Unboxing XiaoMi Ethernet Patch Cable 1000Mbps CAT6

You can now buy XiaoMi Ethernet Patch Cable 1000Mbps CAT6 from Gearbest.com for only 4.47 USD with free shipping world wide.

The Original XiaoMi Ethernet Patch Cable 1000Mbps CAT6 offers universal connectivity to computers and network components, such as XiaoMi TV, XiaoMi TV box, XiaoMi routers and other devices. This cable provides exceptional transmission performance and low signal losses. It supports up to 550MHz and is suitable for Fast Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet. Additionally, we offers different lengths (1.6ft, 4.9ft, 9.8ft) for you to choose. Customize and organize your home or office network with our cost-effective and highly rated CAT6 cables!
XiaoMi Ethernet Patch Cable 1000Mbps CAT6 Features
● High performance CAT6 RJ45 Ethernet patch cable provides universal connectivity for LAN network components.
● Super transfer rate can be up to 1000Mbps, no more waiting for data transmission.
● CAT6 performance at a CAT5e price but with higher bandwidth. Future-proof your network for 10-Gigabit Ethernet (backwards compatible with any existing Fast Ethernet and Gigabit Ethernet).
● The connectors with 24K gold-plated contacts which provide durability, and ensure a secure connection.
● The length of up to 0.5 meters (1.6 ft), meet your different distance needs.
● Flexible and durable CAT6 cable with high bandwidth of up to 550MHz guarantees high-speed data transfer for server applications, cloud computing, video surveillance, and online high definition video streamin
● Product code: E-B10-A2-312 / 136380301 / Mar 28th, 2016 (1) /
● Standard: TIA-EIA568-B
● SKU: URQ4003CN, SN: 10852/00034436
Package content
1 x Original XiaoMi Ethernet Patch Cable 1000Mbps CAT6
      XiaoMi Ethernet Patch Cable XiaoMi Ethernet Patch Cable XiaoMi Ethernet Patch Cable XiaoMi Ethernet Patch Cable XiaoMi Ethernet Patch Cable XiaoMi Ethernet Patch Cable XiaoMi Ethernet Patch Cable
Photo gallery full album here.

You can buy DT M2 Bluetooth Speaker from Gearbest for only $23.71 with free shipping world wide.

DT M2 Bluetooth Speaker features
– Unique artistic water transfer colorful speaker mesh gives you a special visual experience
– Special two-in-one function, one mobile phone can connect two speakers at the same time, which can effectively promote the stereo effect
– Bluetooth 2.1 technology for lower energy consumption but more stable connection and faster transmits speed, wireless operating distance is up to 10m
– Long Playtime, Fast Recharge: Built-in 2000mAh rechargeable Lithium polymer battery supplies 5hrs music time ( MAX. Volume ) and it can be fully recharged for 5hrs
– Broad Compatibility: Quick pairing through Bluetooth with any Bluetooth enables smart phones
– Built-in microphone let you can have a more clear and safer call with your families and friends
– Fashionable and high-end equipment, not only satisfies your own awesome music enjoyment need, but also can be used as a creative present for friends

Package Content:
1 x M2 Speaker
1 x Charging Cable

Xiaomi Mi Led Light Plus Enhanced edition

Xiaomi Mi Led Light Plus Enhanced edition

Xiaomi Mi Led Light. Video comparison between Creative Xiaomi Mi Led Light USB lamp enhanced edition and the first generation.

Xiaomi Mi Led Light
Creative Xiaomi Mi Led Light enhanced features
Philips Lumileds / OSRAM High quality Lamp beads, More effective protect eyesight
Adopting OSRAM high quality LED bulb, more natural light and vision protective
5-level brightness adjustment
Lightweight and portable
With switch control
50 percent brighter
Rated voltage: 5V
Rated power: 1.2W
Flexible body for different lighting angle
Portable and novel design makes it more attractive and convenient to use
Perfect gift for your friends
Compatible with PC USB
Creative Xiaomi Mi Led Light enhanced Description
It is a Small and easy to portable ultra bright Mini LED light. compact and light weigh.can be use on both desk and bedside table, or to go out. feeling so convenient. its soft shade, avoid the direct LED light shine, more effective protection of eyesight. its flexible body Suitable for all occasions,Compatible with Ximiao power,Can be connected to the PC USB port.
Creative Xiaomi Mi Led Light enhanced Features
1.Xiaomi portable USB LED light Plus
2.Can be use on any where,powered by any devices with USB port
3.Unique bendable design,also has light weight
4.Ultra bright with low power consumption
5.Rated voltage: 5V
6.Power: 2.5W(Max)
Xiaomi portable LED light USB lamp first generation features
The rated voltage is 5V and rated power is 1.2W
Portable and novel design makes it more attractive and convenient to use
Perfect gift for your friends
HERE you’ll find the unboxing Xiaomi Portable USB LED Light Enhanced Edition.

