الجمعة، 29 أبريل 2016

Office 2016 32 e 64 Pro Atualizado Abril 2016 Torrent


Office 2016 Profissional  Final Crack Serial e Ativador PT-BR 32/64 BITS Torrent

 A versão Final do Microsoft Office 2016 atualizado Abril 2016 32 E 64 BITS com ativador embutido para validar como original

 Idioma PT BR
 ATIVADOR ESTA DENTRO DA PASTA DO ARQUIVO


 Tamanho 32 Bits:  700 MB
Tamanho 64 Bits: 819 MB
Tamanho : 32 e 64 Bits Juntos 1.4GB
Raton Shop

TORRENT

Download Torrent 32 e 64 Bits Juntos
ou

Download ATIVADOR ATUALIZADO 2016
Raton Shop
Raton Shop



Xiaopan OS: Easy To Use Pentesting Distribution For Wireless Security Enthusiasts

Xiaopan OS: Easy To Use Pentesting Distribution For Wireless Security Enthusiasts

Xiaopan OS is an application used for wireless enthusiasts who want to test their wi-fi connections. It is an open source and free application which is totally based on Linux operating system and created for both beginners as well as experts. 


The main motive to create this is to access wireless connections and  having a security check on the wi-fi connections between the evil-minded users. 

Its an application which is created by Djyuzi from anywlan.com in late 2011 when the TCL (tiny core Linux) has been outdated and there is nothing to fill this gap.

It consists a list of an advanced tool for accessing WPA2/ WPA/ WEP/ WPS wireless networks. It can be easily used with the help of USB drive as well as a CD. It provides an XFE environment (a file commander mainly for Unix addicted users) and easy to load Graphical user interface.

It supports many wireless card controllers such as Broadcom and Atheros and it uses the Reaver-was to recover the wi-fi password. It’s a set-up which is commonly present in all the routers and its totally depends on the complexity of the encryption that how much time was taken up to recover the password.

It’s the best product for the beginners as it has a light weight GUI which is good to load and easy to understand the software.There is no need to write Linux commands. there is only one problem  that it will not recognize your NIC as it supports some of the RTL8187L, RT3070, AR9271 and much more.

It includes the tools such as Inflator, Aircrack-ng, Minidwep GTK, XFE, wife and feeding bottle.It is a software which is compatible with Mac , windows, and Linux and ca be easily booted this 70 mb os with the USB drive or with the CD and can be installed in a virtual machine environment.


Features:

Now come to the features of this tool-
•     Run in Parallels Desktop
•    Compatible with Yumi Boot / LiLi USB Creator
•    Run on Live CD
•    Packages include: Minidwep, Aircrack, Inflator, Reaver, Feeding Bottle, Wifite
•    70mb ISO
•    Based on TinyCore Linux

System Requirements:

These are the requirements which are required to download this software and requirement otherwise the software will not work.

•    Operating System: Windows XP or a later version
•    Processor: Intel Pentium II or better
•    RAM Memory: 128 MB RAM
•    Video Adapter and Monitor: 800 x 600 Super VGA or higher
•    Hard Drive Space: 36.70 MB of free space available


DOWNLOAD HERE

FBI Will Not Share That How They Hacked iPhone

FBI Will Not Share That How They Hacked iPhone


FBI Will Not Share That How They Hacked iPhone

On Wednesday, the U.S. Federal Bureau of Investigation said it did not own the rights to the technical method where a contractor used to unlock an Apple iPhone that is used by one of the shooters of San Bernardino as well as consequently it could not submit all details of the mechanism for an interagency review of government.


  • FBI don't have rights to share Unlocking Method of iPhone.
  • FBI have not identified the person who provided the unlock mechanism for opening the shooter's iPhone.
  • FBI does not have enough technical information about iPhone Vulnerability

According to report of Reuters, Amy S. Hess who is an executive assistant director of FBI for science and technology said in an announcement that when it appointed a party that belongs to outside to unlock the iPhone from that agency which did not acquire the rights to the technique.

As an end result, Hess said,
The FBI does not have enough technical information about any vulnerability in the iPhone to suggest for the review of an interagency.

The review that is being carries out in the secret manner that would decide whether the vulnerability could be opened to the agencies of government or the private sectors.

Whereas the iPhone comes in question that was owned by the San Bernardino County Health Department as well as it was hand over to the employee Syed Farook, who, with his wife Tashfeen Malik, killed 14 people and injured  around the 22 people during an attack on his co-workers last December.

Hess also said the FBI usually does not give any remark on vulnerabilities which were discovered in cyber products. Whereas the agency determined to make a statement due to the "extraordinary nature of this particular case, the intense public interest in it, and the fact that the FBI already has disclosed publicly the existence of the method."

And the statement of Hess established an information from the sources of U.S. government on Tuesday that the conditionally FBI had decided which is not to share the unlocking mechanism of iPhone since the agency did not own it.

الخميس، 28 أبريل 2016

World's Largest Aircraft Airlander 10

Airlander_10

The Airlander 10 – World’s Largest Aircraft


The world’s largest aircraft, the Airlander 10 has ultimately been given its official name – Martha Gwyn, which had uncharitably earned the nickname of the `Flying Bum’ owing to its characteristic shape when seen from front.

The name had been disclosed at a ceremony at its hanger in Shortstown, Bedfordshire, just days after regulators had given the go-ahead for its first flight which was to take place later in the year, by Duke of Kent. Hybrid Air Vehicles, building the Airlander has also revealed that it hadraised-up over £1 billion in crowdfunding push this month and the airship is named after the wife of the chairman of Hybrid Air Vehicles, Philip Gwyn.

Mrs Gwyn had stated that she can’t really take it in and had a shire horse named after her in the past and this is the first airship. She adds that when The Duke had stood back and she read and then looked again and read it, it took some time for it to sink in and that it has been an enormous surprise.

Offer Business/Leisure Flights


The Duke of Kent, who is the pilot himself, during his visit to the First World War era hanger where the Airlander is retained, was shown around the flight deck and cabin of the aircraft before being given the occasion of experiencing what it would be like to fly in the aircraft in its flight trainer.

Over 302 ft. long, the aircraft which is part plane and partairship is about 50 feet longer than the largest passenger jets. It is said that the design of the hybrid airship had been first developed for the US government as a long endurance surveillance aircraft though it fell short of defence falloffs.

