This 9 Year Old Developer Is The Youngest Attendee Of Apple Wwdc Techworm

Anvitha Vijay, a nine-year-old Indian-origin girl who develops educational applications for children, was one of the youngest attendee that Apple selected to attend the WWDC 2016 in San Francisco. Vijay is attending the annual WWDC’s event this year as part of Apple’s scholarship program, which gives free tickets to developers around the world who build applications for Apple devices. She had applied for the scholarship online. This event is quite a huge opportunity for developers and coders worldwide, being able to attend it is dream come true for Anvitha Vijay....

December 11, 2022 · 2 min · 383 words · Richard Jun

This Guy Found Out How To Take Over Any Facebook Page Using A Zero Day Techworm

An Indian security researcher has discovered a zero-day in the Facebook Page which allowed him to hijack any FB Page belonging to any organisation. Arun Sureshkumar discovered a zero-day in how the Facebook handles requests for its business accounts. Arun has described his bug discovery on his Blogspot where he says he can take over Facebook Page belonging to anybody like President Obama, Prime Minister Modi etc. Facebook Business Manager lets businesses more securely share and control access to their ad accounts, Pages, and other assets on Facebook....

December 11, 2022 · 1 min · 201 words · Roger Roland

This Guy Loses Double Alimony After Flaunting His Wealth On Facebook Techworm

And it happened again, this time in India. Meet Mr.Mohammed Javed Shaikh from Ahmedabad in Gujarat. Bragging about his status on social media proved costly to a Shaikh who is a local builder. Shaikh was seeking divorce and filed a petition in the court to prove that he was ‘poor’ to save on the alimony money. On the moment of boast, Shaikh posted an image on Facebook flaunting his expensive Rada watch....

December 11, 2022 · 3 min · 448 words · Ben Laduke

This Newly Discovered Bug Allows Any Website To Crash A Windows Vista 7 Or 8 Pc Techworm

For those unfamiliar, this newly discovered bug is an upgraded version of an annoying old bug known as concon. This was a computer bug that appeared in the Windows 95 and Windows 98 operating systems and was considered as a security vulnerability because malicious web pages would crash systems with links such as file:///C:/con/con. So, how does this new iteration of bug work? This bug allows a malicious website to load an image file with the “$MFT” name in the directory path....

December 11, 2022 · 2 min · 264 words · Brianna Maresca

This Prototype Phone Case Comes With A Built In Drone Techworm

In a video explaining the design, the creators show how the phone case contains a slide-out drawer, inside of which lies a tiny four-propeller drone and a camera. The little drone is hidden inside a compartment between the case and the back of the phone, which works by connecting to one of the case’s tethered, detachable cameras. When the drone is taken out of the case, the foldable propellers move into the correct position....

December 11, 2022 · 2 min · 315 words · Shannon Vega

Top 3 Wi Fi Pentesting Tools In Kali Linux Techworm

Every hacker and security researcher loves Kali Linux. The developers of Kali Linux ethical hacking distro have released the second Kali Rolling ISO release i.e. Kali 2016.2. Just like the previous one, Kali promises to deliver lots of new updates and changes in this release. Over the course of past few months, Kali developers have been busy adding new tools to Kali and fixing multiple bugs. For example, they have added HTTPS support in busybox that allows secure installation over SSL....

December 11, 2022 · 3 min · 612 words · Steven Soto

Top 5 Tips To Get Some Privacy And Go Invisible On Whatsapp Techworm

Here are some tips to go invisible on WhatsApp and get some privacy1. Hide your Last Seen:2. Hide your Status:3. Hide your profile photo:4. No Blue Ticks please:5. Snooze or pause WhatsApp: However, it is not easy to become invisible in the recent popular messaging service, WhatsApp. So, what can you do to get rid of continuous pings and get some momentarily peace and privacy on WhatsApp. Check out the methods explained below that can help you become invisible on WhatsApp:...

December 11, 2022 · 2 min · 407 words · Leona Rosenau

Tor Shuts Down Its Anonymous Cloud Service Project

Tor has announced that it is shuttering down the Tor Cloud service platform. The reasons given for the closure is some major bug that is present in the service. Tor explained the reasons in blog post,

December 11, 2022 · 1 min · 36 words · Christopher Wilson

Twitter New York Times Huffington Post Domains Hacked By Syrian Electronic Army Techworm

Screenshot showing domain New York Times domain registered with Syrian Electronic Army While this Article was being Written, Twitter U.K went down. Screenshot showing domain Twitter U.K domain registered with Syrian Electronic Army Soon After twitter U.K twitter.ae went down. DNS of all these websites were changed to: ns1.syrianelectronicarmy.com ns2.syrianelectronicarmy.com Which is same as that of Official Syrian Electronic Army’s website, due to which Visitors visting on New York Times, Huffington Post were redirected to official SEA website....

December 11, 2022 · 1 min · 163 words · Steven Rodriguez

United Nations Website Hacked By Pro Palestine Hackers Anonghost 120 More Government Sites Defaced

AnonGhost, a pro-Palestine hacker collective has been on a unending hacking spree. The latest victim of AnonGhost cyber assault is United Nations. AnonGhost today defaced the United Nations (UN) website. They have released a statement on stating that they hacked United Nations website under the #OpSaveAlAqsa following rising tensions between Israel and Palestine surrounding the future of the Al-Aqsa Mosque in East Jerusalem. The latest attack has seen AnonGhost hit a UN website which is used by officials to log into the UN system....

