Author -

A technology that can bring dead back to life might be a reality soon

Researchers plan to bring dead to life by freezing their brains and then resurrecting them with artificial intelligence

Bringing the dead back to life is futuristic and final frontier of science and Humai is working on just that. Humai is a technology company based in Los Angeles and is working on a project known as “Atom & Eve” that would let human consciousness be transferred to an artificial body after their death.

The artificial intelligence company has said it can resurrect human beings within the next 30 years. The “conversational styles, [behavioural]patterns, thought processes and information about how your body functions from the inside-out” would be stored on a silicon chip through AI and nanotechnology.

Humai researchers are banking on three technologies – bionics, nanotechnology and artificial intelligence – to achieve their goal of bringing the dead back to life and they feel that it will take around three decades for them to achieve this goal.

The founder of Humai, Josh Bocanegra told the Australian Popular Science: “I accept death, I’m not afraid of it that I’m not 100% sure I’m going to die one day.” While their Facebook page states, “Will death always be inevitable? We don’t think so.”

Bocanegra told Australian Popular Science that the brain of the deceased will be frozen using cryonics technology so that when the technology is fully developed they can implant the brain into an artificial body.

Humai says that bringing a body back to life won’t be easy, or cheap. It’s not known how the brains would be harvested, or for that matter, how much it would cost to bring someone back from the dead. Bocanegra says,”Using cloning technology, we will restore the brain as it matures”. “I don’t think of it as fighting death. I think of it as making death optional. I personally cannot imagine why someone would want to die, but I respect everyone’s wishes,” Bocanegra adds.

The most astonishing fact about Humai is that it consists of only five members. Two of them are researchers, one is the ambassador and an AI expert.

Should we be playing with the nature and bringing back the dead?

How To Remove Your Embarrassing Photos From All Social Media Websites

Work Hard and Party Even Harder. That’s the byword of today’s generation. Most of us have the same motto, myself being its hardcore follower.
It is pretty cool until a photograph of you being stoned or in an embarrassing situation surfaces on the internet a few days later. You can always try and keep safe your Android set by taking some measures.

No matter how much caution you keep on posting a selfie on Instagram or keeping a strict privacy over your Facebook account, you are just a click away from landing into embarrassing situations. It could either come from your friend or your teen imprudence.

Little embarrassment can be handled, but when something as trivial as this lands you in a major trouble as ruining a relationship (because a troubling pic from a distant past with your ex, resurfaces) or makes you a butt of jokes at the office, first thing that comes to mind is to just erase yourself completely from the internet.

Well, there is a simpler and better alternative.

Learn from these infographics to remove your photos from WhoIsHostingThis?

17 ATMs hacked and $1.2 million stolen by hackers from Malaysia

Hackers steal more than $1.2 million from 17 automated teller machines (ATMs) in Malaysia

A Latin American gang of cyber criminals were able to exploit a way to hack and steal millions of dollars from 17 automated teller machines (ATM) in Malaysia.

ATMs of at least 17 bank branches belonging to United Overseas Bank, Affin Bank, Al Rajhi Bank and Bank of Islam were reportedly hacked into by the Latin American gang.

Closed-circuit television (CCTV) footage from the banks showed that 2-3 Latin American men, who were involved in the crime, entered and withdraw money from these ATM’s one after another.

Bukit Aman Commercial Crime Investigation Department chief Comm Datuk Mortadza Nazarene told Bernama that the suspects used a computer malware known as “ulssm.exe” to hack into the ATMs. “The suspects were found to have opened the top panel of the machine without using a key and inserted a compact disc into the machine’s processing centre which caused the ATM’s system to reboot,” he told Bernama, Tuesday morning, The Star reported.

A Selangor Commercial Crime Investigation Department spokesman said that investigations is still going on. In the meantime police were able to recover one of the ATM cards which was used by the hackers to withdraw the money. 

Since it was the ATM which was rebooted to default, no customers data was compromised in the hack, police are investigating the scene and believes the gang members are still in the country.


