Xiaomi Phones Secretly Sending Users Sensitive Data to Chinese Servers

Chinese telecoms equipment suppliers have previously been criticized by some countries due to suspected backdoors in its products, and if United States has banned its several major government departments, including NASA, Justice and Commerce Departments, from purchasing Chinese products and computer technology, then they are not wrong at all.

Find that his phone was sending personal info – text messages and photos – to an unknown IP address that is located in China.

In the latest claim against Chinese smartphone manufacturers is the allegation that the popular Chinese smartphone brand, Xiaomi has been suspected of “secretly” stealing users’ information— including SMS messages and photos —from the device without the user’s permissions and sending it back to a server in Beijing, despite of turning off the data backup functions, according to Apple Insider.

Security Researchers from F-Secure Antivirus firm has shown that the Xiaomi phones (RedMi 1S handset) send quite a lot of personal and sensitive data to “api.account.xiaomi.com”  server located in China, including following information:
  • IMEI Number of your phone
  • IMSI Number (through MI Cloud)
  • Your contacts and their details
  • Text Messages
China-based smartphone company Xiaomi recently marked a successful entry into the Indian market this month. Earlier this year, the company also announced its Redmi Note, which, just like Xiaomi’s other handsets, was an affordable with almost all features that an excellent smartphone provides. However, the handset might be doing more than what it has been advertised.
Kenny Li of Hong Kong forum, IMA Mobile, recently noticed something odd with its Redmi Note smartphone. He discovered that the device continued to make connections with IP addresses in Beijing, China. The device kept trying to make the connection, even after switching off the company’s iCloud-like MiCloud service.
Although it was pointed out that the transmissions occur only over Wi-Fi, though the device does stay in contact with the servers via small “handshakes” while using cellular data. Li then tried erasing the version of Android and installed a new version of Android, But the problem still persisted.
xiaomi phones security

Device does stay in contact with the servers via small “handshakes” while using cellular data

Previously China has accused companies like Google, Facebook, Microsoft, and Apple for spying on countries. So, what China is doing? The same.
Xiaomi, which is also known as Apple of China, has yet to respond to the allegations that the Redmi Note secretly sends user data to a China-based server.
If the allegations on the Xiaomi handset come true, it wouldn’t be the first time a Chinese smartphone was found spying on its users. It had happened before as well, China has been known for its Digital Spying and privacy invasion. Recently, a German security firm claimed that a popular Chinese Android Smartphone, the Star N9500, came pre-installed with a Trojan that could allow manufacturer to spy onto their users’ comprising their personal data and conversations without any restrictions and users knowledge.
Later in mid-June, the breach on the Star N9500 could allow an attacker to record phone calls automatically, read emails and text messages, and remotely control the phone’s microphone and camera, in order to turn users’ smartphone into a bugging device that allows hackers to hear anything you are saying near by the phone. It could also be used for theft, including granting access to the user’s online banking service.
IP Address Details

IP Address Details

Since then, people have tracked down that IP address, and as it turns out, it belongs to the Chinese government. More specifically, the IP address belongs to CNNIC, which is the administrative agency that is responsible for Internet affairs in China.

The only way to do great work is to love what you do.If you haven`t found it yet, keep looking, don`t settle. As with all matter of the heart, you`ll know when you find it.

– Steve Jobs

Here is a list of 101 websites , these are most useful but lesser known websites on the internet.

101 Great Sites.

01. screenr.com – record movies of your desktop and send them straight to YouTube.

02. bounceapp.com– for capturing full length screenshots of web pages.03. goo.gl – shorten long URLs and convert URLs into QR codes.

04. untiny.me – find the original URLs that’s hiding behind a short URLs.

05. localti.me – know more than just the local time of a city

06. copypastecharacter.com – copy-paste special characters that aren’t on your keyboard.

07. topsy.com – a better search engine for twitter.

08. fb.me/AppStore – search iOS apps without launching iTunes.

09. iconfinder.com – the best place to find icons of all sizes.

10. office.com – download templates, clipart and images for your Office documents.

11. woorank.com – everything you wanted to know about a website.

12. virustotal.com – scan any suspicious file or email attachment for viruses.

13. wolframalpha.com – gets answers directly without searching – see more wolfram tips.

14. printwhatyoulike.com – print web pages without the clutter.

15. joliprint.com – reformats news articles and blog content as a newspaper.

16. isnsfw.com – when you wish to share a NSFW page but with a warning.

17. e.ggtimer.com – a simple online timer for your daily needs.

18. coralcdn.org – if a site is down due to heavy traffic, try accessing it through coral CDN.

19. random.org – pick random numbers, flip coins, and more.

