Kickass Torrents Owner Arrested And Domain Seized


Artem Vaulin, 30, of Kharkiv, Ukraine, was suspected of being the owner of ‘Kickass Torrents’ the world’s biggest online piracy network.

Kickasstorrents Domain Seized

Artim was arrested & is being sought by US authorities for copyright infringement, money laundering & other charges. Kickass Torrents overtook Pirate Bay a few years ago due to its ease of use to reach its current popularity & making it the 69th most visited website as per a Justice Department statement. The estimated worth of material pirated goes well above $1 billion. Officials were allegedly able to track & identify Vaulin from records provided by  Apple on his iCloud account. Users around the world are demanding that Artim be released.

Further more,every Kickass domain including has been seized by the US Government, there are speculations that new domains with new servers might be up very soon.

MTN Unlimited WhatsApp Trick


A lot of people might have received this message via an sms from Mtn this week but some can also be new to this on the other hand.
This is also part of the MTN SURPRISE Offer.


it’s unlimited Whatsapp Bundle From MTN

I believe this package is somehow important but you won’t know its important until you are in
an MBless situation and you need to send a Whatsapp message to your beloved one’s or so.

How Can I Activate it?

Simply text WAM to 131 and N60 will be
deducted from your MTN account to last for 30 days (A Month)

Got Queries? Need Urgent Help? ADD US ON BBM : 51625284

New And Affordable Data Bundle From MTN


Last week we were rocking an unlimited Free Browsing trick which was terminated not long ago, today we are happy to inform you about the New And Affordable Data Bundle From MTN  you no longer need to rely on browsing tricks before you can enjoy the internet.

MTN sent an sms recently that says : You can now purchase 1.3GB data bundle for just ₦1,000 and 3.75GB for only ₦2,000. To subscribe:

  • SMS 106 to 131 for 1.3GB data bundle at ₦1,000 for 30 days
  • SMS 110 to 131 for 3.75GB data bundle at ₦2,000 for 30 days

Currently, we dont know if this new data bundle plans are permanent or temporary MTN data promo that comes with an expiry date.  But be rest assured, every activation last for 30 Days.

There are speculations that this new MTN data plan  might affect the sales of data resellers selling 1GB for ₦1,100.

You Can Now Share Documents Via Whatsapp Web


WhatsApp is leaving no stone unturned and continually upgrading every single arm of the business, whether the smartphone or web client or its newest standalone desktop app.


The web version of WhatsApp  now display an option like the picture above that states a new “Update Available” click to download and install the update to enable you share files via WhatsApp Web.

They’ve now made it possible to send and receive PDFs and other docs on its web client. The feature is already available in the desktop app which it launched this week. The file sharing feature supports: CSV, DOC, DOCX, PDF, PPT, PPTX, RTF, TXT, XLS and XLSX.

Google Duo : Another FaceTime Headache 


Officially Launched Aug 11 2016 and has over 1 Million Downloads. Wow!

Most people think Google Duo is another application like Skype;


It’s a cross platform mobile application with an overly simplistic and easy to use UI that enables you make free video calls with other Duo users, and nothing else. 

Designed to work with Google Allo, it is rumored to be Googles’ answer to Apple’s Facetime. It also provides the kind of end—to end—encryption seen in WhatsApp that ensures user privacy and data security. 

Duo does not only work on Android smartphones, it’s also available for iOs (duh.. Apple).

Easier to use: Just input your number and you’re ready to go, you don’t even need to have a Google account before you can use Duo. A one time verification code is sent to your phone and you have a screen where you can make calls to your contacts provided they are available on Duo. 

Conclusion: The simplicity of Duo and cross platform availability provides staggering competition for already widely adopted video calling apps like Facetime and Skype. Let the fanboys pray Google’s ingenuity (or name) and material-magic pushes it to first place. 

New Affordable Data Plan From MTN Their Prices Will Blow You Away


As we sadly witness the demise of the Airtel Unlimited Night Plan I want you to join me and welcome the new born MTN DATA PLAN that has been refurbished to suite everybody’s online need.

mtn-deal-zone (1)

See the list below for the current MTN data bundle newly launched for Monthly, Weekly and Daily users.

