Home Blog Page 394

Google Announced A New Project To Provide High-Speed Public Wi-Fi In 400 Train Stations Across India

modi-sundar

The railroad in India are known as ” The Lifeline to the Nation ”  is soon going to become Wi-Fi line of the Nation. In a blogpost Google announced that as the part of  Digital India initiative Google is going to provide high-speed public Wi-Fi connectivity in 400 train stations across India by the end of 2016.

At first [p2p type=”post_tag” value=”google” attributes=”target=’_blank'”]Google[/p2p] is planning to put to high-speed Wi-Fi connectivity in 100 of the country’s busiest stations by the end of 2016, and it hopes to eventually bring connectivity to 400 stations in total. Those 100 initial stations serve over 10 million riders a day, according to the search company.The initiative, which will be accomplished together with Indian Railways and provider RailTel, was announced yesterday during an event at Google’s Mountain View campus with Indian Prime Minister Narendra Modi. He’s been visiting influential Silicon Valley companies, including Facebook, over the past few days.

Also See : [p2p type=”slug” value=”pakistani-websites-got-hacked-by-indian-hackers” attributes=”target=’_blank'”]More Than 50 Pakistani Websites Got Hacked By Indian Hackers As A Revenge For Hacking Kerala Govt. Website[/p2p]

india railway wi-fi connectivity
This map shows the first 100 stations that will have high-speed Wi-Fi by the end of 2016 | Image : Google

After China, India have more Internet users. And this project will be will make Wi-Fi available for the more than 10 million people who pass through every day. This will rank it as the largest public Wi-Fi project in India, and among the largest in the world, by number of potential users. It will also be fast—many times faster than what most people in India have access to today, allowing travelers to stream a high definition video while they’re waiting, research their destination, or download some videos, a book or a new game for the journey ahead. Best of all, the service will be free to start, with the long-term goal of making it self-sustainable to allow for expansion to more stations and other places, with RailTel and more partners, in the future.

Also See : [p2p type=”slug” value=”indian-it-firms-are-one-of-the-top-10-worst-paymasters-in-the-world” attributes=”target=’_blank'”]Indian IT Firms Are One Of The Top 10 Worst Paymasters In The World[/p2p]

Other than this Google also provide many service to access internet is more smarty and affordable way, last year they launched Android One smartphones . To help address the challenges of limited bandwidth, Google recently launched a feature that makes mobile webpages load faster and with less data, and also YouTube available offline with offline Maps coming soon. And for those who don’t speak English, they launched the Indian Language Internet Alliance last year to foster more local language content, and have built greater local language support into our products—including Hindi Voice Search, an improved Hindi keyboard and support for seven Indian languages with the latest versions of Android.

Since Digital India initiative is really trending in social networks in last two days. Yesterday Facebook CEO Mark Zuckerberg show his support to Digital India by changing his profile picture.

mark zuckerberg digital india

Also See : [p2p type=”slug” value=”indian-scientists-developed-a-new-algorithm-to-prevent-cybercrime” attributes=”target=’_blank'”]Indian Scientists Developed A New Algorithm To Prevent Cybercrime[/p2p]

Google Celebrates Its 17th Birthday – A Little Flashback

google birthday google doodle

Google is celebrating its 17th birthday today by posting an animated doodle on its homepage which reminds back to the web of the 1990s. The 17th birthday Google Doodle will appear in almost every country in the world, according to the Doodle blog.

The image, featuring a retro, plastic PC, lava lamp and even 1998’s “Google!” Logo, features on Google’s homepage on September 27, which the internet giant has retroactively chosen as its birthday. And Google explained why its birthday logo reminds 1990’s in a Doodle blog post.

