Megaleecher.Net

Making technology work for you...

Get Your Free Subscription By Email:

Spinning Globe With Just 1K Of Self-replicating Javascript Code

The mind-blowing javascript globe animation shared below is not just awesome because of it's compact code size of just 1K, but also because it is a Quine, which is by definition "A computer program which takes no input and produces a copy of its own source code as its only output. The standard terms for these programs in the computability theory and computer science literature are self-replicating programs, self-reproducing programs, and self-copying programs." Which means, the code you are seeing below is the exact code which is used to generate it.

Assassination Market : Online Crowdfunded Killings With Bitcoins

Bitcoin, the digital cryptocurrency being anonymous and untraceable has been the preferred choice for doing illegal business online. After, being widely used for all kinds on illegal online trading like drugs, exploits and numerous other black-market services the currency has another taker which will definitely raise many eyebrows and can result in strict governmental actions. A new online service hosted on underground, anonymous Tor network is now being used to offer an crowdfunded bounty killer service. Named "The Assassination Market" the service lets anyone anonymously contribute bitcoins towards a bounty on the head of any government official just like Kickstarter but for political assassinations.

The Kickstarter for political murders is already receiving huge funds and have 7 nominations (nominating someone needs someone to propose a name and pay the 1 Bitcoin fee worth US$766.99) so far. "Ben Shalom Bernanke" the current chairman of Federal Reserve USA tops the chart and has collected maximum bounty worth ฿124.14 or US$95106.76 at today's exchange rate.

The Assassination Market

Your LG SmartTV Is Spying On You : Logs Whatever You Watch Including Content From USB Drives To Remote Server

Your privacy is at great risk in this era of Internet of things, after revelation of spying backdoor's in Internet routers and Chinese Electric Goods we now have another revelation of spying by LG SmartTV's. Findings made by developer @DoctorBeet revealed how LG is spying on users watching habits including logging of file-names watched by users from there external USB disk drivers as shown below to remote servers. The communication is clearly sending out "unique device ID" (which could be traced back to you) along with the information about what is being watched and too completely unencrypted.

Smart TV

Giveaway for Softtote Mac Photo Recovery

Unlike Windows there are not many free utilities for Mac Data Recovery, Softtote Photo Recovery for Mac is a product that needs $39.99 to get a license code for registration, but now you have a chance to win a free license key. So, capture this opportunity to get one of the 20 free license codes.

When we enjoy benefits of science and technology, our precious electronic data is under more threats in the meantime. Data loss results from many reasons, like inadvertent deletion/format, system crash, data transfer error, power failure, as well as virus attack, etc. What if you are faced with these situations, what should you do? Fortunately, you can get your precious photos, videos, and music files back from Mac-based IDE/SATA/SCSI/External/USB HDD, CF/SD cards, SSD, Hardware RAID, Memory card/Stick by photo recovery software.

Softtote Photo Recovery for Mac is such a kind of utility which can retrieve lost/ deleted/ formatted/ corrupted/ inaccessible photos, audios and videos from Mac hard drive and other media storage devices due to some common reasons mentioned above. It earns its place in data recovery market because of powerful recovery ability and high compatibility with Mac OS X 10.6 / 10.7 / 10.8/ 10.9.

How To Download High-Resolution 4K UHD and 1080p Hull-HD Video Clips For Free

While 4K Ultra HD displays are still very expensive, there adaptation rate is picking up slowly and steadily as more and more vendors are coming up with new models making the technology affordable. To enjoy the best quality results on these high resolution 4K UHD and Full-HD screen's, we need high-resolutions videos to match there native resolution. There are quite a few "PAID" commercial utilities which allow users to download these videos from Youtube, but today we will be sharing a much easier, faster and best of all "FREE" cross-platform, cross-browser solution to grab these high-quality videos without paying anything.

Easy Youtube Video Downloader is a free, simple, fast and clean solution which allows users to instantly download Youtube videos in 4K Ultra HD, 1080p Full-HD, 720p HD, 480/360p MP4, FLV, 3GP and High-quality 192kbps MP3 formats right from Youtube video pages without loading any external software or hassle of copy-pasting URL's. The web-browser addon works on your favorite web-browser (Mozilla Firefox, Google Chrome, Opera and Apple Safari) on Windows, Mac and Linux platforms.

