Posts

Showing posts from November, 2015

"Remotely Bypass" Pattern Lock Of Android Device By Google

Image
Older versions of Android can be remotely reset by Google if the company is issued with a court order, but only if they're locked using a pattern.

This is according to a document prepared by the New York District Attorney's Office which revealed just how easily investigators could see the contents of a device.

Devices running Android 5.0 and newer cannot be remotely reset as they use full disk encryption. However, this option is not switched on by default.

The report found any device using an older version of the operating system is vulnerable to remote reset and according to the Android Developer Dashboard, this is 74.1 per cent of Android devices currently being used. However, this figure is slightly misleading.

The remote reset feature does apply to phones running operating systems before Android L, but it only applies to people how have secured their device with a pattern.

Google can't remotely reset phones secured with a PIN or passcode, meaning the number of af…

WhatsApp And Facebook Signals Can Be Used To Get Your Location

Image
Hackers can monitor 4G mobile networks to detect users' location using supposedly anonymised identifiers

Security researchers have revealed how simply contacting somebody via WhatsApp or Facebook messenger can reveal a smartphone owner's location by exploiting a security flaw in 4G mobile networks.

A hacker could use the apps to discover the supposedly anonymised identifiers that are assigned to devices when they connect to a network, and use them to locate their owner, according to researchers in Finland and Germany.

When a smartphone connects to a mobile network, it is assigned a temporary number called a TMSI (Temporary Mobile Subscriber Identity). The network then uses this eight-digit number to identify a device, rather than a phone number, to make communication more private.

However, a hacker monitoring radio communications could tie this TMSI to an individual by sending them a Facebook message or WhatsApp chat, both of which trigger a special "paging request&quo…

Important!!! Alert If You Want To Learn Ethical Hacking

Do Not Scan These IP Addresses (Unless you want to get into trouble)

The IP addresses listed in the below images are associated with critical information resource centers of US. Scanning these IP addresses will be considered an attempt to break the US's Information Security. Therefore do not scan these IP addresses unless you want to get into
trouble.

Credits to Hacking-Tutorial.com for the list.

RANGE 6
6.* – Army Information Systems Center

RANGE 7
7.*.*.* Defense Information Systems Agency, VA

RANGE 11
11.*.*.* DoD Intel Information Systems, Defense Intelligence Agency, Washington DC

RANGE 21
21. – US Defense Information Systems Agency

RANGE 22
22.* – Defense Information Systems Agency

RANGE 24
24.198.*.*

RANGE 25
25.*.*.* Royal Signals and Radar Establishment, UK

RANGE 26
26.* – Defense Information Systems Agency

RANGE 29
29.* – Defense Information Systems Agency

RANGE 30
30.* – Defense Information Systems Agency

RANGE 49
49.* – Joint Tactical Command

RANGE 50
50.*…