Profile

Cover photo
Yogesh Mandell
235,930 views
AboutPostsPhotosVideos+1's

Stream

Yogesh Mandell

Shared publicly  - 
 
'Paint your feelings', that can actually be pretty deep, not a bad idea
 
The scariest emergency plan ever!
It can happen to you!
#tongueincheek  
1
Chaitan Thompson's profile photo
Add a comment...

Yogesh Mandell

Shared publicly  - 
 
Sweet, especially if it's dual boot, then I'm definitely buying it
 
First Look at Lenovo’s New Chromebook Convertible

We've been waiting to learn more about Lenovo's upcoming Chromebooks since they were recently announced. Now, thanks to OMGChrome, we now have pricing details and specs.

11.6-inch IPS touch display (1366 x 768) with Gorilla Glass 
Quad-core Intel Celeron N2920 (Bay Trail) @ 1.8GHz 
2GB RAM
16GB SSD
8 hours of battery life
Priced from $429 

I'm very disappointed to see only 2GB of RAM for the $429 price tag. This was going to be my next Chromebook. Now, I'm not so sure. Maybe if the RAM is able to be upgraded.


ht/ +Sivan Rehan 
As the first device approaching the tablet form factor to run Chrome OS, the lack of hype around the Lenovo ThinkPad Yoga 11e is perhaps a little surprising.
1
Add a comment...
 
Wow, this is getting insane
 
Smog levels in Paris right now are on par with Beijing
Paris and much of northern France have seen dangerously high pollution levels this week, forcing authorities to offer free public transportation to Parisians for the next few days. On Thursday, the...
1
Add a comment...

Yogesh Mandell

Shared publicly  - 
 
 
Anti-virus firm finds alleged Kremlin cyberweapon, undetected for at least three years


Security experts at G Data, the German anti-virus firm, have discovered a “very complex and sophisticated piece of malware, designed to steal confidential data”.

So far that sounds reasonably interesting, but (frankly) not that extraordinary in these days of targeted attacks against organisations.

But what makes the Uroburos rootkit stand out from the crowd is that G Data’s detailed report into the malware reveals that their researchers believe it to have been created by a country’s intelligence agency, and drops some heavy hints that Russia are to blame.

The Uroburos rootkit takes its name from a mythical serpent or dragon that ate its own tail, and a sequence of characters concealed deep within the malware’s code: Ur0bUr()sGotyOu#

Uroburos steals files from infected computers and captures network traffic, and has some sophisticated tricks up its sleeve to help hackers exfiltrate information from targeted organisations.

For instance, it’s designed to work in peer-to-peer mode, with infected PCs communicating amongst each other. The remote attackers only need to command one infected computer which has an internet connection, in order to infect, control and steal from other infected computers on the network which may not have net access.

Another interesting feature of the malware is that it uses two virtual file systems to disguise its activities from observers:


The Uroburos rootkit uses two virtual file systems – one NTFS file system and one FAT file system.
 They are stored locally, on the infected machine. This means that the victim’s computer contains an
 encrypted file, which, in reality, hosts another file system.

The virtual file systems are used as a work space by the attackers. They can store third party tools,
 post-exploitation tools, temporary files and binary output. The virtual file systems can be accessed
 through the devices \Device\RawDisk1 and \Device\RawDisk2 and the volume \\.\Hd1 and \\.\Hd2.

According to G Data, the Uroburos malware’s technical complexity suggests connections to intelligence agencies:

The development of a framework like Uroburos is a huge investment. The development team
 behind this malware obviously comprises highly skilled computer experts, as you can infer from the
 structure and the advanced design of the rootkit. We believe that the team behind Uroburos has
 continued working on even more advanced variants, which are still to be discovered.



Due to many technical details (file name, encryption keys, behavior and more details mentioned in
 this report), we assume that the group behind Uroburos is the same group that performed a
 cyberattack against the United States of America in 2008 with a malware called Agent.BTZ. Uroburos
 checks for the presence of Agent.BTZ and remains inactive if it is installed. It appears that the
 authors of Uroburos speak Russian (the language appears in a sample), which corroborates the
 relation to Agent.BTZ. Furthermore, according to public newspaper articles, this fact, the usage of
 Russian, also applied for the authors of Agent.BTZ.

In 2008, the spread of Agent.BTZ worm resulted in the US Army banning the use of USB and removable media devices. At the time it was claimed that the Agent.BTZ attack was initiated after an infected USB stick was deliberately “lost” in the US Department of Defense’s car park.

