Wednesday, 9 November 2016

HOW RS 500 AND RS 1000 NOTES BAN WILL EFFECT COMMON MAN !!



November 8th 2016 will go down in Indian history as a red letter day. It marks the day, Indian economy moved from Black economy to white.

In what will be known as a ground breaking, historical move, On November 8th, Prime Minister Narendra Modi announced the demonetization of Rs 500 and Rs 1000 currency notes.

So what does this mean for the common man?

India had been a cash based economy. Nearly 14 Lakh Crore Rupees is in currency notes - about $220 billion worth, is held in cash notes of Rs 500 & Rs 1000. This implies that the impact to Indian economy will be huge - very huge.

Impact on Common Man

Day-1-10: Near panic in local markets. Number of transactions drop by more than 50%. Today on November 9th, almost all businesses have reported more than 50% drop in transactions. I chatted with a Uber driver and a small coffee shop owner. Both reported the same. Uber driver was willing to give me 10% discount for cash payment in Rs 100 notes vs PayTM!

Common people in cities will rush towards digital payments like PayTM.

Immediate impact: Deep Deflation. The amount of money in circulation will drop dramatically while supply of goods will remain stable - hence prices of goods will drop.

Gold prices, stock prices, commodity prices will drop. People will congratulate government for making this bold move. BJP will win elections in UP and Punjab.

Day-10-50: People who have legally earned cash, will start depositing it in bank. This will help improve bank's Cash Reserve Ratios and increase bank deposits. This will lead to more lending. Increase lending activity will make it easier for legal businesses to raise capital and economy will grow.

People who have earned their money illegally, such as bribes, smuggling, Narcotics etc. will have a big problem on their hands. These people will be afraid to deposit it in a bank. Some of them will find ways to deposit this money into a bank, and will declare it as income and pay taxes on it.

Many of these guys - who had easy money flowing will continue to stay out of legal system and will count on their luck or bad luck and sit on their stash of Rs.500 and Rs.1000 notes. This money will be effectively taken out of circulation and that aids deflation.

Day 50-200


Deflation will ease out, and inflation will return. Inflation will happen slowly because lending activities will not happen overnight and will take time. Lending will broaden money supply, creating demand for raw materials and capital goods. This leads to a steady growth of Indian economy.

Real Estate prices will crash. Builders & developers who were eager to sell for cash can no longer sell. They will be forced to lower the price by 10-20%. Already by 1 PM on November 9th, Share prices of DLF is down 21%!

Real estate developers will have to wait for demand from white economy to pick up. Once the economy picks up and with easy availability of bank loans, real estate prices will come back to pre Nov. 8th levels, and by end of 2017, the robust demand will ensure real estate prices to go up.

Real estate developers will be forced to go with legal transactions and play in white economy.

Big Losers


The biggest losers in this are corrupt government officials & Politicians who are sitting on tonnes of cash. They cannot convert the older de-monitized notes to newer ones to avoid risk of tax investigations, and will be willing to lose their illegal money.

Real Estate businessmen, who cannot convert all their hordes of cash will also be hurt by low demand.

Other illegal business owners: Money lenders, hawala finance transactions. These people will find it difficult to conduct their business in the new system. Particularly when government can track newer Rs 2000 currency notes via RF chips.

Closing Thoughts

This is just my opinion based on my knowledge of economy. I may be wrong in some aspects, but overall I am sure Indian economy will go through a cycle of deflation, followed by robust growth and the some creeping inflation.

Let's wait and see how things pan out!

GOOGLE CHROME BROWSER VULNERABILITY MADE 300,000 ANDROID DEVICES HACKED!!!!

A vulnerability in Chrome for Android is actively being exploited in the wild that allows hackers to quietly download banking trojan apps (.apk) onto victim's’ device without their confirmation.

You might have encountered a pop-up advertisement that appears out of nowhere and surprise you that your mobile device has been infected with a dangerous virus and instructs you to install a security app to remove it immediately.

