World cyber news is online news media.we bought daily hottest news occuring in the world related to cyber.. We propogate news specially related to hacking, technology updates , cyber world updates....

Saturday, December 24, 2011

Ubi slate 7 upgradede version of Akash is finally ready to sale.

8:54 PM Posted by Administrator , ,


Earlier we have discussed about Aakash (World’s Cheapest Tablet).Now the countdown is over and the much awaited Aakash tablet is finally ready to sale. DataWind, the Canadian company that is manufacturing Aakash, has started the online booking and pre booking of the much anticipated low cost Android tablet. Online booking is for students' version of the tablet and pre booking is for UbiSlate 7, the upgraded version of Aakash.
Students' version of Aakash will be available for Rs 2,500 and will be delivered in seven days. The commercial version, UbiSlate 7 is priced at Rs 2,999. The payment mode for both the tablets is cash on delivery.
The commercial version of Aakash tablet will be powered by Android 2.3 and will have a resistive touchscreen, Cortex A8-700 MHz processor and graphics accelerator HD video processor, 256 MB of RAM and 2 GB of internal memory. Other specifications are a one standard USB port, 3.5 mm audio jack, a 7 inch display with 800 x 480 pixel resolution, resistive touchscreen, GPRS and WiFi support.

"The improved version of Aakash tablet will be available in retail outlets by January end," a spokesperson of DataWind told media. The tablet was to be made available in retail stores by the end of November. "The delay in the availability of the tablet has been due to upgradation in the tablet and some unforeseen delay in manufacturing," the spokesperson said.
To book and prebook student and commercial versions respectively of Aakash tablet, users have to visit DataWind's website and fill up the required form. In case of booking they will get a booking ID and a message which will state, "You will shortly receive an email confirmation from our support team with further details."
In case of pre booking users will get a confirmation message which will state, "The commercial version of the Akash UbiSlate 7 would be launched in early weeks of December. After the commercial launch we would get in touch with you to deliver your device as soon possible." As a matter of fact, the confirmation message a reader will see is factually incorrect as The mobile Indian had reported earlier the Aakash tablet will be available only by January end.
Datawind has however not cleared how it is going to establish the identity of students who will book the cheapest version of Aakash tablet. When The Mobile Indian contacted spokesperson of Datwind he said, "Anyone can book the student version of Aakash tablet."
This defeats the purpose of providing students an affordable tablet as now anyone can place an order to get the tablet. Interestingly, now it has been revealed that the government has procured only 10,000 Aakash tablets for distribution in schools and colleges of the initial 1 lakh proposed.

Anonymous Reacts against "Stop ONline policy Act (SOPA)

Hacktivist Anonymous expressed their reaction against the the controversial Stop Online Piracy Act (SOPA) reconvenes by the US Senate. While the world has been given little time to react to SOPA, Anonymous promises its reaction won’t be little. The hacker collective said the overwhelming backlash against the controversial bill should be enough to defeat it but the very fact deliberations are being reconvened so swiftly today after breaking down last week makes it clear corporate lobbyists are working to see SOPA fast tracked.

Anonymous Statement :-

"The goal of the so-called 'Stop Online Piracy Act' SOPA is to empower litigious U.S. corporations to police the internet, with the ability to act as judge, jury and executioner. SOPA tramples civil rights laws, fair use, freedom of press and freedom of speech. Under SOPA, an average person could be arrested, fined, sued and spend time in a federal prison for so little as uploading a video to YouTube or even linking to one. This law further proves the reality of corporate rule and totalitarianism.


It has been clandestinely moved forward in an attempt to fast track the law under the radar of a culture drunk on materialistic obsession - as such The House Judiciary Committee is reconvening on the 21st of December. In short, we were lied to.


While it was the intent to give people little time to react, our reaction will not be little. This oligarchy rules without democracy, consent or support; it fears us, it fears protesters, it fears the solidarity of the Occupy Movement, it fears the 99pc, it fears YOU. The federal government currently perches on the narrow brink of collapse, let us give it a nice, hard push....."

Critical Zero-Day vulnerability in Windows 7 (Exploitable via Apple's Safari web browser)



Highly critical Zero-day vulnerability found in Windows 7. This security flaws can be exploited via Apple Safari browser. This was first made public via a twitter user named w3bd3vil

"<iframe height='18082563'></iframe> causes a BSoD [blue screen of death] on win 7 x64 via Safari. Lol!"



