Pages

Saturday, 23 June 2012

20-year-old Anonymous Hacker arrested by Bulgarian Police

Anonymous+Hacker+arrested+by+Bulgarian+Police
 Bulgarian police authorities have arrested an alleged member of the loosely associated Anonymous hacktivist group. The 20-year-old suspect has allegedly attacked the website of Prophon, a Bulgarian music licensing company.

The reason - Mitko was against paying for music and movies, like to draw at will from the network. The attack he made on February 5, 2012 as able to penetrate into account the site administrator. Following the intervention of Mitko, entering the address www.prophon.org is appeared a message that "Anonymous" seize the site.

"PROPHON Hello, We are Anonymous. We learned that you are greedy and another 12 organizations have signed an open letter in support of the so-called. Agreement ACTA. This is unacceptable and this angered us. You are first, not last. This should be a lesson to all who support ACTA. We are Anonymous. We are legion. We do not forgive. We will not forget. Expect us, "the message of hackers.
 
Police have seized four PCs, eleven servers, three laptops, a large amount of hard discs, flach memory cards, CDs and DVDs, according to the Bulgarian Interior Ministry.The suspected hacker is said to have admitted his guilt.

Mitko has completed secondary education right in the field of high technologies in the future dreams is your hosting company and continue their education. Ministry of Interior does hope Mitko to harness their skills for good and constructive things. For this offense the law provides for up to 1 year in prison, but because the young man has a criminal record and admitted his guilt, probably Themis will judge "probation" for his offense.

Department of Homeland Security and U.S Navy Hacked

Homeland+Security+and+U.S+Navy+hacked


Department of Homeland Security and U.S Navy websites once again at Major Risk. This time hacking group called "Digital-corruption" hacked into subdomains of both sites and leak database info on pastebin.

In its announcement on the pastebin.com website, the group said it has leaked database from https://www.smartwebmove.navsup.navy.mil/ and twicinformation.tsa.dhs.gov using Blind SQL-Injection method.
The Database include Usernames, Passwords, Email ID's, Security Questions - Answers of all users.
Hackers shout:
say("#FreeTriCk #FreeMLT #FreePhantom");
say("Knowledge is power!");
say("NAVY.MIL, care to share some of your staff information?");

Department of Homeland Security and U.S Navy websites are hacked lots of times in past one year by Different hackers from all over world.

Russian Botnet Hacker Arrested For Hacking into Six Million Computers

Botnet-malware



























Police have detained a 22-year-old hacker who created a system of networked computers that was used to steal more than 150 million rubles ($4.47 million) from people's bank accounts and already one of the most wanted hacker in the world. But now, "Hermes" is, has been tapped over six million computers and earns around 5 million francs, was caught in Russia. 
The network infected around six million computers with a Trojan virus, which helped get access to users' bank accounts. About the Trojans secretly installed, he had arranged illegal money transfers, said the interior ministry in Moscow on Friday.

Police from Division K, the cybercrime branch of the Interior Ministry, searched the hacker's place of residence, confiscating computers and arresting the suspect. The statement did not specify when the arrest was made.The botnet built by the hacker included around 6 million computers from regions that included Krasnodar, Samara, and Ivanovo, as well as from the cities of Moscow and St. Petersburg, where the majority of the infected computers were located.

The hacker faces a lengthy jail term if convicted on fraud charges.




