Meta Quest 2 – Innovate All-in-One VR Headset (Everything needed to know before buying)

Meta Quest 2 is the latest all-in-one virtual reality headset from Meta, the company formerly known as Facebook. It promises to deliver a more immersive, powerful and versatile VR experience than its predecessor, the Quest. But does it live up to the hype? Here’s my review of the Meta Quest 2 after using it for a week.

Meta Quest 2

The device is a virtual reality (VR) headset that was released in October 2020. It is the successor to the original Meta Quest, which was released in 2019. The Quest 2 is a standalone headset, meaning that it does not require a computer to operate. It is also wireless, so users can move around freely without being tethered to a computer or a power outlet.

Design and Comfort

The first thing you notice about the Meta Quest 2 is its sleek and lightweight design. The headset weighs only 503 grams, which is 10% lighter than the original Quest. It also has a soft fabric cover that feels comfortable on your face and adjustable straps that fit snugly around your head. The headset has four cameras on the front that track your movements and the …

Is it possible to play PS5 games on PC? Yes, with PS5Emux emulator software

PS5 Emulator

Gamers on a budget finally got a solution to enjoy playing PS5 games on their PCs without spending money for the console Sony’s newest console.

Thanks to the team of coders behind PS5Emux emulator, playing Sony’s PlayStation 5 exclusives came to reality. Morally looking, it’s not completely fair because Sony’s respective company doesn’t gets financial credits this way. Because players are skipping part of buying a PS5. So PS5Emux is their gateway for playing their desired Sony’s released exclusives.

Gaming experts and journalists claim that emulators harm console authors minimally, since users are mostly coming from third world countries. By analyzing statistics, those emulator players wouldn’t buy a console even if there is no emulator available, because of their low …

CoffeeMiner- A Wi-Fi Network Hacking Tool that Mines Crypto Currencies

A developer outlined proof-of-concept nicknamed CoffeeMiner, which hacks public Wi-Fis and mine cryptocurrencies.

CoffeeMiner WiFi Trojan

The staggering rise of Bitcoin values has caught the interest of rogue hackers and crooks who are devising ways of stealing crypto passwords and wallets as well as computational resources from unsuspecting users.

A developer going by the name Arnau published concrete evidence dubbed CoffeeMiner, which attacks public WIFI’s and insert a crypto-mining code that taps into your browser setting and getting hold of your passwords to monetize their efforts.

Team from Sophos Lab researchers published more in detail about it in their blog post.

Security experts say that the project drew inspiration from the Starbucks case whereby hackers gained illegal control of laptops connected to public Wi-Fi and exploited the device’s computing power to extract cryptocurrency.

Arnau explained how to initiate the   MITM (Man (Person)-In-The-Middle) attack by inserting some …

AwakenCybers Hackers Behind Twilio Breach Also Attacked Cloudflare Employees

Internet infrastructure firm Cloudflare on Monday disclosed at least 35 employees and their family members got text messages delivered on their personal and work cell phones containing similar characteristics as that of the adept phishing attack against Twilio company.

Cloudflare hacked

The hacking attempt, which occurred around the same time Twilio was attacked, came from three phone numbers jointed with T-Mobile-issued SIM cards and was unsuccessful at the end.

The SMS messages pointed to a apparently legitimate domain containing the keywords “Cloudflare” & “Okta” in an aim to trick the employees into passing over their login credentials.

The wave of over 50 smishing SMS’s initiated less than half an hour after the phishing domain was registered via GoDaddy, the company noted, adding the phishing fake login page was designed to relay the login-details entered by unsuspecting members to the hackers via Telegram messaging app in real-time.

This also meant that their attack could defeat 2FA security, as their system operates via …

DRAGONBLOOD flaw which allows hacking of WPA3 protected WiFi passwords

A group of researchers and experts who go by the name Dragonblood (MathyVanhoef and Eyal Ronen) have come up with methods of hacking WPA3 protected WiFi passwords by manipulating two sets of vulnerabilities popularly referred to as Dragonblood flaws.

DragonBlood WiFi Hack

We first go to interact with this team in April after they revealed the weaknesses and faults in WPA3, which can be exploited to recover passwords by corruptingcache-based side-channel leaks or timing.

In June 2018, the WiFi Protected Access 3(WPA3) was launched, which addressed all the security concerns and issues that affect previous versions and provide solutions to these wireless attacks from DEUTH attacks and KRACK attacks.

The standard WPA Wireless security is specially designed to verify all the wireless devices through the use of an advanced Encryption Standard (AES) protocol that establishes a secure platform that cannot be hacked or …

Researchers devised a new WiFi hack that works on WPA/WPA2

A famed expert Jens ‘Atom’ Steube, created a new WIFI hack that allows the cracking of WiFi passwords on modern routers. 

Jens ‘Atom’ Steube, a leading developer of the famed cracking tool Hashcat. The expert has devised a new hacking technique that provides cracking for W-Fi passwords in the most modern and advanced routers.

WiFi Flaw Hacked / Exploit

The techniques work against the Pairwise Master Key Identifier (PMKID with WPA/WPA2 wireless network protocols when roaming features are enabled.

The researcher detected the attack he carrying out risk-assessment of the WPA3 security standard. The cracking technique the recovering of Pre-shared Key (PSK) login passwords by the attacker and, in turn, exploits them to monitor your internet traffic as well as hack into your WiFi network.

These new hacks are different from other hacking techniques as it doesn’t need the capturing of complete 4-way authentication handshake of EAPOL.

But instead, it uses RSN IE (Robust Security Network Information Element) to request an …