It is reported that vulnerability affects fully patched Windows 7 Professional 64-bit and cautioned that other versions may be affected. The remotely exploitable vulnerability, caused by an error in win32k.sys, enables a hacker to run arbitrary code -- such as malware -- on a victim's machine when he or she visits a specially crafted Web page using Safari. Specifically, the Web page would simply need to contain an iFrame -- an HTML element that is typically used to pull content from other sources onto a Web page -- with an overly large "height" attribute.

Bharatya janta party (BJP) Hacked by Tha Disaster



A Few days ago Pakistani hacker KhantastiC haXor has hacked the Indian Congress Website and defaced the and defaced the profile page of Party President Sonia Gandhi. Now the official website of Bharatiya Janata Party (BJP) of Karnataka State get hacked and defaced by THA Disastar. It seems that Pakistani hackers are randomly targeting the websites of various Political Parties & Organizations. Yes you are absolutely right this is that THA Disastar who has hacked the hacktivist Anonymous website and send it offline for more than 12 hours. Not only BJP, he also hacked two news channel of India, they are News Hindustan and Rajadhaninews. Earlier he has also hacked the official site of President of Guyana. The defacement mirror has also been created by the hacker on zone-h. ..
To see the mirror of site click Here

Friday, December 23, 2011

Chinese hacker hit U.S chamber of commerce

worldcybernews.com
A group of hackers in China breached the computer defenses of America's top business-lobbying group and gained access to everything stored on its systems, including information about its three million members, according to several people familiar with the matter.The break-in at the U.S. Chamber of Commerce is one of the boldest known infiltrations in what has become a regular confrontation between U.S. companies and Chinese hackers. The complex operation, which involved at least 300 Internet addresses, was discovered and quietly shut down in May 2010.It isn't clear how much of the compromised data was viewed by the hackers. Chamber officials say internal investigators found evidence that hackers had focused on four Chamber employees who worked on Asia policy, and that six weeks of their email had been stolen.

It is possible the hackers had access to the network for more than a year before the breach was uncovered, according to two people familiar with the Chamber's internal investigation.

One of these people said the group behind the break-in is one that U.S. officials suspect of having ties to the Chinese government. The Chamber learned of the break-in when the Federal Bureau of Investigation told the group that servers in China were stealing its information, this person said. The FBI declined to comment on the matter.
In Beijing, Foreign Ministry spokesman Liu Weimin said at a daily briefing that he hadn't heard about the matter, though he repeated that Chinese law forbids hacker attacks. He added that China wants to cooperate more with the international community to prevent hacker attacks.
The Chamber moved to shut down the hacking operation by unplugging and destroying some computers and overhauling its security system. The security revamp was timed for a 36-hour period over one weekend when the hackers, who kept regular working hours, were expected to be off duty.
To get More Information about thisClick here

Israeli server rooted | 900+ Domains get owned by The hackers Army

The recently formed hackers group (The hackers Army) have rooted Israeli server.This is another big blow from this group.Earlier this group has made their own reputation on the cyber world by hacking into the hacktivist Anonymous website, Official Site of President of Guyana and many more high profile sites. This time they rooted a Israeli Server and hacked all the domains hosted on that particular server. They got owned 900+ of websites.They released the list of owned websites here. click here to check the list of sites.

Microsoft introduced picture passwords for Windows 8 | Sign in with a picture to your pc

8:11 PM Posted by Administrator , , , ,
worldcybernews.com
The experience of signing in to your PC with touch has traditionally been a cumbersome one. In a world with increasingly strict password requirements—with numbers, symbols, and capitalization—it can take upwards of 30 seconds to enter a long, complex password on a touch keyboard. We have a strong belief that your experience with Windows 8 should be both fast and fluid, and that starts when you sign in.

Other touch experiences in the marketplace have tried to tackle this problem, with the canonical example being a numeric PIN. A PIN is a great solution: Almost everyone has seen or used one before, and a keypad is simple to use with touch. We knew though, that there was room to improve.

