World cyber news is online news media.we bought daily hottest news occuring in the world related to cyber.. We propogate news specially related to hacking, technology updates , cyber world updates....

Thursday, May 03, 2012

Hackers Hacked Into NASA, Us Military , Us Air force ,European Space Agency,Harvard,European Space Agency & Many More Websites

1:15 PM Posted by Anonymous ,
A hacker collective called “The Unknowns” has published Two Pastebin document that allegedly proves they managed to gain unauthorized access to a number of high profile websites.



The list of targets includes the Bahrain Ministry of Defense, Thai Royal Navy, a subdomain owned by car manufacturer Renault, Harvard University, French Ministry of Defense, Jordanian Yellow Pages, European Space Agency (ESA), US Military’s Joint Pathology Center, NASA’s Glenn Research Center and the US Air Force.

After hacking They Release Lots Of Screen Shots , Leaked Data , Admin Access In Pastebin In Two Docs.

1st Docs : Click here
2nd Docs : Click here

Message By The Attacker On Pastebin After The Attack :

A Message:

We are The Unknowns; Our Knowledge Talsk and Wisdom Listens...

Victims, we have released some of your documents and data, we probably harmed you a bit but that's not really our goal because if it was then all of your websites would be completely defaced but we know that within a week or two, the vulnerabilties we found will be patched and that's what we're actually looking for.
We're ready to give you full info on how we penetrated threw your databases and we're ready to do this any time so just contact us, we will be looking forward for this.

And for all the other websites out there: We're coming, please, get ready, protect your website and stop us from hacking it, whoever you are. Contact us before we take action and we will help you, and will not release anything... It's your choice now.

And for the Public: We're looking for your support... Support us to deliver our message to everyone out there...



We are The Unknowns; Our Knowledge Talsk and Wisdom Listens...

New Vulnerability Analysis Tool Delivers Cyber Scope-ready Content

12:52 PM Posted by Anonymous ,
Xacta(R) Flux, the new vulnerability analysis tool recently released by Telos(R) Corporation, enables federal agencies to feed security scan results directly to CyberScope in keeping with mandates relating to the Federal Information Security Management Act (FISMA).

Xacta Flux collects and correlates data from a wide variety of security products into a single view and maps the results to the relevant controls for security and risk management. This same SCAP- (Security Content Automation Protocol) formatted output can be fed to the CyberScope tool without additional scanning or processing.

CyberScope is the online portal federal agencies must use to submit their security assessment and authorization (A&A) results for FISMA reporting. It was established by the Office of Management and Budget (OMB) and is managed for OMB by the Department of Homeland Security (DHS).

Agencies have been required by OMB to submit monthly reports via CyberScope since November of last year. More than one in five federal agencies did not report their results through CyberScope in Fiscal Year 2011, according to a recent OMB report.

"Federal agencies are making good progress in their use of CyberScope, but more needs to be done," said Rinaldi Pisani, Telos vice president and general manager, emerging technologies. "A SCAP-based vulnerability analysis and reporting tool such as Xacta Flux can help more agencies take advantage of the efficiency and consistency of reporting their security results through CyberScope."

About Telos Corporation

Telos Corporation has provided innovative IT solutions and services to the federal government for more than 30 years, focusing since 1997 on cybersecurity. Telos solutions ensure that the government's most security-conscious organizations comply with demanding federal and DoD information security mandates. Offerings include Xacta(R) IA Manager for enterprise IT security management, enterprise security consulting services, secure networks, secure enterprise messaging, and secure identity management solutions. Solutions are represented to the federal government on Telos' GSA schedule. For more information, visit http://www.telos.com .

SOURCE: Telos Corporation

Samsung to launch Next Galaxy Phone at London event

12:44 PM Posted by Anonymous ,
Samsung will put the rumours and alleged leaks about its next flagship smartphone to rest when it unveils the handset in London later on Thursday.




More than 20 million copies of the existing Galaxy S2 have been sold since its launch in April 2011.