December 11, 2022 · 2 min · 387 words · James Tuten

Use These Easy Tips To Extend Your Smartphone S Battery Life Techworm

Here are a few ways that can help you preserve battery life of your smartphone1. Use the screen less—or at least turn brightness down2. Turn off Wi-Fi when network is poor3. Make changes to your email settings4. Check the battery usage lists and stop the apps consuming most!5. Disable unwanted push notifications6. Disable unwanted location tracking7. Play downloaded music instead of streamingBattery-saving mythsTurn off BluetoothClose (quit) unused appsUse a task manager or battery-saving utility on AndroidDisable location services completelyAlways choose Wi-Fi over cellularDisable Hey Siri or Ok GoogleAdjust your battery to extend its lifeUse only the charger that came with your phoneConclusion...

December 11, 2022 · 8 min · 1654 words · Craig Folsom

Use This Cheat Code To Know Your Windows 10 Pc Rating Techworm

As said above, Microsoft decided to remove the graphical interface to the Windows Experience Index (WEI) starting with Windows 8.1 which was also applicable for Windows 10 so that the users cannot figure out the performance of their devices using the built-in OS features. Luckily for us, a Reddit user found out a Cheat Code in Windows 10 which lets us find out our PC/Laptop Rating. Reddit user, Logan made this Reddit thread to make his find public....

December 11, 2022 · 1 min · 197 words · Christine Strief

Vivo Shows Off Its In Display Fingerprint Reader The First In The Phone Business To Do So Techworm

At the trade show taking place in Las Vegas, Vivo has revealed a smartphone that features a nearly bezel-less display but the fingerprint reader is not present at the back of the device but at the front instead. The in-display fingerprint sensor will sit between the mainboard and the OLED panel where it will illuminate the finger and then process the beams of light. Phones like the Galaxy S8, Galaxy S8+ and Galaxy Note 8 all features great designs for a smartphone, but it can become a difficult procedure accessing the fingerprint reader from the back....

December 11, 2022 · 1 min · 171 words · Melisa Anthony

Vodafone Admits Hacking Fairfax Journalist S Smartphone

In January 2011, an isolated employee had gained access to “call charge records and text messages,” the company said on Saturday. Natalie O’Brien, a Fairfax Media journalist had uncovered a serious security flaw in 2011 in the company’s data storage methods. This meant that all the details of millions of customers that used generic passwords were available online, such as their names, addresses and credit card details. In 2012, Vodafone Group’s former Australian fraud boss, Colin Yates has sent an email highlighting his concern regarding the hacking of O’Brien’s phone that may become known to the public, disclosed the Internal Vodafone documents obtained by News Limited....

December 11, 2022 · 2 min · 366 words · Cedric Williams

Want Windows 11 On An Unsupported Pc Sign A Waiver First Says Microsoft

In order to install and upgrade to Windows 11, your PC needs to meet minimum requirements as officially shared by Microsoft. The company has released a completed list of supported Intel CPUs and the full list of supported AMD CPUs that can be upgraded to Windows 11. The list also includes some of AMD’s 2nd-gen Ryzen CPUs. On the other hand, in the case of unsupported CPUs, users can upgrade to Windows 11 by installing ISOs but with the risk of being left in an unsupported state....

December 11, 2022 · 2 min · 298 words · David Fick

Website Of Ansar Athwra The Supporters Of The Revolution In Egypt Hacked By Blackbase Moroccan Agent Secret Team Techworm

At the time of writing the Article the website was still showing the deface page. Don’t be a silent user let us know what do you think about it in comments below 🙂

December 11, 2022 · 1 min · 33 words · Tyrone Witt

Wemark Announces A Curated Stock Photography Marketplace Using Blockchain Technology To Redistribute Control To Creatives Everywhere Techworm

Although the digital content industry continues to expand daily, creators still struggle to make a living from their work. Photographers shoot stock imagery and license it for commercials, company websites, social media or marketing materials all over the world. However, with major stock photography agencies reaching hundreds of millions of images (Shutterstock’s collection will reach 200M images in less than a month) it’s becoming increasingly difficult for photographers to generate substantial income from their work....

December 11, 2022 · 4 min · 787 words · Simon Johnson

What Is Bios In Computer What Does It Do Techworm

What is BIOS BIOS (basic input/output system) is a software program made available to the microprocessor on an erasable programmable read-only memory (EPROM) chip. When you switch on your machine, the microprocessor passes control to the BIOS which is always located at the exact same place on the EPROM. When the BIOS boots up, it first runs a check to ensure all attachments are in place and operational. Only once that is done, it will load the OS into your computer’s RAM from your disk storage....

December 11, 2022 · 2 min · 267 words · Joanne Mcnease

Whatsapp Calling Android Users Can Now Enjoy The Voice Calling Features Of Whatsapp

However WhatsApp users please note that WhatsApp has temporarily disabled the invite feature. This means that those who have downloaded the above updated app can make calls to other but they will not be able to activate calling feature on their friends smartphones. As per Android Police user can directly get the voice calling feature if you get an “invite” as mentioned above. Once an invite is received user receives the call and user would need to close and reopen the app....

December 11, 2022 · 2 min · 261 words · Hector Reed

Which Programming Languages Are Useful For Hacking 2018

Important Programming languages for Hackers1. Web HackingHTML:JavaScript:PHP:SQL:2. Exploit WritingPython:Ruby:3. Reverse Engineering Most of the websites out there will give you a list of the most popular programming languages in the world. We at Techworm try to make it more easy for budding security researchers and hackers by breaking up the programming languages used by hackers. Hacking is usually meant to break a code. There are three sections of hacking? Web Hacking, Exploit Writing & Reverse Engineering and each of it requires a different programming language...

December 11, 2022 · 3 min · 591 words · Wanda Walls