About Gearbest GearBest is more than just a shopping site, it’s designed for gadget lovers by gadget lovers. We have a passion for all kinds of tech from retro style to the absolute cutting edge. At GearBest, our company vision is simple: to become the premier online electronics seller by providing an unparalleled selection of the very best gadgets, an unbeatable shopping experience, prompt shipping and exceptional customer service that exceeds expectations. For us, the customer is always king. Our total commitment to customers empowers us to work closely together with every customer. When you buy from us, the sale is not complete when we ship your order, it is complete when you are totally satisfied.


Two Major International Hackers Who Developed the “SpyEye” Malware get over 24 Years Combined in Federal Prison


ATLANTA – Two international computer hackers; Aleksandr Andreevich Panin, a/k/a Gribodemon, of Russia, and Hamza Bendelladj, a/k/a Bx1, of Algeria, have been sentenced to a combined 24 years, six months in prison for their roles in developing and distributing the prolific malware known as SpyEye, which caused hundreds of millions of dollars in losses to the financial industry around the world.

“It is difficult to over state the significance of this case, not only in terms of bringing two prolific computer hackers to justice, but also in disrupting and preventing immeasurable financial losses to individuals and the financial industry around the world,” said U.S. Attorney John Horn.  “The outstanding work by our law enforcement partners, both domestically and internationally, as well as terrific cooperation from the private sector, serves as a blueprint on how to combat complex cyber-crime syndicates around the world.”
“Through these arrests and sentencing, the risk the public unknowingly faced from the threat posed by the imminent release of a new highly sophisticated version of SpyEye was effectively reduced to zero.  The FBI led investigation that brought one of the world’s most nefarious malware developers to justice and significantly disrupted the prolific SpyEye botnet demonstrates the power of focused investigations that combine the skills and talents of global law enforcement and private industry partners.  Furthermore, the arrests and sentences serve as a strong deterrent to future malware developers and their customers, regardless of where they are located,” said J. Britt Johnson, Special Agent in Charge, FBI Atlanta Field Office.
According to U.S. Attorney Horn, the charges and other information presented in court: Until dismantled by the FBI, SpyEye was the preeminent malware banking Trojan from 2010-2012, used by a global syndicate of cybercriminals to infect over 50 million computers, causing close to $1 billion in financial harm to individuals and financial institutions around the globe.
SpyEye was designed to automate the theft of confidential personal and financial information, such as online banking credentials, credit card information, usernames, passwords, PINs, and other personally identifying information. The malware facilitated its theft of personal and confidential information by secretly infecting victims’ computers, enabling cybercriminals to remotely control the infected computers through command and control (“C2”) servers.  Once a computer was infected and under their control, cybercriminals remotely accessed the infected computers, without authorization, and stole victims’ personal and financial information through a variety of techniques, including “web injects,” “keystroke loggers,” and “credit card grabbers.”  The victims’ stolen personal and financial data was then surreptitiously transmitted to the C2 servers, where it was used to, among other things, steal money from the victims’ financial accounts.
Panin was the primary developer and distributor of SpyEye.  Panin developed SpyEye as a successor to the notorious Zeus malware that had, since 2009, wreaked havoc on financial institutions around the world.  In November 2010, Panin allegedly received the source code and rights to sell Zeus from Evginy Bogachev, a/k/a Slavik, and incorporated many components of Zeus into SpyEye.  Bogachev remains at large and is currently the FBI’s most wanted cybercriminal.
Operating from Russia between 2009 and 2011, Panin conspired with others, including co-defendant Hamza Bendelladj, to develop, market, and sell various versions of SpyEye and component parts on the Internet.  Panin allowed cybercriminals to customize their purchases to include tailor-made methods of obtaining victims’ personal and financial information, as well as marketed versions that targeted information about specific financial institutions, including banks and credit card companies.
