April 2016
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.
Microsoft to Store Data on DNA — 1,000,000,000 TB in Just a Gram

Do you know — 1 Gram of DNA Can Store 1,000,000,000 Terabyte of Data for 1000+ Years.

Microsoft has purchased 10 Million strands of synthetic DNA, called Oligonucleotides a.k.a. DNA molecules, from biology startup Twist and collaborated with researchers from University of Washington to explore the idea of using synthetic DNA to store huge amount of data.

Microsoft is planning to drastically change the future of data storage technology as we know it today.

The volume and rate of production of data being produced and stored every day are so fast that the servers and hard drives needing to be replaced periodically, potentially increasing the risk of corruption and data loss.

According to stats, 5.4 zettabytes (4.4 trillion gigabytes) of digital data, circulating and available worldwide, had been created by 2015, and it will boost to 54 zettabytes (ZB) by 2020.

How will the world suppose to store this 10 times amount of data in next four years?

For this, Microsoft has partnered with scientists at the University of Washington to focus on using DNA as a data storage medium, the companies announced on Wednesday.

Yes, Microsoft is planning to store data in DNA.

The data storage density of DNA is enormously higher than conventional storage systems, as just 1 gram of DNA can store close to 1 Billion Terabytes of data.

Besides this, DNA is also remarkably robust, which means the data stored in DNA can stay intact and readable for as long as 1,000 to 10,000 years.

According to Twist, all of the digital data that exists today could be stored in less than 20 grams of DNA.

Though the technology is long away from ready for commercial products (so you will not see a DNA-powered smartphone anytime soon), the initial tests done by the company last fall demonstrated 100 percent of digital data encoded on DNA could be recovered, Microsoft Research's Doug Carmean said in the press release.

Recently, the American Chemical Society said in a statement that storing data on DNA could last up to 2,000 years without deterioration.
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.
U.S. Supreme Court allows the FBI to Hack any Computer in the World

 IN BRIEF

The US Supreme Court has approved amendments to Rule 41, which now gives judges the authority to issue search warrants, not only for computers located in their jurisdiction but also outside their jurisdiction.

Under the original Rule 41, let’s say, a New York judge can only authorize the FBI to hack into a suspect's computer in New York.

But the amended rule would now make it easier for the FBI to hack into any computer or network, literally anywhere in the world.

The Federal Bureau of Investigation (FBI) can now Hack your computers anywhere, anytime.

The FBI appeared to have been granted powers to hack any computer legally across the country, and perhaps anywhere in the world, with just a single search warrant authorized by any United States judge.

The U.S. Supreme Court approved yesterday a change in Rule 41 of the Federal Rules of Criminal Procedure that would let U.S. judges issue warrants for remote access to electronic devices outside their jurisdiction.
"These amendments will have significant consequences for Americans' privacy and the scope of the government's powers to conduct remote surveillance and searches of electronic devices," Democratic Senator Ron Wyden of Oregon said in a statementThursday.
"Under the proposed rules, the government would now be able to obtain a single warrant to access and search thousands or millions of computers at once; and the vast majority of the affected computers would belong to the victims, not the perpetrators, of cybercrime."
If Congress doesn't act, the changes to the Rule 41 will take immediate effect in December despite opposition from technology giants and civil liberties groups who believes the changes would expand the FBI's power to conduct mass hacks on computer networks.

The tech giants and civil liberties groups like the American Civil Liberties Union (ACLU) say the change also could run afoul of the American Constitution's protections against inappropriate searches and seizures.

However, while proposing the rule change in 2014, the U.S. Department of Justice described it as a small modification required to modernize the criminal code for the digital age, saying the changes wouldn't permit searches that aren't already legal.

The FBI Now Can Legally Hack TOR Users


Previously, under the Rule 41, magistrate judges could not approve search warrants to remotely hack or access computers outside their jurisdiction.

But with the rule change, magistrate judges could now issue orders to search or seize computers and electronic devices outside their local authority if the target's location is unknown or if the target is using anonymity software like TOR.

More than a Million of Internet users make use of TOR anonymity software to browse the Web just to hide their actual identity for entirely legitimate reasons, in addition to criminals who use TOR to hide their locations.

Recently, the court threw out evidence that the FBI brought by hacking the members of the child pornography site PlayPen on the TOR network using its so-called Network Investigative Technique (NIT), explaining the feds violated Rule 41's territorial restrictions.

This rule change would prevent something like that from happening, opening doors for the FBI to legally hack any computer in any country.

