Instagram vulnerability :Media Information Disclosure Security Issue

Nov 30, 2012 | comments

Facebook's Instagram photo-sharing service that could allow a hacker to seize control of a victim's account. The attack was developed by Carlos Reventlov around a vulnerability he found within Instagram in mid-November. He notified Instagram of the problem on Nov. 11, but as of last Tuesday, it had not been fixed. The vulnerability is in...

Australia's Small Business Point of Sale System hacked By Romanian Crime Gang

Nov 29, 2012 | comments

Police have smashed a Romanian organised crime gang that allegedly hacked into the computer systems of small businesses, with credit card details of 30,000 Australians used in $30 million worth of illegal transactions around the world. Australian and Romanian national police have broken up a ring of hackers blamed for pillaging the point-of-sale...

IAEA Data Breach Part 2

Nov 29, 2012 | comments

In response to IAEA's Previous data breach and official statement, They're now publishing additional information to prove there ability to gain access to highly sensitive information, Including Confidential 'SafeGuard' Documents, Satellite Images, Official letters, Presentations and etc.Hoping positive IAEA's decision as an ...

WORM_VOBFUS Variants Seen Spreading On Facebook

Nov 29, 2012 | comments

Based on our initial analysis WORM_VOBFUS variants seen spreading on Facebook does not exhibit new routines, but it is a good reminder for users about well-known but easily forgotten safe computing practices. The significant increase in infection is curious because Windows 7 and Windows 8 PCs will not launch autorun.inf files, and Microsoft...

US 100 Million $ Secret Underground Facility

Nov 29, 2012 | comments

US Building A Secret Underground construction project planned for Israel called Site 911. Project will cost up to $100 million, take more than two years to complete, and can only be built by workers from specific countries with proper security clearances. Palestinians need not apply. When complete the well-guarded compound will have five levels...

Bypass Windows 8 Password Login Screen

Nov 28, 2012 | comments

1. Start typing "netplwiz" (without quotes) in the Windows 8 start screen and hit enter to launch the "User Accounts" control panel (on older versions of Windows, click "User Accounts Control Panel").  2. Enter your password if prompted.  3. In the window that opens, uncheck the box stating "Users must enter a username and passwords...

Trading Forex Website Targeted

Nov 28, 2012 | comments

A FOREX trading website called "Trading Forex," located at hxxp://tradingforex.com has been contaminated with a malicious Java applet that is designed to install malware on the systems of visiting surfers.  FOREX is the foreign exchange market where international currencies are traded, and nowadays, it's used by millions of people around...

Google Webmaster Tools security breach

Nov 28, 2012 | comments

Google site that helps website owners manage how their site appears in Google, diagnose problems, and optimize traffic, is currently experiencing a major security breach. Old accounts are being re-verified, says Search Engine Journal. That may not sound like a big deal, but it’s a potential disaster for anyone who has had search engine...

Anonymous Hacks DEBKA.com

Nov 27, 2012 | comments

DEBKA.com is an Israeli-Based News-Agency, which has tied relations with Israeli Intelligence Agency (MOSSAD) and Military sources, “Tongue of MOSSAD”. DEBKA first started around 2000 in purpose of polluting media with Zionist-Oriented news and rumors. DEBKA also analyzes on how people react to news and information offered...

Spy Any Phone Via Hardware Hack With AudioJack Malware

Nov 27, 2012 | comments

The researcher Atul Alex has presented at last edition of International Malware Conference (MalCon) how it is possible to attack every mobile devices with a special hardware designed using common electronic components. Atul Alex presented a paper that covers “abusing voice dialing and combining Arduino / Microcontroller to steal private data...

Java Zero-Day Exploit on Sale

Nov 26, 2012 | comments

Miscreants in the cyber underground are selling an exploit for a previously undocumented security hole in Oracle’s Java software that attackers can use to remotely seize control over systems running the program, KrebsOnSecurity has learned. The flaw, currently being sold by an established member of an invite-only Underweb forum, targets an unpatched...

Anonymous Leak Emails from Syrian Ministry

Nov 26, 2012 | comments

Anonymous Hacker managing Operation Syria (OpSyria) have released 1 GB of emails dump from Syrian Ministry of Foreign Affairs. Files are in files are in Arabic language. Documents includes scanned copies of Syrian ministers passports, details about an arms transport from Ukraine, report which shows that 200 tons of Syrian bank notes have been...