With the assistance of Bendelladj, a/k/a Bx1, Panin advertised and promoted the SpyEye malware on online, invite-only criminal forums, such as Darkode.com and other exclusive Russian-based criminal forums.  The arrest of Bendelladj in January 2013 was a contributing factor that ultimately led to the dismantling of Darkode.com through a coordinated law enforcement effort involving 20 countries in July 2015.
For his part, Bendelladj transmitted over one million spam emails containing strains of SpyEye and related malware to computers in the United States, yielding hundreds of thousands of infected computers.  He also developed and sold malicious “plugins” or add-ons for botnets, such as a “spreader”, Automated Transfer System (“ATS”), and “web injects”.  These malicious tools were designed to surreptitiously automate the theft of funds from victim bank accounts and to proliferate the spread of malware, including SpyEye and Zeus. Bendelladj used his unauthorized access into infected computers to steal personal identifying information from close to half a million people, hundreds of thousands of credit card and bank account numbers, causing millions of dollars in losses to individuals and financial institutions around the world. Bendelladj also ran a website called VCC.sc where he automated the sale of stolen credit card information to cybercriminals around the world.
On December 20, 2011, a Northern District of Georgia grand jury returned a 23-count indictment against Panin, who had yet to be fully identified, and Bendelladj.  The indictment charged one count of conspiracy to commit wire and bank fraud, 10 counts of wire fraud, one count of conspiracy to commit computer fraud, and 11 counts of computer fraud. A superseding indictment was subsequently returned identifying Panin by his true name.
Panin was arrested by U.S. authorities on July 1, 2013, when he flew through Hartsfield-Jackson Atlanta International Airport.  On January 28, 2014, Panin pleaded guilty to conspiring to commit wire fraud and bank fraud. Bendelladj was apprehended at Suvarnabhumi Airport in Bangkok, Thailand, on January 5, 2013, while he was in transit from Malaysia to Algeria.  Bendelladj was extradited from Thailand to the United States on May 2, 2013.  On June 26, 2015, Bendelladj pleaded guilty to all 23 counts of the superseding indictment.
The apprehension of Panin and Bendelladj has resulted in several of the world’s top malware developers no longer being in a position to create malware that can victimize people in the U.S. and abroad. The FBI discovered that within months of his arrest, Panin was planning to release a new strain of SpyEye, called “SpyEye 2.0”, which, if released, would have been one of the most prolific and undetectable botnets distributed to date, and cause immeasurable losses to the international banking industry and individuals around the world.  The investigation has also led to the arrests by foreign authorities of four of Panin’s SpyEye clients and associates in the United Kingdom and Bulgaria.
  • Aleksandr Andreevich Panin, a/k/a Gribodemon, 27, of Tver, Russia, was sentenced by United States District Court Judge Amy Totenberg, to nine years, six months in prison to be followed by three years of supervised release.
  • Hamza Bendelladj, a/k/a Bx1, 27, of Tizi Ouzou, Algeria, was also sentenced by Judge Totenberg, to 15 years in prison to be followed by three years of supervised release.
This case was investigated by Special Agents of the Federal Bureau of Investigation. The FBI disrupted and dismantled the organizational structure behind SpyEye by utilizing unprecedented levels of cooperation with private industry and 26 international law enforcement agencies, demonstrating international boundaries no longer offer safe havens for cyber criminals.
Assistant United States Attorneys Steven D. Grimberg, Kamal Ghali, and Scott Ferber prosecuted the case. Trial Attorneys from the Criminal Division’s Computer Crime and Intellectual Property Section provided valuable assistance.  The Justice Department’s Office of International Affairs also provided assistance with this case.
Assistance throughout the investigation was also provided by a number of international law enforcement agencies, including the United Kingdom’s National Crime Agency, the Royal Thai Police, the National Police of the Netherlands - National High Tech Crime Unit (NHTCU), Dominican Republic’s Departamento Nacional de Investigaciones (DNI), the Cybercrime Department at the State Agency for National Security-Bulgaria, and the Australian Federal Police (AFP).
Private sector partners also provided valuable assistance, including Trend Micro’s Forward-looking Threat Research (FTR) Team, Microsoft’s Digital Crimes Unit, Flashpoint, PhishLabs, Dell SecureWorks, Damballa, and the Norwegian Security Research Team known as “Underworld.no”.


Topic By:  Cyber Crime