Category Archives: Let’s talk

Exclusive Interview

Team WordBite [TWB]:

What motivated you to be a model?

Mona Varonica Campbell [MVC]: 


I was inclined towards fashion industry and right from my childhood i always wanted to walk on the runway.when i moved to canada for a short stint,a few local brands approached me and asked me If i could model for them.that kind off boosted my confidence.later when i moved to India ,I got opportunity to walk for a few regional designers – Wajahat Mirza ,a london based designer (season 1 and season 2) as well Faces of africa as a show stopper,these wonderful opportunities given me to be the i could me confidence at any size shape colour and gender,i achieved it.


TWB: How was your journey from giving the auditions for Wendell Rodrick’s Collection to being a show opener?

MVC: I Heard about the auditions happening for plus -size models and was pleased to know that ,it was providing opportunities for Trans- women ,with an encouragement from my family,i went ahead for the auditions for the Lakme platform and got selected as one of the top Finalists in professional runway model category ,And my dream took wing as i came to realization that i was walking to my favorite designer ,Opening and closing his show = Show stopper – wow -wendell rodricks creation ,I am very grateful to lakme for this opportunity . Though wendell was one of the best persons i worked with.he took good care of me at the backstage ,he ensured an exclusive team for hair and makeup.. he was their while we are rehearsing for the show .its a dream to walk such a huge team and he ensured my comfort and attention. I feel proud and confident being the indian first transgender Professional plus size model.


TWB: What inspired you to put up your own makeup label- VAGABOMB? –

MVC: I love makeup Right from my childhood,once I done with Post graduation from LONDON SCHOOLS OF FASHION, I got an opportunity to work with MAC cosmetics canada Ontario ,i worked with them as makeup artist as well trainer,i decided to come back to india(HYDERABAD) started my own Signature label , Called VARONICA MAKEUP ARTISTRY (CELEBRITY SECRETS), my life has changed after Begin with my own Makeup business line,professional makeup artist and created a niche for myself in the Glamour World.

TWB: What difficulties you faced during your journey in Fashion World?

MVC: Fashion industry is not a very easy industry,to survive in.Its a high in competition,as well ,i read about the auditions and i went for it and i am happy that i cracked the auditions with my unique looks and my walk , though i don’t have a godfather.

TWB: Did you face any opposition from your family for modeling?

MVC: Nope my family and friends or my Backbone ,they know my plans and Dreams ,they supported every decision i make myself for my future.

Veronica 01

TWB: Did people around you supported in each and every decision you made?

MVC: Of Course yes they did.

TWB: What are your future plans?

MVC:  One of checklist to be india’s Super model in the Plus size category and bagging the tittle. i want to come up with my own Signature clothing line for plus size women.

TWB: What message would you like to give our readers who might be afraid to show up their true identity due to the fear of acceptance?

MVC: Just be who you are ,believe in yourself ,follow your dreams,be confident ,be bold.

low res 1

TWB: If a young boy/girl wanted to be a model what would you advice to them.

MVC: You guys have to be super fit because you have to look good all the way around,you have to be firm and tight,you might have been the most beautiful girl /boy in your Hometown and now your beautiful fishes in a big pond of beautiful girls and handsome boys and in order to get the greatest jobs,you guys have to look amazing .you have to exercise and eat right even you plus size model, so your nails are beautiful for girls ,your skin ,your hair,other wise you will get mediocre jobs.

Facebook Introduces New Tools To Safeguard Users’ Profile Pictures & It’s Just For India

Facebook has introduced new tools in India that will allow users to protect their profile pictures from being downloaded and shared, a move that may help reduce misuse of images on the popular social networking site.

View image on Twitter

Facebook researchers found that some women choose not to share profile pictures that include their faces anywhere on the internet because they are concerned about what may happen to their images.

The new tools, developed in partnership with safety organisations, including Centre for Social Research and Learning Links Foundation in New Delhi, are designed to give people more control over their experience and help keep them safe online.

“We are piloting new tools that give people in India more control over who can download and share their profile pictures,” Aarati Soman, Product Manager at Facebook, said in a blog post.

“In addition, we are exploring ways people can more easily add designs to profile pictures, which our research has shown helpful in deterring misuse,” Soman said.

“Based on what we learn from our experience in India, we hope to expand to other countries soon,” she said.


Users in India will start seeing a step-by-step guide to add an optional profile picture guard.

When this guard is added, users will no longer be able to download, share or send the profile picture in a message on Facebook. Facebook users who are not your friends will not be able to tag anyone, including themselves, in your profile picture, Soman said.

“Where possible, well prevent others from taking a screenshot of your profile picture on Facebook, which is currently available only on Android devices,” she said.



A blue border and shield will appear around profile pictures as a visual cue of protection.

Based on preliminary tests, researchers found that when an extra design layer is added to profile pictures, other users are 75 per cent less likely to copy that picture.

“We partnered with Jessica Singh, an illustrator who took inspiration from traditional Indian textile designs such as bandhani and kantha, to create designs for people to add to their profile picture,” Soman said.

