Category Archives: Let’s talk

Facebook Introduces New Tools To Safeguard Users’ Profile Pictures & It’s Just For India

Facebook has introduced new tools in India that will allow users to protect their profile pictures from being downloaded and shared, a move that may help reduce misuse of images on the popular social networking site.

View image on Twitter

Facebook researchers found that some women choose not to share profile pictures that include their faces anywhere on the internet because they are concerned about what may happen to their images.

The new tools, developed in partnership with safety organisations, including Centre for Social Research and Learning Links Foundation in New Delhi, are designed to give people more control over their experience and help keep them safe online.

“We are piloting new tools that give people in India more control over who can download and share their profile pictures,” Aarati Soman, Product Manager at Facebook, said in a blog post.

“In addition, we are exploring ways people can more easily add designs to profile pictures, which our research has shown helpful in deterring misuse,” Soman said.

“Based on what we learn from our experience in India, we hope to expand to other countries soon,” she said.

newPosterfinal

Users in India will start seeing a step-by-step guide to add an optional profile picture guard.

When this guard is added, users will no longer be able to download, share or send the profile picture in a message on Facebook. Facebook users who are not your friends will not be able to tag anyone, including themselves, in your profile picture, Soman said.

“Where possible, well prevent others from taking a screenshot of your profile picture on Facebook, which is currently available only on Android devices,” she said.

 

Source:Google

A blue border and shield will appear around profile pictures as a visual cue of protection.

Based on preliminary tests, researchers found that when an extra design layer is added to profile pictures, other users are 75 per cent less likely to copy that picture.

“We partnered with Jessica Singh, an illustrator who took inspiration from traditional Indian textile designs such as bandhani and kantha, to create designs for people to add to their profile picture,” Soman said.

“If someone suspects that a picture marked with one of these designs is being misused, they can report it to Facebook and we will use the design to help determine whether it should be removed from our community,” she added.

Source: Scoopwhoop

To Write your views about it download WordBite App and start writing, And also to Read/Write more amazing content like this download WordBite App now!

CIA can hack computers/mobiles/TVs not connected to the web

THE NSA, IT seems, isn’t the only American spy agency hacking the world. Judging by a new, nearly 9,000-page trove of secrets of the WikiLeaks, the CIA has developed its own surprisingly wide array of intrusion tools, too.

On Tuesday morning, WikiLeaks released what it’s calling Vault 7, an unprecedented collection of internal CIA files—what appear to be a kind of web-based Wiki—that catalog the agency’s apparent hacking techniques. And while the hoards of security researchers poring through the documents have yet to find any actual code among its spilled secrets, it details surprising capabilities, from dozens of exploits targeting Android and iOS to advanced PC-compromise techniques and detailed attempts to hack Samsung smart TVs, turning them into silent listening devices.

“It certainly seems that in the CIA toolkit there were more zero-day exploits than we’d estimated,” says Jason Healey, a director at the Atlantic Council think tank, who has focused on tracking how many of those “zero-days”—undisclosed, unpatched hacking techniques—the US government has stockpiled. Healey says that he had previously estimated American government agencies might have held onto less than a hundred of those secret exploits. “It looks like CIA might have that number just by itself.”

Mobile Targets

The leak hints at hacking capabilities that range from routers and desktop operating systems to internet-of-things devices. But it seems to most thoroughly detail the CIA’s work to penetrate smartphones: One chart describes more than 25 Android hacking techniques, while another shows 14 iOS attacks.

Given the CIA’s counterterrorism work—and the ability of a phone exploit to keep tabs on a target’s location—that focus on mobile makes sense, Healey says. “If you’re going to be trying to figure where Bin Laden is, mobile phones are going to be more important.”

VAULT 7

  • WikiLeaks Just Dumped a Mega-Trove of CIA Hacking Secrets

  • Don’t Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps

  • Worried the CIA Hacked Your Samsung TV? Here’s How to Tell

The smartphone exploits listed, it’s important to note, are largely old. Researchers date the leak to sometime between late 2015 and early 2016, suggesting that many of the hacking techniques that may have once been zero days are now likely patched. The leak makes no mention of iOS 10, for instance. Google and Apple have yet to weigh in on the leak and whether it points to vulnerabilities that still persist in their mobile operating systems. Android security researcher John Sawyer says he has combed the Android attacks for new vulnerabilities and found “nothing that’s scary.”

He also notes, though, that the leak still hints at CIA hacking tools that have no doubt continued to evolve in the years since. “I’m quite sure they have far newer capabilities than what’s listed,” Sawyer says.

Targeting Android, for instance, the leak references eight remote-access exploits—meaning they require no physical contact with the device—including two that target Samsung Galaxy and Nexus phones and Samsung Tab tablets. Those attacks would offer hackers an initial foothold on target devices: In three cases, the exploit descriptions reference browsers like Chrome, Opera, and Samsung’s own mobile browser, suggesting that they could be launched from maliciously crafted or infected web pages. Another 15 tools are marked “priv,” suggesting they’re “privilege escalation” attacks that expand a hacker’s access from that initial foothold to gain deeper access, in many cases the “root” privileges that suggest total control of the device. That means access to any onboard files but also the microphone, camera, and more.

