-->

ABOUT US

Our development agency is committed to providing you the best service.

OUR TEAM

The awesome people behind our brand ... and their life motto.

  • Kumar Atul Jaiswal

    Ethical Hacker

    Hacking is a Speed of Innovation And Technology with Romance.

  • Kumar Atul Jaiswal

    CEO Of Hacking Truth

    Loopholes are every major Security,Just need to Understand it well.

  • Kumar Atul Jaiswal

    Web Developer

    Techonology is the best way to Change Everything, like Mindset Goal.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve their business.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

Showing posts with label hacking news. Show all posts
Showing posts with label hacking news. Show all posts
  • Check whether your WhatsApp application is safe or not.


    Recently, the case of WhatsApp Data Leaks, the world's most popular instant messaging app, was revealed. Over 1,400 WhatsApp users created by Israeli company NSO Group
    There were victims of spyware, including 121 Indian users. Check whether your WhatsApp application is safe or not.


    Check whether your WhatsApp application is safe or not.



    Recently, the case of WhatsApp Data Leaks, the world's most popular instant messaging app, was revealed. Over 1,400 WhatsApp users created by Israeli company NSO Group
    There were victims of spyware, including 121 Indian users.


     Apart from this, another bug was revealed in the past, in which hackers were trying to hack users' accounts through MP4 video files. However, after this, Facebook-owned company WhatsApp advised its users to update the app with the latest version.Earlier, hackers were attacking users through missed video calls.


     In this, hackers used to place spyware by making a missed call to the user from an unknown number. With the help of this spyware, hackers used to collect personal information of users. The Indian Computer Emergency Response Team (CERT-In) had recently issued advisory to Indian users, stating that to avoid any kind of cyber attack



    Recently, the case of WhatsApp Data Leaks, the world's most popular instant messaging app, was revealed. Over 1,400 WhatsApp users created by Israeli company NSO Group  There were victims of spyware, including 121 Indian users.



    Update your WhatsApp with latest updates


    In such a situation, the question arises that the app which we are using so much, is safe or not.
    Therefore, today we are going to tell you some steps, with the help of which you will be able to find out whether the app you are using is safe or not.

    Check app version like this


    First of all, check whether the app you are using is the latest version or not. For this, you have to go into the app and tap on the three dots above.




    •  After tapping on all three dots, you have to tap on the Settings option. In the Settings option, you will get help option.
    •  As soon as you tap on Help, you will see a tab of App Info.
    • You will see its version as soon as you tap on the app info. If your app version is below 2.19.274, then you update your app to the latest version 2.19.341.
    • To update the app you have to go to Google Play Store. After this, as soon as you search your app, there will be an option to update or uninstall it.

    You will be able to upgrade your app to the latest update by tapping on the update. Also keep downloading updates of your app from time to time.




  • Hacker from Chennai discovered bug in Instagram, got reward of Rs 7.17 lakh


    Hacker from Chennai discovered bug in Instagram, got reward of Rs 7.17 lakh


    Chennai's security researcher Laxman Muthiah received a big gift from Facebook-owned photo sharing platform Instagram. Laxman had discovered a flaw associated with this platform, with the help of which other users' accounts could be taken over or hacked. Laxman has received a reward of $ 10,000 (about Rs 7.2 lakh) Hacker from Chennai discovered bug in Instagram, got reward of Rs 7.17 lakh




    Hacker from Chennai discovered bug in Instagram, got reward of Rs 7.17 lakh



    Chennai's security researcher Laxman Muthiah received a big gift from Facebook-owned photo sharing platform Instagram. Laxman had discovered a flaw associated with this platform, with the help of which other users' accounts could be taken over or hacked. Laxman has received a reward of $ 10,000 (about Rs 7.2 lakh) from Instagram for finding and reporting this deficiency associated with the photo-video sharing app.  Hacker from Chennai discovered bug in Instagram, got reward of Rs 7.17 lakh This reward has been received from the social network's bug bounty program, which encourages rewarding those who detect the flaws.