REDHACK

Nov 26, 2012 | comments

A group of Internet hackers appeared Today on charges of terrorism, the first time alleged cyber criminals have been put on trial in Turkey .The 10 members of the "Redhack" group are accused of belonging to an armed terrorist organisation, illegally obtaining confidential documents and personal information, as well as cracking into private systems...

International Atomic Energy Agency (IAEA) Data Breech

Nov 25, 2012 | comments

Another victim of cyber attack ,The group of hackers who named itself Parastoo Farsi have exposed contacts for more than 100 nuclear experts and scientists from UN nuclear agency International Atomic Energy Agency (IAEA), the word Parastoo is Farsi and referes a bird species like the  swallow and an Iranian girl’s name.      ...

Rise Of The Machines : Human Judgment Required

Nov 24, 2012 | comments

As custom government malware becomes an increasingly common international weapon with real-world effects—breaking a centrifuge, shutting down a power grid, scrambling control systems—do we need legal limits on the automated decision-making of worms and rootkits? Do we, that is, need to keep a human in charge of their spread, or of when they ...

New Malware Targeting SQL Db's In Iran

Nov 23, 2012 | comments

Security firm Symantec has discovered a specialised worm called W32.Narilam that can compromise SQL databases. Symantec reports that the malware "speaks" Persian and Arabic and appears to target mainly companies in Iran. Narilam is, therefore, reminiscent of Stuxnet and its variants. Narilam spreads via USB flash drives and network shares....

South Carolina Department of Revenue Data Breech

Nov 23, 2012 | comments

The South Carolina Department of Revenue recently suffered a major data breach, leading to 3.8 million tax payers and their 1.9 million dependents having their Social Security numbers exposed along with credit cards (5K) and bank account information (3.3 million accounts).The attacker gained access to 44 servers, installing 33 pieces of malicious...

Iran's New Smart Card For Internet Monitoring

Nov 22, 2012 | comments

A BETTER WAY TO CITIZEN SURVEILLANCE : Iran's Government introduces a biometric Smart card for monitoring there citizens and  opposition on the Internet., which will serve as the access map to the Web. Without registration of "Smart card", the Internet for citizens remains closed . Early next year is the "smart card" issued in a...

Latest Linux malware Doing iFrame Injections

Nov 21, 2012 | comments (3)

                   New Linux malware can automatically hijack websites          A few days ago, an interesting piece of Linux malware came up on the Full Disclosure mailing-list. It's an outstanding sample, not only because it targets...

AT&T iPad Data Slurp

Nov 21, 2012 | comments

A 27 year old  hacker Andrew Auernheimer from new york has been found guilty of breaching AT&T's site security to obtain iPad customer data. According to the government, the men used an "account slurper" that was designed to match email addresses with "integrated circuit card identifiers" for iPad users, and which conducted a "brute...

“First 300 Shares Will Get Prize” Facebook Scam

Nov 21, 2012 | comments

Various messages distributed on Facebook claim that users can win expensive prizes such as Apple products or designer headphones just by liking and sharing a Facebook Page    These posts used by fraudsters to advertise their Facebook pages and, in some cases, even utilized to trick unsuspecting customers into handing over personal...

.Eu Domains Are Being Used To Infect PCs

Nov 20, 2012 | comments

Some malicious .eu domains have been registered during November which are being used to infect PCs with malware via the Blackhole exploit kit.  For example : owzshm.eumpxuth.eu ngpsjy.eu wlwhhz.eu jhzopj.eu jqwwgm.eu pmgugq.eu jkiwhy.eu nrxpxq.eu vjtjpy.eu xzjvhs.eu xipuww.eu kngipu.eu ptkqzo.eu pyrhox.eu This type of tactic is pretty...

Smartcard Malware

Nov 20, 2012 | comments

Smartcard Malware Can Share a Smartcard Over The Internet                                        S8UK3FT4BKJW Security researchers have developed proof-of-concept malware that allows attackers to obtain remote access to smart card readers attached...

Cracking WPA2 Password Of Belkin Routers

Nov 20, 2012 | comments

A number of Belkin wireless routers are shipped with a default WPA2 password to protect network connections. The apparently random passwords are printed on a label that’s on the bottom of the router. Although this approach should be, in theory, more secure, because the password is likely stronger than what many users would set themselves, it...