 The British firm Hybrid Air Vehicles has launched a campaign in May 2015, to return the Airlander 10 to the skies and would now carry out ground testing before 200 hours of test flights which tends to begin later in the year. The ship is said to be converted to offer business as well as leisure flights in a hanger in Cardington, Bedfordshire.

Conception – Lighter than Air Technology-Airships/Aerodynamic Lift - Airplanes


The conception behind it is to combine the lighter than air technology that is used in airships with the aerodynamic lift that is seen in airplanes, enabling it to travel long distances with comparatively less fuel and set down without the need for large measure runways.

Last October, one of its fins which measures 29 feet by 36 feet was filled with 1.3 million cubic feet of helium adequate to fill 15 Olympic sized swimming pools, in a test run. However in spite of its impressive size and design, which is anticipated to give a boost, in using airships, the vehicles tend to attract more attention due to its appearance.

The test in October resulted in a stir on Twitter, with several spotting the airship rather unfortunate resemblance to a human bottom. In one of the case, head-on image of the airship had been changed with the inclusion of a picture of Kim Kardashian who is said to be famous for her derriere. In November, the aircraft had already been tested with successful float test with the hull being filled with helium and floated external of the aircraft hangar, though it would be the first test once the engines are attached successfully.

Bots Explained

Bots

Bots/Chatbots Popular Models for Software


Bot is a software which has been designed to automate the kinds of jobs one tend to do usually on their own, such as making a dinner reservation, fetching and displaying information or adding an appointment to your calendar. While technology to simulate conversation with the computer has been around for several years, bots or chatbots are a popular model for software. The common kind of bots, chatbots tend to simulate conversation and often live within the messaging apps or are designed to look that way. It seems like one is chatting back and forth as one would do with a human being.

Some of the bots can handle various customer service requests that would usually need a telephone call to a human agent. For instance, a bot has been released by Taco Bell which permits you to order and pay for tacos via an automated chat conversion. Other bots such as X.ai could be helpful in scheduling the meeting for you wherein one could just add the bot to the email thread and it could handle the back and forth conversation essential in scheduling the meeting, makes you aware when the same is arranged and adds it to your calendar.

Bots Capable of automating all Types of Things


As the bot technology tends of progress, the thinking is that the bots would be capable of automating all types of things, possibly even things as complex as the taxes. Chatbots have already been there in several places where one tends to communicate, mainly messaging apps that lend themselves to conversational interface. Bots are there in Slack, which is the business-focused messaging service, several of which tend to help with the work-connected task like expenses or to-do-lists. Kik Messengers having about 275 million registered users has announced recently a bot store which comprise of one bot, to send people Vine videos and another to get makeup suggestions from Sephora.

For years, Twitter seems to have bot, such as bots which tweets about earthquakes as soon as they are registered or a Domino’s bot which permits you to order a pizza by tweeting a pizza emoji. Several of the users are expecting Facebook to roll out a bot store of some type at its annual F8 conference for software developers which would mean that these bots would soon be operative within Messenger, the messaging app.

Companies Stacking Big on Bots


Test of the virtual assistant bot known as `M’ had already begun, though the product seems to be available for a few people and mainly powered by humans. Several of the companies which are building the apps used on the phones are building bots. A group of companies are staking big on bots inclusive of Microsoft and Slack which tend to have easy access for bots.

The technology which tends to power bots, artificial intelligence software has been progressing intensely due to the sharp interest from key Silicon Valley powers such as Google and Facebook. Facebook which tends to have 900 million Messenger users is said to get into bots and many envisage this as a big probable opportunity and where Facebook seems to go, the rest of the industry tend to follow.

Slack which imports bot-based services has also developed radically to two million daily users which bot makers as well as the investors view it as a possible profitable market. It is helpful that messaging is seen as a new opportunity particularly in interacting with a corporation in the same personal space one would generally interact with a colleague.

Office 2016 Pro Atualizado Abril 2016


Office 2016 Profissional  Final Crack Serial e Ativador PT-BR 32/64 BITS Torrent

 A versão Final do Microsoft Office 2016 atualizado Abril 2016 32 E 64 BITS com ativador embutido para validar como original

 Idioma PT BR
 ATIVADOR ESTA DENTRO DA PASTA DO ARQUIVO


 Tamanho 32 Bits:  700 MB
Tamanho 64 Bits: 819 MB
Tamanho : 32 e 64 Bits Juntos 1.4GB
Raton Shop

TORRENT

Download Torrent 32 e 64 Bits Juntos

Download ATIVADOR ATUALIZADO 2016
Raton Shop
Raton Shop



New Phishing Techniques Born To Hack The Facebook

New Phishing Techniques Born To Hack The Facebook

New Phishing Techniques Born To Hack The Facebook.

Hackers are using a new scheme of phishing tricks for users into hacking over their credentials of Facebook and around this time they are taking benefits of Facebook to bring out their attacks.



  • Even low-end skilled attackers can fool users with this trick
  • A second-stage trick drives the phish home
  • The particular difference is the malicious iframe in the middle of the page that is loaded through the Apps of a Facebook platform from the server of attackers.

The hackers are exploiting the App of the Facebook platform to host the content which is malicious inside the site of Facebook itself. The crooks are indexing the app of Facebook as well as they are using the free range power of platforms to load the malicious Web pages through the iframes.

Whereas the iframes load the content from the server of attackers that is showed inside the app of Facebook displayed on the website of Facebook.

Even low-end skilled attackers can fool users with this trick

Attackers who want to bring out the attacks of phishing tricks as well as steal the credentials of Facebook that only required some skills regarding the CSS in order to ability a login form that uses the default UI style of Facebook.

Users who land on these pages via various types of email or campaigns of social spam that would have a difficult time to detecting this as a malicious page.

Even all other elements of Facebook are there that were all fully purposeful. The menu of Facebook performs all of the other notifications displays the original notifications of Facebook and the URL of a page that is an address of Facebook.

The particular difference is the malicious iframe in the middle of the page that is loaded through the Apps of a Facebook platform from the server of attackers. And for this specific campaign marked through the security firm Netcraft  and this iframe was loaded from a malicious website which was hosted on HostGator.

A second-stage trick drives the phish home

In the case of some more perceptive of users supposed to anything that was an individuality for this campaign that made sure to fool the users even those who had gone via a training of anti-phishing that tells the users to enter the wrong login credentials in doubtful forms that are used for login.

Users who enter the wrong details for login and get a successful message that will certainly be influenced the fake login form as well as somebody is trying to deceive them.

As an individuality of the campaign which is marked by Netcraft and the login form always displayed an error on the time of login every time the user tried to validate. Even if they come into the correct or the wrong credentials.