A numeric combination often presents a problem for people because the sequences easiest to remember are typically the least secure. Common number sequences—like 1111, or 1234—are troublesome, but PINs that are composed of common well-known personal dates can also be deduced if an attacker has personal knowledge of the person (much of which is not hard to obtain). In such a case, the number being personal to a person can work against its security. We set out to change the paradigm here: we designed a fast and fluid touch sign-in experience that is also personal to you.

Picture password is a new way to sign in to Windows 8 that is currently in the Developer Preview. Let’s go behind the scenes and see how secure this is and how it was built. One of the neat things about the availability of a touch screen is that it provides an opportunity to look at a new way to sign in to your PC. While many of us might prefer to remove the friction of getting to a PC by running without a password, for most of us, and in most situations this is not the case or is at least unwise. Providing a fast and fluid mechanism to sign in with touch is super important, and we all know that using alpha passwords on touch-screen phones is cumbersome. This post is authored by Zach Pace, a program manager on our You Centered Experience team, and looks at the implementation and security of picture password in Windows 8. Just as a note, you can also use a mouse with picture password too, just by using some click and/or drag actions.

At its core, the picture password feature is designed to highlight the parts of an image that are important to you, and it requires a set of gestures that allow you to accomplish this quickly and confidently. In order to determine the best set of gestures to use, we distributed a set of pictures to a set of study participants and asked them to highlight the parts of the image that were important to them. That’s it, no additional instructions. What we found were people doing three basic things: indicating location, connecting areas or highlighting paths, and enclosing areas. We mapped these ideas to tap, line, and circle, respectively. It’s the minimal set of gestures we found that allowed people to signify the parts of the image most important to them.


There’s also an attribute inherent to circle and line gestures that adds an additional layer of personalization and security: directionality. When you draw either a circle or a line on your selected picture, Windows remembers how you drew it. So, someone trying to reproduce your picture password needs to not only know the parts of the image you highlighted and the order you did it in, but also the direction and start and end points of the circles and lines that you drew.


To get More information about it . click here

Mochahost server rooted | More than 1200+ websites hacked by team grey hat (TGH)

7:53 PM Posted by Administrator , , ,
Worldcybernews.com
Again a big cyber attack from Team Greyhat.Few days ago they rooted guyana server and have hacked and defaced 1500+ websites .They have also hacked T-series official site and many more.After this attack TGH authority claimed them selves as the "Achilles of Cyber World".They released list of all hacked sites here:Click here
After this attack they did a Press release.

Press Release of TGH:-
"Guyana Server Rooted, 1500 Websites Hacked By Teamgreyhat
T-Series Official Website Hacked By Teamgreyhat (TGH)
Theexpert Server Rooted By TGH
Malaysian Web-Hosting Company's Security Compromised, Entire Server Dumped By TeamGreyhat
Cybertek Web-Server Rooted By TGH
& & & Many more..............
Yet moooooooooooore to Come.................


The Common question arise and that is who is TGH and what we are capable of???
Here is the Answer


We are TGH
We are Warriors
We are Achilles of Cyber World
............
"Remember, I will still be here
As long as you hold me, in your memory


Remember, when your dreams have ended
Time can be transcended
Just remember me


I am the one star that keeps burning, so brightly,
It is the last light, to fade into the rising sun


I'm with you
Whenever you tell, my story
For I am all I've done


Remember, I will still be here
As long as you hold me, in your memory
Remember me


I am that one voice in the cold wind, that whispers
And if you listen, you'll hear me call across the sky


As long as I still can reach out, and touch you
Then I will never die


Remember, I'll never leave you
If you will only
Remember me


Remember me...


Remember, I will still be here
As long as you hold me
In your memory


Remember, when your dreams have ended
Time can be transcended
I live forever
Remember me


Remember me
Remember... me..."

Thursday, December 22, 2011

750+ websites hacked by Minhal Mehndi and NoTtY_Raj (INDIAN HAcker).

We are already known with Minhal and NoTty_Raj.Minhal Mehndi & NoTty_raj strikes again. This time more than 750 websites get hacked. Earlier Minhal mehndi has hacked thousands of sites, databases and so on. Among them some are Mit.edu Database Hacking, Private information leak of NASA researchers, Harvard Computer Society site hacking and many more.
List of some hacked sotes are:
http://bluewafflesdisease.net/
http://www.cricketplug.com/

http://diseasepictures.net/

http://hindimovieslive.net/

http://mixflashgames.com/

http://mixforum.net/

http://mixgreetings.com/

http://mixlivestream.com/

http://mixtvstream.com/

http://mobilesplug.com/

http://www.pakcafe.net/

http://www.photoshoplight.com/

http://www.showbizlive.com/

http://songspklive.com/
U can get list of all hacked sites.click here.

