World cyber news is online news media.we bought daily hottest news occuring in the world related to cyber.. We propogate news specially related to hacking, technology updates , cyber world updates....

Thursday, May 03, 2012

Hackers Hacked Into NASA, Us Military , Us Air force ,European Space Agency,Harvard,European Space Agency & Many More Websites

1:15 PM Posted by Anonymous ,
A hacker collective called “The Unknowns” has published Two Pastebin document that allegedly proves they managed to gain unauthorized access to a number of high profile websites.



The list of targets includes the Bahrain Ministry of Defense, Thai Royal Navy, a subdomain owned by car manufacturer Renault, Harvard University, French Ministry of Defense, Jordanian Yellow Pages, European Space Agency (ESA), US Military’s Joint Pathology Center, NASA’s Glenn Research Center and the US Air Force.

After hacking They Release Lots Of Screen Shots , Leaked Data , Admin Access In Pastebin In Two Docs.

1st Docs : Click here
2nd Docs : Click here

Message By The Attacker On Pastebin After The Attack :

A Message:

We are The Unknowns; Our Knowledge Talsk and Wisdom Listens...

Victims, we have released some of your documents and data, we probably harmed you a bit but that's not really our goal because if it was then all of your websites would be completely defaced but we know that within a week or two, the vulnerabilties we found will be patched and that's what we're actually looking for.
We're ready to give you full info on how we penetrated threw your databases and we're ready to do this any time so just contact us, we will be looking forward for this.

And for all the other websites out there: We're coming, please, get ready, protect your website and stop us from hacking it, whoever you are. Contact us before we take action and we will help you, and will not release anything... It's your choice now.

And for the Public: We're looking for your support... Support us to deliver our message to everyone out there...



We are The Unknowns; Our Knowledge Talsk and Wisdom Listens...

New Vulnerability Analysis Tool Delivers Cyber Scope-ready Content

12:52 PM Posted by Anonymous ,
Xacta(R) Flux, the new vulnerability analysis tool recently released by Telos(R) Corporation, enables federal agencies to feed security scan results directly to CyberScope in keeping with mandates relating to the Federal Information Security Management Act (FISMA).

Xacta Flux collects and correlates data from a wide variety of security products into a single view and maps the results to the relevant controls for security and risk management. This same SCAP- (Security Content Automation Protocol) formatted output can be fed to the CyberScope tool without additional scanning or processing.

CyberScope is the online portal federal agencies must use to submit their security assessment and authorization (A&A) results for FISMA reporting. It was established by the Office of Management and Budget (OMB) and is managed for OMB by the Department of Homeland Security (DHS).

Agencies have been required by OMB to submit monthly reports via CyberScope since November of last year. More than one in five federal agencies did not report their results through CyberScope in Fiscal Year 2011, according to a recent OMB report.

"Federal agencies are making good progress in their use of CyberScope, but more needs to be done," said Rinaldi Pisani, Telos vice president and general manager, emerging technologies. "A SCAP-based vulnerability analysis and reporting tool such as Xacta Flux can help more agencies take advantage of the efficiency and consistency of reporting their security results through CyberScope."

About Telos Corporation

Telos Corporation has provided innovative IT solutions and services to the federal government for more than 30 years, focusing since 1997 on cybersecurity. Telos solutions ensure that the government's most security-conscious organizations comply with demanding federal and DoD information security mandates. Offerings include Xacta(R) IA Manager for enterprise IT security management, enterprise security consulting services, secure networks, secure enterprise messaging, and secure identity management solutions. Solutions are represented to the federal government on Telos' GSA schedule. For more information, visit http://www.telos.com .

SOURCE: Telos Corporation

Samsung to launch Next Galaxy Phone at London event

12:44 PM Posted by Anonymous ,
Samsung will put the rumours and alleged leaks about its next flagship smartphone to rest when it unveils the handset in London later on Thursday.




More than 20 million copies of the existing Galaxy S2 have been sold since its launch in April 2011.

Analysts say its success helped Samsung overtake Nokia to become the world's best-selling mobile phone maker.

Changes in screen size, form factor and a higher-resolution camera are among changes that may drive its appeal.

Battery life
Samsung has been close lipped ahead of the event, refusing even to confirm the device's name - its website only states that its is "the next Galaxy".

It has, however, said the phone will not include a 3D display, but will be the first device to feature its new Exynos 4 quad-core chip.

It promised the Arm-based design would offer double the processing capability while using 20% less energy than the chip used in the S2. It can also record and playback video in 1080p high definition resolution.

But many company watchers believe the presentation will concentrate on what the device is like to use rather than raw statistics.

"To the normal consumer the chip is not important per se, but the experience it offers is," said Carolina Milanesi, research vice president at the tech analysis firm Gartner.

"So less battery use, better touch response and the ability to better handle multitasking to let more operations be carried out simultaneously will all be noted."

Smartphone shoppers can be very fickle. Blackberry-maker Research In Motion and HTC have both seen sales lag after misjudging the appeal of their high-end devices to consumers.

But Gavin Byrne, principal analyst at telecoms experts CCS Insight believes Samsung should avoid the same pitfall.

"There are only two big companies in the smartphone market making sizeable volumes of profit at the moment - Samsung and Apple," he said.

"Samsung is now a long way ahead of its Android-based rival HTC after the Taiwanese firm had misses with some of its launches.

"Samsung on the other hand has finally learned the lesson that software and making its devices desirable in themselves counts, rather than just having the best technology and specifications."

Special event
The level of speculation surrounding the phone suggests Samsung's decision to hold a special event, rather than launch the handset at Barcelona's Mobile World Congress, is already paying off.

But that also increases the risk of a backlash if the upgrade is not seen as a major step forward.

"Events such as this are incredibly important as it gives the company a world stage to launch their product," said Stuart Miles, founder of the tech site Pocket-lint.

"I'm a great believer that trade shows are good for trade but not launches, as a company only has an hour until a rival's product comes along competing for attention.

"It's all about positioning and timing - if you don't get it right the fire isn't lit and the product won't carry forward."

Samsung will reveal details of the device at 7pm BST at London's Earls Court Exhibition Centre.

Source : BBC News

Motorola wins Xbox and Windows 7 ban in Germany

12:39 PM Posted by Anonymous ,
Motorola Mobility has been granted an injunction against the distribution of key Microsoft products in Germany.




The sales ban covers the Xbox 360 games console, Windows 7 system software, Internet Explorer and Windows Media Player.

It follows a ruling that Microsoft had infringed two patents necessary to offer H.264 video coding and playback.

A US court has banned Motorola from enforcing the action until it considers the matter next week.

The handset maker is in the process of being taken over by Google.

Appeal
This is just one of several cases involving about 50 intellectual properties that the smartphone maker has claimed that Microsoft should have licensed.

Microsoft has said that if it met all of Motorola's demands it would face an annual bill of $4bn (£2.5bn). Motorola disputes the figure.

A statement from Motorola said: "We are pleased that the Mannheim Court found that Microsoft products infringe Motorola Mobility's intellectual property. As a path forward, we remain open to resolving this matter. Fair compensation is all that we have been seeking for our intellectual property."

Microsoft said it planned to appeal against the German ruling.

"This is one step in a long process, and we are confident that Motorola will eventually be held to its promise to make its standard essential patents available on fair and reasonable terms for the benefit of consumers who enjoy video on the web," a spokesman said.

"Motorola is prohibited from acting on today's decision, and our business in Germany will continue as usual while we appeal this decision and pursue the fundamental issue of Motorola's broken promise."

US hearing
Microsoft moved its European software distribution centre from Germany to the Netherlands last month ahead of the verdict to minimise potential disruption.

However, Motorola cannot enforce the ruling until a Seattle-based judge lifts a restraining order.

The restriction was put in place after Microsoft claimed that Motorola was abusing its Frand-commitments - a promise to licence innovations deemed critical to widely-used technologies under "fair, reasonable and non-discriminatory" terms.

A hearing is scheduled for 7 May, although the judge may issue his ruling at a later date.

The German case is also likely to be considered by the European Commission.

It is carrying out two probes into whether Motorola's Frand-type patent activities amount to "an abuse of a dominant market position".

Source : BBC News

Looking For Vpn For Bypass Pirate Bay Ban

12:33 PM Posted by Anonymous , ,
Every people are increasingly turning to virtual private networks (VPNs) to anonymise their free sharing of music and movies, a new study has suggested.



Sweden's Lund University indicated that there had been a 40% rise in the number of 15 to 25-year-olds using such services since 2009.

Many believe a clampdown on piracy is behind their rise in popularity.

The Pirate Bay has advised visitors to make use of VPNs. It would be illegal to do so to download pirated files.

In its first public response since five of the UK's big ISPs agreed to block their subscribers from the file-sharing site, The Pirate Bay remained defiant.

"As usual there are easy ways to circumvent the block. Use a VPN service to be anonymous and get an uncensored internet access, you should do this anyhow," it said.

Some industry experts now believe that VPNs could become publishers' next target.

Anonymity systems
Once the preserve of the business world, VPNs are secure networks that allow data sharing behind heavily encrypted firewalls.