Even by using this trick, some kind of low-end skills of CSS, social engineering as well as the Facebook Apps platform, attackers can run highly proficient the campaigns of phishing tricks that is right from an official URL of Facebook.

To stay safe users should be very suspicious of entering their log in the Facebook credentials inside Facebook apps which are hosted on apps.facebook.com domains. 

Whereas Facebook automatically authenticates the all users of these apps as well as everyone should always use the URL of facebook.com/login to validate on the site as well as nowhere else.

WinSCP - Free And Open Source FTP & SFTP Client & Also A Multifunctional Tool For Microsoft Windows

WinSCP - Free And Open Source FTP & SFTP Client & Also A Multifunctional Tool For Microsoft Windows

WinSCP - Free And Open Source FTP & SFTP Client & Also A Multifunctional Tool For Microsoft Windows


WinSCP  which is known as Windows Secure Copy  is a free as well as open-source SFTP, FTP, WebDAV and SCP client for Microsoft Windows and also it is a multifunctional tool that improves your productivity. 


Its main function is secure file transfer as well as copies files between a local and a remote computers using multiple protocols such as FTP, FTPS, SCP, SFTP or WebDAV. As well as the  WinSCP offers not only basic file manager and file synchronization functionality but also it offers an intuitive interface. Even you can also automate the functionality of WinSCP which is using .NET assembly or scripting of a simple batch file. And for the secure transfers the WinSCP uses the Secure Shell(SSH) and also supports the SCP protocol in addition to SFTP.

Whereas the development of WinSCP started around March 2000 and then it continues. Firstly, it was hosted by the University of Economics in Prague, where its author performed at the time. Since July 16, 2003, it is licensed under the GNU GPL and hosted onSourceForge.net.

Even you can use WinSCP for common operations with files as well as edit files which are directly from the WinSCP. And it can be using the WinSCP as an internal text editor, or by integrating with an external text editor. As well as WinSCP operations are not restricted to its specific files. Whereas, WinSCP offers the various kind of ways to synchronize your remote as well as local directories. After connecting to a website it could be store the information of site for easy access.

Usually, WinSCP is based on the implementation of the SSH protocol from PuTTY and FTP protocol from FileZilla. As well as the WinSCP combines with Pageant (PuTTY authentication agent) for full support of public key authentication with SSH. WinSCP is also existing as a plugin for Altap Salamander file manager as well as there exists a third-party plugin for the file manager of FAR .

On the other hand, admins love the support of WinSCP for the portable operation that is using a configuration of a file in spite of the entries of a registry which is appropriate for operation from removable media.

Features:

WinSCP has several features that are as follows-
  • Graphical user interface
  • Translated into various kind of languages
  • Integration with Windows
  • File transfer protocol options
  • All common operations with files
  • Supports for SFTP & SCP protocols over SSH-1 & SSH-2, FTP protocol and WebDAV protocol
  • Batch file scripting and command-line interface
  • Directory synchronization in semi as well as fully automatic ways
  • Integrated text editor
  • Support for SSH password
  • PuTTY support
  • Support public key authentication
  • Authentication options
  • Additional options

WinSCP Work As A Remote Editor:

This effective tool can act as a remote editor. And it could be possible when the user clicks on a file(i.e; a text file) in the remote file manager as well as it transmits the file to the local machine and also opens it in the integrated editor, where the users of Windows can feel very much at home. 
On the other hand, the user may select the local editors which are based on file extensions. At any time, the document is saved and the remote version of WinSCP is automatically updated. 

Portable Version:

Instead of the standard package, there are three portable versions of WinSCP are also available: A generic package and two customized versions for LiberKey and Portableapps.com. The portable version runs on Wine in Linux. 



الأربعاء، 27 أبريل 2016

How rude! Words to Avoid When Sending Email

List

List of Deadly Words to Avoid in Emails


The most pleasant and well manner person could seem like jerks in an email and writing an email which comes out like one would do in person is a fine art. In a conversation, one can adjust the tone, together with the facial expression accompanied with gestures and postures to fit the mood of what is being conveyed to the other person. This is done since people tend to respond on how it is said than to what is actually said. Email tends to strip a conversation plain.

It seems well-organized though otherwise, it turns easy communications into messy misunderstandings. Without the involvement of facial expressions and body posture for guidance in conveying message, people tend to view each word that is typed as an indicator of tone and mood.

Outsource-Philippines firm, a provider of global outsource solution, has gathered a list of ten deadly words which people should not use while composing emails, to make sure that you are not giving the recipient the wrong impression. Should you be using words like `thanks’ or showering with `I’s, me’s together with plenty of exclamation point !!!?, to end the emails, you could be considered as rude even if you don’t intend to do so. Some of the tips to be observed are avoiding swearing, usage of exclamation points sparingly, single one at most. One should avoid using word like `actually’, since it seems to make one sound, insulting and annoying.

Definite Terms/Words Best Said in Person


The site also recommends avoiding saying `sorry’ in an email since it seems better to apologize in person when one tends to make a mistake. According to the company, ‘communicating with clients and colleagues through email does not mean that one should not be careful with the choice of words. There are definite terms or words which are best said in person since one can identify easily the meaning behind it by observing the facial expression and tone of the speaker.

In fact, some of the tips tend to make sense especially in the context of customer care emails. Leslie Katz of CNET points out that some of the suggestions come across as far too broad, with regards to dealing with customers. The word `important’ could be helpful in underscoring a point without implying rudely the readers who are not smart enough to know the important emails when they seem them. She adds that `digital communication like several human interactions is far from one byte that suits all.

Swearing Not Helpful in Winning New Customers


At times, a bit of spontaneity together with a few exclamation points could go a long way in humanizing an exchange even one which tends to originate with a big faceless company and they actually can. As the infographic recommend, for instance, `fine’ could convey a couple of various messages - `that works’ and `sure, be that way’. Swearing will not possibly win one any new customers. Google `rude emails and one will encounter various tips on how to keep the emails on the right side of being rude.

Several recurrent points seem to be common sense and are worth bearing in mind, irrespective of the recipient. One needs to be professional and respectful, steer away from a Debbi Downer vibe, mitigate criticism with support and in stick circumstances, should give oneself, time-out before hitting the send key and be cautious of the risky reply-all.