40+ & 11 educational sites of Dutch hacked by Hitcher


One of the Pakistani hacker from Pakistan Cyber Force named Hitcher strikes again.This time he hacked and defaced more than 50 websites, among them there are 40+ Dutch sites, 11 Educational sites. If you dig the decent past you will find that Hitcher has hacked lost of high profile sites including Wipro Limited, Quadrant Televentures Ltd. (Aka HFCL Infotel) Media Centre, Fin Bank of Nigeria Hacked By Hitcher (Database), Cambridge Communications Limited, Progate Group Corporation, Geological Society Of India and many more.
List Of some of those websites are :
http://www.redsoft.org/admin-info/

http://www.erc2011.org/admin-info/

http://yzb.sntcm.edu.cn/admin-info/

http://gjc.sntcm.edu.cn/hitcher.html

http://shhl.sntcm.edu.cn/hitcher.html

http://yigw.sntcm.edu.cn/hitcher.html

http://yxmyx.sntcm.edu.cn/hitcher.html

http://yzb.sntcm.edu.cn/hitcher.html

http://zhenduan.sntcm.edu.cn/hitcher.html

http://zhyhx.sntcm.edu.cn/hitcher.html

http://zxcy.sntcm.edu.cn/hitcher.html

http://www.karcherwestmachines.be/hitcher.html

http://bouwmeteo.be/hitcher.html

http://cdenv-koksijde.be/hitcher.html

U can get list of all those websites. click here

Wednesday, December 21, 2011

Cyber Laws-- One should know

11:52 PM Posted by Administrator ,
We all are facing the problem of Hacking in one or the other way. But do we all know about the laws in which that culprit "Cracker" can really be punished?

If not, then, Indian Cyber Army is making an effort to make you aware about your rights so that a right step can be taken at the right time so that this "CYBER TERRORISM" can actually be stopped.

 

Section 43 - Unauthorised Access means Using someone account without permission and authentication.
Under the IT Act, 2008 no limit on amount of compensation for offences under Section 43.

Under IT Act, 2008 all the acts referred under section 43, are also covered u/Sec. 66 if they are done “dishonestly” or “fraudulently”.

Section 66(A) Sending of offensive or false messages , Also known as “Cyber Stalking”

Section 66(B) Dishonestly receiving stolen computer resource or communication device
Also covers use of stolen Computers, mobile phones, SIM Cards, etc
Punishment – imprisonment upto 3 years or fine upto Rs. 1 lakh or both

Section66(C) Identity theft
Fraudulently or dishonestly using someone else’s electronic signature, password or any other unique identification feature.
Punishment - Imprisonment upto 3 years and fine upto Rs. 1 lakh

Section 66(D) Cheating by personation
Cheating by pretending to be some other person
Punishment – imprisonment upto 3 years and fine upto Rs. 1 lakh.

Covers sending of menacing, offensive or false messages via SMS/EMAIL/MMS
Punishment – imprisonment upto 3 years and fine.

Section 66(E) Violation of Privacy ,Popularly known as Voyeurism
Pune spy cam incident where a 58-year old man was arrested for installing spy cameras in his house to ‘snoop’ on his young lady tenants

Covers acts like hiding cameras in changing rooms, hotel rooms, etc
Punishment –Imprisonment upto 3 years or fine upto Rs. 2 lakh or both.

Section 66(F) Cyber terrorism
Whoever uses cyberspace with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people
Punishment - Imprisonment which may extent to life imprisonment

Section 67 - Publishing or transmitting obscene material in electronic form.
Punishment
First instance - imprisonment upto 3 years and fine upto Rs. 5 lakh.
Subsequent - imprisonment upto 5 years and fine upto Rs. 10 lakh.

Section 67(A) Cyber Pornography.
Publishing or transmitting sexually explicit acts in the electronic form
Similarity with Sec. 292 IPC
Punishment
First instance - imprisonment upto 5 years Subsequent - imprisonment upto 7 years Fine upto Rs. 10 lakh.