The Top Ten Hacker Tools of 2015

List of top ten hacker tools of 2015

Every task requires a good set of tools.This because having right tools in hand one can save much of its energy and time.In the world of Cyber Hacking (“Cyber Security” formally) there are millions of tools which are available on the Internet either as Freewares or as Sharewares.

If you are security researcher, pentester or a system admin, you need to have this on your PCs/laptops to find the vulnerabilities and plug them. Concise Courses conducted an online poll to determine top ten hacking tools out of some of the famous ones. Here is the list which came out the winner on the poll.

1. Nmap:  Network Mapper

Abbreviated as nmap is a versatile tool for Network Security, plus it is free and open source.It  is largely used by network administrators for network discovery and security auditing. System admins use nmap for network inventory, determining open ports, managing service upgrade schedules, and monitoring host(A term used for “a computer on a network”) or service uptime. The tool uses raw IP packets in many creative ways to determine what hosts are available on the network, what services (application name and version) they offer,which type of protocols are being used for providing the services,what operating systems (and OS versions and possible patches) and what type and version of packet filters/ firewalls are being used by the target.

2. Metasploit:

A tool for exploiting (Utilising network weakness for making a “backdoor”) vulnerabilities (Weak Points) on Network. This tool is neither free nor open source. But when it comes to features offered it deserves the price it claims. The Metasploit Project is a hugely popular pentesting (penetration testing) or hacking tool that is used by cybersecurity professionals and ethical hackers. Metasploit is essentially a computer security project that supplies information about known security vulnerabilities and helps to formulate penetration testing and IDS testing.

3. Cain and Abel:

Cain & Abel is a password recovery tool that is mostly used for Microsoft Operating Systems. This popular hacking tool allows the user to seek the recovery of various kind of passwords by sniffing the network(capturing some of the data packets), cracking encrypted passwords using Dictionary, Brute-Force(Generation of hashes out of words and then comparison of encrypted hash with the generated one,this method takes less time than dictionary attack method) and Cryptanalysis attacks. Cain, as it is often referred to, can also record VoIP(Voice over IP protocol,used for making calls over using internet) conversations, decode hashed scrambled passwords, recover wireless network keys and more.It can crack various types of hashes including NTLM,MD2,MD5,SHA-1,SHA-2 and many more.These functionalities make Cain and Abel one of the best password recovery tool.

4. Angry IP Scanner: 

Angry IP Scanner, also known as ‘ipscan’ is a freely available (open-source and cross-platform) hacking network scanner that is both fast and easy to use. The main purpose of this hacking tool is to scan IP addresses and ports to find open doors and ports. Worth noting that Angry IP Scanner also has a bunch of other uses as well. Common users of this hacking tool include network administrators and system engineers.

5.John The Ripper: 

John the Ripper is a popular password cracking pentesting tool that is most commonly used to perform dictionary attacks. John the Ripper takes text string samples (from a text file, referred to as a wordlist, containing popular and complex words found in a dictionary or real passwords cracked before), encrypting it in the same way as the password being cracked (including both the encryption algorithm and key), and comparing the output to the encrypted string. This tool can also be used to perform a variety of alterations to dictionary attacks.Including Brute Force and Rainbow attacks.

6. THC Hydra:

Although often considered as yet another password cracker, THC Hydra is hugely popular and has a very active and experienced development team. Essentially THC Hydra is a fast and stable Network Login Hacking Tool that will use dictionary or brute-force attacks to try various password and login combinations against an log in page. This hacking tool supports a wide set of protocols including Mail (POP3, IMAP, etc.), Databases, LDAP(Lightweight Directory Access Protocol),SMB, VNC, and SSH(Secure Shell,used by VPN Softwares).

7. Burp Suite:

A pentesting tool,Burp Suite has several features that can help the penetration tester or ethical hacker. Two commonly used applications used within this tool include the ‘Burp Suite Spider’ which can enumerate and map out the various pages and parameters of a web site by examining cookies and initiates connections with these web applications, and the ‘Intruder’ which performs automated attacks on web applications.

