Search Whitehat Blog

Wednesday 26 August 2015

Smartphone Torture

Used to brake a car

Samsung launched this flagship galaxy smartphone March this year while IPhone announced their iPhone 6 in September last year. 

This two smartphones have intelligent features that all tech gurus may have thought of.

However, when possessing a pocket giant smartphone and using it in daily life, then it may be bound to hitting the floor - a couple of times. Some accidentally end up dipping in fluids - I haven't mentioned pools, bathroom bowl,  and some use it as a lab test - thats me ��.

Researcher's and enthusiasts

A few critics will ignore the full expense of both of the flagships and beat  or drop it from a height just get the torture comparison and document the experience. 

Now this one is more like a smartphone- mare tale , researchers and enthusiasts may do a lot of tests. For a smartphone you have ever dreamt to have, someone on this earth will burn both to  ashes just to analyze the vulnerability at the time of accidents.

Lets talk about this human  who tortured a mint Iphone 6 and Galaxy s6 to ashes. At what instance will someone want to use an ashed smartphone? No! Wait and at which crazy event can someone throw it in fire?  - and probably claim  warrant?  Haha a drunk friend around a campfire ? Or you drove your girlfriend to nuts ?��

I almost forgot of one who used it to brake a speeding Ferrari, Am so amazed Thank you!



Posted via Multi Telecoms

Wednesday 5 August 2015

New worm threat on Mac OS

New Malicious  threat on Mac

Mac is typically known to be one of the most secured operating systems from the widely known windows and Linux.

Researchers demonstrated that Mac Os can be the most vulnerable since malicious worm  can infect this systems into its firmware level.

This kind of attack can be done via email spoofing and any other red hat techniques since exploit may take place with only a click of a button.

Researchers also stated that this type of vulnerability can be so harming since basic software's and anti malware cannot mock locations to the systems firmware level, eg ROM.

This is the second thunderstrike exploit to target Macs. The first version was corrected with OS X 10.10.2 .This required the hacker to be physically
available to launch  unlike this new remote  infectious malware.

HOWEVER the latest Mac operating system V(10.10.4) is reported to have been elevated



Posted by Ken R.

Galaxy Note 5 leaked

Finally a real life image of the finished Galaxy Note 5.  Say no to conceptual pictures and have a clear look of the device that leaked via Droid- life.  If this is accurate, they confirm a lot of hopes and fears.

THE GOOD.

The Galaxy Note 5 is basically a bigger size of galaxy s6 with a stylus and 5.7 inches clear display.Its metallic with a glassy curved back that makes it easy to hold than S6.

Apart from the size its much with the s6 aesthetics but its changes are SKIN DEEP. ��
specifications leak includes hefty internal storage of up to 128 GB and a RAM of 4GB.

THE BAD,

Well, its simply a bigger s6 with the same or a bit of other earlier galaxy notes. See Galaxy S design,therefore you may stil expect more from its release by Samsung in the August 13 event.



Posted by Ken R.