The Congress has time until 1 December 2016 to reject changes or make more changes to Rule 41, after which the amended version of the rule will take effect.
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.
Pro-ISIS Hackers release 'Kill List' Of 43 United States Officials

A group of pro-ISIS hackers calling themselves the United Cyber Caliphate (UCC) has issued a "Kill List" containing the names of dozens of U.S. government personnel at the Pentagon, Department of Homeland Security, State Department, and several other federal agencies.

Meanwhile, the US military’s Cyber Command has announced to launch its first attack against ISIS' digital infrastructure in an effort to disrupt the terrorist's communications and other core functions.

The announcement came earlier this week when President Barack Obama discussed the war on ISIS (Islamic State) in Hanover, Germany, where he met with world leaders and represented this new cyber initiative, according to the sources from New York Times.

On the other side, the Kill List was distributed Monday by the United Cyber Caliphate (UCC) hackers over the popular end-to-end encrypted messaging app Telegram through which the ISIS communicate with their followers and spread terror propaganda materials.

The list, initially obtained by Vocativ, features 43 names of people linked to several the United States federal departments, including the Department of Homeland Security, the State Department and the Departments of Defense, Energy, Commerce and Health and Services.

ISIS targets outside of Washington include the U.S. embassies in Santiago and Kathmandu and the Department of the Navy in Gulfport, Mississippi.

The information of each target including the phone number, city and zip code, was shared via individual photo-shopped images posted on the ISIS group on Telegram from the United Cyber Caliphate account.

The words "Wanted to be killed" were also included in the post and was written in English, Arabic, French, Spanish and Russian.
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.
Spotify Hack, Secret of Chrome OS, MIT Bug Bounty, Nanowire Batteries

1. Spotify Hacked! Change your Password ASAP


If you are one of the millions of people around the world who love to listen to music on Spotify, you may need to change your password immediately.

Has Spotify been hacked? The company says no, but some Spotify users have claimed their profiles were hijacked, and details were changed without knowledge, including passwords and email addresses

Spotify apparently suffered a security breach that leaked hundreds of Spotify accounts details, including emails, usernames, passwords and account type, which was published last week to the popular anonymous file sharing website Pastebin.

Spotify is investigating the Pastebin leaks of Spotify user information.

2. Over 1 Million Android Apps Are Coming to Chrome OS


Google is ready to integrate millions of Android applications onto its Chrome OS platform by bringing the entire Play Store to it.

Redditor 'TheWiseYoda' first spotted a new option to "Enable Android Apps to run on your Chromebook" on the developer version of Chrome OS, though the option popped up for an instant and then disappeared.

After hunting in the source code of the operating system, the Redditor discovered a couple of references to the feature that indicate the arrival of Google Play on Chrome OS.

3. MIT University Launches Bug Bounty Program


The Massachusetts Institute of Technology (MIT) launches its experimental bug bounty program this week, which aims at encouraging university students and security enthusiasts to find and responsibly report vulnerabilities in its official websites.

"As thanks for helping keep the community safe, we are offering rewards in TechCASH for the responsible disclosure of severe vulnerabilities," program website explains.

TechCASH is money that can be used for purchasing goods and services at restaurants and grocery stores around the University Cambridge area.

The MIT becomes the first academic institution to reward hackers, open only for university affiliates with valid certifications, such as undergraduate and graduate students.

4. Never Ending Nanowire Batteries — The Future Of Electronics


Researchers at the University of California at Irvine (UCI) accidentally discovered that batteries build using a Nanowire-based material, a tiny conductor, can be recharged for hundreds of thousands of times.

A typical Lithium-ion battery, used in most smartphones and laptops, expected to have charge cycles between 2000-3000.

However, this innovation could lead to vastly longer lifespans for batteries in smartphones, computers, appliances, cars and spacecraft.

In early testing of the component, this last-longing battery was recharged more than 200,000 times over a three-month span, and no loss of capacity or power was recorded.

5. Edward ‪‎Snowden‬ Sues Norway to prevent Extradition


Global Surveillance Whistleblower Edward Snowden has filed a lawsuit against the Norwegian government to ensure his travel to Oslo for picking up an award without any risk of being extradited to the United States.

Snowden has been invited to Norway to receive a Freedom of Speech Award from PEN International – the local branch of writers' group – but he is worried that he would be extradited to the United States because of the country's close diplomatic ties with the US.

