Skip to main content

Posts

India Passes New Drone Rules 2021 with Relaxed Norms

Source : media.wired.com   In March this year, the Ministry of Civil Aviation (MoCA) published the Unmanned Aircraft Systems (UAS) rules applicable for drones. Considering the restrictive nature and excessive paperwork proposed in the rule, the Indian government has revised it with a liberalized version. The number of forms in the new rules has been decreased from 25 to 5 and the government has reduced the types of fees from 72 to 4. New Drone Rules in India (2021) : “The new Drone Rules will tremendously help start-ups and our youth working in this sector. It will open up new possibilities for innovation & business. It will help leverage India’s strengths in innovation, technology & engineering to make India a drone hub,” wrote Prime Minister Narendra Modi on Twitter. Notably, the government will publish an interactive airspace map in a digital sky platform with green, yellow, and red zones within 30 days of the publication of these rules. Here, the green zone refers to airspa

Do Everything Faster With These Keyboard Tricks

It may not seem like a second or two would make a big difference in your workday. But seconds add up up to minutes, and the momentum of being able to strike a few days and keep trying makes an impact that's difficult to quantity. That's why I try to avoid using my mouse whenever possible: the more I can do without taking my hands off the keyboard, the quicker I can keep plugging away on the important stuff. The Keyboard Shortcuts You Should Know: Let's start with the basics: learn as many keyboard shortcuts as your brain can store. You probably know a few (Ctrl+C to copy and Ctrl+V to paste, for example), but there are dozens of others that can replace the clicks you make all day long. Here are a few I can't live without: The Windows key  (or  Command+Space  on a Mac): If you need to launch a new app, don't go clicking through your Start menu or Applications folder. Just press the Windows key—or hit Commnand+Space on a Mac—and start typing the name of the app in que

97% of organizations faced mobile malware attack in 2020: Checkpoint report

In 2020, Check Point found a 15% increase in banking Trojan activity, where users’ mobile banking credentials are at risk of being stolen. (Pixabay) The year 2020 saw an exponential increase in cyber attacks. Reports in the past have detailed the scope of the cyber attacks in the era of the pandemic. Now, a new report says that most of the organizations around the globe faced mobile malware attacks in 2020. Cybersecurity firm Checkpoint Technologies, today published its 2021 Mobile Security Report, which is based on data that was collected from January 1, 2020, to December 31, 2020, from 1,800 organizations around the globe. As per the report 97% of organizations facing  mobile threats f rom several attack vectors in the past year. The report also said that almost every organization experienced at least one mobile malware attack in 2020. 93% of these attacks originated in a device network, which attempts to trick users into installing a malicious payload via infected websites or URLs,

Security Flaw in Apple’s AirDrop Can Leak Your Personal Info to a Stranger

Apple’s AirDrop is one of the most popular and fastest file-transfer functionalities that lets iOS, iPadOS, and macOS users seamlessly transfer files and data between devices. Now, as per a recent report, a significant security flaw in the AirDrop system  could potentially expose the user’s private information  to a stranger in their Wi-Fi range. AirDrop Security Flaw Discovered by security researchers at the German University’s Technische Universitat Darmstadt, the vulnerability is pretty dangerous for Apple users. The researchers first raised the issue with Apple back in 2019. However, recent reports by the researchers state that the Cupertino giant still hasn’t addressed the issue, even though more than 1.5 billion Apple users are affected by it. Coming to the vulnerability, it resides in Apple’s proprietory AirDrop system and has the potential to expose a user’s phone number and email address to a stranger who is in Wi-Fi range. And what makes the flaw even more dangerous is that t