Wednesday, 13 June 2012

Ubuntu 12.04 vs. Windows 8: Five points of Comparison

1. Desktop interface
Ubuntu replaced the popular GNOME 2.x interface with Unity when their developers decided the GNOME 3.x shell wasn’t for them. Some people, like the developers behind Linux Mint, decided to recreate the GNOME 2.x desktop with Cinnamon, but Ubuntu took its own path with Unity.
In Unity’s desktop geography, your most used applications are kept in the left Unity Launcher bar on the left. If you need a particular application or file, you use Unity’s built-in Dash application. Dash is a dual purpose desktop search engine and file and program manager that lives on the top of the Unity menu Launcher.
Its drawback, for Ubuntu power-users, is that it makes it harder to adjust Ubuntu’s settings manually. On the other hand, most users, especially ones who are new to Ubuntu, find it very easy to use. Canonical, the company behind Ubuntu, has made it clear that regardless of whether you use Ubuntu on a desktop, tablet or smartphone the Unity interface is going to be there and it’s going to look the same.
A first look at Ubuntu 12.04 (Gallery)
Windows 8 Metro is, if anything, even more of a departure from its predecessor than Unity. At least with Unity, you’re still working with a windows, icons, menus, and pointers (WIMP). Metro has replaced icons with tiles. In addition, by default, you can only work with applications in tiles or in full-screen format. Even such familiar friends as the Start button are missing.
I’ve been working with Metro for months now. After all that time, I still think Windows 8 with Metro will be dead on arrival. Even people who really like Metro say things like “the default presentation is ugly and impersonal.” You can make Metro a lot more usable, but that’s a lot of work to make an interface that’s already ugly prettier and, when you’re done, you’re still left with an interface that doesn’t look or work the way you’ve been using Windows for years.
True, there’s also the Windows 8 Desktop, which still doesn’t have a Start button, but otherwise looks and works like the Windows 7 Aero interface, but it’s a sop to users who don’t want Metro. Sooner rather than later, Microsoft wants everyone on Metro. Of course on some platforms, such as Windows RT, the version of Windows 8 for ARM tablets, Metro is the only choice.
2. Applications
For ages one of the bogus raps against desktop Linux has been that there hasn’t been enough applications for it. That was never true. What Linux didn’t have was the same applications as Windows. To an extent, that’s still true. You can’t still get say Quicken, Outlook, or Photoshop natively on Linux. Of course, with the use of WINE and its commercial big brother Codeweaver’s Crossover, you can run these, and other Windows programs, on top of Linux.
On the other hand, I find some Linux programs, such as Evolution for e-mail, an optional program in Ubuntu, to be far better than their Windows equivalents. In addition, if like more and more people these days the program you really use all the time is a Web browser for everything then Windows has no advantage what-so-ever. Chrome, as my testing has shown time and again, is the best Web browser around runs equally well on Ubuntu and Windows. On both, however, you’ll need to download it. Ubuntu defaults to using Firefox and Windows 8, of course, uses Internet Explorer.
What I find really interesting though is that Microsoft is actually removing functionality from Windows 8. If you want to play DVDs on Windows 8 or use it as a media center, you’ll need to play extra. DVD-players and the power to stream media remain free options in Ubuntu and most other Linux distributions.
3. Security
There has been a lot of talk lately about malware on Macs and it’s true. Macs are vulnerable to security breeches. So, for that matter, are Linux systems. But never, ever forget that for every single Mac virus or worm, there have been thousands of Windows attackers. And, that while Linux can be attacked as well, in practice, it’ more secure than either Mac OS X or Windows and there has never been a significant Linux desktop security worm.
Could it happen? Sure. But, get real, I do run Linux with virus protection, ClamAV, but I’m paranoid, and even so I’ve never seen a single attacker, much less suffered a successful attack, in almost twenty years of using Linux desktops. I wish I could say the same of my Windows systems.
4. Total Cost of Ownership (TCO)
Thanks for Active Directory (AD), it’s long been easy to manage Windows desktops, but then thanks to Lightweight Directory Access Protocol (LDAP) and tools like Landscape, it’s no problem in Ubuntu Linux either. Indeed, since you won’t be able to use AD to manage Windows RT systems, Ubuntu Linux actually provides a more unified management system.
Also, remember what I said about security? You can’t forget anti-virus software or patching Windows for a minute. Linux? Yes, you should use anti-virus programs and patch regularly, but relax, you’re not asking for zero-day doom all the time the way you are with Windows.
Besides, the upfront cost of Linux? Zero. Windows 8? We don’t know yet, but we do know thatWindows 8 PCs will be more expensive than their Windows 7 brothers.
If you’re really serious about cutting your desktop costs, Linux is the way to go.
5. Ease of use
One of the perpetual myths about Linux is how hard it is to use. Oh really? Don’t tell my 80-year old Ubuntu-using mother-in-law or Jason Perlow’s Linux user mom-in-law. They’re both using Ubuntu 12.04 and loving it. Why? Because it’s so easy to use.
Metro, on the other hand… well you know I don’t like it, but I think it’s telling that a Bing search-not Google, Bing-showed 3.32-million results for “Windows 8 Metro sucks.” Many users, including our own Scott Raymond, would like it if Microsoft gave users the option to turn Metro off. That’s not going to happen.
Another plus for Ubuntu is, say you really can’t stand Unity. No problem, you can switch to GNOME 3.x, Cinnamon, KDE, whatever. With Ubuntu while they want you to use Unity, you can choose to use another Linux desktop interface. With Windows 8, you’re stuck with half-Metro and half-desktop.
Put it all together and what do you get? Well, I don’t see Ubuntu overcoming Windows on the desktop. There are just too many Windows users out there. The Linux desktop will never catch up with it.
My question though wasn’t who was going to end up the most popular desktop. It was “which will end up the better for its change?” To that question, there’s only one answer: Ubuntu is the winner. I foresee Windows XP and 7 using sticking to their operating systems and giving Windows 8 the same cold shoulder they gave Vista and Millennium Edition.
That will end up being a real problem for Windows. Back in the day, their iron-grip on the desktop meant they could have flops and still not lose much. Today, though, we’re moving away from the desktop to a world where we do much of our work on the cloud and for that we can use tablets and smartphones as well. And, on tablets and smartphones, Microsoft has yet to show that Windows can play a role. Thanks to Android, we already know Linux is a major player on those, and Ubuntu is already making a desktop/Android smartphone partnership play.