The fact that they allow users to swap files without being detected makes them perfect for pirates.


Virgin Media has begun blocking users' access to The Pirate Bay
"VPNs could become the next front in the battle against piracy," predicted independent music analyst Mark Mulligan.

He pointed to the growing popularity of VPNs such as BT Guard - in this case, BT stands for bit torrent not British Telecom.

Increasingly services such as the bluntly named HideMyAss have been taking extra measures to protect their users, he added.

"Some providers have already starting putting anonymity systems in place, such as not tracking IP addresses and deleting logs after seven days."

The music industry has changed its focus over the last year, away from targeting individual file-sharers to shutting off access to sites via domain name service blocking - meaning anyone typing in the address of a torrent site will not get through.

To achieve this, content providers must come to an agreement with internet service providers to block access or force the block via the courts.

Crackdowns against The Pirate Bay have now been enforced across Europe and are imminent in Britain.

Some have questioned the effectiveness of current blocks.

BT, for example, has adapted its porn filtering system known as Cleanfeed, but has made no secret of the fact that the system is not entirely foolproof.

Use of so-called proxy servers in conjunction with a VPN is one way to circumnavigate the filters.

"BT's Cleanfeed is the Rolls Royce of filtering software but there are always ways around it," said Mr Mulligan.

Source : BBC News

BBC News website wins People's Voice news award

12:29 PM Posted by Anonymous , ,
The BBC News website has won the People's Voice award for news at this year's Webbys.


Other awards went to Pinterest, Google+ and Spotify, all of whom picked up their first Webbys.

The Daily Beast won the judges' award for news website.

The People's Voice awards sit alongside the judges' awards and are voted for by online fans. This year nearly 1.5 million votes were cast from more than 200 countries.

The breakout of the year award went to Instagram, the photo-sharing startup recently bought by social media giant Facebook.

Facebook also won a People's Special Achievement for Social Change, set up to recognise the impact of the net on political development.

'Real honour'
Pinterest and Google+ picked up the more traditional social media award, Pinterest getting the official Webby and Google+ picking up the People's Voice award.

Commenting on the BBC News website's win in the news category, editor Steve Herrmann said: "It's a real honour to win the People's Voice award once again. This award is hugely appreciated by everyone working to make sure BBC News online remains such a valued service to the public, in the UK and around the world."

Other Webby winners included FactCheck.org which won the best political website, while spoof news site The Onion picked up five awards including Best Comedy website.

Non-profit organisation TED (Technology, Entertainment and Design), famous for its TED talks, also picked up several gongs this year, including ones for best app, best education site and best use of video.

Singer Bjork was among this year's special achievement winners for her Biophilia album, which has been dubbed the world's first app album.

The Webby awards were set up in 1996 and are voted on by a body of web experts. Seen by many as online equivalents of the Oscars, 2012 judges included Twitter co-founder Biz Stone and mobile phone inventor Martin Cooper.

"This year's winners represent an amazing cross-section of the new and continuing trends we've seen across the internet this year," said David-Michel Davies, executive director of the Webby Awards.

Winners will be honoured at an event in New York on 21 May, where each must deliver a five-word speech.

Source : BBC News

Report Says :Google Staff Knew of Wi-Fi Snooping

12:24 PM Posted by Anonymous , ,
The Google engineer who wrote a program that collected personal data from wi-fi networks told at least two other colleagues, a report has revealed.




Google released the full investigation conducted by the US Federal Communications Commission (FCC).

It said senior staff on the Street View team were unaware of the plans.

The company was fined $25,000 (£15,300) earlier this month for impeding the FCC's investigation, but was ruled to not have broken the law.

The report came two weeks after a heavily redacted version was released by the FCC at the time of the original fine.

It detailed how one Google engineer, referred to only as "Engineer Doe", produced a computer program capable of collecting data from people's unsecured home wireless networks.

The data gathered included contents of some emails and web browsing history.

'Collect, store and review'
The collection took place while Google was photographing areas in its Street View car between 2008 and 2010.

"Engineer Doe specifically told two engineers working on the project, including a senior manager, about collecting payload data," the agency said in its report.

"Engineer Doe intended to collect, store and review payload data for possible use in other Google projects."

However, the investigation added that other senior managers on the Street View team were unaware of Engineer Doe's actions.

Google said it wanted to now "put the matter behind us".

"We decided to voluntarily make the entire document available except for the names of individuals," the company said.

"While we disagree with some of the statements made in the document, we agree with the FCC's conclusion that we did not break the law."

Source : BBC News

Cybersecurity Bill a Step Toward Protection Against New Threats

12:13 PM Posted by Anonymous , ,
As the first anniversary of the death of Osama bin Laden approached last week, members of the House of Representatives were debating the impact of the Cyber Intelligence Sharing and Protection Act in Washington.



The bipartisan proposal passed, 248-168, on Thursday, despite the predictable threat of a White House veto if it is passed in the Senate. The House bill allows for the exchange of potentially threatening data between private companies and the National Security Agency, as well as other government departments.

A separate Senate bill would focus cybersecurity efforts in the Department of Homeland Security and require companies to increase their security for critical infrastructure, such as electrical and water systems. Both bills have merit and come at a time when digital data is in increasing danger of being stolen or intercepted by enemies of the United States. It is a new battleground where no one has an accurate road map to follow. The House has taken the initiative.

The Obama administration favors oversight by civilian agencies. Forcing private businesses to increase electronic security measures could be seen as another burden imposed on corporations large and small by Washington – driving up the cost of manufacturing in many cases. The House bill would give this authority to the NSA, a nationwide agency already well equipped to implement stronger measures to safeguard vital information. But that’s the kind of government involvement that sends liberal lawmakers into a tailspin.

“Supporters – Republicans and Democrats alike – said the proposal is a reasonable compromise between the need for privacy and security,” according to the news agency The Hill. “The intelligence community has the ability to detect cyber threats, these malicious codes and viruses, before they are able to attack our networks,” said Intelligence Committee ranking member Dutch Ruppersberger, D-Md. “But right now, federal law prohibits our intelligence community from sharing the classified cyber threat with the companies that will protect us that control the network, the AT&Ts, the Verizons, the Comcasts, those groups. We have the ability to give them the information to protect us,” according to The Hill.

Rep. Jared Polis, D-Colo., added that the bill is an “unprecedented, sweeping piece of legislation that would waive every single privacy law ever enacted in the name of cybersecurity.”

Yet supporters cooled the rhetoric by insisting that the federal government’s use of voluntarily provided information would be limited. No one argues that the line between privacy and intelligence-gathering is swizzle stick-thin. But ignoring the need to protect the country is a potentially fatal error. It is objectionable to compare the mission of CISPA to how nervous federal agencies dealt with domestic fears in the past, but that’s the tack taken Thursday on the House floor by Rep. John Lewis, D-Ga.

“We remember our nation’s dark past. Martin Luther King Jr.’s telephone was wiretapped. His hotel room was wiretapped. His home was wiretapped. Our offices were wiretapped. Our meetings were wiretapped. And it was not just people spying on civil rights activists, but people protesting against the war in Vietnam. We didn’t have a Facebook or Twitter or email. These new tools must be protected. Today, we have a mission, a mandate, a moral obligation to protect future generations of activists and protestors,” he said to the dozen or so members of Congress present.

Mr. Lewis should remember that every average American citizen deserves just as much protection as his “future generations of activists and protestors.”

Cybersecurity is an international issue that eclipses the former threats presented by the Students for a Democratic Society, for example. In 2010, the U.S. Chamber of Commerce’s network was compromised. Attackers stole six weeks of email correspondence from four employees who were focused on Asian policy and had access to all the information the Chamber of Commerce has on its 3 million members, according to the Wall Street Journal.

We cannot see the overseas individuals who would profit from acquisition of unsecure data. Congress needs to expedite an effective compromise to protect information. That’s the real “moral obligation” in Washington.

source : The Sun

Indian Cyber Army Is Organising A Ethical Hacking Boot camp In Kerala.

9:34 AM Posted by Anonymous , ,
INDIAN CYBER ARMY


According To A Update On INDIAN CYBER ARMY Official Facebook Page , They Are Going To Organise A Hacking Boot Camp In Kerala Of Five Days ( Date: 15-19 May 2012 ).

INDIAN CYBER ARMY Has Created A Facebook Event Too : Click Here

Key Features:

>>First time ever in Indian IT Industry, UGC + University recognized certification in Information Security & Ethical Hacking which is cost effective and accepted globally.

>>Course content is developed with the support of Department of Information Technology, Ministry of Communications and IT, Government of India.


Interested Persons Who Want To Join This Boot Camp :

Mail INDIAN CYBER ARMY : kerala@icalab.com

Or Contact INDIAN CYEBR ARMY South Zone : +91 88 8200 8200 or +91 88 8255 8255

Sunday, March 18, 2012

How To Join Official Indian Cyber Army # Ethical Hacking Training.# Membership

12:05 AM Posted by Anonymous , ,


Are You Looking For Best & Fastest Growing "Certified Ethical Hacker / Licensed Penetration Tester / Cyber Crime Forensics Expert / Certified Cyber Crime Lawyer Training "
Then, The Best Choice Is To Go For INDIAN CYBER ARMY.

