Meet The World’s 5 Most Dangerous Child Hackers

Kristoffer Von Hassel (5 years)

Kristoffer Von Hassel (5 years)

As we all know that a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment, or to evaluate those weaknesses to assist in removing them. So, meet the world’s most interesting and dangerous child hackers.


01.Kristoffer Von Hassel (5 years)

Kristoffer von Hassel is the world’s youngest known hacker and notable for being the youngest “security researcher” listed on tech giant Microsoft’s Security Techcenter as having exposed a security vulnerability. Specifically, Kristoffer was able to bypass the authentication screen of Xbox Live, hence, manage to access games that theoretically could not accessible.

Read more

Why Users Switch Back To Android Smartphones From iPhones

iphone vs android -PsvpTamilReasons why Android smartphone users go for iOS and then come back.
iOS vs. Android has always been a burning topic for debates all over the internet. There are numerous users who have changed their Android smartphone with an Apple iPhone and later regretted their decision. In this article I’ll point out the reasons for which Android users switch to iOS and the problems they face after it.

Okay! First lets discuss about exciting features of Apple devices:

Read more

Half Your Brain Stays Awake When You Sleep In A New Place

Sleeping Man - PsvpTamilHalf Your Brain Stays Awake When You Sleep In A New Place

There is a great chance that you felt sleepy and groggy after you slept in a hotel or went out to camp. You may have felt weary the following day after you tossed and turned in your bed the entire night. This is a result of nature dying hard. The brain goes into survival mode as someone sleeps in a new place. Scientists at Brown University have suggested that this enables people to jump awake once strange sounds arise.

The scientists referred to the First Night Effect (FNE) as a usual disturbance in sleep for a while. However, they have been unable to completely understand how this process exactly works. Masako Tamaki teamed up with her colleagues in order to discover the reason behind this concept. They meticulously analyzed multiple sleeping brains with the help of advanced Neuroimaging techniques. Interestingly, they discovered that such brains demonstrate asymmetrical patterns of sleep activity. This means that a hemisphere of the brain continues to hum as the other one is asleep. The hemisphere that is not fully awake tends to be more active, so much so that it responds to external stimuli such as deviant sounds.

Read more

STOP Sharing that Facebook Privacy and Permission Notice, It’s a HOAX

 STOP Sharing that Facebook Privacy and Permission Notice, It’s a HOAX

Recently, you may have seen some of your Facebook friends started posting a Facebook “Privacy Notice” clarifying that they no longer give Facebook permission to use their photos, personal information, and so on.

The Privacy message looks something like this:

Read more

This Hack Tool Uses SS7 Flaw to Trace Call, Location Of Every Single Mobile Phone

Trace Mobile Calls - PsvpTamilThis tool uses SS7 Flaw to let you spy on mobile phone calls, messages and user location
The latest news only confirms the theory that Israeli firms are creating a position in the spying and surveillance industry with their ground-breaking and wide-ranging products. The latest news only confirms the theory that Israel is going places as far as digital surveillance is concerned.

Established in 1993, an Israeli firm Ability has developed really amazing software, which has been named Ability Unlimited Interception System to provide unlimited surveillance chances to law enforcement in the US so that criminal activity could be kept at bay, it has been reported. Currently, this system can recognize calls, texts and location of almost any mobile phone around the world and is available for US$20 million. It is also being guessed that it is quite an accomplishment by the Israeli firm to get it for this price and the amazing skills of the system.

Read more

All in Einstein’s Head

Albert Einstein - PsvpTamilHow Einstein’s creative thinking led to a new rule book for the universe.

Who could have believed that the world was flat? Or that it sits fixed in space, while the cosmos revolves around it? Anyone with two eyes, that’s who. It takes a leap of imagination to contemplate the alternative — that we are standing atop a rapidly spinning sphere, hurtling through space.

Albert Einstein, like Nicolaus Copernicus and Galileo Galilei before him, redefined our understanding of the universe, and he did so thanks to a knack for keeping his thoughts clear of unnecessary information. In fact, he conducted experiments on the basis of thought alone, playing them out in something like the construct from The Matrix — a completely empty space populated with only items essential to his experiments. A clock. A train. A beam of light. An observer or two. An elevator. “Imagine a large portion of empty space, so far removed from stars and other appreciable masses,” said Einstein, describing his mental construct.

Read more

Beware of Fake USB Chargers that Wirelessly Record Everything You Type, FBI Warns

Warning - PsvpTamilBeware of Fake USB Chargers that Wirelessly Record Everything You Type, FBI warns

Last year, a white hat hacker developed a cheap Arduino-based device that looked and functioned just like a generic USB mobile charger, but covertly logged, decrypted and reported back all keystrokes from Microsoft wireless keyboards.

Dubbed KeySweeper, the device included a web-based tool for live keystroke monitoring and was capable of sending SMS alerts for typed keystrokes, usernames, or URLs, and work even after the nasty device is unplugged because of its built-in rechargeable battery.

Besides the proof-of-concept attack platform, security researcher Samy Kamkar, who created KeySweeper, also released instructions on how to build your own USB wall charger.

Read more

Warning! 32 Million Twitter Passwords May Have Been Hacked and Leaked

Twitter Hacked Passwords Leaked - PsvpTamilWarning! 32 Million Twitter Passwords May Have Been Hacked and Leaked.

The world came to know about massive data breaches in some of the most popular social media websites including LinkedIn, MySpace, Tumblr, Fling, and when an unknown Russian hacker published the data dumps for sale on the underground black marketplace.

However, these are only data breaches that have been publicly disclosed by the hacker.

I wonder how much more stolen data sets this Russian, or other hackers are holding that have yet to be released.

Read more

Security Researchers Find Hacking Backdoor to Facebook Messenger App

Private messages that your send through your Facebook Messenger can be read by potential hackers using a hacking backdoor in the app. This backdoor vulnerability was found by the security researchers from Check Point, who will demo it at the Info security Conference to be held today afternoon.

The security hole if unpatched could put 900 million people who use Facebook Messenger, at risk. The vulnerability was found by Check Point security researcher Roman Zaikan. Zaikan said that the backdoor allows a potential hacker to launch a man-in-the-middle (MiTM) attack into Facebook Messenger and spy/read messages without either the sender or the reader  knowing it. The hacker could also alter the messages for their own malicious gain.

Read more

Five Best Chicken Recipes For Weight Loss

Lemon Roasted Chicken5 Best Chicken Recipes For Weight Loss

Weight loss diet plan is one of the most challenging task if you are a meat lover. But now there is no need to avoid meat completely, you can eat chicken while on weight loss diet. Here in this article you can set what you can eat in chicken whether it is grilled, roasted or fried so these 5 Best Chicken Recipes For Weight Loss will remain your weight as you want while on dieting and eating.

Read more

1 2 3 4 5