EE Aims to Improve 4G and Relocate Customer Services in UK

EE

EE Bringing Customer Service Operation Back to UK


After being branded as one of the worst mobile networks for customer satisfaction of UK, EE is making attempts of bringing its customer service operation back to the UK. The operator has mentioned that 100% of its customer service calls would be controlled in the UK and Ireland towards the end of 2016, giving rise to 600 new jobs in Merthyr, North Tyneside, Plymouth and Ireland.

Marc Allera, the new boss of the company had stated that EE had already improved customer satisfaction and reduced complaints by 50% by creating 1,400 new service jobs in UK and Ireland since 2014. He had stated that they are creating 600 additional jobs to handle all EE customer service calls in the UK and Ireland by the end of this year, offering the best possible experience for the customers.

 Alex Neill, director of campaigns and communications for Which, had stated that telecoms are a vital part of present life and providers need to begin delivering for their customers. EE had also made an announcement of a major investment in rural 4G coverage with a pledge to cover 95% of the landmass of UK by 2020.

Vital Aim of Covering Whole of UK with 4G


Usually mobile operators have focused on population coverage which means that the majority of investment has been put in providing 4G in cities and towns, where the population density seems to be the highest.

Though presently EE coverage has reached over 95% of the UK population, it has only reached about 60% of UK geography which means that large paths of the country does not have 4G coverage at all. Allera has stated that customers desire 4G speeds wherever they go and mobile operators are too used to saying `no’ to new coverage.

He further added that presently they have an ambition to go further than any operator has ever gone and with the vital aim of covering the whole UK with 4G. EE had made this commitment by switching on 4G in Shetland and the Isles of Scilly, which is almost 1,000 miles apart at the opposite ends of the UK.

EE to Build More New Cell Sites


This has been possible due to the fibre broadband links installed by BT which had recently closed its £12.5 billion acquisition of EE. EE intends to build more than 750 new cell sites all over the country, as part of its rural 4G rollout. Mr Allera has stated that the demand for 4G could help mobile network challenge public opposition to infrastructure like transmitter mast need to enable it.

The barriers needed to overcome are around how fast and easy it can get access to these sites as well as how to ensure that we do not have landlords who can charge ransom rates that would make it prohibitive to get a solution. He further informed that EE is working with the government in tackling the issue. Matthew Howett, Ovum analyst mentioned that reforms are vital for the success of the strategy and unless the government takes a lead on ensuring fair and reasonable access and site rentals, EE hopes 95% coverage will be apprehensive with difficulty.

Are We Getting Ripped of by Today’s Data Packages?

Mobile_Data

The Big Data Switch Campaign


As mobile users we were charged to send text and to make calls and the cost to the Telco service provider for each text or call was quite less and individuals comprehended the relationship. Those were the initial days of mobile phones which were very simple and users learned how to use predictive text. However with the arrival of the internet-cabled smartphone, it has completely overhauled the relationship the customers tend to have with their devices and their Telco provider. Presently it is all related to data.

Australia’s biggest consumer network, will be partnering with news.com.au to launch The Big Data Switch Campaign, which is a people powered campaign that will be reducing the cost of mobile and broadband data. This would result in companies moving to reasonably economical voice as well as text messaging packages besides adding more expensive pricing schemes around data.For instance, in 2010, the use of second gigabyte of data on a Virgin mobile plan would have cost the user 140 times more than the first gig; and the user would not have realised it for days. Overpriced excess data rates had been a main money spinner for Australian telcos but are now a thing of the past.

The Legacy Cost


Some of the companies like Telstra, Optus and Vodafone had all brought in processes of reducing cases of bill shock and most of the plans tend to now add an extra GB of data for $10. This has brought about a radical change in the overall cost which customers tend to pay for data. For instance, less than three years back, Optus would charge 25c per megabyte for excess data usage that amounted to $250 for an extra GB. Though most of the customers presently can have an automatic top up for $10, those who are not on a plan may encounter a bit expensive price.

 Telstra, for instance tends to charge three cents per MB for additional mobile data without a data pack that works out to $30 per GB. Paul Budde, telecommunication expert, had informed news.com.au, that `there is no direct correlation between the cost of data and what we pay’. Customers on the contrary, are paying for the infrastructure and administrative costs of companies like Telstra when they branch out of data which Mr Budde refers as `the legacy cost’.

Category 11 4G – Introduced by Telstra


He adds that regarding paying for mobile data, it is determined by marketing as well as industry competition. In September, Mike Wright, Telstra’s Group Managing Director of Networks, had informed news.com.au that telcos base their data additions in the plans around how much they consider their networks can handle without slowing down. Upgrades to infrastructures like Category 11 4G had been introduced by Telstra last year. Mr Wright had said that `letting more phones on the network to download at high speed than ever before, allows data costs to go down’.

He added that updates and developments related to the proficiency and ability of the network are a way for telco companies in bringing down their cost though will not have any impact on what customers pay for mobile packages. Presently if all have unlimited mobile data and constantly streaming high-definition Netflix, the network would come to a halt.

But the recent free data days put by the company portrays that their network has the potential of handing huge jump in data use. He further adds that competition and not technology tends to dictate the price more than anything.

1.1 Million Data of Online Dating Website BeautifulPeople Leaked In Cyber Black Market

1.1 Million Data of Online Dating Website BeautifulPeople Leaked In Cyber Black Market


1.1 Million Data of Online Dating Website BeautifulPeople Leaked In Cyber Black Market

The information of over 1.1 million people who registered on the dating website, BeautifulPeople.com which is being leaked on the Dark Web.


Troy Hunt who is the operator of the HaveIBeenPwned.com website, has declared on Twitter that he had just added some information of those users to his site. 

The people who registered on BeautifulPeople.com dating website can go to the service of Hunt as well as find out for their email address and see if their information is involved in the leak.
Due to lacking of security MongoDB setups strike again!

Since December 2015, Thomas Fox-Brewster who is the staff writer of Forbes said that he had information about the data breach. And he told that when Chris Vickery who is the security researcher of MacKeeper told him about a vulnerable database.

There are two contacted BeautifulPeople, who told them the database that they had found which was only a test server as well as there is no actual user information which was disclosed.

The company took down the server, another instance of a no-password, Internet-accessible MongoDB database, and the story never reached the light of day.

There is an explanation of BeautifulPeople that it does not hold water.

But as Hunt has described that it shows that someone also found the database that  downloaded its content and also put it up for trade on underground forums of data trading. Whereas an unsolved benefactor contributed the data to Hunt, who is also together with the reporter of Forbes which established its validity.