20. mywot.com – check the trust level of any website – example.

21. viewer.zoho.com – Preview PDFs and Presentations directly in the browser.

22. tubemogul.com – simultaneously upload videos to YouTube and other video sites.

23. truveo.com – the best place for searching web videos.

24. scr.im – share you email address online without worrying about spam.

25. spypig.com – now get read receipts for your email.

26. sizeasy.com – visualize and compare the size of any product.

27. whatfontis.com – quickly determine the font name from an image.

28. fontsquirrel.com – a good collection of fonts – free for personal and commercial use.

29. regex.info – find data hidden in your photographs – see more EXIF tools.

30. tineye.com – this is like an online version of Google Googles.

31. iwantmyname.com – helps you search domains across all TLDs.

32. tabbloid.com – your favorite blogs delivered as PDFs.

33. join.me – share you screen with anyone over the web.

34. onlineocr.net – recognize text from scanned PDFs and images – see other OCR tools.

35. flightstats.com – Track flight status at airports worldwide.

36. wetransfer.com – for sharing really big files online.

37. pastebin.com – a temporary online clipboard for your text and code snippets.

38. polishmywriting.com – check your writing for spelling or grammatical errors.

39. awesomehighlighter.com – easily highlight the important parts of a web page.

40. typewith.me – work on the same document with multiple people.

41. whichdateworks.com – planning an event? find a date that works for all.

42. everytimezone.com – a less confusing view of the world time zones.

43. warrick.cs.odu.edu – you’ll need this when your bookmarked web pages are deleted.

44. gtmetrix.com – the perfect tool for measuring your site performance online.

45. imo.im – chat with your buddies on Skype, Facebook, Google Talk, etc. from one place.

46. translate.google.com – translate web pages, PDFs and Office documents.

47. youtube.com/leanback – sit back and enjoy YouTube videos in full-screen mode.

48. similarsites.com – discover new sites that are similar to what you like already.

49. wordle.net – quick summarize long pieces of text with tag clouds.

50. bubbl.us – create mind-maps, brainstorm ideas in the browser.

51. kuler.adobe.com – get color ideas, also extract colors from photographs.

52. followupthen.com – setup quick reminders via email itself.

53. lmgtfy.com – when your friends are too lazy to use Google on their own.

54. tempalias.com – generate temporary email aliases, better than disposable email.

55. pdfescape.com – lets you can quickly edit PDFs in the browser itself.

56. faxzero.com – send an online fax for free – see more fax services.

57. feedmyinbox.com – get RSS feeds as an email newsletter.

58. isendr.com – transfer files without uploading to a server.

59. tinychat.com – setup a private chat room in micro-seconds.

60. privnote.com – create text notes that will self-destruct after being read.

61. flightaware.com – live flight tracking service for airports worldwide.

62. boxoh.com – track the status of any shipment on Google Maps – alternative.

63. chipin.com – when you need to raise funds online for an event or a cause.

64. downforeveryoneorjustme.com – is your favourite site really offline?

65. example.com – this website can be used as an example in documentation.

66. whoishostingthis.com – find the web host of any website.

67. google.com/history – found something on Google but can’t remember it now?

68. errorlevelanalysis.com – find whether a photo is real or a photoshopped one.

69. google.com/dictionary – get word meanings, pronunciations and usage examples.

70. urbandictionary.com – find definitions of slangs and informal words.

71. seatguru.com – consult this site before choosing a seat for your next flight.

72. sxc.hu – download stock images absolutely free.

73. imo.im – chat with your buddies on Skype, Facebook, Google Talk, etc. from one place.

74. wobzip.org – unzip your compressed files online.

75. vocaroo.com – record your voice with a click. The 101 Most Useful Websites 4

76. scribblemaps.com – create custom Google Maps easily.

77. buzzfeed.com – never miss another Internet meme or viral video.

78. alertful.com – quickly setup email reminders for important events.

79. encrypted.google.com – prevent your ISP and boss from reading your search queries.

80. formspring.me – you can ask or answer personal questions here.

81. snopes.com – find if that email offer you received is real or just another scam.

82. typingweb.com – master touch-typing with these practice sessions.

83. mailvu.com – send video emails to anyone using your web cam.

84. ge.tt – quickly send a file to someone, they can even preview it before downloading.

85. timerime.com – create timelines with audio, video and images.

86. stupeflix.com – make a movie out of your images, audio and video clips.

87. aviary.com/myna – an online audio editor that lets you record and remix audio clip.

88. noteflight.com – print music sheets, write your own music online (review).

89. disposablewebpage.com – create a temporary web page that self-destruct.

