Tuesday, May 14, 2019

The World’s First Foldable Laptop

If anybody doubts yet whether or not we would see more devices this year with folding panels, let me clarify that the well-known Chinese brand Lenovo just released a huge bombshell. Yes, Lenovo has just launched the brand new ThinkPad X1, because it is the world's first foldable laptop.

However, it is quite surprising because nobody expected it as we all know that South Koreas ' giant Samsung did the Galaxy Fold, and Huawei with his Mate X, as the majority of rumors are that smartphones were turned into tablet paneln using the technology and the possibilities of the folding screen.

This enables the processor to completely and randomly change some of the aspects of its architecture, so that an assailant never knows exactly what it is trying to do. But, above all, MORPHEUS is very fast and with very low consumption of resources able to do this job.

In essence, it is important to make sure that the all-new MORPHEUS processor changes some components in its Code called "Undefined Semantics." This component simply means the location of the program code, size and content.

If an attacker wants, then he / she will not be able to locate these data permanently when 50ms later he / she will have switched to other values, if any, which are usually fixed. This rate of code reordering is several times greater than the most modern and powerful hacking techniques currently used with existing processors.

MORPHEUS architecture has been installed in an open source chip for the development of prototypes, for a proof, in a processor with RISC-V architecture. This processor made MORPHEUS one of the world's most aggressive hackers techniques underwent "Control-Flow" attacks. And it was just able to overcome all the attacks that were successful.
Before you become excited, this brand new Lenovo ThinkPad X1 is only a preview, as this device will be sold in 2020. That's why the renowned Chinese company Lenovo just gave details that we will find this laptop because it focussed everything on the folding screen and its extraordinary possibilities.

During the' Accelerate' event in Florida, United States, Lenovo presented the all-new ThinkPad X1 where he made the first demo of this ThinPad X1, which is not only a laptop but will also be the beginning of a series of products which will share the folding screen.

It is true, however, that ThinkPad X1 is not its final name, and now if we discuss their features let me clarify that they will have an OLED 13 inch screen produced with a 2 K resolution of the South Korean Giant LG display.

It is also an' Always Connected, Always On' laptop, so it's always enabled and connected, with an Intel processor and Windows 10 OS surprisingly, but details on the processor and Microsoft version of the operating system have not yet been provided. It is based on Lenovo's folding technology, which is the same technology we saw in its rolled-out TV that LG Display has been developing. It will also support Stylus.
It's not a smartphone, a tablet, a convertible, Lenovo says, because it's a folding computer that combines laptop productivity and smartphone portability. Before the announcement, some well-known US media portals had already been tested by this ThinkPad X1 prototype and justified what Lenovo did and how it is.

The most surprising thing however, is that the folding area was not seen, as a material used throughout the external body of the unit, the hinge was hidden externally, which makes the device even more premium.
The screen doubles as Lenovo promises and does very well, according to the well-known media platform, The Verge. Windows is functioning well enough although details such as hardware improvements still need to be polished. Although the famous Chinese brand Lenovo says all of these things that the ThinkPad X1 will be sold in 2020, and we shall know the rest of the details of the new foldable laptop before the end of this year or the start of next year.

So, what do you believe? Just share in the comments section below all your thoughts and views. And if you liked this post, don't forget to share it with family and friends.

The World’s First Unhackable Processor

A group of investigators at the University of Michigan, United States, has claimed that the first unhackable processor in the world, called MORPHEUS, has been successful.

A new, unhackable processor is able to run data encryption so quickly that its algorithms are changed faster than hacker can, which means that the security of the current processors is far greater than the defense mechanisms.
The huge number of serious vulnerabilities found in AMD processors and, in particular, Intel were able to stand out last year 2018. As well-known defects such as Meltdown, Specter and recently PortSmash and SPOILER have led both companies ' researchers crazy in trying to solve them.

A team of scientists from the University of Michigan, led by Todd Austin, has recently presented their new processors architecture known as MORPHEUS, which can block attacks on the device manufacturer on which they are mounted.