One Question May Start Coming In Your Mind & Why We Are refering You For INDIAN CYBER ARMY?

#What Is INDIAN CYBER ARMY ? #What Is The Benefits Of Their Programs ? How To Join INDIAN CYBER ARMY ?



INDIAN CYBER ARMY : THE ORGANIZATION


Indian Cyber Army is the largest group of ethical hackers and cyber security experts involved into social service. Its sole aim is to research, analyze, train and develop technology. We are a team of Ethical Hacker, Security Experts, Programmers from across the globe involved into creating awareness in the field of cyber security and to reduce the increasing Cyber Crimes. Apart from creating awareness, we do researches in the field of IT security & ethical hacking, discovering vulnerabilities/loopholes in websites, networks, developing exploits and providing the advisories to overcome the exploit or loopholes. The team had been constantly trying to solve the social problem by creating awareness in the field of Cyber/ Digital Information Security to protect kids, students, youths, individuals, and organizations etc. from the unseen criminals of the wired and wireless world. Protecting the National Information Heritage, Financial freedom, privacy of the individuals and the intellectual property from the global menace of unseen cyber criminals is a social necessity. We strengthen the hands of people by strengthening the power that runs the world in this age of the internet..
A 100 % security can never be accomplished, but we can ensure that we quickly learn from our mistakes and avoid them in future. We have soldiers from every part of India and together we have put up an effort to secure the Indian cyber space. We are ready to Serve anybody who needs us for defending this vital information. Partner Organization with Symantec (Norton Antivirus), IBM India, Data Security Council of India (A Unit of NASSCOM), GFI, LEO Impact Securities and Many More Organizations Working in the field of Cyber Security.



RESEARCH & DEVELOPMENT


Indian Cyber Army also focuses to conduct high quality research in the general areas of security, and performance optimization in Networking, at affordable costs. The Centre will be a platform to provide defense against other threats such as information warfare. Our mission is to develop information infrastructures into more secure and reliable infrastructures and to enhance the communication networks and protocols of todays best-effort Internet. Hence, the urgent need to establish a Cyber Security Research Centre. We established Indian Information Security Research Organization [IISRO]. The research work to be undertaken in the Indian Information Security Research Organization and data collected here shall be of great benefit to the entire Research community. We aim at creating a technology rich environment conducive to constructive discussions and evolving thoughts which will lead to innovative ideas in unwiring and digitizing the world securely at affordable costs.


So why should a student go for Indian Cyber Army Programs We think the following summarizes the plethora of reasons why Indian Cyber Army Program is a dream for every Information Security and Ethical Hacking
enthusiast:



INDIAN CYBER ARMY is a Professional Cyber Security Organization Aimed with Digitally Secured.India, which is providing its services to government and Indian Police. It is the only Organization in India which is providing UGC recognized cyber security courses. As a result of these courses, Indian Cyber Army Certified Professionals will build real world security knowledge that will enable them to recognize vulnerabilities, expose system weaknesses and help safeguard clients against security threats. Professionals will learn the essentials of Networking and Ethical Hacking, along with the added professional edge of new corporate demands.



> Information Security and Ethical Hacking is best understood by applying it in System Administration or Network Administration.
> Information Security and Ethical Hacking have a lot of scope in career.
> A participant gets to learn and apply Information Security which is important for every system and network administrators.
> This is the best way to get to know other Ethical Hacking enthusiast around the country.
> One gets to be in touch with the most talented and experienced professionals in this area of academics and interacts with them.
> Receive an unparalleled education on the art of computer security with personal one-on-one attention from the Indian Cyber Army Cyber Security Team.
> Learn and interact with one of the most respected authorities on computer security
> Toppers of each batch to be personally interviewed by Indian Cyber Army and will receive a chance to work with them on security projects at Cyber Crime Investigation Bureau, New Delhi or Indian Information Security Research Organization (IISRO) under Indian Cyber Army Student Partners Program (ICASP).
> Indian Cyber Army Ethical Hacking & Information Security Software Tool Kit with Manual for each student. Study materials prepared by the legends of hacking world.
> Authorized Certificate, recognized in the security industry globally after the completion of the Workshop.
> 24x7 Live Doubt Clearing Sessions via Chat by Experts and Webinars.
> Free Membership*** to “Indian Cyber Army” India's first White Hat Hacker's Team.
> One Year Free Subscription to “Hackcrypt” Magazine (E-Copy)



## Any Person From Any Country Of The World Can Join /Take Training From INDIAN CYBER ARMY Experts.

To Join INDIAN CYBER ARMY Or For Any Queries Mail at training@indiancyberarmy.org

Indian Cyber Army Is Also Recruiting Security Professionals, Marketing Specialist And Techno Crates For The Post Of State Executive Officer All Over India in All States and Union Territories.
Interested Applicant Can Mail Their Resume Along With Their Qualification Documents at hr@indiancyberarmy.org

For Any Other Query Contact
+91 78 3877 3877 or +91 7827 422 422
between 10AM to 8PM All Days.


Website : http://www.indiancyberarmy.org
Facebook: Click here
Chat With INDIAN CYBER ARMY Team : Click Here


Source : INDIAN CYBER ARMY Blog

Thursday, January 19, 2012

Cybercriminals stole $5 million in 72 hours

12:26 PM Posted by Administrator ,


While the rest of the world was making resolutions and sleeping off a night of partying, a South African cybercrime gang rang in the New Year by stealing more than $5 million from a government bank.

In a 72-hour span ending shortly after 6:00 a.m. Jan. 3, the crooks made off with 42 million rand (about $5.2 million) from the state-owned Postbank, part of the South African Post Office that holds about 4 billion rand in deposits, the South African newspaper Times Live reported.

South Africa's National Intelligence Agency and the police have launched an investigation but no suspects have been named. The bank said none of its more than 4 million customers were affected.

The high-tech heist began in the end of December, when members of the criminal gang began opening accounts across the country with Postbank. Over the New Year holiday break, the syndicate infiltrated a Rustenberg Post Office employee's computer. From there, the crooks were able to access Postbank's server and make fraudulent deposits to the numerous accounts they'd just set up.

Suspicion grows China was behind hack of U.S. commission

12:22 PM Posted by Administrator , ,


News of the hacking of the U.S.-China Economic and Security Review Commission surfaced earlier this month when an amateur "hacktivist" group purporting to operate in India published what it said was a memo from an Indian Military Intelligence unit to which extracts from commission emails were attached.

But U.S. officials who spoke to Reuters on condition of anonymity said the roundabout way the commission's emails were obtained strongly suggests the intrusion originated in China, possibly by amateurs, and not from India's spy service.

A large cache of raw email data from the security breach, reviewed by Reuters, indicates that the principal target of the intruders was not the commission, but instead a Washington-based non-governmental pro-trade group called the National Foreign Trade Council (NFTC).

The trade council is headed by William Reinsch, a former top U.S. Commerce Department official who until recently served as the U.S.-China Commission's chairman.

A large proportion of the raw email traffic downloaded by the hackers consists of messages to and from Reinsch at his NFTC email address. Many of the emails were spam, but some related to the work of the commission, which was set up by Congress to take a critical look at a wide range of U.S. dealings with China.

Reinsch told Reuters that the NFTC first became aware in November that large quantities of its message traffic had been hacked. He said that law enforcement authorities, including the FBI, had been quickly notified. The FBI has declined comment.

Reinsch said he could think of "no particular reason" why the Indian government or Indian hackers would be interested in him. By contrast, he and several other U.S. officials said that Chinese hackers, whether amateur or directly affiliated with Chinese government, would have great interest in the U.S.-China Commission's activities, both public and private.

Facebook Is Also Not In Support Of SOPA and PIPA

12:14 PM Posted by Administrator , ,


Mark Zuckerberg the founder of Facebook has announced that facebook is also not in support of SOPA and PIPA.

Lets read the announcement in Mark Zuckerberg words :

The internet is the most powerful tool we have for creating a more open and connected world. We can't let poorly thought out laws get in the way of the internet's development. Facebook opposes SOPA and PIPA, and we will continue to oppose any laws that will hurt the internet. The world today needs political leaders who are pro-internet. We have been working with many of these folks for months on better alternatives to these current proposals. I encourage you to learn more about these issues and tell your congressmen that you want them to be pro-internet. You can read more about our views here: https://www.facebook.com/FacebookDC?sk=app_329139750453932.

Israeli Hackers Reveal Details of 4,800 Saudi Credit Cards

12:13 PM Posted by Administrator ,


The cyber war between Israeli hackers and Saudi hackers is growing day by day.Israeli hackers claim to break into database of one of Saudi Arabia's largest banks.

Israeli hackers unveiled details of approximately 4,800 credit cards from various accounts held in Saudi Arabia.

The hacker group, which goes by the name Nuclear, was able to reveal many more details than in the past, including card number, password, security code, code type, and expiration date. The hackers claim they were able to access the information after hacking into the database of one of Saudi Arabia's largest banks.