Daily Data Packs :

MTN 30MB For 100 (Valid for 24Hrs) SMS 104 to 131

MTN 100MB For N200 (Valid for 24Hrs) SMS 113 to 131

Weekly Data Pack :

MTN 750MB For N500 (Valid for 7 Days) SMS 103 to I31

Monthly Data Packs :

MTN 1.5GB for N1000 (Valid for 30 Days) SMS 106 to 131
MTN 3.5GB for N2,000 (Valid for 30 Days) SMS 110 to 131
MTN 10GB for N5,000 (Valid for 30 Days) SMS 116 to 131
MTN 22GB for N10,000 (Valid for 30 days) SMS 117 to 131

Data Plan For All Mifi Users :

(3Months) MTN 50GB For N20,000 (Valid for 3Months) SMS 118 to 131
MTN 85GB For N50,000 (Valid for 3Months) SMS 133 to 131

Thanks to MTN for reviewing there data plans I hope you can now choose the one that suites your pocket and personality.

I guess this is just an introduction to MTN 4G LTE. With the recent disappointment people are facing in Airtel Night Plan, i think one of this will solve there surfing needs

What do you think about this newly launched MTN Data Plans?

Fake Versions Of Infinix HOT NOTE X551 Spotted in Nigerian market 


The Infinix Hot Note X551 is one of the most successful phone for the Infinix company as they sold millions of copies around Nigeria last year and still selling by popular demand this year, its no doubt that some people want to have a share of the market by selling fake versions of this widely accepted device.

How To Identify A Fake Infinix Hot Note X551

Infinix released a statement saying :
“Infinix is committed to offering customers the best quality, so fans/customers should be aware so as not to fall victims purchasing the fake version of this device.”

How To Identify A Fake Infinix Hot Note X551

1. The Speaker and SIM card port arrangement is different from the original as shown in the image below.

How To Identify A Fake Infinix Hot Note X551

2. The top view of the fake is different from the original, you can check the illustration on the image.

How To Identify A Fake Infinix Hot Note X551

3. The charger is different, the original charger is thicker.

How To Identify A Fake Infinix Hot Note X551

4. The sensor is vertical on the fake, while it is horizontally placed in the original.


Don’t forget to share this with your friends and family, safe someone from buying fake.
If you ever come across a fake Infinix Hot Note X551 take a picture of it and share on social media with the hash tag “#SPOTTHEFAKE”

Facebook Stop Support for BlackBerry Devices



Even more bad news for BlackBerry.
Facebook has finally decided to end support for BlackBerry smartphones including BlackBerry 10 & BBOS.
Essential APIs for BB have been discontinued which will affect the working of existing Facebook & WhatsApp apps on all BlackBerry devices around the world. BlackBerry has replaced the official Blackberry Facebook App with a native app which uses a simple web interface.

An extremely disappointed Blackberry says: “We fought back to work with WhatsApp and Facebook to change their minds, but at this time, their decision stands (but let them know how you feel on social media, using the hashtag #ILoveBB10Apps).

Despite this, we have worked hard to ensure our end users have the best experience in light of this decision, and are continuing to search for alternate solutions.”
Just when you thought Blackberry had it bad enough, things just get worse for them.
What do you have to say about this? I feel for every blackberry user out there, take heart.

DROWN Attack : HTTPS isn’t So Safe Anymore


DROWN Attack : HTTPS isn’t So Safe Anymore!

On Tuesday, a team of 15 infosec researchers warned that more than 11 million websites and email services are open to a new deadly security vulnerability. It happens to be in OpenSSL and affects websites using transport layer security protocol, Secure Sockets Layer (SSLv2). It is described as a low-cost attack capable of decrypting sensitive & secure HTTPS communications, including passwords & credit card details almost immediately. They said,

“We’ve been able to execute the attack against OpenSSL versions that are vulnerable to CVE-2016-0703 in under a minute using a single PC. Even for servers that do not have these particular bugs, the general variant of the attack, which works against any SSLv2 server, can be conducted in under 8 hours at a total cost of $440.”

The attack is known as a DROWN attack which stands for ‘Decrypting RSA with Obsolete and Weakened eNcryption.’

What is this DROWN?
DROWN Attack is a serious vulnerability that affects HTTPS and other services that rely on SSL and TLS, some of the essential cryptographic protocols for Internet security. These protocols allow everyone on the Internet to browse the web, use email, shop online, and send instant messages without third-parties being able to read the communication.

DROWN Attack allows attackers to break the encryption and read or steal sensitive communications, including passwords, credit card numbers, trade secrets, or financial data. Our measurements indicate 33% of all HTTPS servers are vulnerable to the attack.

What can the attackers gain?
Any communication between users and the server. This typically includes, but is not limited to, usernames and passwords, credit card numbers, emails, instant messages, and sensitive documents. Under some common scenarios, an attacker can also impersonate a secure website and intercept or change the content the user sees.

