-->

ABOUT US

Our development agency is committed to providing you the best service.

OUR TEAM

The awesome people behind our brand ... and their life motto.

  • Kumar Atul Jaiswal

    Ethical Hacker

    Hacking is a Speed of Innovation And Technology with Romance.

  • Kumar Atul Jaiswal

    CEO Of Hacking Truth

    Loopholes are every major Security,Just need to Understand it well.

  • Kumar Atul Jaiswal

    Web Developer

    Techonology is the best way to Change Everything, like Mindset Goal.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve their business.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

Showing posts with label Technology news. Show all posts
Showing posts with label Technology news. Show all posts
  • Best 4 alternative Wayback Machine (Internet Archive) in 2020



    Best 4 alternative Wayback Machine (Internet Archive)  in 2020



    1) Wayback Machine







    The Wayback Machine is a digital archive of the World Wide Web,
    founded by the Internet Archive, a nonprofit organization based in San
    Francisco. It allows the user to go “back in time” and see what websites
    looked like in the past.  CEH v10 4 Wayback Machine (Internet Archive) Alternatives in 2020






    CEH v10 4 Wayback Machine (Internet Archive) Alternatives in 2020



    URl http://web.archive.org/




    2) Archive.today


    Archive.fo is online tool that helps you to create a copy of the webpage. This copy will remain online, even if the original page is removed. Best 4 alternative Wayback Machine (Internet Archive)  in 2020


    Features:




    Link: https://archive.fo



    3) Perma.cc


    Perma.cc is a web archiving app developed and maintained by the Harvard Law School Library. It helps you to create permanent records of the websites.


    Features:


    • You can delete links within 24 hours after creation.
    • It helps you to view archived records through Perma.cc link
    • URLs can be inserted via blog or paper articles.
    • It enables you to create Parma that visits the website and create a record of the content of that website.
    • If the preservation fails, this app will give you options to upload PDF file or image.
    • Individuals can get access to permalinks via tiered subscriptions.
    • You can assign users to any organization by simply submitting the user's email address into this cloud-based program.



    Link: https://perma.cc




    4) Stillio


    Stillio is a tool that automatically captures website snapshots, archives and shares to other users. You can manage your website history and save lots of time.


    Features:

    • You can set screenshot frequencies according to your customized duration
    • You can add multiple URL at once.
    • You can save the screenshot to Dropbox.
    • It supports URL sharing.
    • This tool enables you to filter URLs by domain.
    • You can use custom titles to keep everything organized.
    • Stillio helps you to take a screenshot from the website geographic location by identifying it's IP address.
    • You can hide unwanted elements like overlays, banners, or cookie popups.



    Disclaimer

    This was written for educational purpose and pentest only.
    The author will not be responsible for any damage ..!
    The author of this tool is not responsible for any misuse of the information.
    You will not misuse the information to gain unauthorized access.
    This information shall only be used to expand knowledge and not for causing  malicious or damaging attacks. Performing any hacks without written permission is illegal ..!


    All video’s and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on www.hackingtruth.in is only for those who are interested to learn about Ethical Hacking, Security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.


    All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.



    - Hacking Truth by Kumar Atul Jaiswal


    Video Tutorial :-  


          


    I hope you liked this post, then you should not forget to share this post at all.
    Thank you so much :-)



  • send a unlimited SMS via sms bombing and call bomber in any number



    SMS Bombing & Call bomber in any number


    So today we will know about the special technique of unlimited sending sms, which is named SMS bombing so, we will covered in this article about SMS Bombing and How to use ?  so, you can use this tool in kali linux, windows and MacOS also. so, lets get started!


    SMS Bombing & Call bomber


    Due misusing of TBomb, several API's died. Don't be afraid if you don't see all send messages. call bomber


    • The script requires working network connection to work.
    • No balance will be deducted for using this script to send SMS/calls.
    • While doing infinite bombing use 2-3 seconds delay and 10 to 20 threads for maximum performance.
    • Don't put spaces in between phone number (Ex- 99999 99999)
    • Make sure you are using the latest version of TBomb
    • Make sure you are using Python3. SMS Bombing & Call bomber in any number  custom sms bomber



    Here's how you can check it. Type this command in your terminal.


    python -V



    Features:


    • Lots of integrated SMS/call APIs
    • Unlimited (Limited against abusing) and super-fast bombing
    • International bombing available (APIS Dead. Try Your Luck.)
    • Call bombing
    • Frequent updates
    • Automatic updating mechanism
    • Easy to use and embed in code