Also See : [p2p type=”slug” value=”india-probes-google-for-abusing-search-dominance” attributes=”target=’_blank'”]Indian Authorities Probes Google For Abusing Search Dominance In Search Advertising[/p2p]

“In the world of computer programming, 17 is widely considered the least random number. To assume we made it this far without a little luck, though, would be like assuming lava lamps, turtlenecks, and servers held together by building blocks are harbingers of success. For our 17th birthday, we offer a glimpse into our humble beginnings, when branded hockey jerseys were cool and Savage Garden had a number-one single.”

Google has celebrated its birthday with a Doodle every year since its fourth birthday in 2002. However, the first Doodle, for the Burning Man festival in 1998, actually occurred before the company was technically founded. Let’s see some flashbacks,

google birthday google doodle
First Doodle, August 30th 1998, Google logo combined with the Burning Man festival graphic
google birthday google doodle
First animated Doodle, January 4th 2010, Google’s first animated logo comemmorated the birth anniversary of Sir Isaac Newton
google birthday google doodle
First interactive Doodle, May 21st 2010, Google’s celebration of Pac Man’s birth was so wildly popular that the interactive logo was given its own permanent page

Also See : [p2p type=”slug” value=”cortana-embarrassed-microsoft-ceo-satya-nadella” attributes=”target=’_blank'”]Cortana Embarrassed Microsoft CEO Satya Nadella During Live Keynote Presentation[/p2p]

Here is the some Doodles that Google created for its birthday in past years,

Google's 4th birthday doodle
Google’s 4th birthday doodle
Google's 8th birthday doodle
Google’s 8th birthday doodle
Google's 9th birthday doodle
Google’s 9th birthday doodle
Google's 10th birthday doodle
Google’s 10th birthday doodle
Google's 11th birthday doodle
Google’s 11th birthday doodle
Google's 12th birthday doodle
Google’s 12th birthday doodle
Google's 13th birthday doodle
Google’s 13th birthday doodle
Google's 14th birthday doodle
Google’s 14th birthday doodle
Google's 15th birthday doodle
Google’s 15th birthday doodle
Google's 16th birthday doodle
Google’s 16th birthday doodle

The funny part is Google seems to really unknown when it was formed, because it has celebrated its birthday on September 27, but the year before that, had it as September 26. In 2004, its 6th birthday Doodle went online on September 7 and in the year before that, it was September 8. In fact, none of these dates seem to have any particular relevance. The company’s history has its incorporation date in 1998 – the nearest thing to a corporate birthday – as September 4.

Also See : [p2p type=”slug” value=”microsoft-loves-linux-microsoft-developed-a-linux-based-operating-system” attributes=”target=’_blank'”]Microsoft Loves Linux : Microsoft Developed A Linux-Based Operating System[/p2p]

Express Your Every Mood With This Crazy 1000-Key Emoji Keyboard

emoji keyboard

We have come across some crazy stuff, but this one is definitely at the top end of the crazy spectrum. A YouTuber named Tom Scott has built a 1,000-key keyboard with each key representing an emoji!

Use of emojis has increased a lot lately in almost all interactions on the web – be it comments or text messages or instant messages or even in tweets – and what could be a better way to get to your emojis directly without having to swipe through different emoji panels? A keyboard with a key marked for each of the top 1,000 emojis in use.

Also See : [p2p type=”slug” value=”how-to-download-instagram-images-and-videos” attributes=”target=’_blank'”]How To Download Instagram Images And Videos Within A Minute[/p2p]

Scott made the emoji keyboard using 14 keyboards and over 1,000 individually placed stickers. While he himself admits that it is one of the craziest things he has built, the work he has put in does warrant appreciation. On the keyboard are individually placed emojis for food items, animals, plants, transport, national flags, and time among others.

The YouTuber has incorporated all emojis from Unicode 8, but has left out the ones proposed in Unicode 9. The keyboard also includes those emojis that have arrived with Apple iOS 9.1 update. Though the emojis will be hard to find, Scott has tried to ease up that bit by categorizing similar emojis on one keyboard making it a little easier for him to find the apt one.