The two contacted say that the database consists of names, email addresses, encrypted passwords, geo-location information, as well as over 100 other attributes of individual data such as sexual preferences, drinking habits, hobbies, favorite movies and also some kind of information you had to wait for to discover on such sites.

Vickery also includes that the version of the database of the BeautifulPeople dating website that he saw also added up to 15 million of private messages.

According to a statement which sent to Forbes by the owner of the website said: "We can confirm we were notified of a breach on December 24th of 2015 of one of our MongoDB test servers. This was a staging server and not part of our production data base. The staging server was immediately shut down."

The BeautifulPeople becomes well-known online dating website because it worked for many years for advertised itself as a dating as well as meeting website for "beautiful people" only. Whereas all of the users had to go through a process of manual approval where the users of another site would vote for it if they were attracted towards it and then join the site.

In 2009, the operators of BeautifulPeople were bragging about refusing the users up to 1.8 million from their site. Also, as people matured, lost hair, or gained weight, the staff of the website that also continuously removed the members who were considered as not enough beautiful.

Last week Naughty America Hacked, 3.8M Users Data Have Been Breached

Study Finds That Most Americans Resort To Risky Behaviors To Remember Passwords

Study Finds That Most Americans Resort To Risky Behaviors To Remember Passwords


Study Finds That Most Americans Resort To Risky Behaviors To Remember Passwords.

According to a recent study, usually, password management is fetching so frustrating that 35 percent of Americans write down their passwords only for just to help keep in mind them.

  • We need to keep strongest passwords and change it time by time. 
  • Also do enable two-factor authentication on any website or web-based application.

Researchers at SecureAuth doubted that 1,022 individuals as well as discovered that 74 percent of respondents rely on means comparatively other than memorization to manage online passwords.

When asked them that what they believe which is the most irritating about the online passwords as well as 29 percent of respondents said “keeping up with different password requirements across accounts” and also 18 percent said that “meeting complex password requirements.”

As well as 15 percent of the respondents come to another subject in which there is a requirement of changing a password continuously.  Even 12 percent were irritated by "getting locked out for too many incorrect attempts."

Cooperated with weak credentials are the main reason behind the recent attacks as well as there is a need of underscore for stronger password management. 

Whereas Keith Graham who is a Chief Technology Officer (CTO) of SecureAuth told to the SCMagazine through an emailed comments that users can take some steps to make stronger password protection as well as decrease their irritation.

And also, he said, “Use a common saying, movie quote or song lyric while adding a few capital letters and numbers to create a password that is easier to recall.”

He also suggested the set up of users password managers for the difficult passwords users as well as it does not reclaim the passwords all around the multiple sites.

Usage Of Flash, IE & Windows XP, IE Are Responsible For Poor Security Of Healthcare Sector

Usage Of Flash, IE & Windows XP, IE Are Responsible For Poor Security Of Healthcare Sector


Usage Of Flash, IE & Windows XP, IE Responsible For Poor Security Of Healthcare Sector


There are many problems occurs into the healthcare sector regarding the term of cyber-security as well as according to US firm has Duo Security and some bad technological habits may have something to do with it.


The company compared to all figures from its long list of clients from different kind of sectors as well as they observed a sequence of peculiarity which can describe why the organizations of healthcare are recently facing the data breaches and the infections of ransomware on a daily basis.

All the figures that stood out were the custom of Flash and Java in the organizations of healthcare. 

Whereas in all other sectors Flash was already installed up to  25 percent of all devices and in healthcare organizations Flash was discovered on 52 percent of all computers. The same inconsistency was observed in Java usage with expected industries organizing it on 12 percent of its PCs, whereas the healthcare sector was using it on 36 percent of computers.

Exploit Kits are the favorite targets of both Flash and Java. Exploit kits often update their crimeware kits within days after a Flash or Java fault becomes public.

But the strange one did not stop here, and the researchers of Duo Security also noticed that most of the organizations of healthcare are running on Internet Explorer 11 comparatively more than they are running on the most of the current versions of Google Chrome. In fact, IE 11 was discovered that it is running on 33 percent of healthcare organizations' PCs whereas Chrome is running 48 only on 28 percent.

Breaking down the overall usage of IE and the experts of Duo Security also observed that out of all the browsers of Internet Explorer running in the healthcare sector as well as even 22 percent of users were using an out-of-dated version, compared to the six percent seen in other industries.
Even still you can still find a lot of hospitals and clinics running good old' XP.

The entire sector of healthcare has an unappeasable love for the overall products of Microsoft as well as a Windows OS running with 82 percent of all devices .

Whereas in the last summer the Microsoft had launched Windows 10 that offering it as a free update to all the users of Windows 7 and 8 as well as only ten percent of healthcare computers are already running this OS version today, compared to the 15 percent in other industries.

Even not as good as, three percent of healthcare organizations are still running on XP which is a version of Windows that Microsoft officially retired in 2014. 

The Royal Melbourne Hospital ran Windows XP computers until this past January when a malware infection brought the hospital operations to its knees.

Using XP, and for that matter, even Windows 7, is also a hazardous attempt. However the Windows 7 also on its last leg and with XP it also reaching end of life, it is the time for healthcare organizations to start affecting their PCs to more modern-day OS distributions.

الثلاثاء، 26 أبريل 2016

Kepler Spacecraft in Emergency Mode

Kepler

Kepler Entered Mode on April 6


According to an update of April 8 from Charlie Sobeck, mission manager at NASA’s Ames Research Centre in Moffett Field, California, Kepler seemingly entered the mode on April 6. Kepler had burnt more of its dropping supplyof fuel in an emergency mode, which is essential to ignite its thrusters and position the spacecraft in communicating with Earth.

The turning manoeuvre which would have begun the new planet hunt had not yet been executed by the spacecraft. Kepler, till now had discovered planets by observing the slight dimming of starlight triggered by an orbiting planet that passed in front of a star. The investigation has been enthusiastically successful, discovering over 1,040 confirmed planets as well as more than 4,700 planet candidates since the launch of 2009.

The new campaign is said to have run from April 7 to July 1 and it would have looked out for the temporary brightening of star due to a different effect known as gravitational microlensing. The gravity of an intervening object, in microlensing, like in the case of planet, tends to focus and intensify the light from a background star, causing it to brighten.

Microlensing Targets Big Planets at Great Distances


Contrasting to Kepler’s other discoveries that seem to be smaller planets comparatively close to their host stars, microlensing tends to target big planets at great distances from their stars or even lonely planets seem to bewandering on their own through the depth of space. Ground-based telescopes have revealed 46 planets through microlensing and the astronomers expect that Kepler would discover 10 or more during the campaign.