90. namemytune.com – when you need to find the name of a song.

91. homestyler.com – design from scratch or re-model your home in 3d.

92. snapask.com – use email on your phone to find sports scores, read Wikipedia, etc.

93. teuxdeux.com – a beautiful to-do app that resembles a paper dairy.

94. livestream.com – broadcast events live over the web, including your desktop screen.

95. bing.com/images – automatically find perfectly-sized wallpapers for mobiles.

96. historio.us – preserve complete web pages with all the formatting.

97. dabbleboard.com – your virtual whiteboard.

98. whisperbot.com – send an email without using your own account.

99. sumopaint.com – an excellent layer-based online image editor.

100. lovelycharts.com – create flowcharts, network diagrams, sitemaps, etc.

101. nutshellmail.com – Get your Facebook and Twitter streams in your inbox.

How do I know if my computer has been hacked?

Tip Most computer problems are not caused by computer hackers, it is more common for a computer to be hijacked then hacked. It can be difficult to detect a hacker on a computer because generally nothing changes to help disguise the hack. Below are the most common things that change after a computer is hacked.

*** New programs installed

In some situations, you may see new programs or files to the computer. If you are the only user on the computer and new programs are installed, this could be an indication of a hacked computer. However, there are also several legitimate reasons why a new program may appear on the computer, as listed below.

Operating system or other program received updates that included new programs or files.
When installing a new program it may have installed other programs. For example, it is common for plugins and other free programs to have a check box asking if it is ok to install a new Toolbar or anti-virus on your computer. If these boxes are checked, new programs are installed.
Any other person who logs on your computer could install new programs.

Below is a listing of programs that may indicate a hacker has been on the computer.

Backdoors and Trojans are by far the most common programs to be installed on the computer after it has been hacked. These programs allow the hacker to gain access to the computer.
IRC clients are another common way for a hacker to get into a computer or remotely control thousands of computers. If you have never participated in a IRC chat, your computer may have been hacked.
Spyware, rogue anti-virus programs, and malware can be an indication of a hacker. However, are more commonly a sign that your computer has been hijacked while on the Internet.

*** Computer passwords have changed

*** Online passwords

Sometimes, after an online account is hacked the attacker changes the password to your account. Try using the forgot password feature to reset the password. If your e-mail address has changed or this feature does not work, contact the company who is providing the service, they are the only ones who can reset your account.

*** Local computer password

If your password to log into your computer has changed, it may have been hacked. There is no reason why a password would change on its own. Log into an administrator account to change your accounts password.

*** Lost or forgotten Windows password.

*** E-mail spam being sent

When an e-mail account is hacked or taken over, the attacker almost always uses that account to spread spam and viruses. If your friends, family, or coworkers are receiving e-mail from you advertising something like Viagra your e-mail is compromised. Log into your e-mail and change your e-mail account password.

Tip E-mail addresses can also be spoofed without hacking the e-mail account. After changing the e-mail password, if your friends continue to get e-mails you have not sent, it is likely someone is spoofing your e-mail address.

Getting bounce back e-mails from addresses I don’t know.

Increased network activity

For any attacker to take control of a computer, they must remotely connect to that computer. When someone is remotely connected to your computer, your Internet connection will be slower. Also, many times after the computer is hacked it becomes a zombie to attack other computers.

Installing a bandwidth monitor program on the computer can help determine what programs are using what bandwidth on your computer. Windows users can also use the netstat command to determine remote established network connections and open ports.

There are dozens of other legitimate reasons why your Internet connection may also be slow.

*** Why is my Internet connection so slow?

*** Unknown programs wanting access

Computer security programs and firewalls help restrict access to programs on a network or Internet. If the computer prompts for access to programs you do not know, rogue programs may be installed, or it may have been hacked. If you do not know why a program needs access to the Internet, we recommend blocking access to that program. If you later discover these blocks cause problems, they can be removed.

Tip A firewall prompting you for access may also just be someone trying to probe your network, looking for open or available ports in your network.

*** Security programs uninstalled

If the computers anti-virus, anti-malware program, or firewall that has been uninstalled or disabled this can also be an indication of a hacked computer. A hacker may disable these programs to help hide any warnings that would appear while they are on the computer.

*** Computer doing things by itself

When someone is remotely connected to a computer they can remotely control any device. For example, a mouse cursor could be moved or something could be typed. If you see the computer doing something as if someone else was in control, this can be an indication of a hacked computer.

*** Modem users

If the computer is dialing the Internet on its own, it is an indication that a program needs to connect to the Internet. It is common for programs like e-mail clients to do this to check for new e-mail. However, if you cannot identify what program needs Internet access, this can also be an indication of a hacked computer.