Analysts say its success helped Samsung overtake Nokia to become the world's best-selling mobile phone maker.

Changes in screen size, form factor and a higher-resolution camera are among changes that may drive its appeal.

Battery life
Samsung has been close lipped ahead of the event, refusing even to confirm the device's name - its website only states that its is "the next Galaxy".

It has, however, said the phone will not include a 3D display, but will be the first device to feature its new Exynos 4 quad-core chip.

It promised the Arm-based design would offer double the processing capability while using 20% less energy than the chip used in the S2. It can also record and playback video in 1080p high definition resolution.

But many company watchers believe the presentation will concentrate on what the device is like to use rather than raw statistics.

"To the normal consumer the chip is not important per se, but the experience it offers is," said Carolina Milanesi, research vice president at the tech analysis firm Gartner.

"So less battery use, better touch response and the ability to better handle multitasking to let more operations be carried out simultaneously will all be noted."

Smartphone shoppers can be very fickle. Blackberry-maker Research In Motion and HTC have both seen sales lag after misjudging the appeal of their high-end devices to consumers.

But Gavin Byrne, principal analyst at telecoms experts CCS Insight believes Samsung should avoid the same pitfall.

"There are only two big companies in the smartphone market making sizeable volumes of profit at the moment - Samsung and Apple," he said.

"Samsung is now a long way ahead of its Android-based rival HTC after the Taiwanese firm had misses with some of its launches.

"Samsung on the other hand has finally learned the lesson that software and making its devices desirable in themselves counts, rather than just having the best technology and specifications."

Special event
The level of speculation surrounding the phone suggests Samsung's decision to hold a special event, rather than launch the handset at Barcelona's Mobile World Congress, is already paying off.

But that also increases the risk of a backlash if the upgrade is not seen as a major step forward.

"Events such as this are incredibly important as it gives the company a world stage to launch their product," said Stuart Miles, founder of the tech site Pocket-lint.

"I'm a great believer that trade shows are good for trade but not launches, as a company only has an hour until a rival's product comes along competing for attention.

"It's all about positioning and timing - if you don't get it right the fire isn't lit and the product won't carry forward."

Samsung will reveal details of the device at 7pm BST at London's Earls Court Exhibition Centre.

Source : BBC News

Motorola wins Xbox and Windows 7 ban in Germany

12:39 PM Posted by Anonymous ,
Motorola Mobility has been granted an injunction against the distribution of key Microsoft products in Germany.




The sales ban covers the Xbox 360 games console, Windows 7 system software, Internet Explorer and Windows Media Player.

It follows a ruling that Microsoft had infringed two patents necessary to offer H.264 video coding and playback.

A US court has banned Motorola from enforcing the action until it considers the matter next week.

The handset maker is in the process of being taken over by Google.

Appeal
This is just one of several cases involving about 50 intellectual properties that the smartphone maker has claimed that Microsoft should have licensed.

Microsoft has said that if it met all of Motorola's demands it would face an annual bill of $4bn (£2.5bn). Motorola disputes the figure.

A statement from Motorola said: "We are pleased that the Mannheim Court found that Microsoft products infringe Motorola Mobility's intellectual property. As a path forward, we remain open to resolving this matter. Fair compensation is all that we have been seeking for our intellectual property."

Microsoft said it planned to appeal against the German ruling.

"This is one step in a long process, and we are confident that Motorola will eventually be held to its promise to make its standard essential patents available on fair and reasonable terms for the benefit of consumers who enjoy video on the web," a spokesman said.

"Motorola is prohibited from acting on today's decision, and our business in Germany will continue as usual while we appeal this decision and pursue the fundamental issue of Motorola's broken promise."

US hearing
Microsoft moved its European software distribution centre from Germany to the Netherlands last month ahead of the verdict to minimise potential disruption.

However, Motorola cannot enforce the ruling until a Seattle-based judge lifts a restraining order.

The restriction was put in place after Microsoft claimed that Motorola was abusing its Frand-commitments - a promise to licence innovations deemed critical to widely-used technologies under "fair, reasonable and non-discriminatory" terms.

