Welcome to my blog

Samsung Galaxy S3 GT-I9300 to Android 5.0 Lollipop Update...

There have been lots of custom ROMs for the Samsung Galaxy S3 based on Google’s latest version of Android, 5.0 Lollipop. A majority devices like the S3, Xperia and Nexus have received 5.0 Lollipop builds. However, it seems that the Samsung Galaxy S3 is getting a lot of love when it comes to Android 5.0 Lollipop ROMs.  I have just given the update procedures for Samsung Galaxy S3 mobile phone to make fully Android Lollipop 5.0.2 upgrade on it. First of all, I would like to mention NamelessROM. The NamelessROM is much better than previous ROMs that we have already covered. WiFi, Bluetooth, mobile data, phone calls and RIL work without any problems. Most importantly, NamelessROM supports Google apps (Gapps). So you can enjoy all the Google apps on your Samsung Galaxy S3 with Android 5.0 Lollipop. Some of the apps installed are Gmail, Google+, YouTube, Play Store and more. Let us see the requirements for that; Download appropriate NamelessROM version from http://sourceforge.net/projects/namelessrom/files/n-2.0/i9300/ Download Lollipop Google Apps file from https://s.basketbuild.com/filedl/gapps?dl=gapps-lp-20141109-signed.zip Download Custom Recovery On Galaxy S3 (CWM, PhilZ, TWRP) from https://goo.im/devs/philz_touch/CWM_Advanced_Edition/i9300/. I downloaded the latest version and installed it in this article. (philz_touch_6.48.4-i9300.tar.md5) Download stable version of ODIN program from http://www.samsungodindownload.com/. Copy NamelessROM and Gapps files into your phone...

Is Bio hacking a security risk? The future is now!...

Bio hacking – technology and humans have never been so close, they complement each other. But what are the security and privacy risks? IS BIOHACKING A SECURITY RISK? Imagine a world where our day to day activities like door locking, supermarket purchases, credit card swipes and smartphone usage are replaced by just one chip embedded under your skin. We are upgrading the human bodies to meet the technological needs. The future is expected to be completely technology dependent with very little human interruptions. Humans have been implanting technologies in their bodies for medical reasons like the adoption of implantable aids such as pacemakers, insulin pumps, deep brain stimulation system, the world is already filling with humans who could be considered part machines. BioHacking A practice of engaging biology with the hacker ethics. It is a wide spectrum of practices and movements ranging from designing and installing Do-It-Yourself body-enhancements such as chip implants. The term applies to any advanced technique that uses science and technology to improve human output and performance. To many, biohacking is a highly radical, unregulated science. Early Experiments in BioHacking: Kevin Warwick, Deputy Vice-Chancellor University(Research) at Coventry University, UK, conducted multiple experiments on himself. In 1998, he implanted a chip into his forearm to communicate with...

SplashData published the list of Worst passwords of 2014...

SplashData has published its annual report on the used of passwords that includes the list of the Worst passwords of 2014. Here we are to analyze the annual study published by SplashData, titled “123456” Maintains the Top Spot on SplashData’s Annual “Worst Passwords” List“, on the use of the passwords. Which are the most common passwords used by the users? Despite numerous suggestions, do users use strong passwords? SplashData has analyzed more than 3.3 million passwords leaked in 2014 which were publicly released, the researchers revealed the top 25 most common passwords. “The 2014 list of worst passwords demonstrates the importance of keeping names, simple numeric patterns, sports and swear words out of your passwords.” states the report. The top 25 most common passwords represent 2.2% (72600 passwords) of the overall leaked passwords analyzed by the study. Comparing the data with results of previous reports issued by SplashData, it is possible to note that only 2.2 percent of passwords now come from that list, this represent a significant decline in the use of weak passwords. “The bad news from my research is that this year’s most commonly used passwords are pretty consistent with prior years,” said Mark Burnett, author of “Perfect Passwords” (http://www.xato.net). “The good news is that it appears that more...

25 billion Cyber Attacks hit systems in Japan during 2014...

The National Institute of Information and Communications Technology revealed that more than 25 billion cyber attacks hit  systems in Japan during 2014. I decided to write this post to highlight the importance of a cybersecurity posture for any government. When the majority of people thinks to cyber security, has no idea of principal cyber threats and their effect on the infrastructure of a country, in this post we will try to give a quantitative analysis of the phenomena on one of the most technological country, the Japan. The National Institute of Information and Communications Technology (NICT), which has a network of a quarter of a million sensors, said there were 25.66 billion attempts to compromise systems, according to a report by Kyodo News. The National Institute of Information and Communications Technology (NICT) revealed that Japanese government offices and other entities suffered more than 25.66 billion of attacks in 2014.  Kyodo News reported that a network of a quarter of a million sensors has detected the amazing number of attempts to compromise country systems. The number of attacks is in exponential growth, in 2005, when the analysis was made for the first time, the overall number of attacks was 310 million. It should be emphasized that the figure also includes cyber attacks...

The Future of Data Security: DNA Cryptography and Cryptosystems...

DNA Cryptography can be defined as a hiding data in terms of DNA Sequence. Why DNA Cryptography and which are the principal benefits for its adoption? DNA Computing Information Security is very vital in today’s digital era of e-commerce and e-business. While 2014 was “The Year of Data Breach”, 2015 is off to a fast start with several prominent data breaches. As per statistics gathered by BreachLevelIndex, there were more than 2 million records per day that were breached in the year 2014, which means, 32 records were breached each second. “It’s apparent that a new approach to data security is needed, if organizations are to stay ahead of the attackers and more effectively protect their intellectual property, data, customer information, employees.” Security approaches must be good enough to tackle the ever-changing data breaches. This is where the data security, encryption of data at rest and in motion, implementing user access control come into play. World of Cryptography Multiple cryptographic techniques are used for securing the data over the network. Cryptography is the art of converting the original message into human unreadable code, which cannot be reversed to the original message. Cryptography plays a very important role in data integrity in the three components of the CIA triad (Confidentiality,...

How To Protect Your Cisco Device (Router, Switch)...

Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), and Honeypots are modifying the way people think about security. Companies are spending thousands of dollars on new security devices, but forgetting the basic, the first line of defense: the border router. Although a lot of people may think that routers don’t need to be protect, they are completely wrong. A lot of secure problems appear all time against this kind of device and most of them are vulnerable. Some information about some common security problems found on Cisco Routers, can be read on the text “Exploiting Cisco Routers”, available at: http://www.securityfocus.com/infocus/1734 In this article, I will give you 8 steps, easy to follow, to minimize your Cisco router exposure by turning off some unused services, applying some access control and applying some security options available on that. Control Access to device Restrict telnet access to it Block Spoof/Malicious packets Restrict SNMP Encrypt all passwords Disable all unused services Add some security options Log everything Control Access to your device The first thing to do is apply some rules to restrict all external access to some ports of the router. You can block all ports, but it is not always necessary....

Designed by İbrahim AKŞİT © 2016 | Powered by WordPress