    How To Use ? ( LInux )


    step 1 :- First we need to install sms bombing tool so,

    git clone https://github.com/TheSpeedX/TBomb





    ls

    cd







    Run


    bash TBomb.sh










    Press 1 To  Start SMS Bomber
    Press 2 To  Start Call Bomber
    Press 3 To  Update (Works On Linux And Linux Emulators)
    Press 4 To  View Features
    Press 5 To  Exit



    I will choose option 1 so, press 1 and hit enter







    Enter Your Country Code ( without + ) : 91
    Enter Target Number : +91 7979*********
    Enter Number of Messages To Send ( 0 For Unlimited ) : 0
    Enter Delay Time ( in Seconds ) [Recommended 2 sec ] : 2
    Number Of Threads(10 to 20) : 19

    and then hit enter











    call bomber
    custom sms bomber
    sms bomber script
    sms bomber protection
    sms bomber
    android missing tricks
    sms bomber telegram
    sms bomber
    turbo bomber
    sms app
    Kali linux

    For Termux:


    Notice:

    git installation methods are not universal and do differ between distributions, so, installing git as per instructions below may not work. Please check out how to install git for your Linux distribution. Commands below provide instructions for Debian-based systems.

    To use the bomber type the following commands in Termux:

    pkg install git
    pkg install python
    git clone https://github.com/TheSpeedX/TBomb.git
    cd TBomb
    chmod +x TBomb.sh
    ./TBomb.sh




    For macOS:


    To use the bomber type the following commands in macOS terminal:

    # Install Brew:

    /usr/bin/ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)"

    # Install dependencys:

    brew install git
    brew install python3
    sudo easy_install pip
    sudo pip install --upgrade pip
    git clone https://github.com/TheSpeedX/TBomb.git
    cd TBomb
    chmod +x TBomb.sh

    # Missing Tools on MacOS

    Toilet cannot be installed yet. But TBomb does still work.

    # Run TBomb:

    sudo bash TBomb.sh







    Disclaimer

    This was written for educational purpose and pentest only.
    The author will not be responsible for any damage ..!
    The author of this tool is not responsible for any misuse of the information.
    You will not misuse the information to gain unauthorized access.
    This information shall only be used to expand knowledge and not for causing  malicious or damaging attacks. Performing any hacks without written permission is illegal ..!


    All video’s and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on www.hackingtruth.in is only for those who are interested to learn about Ethical Hacking, Security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.


    All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.



    - Hacking Truth by Kumar Atul Jaiswal


    Video Tutorial :- SOON



  • critical bug in VMware opens up corporate Treasure to hackers



    critical bug in VMware opens up corporate Treasure to hackers

    critical bug in VMware opens up corporate Treasure to hackers



    A critical information-disclosure bug in VMware’s Directory Service (vmdir) could lay bare the contents of entire corporate virtual infrastructures, if exploited by cyberattackers. critical bug in VMware opens up corporate Treasure to hackers
    The vmdir is part of VMware’s vCenter Server product, which provides centralized management of virtualized hosts and virtual machines (VMs) from a single console. According to the product description, “a single administrator can manage hundreds of workloads.”



    These workloads are governed by a single sign-on (SSO) mechanism to make things easier for administrators; rather than having to sign into each host or VM with separate credentials in order to gain visibility to it, one authentication mechanism works across the entire management console.

    The vmdir in turn is a central component to the vCenter SSO (along with the Security Token Service, an administration server and vCenter Lookup Service). Also, vmdir is used for certificate management for the workloads governed by vCenter, according to VMware.






    The critical flaw (CVE-2020-3952) was disclosed and patched on Thursday; it rates 10 out of 10 on the CVSS v.3 vulnerability severity scale. At issue is a poorly implemented access control, according to the bug advisory, which could allow a malicious actor to bypass authentication mechanisms.



    “Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls,” the description explained.







    As for the attack vector, “a malicious actor with network access to an affected vmdir deployment may be able to extract highly sensitive information,” VMware noted. In turn, this information could be used to compromise the vCenter Server itself “or other services which are dependent upon vmdir for authentication.”

    There are no workarounds, but administrators are encouraged to apply the patches as soon as possible.

    vCenter Server 6.7 (embedded or external PSC) prior to 6.7u3f is affected by CVE-2020-3952 if it was upgraded from a previous release line such as 6.0 or 6.5. Clean installations of vCenter Server 6.7 (embedded or external PSC) are not affected, according to the company. To help administrators find out if their vmdir deployments are affected by CVE-2020-3952, the vendor has published a how-to knowledge base document.






