If you still haven’t heard Yahoo has made a new decision that it is going to reuse old emails. Yes you heard it right if you have not logged in your email address then it will be given to a new user if that new user wants to register that name). Well this is the worst decision move taken by any tech industries in the history. A huge security problem is bound to happen. It would be easy as a pie to impersonate some one. Well some of you have already got the idea what I am talking about, to those who don’t, let me explain it to you.
In present time in the cyber world, email has become a person’s identity. If the email address is accessed by some one else then that can cause identity theft. You may argue that how an email address that has not been used over 12 months is important to any person. Well let me tell you it can be very important. Let me give you one example. Suppose Mr. B had an email in Yahoo, but then he moved to say Gmail when it become popular. (A lot of people including me and people I know moved to Gmail from Yahoo)
And them Mr. B continued to use Gmail. And did not pay much attention to old email from Yahoo. All he did was use the email address of Yahoo while registering in Gmail. (When asked to enter a secondary email address) Now if Mr. B dod not know about this news of Yahoo and does not login to his account in Yahoo it will be released. And someone can claim it, and may reset the password of Mr. B’s Gmail account. (provided that person knows Mr. B’s Gmail address) and then lock out Mr. B from other services like Facebook, Twitter etc, where Mr. B used is Gmail address. So think what level of problems can be caused by this move by Yahoo.
Well there are many more possibilities to cause harm and loss to the original user of the email through social engineering, which I wont discuss here, but you did get the general idea.
Yahoo made the decision on June 12, users have 30 days to claim their inactive accounts before they are released. So get login in Yahoo email address to stop Yahoo giving away your email.
I wish I could say sorry, did not know how to contact you, so I am writing a letter to you on my blog, hope Internet / Search Engines / Social Networks and people who supports WikiLeaks will send it to you.
I am so sorry that my country ignored your asylum plea. But you should know Sir, that there is too much corruption in India. India is not what you think according to your statement “I was disappointed and saddened that India, known for upholding human rights, never got back despite several requests by me for asylum. Indians are also great supporters of WikiLeaks. I therefore contacted the foreign office through the Indian high commissioner. I wrote to them but they never responded,”
India is NOT known for upholding human rights, its more know for corruption. There are many instants where the citizens of India did not get their rights, due to corruption.
If I had the power to give you asylum, I would definitely done that.But as I am no good, all I can do is pray and wish you luck. Hope you get asylum in a country where they truly uphold human rights.
I have always seen you as a hero and you will always be a hero.
– Ahitagni Mandal
To the readers of my blog.
India has ignored Julian Assange”s asylum plea. for news see hereВ http://articles.timesofindia.indiatimes.com/2013-06-13/india/39950699_1_julian-assange-political-asylum-wikileaks
iOS 7, is it really Designed by Apple?
Apple showed off their latest iOS version on WWDC 2013. Well while I love the functionality of the new OS, I am not happy with the design process.
I mean the icons looks as if its designed by a kid with a box by crayons. It has too much of colour and it no way looks like its made by Apple. It seems that someone has installed a Cydia Theme in iOS.
I am sharing some pictures of the new iOS7 do comment your thoughts about it. Do you like it or hate it?
Mac OS X Mavericks uses Windows file sharing by default. Why?
As you already know that Apple OS X uses AFP (Apple Filing Protocol) and Windows uses SMB (Server Message Block), the new Mac OS X uses SMB2 over AFP !
Ok, I know you will say that how does it matter? or You would say it would be easier to share with Windows based computers. Well yes, but one of the most like feature of the Mac OS X, Time Machine over LAN relies on AFP. Third party Time Machine manufacturers have to reverse-engineer AFP to keep it working with the new version of OS X. What more bothering me is that who selected SMB2 ? OS X prior to OS X 10.7 uses open source implementation of SMB , called Samba. (used in popular Linux distro too) With OS X 10.7 , Apple replaced it with their own implementation SMBX.
Really Apple needs Steve Jobs.
Source: Apple Core Technologies Overviews. (PDF link)
Yes, you read it correct. A modified charger that can install malwares onto your iOS devices like iPhones and iPads, even though its not jailbroken, it does not even needs your interaction. And it takes less than a minutes of charging to get it infected.
Recently researchers will show a prototype of this charger in BlackHat Security Conference in late July. The prototype of the charge is named “Mactans” which is build on open-source single-board computer called the BeagleBoard,availavle at $45 from Texas Instruments.
Brief description by the researchers Billy Lau,Yeongjin Jang,Chengyu Song.
Apple iOS devices are considered by many to be more secure than other mobile offerings. In evaluating this belief, we investigated the extent to which security threats were considered when performing everyday activities such as charging a device. The results were alarming: despite the plethora of defense mechanisms in iOS, we successfully injected arbitrary software into current-generation Apple devices running the latest operating system (OS) software. All users are affected, as our approach requires neither a jailbroken device nor user interaction.
In this presentation, we demonstrate how an iOS device can be compromised within one minute of being plugged into a malicious charger. We first examine Apple’s existing security mechanisms to protect against arbitrary software installation, then describe how USB capabilities can be leveraged to bypass these defense mechanisms. To ensure persistence of the resulting infection, we show how an attacker can hide their software in the same way Apple hides its own built-in applications.
To demonstrate practical application of these vulnerabilities, we built a proof of concept malicious charger, called Mactans, using a BeagleBoard. This hardware was selected to demonstrate the ease with which innocent-looking, malicious USB chargers can be constructed. While Mactans was built with limited amount of time and a small budget, we also briefly consider what more motivated, well-funded adversaries could accomplish. Finally, we recommend ways in which users can protect themselves and suggest security features Apple could implement to make the attacks we describe substantially more difficult to pull off.