The latest round come one day after Israeli hackers brought down the websites of both the Saudi Stock Exchange (Tadawul) and the Abu Dhabi Securities Exchange (ADX).The hackers were able to paralyze the Tadawul website, while causing significant delays to the ADX exchange site.

Wednesday, January 18, 2012

Virgin Boss Richard Branson in .xxx domain Name Dispute

3:12 PM Posted by Administrator , ,


The company took the action after an individual unconnected with the company registered the name.

"We have a complaint against the owner of richardbranson.xxx," a Virgin spokesman said.

The top-level domain launched last year after considerable debate. Virgin said it was spending an increasing amount of time protecting its brands, including the Branson name, online.

In order to win control of the domain Virgin has filed an application with the National Arbitration Forum, a body which deals with domain name disputes.

Web changes

The .xxx domains went on sale for the first time on 6 December.

Last week Icann, the body which has overall responsibility for the system, opened applications for a further expansion of the net naming system.

Under the new scheme it will be possible to register almost any word as a domain name suffix.

Critics argued companies would have to spend large amounts of money to protect themselves from cybersquatters.

"We spend a lot of time protecting the Virgin brand and the Richard Branson name and increasingly this takes us online," a spokesman told the BBC.

"We do see this as a growing problem with the changes to top-level domains and we not alone," he added.

ICM Registry, which oversees the .xxx domains, had offered firms the chance to pay a one-off fee to protect their brands prior to the scheme's launch.

Virgin's claim will turn on factors such as whether the original registration was in good faith and what legitimate interest the present owner may have to the use of the name.

World IPv6 Launch Day Set to Aid Net Address Switchover

3:08 PM Posted by Administrator , ,


IPv6 is the new net address system that replaces the current protocol IPv4, which is about to run out of spaces to allocate.

Web companies participating in the event have pledged to enable IPv6 on their main websites from that date.

The Internet Society, which made the announcement, said the day represented "a major milestone" in the deployment of the standard.

Facebook, Google, Microsoft Bing and Yahoo are the inaugural web firms involved.

Problem solving

IPv6 is incompatible with IPv4, so the transition has required old hardware to be replaced or updated.

Internet service providers (ISP) taking part have promised that by the launch date they will have enabled at least 1% of their fixed line subscribers to visit IPv6-enabled websites. The ISPs involved include the US firms AT&T and Comcast, and the Dutch firm XS4all.

The home networking equipment manufacturers Cisco and D-Link say they aim to enable IPv6 on all their home router products by the date.

And Akami and Limelight - two firms that help improve third parties' delivery of content over the net - have also promised to allow their customers to join the list of firms participating in the scheme by enabling the new protocol throughout their infrastructure.

Amsterdam-based RIPE NCC, which allocates IP addresses in Europe, the Middle East and parts of Asia, said: "Operational experience and measurements on World IPv6 Launch will help content providers and ISPs to identify and rectify any potential problems with delivering services."

Facebook's vice president of infrastructure engineering, Jay Parikh, added: "Last year's industry-wide test of IPv6 successfully showed that the global adoption of IPv6 is the best way to keep web devices communicating in the future.

"Permanently enabling IPv6 is vital to keeping the internet open and ensuring people stay connected online as the number of web users and devices continue to grow."

Yahoo co-founder Jerry Yang resigns from its board

3:00 PM Posted by Administrator , ,


Mr Yang founded the online company in 1995 with David Filo and was its chief executive from June 2007 until January 2009.

His resignation comes two weeks after the company hired former PayPal executive Scott Thomson to be its new chief executive.

Mr Yang annoyed some shareholders by turning down a $47.5bn (£31bn) takeover offer from Microsoft in 2008.

The company's current market value is about $20bn.

Mr Yang has also resigned from the boards of Yahoo Japan and Alibaba Group and said in a statement: "The time has come for me to pursue other interests outside of Yahoo!".

He also expressed support for the company's current management.

"I am enthusiastic about the appointment of Scott Thompson as Chief Executive Officer and his ability, along with the entire Yahoo! leadership team, to guide Yahoo! into an exciting and successful future," he said.

Yahoo! shares rose 3.4% in after-hours trading.

Some analysts had seen Mr Yang as an impediment to the sale or restructuring of the business.

"This is clearly a positive. It provides a more objective and unemotional approach to strategic alternatives," said Brett Harriss at Gabello & Co.

"It's also good for the new CEO. He has one less entrenched legacy board member to resist his vision."

In addition to leaving the board, Mr Yang is also giving up his title of "Chief Yahoo".

"While I and the entire board respect his decision, we will miss his remarkable perspective, vision and wise counsel," said Yahoo! chairman Roy Bostock.

Facebook Koobface Worm 'Hacker Gang Named'

2:51 PM Posted by Administrator , ,


Alleged cybercriminals behind an internet worm, which spread via Facebook and other social networks, have been named.

The suspected gang were tracked down to St Petersburg after an investigation by Facebook and cybersecurity researchers.

The worm gave the gang control of hundreds of thousands of computers.

While not the largest such network of hijacked machines or "botnet", the so-called Koobface worm is notable for its targeting of social networks.

The security company Sophos published details of an extensive investigation into Koobface on its blog.

The report, based on work by independent researcher Jan Dromer, and the firm's Dirk Kollberg, details how the suspects were tracked down.

Graham Cluley, a senior technology consultant at Sophos, told the BBC he believed they had identified the right people: "We're pretty confident. I mean obviously we have to assume these people are innocent until proven guilty

"It's very difficult to be 100% certain of these things. Of course it's always possible that someone could be trying to frame these people, but the evidence feels pretty strong to us. Certainly there's enough evidence to investigate these people."


None of the alleged gang members have been arrested or charged with offences connected to Koobface.

The BBC attempted to contact members of the group via a business linked to the gang but was unsuccessful.

Security researchers say Koobface became active in 2008.

The worm spread through social networks, presenting users with bogus links to online videos.

The links encouraged users to install a copy of the Koobface malware masquerading as a Flash update.

The worm was even able to create fake social networking profiles able to propagate the malware.

"It can create Facebook accounts and then use those accounts to start sending links to people," Mr Cluley said.

Researchers believe that up to 800,000 machines could have been infected by the worm.

Facebook is expected to share details of the gang with security and internet companies later.

Mr Cluley is aware that publishing details of the suspects will affect the inquiry into their activities: "These sort of investigations can take years. I think in an ideal world then these identities wouldn't have become public knowledge. But the cat is out of the bag now and we have to take a different tactic.

Google protests SOPA on home page

2:13 PM Posted by Administrator , ,


18 January means today will mark the apocalypse of the internet. Two of the world’s biggest websites, Wikipedia and Reddit, will shut down for 24 hours in order to protest the Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA)–two bills that the U.S. government is trying to pass.

In addition to the participation of these huge websites in the protest, the top website in the world, Google, will join in tomorrow–using the leverage of their homepage. This simple webpage just happens to get over a billion page views every day of the year! Take that SOPA!

A Google spokesperson recently told Mashable that there will be a link on the homepage for any of these hundreds of millions of people to click on in order to learn more about SOPA and its congressional counterpart, PIPA. The links will also include reasons why global tech firms like Google, Reddit, and Wikipedia oppose the bills.

“Like many businesses, entrepreneurs and web users, we oppose these bills because there are smart, targeted ways to shut down foreign rogue websites without asking American companies to censor the Internet,” the spokesperson said in an e-mail statement. “So tomorrow we will be joining many other tech companies to highlight this issue on our U.S. home page.”

Although these head honchos of the world wide web are making a full-fledged attack on the government act, there are some household website that aren’t taking the same kind of action, one of these being Twitter. Following the news that had surfaced in the last few weeks of the Wikipedia and Reddit blackout, and in response to the call for help, CEO of Twitter, Dick Costolo responded to this by stating: “closing a global business in reaction to single-issue national politics is foolish.”

Social networking site Twitter was also part of the protest letter that was sent to the senate in, but they would rather not shut down their site. Google, Wikipedia and Reddit are using their influence to raise awareness about these controversial bills. Time will tell if these bills ever see the light of day; but with President Obama in opposition, it is unlikely that PIPA and SOPA will pass.

Anonymous to Hack Sony on Monday

2:07 PM Posted by Administrator ,


Hackers from Anonymous are planning to attack Sony for once supporting SOPA next Monday, according to a report from SC Magazine, which claims that both Sony.com and the Sony Music store are the targets.
‘Hacktivists’ from the collective are reportedly plotting to load Sony’s homepage with BitTorrent files, which are exactly the type of Internet content SOPA is aimed at closing, and deface the executive bios that sit on the corporate site. Furthermore, they are planning to cause more issues by removing the price of all of the content in its store, effectively making everything in there free.
The project is being referred to as a “payload” which suggests that the hackers are planning to militarise to bring their hacking plans to fruition.
A number of Anonymous’ teams are being used to get things into place, according to the report, which explains:


Certain skilled hackers have been placed into elite, members-only teams, Eta, Theta and Zeta, which have been tasked with hacking into Sony’s online stores so the payload may be uploaded.

Eta is working to remove price tags from the Sony store, Zeta is aiming to set the payload up and direct anyone who visits Sony.com to it, to maximise the chaos. The Theta has been tasked with securing the hack against any measures that Sony may take to fix the situation.