Also See : [p2p type=”slug” value=”how-to-undo-a-send-email-in-gmail” attributes=”target=’_blank'”]How To Undo A Send Email In Gmail[/p2p]

We believe that Scott’s invention is just a part of his desire to build things and that he will not be commercializing the invention. Even if he does, buyers would need a lot of space to actually arrange them before they can start typing away emojis.

Also See :[p2p type=”slug” value=”how-to-make-your-computer-greet-you-and-tell-you-the-time-on-startup” attributes=”target=’_blank'”] How To Make Your Computer Greet You and Tell You The Time On Startup[/p2p]

In 2015, Taking Selfies Are More Dangerous Than Shark Attack

taking selfies

Selfies most trending word, its every where. But in 2015 more people died while taking selfies than shark attack. Mashable is reporting that 12 people have died while taking selfies while only 8 people have been killed by sharks. In comparison, according to the Shark Attack Survivors website, which aims to note all shark attack incidents around the world, lists eight shark attack-related deaths

Yes it’s not a joke, Back in July, it was estimated that there has been up to 10 deaths and over 100 injuries related to people taking selfies. The latest death occurred when a 68-year-old Japanese tourist fell down some stairs at the Taj Mahal while attempting to take a selfie.

Also See : [p2p type=”slug” value=”microsoft-loves-linux-microsoft-developed-a-linux-based-operating-system” attributes=”target=’_blank'”]Microsoft Loves Linux : Microsoft Developed A Linux-Based Operating System[/p2p]

russian selfie rules
Images produced by the Russian interior ministry as part of its safe selfie campaign.

Selfies have become such a hazard in Russia the government has launched a “Safe Selfie” campaign.The Russian government to put together a set of rules that show how a person can pose for the perfect selfie without endangering themselves.

Most of the people involved were between 18 and 22 years old and most of the selfie-related deaths have been due to falling, trying to take a selfie, and they’re hit by a moving vehicle, while posing with guns etc.

So its the only thing we like to say, next time while you are taking selfies be mindful of your surroundings and not don’t put yourself in harms way.

Also See : [p2p type=”slug” value=”worst-nightmares-for-a-coder” attributes=”target=’_blank'”]10 Worst Nightmares For A Coder[/p2p]

One Million U.S. Dollars Bounty To Hackers Who Can Breach Apple’s Latest iOS 9

iOS 9

A cyber security firm, Zerodium in Tuesday made an offer to all hackers around the world. That the company will pay One million U.S. dollars bounty to hackers who can find a way to breach Apple’s latest[p2p type=”post_tag” value=”ios-9″ attributes=”target=’_blank'”] iOS 9[/p2p] mobile operating system.

This is the biggest bounty ever publicly offered for a single such exploit. One million U.S. dollars ($1,000,000.00) to each individual or team who gives the company a hacking technique that can take over an iOS device remotely, via a web page the victim visits, a vulnerable app on the victim’s device, or by text message. The company says it’s willing to pay the bounty multiple times, though it may cap the payouts at $3 million. The program is open until October 31st, 2015 at 6:00 p.m. EDT, and may be terminated prior to its expiration if the total payout to researchers reaches three million U.S. dollars ($3,000,000.00).

Also Read : [p2p type=”slug” value=”virus-in-candy-crush-and-other-popular-games-attacking-android-users” attributes=”target=’_blank'”]Virus In Candy Crush And Other Popular Games Attacking Android Users[/p2p]

Zerodium also listed some conditions for valid submissions. Eligible submissions must include a full chain of unknown, unpublished, and unreported vulnerabilities/exploits (aka zero-days) which are combined to bypass all iOS 9 exploit mitigations including: ASLR, sandboxes, rootless, code signing, and bootchain.

And also  The whole exploitation/jailbreak process should be achievable remotely, reliably, silently, and without requiring any user interaction except visiting a web page or reading a SMS/MMS .