    It has been said by the hacker that Facebook has now fixed this bug. In a blog post, Laxman said, "The security team of Facebook and Instagram has overcome the flaws and has given me a reward of $ 10,000 under their bounty program." The hacker also noticed a similar flaw in Instagram last month, for which he received a reward of $ 30,000 (about Rs 21.5 lakh) from the bounty program of Instagram.


    Passcode Mechanism Bypass Risk

    The first flaw detected by the hacker was that while the six digit passcode that was found while resetting the Instagram account could bypass the rate-limited mechanism, now with the help of the device ID and password reset code with the help of the disturbance, the multiple account Could be hacked. Laxman explained this mess in his blog post.  Hacker from Chennai discovered bug in Instagram, got reward of Rs 7.17 lakh In this, whenever a user requests a passcode from his mobile device, the randomly generated ID also goes with the request.
    Multiple accounts could be hacked simultaneously





     Hacker from Chennai discovered bug in Instagram, got reward of Rs 7.17 lakh Passcodes are verified with the help of Device ID. Laxman wrote, 'There will be about 10 lakh sets of what will be 6 digit passcodes. In such a situation, the risk of hacking accounts is also increasing due to requesting passcode for multiple users. In such a situation, to reduce these sets, the attacker will have to request passcode from more users. In such a situation, if the hacker requests passcode from 10 lakh users, then his success rate will be 100 percent. In such a situation, if the attack is kept within 10 minutes, before the code expires, it can hack all 10 lakh accounts. Hacker from Chennai discovered bug in Instagram, got reward of Rs 7.17 lakh





  • Agent smith Malware attacks on android users Be alert

    Search me on YouTube Kumar Atul Jaiswal





    If you open a what's app in your phone, do you see any ad? If so, understand that a malware agent Smith has attacked in your phone. Agent Smith Malware has taken the crime of $ 60,000 in the world, in which the one of the covers are closed in India from the world. Agent Smith, where did these names come? Where to come to the agent Smith, where did the name come? Where to hear the name, it is said that the FBI, the CIA or the interpol is an interesting thing of the spy or any other. The story is being done after the name of malware, viruses or ranging, where attractives, viruses or ranging, including attacking computers and mobile phones.




    People researching technical security and machines see every evidence of new malware everyday, but the names are just kept, they are more dangerous or impressive. We arehingbird, Hartbide, Shealock, Driedex ... There are some names that have been given to computer viruses or other attacker threats. Which name is this? What are the places they are? Let's know these interesting story.



    Reason is coding-decoding



    In the early days of computer security studies, the names of viruses and other threats used to be based on the unproductive coding or messages of such attacks.For example, in 1987, the message came with a virus' has been the stone on your computer! Legacy! "So the name of this virus was placed in the stoned DOS. This kind of a year was given in the year 1998, the name was given to the back of the Udesha, because these virus used to be a buddy entry in Windows machines.



    Similarly, the same condition was continuing in the 21st century. Based on the conference of the incoming emails with the virus, a virus was named 'I Love U Virus. 2 of this, the interest or fan was born in the naming. In the 2001, a virus was named' Code Red Worm '. The story behind this name
    was that the researcher was a cold drink during the study of this virus and he named this virus named in the same name. Similarly, the name of the promotion of the name of the promotion of the name was fun.






     Most of the viruses or malware names were cyber resources, but sometimes it happened that these viruses or malware that hackers also named it because they wanted to fame. That's what one of the same commented 'Melissa' virus. This virus had dissolved $ 8 million in March 1999. This name was Hacker David L. Smith gave it and he named this virus named his favorite dancer, who used to dance in adults club in Miami.




    Android smartphones are victims of Christ. Once again, some resources have found a new malware. These malware replicates Android apps from your code. It is not completely, but for some extent the replica is done. According to the report, 25 million Android phones are affected by the worldwide malware of this agent smith name.