All of this adds up, in the opinion of G Data’s report, to one conclusion – whoever was responsible for creating Uroburos wasn’t the common-or-garden malware author.

According to all indications we gathered from the malware analyses and the research, we are sure of the fact that attacks carried out with Uroburos are not targeting John Doe but high profile enterprises, nation states, intelligence agencies and similar targets.

Of course, we’ve been here before. Not a month goes by without someone accusing country X or country Y of being responsible for a malware attack.

As always, we need to be careful about jumping to conclusions.

Although it’s easy to piece together pieces of “evidence” from malware code such as snippets of language, or resources which have been compiled with certain language settings that isn’t necessarily proof beyond reasonable doubt that citizens of a particular country were responsible, let alone that the attack has the backing of the country’s government.

The truth is that attribution when it comes to malware attacks is extremely difficult.

At the same time, we would be naive to think that many countries around the world are not taking advantage of malware, vulnerabilities and hacks to spy upon other nations.

Meanwhile, details are still frustratingly missing. No light has been shined on how Uroburos might infect victim computers (although USB infection and targeted email attacks seem plausible), or who the victims might have been, or what data might have been stolen.

What’s perhaps most embarrassing for all concerned is G Data’s claim that one of the oldest drivers identified in the Uroburos rootkit was compiled in 2011, meaning that it has gone undetected by everyone for at least three years.
1
Add a comment...

Yogesh Mandell

Shared publicly  - 
 
 
The 'hidden millions' in Turkey corruption scandal

http://bit.ly/1elbBC4

Turkish Prime Minister Tayyip Erdogan has been accused of the theft of millions of dollars worth of money after a phonecall, allegedly between himself and his son Bilal was hacked and leaked. In the phonecall two men are heard discussing distributing up to £40m to various businessmen to make it disappear. The PM says the call is fake and is just a cleverly put together montage. There have been a series of protests and counter protests on the streets since the revelation earlier this week.

#turkey #turkish #erdogan  
1
Add a comment...

Yogesh Mandell

Shared publicly  - 
 
 
The US throws 100,000 children into adult jails and prisons every year

http://bit.ly/1eDW2Yo

Every year in the United States, an estimated 250,000 children under the age of 18 are tried, sentenced or imprisoned as adults. And of these, around 100,000 actually end up in adult jails and prisons, with many spending time in solitary confinement. This is despite the fact that the US Supreme Court has agreed that children are less deserving of blame than adults and usually deserve a chance at redemption. While the United Nations says that children who commit crimes should be placed in a closed facility as a measure of last resort. We take a closer look.

#US #jail #prisons #USprisons #UnitedStates #prisonsinUS #USprison #childcrime #juveniledetention #juvenilejusticesystem #adultjusticesystem #childcriminals #solitaryconfinement #torture #UnitedNations #UN #SCOTUS #SupremeCourt #HumanRightsWatch #CampaignforYouthJustice #EqualJusticeInitiative
1
Add a comment...
 
Does this interest us/count in the Android community? IMO it does
 
First Look at Lenovo’s New Chromebook Convertible

We've been waiting to learn more about Lenovo's upcoming Chromebooks since they were recently announced. Now, thanks to OMGChrome, we now have pricing details and specs.

11.6-inch IPS touch display (1366 x 768) with Gorilla Glass 
Quad-core Intel Celeron N2920 (Bay Trail) @ 1.8GHz 
2GB RAM
16GB SSD
8 hours of battery life
Priced from $429 

I'm very disappointed to see only 2GB of RAM for the $429 price tag. This was going to be my next Chromebook. Now, I'm not so sure. Maybe if the RAM is able to be upgraded.


ht/ +Sivan Rehan 
As the first device approaching the tablet form factor to run Chrome OS, the lack of hype around the Lenovo ThinkPad Yoga 11e is perhaps a little surprising.
1
Frank Reiter's profile photo
 
Why?
Add a comment...

Yogesh Mandell

Home Screens\Launchers\Themes  - 
 
Current setup, the wallpaper is live (pixel rain) and adds the most to the effect, screenshots don't really show you how good it looks. Big media widget at the bottom is called CMX something, this is all UCCW. 
1
Yogesh Mandell's profile photoJavan Reigner's profile photo
3 comments
Add a comment...