 These kinds of discoveries would be helpful in narrowing the statistics on how common free-floating planets could be throughout the Galaxy. Astronomers have synchronized an intricate plan wherein around two dozen ground-based telescopes that have been spread across six continents, would be gazing at the same area of the sky at the same time as Kepler.

 They comprise the Optical Gravitational Lensing Experiment – OGLE survey that tends to hunt for microlensing events from the Las Campanas Observatory, in Chile. OGLE intended to shift its observing strategy slightly to overlap with the same fields which Kepler had been looking at. NASA’s Spitzer Space Telescope was to have joined in the hunt too, in late June.

Kepler’s Microlensing Campaign Presently on Hold


It could have been the first microlensing survey directed at the same time from the ground as well as from space. The different vantage points could have enabled astronomers to research the potential microlensing planets much more easily than just utilising one or two ground-based telescopes. Andrew Cole, astronomer at the University of Tasmania in Hobart, Australia had stated that `there is a strong feeling like it’s Christmas morning and we were all set to unwrap a shiny new toy and then we had to put everything on hold owing to power outage or something’.

His team had scheduled to use a 1.3-metre telescope in Tasmania in order to track on microlensing alerts from Kepler. The start of Kepler’s microlensing campaign presently is on hold till engineers tend to get the telescope working again. It is presently about 120 million kilometres from Earth, which means that each message tends to take 13 minutes to reach Kepler and back. Days that are lost from the microlensing campaign would be difficult to make up later.

 NASA’s director of astrophysics, Paul Hertz, had touted that the Kepler microlensing survey is a step towards the next big space telescope of the agency, the Wide-Field Infrared Survey Telescope, that is intended to do microlensing searches after it launches in 2020.

MIT's new Chronos System Promises Precise Wi-Fi Tracking

Wi-Fi

Chronos – Wireless Localization Technology


Several users tend to use Wi-Fi to browse social media, check emails and watch videos. However according to Dan Misener, Radio technology columnist, researchers at MIT have invented something known as Chronos which is the latest way of using Wi-Fi in tracking the exact position down to the centimetre. Chronos is a `wireless localization’ technology or a Wi-Fi positioning system and is essentially a method of utilising Wi-Fi in figuring out where you are.

There are various means of doing this though Chronos tends to work by measuring the time it may take for a signal to travel from one wireless device to another device. For instance, if you have a smartphone and it is connected to a wireless router, the router tends to send information to the phone. The phone receives the same and then sends back a signal.

On measuring the time taken and by applying some calculation to the signal, one can determine where the smartphone is with regards to the router, the distance and the angle. In many ways, it tends to be the same way how radar or sonar systems seem to work. Chronos could be considered as a way to turn a regular Wi-Fi router into a kind of radar system which can distinguish objects and where they could be in the world.

Difference is Accuracy


The big difference is the accuracy. Customers-grade GPS tend to pinpoint you within a few metres distance but Chronos system tends to locate you within tens of centimetres. Moreover there are instances where GPS sometimes does not function at all like in underground or when one is indoors. Chronos tends to work anywhere within a Wi-Fi router range.

There are various other Wi-Fi based location system and are often utilised in airports, hotels and shopping mall to track foot traffic. U.S. malls tend to use shopper’s cell phones to track them, but those systems need several access point and many routers to cover a large area and triangulate the location of someone.

The distinctive thing regarding Chronos is that it only needs a single access point, a single router and one can set this up at home or a small business without incurring much expense.

Utilised in Locating Lost Device within the Home


The researchers have also informed that Chronos tends to be 20 times more accurate than the prevailing systems. One reason for using it in home is `home automation’ wherein there is a rise of the smart homes which tends to respond to who is in them.

Hence knowing who is at home and where people are within a home could be useful information. In a demonstration, the researchers had shown how Chronos tends to accurately identify which room a person was in 94% of the time. This device could also be utilised in locating a lost device within the home which could be helpful whenever a phone or a tablet would be misplaced.

Chronos can be used in controlling who gets to access the Wi-Fi, which could be useful for small businesses. Deepak Vasisht, one of the MIT researchers had informed at last month’s symposium, that if one walks into a Starbucks, they tend to get free Wi-Fi, but if one talks to them, they inform that they are very much keen in restricting free Wi-Fi access only to their customers and do not want to give free Wi-Fi to their neighbours which could end up causing congestion for their own customers. Hence a coffee shop could use Chronos to cut off Wi-Fi freeloaders.

Skydive - Open Source Real-Time Network Analyzer Tool

Skydive - Open Source Real-Time Network Analyzer

Skydive - Open Source Real-Time Network Analyzer Tool.


Skydive is an open source real-time network topology and protocols analyzer. It aims to provide a comprehensive way of understanding what is happening in the network infrastructure.


Skydive agents collect topology informations and flows and forward them to a central agent for further analysis. All the informations a stored in an Elasticsearch database.

Skydive is SDN-agnostic but provides SDN drivers in order to enhance the topology and flows informations. Currently only the Neutron driver is provided but more drivers will come soon.

Skydive relies on two main components:

  • Skydive agent, has to be started on each node where the topology and flows informations will be captured.
  • Skydive analyzer, the node collecting data captured by the agents


Installation:

$ go get github.com/redhat-cip/skydive/cmd/skydive

Configuration

For a single node setup, the configuration file is optional. For a multiple node setup, the analyzer IP/PORT need to be adapted.

Processes are bound to 127.0.0.1 by default, you can explicitly change binding address with "listen: 0.0.0.0:port" in the proper configuration sections.

See the full list of configuration parameters in the sample configuration file etc/skydive.yml.default.

Start

$ skydive agent [--conf etc/skydive.yml]
$ skydive analyzer [--conf etc/skydive.yml]

WebUI

To access to the WebUI of agents or analyzer:

http://<address>:<port>


Download


About the Author :
Christian Galeone is an IT Security Specialist from Italy. He has been Acknowledged by the TOP IT 5 Companies including Yahoo!, Microsoft, AT&T, Sony. He is currently working with HOC as Author of Cyber Security & VA Research Articles.

الاثنين، 25 أبريل 2016

Facebook Gets Hacked! Hacker Secretly Stored Backdoor In Its Server Later Found By Security Researcher

Facebook server hacked


Facebook Gets Hacked! 

Hacker Secretly Stored Backdoor In Its Server, Later Found By Security Researcher.