This malicious advertising web page automatically downloads an Android app installation (.apk) file to your device without requiring any approval.

Citing malware threats on your mobile device, attackers trick you to change your device's settings to allow installation of the third-party apps from stores other than Google Play Store and install the banking trojan app on your device.

Kaspersky researchers Mikhail Kuzin and Nikita Buchka discovered one such widespread malicious advertising campaign across Russian news sites and popular websites.

Since this August, the Trojan has infected over 318,000 Android devices across the world — thanks to Google AdSense advertisements that was being abused to spread malicious mobile banking trojan, dubbed Svpeng.

"When an APK file is broken down into pieces and handed over to the save function via Blob() class, there is no check for the type of the content being saved, so the browser saves the APK file without notifying the user," the duo explains in a blogspot.

Google has acknowledged the issue, blocked the malicious ads and planned to patch it, although it is unclear when the next Android Chrome version will be released.
However, if Google sticks to its six-week release cycle, users can expect an update on 3rd December 2016. So, malicious actors have over three weeks to exploit the flaw.

"[The] next time they (criminals) push their adverts on AdSense they may well choose to attack users in other countries; we have seen similar cases in the past; After all, what could be more convenient than exploiting the most popular advertising platform to download their malicious creations to hundreds of thousands of mobile devices?" the pair say.

Even if the Google patch this issue with its next software update, attackers still have an evergreen technique to trick users into downloading malicious apps by exploiting vulnerabilities in popular websites.

For example, a recently disclosed XSS (Cross-Site Scripting) flaw, discovered by Indian security researcher Jitendra Jaiswal, on WhatsApp's official websites could allow attackers to trick users into downloading malware applications.

So, it is always a good idea to install apps from official Google Play Store as well as not to change default Android settings that prevent the installation of third-party apps.

So, the best recommendation for users is to think twice before installing any app (no matter how legitimate it looks) from untrusted sources or clicking on suspicious-looking links.

Tuesday, 8 November 2016

FACEBOOK BANNED FROM COLLECTING WHATS APP USER DATA IN UK!!!

 FACEBOOK BANNED FROM COLLECTING WHATS APP USER DATA IN UK!!!

In August, Facebook introduced a hugely controversial data plan to start harvesting data from its WhatsApp messaging app from September 25 for delivering more relevant ads on the social network.

Many users were not happy with the move, because there was no real way of opting out from the data sharing – WhatsApp users could only do so within a short period – and even if users did opt out then, some data would still be shared.

Eventually, some countries like Britain stood up and opposed the decision.

The Information Commissioner's Office (ICO) of the United Kingdom has asked Facebook and WhatsApp to better explain the changes to its customers in the U.K. And if they don't, the ICO could hand out a heavy fine.


What's the good news?

In response, the social media giant has agreed to "pause" sharing of data, including their phone numbers, between WhatsApp and Facebook in Britain to target advertisements on its core social network.

"We have now asked Facebook and WhatsApp to sign an undertaking committing to better explaining to customers how their data will be used, and to giving users ongoing control over that information," Elizabeth Denham, the Information Commissioner, wrote in a blogspot.

"I don't think users have been given enough information about what Facebook plans to do with their information, and I don't think WhatsApp has got valid consent from users to share the information.

"When Facebook announced this deal late August, Denham said she would investigate the changes to the Britain's data protection laws, and has now issued an update revealing the social networking giant has agreed to hold off data sharing from UK users.Denham said that its users right to have control over their data and she now wanted Facebook and WhatsApp to let users restrict access to their information beyond the existing 30-day period, and let them completely opt-out of the agreement at any time.

When Facebook acuired whatsapp for $19billion in 2014, users were worried about the company's commitment to protecting its users' privacy. But, WhatsApp reassured them that their privacy would not be compromised in any way.

But after the deal, the WhatsApp users felt betrayed by the company.

After introducing end-to-end encryption, WhatsApp has become one of the most popular secure messaging apps, but this shift in its privacy policy may force some users to switch to other secure apps like Telegram and Signal.