The rest of the teams – Alpha, Beta, Delta and Gamma — are developing the payload for anyone to take part and add their own torrents, while they are specifically locating copyright-infringing torrents to place further emphasis on SOPA and the issues.

A draft Anonymous press release is apparently claiming that the collective is able to cause mayhem from its previous efforts hacking into Sony systems:

“Last April, we took down the Playstation Network. We are firmly rooted in your servers and we can, at will, take them down again.”


rom its enquiries, SC Magazine believes that the hackers are conscious of their public image following the series of hacks that they have carried out, which have included exposing Sony gamers’ details. This new project appears to be aimed at providing social awareness through hacking, rather than just causing outright chaos.

The original report appears to have been compiled with considerable access to the workings of Anonymous, or at least by communicating with sources that are close to the organisation. It remains to be seen whether the plans will hatch as is anticipated or whether Sony will be able to thwart it in advance of the hack.

Sony backtracked on its support of SOPA late last year, having come under criticism from across the Internet, with Anonymous itself threatening the company with action. Despite the change of stance, it seems that the hacking collective is intent on picking out the company for treatment, once again.

HuffPost's Twitter account hacked

2:02 PM Posted by Administrator ,


News aggregator Huffington Post twitter account has been hacked by twitter hacker,replacing its story teases with racist and homophobic messages.


CNET said the offensive tweets were quickly deleted, although they still appeared on subscribers' third-party Twitter clients.


"Sorry about that, Twitterverse! We know we've been hacked and are working to resolve the issue as quickly as possible," the Huffington Post tweeted upon acknowledging the attack.

Acuinetix 8 going to release soon.

12:36 PM Posted by Administrator ,


Acuinetix is one of the best web vulnerability scanner used to detect vulnerability of websites and to patch them.

A new version of "Acuinetix" (Beta version) is going to release soon with many new features..


The brief presentation of its features is described in this video :

Tuesday, January 17, 2012

Brazen Brazilian Hackers Opening Cyber Crime Schools

11:56 PM Posted by Administrator , ,


Brazilian hackers are mostly known for their stealing and misusing phished banking credentials and credit card numbers, but also for their penchant to openly brag online about their illegal activities.

"To help new 'entrepreneurs' or beginners interested in a life of cybercrime, some Brazilian bad guys started to offer paid courses," he reveals. "Others went even further, creating a Cybercrime school to sell the necessary skills to anyone who fancies a life of computer crime but lacks the technical know-how."

“This course is intended for everybody making online transactions. You will learn how crackers take control of corporate or home computers, what social engineering is all about, how 'auto-infect' works, how to use sources (of Trojans), how to manipulate the security plugins installed on browsers such as IE, Firefox, Chrome, Avant, Opera, and antivirus and firewalls. How spamming helps to catch new victims, what 'loaders' do and how crackers use them. You’ll learn all the slang used by crackers and bankers and find out about things like 'loaders', 'info', 'cc', 'admin', 'laras (money mules)', 'Desco, Ita, Uni, Sta, CEF, BB, City (popular names of Brazilian Banks), and much more. You’ll discover how crackers clone credit cards, checkbooks, IDs, driver’s licenses, birth certificates and other documents. You’ll learn how crackers can own e-commerce websites that store credit card numbers and what they do with this data. You’ll learn about the laws in Brazil and what the sentence is if you’re caught, as well as what risks you run and how to avoid getting caught. All this and much more is part of our course,” the "banking" course is explained on the school's website, and the spamming course comes complete with 60 million neatly categorized email addresses so that the newly initiated spammer can start churning out spam immediately.

IN US CYBER ATTACK COSTS NEARLY US$500K

3:59 PM Posted by Administrator , ,



Losses occuring from cyber attack is growing at a great rate.

According to a new report from Symantec Corp., direct consequences from cyber attacks, such as lost revenue, combined with indirect losses, including brand and reputation damage, cost companies an average of US$470,000 in 2011.

Last October, Applied Research contacted 1,415 IT professionals in 32 countries, 125 of which were from Canada, on behalf of the world’s largest security software maker to produce the 2012 Endpoint Security Best Practices survey.

Attacks against business endpoints — including networks, virtual servers, Websites and physical devices such as desktops, laptops, smartphones and tablet — can have costly, widespread implications.

In the results of a different survey released last September, Symantec found more than 430 million adults globally fell victim to a cyber attack in 2010, accounting for a total of US$388-billion in direct and indirect losses.

'70 per cent of public sector people not expecting cyber crime attack'

3:52 PM Posted by Administrator , ,


According to the survey from PricewaterhouseCoopers just 28 per cent of people questioned in the public sector said they were likely to suffer a cyber crime attack during the next 12 months, with 14 per cent already having suffered an attack.

The research, which also showed 40 per cent of respondents to believe cyber crime was on the rise, also suggested that senior people within organisations were not placing sufficient emphasis on managing threats from cyber crime fraud. Almost half of boards were said not to review the threat more than once a year.

And despite finding that more than half of public sector bodies had in-house capabilities to detect cyber crime attacks, the majority were said not to have resources to investigate them, instead relying on external forensic technology companies.

Andrew Miller, PwC's head of information security in government said it was "vital" public sector bodies invested in cyber crime monitoring capabilities and that they needed to "align their management structures to take timely actions if a cyber incident occurs".

The survey on global economic crime questioned 184 respondents from the public sector from 36 countries, 27 of which were from the UK..

Team Grey Hat Official Forum Hacked.

12:35 PM Posted by Administrator


Team Grey hat official forum has been hacked by a hacker named "Hunt" and has defaced the index page.Earlier Team Grey Hat has hacked many websites , rooted many servers.One of the most popular was Hacking of Ankit Fadia Website "

Reaction of Team Grey Hat upon this:

Team Grey Hat has released a statement on Pastebin saying that "HUNT"(the person who has hacked their website) was the core member of "Team Grey Hat"and he has full privilege on their server.


Click Here to read full statement.



Message from Team World Cyber News:

We are online media channel. we can post any news occuring in the world that we will get from any media. So, dont ever try to threaten us.Do whatever you can do.

English Wikipedia anti-SOPA Blackout

9:07 AM Posted by Administrator


Today, the Wikipedia community announced its decision to black out the English-language Wikipedia for 24 hours, worldwide, beginning at 05:00 UTC on Wednesday, January 18 (you can read the statement from the Wikimedia Foundation here). The blackout is a protest against proposed legislation in the United States —the Stop Online Piracy Act (SOPA) in the U.S. House of Representatives, and the PROTECTIP Act (PIPA) ain the U.S. Senate— that, if passed, would seriously damage the free and open Internet, including Wikipedia.

This will be the first time the English Wikipedia has ever staged a public protest of this nature, and it’s a decision that wasn’t lightly made. Here’s how it’s been described by the three Wikipedia administrators who formally facilitated the community’s discussion. From the public statement, signed by User:NuclearWarfare, User:Risker and User:Billinghurst:

It is the opinion of the English Wikipedia community that both of these bills, if passed, would be devastating to the free and open web.

Over the course of the past 72 hours, over 1800 Wikipedians have joined together to discuss proposed actions that the community might wish to take against SOPA and PIPA. This is by far the largest level of participation in a community discussion ever seen on Wikipedia, which illustrates the level of concern that Wikipedians feel about this proposed legislation. The overwhelming majority of participants support community action to encourage greater public action in response to these two bills. Of the proposals considered by Wikipedians, those that would result in a “blackout” of the English Wikipedia, in concert with similar blackouts on other websites opposed to SOPA and PIPA, received the strongest support.

On careful review of this discussion, the closing administrators note the broad-based support for action from Wikipedians around the world, not just from within the United States. The primary objection to a global blackout came from those who preferred that the blackout be limited to readers from the United States, with the rest of the world seeing a simple banner notice instead. We also noted that roughly 55% of those supporting a blackout preferred that it be a global one, with many pointing to concerns about similar legislation in other nations.

In making this decision, Wikipedians will be criticized for seeming to abandon neutrality to take a political position. That’s a real, legitimate issue. We want people to trust Wikipedia, not worry that it is trying to propagandize them.

But although Wikipedia’s articles are neutral, its existence is not.


From Wikimedia :

"We depend on a legal infrastructure that makes it possible for us to operate. And we depend on a legal infrastructure that also allows other sites to host user-contributed material, both information and expression. For the most part, Wikimedia projects are organizing and summarizing and collecting the world’s knowledge. We’re putting it in context, and showing people how to make to sense of it.

But that knowledge has to be published somewhere for anyone to find and use it. Where it can be censored without due process, it hurts the speaker, the public, and Wikimedia. Where you can only speak if you have sufficient resources to fight legal challenges, or, if your views are pre-approved by someone who does, the same narrow set of ideas already popular will continue to be all anyone has meaningful access to.

The decision to shut down the English Wikipedia wasn’t made by me — it was made by editors, through a consensus decision-making process. But I support it.

