10 Facts About Wikipedia That You Didn’t Know

What is the step you take when you come across a random USB stick? Very often, people stick it in their laptop without much thought. This could result in heavy losses in the form of virus infections, ransomware attack, or installation of some keylogger or adware. 

The popular TV show Mr. Robot (2nd favorite TV show at Fossbytes after Westworld) has changed the way computers and hackers are portrayed in popular culture. In one episode, a character named Romero says, “I’ve been in this game 27 years. Not once have I come across an animated singing virus.”
In another episode, one of the F-Society hacker drops few USB drives in a prison parking lot. One of the prison employees picks one USB and ends up infecting the computer network. In such a situation, what would you do? Will you pick up the USB drive and use it?
Earlier this year in September, we told you a study that confirmed the human behavior of plugging the random USB drives in the laptops as soon as possible. In another study from early-2016, it was found that at least 48% of people will pick up a random USB stick and plug it into their PCs.
One should remain careful if he/she comes across an unclaimed USB drive. The sensible step would be to ignore the USB drive. Just leave them be. Just in case you decide to pick it up, for whatever reasons, never plug them in. It’s a risk that’s not worth taking.
Some of you might be wondering — What could happen if I pick a stray USB and plug it in?
Well, it’s a known fact that hackers use it as a way to spread malware. It’s possible that the USB could be infected with malware. Apart from the well-known trojans and worms, your PC might also fall prey to ransomware, keyloggers, adware and other threats.
We’ve also repeatedly told you about advance attack mechanisms like the one employed in USB Killer.
Have something to add? Don’t forget to drop your views in the comments section below.

Do You Know All the Terms Of Hacking World You Should Know

Common Terms Of Hacking World:

1#DDoS: DDoS  means Distributed Denial of Service. This is a type of DOS attack in which multiple compromised systems are used and these systems are often infected with a Trojan. All these infected systems select a target and cause a Denial of Service (DoS) attack.
2# VPS: It stands for Virtual private server (VPS) . It is a virtual machine that is sold as a service by an Internet hosting service. A VPS generally runs its own copy of an operating system, and the customers have superuser-level access to that operating system instance, so they can install almost any software that runs on that OS.
3# SE: Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
4# HTTP: The Hypertext Transfer Protocol (HTTP) is an application protocol for  collaborative, distributed, hypermedia information systems. HTTP is the basis of data communication for the World Wide Web. The part  Hypertext is a structured text that makes use of logical links (hyperlinks) between nodes containing text.
5# SSH: Secure Shell( SSH)  is a cryptographic i.e, encrypted network protocol that operates at layer 7 of the OSI Model. It allows remote login and other network services to operate in a secure way over an unsecured network. In simple words, SSH is used to connect with Virtual Private Servers.
6# FTP: The FTP or File Transfer Protocol is a standard network protocol that is used to transfer files between a client and server using a computer network.
7# XSS (CSS): Cross-site scripting or XSS is a type of computer security vulnerability usually found in web applications. This vulnerability allows hackers to inject client-side script into web pages which are viewed by other users.
8# Script Kiddie: A Skiddie or Script Kiddie is an unskilled individual who uses programs or scripts developed by other hackers to attack networks and computer systems even to deface websites.
8# VPN: A Virtual Private Network or VPN helps in extending a private network across a public network, such as Internet. It allows the users to send and receive data across public or shared networks just like their computing devices are directly connected to the private network. Hence this benefit from the security, functionality and management policies of the private network.
10# Nix: Nix is a very powerful package manager for Linux and other Unix based systems that make package management reproducible and reliable. It provides side-by-side installation of multiple versions of a package, atomic upgrades and rollbacks,  easy setup of build environments and multi-user package management.
11# SQL:  Structured Query Language or SQL is a special-purpose programming language designed for managing data contained in a relational database management system (RDBMS), or even for stream processing in a relational data stream management system or RDSMS.
12# FUD: Fully undetectable or FUD in short, can stand for data that had been encrypted, making it appear to be random noise. This term is used in hacker circles to refer something as a clean software to many anti-viruses but still contain some kind  of hacking tool inside it.
13# LOIC/HOIC: The Low Orbit /High Orbit Ion Cannon, often abbreviated to LOIC/HOIC. It is an open source denial-of-service attack and network stress testing application written in BASIC and is designed to attack as many as 256 URLs at a time.
14# Trojan: A Trojan or Trojan horse is a type of malware that disguises itself as a legitimate software. these Trojans can be employed by hackers and cyber-thieves trying to gain access to users’ systems. Users are typically tricked  into loading and executing Trojans on their systems.
15# Botnet: A botnet (also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet.
16# SQL Injection: SQL injection is a famous code injection technique, commonly to attack data-driven applications.In this attack, malicious SQL statements are inserted into an entry field for execution.
17# Root: Root is the Highest permission level on a computer that allows the user to modify anything on the system without a  single restriction.
18# Warez: Warez is copyrighted works distributed without fees or royalties, and may be traded, in general, violation of copyright law. Warez are generally unauthorized releases by organized groups, as opposed to file sharing between friends or large groups of people with similar interest using a darknet. Warez are not usually commercial software counterfeiting.
19# White Hat Hacker: A white hat hacker is a computer security specialist ( ethical hacker ) who breaks into secured systems and networks to test and assess their level of security. These are the good guys in the hacking community and use their skills and knowledge to to improve security by exposing vulnerabilities before a malicious hacker (also known as black hat hackers) detects and exploits them.
20# Black Hat Hacker: A black hat hacker is an individual with very good computer knowledge and with a sole purpose to bypass or breach internet security for malicious reasons. Black hat hackers are also known as dark-side hackers or crackers. These are the guys with whom White hat hackers have to fight all the time.
21# Grey Hat Hacker: The term Grey Hat hacker refers to a computer hacker or computer security expert who sometimes violate laws or typical ethical standards, for personal purposes but don’t have the malicious intentions like a typical black hat hacker.
22# Rootkit: A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term rootkit is a connection of the two words “root” and “kit”. This kind of virus can be easily removed by booting the computer in safe mode.
23# Ring0: Very hard to remove and very rare in the wild, these can require you to format, it’s very hard to remove certain ring0 rootkits without safe mode.
24# IP Grabber: IP Grabber is a link that grabs victim’s IP when they visit it the particular web address.
25# Malware: ‘Malware’ is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.
26# Phreak: Phreak is a slang term coined to describe the activity of a culture of people who  experiment with, explore, or study, telecommunication systems. Phreaker, phreak, or phone phreak are names commonly for and by individuals who participate in phreaking.
27# DOX: Doxing or doxxing, is the Internet-based practice of researching and broadcasting personally identifiable information about an individual. The methods employed to acquire this information include searching publicly available databases and social media websites (like Facebook), hacking, and social engineering. It is closely related to internet vigilantism and hacktivism. Doxing may be carried out for various reasons, including to aid law enforcement, business analysis, extortion, coercion, harassment, online shaming and vigilante justice.
28# Worm: A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.
29# Deface: A website deface is an attack on a site that changes the appearance of the site or a certain web page or technically when a hacker replaces the index file with their own one.
30# Keylogger: Keylogger is a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
31# RAT: A remote administration tool (RAT) is a piece of software that allows a remote “operator” to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, “RAT” software is usually associated with criminal or malicious activity.
Did you like the article on hacker terms ? Please share it with your friends and let them know this information.
If you happen to find any mistakes n the article, comment below. I will be happy to address them.