6. Nearly 93.4 Million Mexican Voter Data Leaked Online


A hacker discovered over 100 gigabytes of an extensive database completely open on the Internet for anyone to download while the hacker was browsing Shodan – a search engine for servers and Internet-connected devices.

The database turned out to be a voter registration database for the country of Mexico that contained the personal information, including full names, residential addresses, and national identification numbers, of virtually all registered voters with 93.4 Million entries.
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.
Dropbox’s Project Infinite shows all company files locally but stores them remotely

Cloud file syncing and sharing software company Dropbox today is announcing the launch of Project Infinite, a new capability that will allow users to see all files that they have quick access permission for on their desktop — but that will keep everything stored on Dropbox’s cloud infrastructure, so as not to take up precious local storage.
“Everything in the company’s Dropbox that you’re given access to, whether it’s stored locally or in the cloud, will show up in Dropbox on your desktop. If it’s synced locally, you’ll see the familiar green checkmark, while everything else will have a new cloud icon,” Dropbox product manager Genevieve Sheehan wrote in a blog post.
The feature shows metadata for files in folders in the Finder on OS X and the File Explorer in Windows. If you have a file that’s stored remotely that you want to store locally, you can right-click on it and select “Save local copy.”
The announcement of the feature for Dropbox Business customers follows Google’s announcement last week that users can now select which specific subfolders to keep in sync on their local desktop computers.

Box and Microsoft’s OneDrive services don’t currently offer anything along the lines of what Project Infinite can do.
“Sponsor customers” have started using the feature, Sheehan wrote, but Dropbox isn’t saying when it will become available to all organizations paying for Dropbox Business. And it’s not clear if non-paying users will ever get access to the feature.
Dropbox said last month that it had 500 million users; in November the company said it had 150,000 paying business customers.
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.
Enjoy Unlimited Browsing On Your MTN Sim Card

Good news, we are here to launch another latest and hottest unlimited MTN free browsing.

This cheat works on all phones including Android, Blackberry, Windows, Java, Symbian, iOS(iPhone & ipad) and Modem (PC)




This cheat doesn't require any tunnel or vpn like Psiphon, Tweakware, HTTP injector, or Simple Android Server. All you need to do, is to follow steps below and enjoy free internet browsing.

Firstly, dial *460*6# on your MTN Sim and credit you invisible 100MB.

You will get this message;

Dear customer, your MTN Yello life plus service has been activated. Spend a minimum of N300 weekly and get 7days life insurance. For help call 08031021600

After this message, you are good to go, On your internet or data connection and start browsing free. This trick attached 100mb

In case it stop browsing, after you have exhausted or use upto 100Mb.

The following are the two simple steps to continue browsing.

» Text BT to 131

» After that dial *460*6#

Now, you are back on track..

All you need to do, is to repeat these steps after 100Mb (Opt in and Opt Out)

Note: It is advisable not to use your main MTN sim or Hot line, because, it will change your tariff plan.


For any question or complain drop your message at Post Comment box and we will reply within short period of time.

Don't forget to share this post with your friends and families by clicking share button or our social media icons (facebook, twitter, instagram, whatsapp etc)
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.
How Did Hackers Who Stole $81 Million from Bangladesh Bank Go Undetected?

Investigators from British defense contractor BAE Systems discovered that hackers who stole $81 million from the Bangladesh Central Bank actually hacked into software from SWIFT financial platform, a key part of the global financial system.

The hackers used a custom-made malware to hide evidence and go undetected by erasing records of illicit transfers with the help of compromised SWIFT system.

The Bangladesh Bank hackers, who managed to steal $81 Million from the bank last month in one of the largest bank heists in history, actually made their tracks clear after hacking into SWIFT, the heart of the global financial system.

SWIFT, stands for the Society for Worldwide Interbank Financial Telecommunications, is a global messaging network used for most international money and security transfers.

More than 11,000 Global Banks on HIGH ALERT!

Nearly 11,000 Banks and other financial institutions around the World use SWIFT system to send securely and receive payment instructions through a standardized system of codes.

Recently, Bangladesh police investigators uncovered evidence revealing that the Bank was using second-hand $10 network switches without a Firewall to run its network, which offered hackers access to the bank’s entire infrastructure, including the SWIFT servers.

Now, researchers from British defense contractor BAE Systems reported Monday that the Bangladesh Bank hackers used a piece of sophisticated, custom-made malware to manipulate logs and erase the history of the fraudulent transactions, which even prevent printers from printing the fraudulent transactions.