Windows 8 Pro Free

Nov 20, 2012 | comments

 Pirates Exploit a weakness in Microsoft’s Key Management Service (KMS) To Get Windows 8 Pro Free Copies: When a better lock’s built, folks just devise new ways to pick it. It’s pretty much a fact of life. So it’s not surprising that folks have already pirated Windows 8. If anything, it was probably expected. What is surprising, however,...

FreeBSD Project Server Hacked

Nov 20, 2012 | comments

                       Two FreeBSD Project Servers Hacked Hackers broke into two FreeBSD project servers using an SSH authentication key* and login credentials,Venerable BSD-based operating system FreeBSD has announced a smallish system...

Malware Using Google Docs As Proxy

Nov 20, 2012 | comments

Security researchers from antivirus vendor Symantec have uncovered a piece of malware that uses Google Docs, which is now part of Google Drive, as a bridge when communicating with attackers in order to hide the malicious traffic. The malware -- a new version from the Backdoor.Makadocs family -- uses the Google Drive "Viewer" feature as a...

Thanksgiving Screensaver Malware

Nov 19, 2012 | comments

A malware designed to infect your PC has been found hidden inside an innocuous Thanksgiving screen-saver.When millions of Americans are preparing to celebrate Thanksgiving with their families and friends. TheThanksgiving screensaver that you just downloaded from the net may not be entirely safe,while you are being presented with a slideshow, the...

Wii U JAILBREAK

Nov 18, 2012 | comments

Techies claim they've cracked Nintendo's anti-piracy defences in the Wii U days after the games console hit US shelves. The hack, the gaming equivalent of jail-breaking, allows home-made games, pirate copies of titles and other unauthorised software to run on the Wii U, according to wiiuhacks.com. The attack appears to involve exploiting security...

Lenovo Windows 8-based home theater PC 'IdeaCentre Q190

Nov 16, 2012 | comments

Lenovo has announced the release of its new range of Windows 8-based home entertainment desktop PC Lenovo IdeaCentre Q190. According to Lenovo, the Q190 desktop PC is the world’s “smallest full-function” PC that measures just 22mm in width.Lenovo’s mini IdeaCentre Q190 is a spec-bumped version of the PC maker’s previous Q180 home entertainment...

Cool Exploit Kit

Nov 16, 2012 | comments

Cyber crooks have made their attacks stealthier with the launch of a aggressive exploit kit Cool exploit kit   to generate malicious code on legitimate websites. Cool can exploit multiple un-patched vulnerabilities in the user’s browsers, browser plug-ins, software applications or operating systems. Exploit kits are still making rounds,...

Email leaks 400+Taliban official's contacts

Nov 16, 2012 | comments

That was exactly the rookie mistake made by Taliban spokesman Qari Yousuf Ahmedi last week, ABC News reports, which resulted in Ahmedi inadvertently disclosing his full mailing list of more than 400 email addresses.Ahmedi is one of two official spokesmen for the Islamic fundamentalist movement, the other being Zabiullah Mujahid. Ahmedi...

Microsoft Surface tablet

Nov 15, 2012 | comments

Microsoft's Surface tablet, an important part of the software multinational's attempt to bring Windows into the portable computing age, is suffering from lacklustre sales, according to a report citing manufacturing sources. Orders from the supply chain are said to have been halved, from an estimated 4m units, which Microsoft expected to...

Cyber security

Nov 12, 2012 | comments

Five Measures for Your Cyber security 1. Translate Security Answers to Another Language Many times, security questions such as “What is your favorite book?” are much easier to break than passwords because they are susceptible to social engineering. Consider translating your answers to another language by using free online...

How To Become a Computer Forensics Expert

Nov 9, 2012 | comments

What a Computer Forensics Investigator needs to understand A Computer Forensics Investigator needs to be able to understand the process of investigating a cybercrime, the laws involved and the details in obtaining the necessary authorisation to perform the investigation. Each computer forensics case is different, and each country’s laws are...
 
Support : INDIATRIKS
Copyright © 2011. INDIATRIKS - All Rights Reserved
Template Edited By Indiatriks
Proudly Powered By Blogger