How to hack Facebook using phone number

The social media giant facebook is very well known for its security features. The number of google searches on how to hack facebook is enormous. But do you know that an old but still working flaw can exploit to hack our facebook accounts using just our phone number?! But here the flaw is not actually relies on facebook. Its on our tele communication ss7 network(signaling system 7).

SS7(signaling system 7) Flaw

Ss7 is a set of protocols that are used to control world’s pstn(public switched telephone network is the world’s collection of interconnected voice-oriented public telephone networks, both commercial and government-owned.) the ss7 technology is responsible for mobile number portability, prepaid payments, SMS and number translation. The messaging service highly relies on ss7. The flaw was actually discovered in 2008 but it was publicly published in 2014. And a real world attack was reported in this year for stealing money from the bank accounts. It is been said that the governments and the politicians uses this vulnerability to surveil on millions of people. Also it impossible or impractical to patch all networks in the world. So any one having a little tech knowledge can hack facebook and other social media services easily with just a phone number.

How to Hack Facebook Account With SS7 Flaw

One would argue that since Facebook has a password, it would be harder to hack. Due to the SS7 flaw, the hacker will not need your Facebook Password. Just like in the cases of Whatsapp and Telegram, the telecom network is duped into believing you have the victim’s phone number. Yours will be an easy task of clicking on ‘Forgot Password’.

Facebook will prompt you to enter an email address or phone number to change the password. You will provide the owner’s legitimate number. A password reset code will be sent to your number. After resetting the password you will have full control of the victim’s Facebook account. What an easy Facebook hack!

Lets watch a video demonstrating the working. It was publishes by forbes.

What Smart Phone users can do for preventing these attacks

  • Do not link your phone number to social media sites, rather rely solely on emails to recover your Facebook or other social media accounts.
  • Use two-factor authentication that does not use SMS texts for receiving codes.
  • Use communication apps that offer “end-to-end encryption” to encrypt your data before it leaves your smartphone over your phone’s standard calling feature.

Download Latest GBWhatsapp +5.60

GBWhatsapp is a moded whatsapp facilitated for using more awesome options. It is actually a whatsapp but it have many edits and options that may be very cool for us. GBWhatsapp have the following functions:

*Possibility to hide appearing
* privacy options
* Possibility to distinguish between collective messages and regular
* Possibility to know who visited your profile or become connected to
* the possibility of setting lock Watts August password
* Possibility to send a video size of 30 MB instead of 16 MB
* possibility of sending an audio clip size up for 100 MB instead of 16 MB
* the ability to send 90 image at one time without 10
* possibility of a case of the number of dependent characters 250 instead of 139 characters
* the possibility of pressure on the links without storing the message sender or number owner
* counter statistics for groups
* preview media without loading
* ability to hide the name and the date when copying letters or more
* possibility of copies pressed Machine
* possibility of changing the program format, and change the icon of the program and notices
* the ability to send images at high resolution
* Possibility to stop receiving calls from anyone you want or for everyone
* the ability to display messages of any person group separately from the rest of the members messages
* The program sends you an alert in the event of Your friend has changed his own image
* and many more features.

GBWhatsapp themes

Now, its new version 5.60 has released. It have some cool more functions including:

*possibility of sending software, games and all kinds of files
* You can install any chat at the top of the list of chats in order to reach them easily
* (exclusively) the possibility of installing more than 3 talks
* (exclusive) Edit Option 6.8 You can place a list of names instead of the status menu or instead of the call log list
* add the option to change the style of hidden conversations (hidden , open conversations and then the settings button)
* add option 1.1.14 to hide the button from the enclosing top bar in the conversation
* add option to hide the number 2.1.44 button enclosing from writing in the conversation box
* repair option 6:11 to disable the appearance of notices Pop – up in the issuance of nougat (7.0)
* Repair style does not appear when you hide a conversation in some setups
* Repair does not appear when you open the lock of Alwatsab widget
* Other reforms

Download latest versions:


GBWhatsapp plus:


NASA Internet Connection Speed Is 13,000 Times Faster Than Yours


NASA Internet Connection Speed Is 13,000 Times Faster Than Yours

NASA Internet Connection Speed Is 13,000 Times Faster Than Yours, hello friends i am BLOGGER ASHOK & i am back with new Tech New. If there’s one organization that never has to worry about streaming videos in glorious HD, it’s NASA. The space organization’s shadow network can transfer 91 gigabits per second, or 91,000 megabits per second.

