• Make international calls cheaper and right from your browser - Voixcall.com is here

     Voixcall.comVoixCall is a browser-based international calling service that launched on May 6, 2025, offering high-quality voice calls to any...
  • Critical Vulnerability and Privacy LoopHole Found in RoboForm Password Manager

    Unless you are a human supercomputer, remembering password is not so easy, and that too if you have a different password for each site. But luckily...
  • miniLock - Open Source File Encryption Tool from CryptoCat Developer

    It’s the age of surveillance what made the Use of Encryption so widely that it has become a need of law enforcement agencies, cyber criminals as...
  • A BEGINNERS GUIDE TO HACKING UNIX

      *************  *       A BEGINNERS GUIDE TO:        *  *        ...
  • CASH! CASH! Hacking ATM Machines with Just a Text Message

    As we reported earlier, Microsoft will stop supporting the Windows XP operating system after 8th April, apparently 95% of the world’s 3 million...
  • Microsoft Word Zero-Day Vulnerability is being exploited in the Wild

    Microsoft warned about a zero-day vulnerability in Microsoft Word that is being actively exploited in targeted attacks and discovered by the...
  • Snoopy Drone Can Hack Your Smartphones

    The use of unmanned aerial vehicles (UAVS) called Drones is rapidly transforming the way we go to war. Drones were once used for...
  • Android Privilege Escalation Flaws leave Billions of Devices vulnerable to Malware Infection

    Android - a widely used Smartphone platform offered by Google is once again suspected to affect its users with malicious software that puts...
  • Introduction to Netcat

    Introduction : So I was messing around on the internet and came across a tool called Netcat.  I've been messing with it for a couple of...
  • Google Nexus phone vulnerable to SMS-based DOS attack

    Google’s Nexus Smartphones are vulnerable to SMS-based DOS attack, where an attacker can force it to restart, freeze, or lose network...

Friday, 16 May 2025

Make international calls cheaper and right from your browser - Voixcall.com is here

 


Voixcall.com


VoixCall is a browser-based international calling service that launched on May 6, 2025, offering high-quality voice calls to any phone number worldwide without requiring downloads or subscriptions, and operating on a simple pay-as-you-go credit system(Product Hunt). Users simply sign up with an email address, add credits in their preferred currency, and dial directly from the web interface, benefiting from WebRTC-powered, end-to-end encrypted connections that work in any modern browser(voixcall.com, voixcall.com).

How It Works

VoixCall leverages industry-standard WebRTC technology to transmit voice data directly from your browser to the public telephone network, eliminating the need for downloads or plugins(voixcall.com, VoiceSpin). Once you’ve created an account, you add credits and enter any international number; VoixCall’s global SIP backbone then routes your call with HD-grade audio and minimal latency(voixcall.com). Because everything runs in-browser, there’s no software installation, no background services, and no risk of VoIP ports being blocked by carriers or firewalls(Medium).

Key Features

  • Global Reach: Call any country without restrictions—landlines, mobile phones, government or institutional numbers alike(voixcall.com).

  • Credit-Based Billing: Only pay for the minutes you use; credits never expire and there are no recurring charges or contracts(voixcall.com).

  • No Downloads or Installs: Works in Chrome, Firefox, Safari, Edge, and other modern browsers—no desktop or mobile app required(voixcall.com).

  • Flexible Currency Support: Choose from multiple currencies (USD, INR, EUR, etc.) and see real-time exchange rates when adding credits(voixcall.com).

  • Secure & Private: All calls are encrypted end-to-end, and VoixCall does not share call metadata with third parties beyond telecom providers and payment processors(voixcall.com).

Pricing Options

VoixCall’s pricing is fully transparent and varies by destination and duration:

  • Per-minute rate: From $0.02/minute (e.g., calls to major destinations start as low as $0.02/min) up to $0.10 total per call for short connections(voixcall.com).

  • Credit Packages: Purchase credits in increments of your choice—add exactly what you need, with no minimums and no hidden fees(voixcall.com).

  • Currency Selection: Pay in USD, INR, EUR, and other supported currencies, with live exchange-rate calculations shown at purchase time(voixcall.com).

Policies & Support

  • Refund Policy: Eligible requests are reviewed within five business days; approval depends on the nature of the issue and supporting documentation(voixcall.com).

  • Terms of Service: Users agree to a credit-based usage model and acknowledge that call quality may vary based on internet conditions and destination networks(voixcall.com).

  • Customer Assistance: For questions or technical support, VoixCall offers email support via the “Contact” page on their site(voixcall.com).

Launch & Availability

VoixCall officially went live on May 6, 2025, positioning itself as a seamless alternative to traditional VoIP apps by removing installation barriers and subscription commitments(Product Hunt). The service is accessible globally, provided only that you have a modern web browser and internet access.

Getting Started

  1. Sign Up: Visit the VoixCall signup page and register with your email address—no phone verification required(voixcall.com).

