It seems like yesterday — not 10 years ago — that Steve Jobs took the stage at MacWorld to debut Apple’s latest new gadget: the iPhone.
The iPhone was three devices in one, he declared at Moscone West in San Francisco. It was a widescreen iPod with touch controls, a revolutionary mobile phone, and a breakthrough Internet communications device.
Apple’s “three-in-one device” has gone on to become a critical contributor to the company’s success, accounting for more than half its revenues annually, as well as a can’t-live-without tool for many people.
Summary: Researchers have proposed in-orbit reference datasets for calibrating weather satellites. A recent presentation demonstrated that using these references reduced errors in microwave and infrared weather satellites to fractions of a degree Celsius.
“Traffic and weather, together on the hour!” blasts your local radio station, while your smartphone knows the weather halfway across the world. A network of satellites whizzing around Earth collecting mountains of data makes such constant and wide-ranging access to accurate weather forecasts possible. Just one satellite, such as the National Oceanic and Atmospheric Administration’s (NOAA) Geostationary Operational Environmental Satellite-R that launched in 2016, can collect 3.5 terabytes of weather data per day.
Kristoffer Von Hassel (5 years)
As we all know that a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment, or to evaluate those weaknesses to assist in removing them. So, meet the world’s most interesting and dangerous child hackers.
01.Kristoffer Von Hassel (5 years)
Kristoffer von Hassel is the world’s youngest known hacker and notable for being the youngest “security researcher” listed on tech giant Microsoft’s Security Techcenter as having exposed a security vulnerability. Specifically, Kristoffer was able to bypass the authentication screen of Xbox Live, hence, manage to access games that theoretically could not accessible.
Reasons why Android smartphone users go for iOS and then come back.
iOS vs. Android has always been a burning topic for debates all over the internet. There are numerous users who have changed their Android smartphone with an Apple iPhone and later regretted their decision. In this article I’ll point out the reasons for which Android users switch to iOS and the problems they face after it.
Okay! First lets discuss about exciting features of Apple devices:
STOP Sharing that Facebook Privacy and Permission Notice, It’s a HOAX
Recently, you may have seen some of your Facebook friends started posting a Facebook “Privacy Notice” clarifying that they no longer give Facebook permission to use their photos, personal information, and so on.
The Privacy message looks something like this:
This tool uses SS7 Flaw to let you spy on mobile phone calls, messages and user location
The latest news only confirms the theory that Israeli firms are creating a position in the spying and surveillance industry with their ground-breaking and wide-ranging products. The latest news only confirms the theory that Israel is going places as far as digital surveillance is concerned.
Established in 1993, an Israeli firm Ability has developed really amazing software, which has been named Ability Unlimited Interception System to provide unlimited surveillance chances to law enforcement in the US so that criminal activity could be kept at bay, it has been reported. Currently, this system can recognize calls, texts and location of almost any mobile phone around the world and is available for US$20 million. It is also being guessed that it is quite an accomplishment by the Israeli firm to get it for this price and the amazing skills of the system.
Private messages that your send through your Facebook Messenger can be read by potential hackers using a hacking backdoor in the app. This backdoor vulnerability was found by the security researchers from Check Point, who will demo it at the Info security Conference to be held today afternoon.
The security hole if unpatched could put 900 million people who use Facebook Messenger, at risk. The vulnerability was found by Check Point security researcher Roman Zaikan. Zaikan said that the backdoor allows a potential hacker to launch a man-in-the-middle (MiTM) attack into Facebook Messenger and spy/read messages without either the sender or the reader knowing it. The hacker could also alter the messages for their own malicious gain.
Single Sign-On and Password Synchronization
One issue that has irritated users in large secure environments is the burgeoning number of passwords they have to remember to access various applications. A user might need one password to log onto his or her workstation, another to access the network, and yet another for a particular server. Ideally, a user should be able to sign on once, with a single password, and be able to access all the other systems on which he or she has authorization.
Some have called this notion of single sign-on the “Holy Grail” of computer security.
The goal is admirable to create a common enterprise security infrastructure to re-place a heterogeneous one. And it is currently being at-tempted by several vendors through technologies such as the Open Group’s Distributed Computing Environment (DCE), MIT’s Kerberos, Microsoft’s ActiveDirectory, and Public-Key Infrastructure (PKI)-based systems. However, few, if any, enterprises have actually achieved their goal. Unfortunately, the task of changing all existing applications to use a common security infrastructure is very difﬁcult, and this has further been hampered by a lack of consensus on a common security infrastructure. As a result, the disparate proprietary and standards-based solutions cannot be applied to every system. In addition, there is a risk of a single point of failure. Should one user’s pass-word be compromised, it is not just his local system that can be breached but the entire enterprise.
A hash function is an algorithm that takes a variable-length string as the input and produces a ﬁxed-length value (hash) as the output. The challenge for a hashing algorithm is to make this process irreversible; that is, ﬁnding
a string that produces a given hash value should be very difﬁcult. It should also be difﬁcult to ﬁnd two arbitrary strings that produce the same hash value. Also called a message digest or ﬁngerprint, several one-way hash functions are in common use today. Among these are Se-cure Hashing Algorithm-1 (SHA-1) and Message Digest-5 (MD-5). The latter was invented by Ron Rivest for RSA Security, Inc. and produces a 128-bit hash value. See Table 1 for an example of output generated by MD5. SHA-1 was developed by the U.S. National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) and produces 160-bit hash values. SHA-1 is generally considered more secure than MD5 due to its longer hash value.
Microsoft Windows NT uses one-way hash functions to store password information in the Security Account Manager (SAM). There are no Windows32 Applications Programming Interface (API) function calls to retrieve user passwords because the system does not store them. It stores only hash values. However, even a hash-encrypted password in a database is not entirely secure. A cracking tool can compile a list of, say, the one million most commonly used passwords and compute hash functions from all of them. Then the tool can obtain the system account database and compare the hashed passwords in the database with its own list to see what matches. This is called a “dictionary attack” (see “Password Cracking Tools”).
The ancient folk tale of Ali Baba and the forty thieves mentions the use of a password. In this story, Ali Baba ﬁnds that the phrase “Open Sesame” magically opens the entrance to a cave where the thieves have hidden their treasure. Similarly, modern computer systems use pass-words to authenticate users and allow them entrance to system resources and data shares on an automated basis. The use of passwords in computer systems likely can be traced to the earliest time sharing and dial-up networks. Passwords were probably not used before then in purely batch systems.
The security provided by a password system depends on the passwords being kept secret at all times. Thus, a password is vulnerable to compromise whenever it is used, stored, or even known. In a password-based authen-tication mechanism implemented on a computer system, passwords are vulnerable to compromise due to ﬁve es-sential aspects of the password system: