Megaleecher.Net

Making technology work for you...

Get Your Free Subscription By Email:

Russia Finds Hidden Chips Inside Chinese Electric Iron And Kettles That Scans Wi-Fi To Serve Malware

News reports from Russia's state-owned channel Rossiya 24 showed footage of a technician opening up an iron included in a batch of Chinese imports to find a "spy chip" with "a little microphone" embedded into it. These hidden, embedded electronic chips are scanning and connecting to any computer within a 200m radius with unprotected Wi-Fi networks, once connected these "Trojan devices" were being used to spread viruses.

While the report says that the malware is being used to send SPAM, piggy-banking on infected computer's internet connection and resources without the owner's knowledge about it, our recent story "Hidden Backdoor In Your Internet Router - With Love, From China !!" and the fact that the rogue devices had "an microphone" further establishes the fact that these are or can be used for spying. The researchers also found other products having these rogue components including mobile phones, car dashboard cameras and electric kettles.

Kettle Malware

Apple iPhone 5S For Rs 2,999/month With Unlimited Voice, SMS and 3G Data Under 24 Month Contract

Apple formally launched their flagship phone models iPhone 5S and 5C in India yesterday. Bearing an expensive price tag of Rs 53,500/- for iPhone 5S (16 GB) and Rs. 41,900/- for iPhone 5C (16 GB) these phones might find themselves hard to convince their tags to price concise Indian buyer. However, Reliance Communications has devised a smart marketing campaign to make sure it reaches widest possible audience in India, to overcome the hefty price tag the company is offering these devices under a 24 months "not locked to the network" contract with zero down payment and unlimited voice (local and STD across all networks), text-messages and 3G data with free national roaming.

Reliance

Toyota's Killer Firmware : The Computer Inside Your Now "Smarter Car" Is Already Causing Human Death

While everyone is looking forward for an era of self-driven Smart-cars, the recent verdict of a jury against Toyota holding it responsible for a crash in which a passenger was killed and the driver injured due to faulty firmware in their car raises some serious questions about software bugs causing fatal accidents.

Recently, Google revealed using customized version of Ubuntu Linux for their Smart cars. And after this verdict the big question which needs to be answered is - isn't like any other software platform the embedded smart-brain of these future cars suspectable to hardware/software defects and also vulnerable to already demonstrated car hacking/hijacking?

Confused Smart Cars

Hidden Backdoor In Your Internet Router - With Love, From China !!

Chinese telecom companies have been accused of embedding spying technologies into enterprise level telecom hardware for Chinese government, now a new research done by embedded device hacker "Craig Heffner" unearthed that consumer level internet router's made by Chinese companies come bundled with a secret backdoor which allows full root level access to the consumer router.

He unveiled secret backdoors embedded inside a number of D-Link and Tenda brand routers which are manufactured in China and are sold all around the globe. The beauty of this type of backdoor is that these are undetectable by antivirus software's and bypass almost all sorts of security measures as the loophole is sitting at the very start of network access chain supplying and controlling access to everything else after it - this is sort of your gatekeeper being the enemy Trojan. Unlike NSA PRISM spying this would also be a more easy, distributed, cost-efficient and targeted form of government spying.

Tenda

New iPhone fingerprint scanner hack allows attacker to hijack Apple ID from devices

One after another more and more new Apple iOS7 lock security vulnerabilities are getting revealed, this time the German security firm SRL has discovered an vulnerability which uses flaws in Touch ID Fingerprint authentication and iCloud allowing unauthorized access to a locked device and potentially gain control over an owner’s Apple ID. Apple iOS7 allows users to Turn On the Airplane mode from lockscreen without a passcode, this oversight allows an hacker to disable internet connectivity and hence the remote wipe security feature. Do watch the video posted below.

How To Mount DD Disk Images With Read/Write Support On Windows

When it comes to perfect backup's, RAW disk-images are the choice for safest form of backup and restoration of fully functional operating-system installations. We have shared two methods of using the same to backup Raspberry Pi SD Card from Windows as well as Hot Backup's from RPi itself using Linux DD disk imaging utility. Once created we can also Mount these backup images with full read-write access for various tasks like Data recovery (For example imaging an corrupted disk and accessing the disk-image from another working computer to recover data).

OSFMount is a free Windows utility which allows you to do that, the software enables users to mount local disk image files in Windows with a drive letter which can be accessed like any other partition. The images can be mounted in read-only mode as well as write-enabled mode, OSFMount also supports creation of RAM disks (See What are RAM Disks and How they can be used to make use of non-addressable wasted RAM on Windows) which offers a huge speed boost over using disk-based images.

OSFMount

How To Setup Internet Access Priority With Multiple Networks On Windows

If you are using multiple NIC's (Network Adapters) to access more than one network, it gets tricky from where you internet connection comes from. Here is one such scenario and solution to make Microsoft Windows prioritize internet connection from a particular network over the other. In my example setup I have one LAN connection (192.168.0.1) and one WiFi connection (192.168.1.1) and would like Windows to use internet from my fixed-line broadband connected via LAN.

Networking Configuration

Apple iOS 7 Lockscreen Loophole Allows Anybody To Make Calls From Locked Phone !!

A new vulnerability discovered by an 27 year old user Karam Dauod, allows anybody to bypass the Apple iOS 7 security passcode and make calls. A user needs to perform a few steps via the iOS7 Emergency dialer screen to get past the lockscreen, once done they can call any number of choice including international and premium numbers without any restriction. Do watch the video demonstration posted below.

Apple iOS 7 Hack

[EXCLUSIVE] Download And Use Leaked Blackberry Messenger For Apple iOS Before Everybody Else

The much awaited BlackBerry Messeger (BBM) App for Apple iPhone and Google Android release got delayed as the company has decided to pause the global roll-out of BBM for Android and iPhone citing quality issues which are being worked upon now.

Luckily, the brief release of BBM Messenger for Apple iPhone was enough for users to grab the .IPA file and post it on the internet for others to install. The results were so overwhelming that there were about 1.1 million active users in the first 8 hours without even launching the official Android app. The official Blackberry Messenger app is now pulled down from Apple iTunes store, but here is how to grab it now and install without requiring a jailbreak on Apple iPhone.

BBM For iPhone

[Video] - Your Cat Can Also Unlock Your iPhone 5s Using Touch ID And The Fingerprint Sensor

While we are debating on security of Apple iPhone 5S fingerprint scan and it's misuse/theft, a group of individuals have already started a crowd-funded bounty hunt at istouchidhackedyet.com with money prize for anybody who breaks the Apple iPhone 5S Touch ID and fingerprint sensor. While a working crack/hack for Apple iPhone 5S fingerprint sensor is not available now, here is an interesting newly surfaced video showing a cat unlocking the new iPhone using Touch ID authentication.

iPhone 5s Fingerprint Hack
This is just one of the many helpful tips we have posted, You can find more stories here,
Do subscribe to updates using your favorite RSS feed reader or using the secure FeedBurner email update form on top of this post.