*** Internet browser home page changed or new toolbar

Internet browser changes such as your home page changing to a different web page, a new toolbar getting added, your search provider changing, web pages getting redirected are all signs of a browser getting hijacked and not a computer hacker.

Facebook Developer World Hack 2012 to visit Bengaluru on Sep 17.


Facebook is all set to reach out to the developer community around the world through a global series of events scheduled to commence this month. Called Facebook Developer World Hack 2012, the events will be hosted by the social networking website throughout August and September. Importantly, it will also be held in Bengaluru on September 17. 

An official blog post on the Facebook Developer blog announcing Hack

 2012 states that this is a move to “bring the Facebook Developer story to a new set of cities – homes to some of the world’s most vibrant and fast-growing developer communities”. The blog goes on to state that the events are one-day-long each and will take place in 12 cities.
Each event will start with a series of technical sessions, where Open Graph, iOS, Android, mobile web, and social game development will be discussed. Following this, Facebook’s engineers will elaborate with demos and samples, so that developers jump right into the Hack itself. The post states that the Hack is an eight-hour competition where “you get to demonstrate your newfound skills, with hands-on help from Facebook engineers”. The events will end with awards and team demos for the best apps and projects worked on through the day.

The events are open to all kinds of coders irrespective of their level of experience in developing Facebook apps. Coders who have developed an app for Facebook, which they’d like to distribute or those who have ideas for social apps are also welcome at the events. The events require you to pre-register with a nominal fee.

The World Hack events will take place in these cities starting August 23:

Austin, USA – August 23
Mexico City, Mexico – August 27
Buenos Aires, Argentina – August 29
São Paulo, Brazil – August 31
Berlin, Germany – September 11
Taipei, Taiwan – September 11
Jakarta, Indonesia – September 13
Bangalore, India – September 17
Barcelona, Spain – September 18
Vancouver, Canada – September 20
Warsaw, Poland — September 28
Moscow, Russia – October 1


Information Technology

A fast-growing segment of Indian industry is information
technology. The availability of educated manpower, high
standard of educational institutions, sound infrastructure, low
costs of operation,disciplined labour force, presence of
international airports and major sea ports are some of the
factors which have made India the destination for IT industry.
With IT penetrating all spheres such as Government
departments, educational institutions, banking, shopping,
consumer applications, the potential for further growth of IT
industry is enormous.
Earlier, the hardware industry in India had mainly catered to
the needs of domestic consumers with only marginal exports
while 60 per cent of the software revenues were from exports.
After the liberalization process in 1991, followed by reduction of
import duties in 1996 Multinational companies were able to
export large volumes to India boosting the domestic market for
both hardware and software.

Software Industry

India has earned undisputed respect all over world due to its
software prows Infosys, wipro,TCS to name a few are amongst
the top software companies. Infact there has been outsourcing
from our software companies the all over world.ln sort in the
job opportunities available in market 90 percent are of Software
& Telecommunication.

Today our whole life schedule is facet with softwares from
banking to madication, mobile networks, high end ticketing
technology. the job opportunities in this field are immence and
next 20 years will be of the revolution because of software

IT/ITES Employment Trends

The IT/ITES industry is one of the largest employers in India.
Not only the industry offers numerous jobs but also tries to
follow diverse employment practices and encourages people
with different skill sets, gender, abilities and qualifications to
work together. IT industry in India has created employment
opportunities in smaller/non- metro cities giving the students a
chance to enter this field. Nearly, 33-50% employees of large IT
firms belong to non-metro areas.

IT industry also encourages differently–abled people by
employing and training them. ITES industry provides an
opportunity to the non-technical and less qualified people to
enter this field. In addition, this filed has helped and is still
focusing on women empowerment. The increasing trend of
number of women getting employed in this sector exhibits that
this sector offers equal opportunities and benefits to women.

Indian IT job market has a very high growth rate. This growth
has impacted the overall employment ratio resulting in doubling
the employment every year. The number of people employed in
the IT/ITeS sector has increased significantly from 670,000 to
2,572,000 from 2003 to 2010 as per the NASSCOM 2011 report.
This sector is expected to grow even more in the coming years.

Key Players in the IT Industry in India

Tata Cons

Requirements of IT Industry

The educational qualifications required for some of the IT industry jobs for fresh pass-outs are:-
Systems Analyst – BE/ B.Tech, Electronics, Communication, Computer Science
Data Warehousing – BE Computer Science/ MCA
E-Commerce Engineer – BE / B.Tech/ MCA
Network Designer – BE Computer Science, BE Electrical & Communication