Pages

Monday, 15 October 2012

Former LulzSec hacker pleads guilty to Sony case

After last year's big PlayStation Network hack a lot of hacking groups such as Anonymous and LulzSec were intensely publicized. Back in June, a massive hack was conducted on the Sony Pictures Website. The attack led to the theft of details on over 1 million accounts and was linked to the hacker group Lulzsec.

At the time, the hacker group claimed to have used a “very simple SQL injection” attack. Samples of the compromised data were later posted online. Purported LulzSec member Raynaldo Rivera, 20, was charged in August with impairing a protected computer and conspiracy charges. In admitting his guilt, he joins Cody Kretsinger, who also pleaded guilty for the Sony Pictures hijack. Kretsinger is scheduled to be sentenced on 25th October.

lulzsec-hacker-arrested"Rivera used the HideMyAss anonymising proxy service in an attempt to disguise his IP address while he carried out reconnaissance work, probing Sony Pictures' website for security vulnerabilities. HideMyAss turned over his IP address after the authorities issued a court order, ultimately exposing Rivera's identity." John Leyden explained in Theregister.

Investigations were made in both the U.S. and Europe. Although not all culprits were caught, two ex-members of hacker group LulzSec admitted they are guilty in this case. Cody Kretsinger got a plea bargain with prosecutors in April this year.

The information that the hacker stole resulted in over $605,000 in financial losses. Part of the plea agreement will see Riviera paying restitution to the victims of the crime and facing prison time. The hacker is facing a maximum of five years in prison, and the fine will be at least $250,000.

Tuesday, 9 October 2012

Anonymous Hackers attack Masonic Child Identification Program website

A group of computer hackers Anonymous goes by the name xPsych0path has accuse Masonichip for unwillingness to accept the forced chipping of children they are working toward mitigating it by disrupting the chipping operation. They have built their own operation, in opposition to this issue. In #OpMasonChip is designed to express publicly their anger. He had the following to say about this operation;

We are fighting against putting RFID chips inside children by masons they have plan to put chips in all of us and those who don't want it won't be able to buy and sell. So I down all those site's for them” on .

"But In actual there is no "chip" in Masonichip as it stands for Masonic Child Identification Program and includes Abduction Awareness and "Safe Kids" Education benefits to all children and parents attend events and participate." Masonichip explained on their site.

Anonymous+attack+on+Masonic+company+for+Forced+Chipping+of+KidsThey DDOSing following sites related to them:

Update : The Hacker News works tirelessly to bring credible and informative information to the public in regards to cyber security and issues surrounding it. We obviously did not understand the true nature of the “chip” and stand corrected on that issue. However, as strong supporters of the human right to privacy we collectively do not support any “gathering” of DNA or blood samples, etc for identification in future use. At least not on a mandatory basis. We apologize for any misinformation

A group of computer hackers Anonymous goes by the name xPsych0path has accuse Masonichip for unwillingness to accept the forced chipping of children they are working toward mitigating it by disrupting the chipping operation. They have built their own operation, in opposition to this issue. In #OpMasonChip is designed to express publicly their anger. He had the following to say about this operation;
We are fighting against putting RFID chips inside children by masons they have plan to put chips in all of us and those who don't want it won't be able to buy and sell. So I down all those site's for them” on pastebin.
"But In actual there is no "chip" in Masonichip as it stands for Masonic Child Identification Program and includes Abduction Awareness and "Safe Kids" Education benefits to all children and parents attend events and participate." Masonichip explained on their site.
Anonymous+attack+on+Masonic+company+for+Forced+Chipping+of+KidsThey DDOSing following sites related to them:
1. http://masonichip.org/
2. http://mychip.org/ 
3. http://www.masonichip.ca/ 
4. http://www.mainemason.org/ 
5. http://www.illinoisfreemason.org/ilchip.html
6. http://www.keywestmason.com/child_id.htm 
7. http://www.mdchip.org/
8. http://www.kschip.org/
Update : The Hacker News works tirelessly to bring credible and informative information to the public in regards to cyber security and issues surrounding it. We obviously did not understand the true nature of the “chip” and stand corrected on that issue. However, as strong supporters of the human right to privacy we collectively do not support any “gathering” of DNA or blood samples, etc for identification in future use. At least not on a mandatory basis. We apologize for any misinformation.
- See more at: http://thehackernews.com/2012/10/anonymous-hackers-attack-masonic-child.html#sthash.8QhV5hx2.dpuf

Thursday, 4 October 2012

Faux Apps Found Hijacking Chrome, Spamming Tumblr

A flurry of fake, ad-laden Angry Birds lookalike games have flooded the Google Chrome Web store of late. The online marketplace where Google sells extensions and games for its Chrome browser has seen an influx of games mimicking “Bad Piggies,” a new game Rovio Entertainment recently released that puts a twist on its ubiquitous Angry Birds game.