    “VMware, one of, if not the most, popular virtualization software companies in the world, recently patched an extremely critical information disclosure vulnerability…one of the most severe vulnerabilities that has affected VMware software,” Chris Hass, director of information security and research at Automox, told Threatpost. “vCenter Server provides a centralized platform for controlling VMware vSphere environments, it helps manage virtual infrastructure in a tremendous number of hybrid clouds, so the scope and impact of this vulnerability is quite large. Organizations using vCenter need to check their vmdir logs for affected versions, ACL MODE: legacy, and patch immediately.”

    No specific acknowledgments were given for the bug discovery – VMware noted only that it was “disclosed privately.”


    Credit :- ThreatPost




  • Multi device and auto delete message support coming in WhatsApp



    Multi device and auto delete message support coming in WhatsApp



    Multi device and auto delete message support coming in WhatsApp



    Instant messaging app WhatsApp has been working on multi-device support for some time. Now you can run WhatsApp on only one smartphone from a mobile number. But under this feature, you will be able to run a mobile account on different devices.


    Instant messaging app WhatsApp has been working on multi-device support for some time. Now you can run WhatsApp on only one smartphone from a mobile number. But under this feature, you will be able to run a mobile account on different devices.



    Multi device and auto delete message support coming in WhatsApp



    Instant messaging app WhatsApp has been working on multi-device support for some time. Now you can run WhatsApp on only one smartphone from a mobile number. But under this feature, you will be able to run a mobile account on different devices. Multi device and auto delete message support coming in WhatsApp


    WhatsApp's multi-device support when the public will roll out after the final build, it is not known at the moment. So far, the company has not officially said anything about this feature.







    WhatsApp's multi-device support when the public will roll out after the final build, it is not known at the moment. So far, the company has not officially said anything about this feature.



    WhatsApp's multi-device support when the public will roll out after the final build, it is not known at the moment. So far, the company has not officially said anything about this feature.
  • Reliance Jio's big offer amidst battle with Corona virus


     Reliance Jio's big offer amidst battle with Corona  kumaratuljaiswal.in



    Jio has announced that the company will provide basic broadband connectivity without any service charge, as part of Reliance Industries Limited's # CoronaHareGindiaJitega initiative. The company has said that keeping in view the geographical location, the service will be given for free with a speed of 10Mbps. That is, the free broadband plan will be offered in the areas where Jio Fiber operates. This offer is for new users.  Reliance Jio's big offer amidst battle with Corona 


    At the same time, existing Jio Fiber subscribers will be given double data in all plans. The purpose of the company through these offers is that in such a difficult situation, mobility services should be better and keep running all the time. Corona virus





    Right now India is fighting a battle with Corona and internet is the biggest need of this society to work from home and stay connected with the whole world. Through its initiative, Reliance Jio is providing basic Jio fiber broadband connectivity to anyone living in its service area at a speed of 10Mbps for free. Corona virus crisis


     Reliance Jio's big offer amidst battle with Corona  kumaratuljaiswal.in



    No one will be charged for accessing the internet, although subscribers will have to pay for the router. The company has informed that home gateway routers will be made available with minimum refundable deposits. At the same time, existing subscribers of Geofiber will be given double data in all the plans by the telecom operators.



    On the other hand, the company is offering double data in its 4G data vouchers to Jio's mobile subscribers. This offer was released last week. The company is offering non-live calling minutes along with double data. These vouchers are Rs 11, Rs 21, Rs 51 and Rs 101. These 4G data vouchers are actually boosters and will require an active Jio plan. latest jio news




    Apart from all this, a work from home plan has also been released by Jio and its price has been kept at Rs 251. In this, only data benefits are being given to customers. In this plan, customers will be given 2GB data daily during validity. In this, customers will not get the benefits of SMS or calling.






  • Where is your Facebook login other than your phone, it is easy to know

    Where is your Facebook login other than your phone, it is easy to know  by kumaratuljaiswal.in



    Where is your Facebook login other than your phone, it is easy to know


    Facebook is such a social media, on which hardly anyone's account is created. We post all kinds of photos or videos on Facebook, and that is the reason why there is a fear about its security. Many times we leave Facebook open in the office, or sometimes there is fear of someone having our password. In such a situation, it is very important to know that somewhere other than us, no one has logged our Facebook ...Where is your Facebook login other than your phone, it is easy to know

    So let me tell you that it is very easy to know that apart from your phone, where is Facebook going…facebook issue


    This is the whole way…

    For this, first open Facebook and go to Settings. As soon as you open the settings option, many options will come in front of the user on the left side.