8. Nessus Remote Security Scanner

Recently went closed source, but is still essentially free. Works with a client-server framework. Nessus is the worlds Nessus Remote Security Scanner most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications. (This tool is not in the Concise list)

9. Ettercap:

Ettercap has a huge following and is widely used by cyber security professionals. Ettercap works by placing the user’s network interface into promiscuous mode and by ARP poisoning(ARP : Address resolution protocol is used to determine a host’s MAC address (address of its Network Interface Card) by knowing its IP address. ARP poisoning is a process where a hacker gives wrong information of either its MAC or IP address to the network.) the target machines, i.e. facilitating a ‘Man In The Middle’ or MITM attack. Once successful Ettercap (and the hacker) can deploy various attacks on the victims. A popular feature about Ettercap is its’ ability to support various plugins.

10. Wapiti:

Wapiti has a very loyal following. As a pentesting tool (or framework) Wapiti is able to scan and detect hundreds of possible vulnerabilities. Essentially this Multi Purpose Hacker Tools can audit the security of web applications by performing “black-box” scans, i.e. it does not study the source code of the application but will scan the HTML pages of the application seeking scripts and forms where it can inject data.


Central Bureau of Investigation (CBI) arrest an Indian for stealing Microsoft product keys and selling them for profit


India’s premier investigating agency, the Central Bureau of Investigation (CBI) today arrested a man for stealing product keys of various Microsoft products and selling them to the unsusupecting customers for a ungainly profit.  CBI issued a statement saying that they had arrested a person named D.Prabhu.  D.Prabhu is not linked to any hacker groups and is a private individual.  CBI says that he was doing the about stealing for his personal profit. 

A CBI spokesperson said: “The complaint was lodged by Microsoft. The agency took up the investigation as the alleged offence has larger ramifications.” According to the official, the quantum of loss suffered by Microsoft is yet to be quantified as the thief sold keys of various Microsoft products.


According to CBI, a case has been registered on the allegations that Microsoft Volume License Service Centre (VLSC) agreements in respect of different overseas and Indian customers of the Microsoft were unauthorisedly being accessed aka hacked for the purpose of stealing product keys of different Microsoft products.


CBI also said that searches made at Prabhu’s premises yielded substantial evidence about the theft including recovery of hard disks, a router, a numbers of Microsoft product kits and other documents. The CBI has also frozen the bank account of the accused used to collect the sale amount. The accused was Friday produced before a local court here and the agency obtained transit remand.


Secure messaging App Telegram blocks 78 ‘ISIS-related’ channels

Telegram blocks 78 IS-propaganda channels from using its secure and encrypted messaging platform

It has been well known that the ISIS and its supporters use the Telegram App to propagate their ideology. Now the Telegram creators have blocked as many as 78 ISIS affiliated accounts from using its encrypted and secure service.

The Berlin-based Telegram, a popular mobile messaging service app has blocked 78 known ISIS sympathizer accounts from using its technology to communicate and spread propaganda to a wide audience. Telegram, which has been founded by two Russian brothers, Pavel Durov and Nicolay Durov uses strong encryption that makes it all but impossible for security services to intercept private messages between individuals or members of a group.

In a statement released on Wednesday, Telegram said that it has blocked 78 ISIS-related channels that the terrorist group used to spread propaganda and communicate with other members. The group had been using the app for distributing its propaganda material since October, when Telegram introduced a feature letting users broadcast messages to an unlimited number of subscribers.

“We were disturbed to learn that Telegram’s public channels were being used by ISIS to spread their propaganda. We are carefully reviewing all reports sent to us at and are taking appropriate action to block such channels. As a result, this week alone we blocked 78 ISIS-related channels across 12 languages.

We are also introducing an easier way for our users to report objectionable public content in the upcoming update of Telegram this week.”

Telegram, Russia’s most popular social network site is very famous internationally, where it is used as an alternative to WhatsApp on similar services. It is an ultra-secure way to quickly upload texts and voice messages, and share videos. It says it has 60 million active users. In 2014, the app racked up millions of downloads, following Facebook’s acquisition of WhatsApp. According to its founder, Pavel Durov, who disclosed the stats during TechCrunch Disrupt in September, said that the app sees more than 12 billion messages a day.

