The New RBI spam…Interesting but Believable


Today just now I checked my email and saw this one. My first thought was I m gonna be rich and then I noticed the fonts used and I realized that I don’t have an account in Central Bank and Why the hell Reserve Bank of India will be so generous ?

Unfortunately , there was some spelling mistakes which made me think that RBI would have never done that .I am quite sure whoever made this spam will receive a lot of money within a short period of time as most of the people will not think it as spam as it looks pretty god damn real. But I am posting it to let people know this spam is QUITE NEW AND BELIEVABLE. SO WATCH OUT AND BE CAREFUL.
And also my suggestions to the guys made these spam that be careful while typing and making such documents , a very little mistake can every hard work to make easy money go in vain . So little hackers and wanna be phishers BE AWARE 😉 . Also people should be aware of the fact that in the image whatever details they are asking you to submit, if any site asks you to do so can have all your details and that can be used to rip you off. So before registering in unknown sites or before opening such kind of mails BE CAREFUL. AND I , MYSELF DIDN’T FIND IT IN MY SPAM FOLDER. so most of you may think that it is not a spam as it passed the spam filter of Google / Gmail. But they were smart enough to make fool of Gmail’s spam type checker which generally eliminate these kind of mails and put them in our spam folder. So most of You very soon will receive either the exact same mail in exact same format or same mail in different format. In both cases, YOU NOW KNOW WHAT TO DO. And though I am not yet sure that it has virus content in this word doc but beware of that too, it also can contain different kind of malware.

But I gotta say using Raghuram Rajan’s name and after that the format of the document , it was quite out of the box thinking and looked pretty impressive to me .It almost made me write this post in a busy evening which believe or not is a very hard job to do than hacking an email . I generally don’t say this, But crimes should be smart and common people should be aware of those , that gives both parties a fair chance . And my post is for the naive and new users like most of our parents and also like my girlfriend who thought of  it as a great opportunity after knowing a hell lot about phishing . BEST OF LUCK …ENJOY AND HAVE A GOOD EVENING .AND BE READY FOR NEW TYPES OF THESE MAILS. I WILL KEEP YOU GUYS POSTED ABOUT THIS AND RELATED THINGS TOO. (if I find those interesting enough). Meanwhile check this document also 1x .


Some tough & tricky & interesting questions asked in Facebook’s interview ……(Welcome to Answer & Discuss)

Well I am online after a long time , all these months I was pretty busy with some of my project work and also came across several campus interaction questions , some interesting questions asked by companies like Amazon , Google , and Paypal . Well I had fun facing them and also its really challenging for geeks like us . So I decided to come up with some questions and discussions . For the geeks out there , here comes some pretty interesting questions .Lets see some of the toughest or tricky questions asked in Facebook interviews ….If any of U can come up with answers I would like to request you to post the answers in the Comments section below …I am sure some of you may have faced or will face these questions in some point of your life if you apply for this social networking giant’s interview …So lets discuss about these…

Question 1

There is a building with 100 floors. You are given 2 identical eggs. How do you use 2 eggs to find the threshold floor, where the egg will definitely break from any floor above floor N, including floor N itself.

(Data Scientist candidate)

Question 2

If you were going to redesign an ATM machine, how would you do it? 

(Product Designer Candidate)

Question 3

How many birthday posts occur on Facebook on a given day?

(Data Scientist Candidate)

Question 4

Do you think that Facebook should be available to China?

(User Operations Analyst candidate)

Question 5

How much do you charge to wash every window in Seattle? 

(Online Sales Operations Candidate)

Question 6

Describe how the website works. (That’s the whole question, with no context.)

(Technical Project Manager Candidate)

Question 7

How much money is spent on the internet?

(Account Manager Candidate)

Question 8

How would you design a simpler TV remote control?

(Product Designer Candidate)

Question 9

How do you deal with communicating less than favorable information?

(Training Candidate)

Question 10

You’re at a casino with two dice, if you roll a 5 you win, and get paid $10. What is your expected payout? If you play until you win (however long that takes) then stop, what is your expected payout? 

(Data Scientist Candidate)

Question 11

You have two light bulbs and a 100-story building. You want to find the floor at which the bulbs will break when dropped. Find the floor using the least number of drops.

(Software Engineer Candidate)

Question 12

How would you set up an interview in this room? 

(Content Producer Candidate)

Question 13

How many vacuums are there in the USA?