When a security researcher trying to discover the bugs in the Facebook then he noticed a strange backdoor script was already uploaded by unknown hacker on the Facebook credential page to steal the logs of its employees. These logged passwords were stored under web directory for the hacker to use WGET every once in a while.


  • Tsai reported to Facebook on 5 February. 
  • The company launched an internal investigation, which fixed on 20 April.
  • Allowing security company 'Devcore' to publish the Proof of Concept (POC).


Orange Tsai who is a consultant for DevCore, also expends a lot of his free time for helping the big name of companies that attach the vulnerabilities through their programs of bug bounty. 

And at the end of February, Tsai determined to give the one more try to the bug bounty program of Facebook as well as it was started charting some of the backend services of the company for the possible servers that he might hack.

Even the researcher hacks the internal file sharing application of  Facebook.

He found a server among these C Class IPs. and search to the files.fb.com domain that is a service kind of online file transfer as well as of file hosting that is running on Secure FTA (File Transfer Application) of Accellion.

Using Pre-Auth SQL Injection to Write Webshell

After finding the type as well as version of application then the researcher went to work and investigated the source code internally, to finding the cross-site scripting (XSS) defects, escalation issues of two local privilege that is a known-secret-key issue which led to the execution of remote code, as well as a pre-auth SQL injection which is also led to remote code execution.

The researcher used the defects of SQL injection which he found in the FTA application to access the server of Facebook as well as it was satisfied with the complete control over the machine.

When the researcher reached his goal then they initiated gathering the required information to submit a bug report to the staff of Facebook. When they looking at one of the logs of the server and it was discovered by Tsai who found a lot of doubtful error messages.

WebShell On Facebook Server



Tsai followed these messages down to a web shell about that he was sure as well as quite observable which is never uploaded by the Facebook employee. While investigating the source code of web shell, Tsai discovers the proof of a server-side keylogger that was interrupting by the login operations as well as they accumulating the credentials in a local log file accessed by the Facebook employee.

Then the researcher looked at the additional log files that illustrated that how the hacker returns back at a variety of intervals to gathered the data which were already the logged in, map the local network as well as efforts to lift the private keys of SSL.

When the hacker was active details exposed the two divide periods, the one in July 2015, as well as then one in mid-September 2015.

Tsai sent the bug report to Facebook about the incident, and he got the $10,000 Bug bounty for his efforts.

One of Facebook Security team member named Reginaldo said,

We're really glad Orange reported this to us. On this case, the software we were using is third party. As we don't have full control of it, we ran it isolated from the systems that host the data people share on Facebook.
We do this precisely to have better security, as chromakode mentioned. After incident response, we determined that the activity Orange detected was in fact from another researcher who participates in our bounty program. Neither of them were able to compromise other parts of our infra-structure so, the way we see it, it's a double win: two competent researchers assessed the system, one of them reported what he found to us and got a good bounty, none of them were able to escalate access.

Dutch Police Seized 19,000 Users of Encrypted Communication Networks

Dutch Police Seized 19,000 Users of Encrypted Communication Networks


Dutch Police Seized 19,000 Users of Encrypted Communication Networks

Dutch police said that they have arrested the owner of Ennetcom who is a provider of encrypted communications for a network of 19,000 customers on the thought of using the business for prepared crime and shut it down.


The judges of Rotterdam ordered that Danny Manupassa, 36, be seized for 14 days throughout an continuing investigation. And the prosecutors said he is suspected of money laundering as well as of illegal weapons possession.

Prosecutors said in a statement "Police and prosecutors believe that they have captured the largest encrypted network used by organized crime in the Netherlands.”

A spokesman Wim de Bruin of the national prosecutor's office said even though using the encrypted communications is legal and most of the user of this network are supposed to have been occupied in "serious criminal activity.”

Ennetcom said in a statement on its website that the company had been required to "suspend all operations and services for the time being."

And the company said, "Ennetcom regrets this course of events and insinuations towards Ennetcom. It should be clear that Ennetcom stands for freedom of privacy.”

Whereas Ennetcom, as well as most of its users, are in the Netherlands and the group of the servers of the company were in Canada. And prosecutors said information regarding the servers in Canada that have been copied in collaboration with Toronto police.

The Justice Department of Canada said that the matter was under investigation as well as it refused the additional comment.

De Bruin said that the collected information would be used in the investigation opposed to the Manupassa as well as it is potentially in other ongoing criminal investigations.

De Bruin rejected to the comment on whether as well as on how police would be capable of decrypting the information which kept on the servers.

The prosecutors said,  "The company sold modified telephones for about 1,500 euros each and used its own servers for the encrypted data traffic. The phones had been modified so that they could not be used to make calls or use the Internet."

And the prosecutors said that the phones had turned up constantly in investigations into the cases of drug, criminal motorcycle gangs, and gangland killings.

On Tuesday, all of the 19,000 users of the network were sent a message and they  informing them that the system was being investigated by police.

Source: Reuters

السبت، 23 أبريل 2016

Windows 7 Todas as Versões ATIVADO 2016 Torrent



Windows 7 Todas as Versões ATIVADO Abril 2016 PT-BR Torrent 32 e 64 Bits ,  ISO totalmente atualizado em Abril de 2016, essa ISO é da equipe Generation2 comandado por Ashish.k, milrob e stevie-boy.

São eles os maiores gerados de ISO em matéria de sistema operacional,  os gringos passou a fazer desde ano passado ISO atualizadas em  PORTUGUÊS-BRASIL, sem dúvida são as melhores imagens ISO se tratando de sistema operacional, ultimamente eles estão dando preferência em  ISO 64 Bits , porém lançaram  no mês de março 32 Bits, e a mais nova versão 32 e 64 Bits Integrado lançado em 25/04/2016 Windows 7 SP1 X86 X64 16 em 1 ESD pt-BR Abril 2016 ATIVADO

____________________________________________________
* Windows 7 SP1 X86 8em1 pt-BR março 2016 {Generation2}
* Arquivo: Win7.X86.8in1.pt-BR.Mar2016.iso
* Integrado / pré-instalado no modo de auditoria:

* Internet Explorer 11
* Importante & Security Updates - 2016/03/08
* .NET Framework 4.6.1 (NDP461-KB3102436)


* Setupcomplete / pós-instalação:

* DirectX End-User Runtimes (Junho de 2010)

* Defender Updates

[ CARACTERÍSTICAS ]

* UEFI-pronto
* (Use anexado USB-ferramenta Rufus para fazer UEFI-arranque).
* Diagnostics and Recovery Toolset 10,0 (Microsoft DaRT)

[Edições incluem] 
* Windows 7 Home Premium
* Windows 7 Home Premium - - - Pré-Activated
* Windows 7 Professional
* Windows 7 Professional - - - Pré-Activated
* Windows 7 Enterprise
* Windows 7 Enterprise - - - - Pré-Activated
* Windows 7 Ultimate
* Windows 7 Ultimate - - - - - Pré-Activated

* Índice de pré-ativado irá auto-reinicialização para concluir a ativação.


