Wednesday, 17 October 2012
Monday, 15 October 2012
Former LulzSec hacker pleads guilty to Sony case
After last year's big PlayStation Network hack a lot of hacking groups such as Anonymous and LulzSec were intensely publicized. Back in June, a massive hack was conducted on the Sony Pictures Website. The attack led to the theft of details on over 1 million accounts and was linked to the hacker group Lulzsec.
At the time, the hacker group claimed to have used a “very simple SQL injection” attack. Samples of the compromised data were later posted online. Purported LulzSec member Raynaldo Rivera, 20, was charged in August with impairing a protected computer and conspiracy charges. In admitting his guilt, he joins Cody Kretsinger, who also pleaded guilty for the Sony Pictures hijack. Kretsinger is scheduled to be sentenced on 25th October.
"Rivera used the HideMyAss anonymising proxy service in an attempt to disguise his IP address while he carried out reconnaissance work, probing Sony Pictures' website for security vulnerabilities. HideMyAss turned over his IP address after the authorities issued a court order, ultimately exposing Rivera's identity." John Leyden explained in Theregister.
Investigations were made in both the U.S. and Europe. Although not all culprits were caught, two ex-members of hacker group LulzSec admitted they are guilty in this case. Cody Kretsinger got a plea bargain with prosecutors in April this year.
The information that the hacker stole resulted in over $605,000 in financial losses. Part of the plea agreement will see Riviera paying restitution to the victims of the crime and facing prison time. The hacker is facing a maximum of five years in prison, and the fine will be at least $250,000.
Tuesday, 9 October 2012
Anonymous Hackers attack Masonic Child Identification Program website
A group of computer hackers Anonymous goes by the name xPsych0path has accuse Masonichip for unwillingness to accept the forced chipping of children they are working toward mitigating it by disrupting the chipping operation. They have built their own operation, in opposition to this issue. In #OpMasonChip is designed to express publicly their anger. He had the following to say about this operation;
“We are fighting against putting RFID chips inside children by masons they have plan to put chips in all of us and those who don't want it won't be able to buy and sell. So I down all those site's for them” on .
"But In actual there is no "chip" in Masonichip as it stands for Masonic Child Identification Program and includes Abduction Awareness and "Safe Kids" Education benefits to all children and parents attend events and participate." Masonichip explained on their site.
Update : The Hacker News works tirelessly to bring credible and informative information to the public in regards to cyber security and issues surrounding it. We obviously did not understand the true nature of the “chip” and stand corrected on that issue. However, as strong supporters of the human right to privacy we collectively do not support any “gathering” of DNA or blood samples, etc for identification in future use. At least not on a mandatory basis. We apologize for any misinformation
A group of computer hackers Anonymous goes by the name xPsych0path has
accuse Masonichip for unwillingness to accept the forced chipping of
children they are working toward mitigating it by disrupting the
chipping operation. They have built their own operation, in opposition
to this issue. In #OpMasonChip is designed to express publicly their anger. He had the following to say about this operation;
“We are fighting against putting RFID chips inside children by
masons they have plan to put chips in all of us and those who don't want
it won't be able to buy and sell. So I down all those site's for them” on pastebin.
"But In actual there is no "chip" in Masonichip as it stands for
Masonic Child Identification Program and includes Abduction Awareness
and "Safe Kids" Education benefits to all children and parents attend
events and participate." Masonichip explained on their site.
1. http://masonichip.org/
2. http://mychip.org/
3. http://www.masonichip.ca/
4. http://www.mainemason.org/
5. http://www.illinoisfreemason.org/ilchip.html
6. http://www.keywestmason.com/child_id.htm
7. http://www.mdchip.org/
3. http://www.masonichip.ca/
4. http://www.mainemason.org/
5. http://www.illinoisfreemason.org/ilchip.html
6. http://www.keywestmason.com/child_id.htm
7. http://www.mdchip.org/
8. http://www.kschip.org/
Update : The
Hacker News works tirelessly to bring credible and informative
information to the public in regards to cyber security and issues
surrounding it. We obviously did not understand the true nature of the
“chip” and stand corrected on that issue. However, as strong supporters
of the human right to privacy we collectively do not support any
“gathering” of DNA or blood samples, etc for identification in future
use. At least not on a mandatory basis. We apologize for any
misinformation.
- See more at: http://thehackernews.com/2012/10/anonymous-hackers-attack-masonic-child.html#sthash.8QhV5hx2.dpufThursday, 4 October 2012
Faux Apps Found Hijacking Chrome, Spamming Tumblr
A flurry of fake, ad-laden Angry Birds lookalike games have flooded the
Google Chrome Web store of late. The online marketplace where Google
sells extensions and games for its Chrome browser has seen an influx of
games mimicking “Bad Piggies,” a new game Rovio Entertainment recently
released that puts a twist on its ubiquitous Angry Birds game.
At least seven of these games — “Angry Birds Bad Piggies,” “Angry Birds Space HD,” etc. — require the user to relinquish access to all data on all websites, according to research headed up by Barracuda Networks. In an entry on the security firm’s Internet Security Blog, research scientist Jason Ding notes that all of these games are being distributed by the same site: playook.info. After installation, the games insert their own advertisements into popular websites.
Barracuda found that after deploying the games in a test environment, they inserted advertising from playook.com into sites like Myspace, eBay, IMDB, Yahoo and MSN among dozens of other sites on the Chrome browser.
Collectively, as of Thursday afternoon, the apps have been downloaded by nearly 89,000 Chrome users.
Clearly, attackers are continuing to entice users into granting complete access to plug-ins, games and extensions without reading the applications' permissions first.