Who is vulnerable?
Websites, mail servers, and other TLS-dependent services are at risk for the DROWN attack, and many popular sites are affected.

Operators of vulnerable servers need to take action. There is nothing practical that browsers or end-users can do on their own to protect against this attack.

Is my site vulnerable?
Modern servers and clients use the TLS encryption protocol. However, due to misconfigurations, many servers also still support SSLv2, a 1990s-era predecessor to TLS. This support did not matter in practice, since no up-to-date clients actually use SSLv2. Therefore, even though SSLv2 is known to be badly insecure, until now, merely supporting SSLv2 was not considered a security problem, because clients never used it.

DROWN shows that merely supporting SSLv2 is a threat to modern servers and clients. It allows an attacker to decrypt modern TLS connections between up-to-date clients and servers by sending probes to a server that supports SSLv2 and uses the same private key.

DROWN Attack Diagram-1

A server is vulnerable to DROWN if:

  • It allows SSLv2 connections. This is surprisingly common, due to misconfiguration and inappropriate default settings. Our measurements show that 17% of HTTPS servers still allow SSLv2 connections.
  • or:

  • Its private key is used on any other server that allows SSLv2 connections, even for another protocol.

Many companies reuse the same certificate and key on their web and email servers, for instance. In this case, if the email server supports SSLv2 and the web server does not, an attacker can take advantage of the email server to break TLS connections to the web server. When taking key reuse into account, an additional 16% of HTTPS servers are vulnerable, putting 33% of HTTPS servers at risk.

To check whether your server appears to be vulnerable go here.

How do I protect my server?
To protect against DROWN, server operators need to ensure that their private keys are not used anywhere with server software that allows SSLv2 connections. This includes web servers, SMTP servers, IMAP and POP servers, and any other software that supports SSL/TLS. You can use the form above to check whether your server appears to be exposed to the attack.

Disabling SSLv2 can be complicated and depends on the specific server software. We provide instructions here for several common products:

OpenSSL: OpenSSL is a cryptographic library used in many server products. For users of OpenSSL, the easiest and recommended solution is to upgrade to a recent OpenSSL version. OpenSSL 1.0.2 users should upgrade to 1.0.2g. OpenSSL 1.0.1 users should upgrade to 1.0.1s. Users of older OpenSSL versions should upgrade to either one of these versions. More details can be found in this OpenSSL blog post.

Microsoft IIS (Windows Server): IIS versions 7.0 and above should have SSLv2 disabled by default. (A small number of users may have enabled SSLv2 manually and will need to take steps to disable it.) We still recommend checking whether your private key is exposed elsewhere, using the form above. IIS versions below 7.0 are no longer supported by Microsoft and should be upgraded to supported versions.

Network Security Services (NSS): NSS is a common cryptographic library built into many server products. NSS versions 3.13 (released back in 2012) and above should have SSLv2 disabled by default. (A small number of users may have enabled SSLv2 manually and will need to take steps to disable it.) Users of older versions should upgrade to a more recent version. We still recommend checking whether your private key is exposed elsewhere, using the form above.


Don’t forget to share your opinions in the comment box below…

Pictures and Specification Of iPhone 5s Clone


With the way things are going am sure China can make clones of anything and very soon they will make clones of Human Being.  Last week i came across this piece of metal, mixed with glasses with a cold aluminium cover at the back faintly engraved on the back is the Apple Logo. Today, i bring you Pictures and Specification Of iPhone 5s Clone.

Pictures and Specification Of iPhone 5s Clone
Pictures and Specification Of iPhone 5s Clone

I looked closely and it looks just like the Original iPhone 5s, Oh NO!! Its a CLONE they almost fooled me.

General Specifications

Display : IPS

Ram/Rom : 1GB Ram 16GB Rom

Speed : 1.2GHZ

CPU : MT6572 Dual Core

OS : Android 4.4 Themed IOS 9.1 ROM

Camera : 5mp Back  Camera and 0.3mp Front facing camera


Back View Of the iPhone 5s Clone Showing The Apple Logo in Black.
Back View Of the iPhone 5s Clone Showing The Apple Logo in Black.
Pictures and Specification Of iPhone 5s Clone
5mp Back Camera With LED Flashlight similar to the Original iPhone
Pictures and Specification Of iPhone 5s Clone
USB Port is the same with the Original iPhone 5S and the Headphone Jack plus Speaker are placed just like the Original.