To achieve this, the processor is able to completely and randomly modify certain aspects of its architecture so that an attacker never knows exactly what he or she is trying to access. More importantly, however, MORPHEUS is capable of doing this very fast and with low consumption of resources.

In general, the key to ensuring the safety of the all-new MORPHEUS processor is that the processor changes certain components of its so-called' undefined semantics.' This component refers simply to the location of the program code, its size and content.

So if any, an attacker wants to use these usually fixed data, they can not find them permanently because 50 meters later they have changed to other values. The attacker will not be able to find them again. This rate is several times greater than the most modern and strong hacking techniques used today by current processors. This rateofre-ordering the code.

The MORPHEUS architecture is an open source chip which is widely used in the development of prototypes and was installed for a demonstration in a processor with RISC-V Architecture. This processor was one of MORPHEUS ' most aggressive techniques used by hackers in the world, called Control-Flow attacks. And it managed simply to surmount all the attacks that were successful.
The system. The system. Nevertheless, scientists have developed MORPHEUS and claimed that the costs and randomness of the coding are only 1 percent depending on the uses of the device. This also includes an attack detector that analyzes whether any of these can occur and speeds based on these data.

So, what do you believe? Just share in the comment section below all your opinions and thoughts. And if you liked this post, just don't forget to share it with family and friends.


The processor can thus completely and randomly change aspects of its architecture so that an assailant never knows exactly what he / she is trying to access. MORPHEUS can do that task however, most importantly, extremely fast and with a very low consumption of resources.

Basically, the key to ensuring that the entire new MORPHEUS processor is available is that it modifies some parts of its code called' undefined semantics.' This is the place, size, and content of the program code. This part simply refers to

Therefore, if an attacker wishes, he / she will not find the data permanently if they are used, since 50ms later he / she will have changed to other values. This rate is several times higher than the most advanced and powerful hacking techniques used today with current processors.

For the demonstration, the MORPHEUS architecture was installed in a RISC-V architecture, an open source chip which is widely used in prototypes development. MORPHEUS suffered a "control flux" attack with this processor, which is one of the world's more aggressive hacker techniques. And it simply succeeded in overcoming all of the successful attacks.

New WPA3 vulnerabilities allow Wi-Fi password stolen hackers

Dragonblood vulnerabilities found in the WPA3 WLAN protocol
Last year, after the exploit of the KRACK (Key Reinstallation Attack) which affected nearly every WIFI supported device, the WPA3 released the next WLAN WLAN (Wi-Fi Protected Access 3). WPA3 was introduced to protect the Wi-Fi devices and provide Wi-Fi network authentication and encryption from attacks by brute-force dictionaries.

Although WPA3 uses a "dragonfly" handshake which makes a network password almost impossible for attackers to break out, Mathy Vanhoef (NYUAD), and Eyal Ronen (Tel Aviv University & KU Leuven), two security researchers, have detected new vulnerabilities in the WpA3 Personal Protocol, which allows an attacker who is in the victim's range to access the encrypted network traffic and to re-shape them.

"Attackers can read information, which WPA3 is supposed to encrypt safely. The researchers explained, in their paper, Dragonblood: a Security Analysis for WPA3 SAE Handshake, that the use of sensible transmitted data, such as credit card numbers, passwords, chat messages, e-mails etc, can be abused.

The scientists discovered two different types of WPA3 design faults, in which both faults can be exploited to recover the WiFi Network password. The first type of attacks is downgrade and the second type is side channel leaks, which reveal information concerning the password.
The first failure is the downgrade on WP3 because of a transition mode, which allows the network to support WPA2 and WPA3 simultaneously.

"Our downgrade attack allows an adversary to force a client to execute part of the WPA2 4-way handshake which can later be used to attack partial WPA2 handshake by a traditional brute force. We also found downgrade attacks on the handshake of Dragonfly, which could lead to a malfunction to force a victim to use a lower elliptical curve than normal, "the researchers added.

The second fault of side-channel leaks allows attackers to launch side-channel attacks based on caching and timing due to the Dragonfly handshake vulnerabilities.