(Risk Analyst Candidate)

Question 14

What options do you have, nefarious or otherwise, to stop people on a wireless network you are also on (but have no admin rights to) from hogging bandwidth by streaming videos? 

(Production Engineer Candidate)

Question 15

How many Big Macs does McDonald sell each year in the US?

(Data Scientist Candidate)

Question 16

How would you build Facebook for blind people?

(Product Manager Candidate)

Question 17

Tell me your plan of action if you saw that photo uploads suddenly dropped by 50%.

(Operations Associate User Intelligence Candidate)

Question 18

A Russian gangster kidnaps you. He puts two bullets in consecutive order in an empty six-round revolver, spins it, points it at your head and shoots. *click* You’re still alive. He then asks you, do you want me to spin it again and fire or pull the trigger again. For each option, what is the probability that you’ll be shot? 

(Internet Marketing Analyst Candidate)

Question 19

Should Facebook continue to add features or rely on 3rd party apps?

(Product Designer Candidate)

Question 20

If you were an animal what kind would you be and why?

(User Operations Analyst Candidate)

Question 21

What are you least proud of on your resume?

(Media Solutions Specialist Candidate)

Question 22

Given access to all the data Facebook collects, what would you do with it?

(Product Analytics Candidate)

Question 23

Pre-IPO, they asked me to write a paper on the valuation of Facebook. They also asked me what I thought the greatest technological advancement was in the past 20 years.

(Software Engineer Candidate)

Question 24

If you have 100 credit card numbers (and all info) how would you make as much $ possible in 24 hours using only online transactions? (Many follow-up questions of how to get around certain fraud deterrents.) 

(Ads Risk Associate Candidate)

Question 25

You are trying to rob houses on a street. Each house has some amount of cash. Your goal is to rob houses such that you maximize the total robbed amount. The constraint is once you rob a house you cannot rob a house adjacent to that house.

(Software Engineer Candidate)

Question 26

The most difficult question was the 8-hour test, which involved deriving a novel and fairly-involved algorithm, significant CSS/HTML/JS coding, and plenty of opportunities to get something subtly wrong.

(User Interface Engineer Candidate)

Question 27

25 racehorses, no stopwatch. 5 tracks. Figure out the top three fastest horses in the fewest number of races.

(Software Engineering Summer Intern Candidate)

Question 28

What is the process you would go about in spotting a fake profile?

(User Operations Analyst Candidate)

Question 29

You’re about to get on a plane to Seattle. You want to know if you should bring an umbrella. You call 3 random friends of yours who live there and ask each independently if it’s raining. Each of your friends has a 2/3 chance of telling you the truth and a 1/3 chance of messing with you by lying. All 3 friends tell you that ‘Yes’ it is raining. What is the probability that it’s actually raining in Seattle?

(Data Scientist Candidate)


Facebook apologizes for popping up unwarranted Year In Review messages in users timeline

If you are spending a lot of time you may have noticed an irritating popup from Facebook called “Year In Review.” The “Year In Review” automatically gathers a selection of the most liked photos from your feeds and pop up messages into your timeline with a tagline declaring “It’s been a great year! Thanks for being a part of it.”

It may sound freaking awesome but in case you have put up a photo of  death of a near and dear one in the family, and the photo has been most liked, Facebook’s Year In Review algorithm will rather cruelly put up that photo in your timeline with a rather inhumane and insensitive tag “It’s been a great year! Thanks for being a part of it.”

That’s exactly what happened to prominent web designer and writer Eric Meyer.  Facebook forced Meyer to relive the utter horror of losing his baby, who had died on 6th birthday in June, 2014 after suffering from brain tumour.  Meyer who is barely out of the grief of his immense personal loss was flabbergasted to see the photo and the very inhumane tagline. He summed it up aptly on his blog,

“I didn’t go looking for grief this afternoon, but it found me anyway, and I have designers and programmers to thank for it. In this case, the designers and programmers are somewhere at Facebook.”

Meyer called it a “algorithmic cruelty” on part of Facebook’s engineers who through the “Year In Review” app forced him to relive the horrors of the moment of his daughters death. From his blog, “Still, they were easy enough to pass over, and I did. Until today, when I got this in my feed, exhorting me to create one of my own. “Eric, here’s what your year looked like!”

Facebook apologizes for its, "year in review" app which comes out as a 'algorithmic cruelty' for many users

“A picture of my daughter, who is dead. Who died this year.” Meyer added, “Yes, my year looked like that. True enough. My year looked like the now-absent face of my little girl. It was still unkind to remind me so forcefully.”