The iOS vulnerabilities offer more piecemeal components of a hacker tool. While one exploit offers a remote compromise of a target iPhone, the WikiLeaks documents describe the others as techniques to defeat individual layers of the iPhone’s defense. That includes the sandbox that limits applications’ access to the operating system and the security feature that randomizes where a program runs in memory to make it harder to corrupt adjacent software.

“Definitely with these exploits chained together [the CIA] could take full control of an iPhone,” says Marcello Salvati, a researcher and penetration tester at security firm Coalfire. “This is the first public evidence that’s the case.”

The leak sheds some limited light on the CIA’s sources of those exploits, too. While some of the attacks are attributed to public releases by iOS researchers, and the Chinese hacker Pangu, who has developed techniques to jailbreak the iPhone to allow the installation of unauthorized apps, others are attributed to partner agencies or contractors under codenames. The remote iOS exploit is listed as “Purchased by NSA” and “Shared with CIA.” The CIA apparently purchased two other iOS tools from a contractor listed as “Baitshop,” while the Android tools are attributed to sellers codenamed Fangtooth and Anglerfish.

In a tweet, NSA leaker Edward Snowden pointed to those references as “the first public evidence [the US government] is paying to keep US software unsafe.”

Internet of Spies

While the leak doesn’t detail the CIA’s attack techniques for desktop software like Windows and MacOS as explicitly, it does reference a “framework” for Windows attacks that seems to act as a kind of easy interface for hacking desktop machines, with “libraries” of vulnerabilities that attackers can swap in and out. It lists attacks that bypass and even exploit a long list of antivirus software to gain access to target desktop machines. And for MacOS, the document references an attack on computers’ BIOS, the software that boots before the rest of the operating system. Compromising that can lead to a particularly dangerous and deep-rooted malware infection.

“This is something we already know that can be done, but we haven’t seen it in the wild,” says Alfredo Ortega, a researcher for security firm Avast. “And by a government, no less.”

 newPosterfinal

The most surprising and detailed hack described in the CIA leak, however, targets neither smartphones nor PCs, but televisions. A program called Weeping Angel details work in 2014 to turn Samsung’s smart TVs into stealthy listening devices. The research notes include references to a “Fake Off” mode that disables the television’s LEDs to make it look convincingly powered down while still capturing audio. Under a “to-do” list of potential future work, it lists capturing video, too, as well as using the television’s Wi-Fi capability in that Fake Off mode, potentially to transmit captured eavesdropping files to a remote hacker.

A tool called TinyShell appears to allow the CIA hackers full remote control of an infected television, including the ability to run code and offload files, says Matt Suiche, a security researcher and founder of the UAE-based security firm Comae Technologies. “I would assume that, by now, they would definitely have exploits for Samsung TVs,” Suiche says. “This shows that they’re interested. If you’re doing the research, you’re going to find vulnerabilities.” Samsung did not respond to WIRED’s request for comment.

The fact that the CIA mixes this sort of digital espionage with its more traditional human intelligence shouldn’t come as a surprise, says the Atlantic Council’s Healey. But he says the sheer volume of the CIA’s hacking capabilities described in the WikiLeaks release took him aback nonetheless. And that volume calls into question supposed limitations on the US government’s use of zero-day exploits, like the so-called Vulnerabilities Equities Process—a White House initiative created under President Obama to ensure that security vulnerabilities found by US agencies were disclosed and patched, where possible.

If Vault 7 is any indication, that initiative has taken a back seat to assembling a formidable array of hacking tools. “If the CIA has this many,” Healey says, “we would expect the NSA to have several times more.”

Source:Wired

To Write your views about it download WordBite App and start writing, And also to Read/Write more amazing content like this download WordBite App now!

Advertisements

39 IAS officers under scanner for alleged corruption

New Delhi, Jun 27 (PTI) As many as 39 IAS officers are under investigation for their alleged involvement in corruption and other irregularities.

The Department of Personnel and Training (DoPT), which acts as a nodal authority for Indian Administrative Service (IAS) officers, is conducting the proceedings, official sources said today.

Besides the 39 IAS officers, 29 from the Central Secretariat Service are also facing disciplinary proceedings. Enquiries have started against the 68 officers, some of them working at a senior level, on the basis of complaints against them and also after reviewing their service records, the sources claimed.

newPosterfinal

 The central government is conducting a review of its staff as part of the governments efforts to further improve the service delivery and governance system. According to norms, a government employees performance is reviewed twice during service — 15 years after qualifying for the service and then after 25 years — to remove deadwood from the system.

In the last one year, the Centre has given compulsory retirement to 129 non-performing employees, including IAS and IPS officers. It has also undertaken an exercise to review the service records of about 67,000 employees to identify non-performers.