    In this, the user will get the option of 'Security and Login' on the second number. how to hack facebook

    - As soon as you tap on it, a page will open in front of the user. On this page you will find the option of 'Where logged in' .-- Here you will see the name of the device, where your Facebook login (Active) is.






    Apart from this, along with the name of the device here, you will also see Time, so that you can see how many hours or how long ago it was logged.

    This is how Facebook is running anywhere
    Where you can see the list of logged devices, three dots will be seen in front of the same. If you tap on the three dots, you will get the option of 'Log Out'. Apart from this, if you want to logout from each device simultaneously, then tap on 'Log Out of all Session' at the bottom. In this way, your Facebook account running anywhere will be logout.





  • British hacker reveals Microsoft's fake call center in India, CCTV exploits



    scammer cctv - PHOTO : bbc

    British hacker reveals Microsoft's fake call center in India, CCTV exploits



    A British hacker has hacked the CCTV camera of a fake call center in Gurugram. Apart from this, he has also recorded about 70 thousand phone calls. The hacker is named Jim Browning and has told the BBC about the hacking. Jim Browning has also uploaded CCTV footage from the call center to his YouTube channel.



    Jim Browning studied for a full three months by hacking the CCTV camera of a fake call center running in Microsoft's name in Gurugram and then handing the footage to the BBC. A BBC report reported that a thug at the call center in Gurugram, adjacent to Delhi, spoke to people by the name of Chris Lawson and told that he was speaking from San Jose, California.







    According to the CCTV footage obtained by the BBC, the scammer of the Grugram is talking to a UK man by the name of Chris Lawson. In the meantime, the scammer asks the UK man (victim) to recover his computer for £ 1,295, or about Rs 1,21,250. The victim tells the scammer that he is in depression and may have a heart attack. After this the scammer says why are you crying, you are a good man.


    Hacker says he wanted to show the world how scammers defraud people. The hacker has claimed that these scammers were working as Microsoft's technical support staff while sitting in an office in Grurugram. They used to send fake pop-up messages on the users' system as a warning.


    The BBC report states that scammers pay lime to the UK of around Rs 21 million, or Rs 1,53,85,96,500, every month. Scammers pretend to be from banks, computer companies, retailers, and even the government.




  • In the year 2020, Google will change your Android smartphone user experience!




    In the year 2020, Google will change your Android smartphone user experience!





    In the year 2020, Google will change your Android smartphone user experience!



    Google is set to present its latest Android operating system (Android 11) at its annual developer conference. The name of this conference is Google I / O. It is starting on 12 May. During this time, Android 11 preview will be given. At the same time, its final version can be rolled out for the users around October. Google released its developer preview in which it has been revealed that Android 11 can also be introduced with some features that will help Android smartphone users to get a new interface and new experience.

    These can be important changes with Android 11:


    1. The company wants to give users the look and feel of Facebook Messenger. The company can also make the chat bubble given in Messenger available on smartphones. If you do not know what a chat bubble is, then let us tell you that when we use Messenger, a bubble comes in the side in which the chat window of your contact is present.



    2. With Android 11 it will be easy to mark spam chat. Through this, any call will be marked as spam from the dialer app itself.




    3. In the current situation it happens that whenever you have a notification, the user cannot reply to the message by sending a message from the notification panel. In this way, after the new feature of Android 11, through the notification panel, you will be able to send the image to anyone.







    4. A feature can also be introduced under Android 11, under which notifications will be muted automatically when the camera is used.


    5. Android 11 smartphones can bring 5G support. Google is working on updating the existing connectivity APIs.






    6. This latest update will bring a special app support for foldable phones and phones with punch-hole display. The app will be optimized for both these phones.




    7. Google is also taking many steps regarding the privacy of its users. In this sequence, the company will provide an option to give one-time permission to the apps in its latest OS. No one else will be able to access them.



    8. With Android 11 users will be able to change the settings of Dark Mode. It will also have an option under which the time of dark mode can also be set.




    9. Under the latest OS, if your phone has Airplane mode on, then you will be able to connect the app in the phone to the Bluetooth device.