Yogesh Mandell

Shared publicly  - 
 
Resharing for the picture this time
 
NSA created 'European bazaar' to spy on EU citizens, Snowden tells European Parliament

The U.S. National Security Agency (NSA) has turned the European Union into a tapping “bazaar” in order to spy on as many EU citizens as possible, NSA leaker Edward Snowden said.

The NSA has been working with national security agencies in EU member states to get access to as much data of EU citizens as possible, Snowden said in a testimony sent to Members of the European Parliament (MEPs) published Friday.

The European Parliament had invited Snowden to provide testimony for an inquiry into the electronic mass surveillance of EU citizens. That surveillance, often instigated by the NSA but carried out with help of EU member states, is quite extensive, he wrote.

The NSA has been pressuring EU member states to change their laws to enable mass surveillance, according to Snowden. This is done through NSA’s Foreign Affairs Division (FAD), he said, adding that lawyers from the NSA and GCHQ work very hard “to search for loopholes in laws and constitutional protections that they can use to justify indiscriminate, dragnet surveillance operations that were at best unwittingly authorized by lawmakers,” he said.

The efforts to “interpret new powers out of vague laws” is an intentional strategy to avoid public opposition and lawmakers’ insistence that legal limits be respected, he said.

Recently, the FAD has used such pressuring techniques on Sweden and the Netherlands as well as on New Zealand, according to Snowden. Germany has also been pressured to modify a law on the secrecy of post and telecommunication correspondence to appease the NSA, eroding the rights of German citizens under their constitution in the process, Snowden said.

“Each of these countries received instruction from the NSA, sometimes under the guise of the U.S. Department of Defense and other bodies, on how to degrade the legal protections of their countries’ communications,” he said. The ultimate result of this NSA guidance is that the right of ordinary citizens to be free from unwarranted interference is degraded, and systems of intrusive mass surveillance are being constructed in secret within otherwise liberal states, he said, adding that this often happens without the full awareness of the public.

Ultimately, each national spy agency is independently hawking domestic access to the NSA and others “without having any awareness of how their individual contribution is enabling the greater patchwork of mass surveillance against ordinary citizens as a whole,” according to Snowden.


Once the NSA has dealt with legal restrictions on mass surveillance in partner states, it pressures them to perform operations to gain access to the bulk communications of all major telecommunications providers in their jurisdictions, Snowden said. “Sometimes the NSA provides consultation, technology, or even the physical hardware itself for partners to ‘ingest’ these massive amounts of data in a manner that allows processing, he added.

“By the time this general process has occurred, it is very difficult for the citizens of a country to protect the privacy of their communications, and it is very easy for the intelligence services of that country to make those communications available to the NSA—even without having explicitly shared them,” Snowden wrote.

The deals between the NSA and foreign partners are set up in such a way as to provide the NSA with a means of monitoring a partner’s citizens without informing the partner, and to provide the partner with a means of plausible deniability, he said.

“The result is a European bazaar, where an EU member state like Denmark may give the NSA access to a tapping center on the (unenforceable) condition that NSA doesn’t search it for Danes, and Germany may give the NSA access to another on the condition that it doesn't search for Germans. Yet the two tapping sites may be two points on the same cable, so the NSA simply captures the communications of the German citizens as they transit Denmark, and the Danish citizens as they transit Germany, all the while considering it entirely in accordance with their agreements,” Snowden said.

Snowden, who said that he’s still seeking asylum in the EU, also provided solutions to solve the mass surveillance problem.

It is easy to make mass surveillance more expensive through changes in technical standards, he said. “Pervasive, end-to-end encryption can quickly make indiscriminate surveillance impossible on a cost effective basis,” he said, adding that the result is that governments are likely to fall back to traditional, targeted surveillance founded upon an individualized suspicion.

This traditional method is more effective than mass surveillance, according to Snowden. “I believe that spying serves a vital purpose and must continue,” he said.

The European Parliament is set to vote on a draft resolution on Wednesday that seeks to keep data protection out of EU-U.S. trade talks. The MEPs want the EU to suspend two deals with the U.S., one on exchanging banking data and the other on the Safe Harbor privacy principles for U.S. firms holding European data, as, they say, the fight against terrorism can never justify secret and illegal mass surveillance.

The MEPs will also vote on a proposal for stronger safeguards for data transfers to non-EU countries. Wednesday’s vote could result in the updating of 19-year-old data-protection laws. Under MEPs’ amendments, companies breaking the rules would face fines of up to €100 million (about $139 million), or up to 5 percent of their annual worldwide turnover, whichever is greater, according to the Parliament.
1
Add a comment...

