Cloud permits streaming and share, however it doesn’t enable songs transfer.

Here I’m planning to describe easy and economical thanks to transfer Sound Cloud songs. There square measure some sensible on-line downloader’s that may try this trick. One such web site is and it wills the task with ease. The sound quality you get is pretty sensible and you furthermore might have a choice to add its extension to your browser.

Follow the straightforward steps below and transfer Sound Cloud songs:

Step 1:

Find the song you wish to transfer and therefore the copy the computer address of that song. You’ll be able to additionally copy the link location by right clicking on that. Here I’m downloading Furious 7‘s audio recording See You once more mistreatment .Step 2:

Now move to currently you’ll notice 3 buttons: you’ll be able to directly transfer your music from there, and if the transfer button doesn’t work, right-click and choose “Save link as” to transfer Sound Cloud songs .I hope that you just can notice this tool to transfer Sound Cloud songs useful. Share your experiences within the comments section below.

You can additionally add the Google Chrome extension from here. And paste the computer address within the transfer box. Currently click on transfer button to transfer Sound Cloud songs.

Full News ON

How to Zero-Day Flash Player Exploit Disclosed in ‘Hacking Team’ Data Dump

The Recent Cyber Attack that exposed 400 GB of corporate Data knowledge happiness to police investigation software system firm Hacking Team has discovered that the spyware company have already discovered Associate in Nursing exploit for Associate in Nursing unlatched zero-day vulnerability in Flash Player.

flash-Player-zero-day-vulnerability

Security researchers at Trend small claim that the leaked knowledge taken from Hacking Team, Associate in Nursing Italian Company that sells police investigation software system to government agencies, contains variety of unlatched and unreported Adobe flaws.

Hacking Team has Unlatched Flash Bug

While analyzing the leaked knowledge dump, researchers discovered a minimum of 3 software system exploits – 2 for Adobe Flash Player and one for Microsoft’s Windows kernel.

Out of two, one amongst the Flash Player vulnerabilities, called Use-after-free vulnerability with CVE-2015-0349, has already been patched.

However, the Hacking Team represented the opposite Flash Player exploit that could be a zero-day exploit with no CVE variety nonetheless, as “the loveliest Flash bug for the last four years.”

Symantec has conjointly confirmed the existence of the zero-day flaw in Adobe Flash that would permit hackers to remotely execute code on a targeted pc, truly permitting them to require full management of it.

Researchers found a Flash zero-day proof-of-concept (POC) exploit code that, when testing, with success worked on the foremost latest, totally patched version of Adobe Flash (version eighteen.0.0.194) with net somebody.

Successful exploitation of the zero-day Flash vulnerability might cause a system crash, doubtless permitting a hacker to require complete management of the affected pc.

Zero-Day Flash Flaw Affects All Major Browsers

The zero-day vulnerability affects all major internet browsers, as well as Microsoft’s net somebody, Google Chrome, Mozilla Firefox moreover as Apple’s campaign.

Researchers haven’t noticed any attacks within the wild exploiting this zero-day flaw. However, since details of the vulnerability are currently created in public obtainable, it’s doubtless cybercriminals can quickly try and exploit the flaw before a patch is issued.

Network Security Company in India

Therefore, users UN agency are involved regarding the problem will briefly disable the Adobe Flash Player in their browser till the corporate patches the zero-day flaw.