[INSTALAÇÃO E INFORMAÇÕES]

* Criar USB inicializável (altamente recomendado), com Rufus,
* (Em anexo) ou gravar em DVD em baixa velocidade
* Tamanho: 4,10GB
* Formato: ISO inicializável
* Idioma: pt-BR [BRASILEIRO]

____________________________________________________
* Windows 7 SP1 X64 8em1 ESD pt-BR abril 2016

* Integrado / pré-instalado no modo de auditoria:

* Internet Explorer 11
* Importante & Security Updates - 2016/04/12
* .NET Framework 4.6.1 Hotfix Rollup (KB3146716)

* Setupcomplete / pós-instalação:

* DirectX End-User Runtimes (Junho de 2010)

* Defender Updates

[ CARACTERÍSTICAS ]

* UEFI-pronto
* (Use anexado USB-ferramenta Rufus para fazer UEFI-arranque).
* Install.wim comprimido para o formato de recuperação (install.esd)
* Diagnostics and Recovery Toolset 10,0 (Microsoft DaRT)

[Edições incluem]
   
* Windows 7 Home Premium
* Windows 7 Home Premium - - - Pré-Activated
* Windows 7 Professional
* Windows 7 Professional - - - Pré-Activated
* Windows 7 Enterprise
* Windows 7 Enterprise - - - - Pré-Activated
* Windows 7 Ultimate
* Windows 7 Ultimate - - - - - Pré-Activated

[Ativadores]
* Daz carregador v2.2.2.0 & KMSpico v10.1.9 Portable Edition
(Ambos ativadores Potencial False Alarm Virus positiva)

* Índice de pré-ativado irá auto-reinicialização para concluir a ativação.

* Criar USB inicializável (altamente recomendado), com Rufus,
* (Em anexo) ou gravar em DVD em baixa velocidade.


* Tamanho: 3,36GB
* Formato: ISO inicializável
* Idioma: pt-BR [BRASILEIRO]

____________________________________________________
* Windows 7 SP1 X86 X64 16 em 1 ESD pt-BR Abril 2016 ATIVADO

* 32bit:  
* Windows 7 Home Premium
* Windows 7 Home Premium - - - Pre-Activated
* Windows 7 Professional
* Windows 7 Professional - - - Pre-Activated
* Windows 7 Enterprise
* Windows 7 Enterprise - - - - Pre-Activated
* Windows 7 Ultimate
* Windows 7 Ultimate - - - - - Pre-Activated

* 64bit:  
* Windows 7 Home Premium
* Windows 7 Home Premium - - - Pre-Activated
* Windows 7 Professional
* Windows 7 Professional - - - Pre-Activated
* Windows 7 Enterprise
* Windows 7 Enterprise - - - - Pre-Activated
* Windows 7 Ultimate
* Windows 7 Ultimate - - - - - Pre-Activated

*Idioma PT-BR = BRASIL
* Tamanho: 4,35GB

* Creditos:
* ashish.k, milrob & stevie161057


Raton Shop


Download TORRENT 32 e 64 Bits Integrados
Download TORRENT 32 BITS
Download TORRENT 64 BITS

Raton Shop
Raton Shop

Bangladesh Bank Used $10 Router And No Firewall, Reason Got Hacked $80 Million Said Police

Bangladesh Bank Using $10 Router And No Firewall, Reason Got Hacked $80 Million Said Police


Bangladesh Bank Used $10 Router And No Firewall, Reason Got Hacked $80 Million Said Police


The Central Bank Of Bangladesh was exposed to hackers because it did not have a firewall as well as it was used as second-hand. An investigator into one of the world's biggest cyber heists said that $10 exchanges to the network of that computers which are connected to the SWIFT global payment network.


Mohammad Shah Alam who is the head of the Forensic Training Institute of the Bangladesh police's criminal investigation department said that the weaknesses made it easier for hackers to break the security system of the Bangladesh Bank earlier this year as well as it was attempt to siphon off nearly $1 billion using the SWIFT credentials of bank.

Even Alam said in an interview that "It could be difficult to hack if there was a firewall." 

And he also added that there was more requirement of complicated switches that can cost of a number of hundred dollars or more which also means it is tricky for investigators to determine what the hackers did as well as where they might have been based.

And experts in bank security said that the conclusion explained by Alam were disturbing. 

Jeff Wichman who is a consultant with cyber firm Optiv said, "You are talking about an organization that has access to billions of dollars and they are not taking even the most basic security precautions." 

Tom Kellermann who was a former member of the World Bank security team, said that the security faults explained by Alam were "egregious," and that he believed there were "a handful" of central banks which is used in developing countries that were equally insecure.

Kellermann who is now chief executive of investment firm Strategic Cyber Ventures LLC said that most of the banks fail to effectively prevent their networks because they pay attention to the security budgets that are used to physically defending of their facilities.

As all of us know that Cyber criminals hacked into the system of Bangladesh Bank as well as in early February they tried to make fake transactions up to the totaling of $951 million from its account at the Federal Reserve Bank of New York.

Even most of the payments were blocked at the time but $81 million was running scared to the accounts in the Philippines and abstracted that money to casinos there. As well as most of those funds stay missing.

Alam said in an interview that the police considered that both of the bank and SWIFT should take the blame for the misunderstanding.

He said, referring to SWIFT that "It was their responsibility to point it out but we haven't found any evidence that they advised before the heist.”

SWIFT has earlier said the attack was linked to an issue of an internal operational at Bangladesh Bank whereas the core messaging services of did not cooperate.

However, a spokesman for Bangladesh Bank said that SWIFT officially advised to the bank for promoting the exchanges only when their system engineers from Malaysia visited after the attack.
A spokesman said, "There might have been a deficiency in the system in the SWIFT room.” And Subhankar Saha  also verifying that the exchange was old as well as there were required to be promoted.

And also, Saha said, "Two (SWIFT) engineers came and visited the bank after the heist and suggested to upgrade the system.”

Source: Reuters