Also Read : [p2p type=”slug” value=”major-malware-attack-in-apple-app-store” attributes=”target=’_blank'”]Major Malware Attack In Apple’s App Store[/p2p]

And mainly  Partial or incomplete exploits/jailbreaks will not be eligible for the Million Dollar iOS 9 Bug Bounty. All submissions must be made exclusively to Zerodium and must include the fully functioning exploit and its source code and a detailed whitepaper describing all the zero-day vulnerabilities and techniques used in the jailbreak.

Zerodium’s unprecedented bounty may show just how difficult it’s become to penetrate Apple’s increasing layers of security. But with a million dollars on the table, expect a new wave of hackers to try.

Also Read : [p2p type=”slug” value=”apple-airdrop-vulnerability-allows-hackers-to-install-malware” attributes=”target=’_blank'”]A Critical Apple AirDrop Vulnerability Allows Hackers To Install Malware Silently In Apple iOS and OSX[/p2p]

Virus In Candy Crush And Other Popular Games Attacking Android Users

candy crush

A bad new for all Android gamers of India, a virus bundled with popular games such as Candy Crush is reportedly attacking large number of users in India and stealing personal data, according to a report by IT security firm ESET. Yes, hackers have managed to break into the free game market and exploit players for money by inserting a virus called Mapin into otherwise non-malicous packages.

The backdoor Trojan was able to sneak in Google Play and several alternative Android markets multiple times as one of the following popular games: Plants vs zombies, Plants vs Zombies 2, Subway Suffers, Traffic Racer, Temple Run 2 Zombies, Super Hero Adventure, Candy Crush, Jewel Crush, Racing Rivals and others. The malware was uploaded to Google Play on November 24-30, 2013 and November 22, 2014.

Also See : [p2p type=”slug” value=”major-malware-attack-in-apple-app-store” attributes=”target=’_blank'”]Major Malware Attack In Apple’s App Store[/p2p]

People affected by this virus, named ‘Android/Mapin’ by ESET, include those who downloaded games such as Candy crush or Jewel crush, Hill climb racing the game, Plants vs zombies 2, Subway suffers, Traffic Racer, Temple Run 2 Zombies, and Super Hero Adventure by the developers TopGame24h, TopGameHit and SHSH from the official Google Play store between November 24-30, 2013 and November 22, 2014.

The virus pretends to be a Google Play Update or an app named Manage Settings and takes 2-3 days to get activated after being downloaded, which prevents detection from Google’s Bouncer malware prevention system, according to ESET.

“Some variants of Android/Mapin takes minimum of three days to achieve full Trojan functionality. It may also be one of the reasons why the TrojanDownloader was able to evade Google’s Bouncer malware prevention system,“ — says Lukáš Štefanko, Malware Researcher at ESET.

Also See : [p2p type=”slug” value=”ransomware-porn-app-attacking-android-users” attributes=”target=’_blank'”]Ransomware In The Form Of A Fake Porn App Attacking Android Users[/p2p]

According to MIXRANK, a display ad intelligence company, Plants vs zombies 2 had over 10,000 downloads before it was pulled. On the same dates System optimizer, Zombie Tsunami, tom cat talk, Super Hero adventure, Classic brick game and the applications mentioned earlier from Google Play Store, packaged with same backdoor, were uploaded to several alternative Android markets by the same developers.

Naturally the thing is difficult to remove and will resist your efforts in that direction. The advice is to tread carefully when it comes to downloading things, the conclusion, at least from ESET, is that Google’s bouncers just aren’t doing their job. The security outfit suggested that operations like this one are behind Google’s recent decision to apply more scrutiny to applications presented to its Play Store.

Also See : [p2p type=”slug” value=”indian-scientists-developed-a-new-algorithm-to-prevent-cybercrime” attributes=”target=’_blank'”]Indian Scientists Developed A New Algorithm To Prevent Cybercrime[/p2p]

According to ESET, ” The Trojan was successfully uploaded to the Google Play Store, probably because Bouncer hadn’t implemented all the relevant malware triggers, in this case for emulating a change of network connectivity. “.