A hearing is scheduled for 7 May, although the judge may issue his ruling at a later date.

The German case is also likely to be considered by the European Commission.

It is carrying out two probes into whether Motorola's Frand-type patent activities amount to "an abuse of a dominant market position".

Source : BBC News

Looking For Vpn For Bypass Pirate Bay Ban

12:33 PM Posted by Anonymous , ,
Every people are increasingly turning to virtual private networks (VPNs) to anonymise their free sharing of music and movies, a new study has suggested.



Sweden's Lund University indicated that there had been a 40% rise in the number of 15 to 25-year-olds using such services since 2009.

Many believe a clampdown on piracy is behind their rise in popularity.

The Pirate Bay has advised visitors to make use of VPNs. It would be illegal to do so to download pirated files.

In its first public response since five of the UK's big ISPs agreed to block their subscribers from the file-sharing site, The Pirate Bay remained defiant.

"As usual there are easy ways to circumvent the block. Use a VPN service to be anonymous and get an uncensored internet access, you should do this anyhow," it said.

Some industry experts now believe that VPNs could become publishers' next target.

Anonymity systems
Once the preserve of the business world, VPNs are secure networks that allow data sharing behind heavily encrypted firewalls.

The fact that they allow users to swap files without being detected makes them perfect for pirates.


Virgin Media has begun blocking users' access to The Pirate Bay
"VPNs could become the next front in the battle against piracy," predicted independent music analyst Mark Mulligan.

He pointed to the growing popularity of VPNs such as BT Guard - in this case, BT stands for bit torrent not British Telecom.

Increasingly services such as the bluntly named HideMyAss have been taking extra measures to protect their users, he added.

"Some providers have already starting putting anonymity systems in place, such as not tracking IP addresses and deleting logs after seven days."

The music industry has changed its focus over the last year, away from targeting individual file-sharers to shutting off access to sites via domain name service blocking - meaning anyone typing in the address of a torrent site will not get through.

To achieve this, content providers must come to an agreement with internet service providers to block access or force the block via the courts.

Crackdowns against The Pirate Bay have now been enforced across Europe and are imminent in Britain.

Some have questioned the effectiveness of current blocks.

BT, for example, has adapted its porn filtering system known as Cleanfeed, but has made no secret of the fact that the system is not entirely foolproof.

Use of so-called proxy servers in conjunction with a VPN is one way to circumnavigate the filters.

"BT's Cleanfeed is the Rolls Royce of filtering software but there are always ways around it," said Mr Mulligan.

Source : BBC News

BBC News website wins People's Voice news award

12:29 PM Posted by Anonymous , ,
The BBC News website has won the People's Voice award for news at this year's Webbys.


Other awards went to Pinterest, Google+ and Spotify, all of whom picked up their first Webbys.

The Daily Beast won the judges' award for news website.

The People's Voice awards sit alongside the judges' awards and are voted for by online fans. This year nearly 1.5 million votes were cast from more than 200 countries.

The breakout of the year award went to Instagram, the photo-sharing startup recently bought by social media giant Facebook.

Facebook also won a People's Special Achievement for Social Change, set up to recognise the impact of the net on political development.

'Real honour'
Pinterest and Google+ picked up the more traditional social media award, Pinterest getting the official Webby and Google+ picking up the People's Voice award.

Commenting on the BBC News website's win in the news category, editor Steve Herrmann said: "It's a real honour to win the People's Voice award once again. This award is hugely appreciated by everyone working to make sure BBC News online remains such a valued service to the public, in the UK and around the world."

Other Webby winners included FactCheck.org which won the best political website, while spoof news site The Onion picked up five awards including Best Comedy website.

Non-profit organisation TED (Technology, Entertainment and Design), famous for its TED talks, also picked up several gongs this year, including ones for best app, best education site and best use of video.

Singer Bjork was among this year's special achievement winners for her Biophilia album, which has been dubbed the world's first app album.