The Year in Review popup may workout to be great for some while it may cause insurmountable pain to others to who have put up a image of  their near and dear ones lost in the year and if photo is picked up by Facebook’s algorithm to declare it has been a great year for them.

Meyer said he had known about the Year In Review popup but for obvious reasons had avoided making his own.  But that day, he felt helpless on seeing the popup in his timeline,

“To show me Rebecca’s face and say “Here’s what your year looked like!” is jarring. It feels wrong, and coming from an actual person, it would be wrong. Coming from code, it’s just unfortunate. These are hard, hard problems. It isn’t easy to programmatically figure out if a picture has a ton of Likes because it’s hilarious, astounding, or heartbreaking,” Meyer added, “Algorithms are essentially thoughtless. They model certain decision flows, but once you run them, no more thought occurs.”

Meyer, who is a web designer himself, knows the shortcomings in coding and algorithms vis-a-vis human emotions but he reminded Facebook that certain things should not be let to run.  Meyer recommended Facebook not to “pre-fill” any pictures until making sure the user actually wants to see them. He suggested that Facebook would been better off asking users opinion before dishing out such popups in the timeline.

Facebook apologises

Facebook has apologized for this offending error of its judgement. “[The app] was awesome for a lot of people, but clearly in this case we brought him grief rather than joy,” the product manager for Facebook’s “Year in Review” app, Jonathan Gheller, told The Washington Post. “We can do better – I’m very grateful he took the time in his grief to write the blog post.”

Facebook is developing an “artificial assistant” tool to stop you posting while you are drunk

In last few years,  Facebook is doing a lot of work to create more awareness in the society. Facebook always try to make their social network more interesting and helpful for the people. But, in the website everyone is free to share anything they want. This may help us to share our thoughts and opinion with freedom. We can be connected with out own people. But wait ! what happens when you are drunk and using facebook ?

On that time, this freedom may break relationships, keep your own people away from you or your boss may say get lost to you. Because you can post anything that can hurt or expose something that you don’t want to show to anyone .

To overcome this problem, Facebook’s Artificial Intelligence Research department chief Yann LeCun has said they are developing an “artificial assistant” who will recognise when you are about to post a selfie of your night out that you may not want your boss/parent to see.

He told Wired the “intelligent digital assistant” would tell you (virtually) “Uh, this is being posted publicly. Are you sure you want your boss and your mother to see this?”

Facebook will also notify you when someone you don’t know publishes a picture of you without your explicit approval. “You will have a single point of contact to mediate your interaction but also to protect your private information,” LeCun said.

The tool would recognise the difference between a user’s drunken and sober state through facial recognition technology.

This is kind of same idea some of you may have seen in the movie “The internship” where they talked about developing a beta app for the same purpose but that was for only messaging , now implementing this in the whole site will be a relatively difficult step . And though applying “facial recognition” in relatively slow internet connection  will be hard to implement i think . But that’s my view I am looking forward to their implementation and eventually we will see the user’s feedback of it . Apparently I am excited that they are going to apply another new technology in the site            . images (2)

Most cyber attacks on India show Chinese IP address …Strange fact isn’t it ?

     As we know Cyber attacks have grown nearly five times in the last three years and most of them have been found to be originating from the IP addresses located in China according to Government cyber security department officials.

At Ground Zero Summit , the Director of Cyber Security Operations Alok Vijayant said ,”  Most of the cyber attacks that we have tracked show IP addresses located in China but we are unable to establish if the attacker is from China. We need international cooperation for handling such crimes.”

.Government’s cyber security arm Computer Emergency Response Team-India (CERT-In) reported 62,189 cyber security incidents in the first five months of the current calendar year.

These attacks have been found to be originating from the cyber space of a number of countries including the US, Europe, Brazil, Turkey, China, Pakistan, Bangladesh, Algeria and the UAE ,according to the official report of Cyber Security Department .

The National Technical Research Organisation (NTRO) Director said that foreign countries are investing heavily in cyber espionage to gather crucial data and India needs to seriously consider a strategy to counter this strategy.

“Indian has a dearth of talent. In most of the cases Indians find cyber security loophole quickly with its solution but people may get tempted with high price paid in under ground market. Payment per exploit is as good as 15,000 euros and higher than that,” Vijayant said.

Cyber security expert Greg Walton showed his research on an attack mounted on Tibetan government in exile which showed its origin in Chengdu city of China.