Section 67(B)
Creating, collecting, browsing, downloading, etc of Child Pornography
Punishment
First instance - imprisonment upto 5 years.
Subsequent - imprisonment upto 7 years
Fine upto Rs. 10 lakh.

Section 69 – Government’s power to intercept
Government to intercept, monitor or decrypt any information generated through any computer resource if it thinks to do so in the interest of the sovereignty or integrity of India.

Section 67(C) – Preservation of information by intermediaries
Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe.

Section 72(A) - Liability of Intermediary not to disclose any personal information
Intermediary to act as per the terms of its lawful contract and not beyond it.
Punishment – imprisonment upto 3 years or fine upto 5 lakh or both.

Section 79- Liability of Intermediary
An intermediary not to be liable for any third party information, data, or communication link made available or hosted by him.

Liability of Intermediary:-
Intermediary need to prove that he didn’t –
Initiate the transmission,
Select the receiver of the transmission, and
Select or modify the information contained in the transmission and
The intermediary observes due diligence while discharging his duties under the Act.

Section 84(B) – Abetment
Abetting to commit an offence is punishable
Punishment – Same punishment provided for the offence under the Act

Section 84(C) – Abetment
Attempt to commit an offence is punishable.
Punishment – Imprisonment which may extend to one-half of the longest term of imprisonment provided for that offence

Section 78 – Investigation Powers
As per the IT Act, 2008 Cyber crime cases can be investigated by the “Inspector” rank police officers.
Under the IT Act, 2000 such powers were with the “DYSP/ACP”.

Section 77 (A) – Compounding of Offences
Compounding – “Out of court settlement”

Offences
“for which less than three years imprisonment has been provided” can be compounded.
Such offence should not affect the socio economic conditions of the country or
has been committed against a child below the age of 18 years or a woman.
These are the"Laws" according to the "IT AMENDMENT ACT 2008" which was passed in 2009. We all should be aware of our CYBER RIGHTS, so that we together can fight with the "CYBER THREATS"

Lady's Gaga Account hacked with over 17 million Followers | 17 million followers promised to get free ipad

Lady Gaga had her Twitter account hacked yesterday, leaving 17 million fans with spam links promising "free iPads."
It seems that popular pop star Lady Gaga has became a target of cyber criminals.The Twitter account of famous singer Lady Gaga has apparently been hacked. It's being used by attackers to lure her more than 17 million followers.The tweet from the musician's account read: "Monsters, I'm giving away FREE iPad2's to each one of you in the spirit of the holidays :) Go to bit.ly/s5MTqM to receive one!" Bit.ly was quick to update the link and flag it, but the hackers posted another one, this time promising free Macbooks.

Finally, Gaga (or her PR team) took back the account, tweeting: "Phew! The hacking is over! And just in time, I'm on my way to Japan! So excited to spend Xmastime with my TokyoMonsters!"

The damage was done, apparently, as 7000 fans did click the link, and a few even retweeted the message. Additionally, singers Nelly Furtado and Nicole Scherzinger were hit my same hacker(s), with their accounts offering free Apple products too.

Tuesday, December 20, 2011

President of the Republic of MAcedonia Hacked by Kosova Hackers security



Official website of President of the Republic of Macedonia
get hacked by Th3 Dir3ctory, Theta.Nu & X-Crepo from Kosova Hackers Security (KHS). The hackers have created a deface mirror on Arabzone. Earlier these hacker group has hacked thousands valuable of websites among them one of their biggest blow was Hotmail server hacking. What ever this attack of KHS on the Govt. of Macedonia again proves their strength.

Guyana Server Rooted | 1500 websites hacked and defaced by Teamgreyhat

10:00 PM Posted by Administrator
ONE of the famous hackers group Teamgreyhat strikes again. This time an Indian server rooted by TGH and more than 1500 websites get hacked and defaced. Few days ago TGH hacked the official of site T-Series. After that this is another big attack of Teamgreyhat. Earlier TGh has rooted many web-servers among them Theexpert Server, Malaysian Web-host, Cybertek Web-Server, 5gbfree.com and many more. Yesterday the President of the Republic of Macedonia website was hacked by KHS, behind that attack TGH plays the most significant role. Teamgreyhat has released a pastebin containing all the hacked sites and deface mirrors.