    The highest Android device is affected by this malware in India. The report is saying that nearly 1.5 million Android devices are affected by this Malawire. Security firm Check Point has detected Agent Smith Malware. This malware replaces the apps in the smartphone by taking advantage of the vulnerabilities of the Android operating system.




    The scare thing is that it is done without the user's permission. Check Points Mobile Text Detection Research Head Jonathan Schimonovich has said, 'These malware secretly attacks apps installed by users and makes it common for users to find it for Android users'







    This agent Smith shows the advertisement to the users from Broad access in the malware device so that the attacks can benefit it. Although this Malvayer can be used for a big purpose. According to the report, banking credentials i.e. information can be stolen from this malware. You will remember
    about copycat malware, it works in the same way.





    According to the report Agent Smith was first downloaded from a third party app store 9Apps and used to target Hindi, Arabic, Russian and Endosion users





    Check Point Security firm says that agent Smith is the primary victim of malware. Vithim is the other country like this, in the other countries, such as Pakistan and Bangladesh have also influenced. In addition, these malware also targets Android devices of America, Australia and UK. The Security firm has cleared that the company has done the job with Google and now there is no such dangerous app on the Play Store.







    Since these malware threads from the third party app store, you will take care of the avoiding and avoid downloading app from any third party app store.





















  • careful! Your mobile may never stop, this virus is spreading fast in the world



    careful!  Your mobile may never stop, this virus is spreading fast in the world

    There is a new threat in the world of technology.  A new malware known as Silex i.e. devices is harming the world's IoT devices.  IoT means 'Internet of Things' i.e. Devices that have sensors and can transmit data from one object to another object through the Internet.  Similar malware of the name Bricker Boat was spread in the year 2017.  This malware damaged the broadband service of MTNL and BSNS.  Because of this, at least 60,000 modems of BSNL broadband subscribers were affected.  This malware is also harming the devices in much the same way but it is far more dangerous than that.







     This malware is made by a 14-year-old boy whose coding is 'Light Leafon'.  ZDNet's report says that after the attack of this malware, Smart IoT devices are not of any use.  In fact, Silex malware completely spoiled the storage of IoT devices, apart from removing the network configuration of the device, and also destroying the firewall rules completely by spoiling the device 'brick'.









    How does this malware work?


     After the attack of this malware, the user feels that there has been a malfunction in the hardware, while this does not happen.  In order to deal with this attack, the firmware of the user will have to be manually installed again, which is a very difficult task for most users.  It was first detected by Akamai researcher Larry CashDollar.





    Who is behind Silex malware ?

     ZDNet approached the makers of the malware through the experience of the NewSky Security victim, through the experience of the malware, trying to find out further plans.  According to the acclaimed experience, this malware is a 14-year-old teenager who has a pseudo or fake name 'Light Leafon'.






    According to ZDNet's report, Light Leafon said that this work was started in a joke but now it has become a full time project.  He told that he is going to develop this even more dangerously.  Let us know that the attack of the Brick Bot of the year 2017 had affected more than one crore devices.








    Have a Nice Stay Here  :  -  )















  • Top Spam website that you should not visit

    Kumar Atul Jaiswal
    Top Spam website that you should not visit



    The 100 websites most affected by viruses each have about 18,000 nasties to attack net users'
    computers, an internet security company says.

    Simply visiting one of the "Top 100 Dirtiest" websites - without downloading or even clicking
    anything - could expose your computer to infection and put your personal information into the
    hands of criminals, anti-virus software company Norton Symantec says.

    17ebook.com


    The top 100 infected sites had on average 18,000 threats and 40 per cent of the sites
    had more than 20,000 threats.




    www.kumaratuljaiswal.in



    A staggering 75 per cent of websites on the list were found to be distributing "malware"
    for more than six months.