     


    10. Touch sensitivity will be improved in the latest OS. Android 11 users will be able to increase touch sensitivity.


  • How to prepare your keyboard shortcuts for Windows 10


     How to prepare your keyboard shortcuts for Windows 10



    How to prepare your keyboard shortcuts for Windows 10


    To become a power user of Windows 10, you need to have a keyboard shortcut of Windows 10. Keyboard shortcuts or hotkeys allow you to complete a lot of work without having to click around. However, at times hot pre-existing hotkeys are not enough. In such a situation you can create your own keyboard shortcut to complete your everyday tasks. Let's know about a hotkey utility called Win Hotkey which allows to create custom keyboard shortcuts on Windows 10.





    First download the Win Hotkey from https://directedge.us/content/winhotkey and install it on your Windows computer. It is a small application, so it will not take very long to install it. This program is completely free. How to prepare your keyboard shortcuts for Windows 10


    Now you apply it. After opening it you will get a small window. Click on 'New Hotkey' to create a keyboard shortcut of your preference. Here you can choose the easy-to-remember combination 'Win + Number'.





    For example, to open the download directory, you can select 'Win +1' shortcut. This will not only save your time, but will also get rid of the hassle of clicking repeatedly.



     Similarly, a 'Win +2' shortcut can be created to open a command prompt. This hotkey will help you get to the Windows terminal within seconds. And thus you can execute the ADB command without losing time. In this way shortcuts can be created for different tasks like opening folders, running a program or PowerShell script.
  • Mobile recharge, step by step guide can be done directly from Google Search


    Mobile recharge, step by step guide can be done directly from Google Search





    Mobile recharge, step by step guide can be done directly from Google Search

    Now you have a new option to recharge mobile. There are still many options and many apps by which mobiles recharge. But now Google has launched a new service for India.
    Under Google Mobile Recharge Service, users will be able to easily compare mobile plans and packs. Now you will get these options in Google search. For now this feature is for Android users.





    To use this feature, go to Google search and type Prepaid mobie recharge. However, you can also keep a search query according to your calculations, Google will understand that you are trying to recharge mobile.
    After browsing the plan, you will see all the prepaid recharge plans of your mobile operator here. You can recharge by choosing one of these. The next step will be of payment.
    Mobile recharge, step by step guide can be done directly from Google Search




    After choosing the plan, the next step is payment. You will also be given several options to pay here. They have services like Freecharge, Google Pay, Mobikwik and Paytm.
    Mobile recharge, step by step guide can be done 




    Currently, users of Reliance Jio, Vodafone-Idea, Airtel and BSNL can recharge prepaid through Google search.



  • Google will alert on password theft, use this feature




    Hardly anyone's data is safe in a rapidly digital world. People's data is being leaked in the coming days Whether it is Facebook, Twitter or WhatsApp. There is a risk of leaking private information on every platform. Last year itself, WhatsApp users were spied after which the victims also asked the Government of India questions. So now the question is how to know that your personal information is being leaked. Let's know ...Google will alert on password theft, use this feature




    Google will alert







    After continuously leaking data, Google has launched a new service of its own. The name of this service of Google is Google Password Manager. Through this password manager of Google, you will be able to keep your social media account, including internet banking passwords or passwords of any other website. You will also get an alert to change the password if you use Google password manager.




    Check whether the data has been leaked or not


    You can find out if any of your passwords have been leaked by going to Google's password manager. For this, you have to go to passwords.google.com. After this, the password manager will open in which you will get the option of check password, after clicking on it, Google will ask you to pre-login Gmail password on that system. After entering the password, Google will tell you whether your password is used or not. Also it will tell whether your password is leaked or not.
    Change password immediately upon receipt of information.

    For example, if Google gives you information about a password leak, then you should change your password immediately. Apart from this, two factor authentication should also be turned on. Some precautions should also be taken while changing the password, such as - Do not enter your name or date of birth in the password. Apart from this, avoid using mobile number in password also. Also, change the password of your Gmail account from time to time.




  • WhatsApp is coming in its own disappearing message feature, this is how it will work


    Disappearing Messages feature is coming in the instant messaging app WhatsApp. It has been tested for a long time. According to the report, this feature will be given for the group at the moment.







    WhatsApp Messenger is a freeware, cross-platform messaging and Voice over IP service owned by Facebook, Inc. It allows users to send text messages and voice messages, make voice and video calls, and share images, documents, user locations, and other media.
    WhatsApp is coming in its own disappearing message feature, this is how it will work

    Disappearing Messages feature is coming in the instant messaging app WhatsApp. It has been tested for a long time. According to the report, this feature will be given for the group at the moment.
    The feature of delete message has been seen in the WhatsApp Beta version 2.19.348 given for Android and it has already been given in the beta version of iOS. But the need to understand is what does this Disappearing Messages feature do.







