Here’s what hackers do with your data

The past few weeks have seen a flurry of hacker activity. From the leak of celebrity nudes to the 200,000 Snapchat photos stolen and posted on 4chan, to the most recent infiltration of Dropbox, it’s clear hackers have moved on from the days of stealing our credit card details. But what do hackers actually do with our data once they have stolen it?The short answer is they sell it on the cybercriminals’ black market. According to a report released earlier this year by the RAND Corporation’s National Security and Research Division, the hacker market is highly sophisticated and organized. The hacker market has, in some respects, become more profitable than the illegal drug trade, that report found. The data hackers steal ends up on a network of illegal trading sites where they buy and sell large amounts of personal data for profit.

Gone are the days when credit card fraud and identity theft were all we had to worry about. Hackers have discovered new ways to make money with your photos and social media account information. To hackers, LinkedIn and eHarmony offer a goldmine of passwords that can be used to update their “rainbow tables.” These tables are basically huge databases that serve as a digital key for hacking harder-to-crack encrypted passwords, as Slate’s Will Oremus has explained. According to the RAND report, Twitter accounts are now more profitable than stolen credit cards.

Not even our medical records are safe. Don Jackson, director of threat intelligence at PhishLabs, monitored underground hacking exchanges and discovered cybercriminals make around 10 times more money hacking someone’s medical information than from stealing their credit card details, according to Reuters. By stealing names, birth dates, and policy numbers, hackers can create fake IDs to buy medical equipment which they can later resell. They can also use the data to file made-up insurance claims.

RAND’s report on cybercrime describes the cyber black market as a “Hackers’ Bazaar” that is becoming increasingly diverse in the products it offers. Some underground organizations can reach up to 80,000 people and bring in hundreds of millions of dollars by turning stolen account information into usable money.

The market is surprisingly competitive and undoubtedly lucrative. RAND predicts that the exploitation of social networks and mobile devices will only continue to grow as YouTube “how-to’s” and Google guides make it easier for people to get involved in stealing, buying, and selling information.


How to download Movies available on Popcorn Time?

Popcorn Time is a software to watch movies and TV shows instantly that gives you wide range of movies and TV shows in HD resolution which are released latest. But it gives no way to download the movie from its UI.But there is a trick that enables you to download it.
1. Open Popcorn-Time2. Select the movie you want to watch/download.

3. There is an option where you can select where to play the movie (e.g. Popcorn Time or VLC).

4. Choose VLC and click on watch now.

5. It streams the movie on VLC.

6. Here is the hidden treasure. As you know that VLC shows the URL of the file in the title bar which in this case was an IP with a port no (e.g. This is actually the IP of Localhost i.e. equivalent to http://localhost:54678

7. Now you put the URL in the browser or in any download manager to download it.

Hope you find this useful.

Habits Of Successful Vs Unsuccessful People [Infographic]

Everyone wants to be successful in their life. Nobody wants to lead a life like a minion with mediocre existence. There are plenty of habits that successful people share with each other. We came across a powerful infographic by successstory that differentiates the successful people from those who are unsuccessful.For instance successful people will take risks, are humble and exude joy. Whereas unsuccessful people think they know it all, blame others, never set goals and always get angry at others. If you want to be successful in life and want to reach higher levels of accomplishments, then do try to follow some of the given habits, if not all of them.


This startup is putting solar cells on a diet, because thinner is better

Originally posted on Gigaom:

In the lab of seven-year-old startup Solexel, just south of San Francisco, researchers have been busy re-inventing solar panels made with silicon, the material that already dominates the solar market. The startup is a rare breed these days, and among a dwindling group of venture capital-backed solar materials startups.

Many of these types of startups fell on hard times years back as a glut of cheap solar panels hit the market. Solexel has raised about $200 million in total from investors including Kleiner Perkins, Technology Partners, Intel and DAG Ventures.

But Solexel’s design is novel and it’s developing panels made of ultra-thin silicon solar cells, paired with diodes that can shut down poor-performing ones to prevent them from affecting the output of the neighboring cells. The back of the cells are layered with materials that improve their durability and the efficiency that sunlight is converted into electricity.