    Malware is malicious software that can damage or compromise a computer system without
     the owner's consent.




    fantasticfilms.ru



    Norton have released a sample of the dirtiest websites:

    17ebook.com

    aladel.net

    bpwhamburgorchardpark.org

    clicnews.com

    dfwdiesel.net

    divineenterprises.net

    fantasticfilms.ru

    gardensrestaurantandcatering.com

    ginedis.com

    gncr.org

    hdvideoforums.org

    hihanin.com

    kingfamilyphotoalbum.com

    likaraoke.com

    mactep.org

    magic4you.nu

    marbling.pe.kr

    nacjalneg.info

    pronline.ru

    purplehoodie.com

    qsng.cn

    seksburada.net

    sportsmansclub.net

    stock888.cn

    tathli.com

    teamclouds.com

    texaswhitetailfever.com

    wadefamilytree.org

    xnescat.info

    yt118.com

    For the rest, users are required to join the Norton Safeweb Community.



  • Bluetooth के जरिए हैक हो सकता है iPhone और Android स्मार्टफोन

    Bluetooth के जरिए हैक हो सकता है iPhone और Android स्मार्टफोन, जल्द करें अपडेट


    search me on google  kumar Atul jaiswal
    Kumar Atul Jaiswal


    अगर आप चाहते हैं कि कोई आपका पर्सनल मैसेज न पढ़े या फिर आपका फोन हैक न करे तो जल्द से जल्द अपने आईफोन और एंड्रॉयड डिवाइस को अपडेट कर लें. क्योंकि एक वायरस स्मार्टफोन के ब्लूटूथ को प्रभावित कर रहा है जिससे कई लाखों स्मार्टफोन साइबर क्रिमिनल्स की पहुंच में है.


    CERT एक अमेरिका की कंप्यूटर इमेरजेंसी टीम है जिसका मानना है कि अगर एपल, गूगल, इंटेल जैसे डिवाइस के हार्डवेयर को अपडेट नहीं किया गया तो इनके हैक होने का खतरा सबसे ज्यादा है.  रिपोर्ट में इस बात की भी जानकारी दी गई है कि जब एक डिवाइस किसी दूसरे डिवाइस से ब्लूटूथ के जरिए कनेक्ट होता है और फाइल को शेयर या ट्रांसफर किया जाता तब डिवाइस के हैक होने का खतरा सबसे ज्यादा होता है.


    इसकी जानकारी तब मिली जब पता चला कि डेटा शेयर करते समय एक 'की' (चाबी) खो गई है जो डिफ्फी हेल्लमैन की एक्सचेंज में मौजूद नहीं थी. लेकिन ब्लूटूथ स्टैंटर्ड के हिसाब से इस चाबी की जरूरत किसी को नहीं है जिसकी वजह से हैकर्स के लिए ये एक खुला मैदान है जहां वो आपके डिवाइस को हैक कर आपकी सारी जानकारी ले सकते हैं.


    क्या है Diffie-Hellman (ECDH) key exchange?



    ये एक ऐसा चैनल होता है जो दो पार्टियों यानी की दो डिवाइस के पास ये अधिकार होता है कि वो एक प्राइवेट चैनल यानी की ब्लूटूथ की मदद से फाइल और डेटा शेयर कर सकते हैं. इसे हम KEY यानी की चाबी के नाम से जानते हैं.


    इस जानकारी के बाद अब कंपनियां अपनी सिक्योरिटी पैच को फिक्स करने में जुट गई है. एपल में पहले ही MacOS को अपडेट कर दिया है तो वहीं आईफोन के लिए iOS 11.4 को भी अपडेट कर दिया है. इंटेल की अगर बात करें तो कंपनी ने विंडोज 7, 8.1 और 10 के ब्लूटूथ ड्राइवर्स को अपडेट कर दिया है.


    गूगल की अगर बात करें तो कंपनी ने कहा है कि हैकर्स को देखते हुए हमने भी क्रोमOS और एंड्रॉयड को अपडेट करना शुरू कर दिया है. तो अगर आपने भी अभी तक अपना स्मार्टफोन नए वर्जन में अपडेट नहीं किया है तो कर लें क्योंकि ब्लूटूथ शेयरिंग के दौरान ज्यादा संभावना है कि आपका डिवाइस हैक हो सकता है.


  • WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    Hacking Truth.in

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.