Yogesh Mandell

Shared publicly  - 
 
Can't wait for this to get out of beta! :P
 
Google might wind up turning its hometown of Mountain View into a company town, reshaping the city in its own image. It's buying up so much property and forecasting so much job growth that the city's current traffic and housing infrastructure is bursting at the seams — something's got to give

Welcome to Googletown

http://www.theverge.com/2014/2/26/5444030/company-town-how-google-is-taking-over-mountain-view
1
Chaitan Thompson's profile photo
Add a comment...
People
Basic Information
Gender
Male
Other names
Yogesh Mandal
Story
Tagline
I once opened up a bag of M&M's, but I only ever found W's :_(
Links
Contributor to
Yogesh Mandell's +1's are the things they like, agree with, or want to recommend.
RedPhone :: Secure Calls
market.android.com

Like privacy? Secure your calls for free with RedPhone. It's that simple. RedPhone provides end-to-end encryption for your calls, securing y

Telegram
market.android.com

Telegram is a messaging app with a focus on speed and security. It’s superfast, simple and free. With Telegram, you can create group chats w

Zooper Widget
market.android.com

Minimal, classy, extremely customizable, and battery friendly "Do It Yourself" widget with almost limitless possibilities!If you like the so

Return - Find back
market.android.com

The app Return helps you finding back to your saved location. Maybe the position of your car in a big city or just a place for meeting frien

Flatoon Nova, Apex, Adw, GO
market.android.com

Flatoon Pro with more then 1030 HD Iconshttps://www.google.com/url?q=https://play.google.com/store/apps/details?id=com.flatoon.pro *********

Tactic Trainer - chess puzzle
market.android.com

More than 20k tactical chess problems are provided to be solved. The range of difficulties from trivial to professional. Your tactical perfo

Circle UI (Apex / Nova / Adw)
market.android.com

Circle UI is a theme for Apex Launcher, Nova Launcher and Adw. So for use this theme you need one of these launchers.Recommended icon sizes:

Google Play
market.android.com

Shop Google Play on the web. Purchase and enjoy instantly on your Android phone or tablet without the hassle of syncing.

TIME: Nelson Mandela Commemorative Issue
market.android.com

TIME SPECIAL ISSUE. Nelson Mandela (1918-2013): Protester. Prisoner. Peacemaker. His historic life in words and pictures, including tributes

Themer Beta
market.android.com

***As featured in The New York Times, Wired, Lifehacker, XDA-Developers, and CNET*** Transform your phone's homescreen with Themer. Flip thr

Long Shadow Icon Pack
market.android.com

Long Shadow Icon Pack is inspired by a long shadows in new UI design trends.They are minimalist icons with long shadows and enough informati

Holo Shadow Icon Pack
market.android.com

This is an an holo flat icon pack with a shadow. HoloShadow is a beautiful icon pack for everyone. You can use them in launcher Nova, ADW, A

BBM
market.android.com

La versión OFICIAL de BBM™ de BlackBerry ya está disponible para Android. Consiga la aplicación BBM para disfrutar del mejor modo de estar c

Google Opinion Rewards
market.android.com

Answer quick surveys and earn Google Play credits with Google Opinion Rewards, an app created by Google Consumer Surveys.Getting started is

Aviate Beta (Invite Only)
market.android.com

Because this is a Beta version of Aviate, it is available invite only to ensure a quality experience for our current users. Please be patien

Smart App Protector(App Lock)
market.android.com

★★★ The Best App Lock downloaded more than 10 Million ★★★Smart App Protector(App Lock) is an App Locker or App Protector that will protect y

Fake Windows 8
market.android.com

Try the new Windows 8 on your phone or your tablet ! Trick and prank your friends by telling them you got the latest Windows 8 on your devic

Students - Timetable
market.android.com

Students is an application for students and pupils, has an integrated schedule with organizer and diary, allowing you to easily add a remind

Motorola Moto X Review!
www.youtube.com

Motorola's Moto X is everything the Nexus wanted to be. Moto X Features: Explained! http://youtu.be/3ZX8graseUQ Speaker test song: http://yo

Click UI (Go Apex Nova theme)
market.android.com

Say hello to Click. A theme for Nova Launcher, Apex Launcher, Go Launcher Ex, Action Launcher Pro, & some others.The theme currently contain