Researchers Unveil A Wireless Tech That’s ’10 Times’ Faster Than 5G

A new transmitter tech demonstrated by a team of Japanese researchers enables a communication link of more than 100 Gbps over a single 25GHz channel using the 300Ghz frequency band, dubbed as ‘Terahertz’. They are uncovering more about their Terahertz wireless tech at the IEEE’s International Solid-State Circuits Conference 2017.

5G or the fifth generation mobile networks, is expected to roll out sometime around 2020. But a new wireless tech demonstrated by a group of researchers is around 10 times faster than 5G. It’s capable of boosting speeds up to 100 Gbps over a single channel using a 300Ghz band – known as the Terahertz.

The team includes researchers from Hiroshima University, the National Institute of Information and Communications Technology, and Panasonic Corporation. During the demonstration, their IC-based transmitter used a 25 GHz channel, ranging from 275Ghz to 450Ghz. They were able to establish a communication link of 105 Gigabit per second.
The 60 GHz band used by the WiGig standard is enough to fascinate us. But this is going insane at 300Ghz. And the 25 GHz channel, if you compare this with the 20 Mhz channels used in the current 4G LTE, it would be 1000 times.
A question arises out of curiosity. The band is 300Ghz, so why it’s being touted as terahertz? That’s because it is named so by the International Telecommunications Union (ITU). The terahertz spectrum includes baseband frequencies from 0.3THz (300GHz) to 3THz. Even the 5G technology’s frequency bands max out at 39Ghz.
The team also presented a version of their tech last year, where they demonstrated the use of quadrature amplitude modulation (QAM) that could enhance the speed over the 300GHz band. As per the latest demo, they have recorded a speed gain of around six times per channel.
However, there is a lot to be done before this tech can arrive in the market. We can foresee a possibility of ultrahigh-speed wireless networks in the future. The ones similar to the gigabit fiber networks but without the fiber.