For comparison, the average broadband connection speed in the U.S. is 6.6 megabits per second – or more than 13,000 times slower.

Read Major Security Flaws on Popular Mobile Wallets – Digital Wallets Scam

What is a shadow network? It’s like the Internet, but only connects a few research facilities and organizations around the world. It’s meant to share huge data files from science experiments.

In other words, it’s like the original Internet back when it was ARPANet. NASA’s shadow network, on the other hand, is called the Energy Science Network, or ESnet.

Besides never having to wait for any download ever, ESnet has massive scientific value. Mapping the human genome takes up a lot of disk space, but labs can now send that information almost instantaneously.

Unfortunately, ESnet isn’t going to be arriving in your home anytime soon. However, some of the technology behind it could eventually improve the Internet we already have.

Until the scientists descend from their labs and share their technology with the rest of us, though, I’ll be waiting for Google Fiber and its Gigabit speeds to hit my town.

Please share this information with everyone. Just click on any of these social media buttons.

Google Just Killed What Might Be The Biggest Android Ad Fraud Ever

Google has thrown more than 40 apps out of its Play store after it emerged they were quietly forcing Android users to click on ads. As the apps been downloaded as many as 36 million times, security researchers said it appeared to be the biggest ever case of ad fraud perpetrated via Google Play and probably the most successful malware in terms of installs from the official store.

Security firm Check Point revealed the campaign Thursday, claiming a South Korean company, Kiniwini, hid an illegitimate ad clicking function inside 41 apps, most of which were games. Google’s Bouncer, a technology designed to keep such so-called “adware” out of its store, wasn’t able to pick up on the feature as it was downloaded after installation.

Once the rogue code was added to the apps, they would secretly open webpages in the background, via software that imitated a PC browser. “Once the targeted website is launched, the malware uses the JavaScript code to locate and click on banners from the Google ads infrastructure,” Check Point explained. The Korean company would then receive funds for every ad click. Check Point estimated the firm was making millions from the ad clicks, in the region of $300,000 per month.

Check Point also noted that various Kiniwini apps would display “a large amount of advertisements, which in some cases leave users with no option but clicking on the ad itself.” And it claimed the oldest version of the malware, which it dubbed “Judy”, dated from April 2016, indicating it avoided detection for at least a year.

Android app adware found by Check Point

Check Point

Check Point claims adware was hidden by South Korean developers inside more than 40 Android apps.

Kiniwini, which also goes by the name ENISTUDIO corp, did not return requests for comment. A post from May 21st on the company’s website recognized Google’s action to remove the apps. It does not address the allegations made by Check Point or the reason behind the apps’ disappearance from Google Play.

Google had not returned a request for comment at the time of publication.

Growing Android fraud problem

According to Android security expert Sergio de los Santos, Judy was symptomatic of a wider problem with such ad fraud targeting Google’s platform. “This clicking malware hides very well. They have been undetected for years now, and even now anti-virus products are still not detecting them,” said de los Santos, a researcher with Telefonica’s ElevenPaths Android security team.

“The reason is because they are not dangerous by themselves in Google Play, but when they are installed they download the payload. This is very tricky and makes all detection techniques fail. And, besides, the only permission they need is access to the internet… it’s quite intelligent.”

Just earlier this week, Russian security firm Group-IB said it helped law enforcement arrest the gang behind Cron, an Android malware that infected as many as 1 million devices. It would steal bank account logins and intercept authorization codes texted by the bank. Most victims were based in Russia.

As for Americans, the biggest Android malware is known as Marcher, according to the Russian firm. “This trojan was developed by a Russian speaking author in 2014. In the beginning it was used only by one cybercrime gang to attack Russian clients. Then it was advertised on the underground markets,” said Dmitri Volkov, co-founder and head of intelligence at Group-IB. That development led to further adoption my other cybercriminals.

But according to Google data, infection numbers for Android devices remain low. In a recent report, it said that the end of 2016 just 0.05% of all Android devices that only downloaded from Google Play were infected with what it calls a “potentially harmful application” (PHA).