Posts

When a bug is found, the hacker earns about Rs 175 million

Image
When a bug is found, the hacker earns about Rs 175 million A white-hat hacker (cybersecurity researcher) has received the biggest bug bounty award ever. On February 3, Armor Fi paid a white-hat hacker named Alexander Slindwine 1.5 million, or about  175 million, for finding a sensitive bug in his smart contract. Alexander discovered the bug before going to the insurance brokerage platform Armor Fi Live. If the bug had been left unchecked, it would have allowed a bad character with a dollar coverage to steal the entire Armor Fi underwriting contract. The company has since provided 1 million armor tokens to Alexander. At the time of the announcement of the Bounty Reward, one million tokens were worth 700,000. But as news of the new bug bounty and security patch spread, public confidence in the platform increased, pushing the price of the token by 1.58. At the same time, the total value of Alexander's token has reached 1.5 million dollars. Which has made this bounty the biggest bounty

WhatsApp's downward journey continues, Telegram became the number one app of January

Image
WhatsApp's downward journey continues, Telegram became the number one app of January With the issuance of new privacy terms and policies, the number of WhatsApp users has been declining. The company's new policy of sharing user data with Facebook has led users to look for alternatives to WhatsApp. Meanwhile, data analysis company Sensor Tower has released a new report. According to this, Telegram has risen to number one in the most downloaded app (non-gaming) in January. According to a report released by Censor Tower in December 2020, Telegram was ranked ninth on the list. However, in a period of one month, Telegram has become the first to surpass all. WhatsApp, which was previously in third place, has dropped two places to fifth. The ticket, which was number one till last month, is number two in January. Similarly, the signal is in third place. Instagram, which was previously in the fourth position, has reached the sixth position this time. According to the study report, Teleg

At the risk of all Google Chrome users' data, Google's request to update to the latest version immediately

Image
At the risk of all Google Chrome users' data, Google's request to update to the latest version immediately Cybersecurity researchers have found a major flaw in Google Chrome. Researchers have been working to make the actual transcript of this statement available online. In this bug, hackers can easily access the device by placing a remote code on the user's device through Chrome. The process is also straightforward, and once a hacker gains access to a device, he or she can take full control of the device. Google has released a new version to address the problem of hackers accessing the device. On January 24, Google became aware of this vulnerability. The company unveiled a new version on February 4 with a solution to the problem. As soon as the new version is released, the company asks Google Chrome users to update immediately. Google did not say how many users were affected. However, the company said that this weakness is a big problem for users and requested to update the

To combat abuse, Wikipedia has released a new code of conduct

Image
To combat abuse, Wikipedia has released a new code of conduct Wikipedia, also known as an online vocabulary, has released a new code of conduct to combat abuse and harassment. The company has issued a code of conduct to combat abuse while maintaining diversity, inclusion, and accessibility for its volunteers. The new code is based on other Wikipedia projects like Crowdsource. In which 15 hundred volunteers have helped. Easy, short and clear to the user, the code of conduct is 1600 words. Which is divided into two parts. One of which is the positive behavior expected from users, editors, and Wikipedia staff. In which there is mutual respect, creative editing, the language used when calling other volunteers. They are also encouraged to help each other in the project. The second is unacceptable behavior, which the company discourages. In which the use of insulting, sexually abusive, threatening language has been discouraged. Wikipedia mainly prohibits content that intimidates, offends, in

A computer chip will be placed in the human brain this year

Image
A computer chip will be placed in the human brain this year Alan Musk, the owner of a company like SpaceX and Tesla, said that a computer chip would be made and implanted in the human brain within a year. This means that the person's brain will now be directly connected to the computer through the chip. Alan Musk founded Neurolink in 2016. Joe is working on creating an ultra-high brain-machine interface. In Joe Rogan's podcast show, Alan Musk chips a human brain into a robot. According to him, this technology will be ready in 25 years as a complete brain interface. Alan Musk believes that to prevent artificial intelligence from dominating people, it is necessary to connect people's minds to computers. The musk will extract a piece from the human brain. Electrodes will be placed inside the brain through the robot and the device will be placed in the hole. The mask will leave a small scar on the upper part of the brain. Neurolink is involved in creating a 'thread' tha

Don't make such mistakes when posting photos on social media

Image
Don't make such mistakes when posting photos on social media Nowadays, posting photos on social media is a hobby of almost all users. Some users find it more interesting to upload a photo than to write something. Another truth is that there are more likes and comments when you post a photo than when you write something on social media. But very few users know that many times when uploading a photo on a social network, they are unknowingly making a big mistake. Due to which you have to regret for some time. Today we are telling you about the mistake that can happen when uploading a photo on social media. Do's and don'ts of photo sharing? Every time you upload a photo, keep in mind who is with you in the photo. In the photos you post on social media, people are watching not only you but also the background of your photo and the people around you. Sometimes you even post photos of your food items on social media. So there is no danger from such photos. But such photos reveal t

Know these things before selling an old phone

Image
Know these things before selling an old phone Often users only take out their SIM and memory card before selling their old phone. But they are forgetting to logout of their important ID. Which poses a threat to their confidential data. If you are also thinking of selling your old mobile phone, today we are going to tell you some useful things. This will prevent your personal information from being leaked. Factory reset Don't forget to do a factory reset before selling your mobile. This will delete all the data on your mobile. Also, all the IDs from Google to Instagram will be logged out. Go to phone settings to perform a factory reset. There you will see the backup and reset option. Tap on it. After doing so, the phone will be factory reset. Don't miss out on backups Make a backup of your important data before making a mobile sale. Your data will not be deleted or leaked for any reason. To set up a backup, go to the settings of the most mobile and select the backup option. Your