The Webby awards were set up in 1996 and are voted on by a body of web experts. Seen by many as online equivalents of the Oscars, 2012 judges included Twitter co-founder Biz Stone and mobile phone inventor Martin Cooper.

"This year's winners represent an amazing cross-section of the new and continuing trends we've seen across the internet this year," said David-Michel Davies, executive director of the Webby Awards.

Winners will be honoured at an event in New York on 21 May, where each must deliver a five-word speech.

Source : BBC News

Report Says :Google Staff Knew of Wi-Fi Snooping

12:24 PM Posted by Anonymous , ,
The Google engineer who wrote a program that collected personal data from wi-fi networks told at least two other colleagues, a report has revealed.




Google released the full investigation conducted by the US Federal Communications Commission (FCC).

It said senior staff on the Street View team were unaware of the plans.

The company was fined $25,000 (£15,300) earlier this month for impeding the FCC's investigation, but was ruled to not have broken the law.

The report came two weeks after a heavily redacted version was released by the FCC at the time of the original fine.

It detailed how one Google engineer, referred to only as "Engineer Doe", produced a computer program capable of collecting data from people's unsecured home wireless networks.

The data gathered included contents of some emails and web browsing history.

'Collect, store and review'
The collection took place while Google was photographing areas in its Street View car between 2008 and 2010.

"Engineer Doe specifically told two engineers working on the project, including a senior manager, about collecting payload data," the agency said in its report.

"Engineer Doe intended to collect, store and review payload data for possible use in other Google projects."

However, the investigation added that other senior managers on the Street View team were unaware of Engineer Doe's actions.

Google said it wanted to now "put the matter behind us".

"We decided to voluntarily make the entire document available except for the names of individuals," the company said.

"While we disagree with some of the statements made in the document, we agree with the FCC's conclusion that we did not break the law."

Source : BBC News

Cybersecurity Bill a Step Toward Protection Against New Threats

12:13 PM Posted by Anonymous , ,
As the first anniversary of the death of Osama bin Laden approached last week, members of the House of Representatives were debating the impact of the Cyber Intelligence Sharing and Protection Act in Washington.



The bipartisan proposal passed, 248-168, on Thursday, despite the predictable threat of a White House veto if it is passed in the Senate. The House bill allows for the exchange of potentially threatening data between private companies and the National Security Agency, as well as other government departments.

A separate Senate bill would focus cybersecurity efforts in the Department of Homeland Security and require companies to increase their security for critical infrastructure, such as electrical and water systems. Both bills have merit and come at a time when digital data is in increasing danger of being stolen or intercepted by enemies of the United States. It is a new battleground where no one has an accurate road map to follow. The House has taken the initiative.

The Obama administration favors oversight by civilian agencies. Forcing private businesses to increase electronic security measures could be seen as another burden imposed on corporations large and small by Washington – driving up the cost of manufacturing in many cases. The House bill would give this authority to the NSA, a nationwide agency already well equipped to implement stronger measures to safeguard vital information. But that’s the kind of government involvement that sends liberal lawmakers into a tailspin.

“Supporters – Republicans and Democrats alike – said the proposal is a reasonable compromise between the need for privacy and security,” according to the news agency The Hill. “The intelligence community has the ability to detect cyber threats, these malicious codes and viruses, before they are able to attack our networks,” said Intelligence Committee ranking member Dutch Ruppersberger, D-Md. “But right now, federal law prohibits our intelligence community from sharing the classified cyber threat with the companies that will protect us that control the network, the AT&Ts, the Verizons, the Comcasts, those groups. We have the ability to give them the information to protect us,” according to The Hill.

Rep. Jared Polis, D-Colo., added that the bill is an “unprecedented, sweeping piece of legislation that would waive every single privacy law ever enacted in the name of cybersecurity.”

