Cracking Android pattern lock in five attempts

android pattern lock

The researchers say cracking the code could be achieved by sneakily filming a victim whilst using their device in public.

This footage would then be fed into the algorithm, which then gets to works on guessing the lock pattern within seconds.

The attackers would not even need to be close to the victim, as the team was able to steal information from up to two and a half metres away by filming on a standard smartphone camera, and from nine metres using a more advanced digital SLR camera.

Source: Cracking Android pattern lock in five attempts – Research Portal | Lancaster University

Gooligan, Google Malware


Check Point reported at least 86 apps have been found to have traces of Gooligan, most of which appear legitimate and have been given artificially high ratings in the app store.

Once one of the infected apps is installed onto a user’s device, either from an app store or by clicking a malicious link, it begins collecting data about the device and reporting it to a command and control server—a centralized computer that issues commands to and receives reports from devices.

How to check / know if your account is hacked?

Check Point recommended in a blog post that people who suspect their devices may have been compromised (seen unusual pop-up ads on your phone lately?) should check to see whether their account has been breached by entering their email addresses at the following website:


New KAT sites – Alternative to KickassTorrents



The official KickassTorrents website (also known as Kickass Torrents, or just KAT) may be dead, but the war to keep its name alive rages on. The torrent site version of whack-a-mole is never-ending.

One apparently legitimate mirror was, which came online courtesy of an isohunt member’s handiwork. It no longer works.

Another alternative was, referred to by many as the “official” reincarnation of the original KickassTorrents site. It too has died.

But the owner of has already launched two replacements: and And, in contrast to other mirror sites, new torrents are being added frequently.

Another alternative is This site doesn’t appear to have any new torrents being uploaded, meaning it is a very basic mirror of the original.

Hack MTS mblaze WiFi without root

mts mblaze hack

Here’s how to do it….


  1. Download Greek WiFi finder or any other related application which finds MAC Addresses
  2. Open Greek WiFi finder and copy the Mac address of MTS WiFi by holding on it for 3 seconds.
  3. Paste the mac address *IN CAPITALS in the password of MTS ( it would look like CD:A8:AF:73:71:35) just an example
  4. Delete all colons ‘ : ‘ ( now it would look like. CDA8AF737135)
  5. Delete the 1st 4 alphabets delete CDA8 (Now it would looks like AF737135 ) This is the password for MTS WiFi
  6. Note : it will only work when the victim have not changed the default password.

Recent search terms:

PANAMA PAPERS – The secrets of dirty money

Panama Papers

How hundreds of journalists revealed the secrets of some of the world’s most powerful people

About the Panama Papers
By Frederik Obermaier, Bastian Obermayer, Vanessa Wormer and Wolfgang Jaschensky
Over a year ago, an anonymous source contacted the Süddeutsche Zeitung (SZ) and submitted encrypted internal documents from Mossack Fonseca, a Panamanian law firm that sells anonymous offshore companies around the world. These shell companies enable their owners to cover up their business dealings, no matter how shady.

In the months that followed, the number of documents continued to grow far beyond the original leak. Ultimately, SZ acquired about 2.6 terabytes of data, making the leak the biggest that journalists had ever worked with. The source wanted neither financial compensation nor anything else in return, apart from a few security measures.

“The data provides rare insights into a world that can only exist in the shadows. It proves how a global industry led by major banks, legal firms, and asset management companies secretly manages the estates of the world’s rich and famous: from politicians, FIFA officials, fraudsters and drug smugglers, to celebrities and professional athletes,” according to Süddeutsche Zeitung.

The cache of 11.5 million files includes names of very popular and prominent figures. Some of the names on the list are: Alaa Mubarak (Son of Former Egyptian President), Kojo Annan (Son of former United Nations Secretary General), Ayad Allawi (Ex-Prime minister of Iraq), King Salman bin Abdulaziz bin Abdulrahman Al Saud (King of Saudi Arabia), Li Xiaolin (daughter of former Chinese Premier Li Peng),

Indians in Panama Papers list: Amitabh Bachchan, Aishwarya Rai, KP Singh, Iqbal Mirchi, Adani elder brother

Read More


How to Run Multiple Android apps on Windows PC – BlueStacks 2

Bluestacks previously only run a single app at a time. However, with the launch of BlueStacks 2, the app adds a tabbed interface that allows you to jump between multiple Android apps in the same window.