“If someone suspects that a picture marked with one of these designs is being misused, they can report it to Facebook and we will use the design to help determine whether it should be removed from our community,” she added.

Source: Scoopwhoop

To Write your views about it download WordBite App and start writing, And also to Read/Write more amazing content like this download WordBite App now!

CIA can hack computers/mobiles/TVs not connected to the web

THE NSA, IT seems, isn’t the only American spy agency hacking the world. Judging by a new, nearly 9,000-page trove of secrets of the WikiLeaks, the CIA has developed its own surprisingly wide array of intrusion tools, too.

On Tuesday morning, WikiLeaks released what it’s calling Vault 7, an unprecedented collection of internal CIA files—what appear to be a kind of web-based Wiki—that catalog the agency’s apparent hacking techniques. And while the hoards of security researchers poring through the documents have yet to find any actual code among its spilled secrets, it details surprising capabilities, from dozens of exploits targeting Android and iOS to advanced PC-compromise techniques and detailed attempts to hack Samsung smart TVs, turning them into silent listening devices.

“It certainly seems that in the CIA toolkit there were more zero-day exploits than we’d estimated,” says Jason Healey, a director at the Atlantic Council think tank, who has focused on tracking how many of those “zero-days”—undisclosed, unpatched hacking techniques—the US government has stockpiled. Healey says that he had previously estimated American government agencies might have held onto less than a hundred of those secret exploits. “It looks like CIA might have that number just by itself.”

Mobile Targets

The leak hints at hacking capabilities that range from routers and desktop operating systems to internet-of-things devices. But it seems to most thoroughly detail the CIA’s work to penetrate smartphones: One chart describes more than 25 Android hacking techniques, while another shows 14 iOS attacks.

Given the CIA’s counterterrorism work—and the ability of a phone exploit to keep tabs on a target’s location—that focus on mobile makes sense, Healey says. “If you’re going to be trying to figure where Bin Laden is, mobile phones are going to be more important.”


  • WikiLeaks Just Dumped a Mega-Trove of CIA Hacking Secrets

  • Don’t Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps

  • Worried the CIA Hacked Your Samsung TV? Here’s How to Tell

The smartphone exploits listed, it’s important to note, are largely old. Researchers date the leak to sometime between late 2015 and early 2016, suggesting that many of the hacking techniques that may have once been zero days are now likely patched. The leak makes no mention of iOS 10, for instance. Google and Apple have yet to weigh in on the leak and whether it points to vulnerabilities that still persist in their mobile operating systems. Android security researcher John Sawyer says he has combed the Android attacks for new vulnerabilities and found “nothing that’s scary.”

He also notes, though, that the leak still hints at CIA hacking tools that have no doubt continued to evolve in the years since. “I’m quite sure they have far newer capabilities than what’s listed,” Sawyer says.

Targeting Android, for instance, the leak references eight remote-access exploits—meaning they require no physical contact with the device—including two that target Samsung Galaxy and Nexus phones and Samsung Tab tablets. Those attacks would offer hackers an initial foothold on target devices: In three cases, the exploit descriptions reference browsers like Chrome, Opera, and Samsung’s own mobile browser, suggesting that they could be launched from maliciously crafted or infected web pages. Another 15 tools are marked “priv,” suggesting they’re “privilege escalation” attacks that expand a hacker’s access from that initial foothold to gain deeper access, in many cases the “root” privileges that suggest total control of the device. That means access to any onboard files but also the microphone, camera, and more.

The iOS vulnerabilities offer more piecemeal components of a hacker tool. While one exploit offers a remote compromise of a target iPhone, the WikiLeaks documents describe the others as techniques to defeat individual layers of the iPhone’s defense. That includes the sandbox that limits applications’ access to the operating system and the security feature that randomizes where a program runs in memory to make it harder to corrupt adjacent software.

“Definitely with these exploits chained together [the CIA] could take full control of an iPhone,” says Marcello Salvati, a researcher and penetration tester at security firm Coalfire. “This is the first public evidence that’s the case.”

The leak sheds some limited light on the CIA’s sources of those exploits, too. While some of the attacks are attributed to public releases by iOS researchers, and the Chinese hacker Pangu, who has developed techniques to jailbreak the iPhone to allow the installation of unauthorized apps, others are attributed to partner agencies or contractors under codenames. The remote iOS exploit is listed as “Purchased by NSA” and “Shared with CIA.” The CIA apparently purchased two other iOS tools from a contractor listed as “Baitshop,” while the Android tools are attributed to sellers codenamed Fangtooth and Anglerfish.

In a tweet, NSA leaker Edward Snowden pointed to those references as “the first public evidence [the US government] is paying to keep US software unsafe.”

Internet of Spies

While the leak doesn’t detail the CIA’s attack techniques for desktop software like Windows and MacOS as explicitly, it does reference a “framework” for Windows attacks that seems to act as a kind of easy interface for hacking desktop machines, with “libraries” of vulnerabilities that attackers can swap in and out. It lists attacks that bypass and even exploit a long list of antivirus software to gain access to target desktop machines. And for MacOS, the document references an attack on computers’ BIOS, the software that boots before the rest of the operating system. Compromising that can lead to a particularly dangerous and deep-rooted malware infection.