Yet supporters cooled the rhetoric by insisting that the federal government’s use of voluntarily provided information would be limited. No one argues that the line between privacy and intelligence-gathering is swizzle stick-thin. But ignoring the need to protect the country is a potentially fatal error. It is objectionable to compare the mission of CISPA to how nervous federal agencies dealt with domestic fears in the past, but that’s the tack taken Thursday on the House floor by Rep. John Lewis, D-Ga.

“We remember our nation’s dark past. Martin Luther King Jr.’s telephone was wiretapped. His hotel room was wiretapped. His home was wiretapped. Our offices were wiretapped. Our meetings were wiretapped. And it was not just people spying on civil rights activists, but people protesting against the war in Vietnam. We didn’t have a Facebook or Twitter or email. These new tools must be protected. Today, we have a mission, a mandate, a moral obligation to protect future generations of activists and protestors,” he said to the dozen or so members of Congress present.

Mr. Lewis should remember that every average American citizen deserves just as much protection as his “future generations of activists and protestors.”

Cybersecurity is an international issue that eclipses the former threats presented by the Students for a Democratic Society, for example. In 2010, the U.S. Chamber of Commerce’s network was compromised. Attackers stole six weeks of email correspondence from four employees who were focused on Asian policy and had access to all the information the Chamber of Commerce has on its 3 million members, according to the Wall Street Journal.

We cannot see the overseas individuals who would profit from acquisition of unsecure data. Congress needs to expedite an effective compromise to protect information. That’s the real “moral obligation” in Washington.

source : The Sun

Indian Cyber Army Is Organising A Ethical Hacking Boot camp In Kerala.

9:34 AM Posted by Anonymous , ,
INDIAN CYBER ARMY


According To A Update On INDIAN CYBER ARMY Official Facebook Page , They Are Going To Organise A Hacking Boot Camp In Kerala Of Five Days ( Date: 15-19 May 2012 ).

INDIAN CYBER ARMY Has Created A Facebook Event Too : Click Here

Key Features:

>>First time ever in Indian IT Industry, UGC + University recognized certification in Information Security & Ethical Hacking which is cost effective and accepted globally.

>>Course content is developed with the support of Department of Information Technology, Ministry of Communications and IT, Government of India.


Interested Persons Who Want To Join This Boot Camp :

Mail INDIAN CYBER ARMY : kerala@icalab.com

Or Contact INDIAN CYEBR ARMY South Zone : +91 88 8200 8200 or +91 88 8255 8255

Sunday, March 18, 2012

How To Join Official Indian Cyber Army # Ethical Hacking Training.# Membership

12:05 AM Posted by Anonymous , ,


Are You Looking For Best & Fastest Growing "Certified Ethical Hacker / Licensed Penetration Tester / Cyber Crime Forensics Expert / Certified Cyber Crime Lawyer Training "
Then, The Best Choice Is To Go For INDIAN CYBER ARMY.

One Question May Start Coming In Your Mind & Why We Are refering You For INDIAN CYBER ARMY?

#What Is INDIAN CYBER ARMY ? #What Is The Benefits Of Their Programs ? How To Join INDIAN CYBER ARMY ?



INDIAN CYBER ARMY : THE ORGANIZATION


Indian Cyber Army is the largest group of ethical hackers and cyber security experts involved into social service. Its sole aim is to research, analyze, train and develop technology. We are a team of Ethical Hacker, Security Experts, Programmers from across the globe involved into creating awareness in the field of cyber security and to reduce the increasing Cyber Crimes. Apart from creating awareness, we do researches in the field of IT security & ethical hacking, discovering vulnerabilities/loopholes in websites, networks, developing exploits and providing the advisories to overcome the exploit or loopholes. The team had been constantly trying to solve the social problem by creating awareness in the field of Cyber/ Digital Information Security to protect kids, students, youths, individuals, and organizations etc. from the unseen criminals of the wired and wireless world. Protecting the National Information Heritage, Financial freedom, privacy of the individuals and the intellectual property from the global menace of unseen cyber criminals is a social necessity. We strengthen the hands of people by strengthening the power that runs the world in this age of the internet..
A 100 % security can never be accomplished, but we can ensure that we quickly learn from our mistakes and avoid them in future. We have soldiers from every part of India and together we have put up an effort to secure the Indian cyber space. We are ready to Serve anybody who needs us for defending this vital information. Partner Organization with Symantec (Norton Antivirus), IBM India, Data Security Council of India (A Unit of NASSCOM), GFI, LEO Impact Securities and Many More Organizations Working in the field of Cyber Security.