“The popularity of Android in India makes it an attractive target for cyber criminals. The fact that users in India were the most affected by Dropper Mapin Trojan that is well detected by our anti-malware solution, leads us to think that users in India are still unaware about basic security practices when it comes to smartphones,”  — said Zakir Hussain, Head of ESS Distribution, Exclusive distributors of ESET products in India.

Although the number of users having solid anti-malware apps installed on their smartphones and tablets is growing in India, the number of malware created for smartphones is growing at a much faster pace. All these infected games are still available for download from Android market places other than Google Play and have been downloaded thousands of times, ESET said.

Also See : [p2p type=”slug” value=”major-security-flaw-in-android-lollipop-smartphone” attributes=”target=’_blank'”]Major Security Flaw In Android Lollipop Allows Anyone To Unlock Your Smartphone[/p2p]

Pakistani Researchers Developed Solar-Powered Emergency Mobile Network

rescue base station

Pakistani researchers have developed a portable, solar-powered mobile phone network for using as a communication medium during  in disasters like floods and earthquakes when regular communications are often disrupted.

The prototype is codenamed as “ Rescue Base Station (RBS) ” and is developed by the joint efforts of researchers at the Information Technology University (ITU) in Lahore and a team from the University of California for Pakistan – the country’s first every emergency telecom system to work on normal mobile phone devices.

“When the RBS is installed in a disaster-struck area, people automatically start receiving its signals on their mobile phones. They can manually choose it and then call, send messages and even browse (internet) data free of charge,” — said Umar Saif, ITU vice chancellor and an adviser to the project.

Also See : [p2p type=”slug” value=”pentagon-to-develop-scorecard-system-to-stay-away-from-hackers” attributes=”target=’_blank'”]Pentagon To Develop A New System Called Scorecard To Stay One-Step Ahead Of The Hackers[/p2p]

The RBS is a lightweight, compact rectangular box fitted with an antenna, a signal amplifier and a battery, which can be carried easily and even dropped by helicopter in hard-to-reach disaster zones. It has a solar panel to charge the battery, to keep it working in places without electric power.The RBS, which operates using open source software, offers all the features provided by regular cellphone companies.And the main features of Rescue Base Stations are:

  • 2.5G cellular services – It offers 2.5G cellular services, which enables Call/SMS and limited local GPRS connectivity.
  • Emergency Message Alerts – It allows Emergency SMS broadcast to the registered users within the range of an RBS.
  • Supports Eventual Consistency – It can synchronize registration and call record data across disconnected RBS(s).
  • Scalability – It allows dynamic addition and removal of new RBS nodes to and from the RBS network.
  • Emergency Voice-mail Service – A user can voice record his/her complaint by calling at Ext# 1122. All the recorded messages are available to the rescue teams
  • Attribute Based Search – It allows attribute based search through SMS. A user can search for the contact details on attributes like name, occupation and blood group.For e.g. search blood o+ or search name ibrahim
  • Direct Dialing Extensions – It allows callers to connect to rescue workers by directly dialing short codes. The dial codes serially calls a list of rescue workers belonging to a specific service group e.g. Ext# 7777 for Doctors, Ext#7700 for police, Ext#7722 for fire fighters etc.
  • Intelligent call Routing – It help connects people through calls (conventionally) or otherwise it intelligently routes calls with respect to connectivity rules e.g. call callee’s most recent caller, call someone so shares callee’s occupation or location etc.

Also See : [p2p type=”slug” value=”irobot-launching-vacuum-cleaner-that-can-actually-see” attributes=”target=’_blank'”]iRobot is Launching A Vacuum Cleaner That Can Actually See[/p2p]

The RBS has yet to be deployed on the ground, but the ITU expects it to be used in the next six to eight months in partnership with the National Disaster Management Authority and a local telecoms company.