Main Differences Between Windows 7 & Windows 8


1)Boot time: Wn7 48 sec. Win8 10 sec.

2)Desktop: Microsoft has replaced the
normal shortcut icons
with dynamic tiles.
You can change their size and place
similar
applications around each other- or
anything else
that my suit you.

3)Mounting iso images: Windows 7
could only burn an ISO image
to a DVD but Windows 8 actually
betters
this by offering you the option to
mount the
image too. In Windows 7, you didn’t
have the
option to make virtual drives to use the
ISO
image’s content but Windows 8 allows
you to
create a virtual drive to mount the ISO
image so
that you can easily use it just like a
normal DVD.

4)Built-in Antivirus(bad news for
hackers): Windows 8 has an
antivirus present inside the kernel of
the operating system. This means that
your system won’t boot if a corrupt
USB
device is plugged in. It sounds
impressive
though I don’t know whether it would
pass the
test of time…. and viruses! All in all, I
do expect
Windows 8 to be a serious upgrade on
Windows 7 and with Microsoft working
on the things that require some
tweaking; I genuinely believe that
Microsoft is finally ready to launch an
OS which will take the world by storm

5)Multiple monitors support in
Windows :
Microsoft announced that customers
can use more
than one monitor to connect with
Windows 8
operating system. Windows 8 PC
management allows
customers to use multiple monitors at
same time. It means
Windows 8 offers flexibility by allowing
start screen at one
monitor and desktop in another.
Customer can also choose taskbar on
both screens with different icons on
each monitor.
Moreover, you can play with
background images as well by
changing it separate on each monitor.
Such support is not
available with Windows 7 operating
system.

6)Windows based apps store:
Windows 8 operating system
introduces new app
store in which different apps is
implemented for
various devices and settings on right of
the screen.
The settings section includes
contextual apps like
volume, brightness, restart and power
options. You can
share content, links, app reviews,
contacts, metro apps,
facebook and twitter applications with
your friends or colleagues. Windows 8
store offers both desktop apps and
ecosystem for developers. On the
other hand, Windows 7 OS is missing
all these features.

7)Inbuilt Windows Touch features:
The main difference between Windows
7 and
Windows 8 comes with its metro style
interface
that provides live title of rectangle
shape which has
replaced the icon pattern in Windows
 
8)In Windows 7
operating system, software shortcuts
are in the form of
icons. As far as the touch interface is
concerned then
Windows 7 supports touch interface
but not that much, what was expected.
So, Windows 8 comes with true touch
interface for Metro style apps. It is fast
way of accessing data by using an
improved on-screen keyboard and
handwriting recognition


Windows 8 Announces Native 3D Support

Windows is enabling support for new content types for consumption and increased flexibility for content creation and communication. Stereo 3D, accessibility, and DSP effects are just three ways Windows 8 will be awesome.

From MSDN: Over the last few years, the Stereo 3D (S3D) market has evolved from hype to finished consumer products. S3D provides a 3D viewing experience by displaying two overlapping copies of a video (captured from different angles), which appear as a single 3D video when viewed with 3D glasses. Our goal is to enable a viable S3D ecosystem for Windows by enabling key gaming and video playback scenarios on a platform that abstracts away the specifics of the 3D technology from the end-user’s PC.

The Windows 8 media platform provides support for standards-compliant media formats for S3D video. H.264 video with frame-packing metadata represented as Supplemental Enhancement Information (SEI) is the typical format being adopted for online delivery, and is therefore the desirable S3D video format in Windows 8. The frame-packing formats that we support natively in the platform include both side-by-side and top-and-bottom arrangements, as in the illustration below.



In Windows 8, S3D support is available on DirectX 10 or higher GPUs with compatible drivers. A S3D-compatible display is needed to see S3D content. We wanted to make sure that Windows would support a wide range of display technologies with a consistent user experience, and make it easy for software and hardware to develop on our platform. As a result, specific S3D display technologies are largely made irrelevant by the graphics drivers, and a consistent set of APIs are available to apps using stereo 3D.