At least seven of these games — “Angry Birds Bad Piggies,” “Angry Birds Space HD,” etc. — require the user to relinquish access to all data on all websites, according to research headed up by Barracuda Networks. In an entry on the security firm’s
Internet Security Blog, research scientist Jason Ding notes that all of these games are being distributed by the same site: playook.info. After installation, the games insert their own advertisements into popular websites.

Barracuda found that after deploying the games in a test environment, they inserted advertising from playook.com into sites like Myspace, eBay, IMDB, Yahoo and MSN among dozens of other sites on the Chrome browser.


Collectively, as of Thursday afternoon, the apps have been downloaded by nearly 89,000 Chrome users.


Clearly, attackers are continuing to entice users into granting complete access to plug-ins, games and extensions without reading the applications' permissions first.


Security firm GFI Labs spotted a rogue Tumblr app disguised as a “profile stalker” this week that's been conning users in a similar fashion.
According to a post on the company’s blog, users are installing the app under the assumption it will allow them to see who is viewing their blog the most. In actuality, installing the app grants the app “read and write access” to the user’s Tumblr account.

If installed, the app will go on to spam the user’s Tumblr until they either reset their “secret posting email address” or revoke the “profile stalker” app in Tumblr’s “Account Settings” panel.


Permissions — what applications can or can’t do, what information they have or don’t have access to — have long been a thorn in the side of mobile phone users. It appears that going forward users will have to remain as vigilant on their personal computers as on their smartphones until a better system for vetting applications on sites such asTumblr and Google Chrome, is introduced.

Diskeeper Professional 2012 v16.0.1017


Diskeeper 12 Professional provides essential performance and efficiency increases that all business desktops and laptops need to function productively. Diskeeper prevents the majority of fragmentation (scattered file fragments randomly placed across the hard drive) before it can happen and instantly defrags the rest. Diskeeper 12 Professional has a new, more intuitive user interface, runs unobtrusively in the background, elevates PC performance, and requires no scheduling and absolutely no user intervention. It lowers the total cost of ownership and frees up more budget allocation for proactive initiatives. In fact, Diskeeper is proven to cost less than running a network without it. Diskeeper Professional now comes standard with HyperFast solid state drive optimizer so it will increase PC performance for systems with solid state drives in addition to hard drives.

Changes in Diskeeper 12:
• New User Interface.The Diskeeper Interface has been given a more modern look and feel, simplified navigation and drill-down architecture of information.
• Alerting Mechanism.This high level alerting mechanism will let you know at a glance if your system has any problems relating to performance, disk health and configuration settings.
• Reporting Mechanism.The reporting mechanism provides current and historical reports about your system.
• Disk Health.The Disk Health feature monitors hard disk drives for S.M.A.R.T. data to generate alerts and provides a disk health report.
• System Monitoring.System Monitoring monitors system environment activity and provides reporting on key elements.
Note: System Monitoring report data will only become available 2 to 3 hours after your system has been rebooted.
• HyperBoot.HyperBoot technology has been incorporated into Diskeeper to improve system boot time.
Note: HyperBoot will only work on non-server operating systems.
• Space Reclamation.Space Reclamation allows you to manually zero out unused space on a selected volume.
Note: Space Reclamation is only available on Server editions of Diskeeper.
• CogniSAN. This technology detects external resource usage within a shared storage system, such as a SAN, and allows for transparent optimization by never competing for resources utilized by other VMs over the same storage infrastructure. Any and all SANs are supported!
Note: CogniSAN only detects external resources on server editions of Diskeeper.
• HyperFast Improvements.HyperFast now includes TRIM that further improves Solid State Drive performance and longevity.


Disqus

Please Comment Here