“The attacker hacked e-mail id of a senior minister of Tibetan government in exile in Dharamshala and through that id they even attacked India’s ministry of external affairs,” Walton said.

India has seen increase in cyber attacks from about 13,000 in 2011 to 62,000 till mid-2014. The country has been unable to identify cyber criminals in majority of the case due to absence of international cooperation on the issue.

It raises lot of question , some of them are strictly political but some of them are technical . My concern is about the technical side . Now think about it ..if China is helping those attacks or supplying them spoof ip or their server ..then its understandable . But What if this is a new style to fail the ip tracing system , what if Hackers are using a new technology ?? ..What if we are about to get attacked by chinese cyber criminals and hackers in 2015 ? What if…. Take a thought pill guys because according to report of Cyber Security department we are about to get attacked in more sophisticated way in 2015 . So wait for my next post about it…and Think and be careful.

“Hacking” cars on the road wirelessly is easy or not….



It is perfectly possible to “hack” a car while it is driving on the road, seize control, and force the vehicle into a fatal crash, says a car security specialist, speaking to Network World.

Security researchers have demonstrated such hacks using wired systems or short-range wireless such as Bluetooth, but Toucan Systems claims that attacks can be conducted from half the world away, from a computer at a desk.

Jonathan Brossard, quoted by the Sydney Morning Herald, “does not know of a car that has been hacked on the road but says his company does it for vehicle manufacturers in Europe.”

”The vehicle is remote from me. I am sitting at the desk and I am using the computer and driving your car from another country. I am saying it is possible. A car is, technically speaking, very much like a cell phone and that makes it vulnerable to attack from the internet. An attack is not unlikely.”

A report by CNN Money describes the security of “connected” cars as simply behind the times. CNN describes the 50 to 100 computers controlling steering, acceleration and brakes in the typical automobile as “really dumb” – and says “there’s a danger to turning your car into a smartphone on wheels”.

“Auto manufacturers are not up to speed,” said Ed Adams, a researcher at Security Innovation, speaking to CNN Money. “They’re just behind the times. Car software is not built to the same standards as, say, a bank application. Or software coming out of Microsoft.”

The report claims that the next generation of cars from both Audi and Tesla will be wirelessly connected to the internet via AT&T – and thus much more vulnerable.

Writing about a demo at the Blackhat conference in Las Vegas last year, some of experts said, “Traditionally, cars have had rudimentary computing systems, implemented to carry out fixed tasks like measuring fuel for injection, making your transmission shift more smoothly under gentle acceleration or to improve gas mileage – things like that.

But with some manufacturers hoping to roll out location-aware browser-based or embedded information systems, can scams be far behind?”

The CNN Money report compared the 145,000 lines of computer code used in the spaceship that put men on the moon, Apollo 11, with the average modern automobile, which has 100 million.

Last year, Senator Edward J Markey, Democrat, Massachussets, pointed out in a publicly availableletter to 20 auto manufacturers that average cars now have up to 50 electronic control units, often controlled by a car “network, and that manufacturers had a duty to protect consumers against hackers.

The open letter has ignited a spate of commentary, with Market Oracle describing the crime as “cyberjacking”, and pointing out that the average family car contains 100 million lines of computer code, and that software can account for up to 40% of the cost of the vehicle, according to researchers at the University of Wisconsin-Madison.

Hacks against cars have been demonstrated before – but thus far, have relied on attackers having physical access to the vehicles. At the DefCon conference this year, two researchers showed how they could seize control of two car models from Toyota and Ford by plugging a laptop into a port usually used for diagnostics.

So far, though, attacks where vehicles are “taken over” wirelessly have not been widely demonstrated.

“At the moment there are people who are in the know, there are nay-sayers who don’t believe it’s important, and there are others saying it’s common knowledge but right now there’s not much data out there,” said Charlie Miller, one of the ‘car hackers’ at Defcon. “We would love for everyone to start having a discussion about this, and for manufacturers to listen and improve the security of cars.”

“As vehicles become more integrated with wireless technology, there are more avenues through which a hacker could introduce malicious code, and more avenues through which a driver’s basic right to privacy could be compromised,” Senator Markey wrote. “These threats demonstrate the need for robust vehicle security policies to ensure the safety and privacy of our nation’s drivers.

Markey argues that car companies should use third parties to test for wireless vulnerabilities, and should assess risks related to technologies purchased from other manufacturers.

A report by CNBC earlier this year described some of these threats in detail, describing car-hacking as “the new global cybercrime.”