Like Kat and the rest of the Wikimedia Foundation Board, I have increasingly begun to think of Wikipedia’s public voice, and the goodwill people have for Wikipedia, as a resource that wants to be used for the benefit of the public. Readers trust Wikipedia because they know that despite its faults, Wikipedia’s heart is in the right place. It’s not aiming to monetize their eyeballs or make them believe some particular thing, or sell them a product. Wikipedia has no hidden agenda: it just wants to be helpful.

That’s less true of other sites. Most are commercialy motivated: their purpose is to make money. That doesn’t mean they don’t have a desire to make the world a better place –many do!– but it does mean that their positions and actions need to be understood in the context of conflicting interests.

My hope is that when Wikipedia shuts down on January 18, people will understand that we’re doing it for our readers. We support everyone’s right to freedom of thought and freedom of expression. We think everyone should have access to educational material on a wide range of subjects, even if they can’t pay for it. We believe in a free and open Internet where information can be shared without impediment. We believe that new proposed laws like SOPA –and PIPA, and other similar laws under discussion inside and outside the United States– don’t advance the interests of the general public. You can read a very good list of reasons to oppose SOPA and PIPA here, from the Electronic Frontier Foundation.

Why is this a global action, rather than US-only? And why now, if some American legislators appear to be in tactical retreat on SOPA?

The reality is that we don’t think SOPA is going away, and PIPA is still quite active. Moreover, SOPA and PIPA are just indicators of a much broader problem. All around the world, we’re seeing the development of legislation seeking to regulate the internet in other ways while hurting our online freedoms. Our concern extends beyond SOPA and PIPA: they are just part of the problem. We want the Internet to remain free and open, everywhere, for everyone.

On January 18, we hope you’ll agree with us, and will do what you can to make your own voice heard.

Sue Gardner,
Executive Director, Wikimedia Foundation"

Monday, January 16, 2012

Israel's Stock Exchange and National Carrier's Website Hacked

8:08 PM Posted by Administrator


The websites of Israel's stock exchange (TASE) and national carrier, El Al, were hacked today by pro-Palestinian hacker group, "Nightmare", a day after Islamist Hamas called upon to instensify cyber war against the Jewish state.

The recent attack follows a wave of similar hacking attacks in which credit card information of thousands of Israelis were released by a hacker, claming to be Saudi.

"The penetration into Israeli websites opens a new front for electronic resistance and war against the Israeli occupation," Hamas spokesperso, Sami Abu Zuhri, said yesterday during a news conference in the Gaza Strip.

While El Al's website could not load at all, the stock exchange was only presenting trade figures, without the possibility to perform any other action.

Stock market officials however said that trading was going on as usual, as the computer system that manages it is separate from the website.

A TASE spokesperson confirmed that the trading system and the website are not connected, emphasising that the trading system was in no way damaged by the hack.

El Al said they were "taking safety measures in the operations of the company's website," and that disruptions were to be expected.

Zappos.com hacked; 24 million Customers Effected

7:58 PM Posted by Administrator
Online retailer Zappos.com is asking its 24 million customers to reset their passwords after a cyberattack, according to a posting on the company's website.

"We were recently the victim of a cyber attack by a criminal who gained access to parts of our internal network and systems through one of our servers in Kentucky," says the posting, which was sent out as an e-mail from company CEO Tony Hsieh to Zappos employees on Sunday.

The company said it had expired and reset customers' passwords and would be sending an e-mail with further instructions to all its customers. It also posted password reset instructions on its website.

Zappos said that hackers gained access to customers' names, e-mail addresses, billing and shipping addresses, phone numbers, and the last four digits of credit card numbers and encrypted passwords.

Full credit card numbers and other payment info were stored on a separate server which was not hacked, the company said.

Because it expects a deluge of phone calls related to the hacking, Zappos said it was temporarily turning off its phones and would answer all inquiries by e-mail.

"If 5% of our customers call, that would be over 1 million phone calls, most of which would not even make it into our phone system in the first place," the company's e-mail to employees said.

"We've spent over 12 years building our reputation, brand, and trust with our customers. It's painful to see us take so many steps back due to a single incident," Hsieh's e-mail said..

The e-mail also went out to customers of Zappos discount website, 6pm. com.

While large, the hacking attack was not the largest of the past year. In April, Sony's PlayStation Network, with 70 million customers, was hacked, with an "unauthorized person" obtaining users' names, home addresses, e-mail addresses, birth dates and passwords, according to Sony.

New Wireshark Ver 1.4.11 & 1.6.5 Released

5:31 PM Posted by Administrator


Wiredhark is the world’s most popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. Wireshark is widely used by system admins and also cyber criminals as because Wireshark has the capability to sniffing packets.

The following vulnerabilities have been fixed.

Laurent Butti discovered that Wireshark failed to properly check record sizes for many packet capture file formats. (Bug 6663, bug 6666, bug 6667, bug 6668, bug 6669, bug 6670)

Versions affected: 1.4.0 to 1.4.10, 1.6.0 to 1.6.4.

wnpa-sec-2012-02

Wireshark could dereference a NULL pointer and crash. (Bug 6634)

Versions affected: 1.4.0 to 1.4.10, 1.6.0 to 1.6.4.

wnpa-sec-2012-03

The RLC dissector could overflow a buffer. (Bug 6391)

Versions affected: 1.4.0 to 1.4.10, 1.6.0 to 1.6.4.

The following bugs have been fixed:

"Closing File!" Dialog Hangs. (Bug 3046)

Sub-fields of data field should appear in exported PDML as children of the data field instead of as siblings to it. (Bug 3809)

Incorrect time differences displayed with time reference set. (Bug 5580)

Wrong packet type association of SNMP trap after TFTP transfer. (Bug 5727)

SSL/TLS decryption needs wireshark to be rebooted. (Bug 6032)

Export HTTP Objects -> save all crashes Wireshark. (Bug 6250)

Wireshark Netflow dissector complains there is no template found though the template is exported. (Bug 6325)

DCERPC EPM tower UUID must be interpreted always as little endian. (Bug 6368)

Crash if no recent files. (Bug 6549)

IPv6 frame containing routing header with 0 segments left calculates wrong UDP checksum. (Bug 6560)

IPv4 UDP/TCP Checksum incorrect if routing header present. (Bug 6561)

Incorrect Parsing of SCPS Capabilities Option introduced in response to bug 6194. (Bug 6562)

Various crashes after loading NetMon2.x capture file. (Bug 6578)

Fixed compilation of dumpcap on some systems (when MUST_DO_SELECT is defined). (Bug 6614)

SIGSEGV in SVN 40046. (Bug 6634)

Wireshark dissects TCP option 25 as an "April 1" option. (Bug 6643)

ZigBee ZCL Dissector reports invalid status. (Bug 6649)

ICMPv6 DNSSL option malformed on padding. (Bug 6660)

Wrong tvb_get_bits function call in packet-csn1.c. (Bug 6708)

[UDP] - Length Field of Pseudo Header while computing CheckSum is not correct. (Bug 6711)

pcapio.c: bug in libpcap_write_interface_description_block. (Bug 6719)

Memory leaks in various dissectors.

Bytes highlighted in wrong Byte pane when field selected in Details pane.



To download Wireshark. Click Here

Dutch Govt. Setup National Cyber Security Centre (NCSC) To Protect Cyber-Crime

5:28 PM Posted by Administrator


Now the Dutch Govt. is also paying attention to secure the Cyber Fence. To protect cyber crime and enhance cyber security The Dutch government has set up a new National Cyber Security Centre (NCSC) to deal with with the growing problem of online crime. The NCSC, which is a public-private partnership, commenced operations on 1 January 2012. Its ambition is to grow, in a phased manner, into the cooperation platform for cyber security in the Netherlands. In 2011 more than 123K web pages of Netherland was infected by Lilupophilupop attack and also recently a Hacker Group named The Hackers Army has hacked thousand of Dutch sites while running their operation named #OPfreePalestine. Dutch cyber fence also been target from different part of the world. So this newly formed NCSC was indeed needed by Dutch Authorities.
In the Netherlands several government departments are involved in the fight against cyber crime - and that's precisely the problem. The NCSC should improve coordination between them. The centre will bundle together a lot of knowledge and expertise. The NCSC is composed of over sixty people and will deal especially with the major issues. Wouter Stol is cyber safety expert at the NHL University of Applied Sciences in Leeuwarden.

PC-BSD 9.0 Released

5:24 PM Posted by Administrator


Being based on today's release of FreeBSD 9.0, the announcement of the publication of PC-BSD version 9.0 will not be a surprise to observers of BSD Unix releases. PC-BSD 9.0 is the latest version of the desktop-oriented distribution of FreeBSD that includes a variety of installable desktops including KDE 4.7.3, GNOME 2.32.2, Lxde 0.5.5, Xfce 4.8 and others.

The new version includes PBI Manager, a suite of command line tools for managing PBI (Push Button Installer) format packages, and an improved PBI system which allows for library sharing, binary diff updating, digital signing and custom repositories. A new control panel offers a consistent configuration interface across the various window managers and desktop environments, while networking has been enhanced with improved utilities and support for Wi-Fi quick connect. A new "Life-Preserver" utility also makes creating off-site rsync backups easier.