Tuesday, 12 June 2012

10000 Twitter User oauth token hacked and Exposed by Anonymous


data

Anonymous Hackers, with Twitter account "LulzsecReborn" Hack into TweetGif (http://tweetgif.com) and Hack complete Database, Later they publish that on Internet also. TweetGif is a website which allow you to use animated GIF image as your twitter picture.

LulzSec Reborn, a 3.0 version of the earlier LulzSec, has leaked 10,000 Twitter profiles’ passwords,  Usernames, real names, locations, bios, avatars and secret tokens used to authenticate their accounts.

Pastebin message posted: The leaked data was uploaded to embed upload and contains a 4 MB SQL file with all the users details.
Users table from http://tweetgif.com/ nothing serious like 10.000 twitters…
http://www.embedupload.com/?d=9ZMOMGIIQA

How Hackers and Spammer can use this?
OAuth is an authentication protocol that allows users to approve application to act on their behalf without sharing their password. If your Twitter oauth Secret Key and Token get compromised , then application or Hacker can user your Twitter account on Behalf of Your access. You can get sample script here. These accounts can be used to spam over 10000 of compromised twitter accounts.

Also if hackers are able to compromise the keys of popular applications like TweetGif and use those keys to evade Twitter's abuse controls. By using the consumer key and consumer secret key from a popular third-party Twitter application, a spammer can make it harder for Twitter to lock out all of his spam accounts at once without also locking out a large number of legitimate users of the compromised application.

How you can Protect your Twitter Account: If you are also TweetGif  User, you need to go to settings > apps > deauthorize app. #TweetGif. "Revoke Access".

Friday, 8 June 2012

Flame Malware Spread Via Rogue Microsoft Security Certificates

Flame+Malware+Spread+Via+Rogue+Microsoft+Security+Certificates

Microsoft released an emergency Windows update on Sunday after revealing that one of its trusted digital signatures was being abused to certify the validity of the Flame malware that has infected computers in Iran and other Middle Eastern Countries.

The patch revoked three intermediate Microsoft certificates used in active attacks to “spoof content, perform phishing attacks, or perform man-in-the-middle attacks”.Microsoft also killed off certificates that were usable for code signing via Microsoft’s Terminal Services licensing certification authority (CA) that ultimately “chained up” to the Microsoft Root Authority.The authority issued certificates for users to authorise Remote Desktop services in their enterprises.

The Microsoft blog post explains that a vulnerability in an old cryptography algorithm is exploited by some elements of Flame to make them appear as if they originated from Microsoft. Most systems around the world accept officially-signed Microsoft code as safe by default, so the malware would enter unnoticed.

Windows users are urged to install the new KB2718704 Patch. If you enabled Automatic Updates, the patch should automatically install. If not, you can open Windows Update on your PC and manually install it.

Since the virus is highly targeted and can be caught by most antivirus programs, the "vast majority of customers are not at risk," according to Microsoft.

LinkedIn Confirms Millions of Account Passwords Hacked

LinkedIn+Confirms+Millions+of+Account+Passwords+Hacked

LinkedIn Wednesday confirmed that at least some passwords compromised in a major security breach correspond to LinkedIn accounts.

Norweigan IT website Dagens IT first reported the breach, noting that “Two days ago a package on the 6.5 million encrypted passwords posted on a Russian hacker site.

Vicente Silveira, Director at LinkedIn, confirmed the hack on the company's blog Wednesday afternoon and outlined steps that LinkedIn is taking to deal with the situation. He wrote that those with compromised passwords will notice that their LinkedIn account password is no longer valid.

“It is worth noting that the affected members who update their passwords and members whose passwords have not been compromised benefit from the enhanced security we just recently put in place, which includes hashing and salting of our current password databases,” Linkedn director Vicente Silveira said in the blog post.

The file only contains passwords hashed using the SHA-1 algorithm and does not include user names or any other data, security researchers say. However, the breach is so serious that security professionals advise people to change their LinkedIn passwords immediately. An SHA-1 hash is an algorithm that converts your password into a unique set of numbers and letters. If your password is “LinkedIn1234,” for example, the SHA-1 hex output should always be “abf26a4849e5d97882fcdce5757ae6028281192a.” As you can see that is problematic since if you know the password is hashed with SHA-1, you can quickly uncover some of the more basic passwords that people commonly use.

Here’s what Imperva found: The most common password used was “123456,” followed by “12345″ and “123456789.” All in all, more than half a million people chose passwords composed of only consecutive numbers. So, if a hacker tried to log in to all RockYou accounts with just one password attempt–123456–every hundred or so attempts would yield a compromised account. Dozens of attempts can be scripted every second, so Imperva estimates that using this technique would only take around 15 minutes to hack 1,000 accounts.

