Thursday, 29 September 2016

Kickass alternatives



kickass torrent is down .  As it is shut down by the US gov with the owner Artem Vaulin being arrested .
All the official domains have been shut down .
“ Vaulin is accused of running illegal sharing website files today the most visited, responsible for the illegal distribution of more than a billion dollars of materials protected by copyright ” says the Assistant Minister of justice Leslie Caldwell .

These are some working alternatives :

http://dxtorrent.com   
https://kickass.la
https://katstorrent.co
https://kickass.unblocked.cat
http://kat.al
http://kickasstorrents.to
http://settorrent.com  
http://kickasstorrents.website

BitTorrent is one of the most common communications protocol of peer-to-peer file sharing which is used to distribute data over the Internet. BitTorrent is one of the most common protocols for transferring files

IsoHunt, you may remember, IsoHunt was also behind the resurrection of The Pirate Bay during one of its numerous takedowns. The new mirror isn’t as robust as the mission to keep TPB functional .

“It’s not perfect but if the users need to save and archive something it’s time,” the IsoHunt team said. “We don’t know how long it can last, but at least it’s something.”


Some popular torrent websites :
torrentz  ( Alexa rank 205 ) :
Torrentz is a Finland based meta search engine for bit torrent .
https://torrentz.eu/

The Pirate Bay ( Alexa rank 329 ) :
Content is being provided by multiple round robin servers .
https://thepiratebay.org


Flaw in Chromodo


What is Chromodo?
Comodo’s Chromodo, a Chromium-based browser based on the open-source project Chromium that claims to improve the browsing experience by increasing loading speeds of the websites and online security.

According to the researchers, Chromodo automatically overrides system settings and set itself as the Default Browser without users' knowledge. Comodo’s Chromodo browser contains security failings and puts its users at risk.
According to the Google report, Comodo's Chromodo browser is less secure than it claims to be.
If your default browser had been changed to "Chromodo", then you could be at risk!
The main security issue is that the Chromodo browser has SOP - 'Same Origin Policy' disabled by default. This violates one of the strongest browser security policy.
SOP permits scripts running in a web browser to make requests to pages on the same domain.
It must be enabled to prevent the malicious scripts on one page from obtaining access to the data on another web page.
Disabling SOP in Chromodo could allow attackers to steal session authentication cookies, run malicious script codes and could even Replace websites with attacker - created HTML design. Some Chromodo browser are vulnerable to cross - domain attacks. “They also hijack DNS settings, among other shady practices,” Ormandy wrote.

Embassies at risk from Chinese hackers

According to Kaspersky Labs, a group of Chinese hackers, DANTI  stole some information from the computers of various bureaucrats and Indian embassies earlier this month.
The origin of Danti is unknown, but the Kaspersky Lab researchers suspect that the group is somehow connected to the Nettraveler and DragonOK groups. They believe it is Chinese hackers who are behind these groups.
Danti is highly focused on diplomatic entities. They may already have full access to internal networks of Indian government organisations, Kaspersky Lab alleged in a statement.
It was first spotted at the beginning of February. Some Danti Trojans have been detected in Kyrgyzstan, Kazakhstan, Uzbekistan, Nepal, Philippines and Myanmar.
The exploit is delivered through phishing emails. In order to grab the attention of potential victims, the threat actors of Danti have created emails in the names of some high-ranking Indian government officials. Once the vulnerability is exploited , the Danti backdoor is installed. This subsequently provides access to the infected machine so they can get sensitive data.

The “CVE-2015-2545” error enables the attacker to execute codes using a specially crafted EPS image file. The severity of the exploit for this vulnerability is very high as it uses PostScript technique and it can evade Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) protection methods embedded in Windows. This group is been spotted lately using this vulnerability.

Flaw in Truecaller

Truecaller is a popular service that search and identify any phone number and also can block the incoming calls and some SMS messages from phone numbers that are categorized as spam sources .
Security researchers from Cheetah Mobile Security Research Lab have discovered a remotely exploitable Bug in “ True caller “ app that puts over millions of its users at risk by exposing  the personal details of the users .
True caller has apps for many platforms like android , ios , windows , black berry , Symbian .
The Bug discovered by Cheetah Mobile Security Research Lab, affects Truecaller Android version .
Truecaller app asks users to enter phone number, email id, and other personal details, which is verified. It uses the device's IMEI to authenticate users.

Researchers were able to retrieve the personal details of other users based on the IMEI code just by interacting with app's servers.
The attacker can get some personal informations like account name, e-mail, profile picture, home address. Attackers can modify user's application settings, they can disable spam blockers and add or delete blacklist of users .
Attackers can write some scripts that query a random IMEI code to discover details about user and use them in spam and phishing campaigns.
Their servers are updated as well as released an update . In order to prevent get the latest version of truecaller.