"The Dragonfly password encoding method is target of our side channel attacks. The cache attack uses the hash-to-curve algorithm of Dragonfly and our timing-based attack takes advantage of the hashto-group algorithm. In the same way that the information leaked in these attacks could be used to attack with a password that is similar to a dictionary attack. "Similar to dictionary attacks, the side channel attacks are cost-effective and cost-effective. You could brutize all 8-character lowercase passwords requiring less than 40 Amazon EC2 hand-shakes and a value of US$ 125.

In addition, Cache-based Side-Channel Attack CVE-2019-9494 allows attackers to use the victim machine with unprivileged code. It allows attackers to determine the branch of the first password generation iteration. This can then be used to perform a partitioning password attack (similar to an offline dictionary attack).
Similarly, timing-based CVE-2019-9494 side channel attack allows an attacker to attack the password coding algorithm remotely. This lets an attacker determine the number of iterations needed for the password encoding. Recovered information can then be abused to perform an Offline Dictionary Attack-like password partitioning.

The following four different instruments were created by the two researchers to detect the vulnerabilities of Dragonblood found in WPA3:

  • Dragonslayer: implements EAP-pwd attacks (so soon to be released).
  • Dragondrain: this tool can be used to test how a denial of service attacks against the SAE handshake of WPA3 could extend the access point.
  • Timing Attacks against a SAE handshake: this is an experimental tool, if MODP Group 22, 23, or 24 is used. Note that these groups are not enabled by most WPA3 implementations by default.
  • Dragonforce: This is an experimental tool that takes the information from our attacks by time or cache, and attacks the password. It's like a dictionary attack.

"Almost all our attacks go wrong with the encoding method of SAE's password, that is, its hash-to-group and hash-to-curve algorithms. Focused, it would have prevented most of our attacks by simply changing that algorithm, "the researchers say.

The duo informed WLAN of their findings and said that all flaws can be addressed by updates on software, a non-profit organization that decides on WLAN standards, which recognizes the flaws. They work with suppliers to repair existing WPA3-certified devices.

"Software updates require no changes that affect Wi-Fi interoperability. For more information, users can visit their device provider websites, "says the Wi-Fi Alliance in its press release.

Best Android Game Hacker 2019 Apps

There are currently plenty of apps on the Google Play Store. They are mostly free and the others premium. But Android users are looking at new apps and games ever more frequently. Since the operating system is open source, users can extend the operating system functions using certain apps.

Most of the app we love often comes with a high-end slogan. Not only applications, but games can also be purchased in-app. There are a number of levels or levels that are hard to pass when talking about the games. Whether you're good in the game doesn't matter but we sometimes feel hopeless.

You might know that some methods are available for hacking in-app purchases if you like to play games on your Android smartphone. We talk about the items in the game that can help you progress faster. Something such as coins, credits, tokens, etc. can happen.

1 Lucky Patcher

Lucky Patcher is without doubt one of the best Android operating system game hacker applications available. In fact, the app is very popular among Android gamers and can pull almost all popular games there from in-app purchases. You can also use the lucky Patcher apk not only to remove ads from games, check the license, change the characteristics etc. So, it's one of Android's Best Game Hacker Apps.

2 XMODGames

XMODgames is another Best Game Hacker Apps for Android in 2019 which allows users to hack/bypass in-app purchases of almost every popular games. The best thing about XMODgames is that it works perfectly on Android and iOS and it can hack game resources of both platforms. By using XMODgames, you can get unlimited points, coins, gems or anything which could remove the barrier within the game to progress.

3 Game Killer

Game Killer is yet another advanced Android 2019 Game Hacker app that works on a smartphone rooted in Android. However, no online game can be hacked or bypassed. The App offers online game hacking and can aid you in gaming resources that are unlimited. Not only that, with Game Killer Apk you can also modify game items. So Game Killer is another top-of - the-range Android 2019 game hacker application.

4 Gamecih

Gamecih isn't a game-haking application exactly, and it's like software that's cheating. You can download and use the application free of charge and modify various game variables. The application can also trick online games and can use them to alter the game's characters, change the score, hack game items and more. However, Gamecih is used only to hack offline games by an Android device.