The malware also has the capability to intercept and destroy incoming messages confirming the money transfers. These malware capabilities prevented hackers to remain undetected.
"This malware appears to be just part of a wider attack toolkit and would have been used to cover the attackers' tracks as they sent forged payment instructions to make the transfers," security researcher Sergei Shevchenko wrote in a blog post.

When and How Did They Get Detected?

The hackers had attempted to steal $951 Million in total from Bangladesh central bank account at the Federal Reserve Bank of New York using fraudulent transactions, but a simple typo (spell error) by hackers halted the further transfers of the $850 Million funds.

The BAE researchers believe the malware used to target Alliance Access, a piece of software that allows banks to connect to the SWIFT network.

According to SWIFT's official website, Alliance Access has more than 2,000 installations worldwide. So even though the SWIFT financial system is used by around 11,000 banks and financial institutions, all of them are not affected by the notorious malware.
"By modifying the local instance of SWIFT Alliance Access software, the malware grants itself the ability to execute database transactions within the victim network," Shevchenko said.

SWIFT To Issue Emergency Security Update

Meanwhile, Brussels-based SWIFT confirmed to Reuters that the company was aware of the nasty malware used to target its client software and that it would roll out a security software update on Monday to fix the issue, along with a special warning to financial institutions.

SWIFT Spokeswoman Natasha Deteran said the software update was intended "to assist customers in enhancing their security and to spot inconsistencies in their local database records."
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.
HOW TO UPGRADE TECNO CAMON C8 TO ANDROID 6.0 MARSHMALLOW OS

Tecno Camon C8 customers, I know you have been expecting this upgrade for a drawn out stretch of time, Android 6.0 Marshmallow finally connected for your contraption. It is the perfect open door for you to flex with the new Google OS Android 6.0 Marshmallow on your Camon C8. 

There are two procedure for upgrading your Tecno Camon C8 to Android 6.0 Marshmallow, either through SD card or using SP Flash gadget yet I'm basically going to give SD card technique and later give SP Flash instrument system to the people who don't know how to.

Items Required;

  • Make sure your phone is not yet rooted.
Steps To Upgrade Tecno C8 To Android 6.0 Marshmallow Via TF Card
  • Place Tcard_update_20160415 on your SD Card (DO NOT PUT IN INSIDE ANY FOLDER)
  • Switch off your Tecno Camon C8
  • Hold Power Button + Volume Up until you see the startup logo then release the Power Button Only after which you’ll see the Android logo.
HOW TO UPGRADE TECNO CAMON C8 TO ANDROID 6.0 MARSHMALLOW OS

  • Hold the Power Button for 2 seconds and then press Volume Up button without releasing the power button until you see the below image.

HOW TO UPGRADE TECNO CAMON C8 TO ANDROID 6.0 MARSHMALLOW OS

  • Use Volume Down to navigate to Apply update from sdcard then press the Power Button to select
  • You will enter a new interface as shown below.
  • Use the Volume Down to navigate to Tcard_update_20160415 then select it with the Power Button
  • The installation will begin and when it is done you will see the interface as seen below.

HOW TO UPGRADE TECNO CAMON C8 TO ANDROID 6.0 MARSHMALLOW OS

  • Select Reboot system now
Wait for your device to reboot and Android 6.0 Marshmallow will be installed. 
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.
​DARPA Wants To Build Ultra Secure Messaging App for US Military

Just last month, DARPA launched a project dubbed "Improv," inviting hackers to transform simple household appliances into deadly weapons.

Now, the Defense Advanced Research Projects Agency is finding someone in the private sector to develop a hacker-proof "secure messaging and transaction platform" for the U.S. military.

Darpa wants researchers to create a secure messaging and transaction platform that should be accessible via the web browser or standalone native application.

The secure messaging app should "separate the message creation, from the transfer (transport) and reception of the message using a decentralized messaging backbone to allow anyone anywhere the ability to send a secure message or conduct other transactions across multiple channels traceable in a decentralized ledger," agency's notice explains.

In simple words, DARPA aims to create a secure messaging service that not only implements the standard encryption and security mechanisms used by other secure messaging apps like SignalRicochet, and Whatsapp but also communicates via a secure decentralized protocol like Blockchain to prevent cyber attacks and surveillance.

The secure messaging app will be developed in three phases:
  • First Phase: Create a model for an existing decentralized blockchain-like platform and experiment with encryption protocols and hardware options.
  • Second Phase: Develop and test the "working prototype."
  • Third Phase: commercialize and full-scale implementation of the platform.