Mac users will find PC-BSD now supports installation to BootCamp partitions of Mac OS X systems and virtualised users of PC-BSD 9.0 will find the integrated guest tools in the new VirtualBox and VMWare disk images. UFS+Journalling is now supported without extra configuration and the system now has a graphical boot options page.

Further details, including a list of the included packages, are available in the release notes. PC-BSD 9.0 is available (under the 2 clause BSD licence) to download in 32-bit and 64-bit x86 versions of DVD and LiveDVD, boot-only USB, LiveUSB, lite USB (LXDE install) and full USB and CD ISO images, as well as VMware and VirtualBox disk images.

To downlaod PC-BSD 9.0. Click Here

FreeBSD 9.0 Released

5:02 PM Posted by Administrator


Following several delays, the FreeBSD Project has announced the availability of version 9.0 of its open source FreeBSD operating system. The first stable 9.x branch release is a major update that includes a new FreeBSD installer system and a number of infrastructure enhancements.

FreeBSD 9.0 offers a choice of either GNOME 2.32.1 or KDE SC 4.7.3 as the distribution's desktop environment, and includes a new Clang/LLVM-based compilation system, user-level DTrace support and more SMP-scalable TCP/IP. High Performance SSH (HPN-SSH) is supported and the updated Network File System (NFS) subsystem implementation adds support for version 4 of the protocol. Other changes include the addition of support for USB 3.0 and the Sony PlayStation 3's PowerPC architecture. Various drivers have also been upgraded and ZFS has been updated to version 28 .

The FreeBSD developers have dedicated the 9.0 release to the memory of the late Dennis M. Ritchie, the American computer scientist who created the C programming language and was one of the founding fathers of the UNIX operating system. Ritchie passed away in October 2011.

Further information can be found in the official release announcement and in the release notes. FreeBSD 9.0 is available to download from the project's site and installation instructions are provided. Source code for FreeBSD is licensed under the two-clause BSD license.


To download free-BSD now . Click Here

Microsoft Plans Real-Time Cyber Crime Feed

3:53 PM Posted by Administrator


Microsoft wants to be a better neighbour when it comes to fighting cyber attackers.

The software giant announced this week it plans to make available a real-time, hosted threat intelligence feed to security companies, government agencies and private industry as part of its efforts to share data concerning the origins of malware attacks. As proof that it's got the goods to help others, Microsoft points to its successful disruptions of the pernicious Waledac and Rustock botnets.

Microsoft plans to provide the feed's application programming interface (API) for free, but did not indicate if it planned to charge for the feed itself, according to reports.

As part of its ongoing anti-botnet initiative, formally known as Project MARS, Microsoft observes malware-infected IP addresses of computers that attempt to "phone home" and receive instructions, even after the command-and-control structure has been deactivated, a company spokesman said.

Microsoft works with internet service providers and computer emergency response teams from around the world to help them clean up the damage and assist customers whose machines may have been compromised.

The goal is to get that information into the hands of others so they can react quicker to threats and create viable defenses, all in the name of protecting Microsoft customers.

"Microsoft learns more about the threat landscape from each of our botnet takedown operations," he said. "The company is looking for ways to share the knowledge and threat intelligence gained in each operation to further protect internet-connected systems."

"As such, we also continue to explore ways to make the information learned from our takedowns more readily available to others who can take action to address infections in a more systemic and ongoing manner, as was discussed at this week's conference."

Microsoft is aware of privacy concerns and, as a result, plans to strip all personal identifiable information, such as credit card and social security numbers, out of the data stream. Releasing such information could lead to identify theft or violate other federal and state laws.

Security executives seemed impressed by Microsoft's mission to provide credible and reliable information.

Art Coviello, executive chairman of RSA Security, said he hopes information-sharing efforts such as these "go viral" because they can serve as helpful deterrents of advanced persistent threats. RSA itself plans to release a report on intelligence-driven security next week.

Bill Boni, vice president and CISO of T-Mobile USA, said the massive amounts of data Microsoft could provide might “remove the denial barrier” some companies have about data security.

40Million+ User Details Stolen In Post Bank Hacking, NIA Is Investigating

3:41 PM Posted by Administrator


Hackers targeted SA Post Office and stolen more than 42 million user details financial institution Postbank. The theft occurred between 1 and 3 January, and was allegedly committed by a syndicate with knowledge of the post office's information technology (IT) system, confirmed by Department of state security spokesman Brian Dube.

The National Intelligence Agency (NIA) has launched a high-level probe after this data breach. According to NIA spokesman "When a government institution is compromised, the NIA will be involved and will offer its assistance" Postbank currently holds over 4-billion in deposits, and processes millions of rands in social grants throughout the year. The bank told that none of its customers were effected by the hacking, but declined to comment further.

Over the next three days, automated teller machines (ATMs) in Gauteng, Free State and KwaZulu-Natal were used to withdraw cash from the accounts. The incident comes three years after Postbank spent over $15-million to upgrade its fraud-detection service. But that investment seems zero valuation. An unnamed security expert told that "The Postbank network and security systems are shocking and desperate need of an overhaul. This was always going to be a real possibility".

White House Will Not Support SOPA

3:22 PM Posted by Administrator


Saturday marked a major victory for opponents of proposed anti-piracy legislation Stop Online Piracy Act (SOPA) and PROTECT IP Act (PIPA), which would target foreign-based websites violating U.S. copyrights.

House of Representatives bill SOPA and its Senate counterpart PIPA are designed to punish websites that make available, for example, free movies and music without the permission of the U.S. rights holders. Opponents of the bills, however, worry that the proposed laws would grant the Department of Justice too much regulatory power. Google Chairman Eric Schmidt has called the measures "draconian." Other Internet giants who oppose the bill include Facebook, eBay, Mozilla, Twitter, and Huffington Post parent company AOL.

The White House on Saturday officially responded to two online petitions, "Stop the E-PARASITE Act" and "Veto the SOPA bill and any other future bills that threaten to diminish the free flow of information," urging the President to reject SOPA and PIPA.

The statement was drawn up by Victoria Espinel, Intellectual Property Enforcement Coordinator at Office of Management and Budget, Aneesh Chopra, U.S. Chief Technology Officer, and Howard Schmidt, Special Assistant to the President and Cybersecurity Coordinator for National Security Staff. They made clear that the White House will not support legislation that disrupts the open standards of the Internet.

"While we believe that online piracy by foreign websites is a serious problem that requires a serious legislative response, we will not support legislation that reduces freedom of expression, increases cybersecurity risk, or undermines the dynamic, innovative global Internet," the statement read in part.

The White House statement went on to say, however, that the Obama Administration believes "online piracy is a real problem that harms the American economy" and that 2012 should see the passage of narrower legislation that targets the source of foreign copyright infringement.


This is not the end of the debate, the White House statement emphasized. "Moving forward, we will continue to work with Congress on a bipartisan basis on legislation that provides new tools needed in the global fight against piracy and counterfeiting, while vigorously defending an open Internet based on the values of free expression, privacy, security and innovation," the letter also read.

Following the release of the White House's statement, SOPA sponsor and House Judiciary Chairman (R-Texas) Lamar Smith issued a statement of his own.

“I welcome today’s announcement that the White House will support legislation to combat online piracy that protects free speech, the Internet and America’s intellectual property," Smith said, according to The Hill. "That’s precisely what the Stop Online Piracy Act does."

On Friday, CNET reported that Smith said he will remove from the bill one of the most hotly contested provisions, Domain Name System requirements. Previously, SOPA had called for DNS blocking of infringing websites.

On Thursday, PIPA author Senator Patrick Leahy (D-Vermont) said that "more study" was needed to asses the bill's DNS-blocking provision, the Wall Street Journal wrote.

The White House's statement condemned DNS blocking in regulatory efforts and said that it "pose[s] a real risk to cybersecurity and yet leave contraband goods and services accessible online. We must avoid legislation that drives users to dangerous, unreliable DNS servers and puts next-generation security policies, such as the deployment of DNSSEC, at risk."

A House Oversight Committee hearing on SOPA's DNS-blocking provision had previously been scheduled for January 18. However, according to Tech Dirt, Oversight Committee Chairman Darrell Issa (R-California) said that the hearing will be postponed for the time being and that the focus now should be placed on the Senate's PIPA bill, which Senate Majority leader Harry Reid has committed to moving forward in the next two weeks.

Hackers Shut Down Both the Tel Aviv Stock Exchange (TASE) and El Al’s respective websites

3:12 PM Posted by Administrator


Hackers shut down both the Tel Aviv Stock Exchange (TASE) and El Al’s respective websites on Monday, one day after a hacker network threatened to carry out attacks on both sites.

The network, which goes by the name “nightmare group,” was able to cause severe problems for both sites. By 10 A.M., TASE's website was only partially functioning, while El Al’s website did not function at all.

The hack comes in the wake of a series of cyber attacks over the past two weeks, and only a day after Hamas called for harsher hacking attempts against Israeli websites.

“The penetration into Israeli websites opens a new front for electronic resistance and war against the Israeli occupation,” said Hamas spokesperson Sami Abu Zuhri on Sunday during a news conference in the Gaza Strip.

A TASE spokesperson stated that the trading system and the website are not connected, emphasizing that the trading system was in no way damaged by the hack.