5 SB Game Hacker

SB Game Hacker Apk is available on your Android smartphone for people that want to make free in-app purchases. SB Game Hacker is a fantastic Android application that can help you make some of Google Play's popular games available. Not only, but it also allows users to open premium app capabilities. SB Game Hacker. So, it's one of Android's best game hacker apps 2019.

6 Game Guardian

Game Guardian is another app that's interesting enough for hacking items in the game. The app is best for online and offline games. The Game Guardians interface is also quite good, and provides simple ways to hack items in the game. You can hack almost all popular Android games there with Game Guardian Apk.

7 Freedom App

Freedom Apk is designed for those who seek to hack any android game. Basically, the app is free and there are no hidden charges. But root access to work is needed for the app. So, an Android rooted device is compulsory here. Besides these, almost every popular Android game on the Internet can be hacked in the app.

8 Creehack

Creehack is another popular 2019 game hacker application known for its online gaming command. You can use Creehack apk to obtain unlimited play resources such as limitless golds, limitless points, coins, etc. In addition, both offline and online games are supported by a Creehack interface that is very simple and easy to use. So, creehack's another best Android 2019 game hacker app.

9 Cheat Engine

When you're looking for a best game hacker without a root for Android 2019, then Cheat Engine Apk for Android can't beat anything. The app also features a PC version with many exceptional features. Not only that, but the app can hack online as well as offline Android games. By using Cheat Engine for Android you can modify gaming items and obtain limitless gaming resources.

10 Hacker Bot

Hacker Bot facilitates the modification of Android apps and games. Not only that, but also Hacker Bot can cheat on you and provide premium features for any app or game. Hacker Bot is actually a search engine that helps users download modeled applications, unlocked applications, cracked applications, etc. So, his other best Android 2019 game hacker apps you can use

Windows 10 File Explorer Recent File Remove or Disable

The Windows 10 file explorer is one of the tools of Microsoft's technology giant operating system, which is used daily by most users. And from there alone, all folders and files on the disk can be browsed and new elements can be created.

However, the browser received some features and changes with the arrival of Windows 10, although it was stated that the tech giant Microsoft was going to work to replace the current browser with a much more modern version. We have to wait anyway, but in the meantime, some features are not liked by all users. Then we'll simply show you how to hide new Windows 10 or any version of the latest files.
For some users, therefore, it can be helpful, while it can be a feature that can generate certain privacy issues for other users of Windows 10 that a file browser displays a list of recent files. When we share our PC with others, everybody can see the files we opened or created recently by simply opening a Windows 10 browser.


How does Windows10 Explorer hide, delete or disable recent files?

Specifically, simply open the file explorer, so we usually see how quick access elements appear and a list of all recent files are displayed just below. Basically, we are going to show all of you how to delete or hide them in various ways by stored information in cache form.
One is manually deleting them and for this we first have to open a window Windows 10 Run which we can just do by pressing "Win+R," then just type %AppData% \Microsoft\Windows\Recent and click OK. Now in the path, where Windows 10 saves the recent filename list, you get a file browser window. Now, just select all the window elements, hold down the shift key and click Delete button to remove all elements.
However, recent files in Windows 10 from the browser itself may also be deactivated or hidden. And to do so, just click on the View menu option > Options > Changing the folder and search options and then choose the General tab on the opening window.

Now we have to uncheck the files that have been used in the Quick Access box on the Show Privacy section and then simply implement the changes and accept them as active. We can uncheck the Show folders, which are also frequently used, if we want.
Another easy way to hide recent files from the Windows 10 browser is by clicking "Win + I" on the Windows 10 Settings page to go to the Customize option > Start. There, we have to find the option Show newly opened items in the Start or Taskbar Jump Lists, and then simply click to turn it off.

Tuesday, May 7, 2019

Most hacked passwords disclosed in the world

The NCSC, of course, recently, has recently revealed the most' hacked' passwords in the world to the British National Center for Cybersecurity.