Syed Ibrahim Ghaznavi,Lead Researcher at NEWT, Information Technology Univ. said that it costs around $6,000 to develop an RBS, and the Pakistan prototype has been funded by a Google Faculty Research Award.The RBS team is now working with Endaga, a U.S.-based company that connects rural communities through small-scale independent cellular networks, and a local telecoms firm to commercialise the project, he added.The aim of the collaboration is to help phone companies keep their communications systems functioning in a disaster until their regular networks are restored.

Also See : [p2p type=”slug” value=”indian-government-to-replace-microsoft-windows-with-boss” attributes=”target=’_blank'”]Indian Government To Replace Microsoft Windows With Its Own Operating System BOSS[/p2p]

The International Federation of Red Cross and Red Crescent Societies developed a customised communications system called the Trilogy Emergency Response Application (TERA) in Haiti when it was struck by a massive earthquake in 2010.But that system could only send text messages to its subscribers on their mobile phones, unlike the RBS which allows users to call, send texts and even browse the web for free.

Lets hope cutting-edge technologies like the RBS could help save more lives by delivering timely advice to disaster-hit people,  especially in remote rural areas of where natural disasters regularly disrupt poor communications systems.

Also See : [p2p type=”slug” value=”indian-scientists-developed-a-new-algorithm-to-prevent-cybercrime” attributes=”target=’_blank'”]Indian Scientists Developed A New Algorithm To Prevent Cybercrime[/p2p]

Major Malware Attack In Apple’s App Store

malware attack in apple app store

One of the major mode of attack that tech world facings today are malware attack. Recently the [p2p type=”post_tag” value=”apple” attributes=”target=’_blank'”]Apple Inc.[/p2p] reported that their iOS App Store was hitten by first large scale malware attack.And Apple has taken necessary steps to remove malicious iPhone and iPad programs identified in malware attack.

Also See :[p2p type=”slug” value=”announced-iphone-6s-and-iphone-6s-plus-along-with-some-other-surprises” attributes=”target=’_blank'”] Next Generation Iphones, Iphone 6S And Iphone 6S Plus Along With Some Other Surprises[/p2p]

The company disclosed the effort after several cyber security firms reported finding a malicious program dubbed XcodeGhost that was embedded in hundreds of legitimate apps.The hackers embedded the malicious code in these [p2p type=”category” value=”applications” attributes=”target=’_blank'”]apps[/p2p] by convincing developers of legitimate software to use a tainted, counterfeit version of Apple’s software for creating iOS and Mac apps, which is known as Xcode, Apple said.

“We’ve removed the apps from the App Store that we know have been created with this counterfeit software,” Apple spokesperson Christine Monaghan told Reuters. “We are working with the developers to make sure they’re using the proper version of Xcode to rebuild their apps.”

Also See : [p2p type=”slug” value=”iphone-6s-come-with-a-very-low-battery-capacity” attributes=”target=’_blank'”]Most Advanced iPhone Comes With A Very Low Battery Capacity[/p2p]

It is the first reported case of large numbers of malicious software programs making their way past Apple’s stringent app review process. Prior to this attack, a total of just five malicious apps had ever been found in the App Store, according to cyber security firm Palo Alto Networks Inc.The infected applications include many used by iPhone and iPad owners in China such as Tencent’s hugely popular WeChat app, car-hailing app Didi Kuaidi and a music app from Internet portal NetEase Inc.

Earlier this month, login names and passwords for more than 225,000 Apple accounts were stolen by cyber-thieves in China.There’s no evidence that any data theft has occurred yet, but XcodeGhost is worrying because it shows how legitimate developers can be used as a vector for malicious software, bypassing Apple’s stringent app review process. And it will be sure that Apple Inc. is going to strengthen their malware detection method to stay away from similar incident.

Also See : [p2p type=”slug” value=”apple-airdrop-vulnerability-allows-hackers-to-install-malware” attributes=”target=’_blank'”]A Critical Apple AirDrop Vulnerability Allows Hackers To Install Malware Silently In Apple iOS and OSX[/p2p]