Security firm GFI Labs spotted a rogue Tumblr app disguised as a “profile stalker” this week that's been conning users in a similar fashion. According to a post on the company’s blog, users are installing the app under the assumption it will allow them to see who is viewing their blog the most. In actuality, installing the app grants the app “read and write access” to the user’s Tumblr account.
If installed, the app will go on to spam the user’s Tumblr until they either reset their “secret posting email address” or revoke the “profile stalker” app in Tumblr’s “Account Settings” panel.
Permissions — what applications can or can’t do, what information they have or don’t have access to — have long been a thorn in the side of mobile phone users. It appears that going forward users will have to remain as vigilant on their personal computers as on their smartphones until a better system for vetting applications on sites such asTumblr and Google Chrome, is introduced.
At least seven of these games — “Angry Birds Bad Piggies,” “Angry Birds Space HD,” etc. — require the user to relinquish access to all data on all websites, according to research headed up by Barracuda Networks. In an entry on the security firm’s Internet Security Blog, research scientist Jason Ding notes that all of these games are being distributed by the same site: playook.info. After installation, the games insert their own advertisements into popular websites.
Barracuda found that after deploying the games in a test environment, they inserted advertising from playook.com into sites like Myspace, eBay, IMDB, Yahoo and MSN among dozens of other sites on the Chrome browser.
Collectively, as of Thursday afternoon, the apps have been downloaded by nearly 89,000 Chrome users.
Clearly, attackers are continuing to entice users into granting complete access to plug-ins, games and extensions without reading the applications' permissions first.
Security firm GFI Labs spotted a rogue Tumblr app disguised as a “profile stalker” this week that's been conning users in a similar fashion. According to a post on the company’s blog, users are installing the app under the assumption it will allow them to see who is viewing their blog the most. In actuality, installing the app grants the app “read and write access” to the user’s Tumblr account.
If installed, the app will go on to spam the user’s Tumblr until they either reset their “secret posting email address” or revoke the “profile stalker” app in Tumblr’s “Account Settings” panel.
Permissions — what applications can or can’t do, what information they have or don’t have access to — have long been a thorn in the side of mobile phone users. It appears that going forward users will have to remain as vigilant on their personal computers as on their smartphones until a better system for vetting applications on sites such asTumblr and Google Chrome, is introduced.
Diskeeper Professional 2012 v16.0.1017
Diskeeper 12 Professional provides essential performance and efficiency
increases that all business desktops and laptops need to function
productively. Diskeeper prevents the majority of fragmentation
(scattered file fragments randomly placed across the hard drive) before
it can happen and instantly defrags the rest. Diskeeper 12 Professional
has a new, more intuitive user interface, runs unobtrusively in the
background, elevates PC performance, and requires no scheduling and
absolutely no user intervention. It lowers the total cost of ownership
and frees up more budget allocation for proactive initiatives. In fact,
Diskeeper is proven to cost less than running a network without it.
Diskeeper Professional now comes standard with HyperFast solid state
drive optimizer so it will increase PC performance for systems with
solid state drives in addition to hard drives.
Changes in Diskeeper 12:
• New User Interface.The Diskeeper Interface has been given a more modern look and feel, simplified navigation and drill-down architecture of information.
• Alerting Mechanism.This high level alerting mechanism will let you know at a glance if your system has any problems relating to performance, disk health and configuration settings.
• Reporting Mechanism.The reporting mechanism provides current and historical reports about your system.
• Disk Health.The Disk Health feature monitors hard disk drives for S.M.A.R.T. data to generate alerts and provides a disk health report.
• System Monitoring.System Monitoring monitors system environment activity and provides reporting on key elements.
Note: System Monitoring report data will only become available 2 to 3 hours after your system has been rebooted.
• HyperBoot.HyperBoot technology has been incorporated into Diskeeper to improve system boot time.
Note: HyperBoot will only work on non-server operating systems.
• Space Reclamation.Space Reclamation allows you to manually zero out unused space on a selected volume.
Note: Space Reclamation is only available on Server editions of Diskeeper.
• CogniSAN. This technology detects external resource usage within a shared storage system, such as a SAN, and allows for transparent optimization by never competing for resources utilized by other VMs over the same storage infrastructure. Any and all SANs are supported!
Note: CogniSAN only detects external resources on server editions of Diskeeper.
• HyperFast Improvements.HyperFast now includes TRIM that further improves Solid State Drive performance and longevity.
• New User Interface.The Diskeeper Interface has been given a more modern look and feel, simplified navigation and drill-down architecture of information.
• Alerting Mechanism.This high level alerting mechanism will let you know at a glance if your system has any problems relating to performance, disk health and configuration settings.
• Reporting Mechanism.The reporting mechanism provides current and historical reports about your system.
• Disk Health.The Disk Health feature monitors hard disk drives for S.M.A.R.T. data to generate alerts and provides a disk health report.
• System Monitoring.System Monitoring monitors system environment activity and provides reporting on key elements.
Note: System Monitoring report data will only become available 2 to 3 hours after your system has been rebooted.
• HyperBoot.HyperBoot technology has been incorporated into Diskeeper to improve system boot time.
Note: HyperBoot will only work on non-server operating systems.
• Space Reclamation.Space Reclamation allows you to manually zero out unused space on a selected volume.
Note: Space Reclamation is only available on Server editions of Diskeeper.
• CogniSAN. This technology detects external resource usage within a shared storage system, such as a SAN, and allows for transparent optimization by never competing for resources utilized by other VMs over the same storage infrastructure. Any and all SANs are supported!
Note: CogniSAN only detects external resources on server editions of Diskeeper.
• HyperFast Improvements.HyperFast now includes TRIM that further improves Solid State Drive performance and longevity.
Subscribe to:
Posts (Atom)
Disqus
Please Comment Here