Neither Facebook nor WhatsApp has yet responded to the Information Commissioner's announcement.

Monday, 7 November 2016

DDOS ATTACKS ON WIKILEAKS:US ELECTIONS EFFECT

Wikileaks Gets DDoS after Leaking 8,200 DNC Emails One Day before Elections

With just two days before the presidential election, WikiLeaks late Sunday night published a new trove of emails apparently hacked from the Democratic National Committee (DNC).

The most recent dump of more than 8,000 emails came after the whistleblowing site, on a daily basis over last four weeks, has already leaked over 50,000 emails stolen from the key figure in the DNC – Hillary Clinton's campaign chairman John Podesta.

However, this time, not everything went as planned by WikiLeaks.

WikiLeaks early Monday morning announced on Twitter that shortly after the release of hacked DNC emails the organization was the target of a major Distributed Denial of Service (DDoS) attack.

What's more?

Soon after WikiLeaks reported the DDoS attack on its email publication servers, Twitter also went down, and the outage lasts for at least 30 minutes.

According to a status monitor, the Twitter outage began at around 6.45am GMT and continued for nearly half an hour, though reports suggested that the impact vary from user to user and many users were still experiencing issues in Japan over a couple of hours later.

Here's what WikiLeaks then posted on its Facebook page:

"We are still under a DoS attack on our e-mail publication servers, and it appears that Twitter is down as well, we are unable to confirm if this is an attack on Twitter at this time."


WikiLeaks Down! Twitter Down! Any Connection?



At this moment, there is no connection between both the incidents, although some Twitter users quickly linked the two outages.

"Twitter went down because Wikileaks released #DNCleak2 It has begun! They are trying to suppress the truth from coming out!!!," a Twitter user said.
"So Twitter was down due to the #DNCLeak2 released by @wikileaks - we should be worried, global censorship is heading our way," another user said.

One of the leaked emails saw former Clinton Foundation fundraiser Doug Band slamming Chelsea Clinton for allegedly spending funds from the Clinton Foundation to help pay for her wedding.

Earlier this year, the FBI argued to investigate the Clinton Foundation for potentially giving donors special favors and political access, but just yesterday, the agency cleared Clinton of any criminal wrongdoing after a review of the latest trove of her leaked official emails.

TESCO BANK HACKED:MONEY FROM 20,000 ACCOUNTS HAVE BEEN STOLED!!




Tesco Bank has taken the drastic measure of temporarily halting all online transactions after thousands of customers have seen hundreds of pounds wiped from their savings accounts over the weekend due to an online hacking attack.

The bank has now suspended online transactions for current account holders.

Customers affected by the block will still be able to withdraw cash and use other services.

On Twitter customers reported seeing as much as £700 disappearing from their available balance.
.

Benny Higgins, chief executive of Tesco Bank, on Monday, confirmed that that about 20,000 customers have had money taken from their accounts, with "suspicious activity" identified in another 20,000.

The total is considerably more than the figure the bank was quoting on Sunday of fewer than 10,000 accounts.

Almost 20,000 Tesco Bank customers have had their money stolen from their accounts after the banking arm of UK's biggest retailer fall victim to a hacking attack this weekend.

As a result of the hack, Tesco Bank has frozen online transactions in an attempt to protect its customers from, what it described as, the “online criminal activity.”

However, customers can still use their debit and credit cards for cash withdrawals and card-based payments.

Tesco Bank has not disclosed any details of the cyber attack or how accounts had been compromised, but Benny Higgins, chief executive of Tesco, confirmed that the hack affected 40,000 of its 136,000 accounts, half of which had already been used to withdraw money fraudulently over the weekend.

The bank would not disclose the total amount stolen from the accounts, but confirmed that the amount stolen was a "big number but not a huge number."

If you have been affected by this incident, don’t worry!Higgins has apologized for the "inconvenience" and announced that customers are not at financial risk, as any financial loss that results from this fraudulent activity will be borne by the bank.