RESEARCH & DEVELOPMENT


Indian Cyber Army also focuses to conduct high quality research in the general areas of security, and performance optimization in Networking, at affordable costs. The Centre will be a platform to provide defense against other threats such as information warfare. Our mission is to develop information infrastructures into more secure and reliable infrastructures and to enhance the communication networks and protocols of todays best-effort Internet. Hence, the urgent need to establish a Cyber Security Research Centre. We established Indian Information Security Research Organization [IISRO]. The research work to be undertaken in the Indian Information Security Research Organization and data collected here shall be of great benefit to the entire Research community. We aim at creating a technology rich environment conducive to constructive discussions and evolving thoughts which will lead to innovative ideas in unwiring and digitizing the world securely at affordable costs.


So why should a student go for Indian Cyber Army Programs We think the following summarizes the plethora of reasons why Indian Cyber Army Program is a dream for every Information Security and Ethical Hacking
enthusiast:



INDIAN CYBER ARMY is a Professional Cyber Security Organization Aimed with Digitally Secured.India, which is providing its services to government and Indian Police. It is the only Organization in India which is providing UGC recognized cyber security courses. As a result of these courses, Indian Cyber Army Certified Professionals will build real world security knowledge that will enable them to recognize vulnerabilities, expose system weaknesses and help safeguard clients against security threats. Professionals will learn the essentials of Networking and Ethical Hacking, along with the added professional edge of new corporate demands.



> Information Security and Ethical Hacking is best understood by applying it in System Administration or Network Administration.
> Information Security and Ethical Hacking have a lot of scope in career.
> A participant gets to learn and apply Information Security which is important for every system and network administrators.
> This is the best way to get to know other Ethical Hacking enthusiast around the country.
> One gets to be in touch with the most talented and experienced professionals in this area of academics and interacts with them.
> Receive an unparalleled education on the art of computer security with personal one-on-one attention from the Indian Cyber Army Cyber Security Team.
> Learn and interact with one of the most respected authorities on computer security
> Toppers of each batch to be personally interviewed by Indian Cyber Army and will receive a chance to work with them on security projects at Cyber Crime Investigation Bureau, New Delhi or Indian Information Security Research Organization (IISRO) under Indian Cyber Army Student Partners Program (ICASP).
> Indian Cyber Army Ethical Hacking & Information Security Software Tool Kit with Manual for each student. Study materials prepared by the legends of hacking world.
> Authorized Certificate, recognized in the security industry globally after the completion of the Workshop.
> 24x7 Live Doubt Clearing Sessions via Chat by Experts and Webinars.
> Free Membership*** to “Indian Cyber Army” India's first White Hat Hacker's Team.
> One Year Free Subscription to “Hackcrypt” Magazine (E-Copy)



## Any Person From Any Country Of The World Can Join /Take Training From INDIAN CYBER ARMY Experts.

To Join INDIAN CYBER ARMY Or For Any Queries Mail at training@indiancyberarmy.org

Indian Cyber Army Is Also Recruiting Security Professionals, Marketing Specialist And Techno Crates For The Post Of State Executive Officer All Over India in All States and Union Territories.
Interested Applicant Can Mail Their Resume Along With Their Qualification Documents at hr@indiancyberarmy.org

For Any Other Query Contact
+91 78 3877 3877 or +91 7827 422 422
between 10AM to 8PM All Days.


Website : http://www.indiancyberarmy.org
Facebook: Click here
Chat With INDIAN CYBER ARMY Team : Click Here


Source : INDIAN CYBER ARMY Blog