During the first round, the DARPA will award $150,000 per year to the successful applicants. The phase one candidates can then be eligible for a second round award of up to $1 Million for two years.

During the final and third phase, the selected candidates can then pursue commercialization and full-scale implementation of their platform, without receiving any fund from the federal government.

The solicitation will officially open on May 23, 2016 and will close on June 22, 2016.
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.
Bank with No Firewall. That's How Hackers Managed to Steal $80 Million

Investigators from the Forensic Training Institute of the Bangladesh investigated the $80 Million bank heist and discovered that the hackers managed to gain access to the network because the Bank was using second-hand $10 network switches without a Firewall to run its network.

When it was reported last month that an unknown hacking group attempted to steal $1 Billion from Bangladesh's Federal Reserve bank account with the help of a malware and, in fact, successfully stole over $80 Million, the investigators would not say how the hackers managed to bypass the security solutions on its network.

But in reality, there was no security solution installed to help protect against increasingly sophisticated attacks.

This lack of security practices made it incredibly easier for the hackers to break into the system and steal $81 Million, though a simple typo (spell error) by hackers halted the further transfers of the $850 Million funds.

The network computers that were linked through the second-hand routers were connected to the SWIFT global payment network, allowing hackers to gain access to the credentials required to make high-value transfers straight into their own accounts.
"It could be difficult to hack if there was a firewall," forensic investigator Mohammad Shah Alam told Reuters.
Firewall are meant to help keep out malicious hackers and malware from doing nasty things.

Bank with No Firewall. That's How Hackers Managed to Steal $80 Million

Moreover, the use of cheap routers made it difficult for investigators to pinpoint the hackers behind the largest bank heist and figure out the hackers tactics, Alam added.
The investigator blamed both the bank as well as SWIFT, saying "It was their responsibility to point it out, but we have not found any evidence that they advised before the heist."
Hackers broke into the bank's systems and tried to steal $1 Billion from its account at the Federal Reserve Bank of New York in early February and then transferred large sums to fraudulent accounts based in the Philippines and Sri Lanka.

Bangladesh police have identified 20 foreigners involved in the heist but the police said the people appear to be those who received some of the payments rather than the hackers who initially stole the money.

Though the investigators are still scratching their heads to identify the hackers with no clue, the incident is a good reminder for financial institutions across the global to tighten up the security of their systems.
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.
Hacker Installed a Secret Backdoor On Facebook Server to Steal Passwords

How to Hack Facebook?

That’s the most commonly asked question during this decade.

It’s a hacker dream to hack Facebook website for earning bug bounty or for any malicious purpose.

Facebook security team recently found that someone, probably a blackhat hacker with malicious intent, has breached into its server and installed a backdoor that was configured to steal Facebook employees' login credentials.

Since the backdoor discovered in the Facebook’s corporate server, not on its main server, Facebook user accounts are not affected by this incident.

Though the company would have never known about the backdoor if a whitehat hacker had never spotted the backdoor script while hunting for vulnerabilities.

Security researcher Orange Tsai of Taiwanese security vendor Devco accidentally came across a backdoor script on one of Facebook’s corporate servers while finding bugs to earn cash reward from Facebook.

Tsai scanned Facebook's IP address space that led him to the files.fb.com domain that was hosting a vulnerable version of theSecure File Transfer application (FTA) made by Accellion and was used by Facebook employees for file sharing and collaboration.

Tsai analyzed the vulnerable FTA and discovered seven security flaws as he explained in his blog post:

  • 3 Cross-site scripting (XSS) flaws,
  • 2 Remote code execution flaws,
  • 2 Local privilege escalation issues.
Hacker Installed a Secret Backdoor On Facebook Server to Steal Passwords

Hacker Installed a Secret Backdoor On Facebook Server to Steal Passwords

The researcher then used the vulnerabilities he found in the Accellion Secure FTA and gained access to Facebook's server.

After successfully achieving his goal, Tsai started analyzing logs information available on the Facebook’s server for preparing his bug report, and that is exactly when he spotted a PHP-based backdoor, popularly known as a PHP Web shell, that had possibly been installed on the server by a malicious hacker.

Tsai then reported all of his findings to the Facebook security team, which rewarded him with $10,000 (€8,850) for his efforts and started its own forensics investigation that was completed this month, allowing the researcher to disclose the vulnerabilities responsibly.