  2. Add Credits: Select your preferred currency and credit amount; payments accepted via credit/debit cards or PayPal(voixcall.com).

  3. Place a Call: Enter any international phone number into the dialer and click “Call”—enjoy HD voice quality instantly(voixcall.com).

Why Choose VoixCall?

  • Simplicity: No apps, downloads, or complicated setups—call from any device with a browser.

  • Cost-Efficiency: Transparent, usage-based pricing ensures you never pay for minutes you don’t use.

  • Universal Compatibility: Works across operating systems and networks without special configuration.

  • Security & Privacy: Encrypted calls and minimal metadata retention for your peace of mind.


Start making international calls today without the hassle of apps or subscriptions—Sign Up Free on VoixCall and pay only for the minutes you use.

Monday, 7 July 2014

Critical Vulnerability and Privacy LoopHole Found in RoboForm Password Manager

Critical Vulnerability and Privacy LoopHole Found in RoboForm Password Manager Unless you are a human supercomputer, remembering password is not so easy, and that too if you have a different password for each site. But luckily to make the whole process very easy, there is a growing market out there for password managers and lockers with extra layers of security.

But, if you are using the mobile version of most popular password manager from Password management company RoboForm to manage your passwords then you might be at a risk, claimed a UK based Security researcher.

I am personally using RoboForm from last few months, which is a great password manager application developed by Siber Systems Inc. for various platforms that stores your sensitive data all in one place, protected at RoboForm account and encrypted by a secret master password. RoboForm user be able to then quickly access those passwords and notes anytime, anywhere.

But a IT security consultant and tech enthusiast Paul Moore discovered one critical vulnerability in its app and one Privacy loophole in the RoboForm's service, that could allow attackers and prying eyes to get users’ personal data, including stored login credentials of various websites and payment card details.

Note: Yesterday we published this article with a conclusion that RoboForm is secure, but later after re-evaluating and discussing all factors, attack vectors with Moore, we found that RoboForm may leak your private data to attackers.

1) BYPASSING ROBOFORM DEVICE PIN PROTECTION
Critical Vulnerability and Privacy LoopHole Found in RoboForm Password Manager
The vulnerability disclosed by Paul Moore in the security of RoboForm affects its Android and iOS app users, which could allow anyone to bypass RoboForm’s PIN Protection in order to access users’ sensitive data.

RoboForm mobile apps offer a PIN protection which only protects the app interface from unauthorized access, just like Android’s popular ‘AppLock’ application.

Moore claimed that simply by deleting a specific line (pref_pincode) in the RoboForm’s preferences file placed in a folder on the device file system, It was possible for Moore to access confidential data and bypass authentication process on an Android device, even without the requirement of the Master Password, as shown in the Video demonstration uploaded by him.
The important point to be noted here is that the RoboForm’s app folder which Moore claims to access is actually placed in root directory of the device, which can’t be accessed by the user or any 3rd party app on a non-rooted device.

miniLock - Open Source File Encryption Tool from CryptoCat Developer

miniLock - Open Source File Encryption Program from CryptoCat Developer
It’s the age of surveillance what made the Use of Encryption so widely that it has become a need of law enforcement agencies, cyber criminals as well as every individual. But, encryption is not so easy.

To solve this problem, a 23-year old Cryptocat developer Nadim Kobeissi is ready to release a simple solution to deliver strong encryption at the HOPE hacker conference in New York later this month, which may soon come as an extension for Google Chrome web browser, Wired reported.

The encryption program is dubbed as miniLock, which is a free and open-source browser plugin designed to let anyone encrypt and decrypt files in seconds using a drag-and-drop interface with practically unbreakable cryptographic protection.
The tagline is that this is file encryption that does more with less,” says Kobeissi, activist and security consultant. “It’s super simple, approachable, and it’s almost impossible to be confused using it.

Sunday, 30 March 2014

A BEGINNERS GUIDE TO HACKING UNIX

 


*************  *       A BEGINNERS GUIDE TO:        *  *          H A C K I N G             *  *                                    *  *                U N I X             *  *                                    *  *       *  * **