According to security researchers, Telegram became the preferred method for Islamic State to broadcast news and share videos of military victories or sermons. The group used Telegram to claim responsibility for the Paris attacks, which left 129 people dead, and the bombing of a Russian airliner over Egypt last month, which killed 224.

According to Alex Kassirer, a counter-terrorism analyst with the New York-based private intelligence firm Flashpoint, said that IS had started using Telegram broadcast channels to send press releases targeted at inspiring and recruiting followers.

Further, Rita Katz, director of Bethesda, Maryland.-based extremist monitoring service SITE Intelligence Group said that some of the dozens of channels set up had 10,000 followers or more. Some of those channels could not be accessed on Wednesday afternoon and a message was displayed saying they were no longer available. She further added that Telegram had appeared to let the jihadists operate without fear of being turned off or traced until Wednesday.

However, Telegram explicitly says on its site that it makes efforts to block Islamic State, which is also known as ISIS.

The company statement stressed that shutting down ISIS channels on the site was not taken to restrict free speech, which it encourages.

“While we do block terrorist (e.g. ISIS-related) bots and channels, we will not block anybody who peacefully expresses alternative opinions,” Telegram said of its actions.

Telegram said the move would only affect public channels and automated response systems called ‘bots.’ Messages between individuals and group chats that can include up to 200 users would not be affected. While the app says it blocked the ISIS-related channels, unfortunately private communications between ISIS members were unaffected by those blocks.


Bitwalking dollars: Digital currency pays people to walk

Bitwalking dollars: Digital currency pays people to walk

A digital crypto-currency has launched that is generated by human movement.

Bitwalking dollars will be earned by walking, unlike other digital currencies such as Bitcoins that are "mined" by computers.

A phone application counts and verifies users' steps, with walkers earning approximately 1 BW$ for about 10,000 steps (about five miles).

Initially, users will be given the chance to spend what they earn in an online store, or trade them for cash.

The founders of the project, Nissan Bahar and Franky Imbesi have attracted more than $10m (£6.6m) of initial funding from mainly Japanese investors to help launch the currency and create the bank that verifies steps and any transfers.

Japanese electronics giant Murata is working on a wearable wristband that will provide an alternative to carrying a smartphone and show how many BW$ the wearer has earned.

Shoe manufacturers are poised to accept the currency, and a UK high street bank is in talks to partner with the project at one of the UK's biggest music festivals next year.

The founders have a track record in disruptive technology that could help developing nations as much as richer ones.
Last year they launched Keepod, a $7 USB stick that acts like a computer in Nairobi, Kenya.

Fitness boost

The idea of Bitwalking is to take advantage of the trend for fitness trackers by offering an additional incentive to keep fit.

The global scheme plans to partner with sportswear brands, health services, health insurance firms, environmental groups, and potentially advertisers who could be offered unique insights into the audiences they are targeting.

In the future, employers may be invited to take part in a scheme that would be offered to their employees to encourage them to stay fitter, with the currency they earn converted and then paid alongside their salaries.

In developed nations the average person would earn around 15 BW$ a month, but it is hoped that in poorer countries where people have to walk further for work, school, or simply to collect water, the Bitwalking scheme could help transform lives.

Double income

Salim Adam walks around six miles (10km) a day to work as an IT teacher at his local college in Mthuntama in northern Malawi.

He has worked out that he can earn 26 BW$ a month just by having the app running on his mobile phone. His current salary is the equivalent of $26 USD.

The impact Bitwalking could make in developing countries isn't lost on the founders. It is one of the central reasons for creating the currency. In Malawi, one of the African nations to join at the launch of the project, the average rural wage is just US$1.5 (£1) a day.

Business advisor, Karen Chinkwita runs Jubilee Enterprises, giving business guidance to young people in Lilongwe. She said: "There may be a temptation for some to walk instead of work.

"But most people want to earn more money and will do both. With some education we can teach them how to use that money to create even more opportunities."