    Whatsapp has a feature Delete for everyone - Under this feature you can recall the sent message after some time. But the feature of Disappearing Messages is different from this. Under this, messages sent in a time frame will disappear by themselves.

    According to a report by the blog WABetainfo, which keeps track of the news of WhatsApp, this feature is being brought especially for group messages. Its purpose may be to save storage by deleting more messages in group convergence. This feature will be for group chats and can be accessed only by group administrators. Once you go to the group admin settings and apply it to everyone, the group chats will start deleting themselves after the scheduled time.

    A screenshot has been placed in the WABetainfo report where this feature can be seen. For the deleted message, you can decide the hour, day, week, month and year - they will be given the option. After setting, the message will disappear by itself. At the moment it is not clear when this feature company will give in the final build.






    Top 5 Upcoming WhatsApp Features In 2020


    • Dark Mode. If there's one feature by WhatsApp that people have been waiting for a long time then it's the dark mode which has long been under its development phase now. ...
    • Security Face Unlock. ...
    • Last Seen For Select-Few Friends. ...
    • Self-Destructing / Disappearing Messages/ 'Delete Messages' ...
    • Facebook Pay.












  • new latest vulnerability can damage your smartphone

    The Android Security Bulletin was released in December 2019, mentioning 3 flaws in it. One of these three flaws is considered extremely dangerous ...









    There is always doubt in the minds of users about Android smartphones. Hacking them has become extremely easy. Hackers are adopting many ways to gain access to Android users' phones. Also get personal data hack. In this sequence, a new flaw has emerged, due to which the Android smartphone can be completely damaged. It is believed that it can be fixed in December 2019.new latest vulnerability can damage your smartphone




    The Android Security Bulletin


    The Android Security Bulletin that was released in December 2019 contained references to 3 flaws. One of these three flaws is considered extremely dangerous. Google has said that by taking advantage of this flaw, users can make single malware-affected messages from their phones. This flaw is named CVE-2019-2232 in Android Bulletin. By taking advantage of this, users' phones can be damaged.
    new latest vulnerability 


    Millions of Android devices were affected


    Many devices have been affected by the leakage of the name CVE-2019-2232. Android 8.0, Android 8.1, Android 9 and Android 10 smartphones are affected by this flaw. In such a situation, it can be believed that many users may be affected by this flaw. The official statement of the NIST National Vulnerability Database stated that under the handleRun of TextLine.java it can crash the app in the phone. This increases the chances of a smartphone malfunction. bug hunting




    Android can provide updates


    The company says that an update can be issued to fix this flaw. However, a fix for this has been given to the Android open source project. Talking about the security patch, it depends on the phone manufacturer when they provide the latest security patch. It can be said that the first Google Pixel series devices can get the security patch. hackerone



  • Microsoft said- 4.4 crore users used hacked username-password


    Microsoft revealed that about 4.4 crore of its users are using hacked passwords and user names for login.


    Microsoft said- 4.4 crore users used hacked username-password



    Microsoft Corporation is an American multinational technology company with headquarters in Redmond, Washington. It develops, manufactures, licenses, supports, and sells computer software, consumer electronics, personal computers, and related services. Its best known software products are the Microsoft Windows line of operating systems, the Microsoft Office suite, and the Internet Explorer and Edge web browsers. Its flagship hardware products are the Xbox video game consoles and the Microsoft Surface lineup of touchscreen personal computers. In 2016, it was the world's largest software maker by revenue (currently Alphabet/Google has more revenue). The word "Microsoft" is a portmanteau of "microcomputer" and "software". Microsoft is ranked No. 30 in the 2018 Fortune 500 rankings of the largest United States corporations by total revenue.


    Microsoft was founded by Bill Gates and Paul Allen on April 4, 1975, to develop and sell BASIC interpreters for the Altair 8800. It rose to dominate the personal computer operating system market with MS-DOS in the mid-1980s, followed by Microsoft Windows. The company's 1986 initial public offering (IPO), and subsequent rise in its share price, created three billionaires and an estimated 12,000 millionaires among Microsoft employees. Since the 1990s, it has increasingly diversified from the operating system market and has made a number of corporate acquisitions, their largest being the acquisition of LinkedIn for $26.2 billion in December 2016, followed by their acquisition of Skype Technologies for $8.5 billion in May 2011. Microsoft said- 4.4 crore users used hacked username-password


    Microsoft revealed that about 4.4 crore of its users are using hacked passwords and user names for login. This flaw came to light when Microsoft's research team conducted data analysis. The team scanned the account between January and March. It turned out that these accounts are using hacked passwords and usernames on Azure and other similar platforms. Microsoft said- 4.4 crore users used hacked password-username



    According to a PC Mag report, the company's research team matched the database of more than 3 billion passwords and user names leaked in 2019. In this, the accounts of more than 4.4 crore users were matched with it. The company said that users whose accounts were matched, were asked to reset the password. hacked password



    99.9% hacking failed by MFA


    Microsoft said - The number of hacked accounts shows that 99.9% of hacking was thwarted through multi-factor authentication (MFA). We told users that MFA is an important system for online account security. We suggested users to strengthen the password. Many users' passwords were weak.