How to Run Multiple Android apps Using BlueStacks 2

BlueStacks 2 is currently available only on Windows, but will soon debut on Macs in July.

Follow these simple steps to go:

Step 1: To use and run multiple Android apps simultaneously, you need to first Download BlueStacks 2, which is free.

Step 2: Install BlueStacks 2 software on your Windows computer.

Step 3: Once installed, you will land on the Welcome Tab. Just Move to ‘Android’ tab.


Step 4: Software will ask you for One-time Google Account Setup, just like an Android device ask for.

Step 5: Login with your Google account to complete the Setup and you are ready!

Step 6: From ‘Android’ tab select multiple apps you want to run in parallel. BlueStacks 2 will open each app in a new Tab within the software interface.

SMS Controlled Android Malware Stealing Information – TigerBot

The current information about this malware show that it can execute a range of commands including uploading the phone’s current location, sending SMS messages, and even recording phone calls. It works by intercepting SMS messages sent to the phone and checking to see if they are commands for it to act. If they are, it executes the command and then prevents the message from being seen by the user.

TigerBot tries to hide itself from the user by not showing any icon on the home screen and by using legitimate sounding app names (like System) or by copying names from trusted vendors like Google or Adobe.

Based on our current analysis, it supports the following commands:
Record the sounds in the phone, including the phone calls, the surrounding sounds and etc.
Change the network setting.
Upload the current GPS location.
Capture and upload the image.
Send SMS to a particular number.
Reboot the phone.
Kill other running processes.
To avoid becoming a victim, Only download applications from trusted sources, reputable application stores, and markets, and be sure to check reviews, ratings and developer information before downloading.

Indian Some of important Site Got HaCked – BCA

India K.S Academy Hacked

Indian NewsPaper Site Got HaCked

Manan cherishing education Website Hacked

Indian Big Pandit sandeep Thakur Website HaCked

SSV Technologies and Consultancy Services

Indian Painting Website HaCked

INdian Bhopal Hospital

Nirmal Shopping site

Raja Packers & Movers

Tasty Caterers

IniNews Channel

What Happens When you Buy Online via Spam Emails

A team of researchers, studying the economics of email based spam, have released a detailed report on how the whole system works and how much do spammers make from these transactions. The researchers made over 100 purchases at these spam-advertised pharmaceutical sites for the study, spending a few thousand dollars.

Hack Chrome and Google Will Offer $1 Million

Google announced Monday evening that it’s offering up to a million dollars in rewards at a hacking contest it’s calling Pwnium, which take place at the same time as the annual Pwn2Own hacking contest at the CanSecWest security conference in Vancouver. Hackers don’t necessarily need to target Chrome to win a chunk of that money: Google is paying $20,000 to any participant who can exploit hackable bugs in Windows, Flash, or a device driver, security problems that would affect users of all browsers. But for hacks that include flaws specific to Chrome, Google will pay $40,000 each, and for those that exploit only bugs in Chrome, the company will shell out $60,000, up to its million dollar limit.

$60,000 – “Full Chrome exploit”: Chrome / Win7 local OS user account persistence using only bugs in Chrome itself.

$40,000 – “Partial Chrome exploit”: Chrome / Win7 local OS user account persistence using at least one bug in Chrome itself, plus other bugs. For example, a WebKit bug combined with a Windows sandbox bug.

$20,000 – “Consolation reward, Flash / Windows / other”: Chrome / Win7 local OS user account persistence that does not use bugs in Chrome. For example, bugs in one or more of Flash, Windows or a driver. These exploits are not specific to Chrome and will be a threat to users of any web browser. Although not specifically Chrome’s issue, we’ve decided to offer consolation prizes because these findings still help us toward our mission of making the entire web safer.

Google offered an extra $20,000 to anyone who could hack its browsers last year, no one took up the challenge. That result provides great marketing fodder, but Google says it’s more eager to expose bugs in its code–hence this year’s massive payouts. “While we’re proud of Chrome’s leading track record in past competitions, the fact is that not receiving exploits means that it’s harder to learn and improve,” Evans and Schuh write. “To maximize our chances of receiving exploits this year, we’ve upped the ante.”