The Bitwalking manager for Malawi, Carl Meyer, has set up the first two Bitwalking hubs in Lilongwe and Mthuntama where local people will be trained how to trade the BW$ online for US$ or the local currency, Malawi Kwacha.

Eventually an automatic online exchange is planned that will match up buyers with sellers and a rough exchange rate will begin to emerge.

The Go! app for iOS and Android devices will initially be offered to a handful of countries, including the UK, Japan, Malawi, and Kenya, to give the organisers a chance to iron out any difficulties before other countries come on board.

Faking it

The idea isn't completely new. Several start-ups have tried to connect keeping fit to earning rewards but most have failed to measure movement accurately enough to avoid scammers.

Bitwalking hasn't officially released the algorithm used to verify steps but says it uses the handsets' GPS position and wi-fi connections to calculate the distance travelled.

The team has created its own walking algorithm to verify users' workouts after testing Google's and finding that steps could be spoofed.

The phone reports the speed and type of movement as measured by the accelerometer.

At its launch the total amount someone can claim in one day will be capped at around 3 BW$ (roughly 30,000 steps) and running multiple accounts will be banned.

The success of the scheme is likely to depend on how much interest there is from established companies such as big sportswear brands, health insurance firms, or charity and environmental groups all of whom have an incentive to work with the fitness sector.

In Japan, it is not unusual for firms to offer employees rewards for fitness activities. Bitwalking's founders hope their project could help extend this idea to other nations.

The country's largest convenience chain store, Lawson, runs a successful scheme that pays its workers up to $50 a year to eat healthily and keep fit.


But the Lawson scheme is based on promises and trust, so unlike Bitwalking it is not verifiable. The vouchers earned cannot be traded for cash.

Despite the freedom to trade, it is likely that unless BW$ can be freely used to buy goods and services they are likely to drop in value from parity with the US$ – the point where the founders are launching it.

The online store will sell goods for the same price in BW$ as US$.

Keeping the virtual shelves of this online store fully stocked will be one of the first challenges.

The shop isn't expected to be open all the time, but plans are in place for other retailers and service providers to accept the currency in their stores too.


It is still not clear how a currency that appears to be so easy for users to produce could maintain its value, nor if the initial funding for the scheme will be sufficient to sustain it in the initial period while confidence in its value is being built up.

The Bitwalking website will invite people to apply to join the scheme so the company has some control over user numbers.
Privacy steps

Because the new scheme necessarily tracks its users there will be data available that could be particularly valuable to advertisers – and accompanying concerns over privacy.

"That won't be for sale," says co-founder Nissan Bahar.

"We may explore offering advertisers the opportunity to focus on different groups depending on how active they are, but we won't pass on any information relating to individual's movements."


Transfers of the new currency will also be carefully monitored with transactions going through a central 'bank' which verifies each deal using the block chain method used to transfer other crypto-currencies such as Bitcoin.

Users will have access to their own wallet which stores the dollars they've earned and will be able to transfer them to others via the app.

"It's a currency that can be earned by anyone regardless of who they are and where they live," says Franky Imbesi.

"For some it will be a free cup of coffee a week perhaps offered by local businesses to encourage people to explore their local shops. For others it could be a game changer, transforming their lives by enabling them to earn and trade in the same way with the rest of the world.

"And all while encouraging us to protect the planet and stay healthy."

Russia Creates A ‘Skynet’ to Lead Its Robo Army.

Russians have created a ‘Skynet’ type AI that would soon control all the robotics in the country: civilian, military and even UAVs. The scientists have named it ‘Unicum’ which is the Latin for ‘the only one’.
At a time when science and technology stalwarts like Stephen Hawking and Elon Musk are calling for the AI warfare ban, Russian scientists are busy developing the big daddy of the Artificial Intelligence. Well, the country doesn’t have an army of robots but it sure does have a lot of machines and robots.

The researchers at the United Instrument Manufacturing Corporation (OPK), a research corporate that builds high-tech communication tools and systems, automated control systems and advanced electronics and robotic systems for the Armed Forces of Russian Federation, has created a universal software that would give the robots (civilian and military) adequate brains to perform the complex tasks without human directions.