   IN THE FOLLOWING FILE, ALL REFERENCES  MADE TO THE NAME UNIX, MAY ALSO BE  SUBSTITUTED TO THE XENIX OPERATING  SYSTEM.    BRIEF HISTORY:  BACK IN THE EARLY  SIXTIES, DURING THE DEVELOPMENT OF  THIRD GENERATION COMPUTERS AT MIT,  A GROUP OF PROGRAMMERS STUDYING THE  POTENTIAL OF COMPUTERS, DISCOVERED  THEIR ABILITY OF PERFORMING TWO OR  MORE TASKS SIMULTANEOUSLY.  BELL  LABS, TAKING NOTICE OF THIS DISCOVERY,  PROVIDED FUNDS FOR THEIR DEVELOPMENTAL  SCIENTISTS TO INVESTIGATE INTO THIS  NEW FRONTIER.  AFTER ABOUT 2 YEARS OF  DEVELOPMENTAL RESEARCH, THEY PRODUCED  AN OPERATING SYSTEM THEY CANLMD "UNIX".    SIXTIES TO CURRENT:  DURING THIS TIME  BELL SYSTEMS INSTALLED THE UNIX SYSTEM  TO PROVIDE THEIR COMPUTER OPERATORS  WITH THE ABILITY TO MULTITASK SO THAT  THEY COULD BECOME MORE PRODUCTIVE,  AND EFFICIENT.  ONE OF THE SYSTEMS THEY PUT ON THE UNIX SYSTEM WAS CALLED  "ELMOS". THROUGH ELMOS MANY TASKS (I.E. BILLING,AND INSTALLATION RECORDS) COULD  BE DONE BY MANY PEOPLE USING THE SAME  MAINFRAME.    NOTE: COSMOS IS ACCESSED THROUGH THE  ELMOS SYSTEM.    CURRENT:  TODAY, WITH THE DEVELOPMENT  OF MICRO COMPUTERS, SUCH MULTITASKING  CAN BE ACHIEVED BY A SCALED DOWN  VERSION OF UNIX (BUT JUST AS  POWERFUL).  MICROSOFT,SEEING THIS  DEVELOPMENT, OPTED TO DEVELOP THEIR OWN  UNIX LIKE SYSTEM FOR THE IBM LINE OF  PC/XT'S.  THEIR RESULT THEY CALLED  XENIX (PRONOUNCED ZEE-NICKS).  BOTH  UNIX AND XENIX CAN BE EASILY INSTALLED
ON IBM PC'S AND OFFER THE SAME FUNCTION
(JUST 2 DIFFERENT VENDORS).

NOTE: DUE TO THE MANY DIFFERENT
VERSIONS OF UNIX (BERKLEY UNIX,
BELL SYSTEM III, AND SYSTEM V
THE MOST POPULAR) MANY COMMANDS
FOLLOWING MAY/MAY NOT WORK. I HAVE
WRITTEN THEM IN SYSTEM V ROUTINES.
UNIX/XENIX OPERATING SYSTEMS WILL
BE CONSIDERED IDENTICAL SYSTEMS BELOW.

HOW TO TELL IF/IF NOT YOU ARE ON A
UNIX SYSTEM:  UNIX SYSTEMS ARE QUITE
COMMON SYSTEMS ACROSS THE COUNTRY.
THEIR SECURITY APPEARS AS SUCH:

LOGIN;     (OR LOGIN;)
PASSWORD:

WHEN HACKING ON A UNIX SYSTEM IT IS
BEST TO USE LOWERCASE BECAUSE THE UNIX
SYSTEM COMMANDS ARE ALL DONE IN LOWER-
CASE.
LOGIN; IS A 1-8 CHARACTER FIELD. IT IS
USUALLY THE NAME (I.E. JOE OR FRED)
OF THE USER, OR INITIALS (I.E. J.JONES
OR F.WILSON).  HINTS FOR LOGIN NAMES
CAN BE FOUND TRASHING THE LOCATION OF
THE DIAL-UP (USE YOUR CN/A TO FIND
WHERE THE COMPUTER IS).
PASSWORD: IS A 1-8 CHARACTER PASSWORD
ASSIGNED BY THE SYSOP OR CHOSEN BY THE
USER.
      COMMON DEFAULT LOGINS
   --------------------------
   LOGIN;         PASSWORD:
   ROOT           ROOT,SYSTEM,ETC..
   SYS               SYS,SYSTEM
   DAEMON     DAEMON
   UUCP           UUCP
   TTY              TTY
   TEST            TEST
   UNIX           UNIX
   BIN              BIN
   ADM            ADM
   WHO           WHO
   LEARN        LEARN
   UUHOST     UUHOST
   NUUCP        NUUCP

Tuesday, 25 March 2014

CASH! CASH! Hacking ATM Machines with Just a Text Message

Hacking ATM Machines for Cash with Just a Text Message
As we reported earlier, Microsoft will stop supporting the Windows XP operating system after 8th April, apparently 95% of the world’s 3 million ATM machines are run on it. Microsoft's decision to withdraw support for Windows XP poses critical security threat to the economic infrastructure worldwide.

MORE REASONS TO UPGRADE
Security researchers at Antivirus firm Symantec claimed that hackers can exploit a weakness in Windows XP based ATMs, that allow them to withdraw cash simply by sending an SMS to compromised ATMs.

"What was interesting about this variant of Ploutus was that it allowed cybercriminals to simply send an SMS to the compromised ATM, then walk up and collect the dispensed cash. It may seem incredible, but this technique is being used in a number of places across the world at this time." researchers said.

HARDWIRED Malware for ATMs
According to researchers - In 2013, they detected a malware named Backdoor.Ploutus, installed on ATMs in Mexico, which is designed to rob a certain type of standalone ATM with just the text messages.