The survey by the center simply indicates that many users are unable to avoid cybercrime, as 42% expect the money to be lost due to electronic fraud. At the same time, only 15% know how to protect themselves against harmful internet operations.
While the study concludes that less than half the people surveyed use a safe password, they are often very easy to imagine, with a list of 100,000 more hacked passwords accompanying their conclusions.

The most interesting thing, nevertheless, is that "123456" is the most uncertain password ever, as 23,2 million cybercriminals have had it. The first letters of the top line of the keyboard,' password' and' 111111,' followed, of course, by' 123456789' and' qwerty.'

In addition, the latest report simply warns of the danger of using the name of our soccer teams or of our favorite bands for the protection of your confidential data in the web.

In fact, the word "liverpool" has been used by more than 280,000 British Internet users as passwords. Chelsea' and not only that even' arsenal' were on the list in the top three names of soccer teams which were used to protect personal data.
The bands of' Blink 182,'' 50 cent,'' Emmin','' Metallica' and' Slipcnot' are among the names which are commonly used as unsafe passwords. Superman is also revealed by Naruto, Tigger, Pokemon and Batman as the most popular character among the names used in passwords.

In addition Ian Levy, the Center's Technical Director, of course, advised that "be creative and use unforgettable words to make people feel that you have your password." So what do you think about this? What do you think about it? Just share in the comment section below all your opinions and ideas. And if you liked this post, don't forget to share it with family and friends.

Why should you use two factor authentication?

The large amount of personal information we generally store on our smartphone simply makes it a key factor for security. Because it is not enough to search for the protection when selecting the device you'll buy, you must keep it after you have started using methods such as the smartphone's full backup.
While they are unknown, your Android smartphone should begin to use other safety systems. Therefore, we will discuss two-factor authentication in this article, a method used in all of your accounts by more and more digital platforms. So, let's start now and explore the entire explainer we mentioned below. Without wasteful time.
What is two-factor authentication?
Imperva
Dual factor authentication is also called Multi-factor authentication, it is a system which adds an additional security layer when logging into different Internet services with your accounts.

The relevance of this approach has increased enormously in recent years, and has already been adopted by companies such as tech giant Google, which has announced two changes to its verification to make its use easier.

Thanks to this system, as this security measure simply will ask for something else with your password to login. The system asks you to confirm your identity with a different factor when entering your account.

The most common method can be by using the code sent to your mobile phone via SMS or call, but other services also enable other tools, such as a security key or fingerprint. However, as we said, most platforms simplify the process by sending your phone a six-digit code.

You must be allowed to log in permanently after you have received it. In two ways, authentication will be started when you want to enter your account from a different device, simply to check whether or not it is you actually.

You don't have to deal with any complication to start using this system, as you can enable it from any digital services ' security settings. Although it might sound strange, the authentication of two factors is something you have used throughout your life. For example, it is common to request the CVV code that appears at the back of your card when using your banking card for a transaction.

Why should you use authentication by two factor?

When you start using your smartphone, a Google account or social networks such as Instagram, you must always set up a password. You simply place all your confidence in this code, although sometimes you may not fully be conscious of the value of your personal data's numbers and figures.

Unfortunately, the password is not always hard, even Google's tech giant makes it easier than you can imagine to theft on its website. As a hacker, you can easily devise your code and use it to enter your account.

In addition, in many cases, you can use the same password to allow you to access all of the services easily. But just think, as we said before, of cyber criminals that what they can do and how much impact they will have.

But you should stop worrying about two-factor authentication, as if someone knows their passeword then that doesn't mean anything, since they still need your telephone or a security password to enter your account. That is the main reason why apps such as WhatsApp have two-factor authentication to provide you with greater security.

Since this security system is very important in these days, methods such as phishing will allow you to provide your hacker access codes without knowing them. If you have enabled the two-factor authentication, then the passworder is unnecessary, simply because of the extra layer of security, if you have your password, that doesn't mean anything.

Basically, authentication with two factor is always safer than just a password, and you can do that in your accounts for enough reason. So, what do you believe? Just share in the comment section below all of your views and thoughts. And if you liked this post, don't forget to share this post with your family and friends.