The scientists have named it ‘Unicum’ which is the Latin for ‘the only one’. As the team has tested, the Unicum powered 10 robots, the software was able to communicate and distribute the ‘roles’ among the robots. It even chose the commander of the group.

Unicum is made to make the battlefield as human-free as possible. In the experiment, the Artificial Intelligence was able to choose targets and request target elimination confirmation from its human masters (thankfully, it does ask for permission).

AI has been undergoing phenomenal developments with each passing day. Just recently the researchers created a psychic robot, and now we have a software that could control all the other machines. What else is left!!

The Deputy Director of OPK, Sergey Skokov said that the technology is almost ready and will soon be installed in real life robotic systems, including UAVs.

He added:
With Unicum, the robots will be capable of executing tasks independently, to see and evaluate the situation, plotting new courses as well as communicating with other machines. In fact, this is yet another step to the creation of full-fledged artificial intelligence, enabling mechanisms with nearly human capabilities.

Well, when we thought Artificial Intelligence has been maxed out for today’s levels at Tesla’s better than the human self-driving car, and the AI that becomes chess grandmaster in 72 hours,  Russians took it to whole another level.

How To Check/Retrieve Your Gtbank Account Number Via SMS Using Your Mobile Phone

How To Check/Retrieve Your Gtbank Account Number Via SMS Using Your Mobile can retrieve your gtbank account number via sms.if you've forgotten your account number and you want to make use of it for urgent transaction, instead of going to the bank, calling customer care service to retrieve it, all you need to do is to pick up your phone and send a text message to gtbank customized number and immediately, you will get a message containing your gtbank account save time and money going to their branch or making phone calls to customer if you've forgotten or did not have your bank account number stored in your mobile phone, you can make use of this to retrieve it is how to get your gtbank account number via SMS Using Your Mobile Phone.

Note that sms charges may applied when making use of this service.its not will need to have airtime/credit on your mobile phone before sending the text least like #10 airtime should be on your phone.follow the steps below to get it done.

How To Retrieve Your Gtbank Account Number Via SMS

to check it, send the word

myaccount to 08076665555

immediately you send the message, you will receive a message that contains your gtbank account number.

Note that you must use the phone number used in creating your gtbank account else you won't get any message.this is due to security issue.

How To Buy Airtime Recharge Card For Friends & Family From Your Mobile Phone Using Gtbank : No Internet Required

How To Buy Airtime Recharge Card From Your Mobile Phone Using Gtbank : No Internet Required. recently gtbank have just introduced buying of recharge card airtime for friends and family using your mobile phone without internet can carry out the task by simply dialing a specific number given by gtbank which will enable you carry out the works just like share and sell credit transfer but this time your bank account will be debited.all you have to do is to use the persons phone number in the transfer code and immediately, the recipient will receive the airtime from gtbank platform regardless of the mobile network operator you are making use do this, follow the steps below.How To Buy Airtime Recharge Card From Your Mobile Phone Using Gtbank : No Internet Required

Note that this only works with the phone number you used when you created your gtbank won't work if the sim you used is not attached to your gtbank account.i don't mean the recipient number.just follow the steps below

How To Buy Airtime Recharge Card From Your Mobile Phone Using Gtbank : No Internet Required

==> dial *737*amount*persons number# . Then send it,example *737*100*08031234567# . the friend or individual you want to transfer airtime to will receive it.

Well, my opinion on this is that you should be careful on how you keep your phone exposed to friends and family due to security reason. I expected gtbank to be wise on this features,though its a welcome development but the features is not complete without authentication code.

At least the owner of the account should be able to have a password/passcode inserted to initiate the transfer because anyone could just pick up the phone and dial it.

Just imagine some one like me who knows about this, i can easily pick up my friends or family members phone and do a transfer without their noticed.

At the end of it, they will start questioning gtbank of deducting their money without their consent.

As a result of this, to prevent it, gtbank should add authentication code to initiate the transfer else, this innovation is not complete.

So if you are making use of this features, then be wise to keep your phone close to you because anyone who knows about this could wreck your bank warned.