El Al said they were “taking safety measures in the operations of the company’s website,” and that disruptions were to be expected.

‘Saudi’ Hacker leaks Numerous Card Details of Israeli Owners

3:07 PM Posted by Administrator


A man proclaiming to be a 'Saudi hacker' and calling himself "OxOmar," after leaking particulars about numerous Israeli payment cards twice during the 1st-week of January 2012, yet once more attacked during the same period using fresh Internet file which was loaded with a PC-Trojan, published Brecorder.com dated January 7, 2012.

Having first published a message during very early of January 2012, the hackers' gang asserted that it posted on the Internet some 400,000 credit card details. Following that, it again asserted having published still further 11,000 credit card details as well as warned it would post numerous more.

Remarking about the scam, Chief Executive Officer Dov Kotler of Isracard, the company amongst others that the hacking attack affected, stated that the major portion of the leaked details was "incorrect" alternatively "unauthenticated." Merely a percent from the total payment card data published that was unspecified was really authentic. Still, with the number details that were stolen, many illegal purchases were conducted online, Kotler indicated. Theregister.co.uk published this on January 4, 2011.

However, according to Kotler, Isracard has stopped any buying deal through the cards, which got leaked out, adding that anyone suffering a loss owing to the breach shall receive duly compensated. Meanwhile, the company, to help customers towards finding whether they've been affected, has uploaded software on its Internet site to that effect.

Chief of Israeli Law, Information and Technology Authority, Yoram Hacohen at the Ministry of Justice in Israel stated that he was less concerned regarding the leakage of payment card numbers and more regarding the personal info that got exposed. According to him, info comprising e-mail ids, residential addresses, phone-numbers and passwords, if exposed, could result in ID-theft. CNN published this on January 9, 2011.

Hacohen stated that it was a crime on global citizens to hack into their private information, as part of the details published were of Jews worldwide in addition to Israelis.

Meanwhile, the Ynet news website of Israel published that according to a PC specialist in the country, OxOmar was actually a Mexican waiter, aged 19-yrs, who was named Omar Habib. AFP reported this dated January 8, 2012.


Related Articles

The Saudi hacker to Mossad "Don't waste your time by searching for ...

400000 Israeli Credit Cards & Information Leaked by Saudi Arabia ...

An Israeli hacker has published details of hundreds of Saudi credit cards online...

Apple publishes Supplier Details for the First Time

2:53 PM Posted by Administrator


Apple has published a list of its suppliers for the first time as it looks to head off criticism over how workers are treated.


The company also said it has increased its inspection of factories in a bid to ensure proper working conditions for suppliers' employees.

Apple came under fire last year after workers committed suicide at factories owned by its supplier Foxconn.

The tech giant had so far kept details of its supply chain secret.

"Apple is committed to driving the highest standards for social responsibility throughout our supply base," the company said in its supplier responsibility report.

"We require that our suppliers provide safe working conditions, treat workers with dignity and respect, and use environmentally responsible manufacturing processes wherever Apple products are made."

'Significant improvement'

Apple said it conducted 229 audits at different factories over the past year, during which it uncovered various cases of non-compliance of labour rights.

It said that it found that employees at 93 factories had exceeded their "weekly working hour limits", while there had been payment violations at 108 facilities.

The company said it also found that five factories had employed underage workers, though that was due to "insufficient controls to verify age or detect false documentation".

Apple said that it was working closely with its suppliers to ensure that these issues were sorted out.

"I would like to make a significant improvement in the overtime area," said Tim Cook, chief executive of Apple.

"I would like to totally eliminate every case of underage employment," he added. "This is something we feel very strongly about and we want to eliminate totally."

Apple said it was also educating the suppliers' employees about their rights.

"Apple-designed training programs educate workers about local laws, their fundamental rights as workers, occupational health and safety, and Apple's Supplier Code of Conduct."

Sunday, January 15, 2012

Hacker Group Anonymous Takes Up Arms in SOPA Battle

11:30 PM Posted by Administrator


The "hacktivist" network known as Anonymous has stepped into the fray in the battle among legacy media companies, Internet firms, and politicians over the federal Stop Online Piracy Act (SOPA).

The controversial proposed legislation would make it more difficult for websites to display pirated content, but many tech companies -- including Google, Facebook, Twitter, Zynga, and others -- argue that it is overkill, and would unfairly restrict information-sharing.

Now another group with an interest in making sure that the Internet remains as free as a lawless Caribbean sea has added its voice to the debate: the hackers of Anonymous.

Anonymous is going after the heads of media companies that support the legislation, the New York Times reports, including Time Warner CEO Jeffrey Bewkes and Sumner Redstone of Viacom and CBS. Bewkes' home addresses and phone numbers were posted online among documents with information about numerous executives at companies that back SOPA.

The latest stunt by Anonymous, which has made its name through acts ranging from the posting of photos of a BART spokesman's genitalia online to the sabotage of the Talking Points Memo news site, goes by the name Operation Hiroshima, with the Twitter hashtag #OpHiroshima.

A menacing YouTube video announcing the effort states, "You take our speech, you take our Internet... We fight back."

Dropbox Inventor determined to Build the Next Apple or Google

11:23 PM Posted by Administrator


Four years ago, Drew Houston was just another super-smart hacker with ambitions of starting his own company.

He'd strap on headphones to block out everything but the endorphin rush as he cranked code late into the night on a new service that instantly syncs all of your files on all of your devices.

Houston, who played guitar in a '90s rock cover band at Boston bars and college parties, dubbed it "Even Flow" after one of his favorite Pearl Jam songs. On a white board in his Cambridge, Mass., apartment, he calculated that he'd need several hundred users to "not feel like an idiot" quitting his $85,000-a-year job as a software engineer.

Today, Houston needs software to track how many people use his service. Dropbox has more than 50 million users and adds another every second. It's one of the fastest-growing companies Silicon Valley has ever seen. Both Apple's Steve Jobs and Google's Sergey Brin sounded out Houston about buying Dropbox.

But Houston says he's determined to build the next Apple or Google, not sell out to them. And some of high-tech's smartest money is backing Houston's vision.

Dropbox has figured out an elegant solution to a vexing problem. With the explosion of smartphones and tablets, people have more devices and more apps than ever before. How can they get access to the latest version of all their stuff — photos, music, videos, documents, spreadsheets — no matter what device they are using and no matter where they are?

For millions, the answer has been Dropbox. Every day, 325 million files are saved on the service. Dropbox has become a verb as in "Dropbox me."

In September, Houston pocketed $250 million from seven of Silicon Valley's top venture capital firms. That eye-popping sum pegged the value of his company at $4 billion and his own net worth — at least on paper — at an estimated $600 million.

Now this 28-year-old chief executive has to make sure Dropbox becomes the next Facebook, not the next MySpace.

Dropbox faces potentially lethal competition from some of the world's largest tech companies and dozens of start-ups packing piles of cash and top engineers. It may have won over consumers for now (without spending a cent on marketing, just giving away free storage as an incentive for people to tell their friends).

Homeowners who are remodeling use the service to pore over contracts and tweak design plans from architects and contractors. Couples planning weddings swap drafts of invitations and wedding cake photos. Astronomers upload and share giant telescopic images of the heavens taken all over the globe. Walter Isaacson even used Dropbox for his bestselling biography, "Steve Jobs," even though Apple runs a competing service.

But consumers can be fickle. What will happen when Apple, Google and Microsoft point their big guns at Dropbox in the fight to become the spot that houses everyone's digital stuff?

"It is clear that Dropbox is going to have serious competition not just from the Apples of the world but everyone else," said Tim Bajarin, president of technology consulting firm Creative Strategies. "It needs to innovate to stay ahead of the pack."

Houston knows Dropbox can't afford to coast. He says he wants Dropbox to find its way onto every device you use, be it your smartphone, camera, TV remote, even your car, and to become the way you collaborate on files, listen to music or share photos.

"People may know us today as the magic folder on their desktop or the app on their phone. But we see ourselves as building the Internet's file system," he said.

One reason people are betting on Dropbox is that the technorati have so eagerly embraced it, reminiscent of the cult-like enthusiasm for Apple products. And they have embraced Houston, who these days is the tech world's equivalent of a rock star.

Strangers stop him on the street and in Starbucks. The guy who used to grub on Hot Pockets in his lean start-up days has rubbed elbows with wealthy donors at a $38,500-a-plate dinner for President Obama, and he and his tech pals broke bread with Gov. Jerry Brown. And Houston got to meet Pearl Jam lead singer Eddie Vedder backstage at a benefit concert last year.

Houston, who has spiky Elvis Costello hair and rarely deviates from his uniform of jeans and a Dropbox hoodie, says he gets his biggest rush from peeking over someone's shoulder in a coffee shop and spotting his company's logo on their laptop screen.

At Dropbox's San Francisco headquarters, Houston (pronounced like the Manhattan street, not the city in Texas) sits in a sea of engineers under a neon sign that reads "ITJUSTWORKS" with "just work" flashing in blue. His desk is blanketed in a flurry of resumes an inch thick and his attention constantly darts between four 24-inch monitors.