“This is something we already know that can be done, but we haven’t seen it in the wild,” says Alfredo Ortega, a researcher for security firm Avast. “And by a government, no less.”


The most surprising and detailed hack described in the CIA leak, however, targets neither smartphones nor PCs, but televisions. A program called Weeping Angel details work in 2014 to turn Samsung’s smart TVs into stealthy listening devices. The research notes include references to a “Fake Off” mode that disables the television’s LEDs to make it look convincingly powered down while still capturing audio. Under a “to-do” list of potential future work, it lists capturing video, too, as well as using the television’s Wi-Fi capability in that Fake Off mode, potentially to transmit captured eavesdropping files to a remote hacker.

A tool called TinyShell appears to allow the CIA hackers full remote control of an infected television, including the ability to run code and offload files, says Matt Suiche, a security researcher and founder of the UAE-based security firm Comae Technologies. “I would assume that, by now, they would definitely have exploits for Samsung TVs,” Suiche says. “This shows that they’re interested. If you’re doing the research, you’re going to find vulnerabilities.” Samsung did not respond to WIRED’s request for comment.

The fact that the CIA mixes this sort of digital espionage with its more traditional human intelligence shouldn’t come as a surprise, says the Atlantic Council’s Healey. But he says the sheer volume of the CIA’s hacking capabilities described in the WikiLeaks release took him aback nonetheless. And that volume calls into question supposed limitations on the US government’s use of zero-day exploits, like the so-called Vulnerabilities Equities Process—a White House initiative created under President Obama to ensure that security vulnerabilities found by US agencies were disclosed and patched, where possible.

If Vault 7 is any indication, that initiative has taken a back seat to assembling a formidable array of hacking tools. “If the CIA has this many,” Healey says, “we would expect the NSA to have several times more.”


To Write your views about it download WordBite App and start writing, And also to Read/Write more amazing content like this download WordBite App now!


39 IAS officers under scanner for alleged corruption

New Delhi, Jun 27 (PTI) As many as 39 IAS officers are under investigation for their alleged involvement in corruption and other irregularities.

The Department of Personnel and Training (DoPT), which acts as a nodal authority for Indian Administrative Service (IAS) officers, is conducting the proceedings, official sources said today.

Besides the 39 IAS officers, 29 from the Central Secretariat Service are also facing disciplinary proceedings. Enquiries have started against the 68 officers, some of them working at a senior level, on the basis of complaints against them and also after reviewing their service records, the sources claimed.


 The central government is conducting a review of its staff as part of the governments efforts to further improve the service delivery and governance system. According to norms, a government employees performance is reviewed twice during service — 15 years after qualifying for the service and then after 25 years — to remove deadwood from the system.

In the last one year, the Centre has given compulsory retirement to 129 non-performing employees, including IAS and IPS officers. It has also undertaken an exercise to review the service records of about 67,000 employees to identify non-performers.

Nearly 25,000 of these are from all India and Group A services — including the IAS, Indian Police Service (IPS) and Indian Revenue Service (IRS).


Mandatory to link Aadhaar with PAN card from July 1: government

New Delhi: The central government has issued a notice making it mandatory to link existing Aadhaar numbers with permanent account number (PAN) of taxpayers with effect from July 1.

The government has amended the income tax rules and has made Aadhaar a must at the time of application of PAN.

Finance minister Arun Jaitley through an amendment to tax proposals in the Finance Bill for 2017-18 had made Aadhaar mandatory for filing income tax returns and provided for linking of PAN with Aadhaar to check tax evasion through use of multiple PAN cards.


The revenue department said “every person who has been allotted PAN as on July 1, 2017, and who in accordance with the provisions of sub-section (2) of section 139AA is required to intimate his Aadhaar number, shall intimate his Aadhaar number to the principal director general of income tax (systems) or DGIT (systems)”.


Besides, it entrusted principal DGIT (systems) or DGIT (systems) with specifying the formats and standards along with procedure for verification of documents filed with PAN application or intimation of Aadhaar number.

The rules will come into force from July 1, 2017, the revenue department said while amending Rule 114 of the I-T Act, which deals in application for allotment of PAN.

As many as 2.07 crore taxpayers have already linked their Aadhaar with PAN+ .

There are over 25 crore PAN card holders in the country while Aadhaar has been issued to 111 crore people.

Earlier this month, the Supreme Court had upheld the validity of an I-T Act provision making Aadhaar mandatory for allotment of PAN cards and ITR filing, but had put a partial stay on its implementation till a Constitution bench addressed the issue of right to privacy.

Pursuant to this, the Central Board of Direct Taxes (CBDT) had said the linking of Aadhaar and PAN will be a “must” for filing of income tax returns (ITR) and obtaining PAN from July 1.

While Aadhaar is a biometric authentication issued by the UIDAI, PAN is a 10-digit alphanumeric number alloted by the I-T department to individuals and entities.

To Write your views about it download WordBite App and start writing, And also to Read/Write more amazing content like this download WordBite App now!