Nearly 25,000 of these are from all India and Group A services — including the IAS, Indian Police Service (IPS) and Indian Revenue Service (IRS).

Source- http://indiatoday.intoday.in

Mandatory to link Aadhaar with PAN card from July 1: government

New Delhi: The central government has issued a notice making it mandatory to link existing Aadhaar numbers with permanent account number (PAN) of taxpayers with effect from July 1.

The government has amended the income tax rules and has made Aadhaar a must at the time of application of PAN.

Finance minister Arun Jaitley through an amendment to tax proposals in the Finance Bill for 2017-18 had made Aadhaar mandatory for filing income tax returns and provided for linking of PAN with Aadhaar to check tax evasion through use of multiple PAN cards.

 

The revenue department said “every person who has been allotted PAN as on July 1, 2017, and who in accordance with the provisions of sub-section (2) of section 139AA is required to intimate his Aadhaar number, shall intimate his Aadhaar number to the principal director general of income tax (systems) or DGIT (systems)”.

newPosterfinal

Besides, it entrusted principal DGIT (systems) or DGIT (systems) with specifying the formats and standards along with procedure for verification of documents filed with PAN application or intimation of Aadhaar number.

The rules will come into force from July 1, 2017, the revenue department said while amending Rule 114 of the I-T Act, which deals in application for allotment of PAN.

As many as 2.07 crore taxpayers have already linked their Aadhaar with PAN+ .

There are over 25 crore PAN card holders in the country while Aadhaar has been issued to 111 crore people.

Earlier this month, the Supreme Court had upheld the validity of an I-T Act provision making Aadhaar mandatory for allotment of PAN cards and ITR filing, but had put a partial stay on its implementation till a Constitution bench addressed the issue of right to privacy.

Pursuant to this, the Central Board of Direct Taxes (CBDT) had said the linking of Aadhaar and PAN will be a “must” for filing of income tax returns (ITR) and obtaining PAN from July 1.

While Aadhaar is a biometric authentication issued by the UIDAI, PAN is a 10-digit alphanumeric number alloted by the I-T department to individuals and entities.

To Write your views about it download WordBite App and start writing, And also to Read/Write more amazing content like this download WordBite App now!

 

 

43 Out Of 55 McDonald’s Outlets In Delhi Are Shutting Down Today

Don’t be surprised if you find the McDonald’s outlet you frequent in Delhi, shut down on Thursday.

As many as 43 out of the existing 55 McDonald’s outlets in Delhi are shutting down, and it’s happening as soon as today, that is Thursday.

As per an Economic Times report, this follows infighting between US Connaught Plaza Restaurants (CPRL) and McDonald’s. (CPRL is 50:50 local joint venture between Vikram Bakshi and the US-headquartered McDonald’s that operates the fast food chain in north and east India).

Bakshi confirmed to Economic Times that 43 outlets are being “temporarily suspended”.

The ET report cites “highly placed sources” saying that the fight is over CPRL failing to get the mandatory regulatory health licences renewed.

A statement that McDonald’s India Pvt. Ltd shared with ScoopWhoop states that, “The Eating House Licenses of a number of McDonald’s restaurants in Delhi have expired. The Board of Connaught Plaza Restaurants Private Limited is working to obtain the required licenses. Pending this, CPRL is temporarily suspending the operations of the affected restaurants.”

The ET report also says that the move comes as a jolt not only to the chain’s patrons but also to the over 1,700 employees who are facing job losses. McDonald’s India Pvt. Ltd, however, denied it, saying, “We understand that CPRLis retaining the employees of affected restaurants and will pay them their salaryduring the period of suspension.”

Source:Scoopwhoop

This Guy’s Reaction To Childbirth Will Make You Laugh

Moms go through incredible struggles to bring new life into this world. They need their partners in the delivery rooms, to hold their hand, calm them down, but sometimes their partners are the ones who are freaking out.

Spanish viral content page, Karma, has uploaded a video to their Facebook page of a guy witnessing childbirth, and people can’t get enough of it. The poor fellow is really trying to comfort his partner but horror seems to be getting the best of him. Judging from his facial expressions, he will remember that day for a very, very long time. The hilarious video has already been viewed more than 4 million times. Who knew babies aren’t brought by storks!

b3

b2

b1

newPosterfinal

You surely need to watch this full video:

Source:Boredpanda

To Write your views about it download WordBite App and start writing, And also to Read/Write more amazing content like this download WordBite App now!

Powerful NSFW Birth Photos Prove That Moms Are Badass

Disclaimer: This post contains mature content.(Not Safe For Work) Please read only if you are 18+.

b4

b5

b6

b7

b8

b9

b10

b11

b12

newPosterfinal

Los Angeles Birth Photographer

b14

b15

b16

Los Angeles Birth Photographer

b18

b19

b20

Los Angeles Birth Photographer

To Write your views about it download WordBite App and start writing, And also to Read/Write more amazing content like this download WordBite App now!