“We are working hard to resume normal service on current accounts as soon as possible,” Higgins said.




Others complained about a lack of communication from the bank and hours spent on hold.

Higgins said the bank is "taking every step to protect" customers.

Speaking to the BBC, Higgins sought to reassure customers saying he was "very hopeful" customers would be refunded within 24 hours.

Higgins said: "That is why, as a precautionary measure, we have taken the decision today to temporarily stop online transactions from current accounts. This will only affect current account customers."

INDIAN EMBASSY WEBSITES IN 7 SEVEN COUNTRIES HACKED: DATABASE LEAKED ONLINE!!!

Indian embassy websites in seven different countries have been hacked, and attackers have leaked personal data, including full name, residential address, email address, passport number and phone number, of Indian citizens living abroad.

This incident is extremely worrying because it involves diplomatic personnel working in the embassies that have always been a favorite target of state-sponsored hackers launching cyber espionage campaigns.

Security pen-testers who go by the name Kapustkiy and Kasimierz have claimed responsibility for the hack and told The Hacker News that the reason behind the hack was to force administrators to consider the cyber security of their websites seriously.

In pastebin link shared on their Twitter account, the hackers claimed to have hijacked Indian Embassy websites in Switzerland, Italy, Romania, Mali, South Africa, Libya, and Malawi and leaked personal details of hundreds of Indians, including students studying abroad.

The pair exploited a simple vulnerability in the targeted websites in an effort to gain unauthorized access to the databases.

The Hacker News team has analyzed those hacked sites and found they are vulnerable to SQL Injection vulnerability that allows an attacker to inject malicious SQL commands (payloads) to the web application and steal database containing sensitive information.


"We did it because their security was poor, and several domains related to the Indian Embassy had the same vulnerability. This proves that a lot of people can not trust the "Embassy." We hope that this problem will be fixed in the future." hackers told The Hacker News via email.
"We did not do it for the lulz or something, but we did just for them to pay attention to the issues with their crucial websites. Also, we did not leak anything like their real address, city or zip code, which is available in the database." The leaked data shows that the targeted websites are so insecure that even user and admin passwords are also stored in plaintext without any hashing mechanism.

Is India Prepared for Cyber Attacks?

This is not just the first time when hackers have targeted Indian embassies. In the month of June, Seven other High Commission websites in Tajikistan, Romania, Greece, Turkey, Mexico, Sao Paolo and Pretoria were hacked and defaced by Pakistani hackers.

However, it seems like the Indian government did not take the incident as a lesson to tighten the security of its critical infrastructure that is all time favorite target of black hat and nation-state actors and could put nation’s security at risk.

Since past two and a half years, from when Narender Modi has come into power as Prime Minister, we have heard so much about Digital india programme – an initiative championed by Government of India that aims at making all government services electronically available as well as providing high-speed Internet connectivity nationwide.

The Department of Telecommunications has stated multiple times that the Indian government is very serious about the cyber security threats and is taking all the necessary initiatives in this direction.
The initiative also includes vision to broaden digital infrastructure in the country with new technologies, but so far we have not seen any ground level initiative to tighten up the security of at least websites that represent various crucial government departments, agencies, services, and programs.

Not convinced yet? Let me put some stats to make my point clear.

A report from cyber security company Fire Eye found that 38% of organizations in India were exposed to targeted advanced persistent attacks in the first half of 2015, that's 23% increase from the previous report.

"India is fast becoming a strategic target, in part because of the potentially sensitive information that is expected to be digitized through ambitious and high-profile projects such as Digital India," the report stated.

Last year, an annual report from CERT-In noted that over 26,244 India websites were hacked, which includes hundreds of government websites.

Also, more than 35 Indian central and state government websites have recently been hacked by Pakistani hackers after India did surgical strikes across the Line of Control (LoC), Economic              times reports.

Another survey says that cyber crime incidences in India have drastically jumped in past year, with 72% companies in the country falling victim to online attacks.