  • Check whether your WhatsApp application is safe or not.


    Recently, the case of WhatsApp Data Leaks, the world's most popular instant messaging app, was revealed. Over 1,400 WhatsApp users created by Israeli company NSO Group
    There were victims of spyware, including 121 Indian users. Check whether your WhatsApp application is safe or not.


    Check whether your WhatsApp application is safe or not.



    Recently, the case of WhatsApp Data Leaks, the world's most popular instant messaging app, was revealed. Over 1,400 WhatsApp users created by Israeli company NSO Group
    There were victims of spyware, including 121 Indian users.


     Apart from this, another bug was revealed in the past, in which hackers were trying to hack users' accounts through MP4 video files. However, after this, Facebook-owned company WhatsApp advised its users to update the app with the latest version.Earlier, hackers were attacking users through missed video calls.


     In this, hackers used to place spyware by making a missed call to the user from an unknown number. With the help of this spyware, hackers used to collect personal information of users. The Indian Computer Emergency Response Team (CERT-In) had recently issued advisory to Indian users, stating that to avoid any kind of cyber attack



    Recently, the case of WhatsApp Data Leaks, the world's most popular instant messaging app, was revealed. Over 1,400 WhatsApp users created by Israeli company NSO Group  There were victims of spyware, including 121 Indian users.



    Update your WhatsApp with latest updates


    In such a situation, the question arises that the app which we are using so much, is safe or not.
    Therefore, today we are going to tell you some steps, with the help of which you will be able to find out whether the app you are using is safe or not.

    Check app version like this


    First of all, check whether the app you are using is the latest version or not. For this, you have to go into the app and tap on the three dots above.




    •  After tapping on all three dots, you have to tap on the Settings option. In the Settings option, you will get help option.
    •  As soon as you tap on Help, you will see a tab of App Info.
    • You will see its version as soon as you tap on the app info. If your app version is below 2.19.274, then you update your app to the latest version 2.19.341.
    • To update the app you have to go to Google Play Store. After this, as soon as you search your app, there will be an option to update or uninstall it.

    You will be able to upgrade your app to the latest update by tapping on the update. Also keep downloading updates of your app from time to time.




  • Anti-virus apps become a threat to smartphones, millions of devices on target




    A new threat has emerged for smartphone users. This threat is serious because it is associated with many popular anti-virus apps. Anti-virus apps become a threat to smartphones, millions of devices on target



    A new threat has emerged for smartphone users. This threat is serious because it is associated with many popular anti-virus apps. Most users use them to protect their smartphones from malware or viruses. These anti-virus apps have now become the enemy of users. These infected anti-virus apps have been detected by privacy and security research firm VPNPro. This case is also considered to be very serious because these anti-virus apps have been downloaded about 190 crore times. That is, there is a threat on crores of devices.

    Present on google play store


    The security firm said that there are 10 anti-viruses available on the Google Play Store that dodge smartphone users and take malicious access permissions and enter malware and spyware into the device. After this, these anti-viruses cleverly monitor all the activities done by the user on the smartphone or tablet. Ask for money to be deleted from the device


    The firm said that all these anti-viruses collect and sell personal data based on the permission received from the user. In addition, they also work to spread malware. Some of these apps are such that demand money from users for getting deleted from the device.


    5 such apps have been found before

    A few days ago 5 more such apps were detected. These were also included in the previous reports of VPN Pro. These five apps also targeted the user and device like the 10 apps found this time. However, Google has recently removed these 5 apps from the Play Store. The security firm has reported that these apps were downloaded 500 million times.

    There are also many popular anti-virus apps included.

    These dangerous anti-viruses include many more anti-virus solutions such as Clean Master with popular anti-virus apps such as Clean Master. In the photo given here, you can see the names of these dangerous anti-viruses. If any anti-virus app is present in your device, then delete it immediately.