4K Video Clip Downloader In Action

Russia Finds Hidden Chips Inside Chinese Electric Iron And Kettles That Scans Wi-Fi To Serve Malware

News reports from Russia's state-owned channel Rossiya 24 showed footage of a technician opening up an iron included in a batch of Chinese imports to find a "spy chip" with "a little microphone" embedded into it. These hidden, embedded electronic chips are scanning and connecting to any computer within a 200m radius with unprotected Wi-Fi networks, once connected these "Trojan devices" were being used to spread viruses.

While the report says that the malware is being used to send SPAM, piggy-banking on infected computer's internet connection and resources without the owner's knowledge about it, our recent story "Hidden Backdoor In Your Internet Router - With Love, From China !!" and the fact that the rogue devices had "an microphone" further establishes the fact that these are or can be used for spying. The researchers also found other products having these rogue components including mobile phones, car dashboard cameras and electric kettles.

Kettle Malware

Apple iPhone 5S For Rs 2,999/month With Unlimited Voice, SMS and 3G Data Under 24 Month Contract

Apple formally launched their flagship phone models iPhone 5S and 5C in India yesterday. Bearing an expensive price tag of Rs 53,500/- for iPhone 5S (16 GB) and Rs. 41,900/- for iPhone 5C (16 GB) these phones might find themselves hard to convince their tags to price concise Indian buyer. However, Reliance Communications has devised a smart marketing campaign to make sure it reaches widest possible audience in India, to overcome the hefty price tag the company is offering these devices under a 24 months "not locked to the network" contract with zero down payment and unlimited voice (local and STD across all networks), text-messages and 3G data with free national roaming.

Reliance

Toyota's Killer Firmware : The Computer Inside Your Now "Smarter Car" Is Already Causing Human Death

While everyone is looking forward for an era of self-driven Smart-cars, the recent verdict of a jury against Toyota holding it responsible for a crash in which a passenger was killed and the driver injured due to faulty firmware in their car raises some serious questions about software bugs causing fatal accidents.

Recently, Google revealed using customized version of Ubuntu Linux for their Smart cars. And after this verdict the big question which needs to be answered is - isn't like any other software platform the embedded smart-brain of these future cars suspectable to hardware/software defects and also vulnerable to already demonstrated car hacking/hijacking?

Confused Smart Cars

Hidden Backdoor In Your Internet Router - With Love, From China !!

Chinese telecom companies have been accused of embedding spying technologies into enterprise level telecom hardware for Chinese government, now a new research done by embedded device hacker "Craig Heffner" unearthed that consumer level internet router's made by Chinese companies come bundled with a secret backdoor which allows full root level access to the consumer router.

He unveiled secret backdoors embedded inside a number of D-Link and Tenda brand routers which are manufactured in China and are sold all around the globe. The beauty of this type of backdoor is that these are undetectable by antivirus software's and bypass almost all sorts of security measures as the loophole is sitting at the very start of network access chain supplying and controlling access to everything else after it - this is sort of your gatekeeper being the enemy Trojan. Unlike NSA PRISM spying this would also be a more easy, distributed, cost-efficient and targeted form of government spying.

Tenda

New iPhone fingerprint scanner hack allows attacker to hijack Apple ID from devices

One after another more and more new Apple iOS7 lock security vulnerabilities are getting revealed, this time the German security firm SRL has discovered an vulnerability which uses flaws in Touch ID Fingerprint authentication and iCloud allowing unauthorized access to a locked device and potentially gain control over an owner’s Apple ID. Apple iOS7 allows users to Turn On the Airplane mode from lockscreen without a passcode, this oversight allows an hacker to disable internet connectivity and hence the remote wipe security feature. Do watch the video posted below.

This is just one of the many helpful tips we have posted, You can find more stories here,
Do subscribe to updates using your favorite RSS feed reader or using the secure FeedBurner email update form on top of this post.