We’ll have to…

View original 845 more words

The many ways Apple could seize control from the carriers with its new SIM card

Originally posted on Gigaom:

When Apple launched the iPad Air 2 with its new programmable SIM card on Thursday, I suggested Apple had all the tools necessary to become a global virtual operator, selling data (and eventually voice) services directly to its customers. It’s a move industry observers like Gigaom contributor Rudolf van der Berg have been anticipating for some time, but I still feel the likelihood of Apple becoming a flow-blown carrier is slim.

When signals go down, networks get congested and unexpected charges appear on your bill, people vent their displeasure at their carriers. That’s grief I’m sure [company]Apple[/company] doesn’t want to deal with. But Apple has plenty of other options beyond becoming a mobile virtual network operator (MVNO) if it wanted to exert more control over the mobile industry.

Apple, just like any other phone maker, has always acted as a gatekeeper to mobile networks through its hardware choices…

View original 951 more words

iPad Air 2 contains the first Apple SIM, letting you flip flop between carriers

Originally posted on Gigaom:

At its iPad launch event Thursday, Apple made a big deal about the 20 LTE bands and super-fast 802.11ac Wi-Fi available in the new Air 2. But there was one detail that didn’t make the spotlight, but could have a huge impact on how we buy 4G-connected tablets in the future: The iPad Air 2 contains the first Apple SIM card, a kind of carrier-neutral identity module.

What that means is you don’t have to pick your carrier before you buy a 4G iPad in the U.S. or the U.K. (unless that carrier is [company]Verizon[/company], but I’ll get to that later). The new slate has support for all of the global LTE bands as well as GSM and CDMA networks, so when you first turn on your iPad and try to connect it to a distant tower, Apple will give you a choice of [company]AT&T[/company], [company]T-Mobile US[/company] or [company]Sprint[/company]…

View original 447 more words

Physicists have quantum teleported a particle of light across 25 kilometres

Scientists have successfully teleported the quantum state of a photon to acrystal over 25 kilometres of optical fibre, showing that information can be teleported from light into matter.


Crystals containing photonic information teleported over 25 kilometres.

Image: University of Geneva

The breakthrough was made by a team at the University of Geneva, and according to their press release, the results prove “that the quantum state of a photon can be maintained whilst transporting it into a crystal without the two coming directly into contact“.

Quantum teleportation involves moving tiny bits of data from one place to another instantly, through a phenomenon know as quantum entanglement. Entanglement is when two linked particles act like twins, even when they’re separated, and means that information can instantly be passed from one to the other without them touching.

Researchers are fascinated by quantum teleportation because it could revolutionise the way we carry and transmit data. But they’ve struggled until now to find ways in which quantum information stored in light can be used in existing communication systems, which are matter-based, and transferred further than a few kilometres.

In this new experiment, the physicists took two entangled photons and sent one along 25 kilometres of optical fibre, while the other was sent to a crystal, which stored its information.

A third photon was then sent like a billiard ball into the optical fibre to hit the first photon, obliterating them both.

But the scientists discovered that the information from that third photon wasn’t actually destroyed, but had in fact been transferred into the crystal containing the second entangled photon. Their results are published in Nature Photonics.

This shows “the quantum state of the two entangled photons which are like two Siamese twins, is a channel that empowers the teleportation from light into matter,” co-lead researcher Félix Bussieres said in the press release.

“One needs to imagine the crystal as a memory bank for storing the photon’s information; the latter is transferred over these distances using the teleportation effect,” the press release explains.

There is still a long way to go before we’re using quantum teleportation in communication systems, but this is an important step that suggests the “vehicle” of the information doesn’t matter so much. As the authors write in Nature Photonics, the experiment demonstrates “quantum teleportation of the polarisation state of a telecom-wavelength photon onto the state of a solid-state quantum memory.”

And that opens up a lot of possibilities for future quantum teleportation research.