    Audio and location record data

    Talking about the dangers of these anti-viruses, the research firm said that they enter the smartphone and record audio and make phone calls as well as monitor location data. These anti-virus apps send these data to their developers. These developers earn huge money by selling the data of the users.


    Send data up to 14000 times in a day, you will be surprised to know that mobile apps send location data of users every two seconds. Not only this, in some cases these apps send data 14,000 times a day to different companies. According to an estimate, even in the first hacked 500 million users, only 1 percent of the data is sold, even the developers of these apps earn 20 thousand dollars.




  • Top 30 worst passwords in 2019

    One of the easiest way for cyber criminals to hack into internet users’ accounts is to crack their
    passwords. Quite often people — out of ignorance or laziness — tend to keep passwords that are easy to guess.







    One of the easiest way for cyber criminals to hack into internet users’ accounts is to crack their
    passwords. Quite often people — out of ignorance or laziness — tend to keep passwords that are easy to guess. However, what they forget is that these passwords are also easy to hack and crack.  Top 30 worst passwords in 2020 According to a recent research by cyber security firm ImmuniWeb, out of 21 million “credentials belonging to Fortune 500 companies, about 16 million were compromised” during the last one year. The research firm further found that just 4.9 million out the 21 million passwords were unique. In other words, a vast chunk of them were easy to hack. Of these millions of passwords, there are 32 that are most-commonly used. These 32 passwords appear in almost all hacker lists across industries. So, here are these 32 passwords that you should stop using right now if you want to protect your account from hackers. Top 30 worst passwords in 2019




    The top 30 most common passwords were:



    • 0000000

    Top 30 worst passwords in 2019



    • 111111


    Top 30 worst passwords in 2019




    • 112233

    Top 30 worst passwords in 2019

    • 123456

    Top 30 worst passwords in 2019



    • 12345678


    Top 30 worst passwords in 2019



    • 123456789


    Top 30 worst passwords in 2019


    • 1qaz2wsx


    Top 30 worst passwords in 2019


    • 3154061

    Top 30 worst passwords in 2019

    • 456a33


    Top 30 worst passwords in 2019


    • 3366936455





    • 798_234
    Top 30 worst passwords in 2019



    • aaaaaa





    Top 30 worst passwords in 2019

    • abc13


    Top 30 worst passwords in 2019

    • career121



    • comedy


    Top 30 worst passwords in 2019


    • cheer

    Top 30 worst passwords in 2019


    • cheezy


    Top 30 worst passwords in 2019


    • exigent



    Top 30 worst passwords in 2019


    • old123ma






    • opensesame


    Top 30 worst passwords in 2019

    • pass

    Top 30 worst passwords in 2019

    • passer
    • qwerty
    • passwOrd 
    • password1




    • snowman
    • !qaz1qaz
    • soccer1
    • welcome


    Top 30 worst passwords in 2019
    😂😂😂😂😂😂

    • iloveyou***



    "iloveyou" just missed out on the top 10, while "monkey" and "dragon" made surprise appearances in the top 20. Plenty of users also used passwords as an opportunity to employ a colorful array of swear words.



    Popular brand names were also chosen, such as cocacola, snickers, mercedes, skittles, mustang, and playboy. MySpace and LinkedIn were also common choices, alarmingly, to secure accounts on those sites.

    Bands and movie references were often used, with Spiderman, superman, starwars, and pokemon all common choices as were expressions of frustration – a**hole, bull****, and f***you were often chosen.




    What Makes a Good Password?

    A good password will not be in the dictionary, will not use sequential numbers or be created by walking fingers along a keyboard. Brand names and locations should also be avoided. Passwords should be a minimum of 8 characters and should be unique – never used before by the user, and never reused on a different platform.

    Passwords should include at least one capital letter, lowercase letter, symbol and number. If all lowercase letters are used, each letter in the password could be one of 26 letters. Add in capitals and the possible options double to 52. There are 10 digits, increasing the options to 62, and let’s say 32 special characters, bringing the total up to 94 options. With so many options and possible combinations, randomly generated passwords are particularly difficult to guess. However, randomly generated passwords are also particularly difficult to remember.

    Recently, that problem has been recognized by the National Institute of Standards and Technology (NIST), which has revised its advice on passwords (See special publication 800-63B).

    While the use of random strings of characters and symbols makes passwords particularly difficult to guess and more resilient to hackers’ brute force password guessing tactics, end users have trouble remembering their passwords and that leads to particularly risky behaviors such as writing the password down or storing it in a browser.



  • WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    Hacking Truth.in

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.