NitroRansomware Demands Discord Gift Codes

NitroRansomware, the newest ransomware on the block, has been discovered demanding Discord Nitro gift codes from victims. Discord Nitro is a subscription plan that costs $9.99 and offers various features to its users. It is unusual for ransomware actors to be demanding gift codes instead of actual money. A twist in the ransomware tale The ransomware was first discovered by  MalwareHunterTeam , and  other researchers  looked into how the code works. The new strain is being distributed as a free gift code generator for Discord Nitro. After the ransomware executes, it encrypts the victim’s file and provides a three-hour time limit to provide a valid Discord Nitro. However, the three-hour limit is scareware. It adds the .givemenitro extension to the encrypted files and at the end of an encryption process, the ransomware will modify the user’s wallpaper to an evil or angry Discord logo. In addition, the ransomware verifies that the provided Discord gift codes are correct and then decrypts t

Indian Startup Community Prefers WhatsApp over Slack and Telegram

Communication is the key in any business and it can either make or break a company especially in its early stages. With modern advancements in technology, there is no doubt that the platforms for communication has expanded. In the meantime, a dilemma for choosing a platform that suits the best for the community has arisen. In a recent tweet by Vijay Anand – founder and CEO of Startup Centre, WhatsApp seems to be the preferred channel for Indian startups. Mr. Anand started the Twitter poll asking his followers to choose a “good channel to create a real-time startup group for the community” from options including WhatsApp, Telegram, Slack, and Discord. 270 people responded to the poll and among the respondents, 37% of people chose the Facebook-owned WhatsApp messaging platform. Slack, the app that serves as a complete package for work-related discussions and collaborations came second with 29% votes. Telegram closely follows Slack as 27% of respondents chose it to be their preferred

5 Steps to Protect Yourself Online from Hackers

In the present day world we provide almost all our data online, so it is important to take some safety measures that'll help you to stay safe from hackers online. Here are few tips that might help you to do so : Use 2 Factor Authentication You should use 2 factor Authentication, because 2 factor authentication adds an extra layer of security to your account. If you have 2 factor authentication turned on in your account then you not only need the username & password but also the code (OTP), that will be sent by the site to your registered mobile number. So even if the hacker manages to get your password, he will not be able to gain access to your account because the site will only text the code to the registered mobile number (your number). Although this 2 Factor Authentication can also be bypassed! Don't Use the Same Password Everywhere You should not use the same password for all your social media accounts because even if a hacker guesses the password for one particular a

Developer Successfully Boots Ubuntu On An iPhone 7

Using Android on iPhones has been one of the hot topics among modern-day enthusiasts. Yesterday, a developer on Reddit with the username newhacker1746 got Ubuntu running on an iPhone 7 with the help of chekra1n jailbreak. This didn’t come as a huge surprise as developers of the Project Sandcastle could run Android on iOS before this. Still, what did surprise us was that the developer managed to run the full-fledged graphical shell of the GNOME desktop environment on the device. It turns out the developer used a custom  Linux kernel from Project Sandcastle  to boot the Ubuntu instance. Moreover, the developer also shared a  comprehensive guide  on how to boot into Ubuntu on iPhone 7. The best part of the tutorial is, you don’t need to jailbreak your iPhone to follow the process. Another thing to note is that the developer didn’t alter what’s in the storage. Instead, he network-booted it. Released in 2016, iPhone 7 was one of the most sold iPhone models after iPhone 6/6+ and iPhone 8. It

Hacking Passwords and Webcams & more with Google Dorks

So normally, when you search for something on the Internet , what will you do ? You use a search engine like Google, and search for something. When you make a search, Google shows you all the matching, appropriate search results, and you can choose what website you want to visit from the search results. How does Google know these websites or webpages? The primary job or functionality of any search engine is to gather information about different websites by crawling through them using softwares or bots called spiders or crawlers . When a website is developed and is ready for deployment, the admin submits his/her website to Google Search (or any number of search engines) asking Google to include his/her website in the search results as well. This is the first time when Google gets to know the web address of that particular website. It then crawls through the submitted website. Crawling is nothing but following all the publicly available links (or pages) on the website. Google crawls thr