So far we haven't completely tackled security of our websites and a stream of Internet of things cyber attacks have dramatically increased t

Friday, 4 November 2016

WARNING:Your mobile device can be hijacked and tracked without your knowledge!!

Here's a new danger to your smartphone security: Your mobile device can be hijacked and tracked without your knowledge.

Remember Stringrays?

The controversial cell phone spying tool, also known as "IMSI catchers," has long been used by law enforcement to track and monitor mobile users by mimicking a cellphone tower and tricking their devices to connect to them. Sometimes it even intercepts calls and Internet traffic, sends fake texts, and installs spyware on a victim's phone.

Setting up such Stingrays-type survelliance devices, of course, is expensive and needs a lot of efforts, but researchers have now found a new, cheapest way to do the same thing with a simple Wi-Fi hotspot.Yes, Wi-Fi network can capture IMSI numbers from nearby smartphones, allowing almost anyone to track and monitor people wirelessly.

IMSI or international mobile subscriber identity is a unique 15-digit number used for authentication of a person when moving network to network. The number is stored in the read-only section of a SIM card and with the mobile operator.

Note: Don't confuse the IMSI number with the IMEI number. IMSI is tied to a user, while IMEI is tied to a device.


Stealing your Fingerprints to Track you Everywhere
In a presentation at BlackHat Europe, researchers Piers O'Hanlon and Ravishankar Borgaonkar from Oxford University have demonstrated a new type of IMSI catcher attack that operates over WiFi, allowing anyone to capture a smartphone's IMSI number within a second as the users' pass by.

The attack would then use that IMSI number to spy on the user's every movement.

The actual issue resides in the way most modern smartphones, including Android and iOS devices, in the world connect to Wi-Fi networks.

There are two widely implemented protocols in most modern mobile operating systems:


Extensible Authentication Protocol (EAP)
Authentication and Key Agreement (AKA) protocols


These protocols allow smartphones to auto-connect to public WiFi hotspots.

Modern smartphones are programmed to automatically connect to known Wi-Fi networks by handing over their IMSI numbers to log into the network, without owner's interaction.

So, attackers exploiting the WiFi authentication protocols could allow them to set up a "rogue access point" masquerading as a well-known WiFi network and trick smartphones in that range to connect.

Once connected the rogue access point extracts their IMSI numbers immediately. This captured unique identifier of your smartphone would then allow attackers to track your movements wherever you go.


Intercepting WiFi Calling to Steal Your Unique Identity Number


The researcher also demonstrated another attack vector whereby attackers can hijack the WiFi callingfeature offered by mobile operators.

This technology is different from voice calling on WhatsApp or Skype app which uses voice over Internet Protocol.

Whereas, WiFi calling, which is supported on iOS and Android devices, allows users to make voice calls over WiFi by connecting to the operator's Edge Packet Data Gateway (EPDG) using the encrypted IP security (IPSec) protocol.

Like the WiFi auto connect feature, the Internet Key Exchange (IKEv2) protocol used for authenticating WiFi calling is also based on identities such as the IMSI number, which are exchanged over EAP-AKA.

EAP-AKA exchanges are encrypted, but the problem is that they are not protected by a certificate.

This issue exposes the feature to man-in-the-middle (MITM) attacks, allowing attackers to intercept the traffic from a smartphone trying to make the call over WiFi and quickly extract the IMSI number in seconds, the researchers said.

The good news is that you can disable the Wi-Fi calling feature on your device, but Wi-Fi auto connect can only be disabled when such a network is in range.

The researchers reported the issues to both the mobile OS companies, including Apple, Google, Microsoft and Blackberry, and the operators such as GSMA, and have been working with them to ensure the future protection of the IMSI number.

Apple, as a result of conversations with the duo researchers, has implemented a new technology in iOS10 that allows handsets to exchange pseudonyms and not identifiers, helping mitigate the threat.

The duo concluded their research by showing a proof-of-concept system that demonstrates their IMSI catcher employing passive as well as active techniques.