Anonymous India Takes Down MTNL Website

Anonymous+takes+down+MTNL+website

The hacker-group Anonymous has struck again in India. This time the victim is the MTNL website. The group posted on their website, saying, We are against Internet Cencorship. Instead of blocking few URLs the ISP blocked the whole domain of various file sharing websites. The HC Madras, DoT didn’t isssue any list of websites to be blocked still ISP supported internet censorship.

MTNL's corporate website could not be accessed, following the attack since afternoon and officials said efforts were underway to restore it. MTNL Delhi, Deputy - GM (Internet), Deepak Sharma said it was not hacking but 'denial of service attack' under which the server is unable to provide services to the customers.

Anonymous has called for non-violent protests across several cities in India on June 9 to protest against what it alleges as ‘censorship’ of the internet. It accused the department of telecom of instructing the Internet Service Providers (ISPs) to block file-sharing websites unilaterally, while the courts had ordered blocking of certain websites.
Anon_India

 
 
 
 
 
 
 
 
 
 
 
As part of the protests, Anonymous has also asked all citizens to wear Anonymous’ (Fawkes) mask, dress completely in black and step out on the streets to protests.

This is the latest in a series of such attacks in the over the past month by the group, which has targeted the websites of the Internet Service Providers Association of India, the Trinamool Congress and Reliance Communications.

The government has so far refrained from making any comments on the concerted campaign by Anonymous over the last 15 days.

Wednesday, 6 June 2012

Angry Birds Space.v1.2.0

Angry Birds Space goes into space! Once a giant claw harvest their eggs, Angry Birds chase it into a wormhole and move to a strange new galaxy - space surrounded by pigs! Luckily Angry birds has its own super power ... Angry Birds Space includes 60 levels for interstellar planets and in microgravity, leading to an exciting gameplay with puzzles, brand new bird, a brand new super powers and a whole galaxy to explore. The sky is no longer the limit !

Features: 
60 levels of interstellar! 
Regular free updates! 
Brand new bird! 
Brand new superpower! 
Tricky shots, using the gravity of the planets! 
New purchases in the application! 
Hidden bonus levels! 
Beautifully detailed backgrounds! 

System requirements: 
Operating System: Windows ® XP / Vista / Windows ® 7 
Processor: 2GHz 
Memory: 512 MB 
Video Card: 3D-graphics adapter compatible with DirectX, 128 MB 
Sound Card: Sound device compatible with DirectX ® 9.0


Monday, 4 June 2012

Apple Releases Guide To iOS Security



Apple has introduced a guide to iOS security, which was posted to Apple.com sometime in late May, but is just now being noticed outside the Apple developer community. The publication is notable because it’s the first time Apple has published a comprehensive guide intended for an I.T. audience. (Apple’s developer-friendly documentation on security matters is easy to spot, however).
The new guide includes four sections dedicated to topics like system architecture, encryption and data protection, network security, and device access.
In reading the introduction, it’s clear that the guide’s intention is to better help corporate I.T. understand the security environment with iOS devices, including iPhones, iPod Touches, and iPads. It’s important that these details are documented in language I.T. understands as more and more businesses allow personal devices on their network and implement their own BYOD (bring your own device) programs.
To this point, the report begins:
“Apple designed the iOS platform with security at its core. Keeping information secure on mobile devices is critical for any user, whether they’re accessing corporate or customer information or storing personal photos, banking information, and addresses….
For organizations considering the security of iOS devices, it is helpful to understand how the built-in security features work together to provide a secure mobile computing platform.”
While some may imagine the guide to be an example of Apple’s increasing openness (on matters not related to new products, that is…), much of the information contained in the guide is not new at this point in time. It has simply been repackaged for a different audience.
However, detailed in the guide are things like how the code-signing process works and ASLR (address space layout randomization) works in iOS, which had previously been outed by security researchers prior to Apple’s reveal.
Another I.T.-friendly tidbit includes a list of items which administrators can restrict using configuration profiles within their Mobile Device Management solution. For example, Siri (as IBM recently did), plus FaceTime, the camera, screen capture, app installs, in-app purchases, Game Center, YouTube, pop-ups, cookies and more. Users may have more freedom of choice in terms of devices they use for work than in years past, but corporate I.T. is now adapting so it can deliver the same level of protection it once did it the BES/BlackBerry era…or, as an end user might tell you – the same level of lockdown. (What, no YouTube at work? No fair.)
The full guide is available here. (PDF)

Disqus

Please Comment Here