Posts

Showing posts from November, 2010

Hacktivism Vs Terrorism

Image
H acktivism is the act of hacking, or breaking into a computer system, for a politically, socially or motivated by a criminal purpose. The intentions behind hacking are nothing but to harm and damage. The individual who performs an act of hacktivism is said to be a hacktivist. There are many such scavengers are around who never forget to boast their skills of hactivism. Globally there are 4,00000 community of black hat hackers, out of which 70 percent are students and between the age group of 20 to 25, 18 percent are between the age group of 15 to 20, 2percent are above the age of 30, 10 percent are grey hat hackers. And this population is of hactivists. (Read this beautiful research report in Cyber Terror) from this population 22% are only Indians,10 % from Pakistan ( details of these hactivists with pictures, code name, their addresses, and much more read in Cyber Terror) A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring a...

Love and Social Engineering

Image
A love story on social sites is quite a common game. And, especially in the hackers zone this works like a miracle. Love is literary, philosophical, or some would even say metaphysical. In the history of malware, love is a virus writer whim and a well-known cybercriminal social engineering technique. Social engineering, a non-technical breach of security that relies heavily on human interaction and tricks users into breaking normal security measures, remains popular among virus writers. LoveLetter was one of the first, and most notable, examples of social engineering. It arrived as an attachment to an innocent looking e-mail containing the subject line 'I LOVE YOU' (and who doesn't like to receive a love letter?) and the body text 'Kindly check the attached LOVELETTER coming from me'. In an effort to put unsuspecting users further off their guard, the attachment had a double extension, LOVE-LETTER-FOR-YOU.TXT.vbs. Since Windows Explorer doesn't show extensions b...

Sextortion on Cyber Space: New Technique of Blackmail & Threatening Young People

Image
Sextortion on Cyber Space: New Technique of Blackmail Threatening Young People Who’s watching your child on her or his PC Webcam -- just friends? Don't be too sure. Age-old crimes take on a new twist in the cyber-world of today. Not least of these is “sextortion,” where in a recent high-profile case, the FBI uncovered 200 victims in just one incident, many of whom were young or even underage. As a term, sextortion has been around longer than most of us probably realize and way before the Web was around. An early use of the term was in a headline of a 1950 article, but no one can be in any doubt that sexual extortion itself has even older origins. In the cyber-world of today, however, sextortion appears to have reached a whole new level. It is perpetrated through a form of social engineering, wherein enough information can be gathered about an individual to hold that victim to ransom. Social networking makes compromising situations easily available to those searching. In the FBI ...

Search Engine Optimization Secrets Tips & Tricks: Download Free Ebook

Image
SEO For 2010: Search Engine Optimization Secrets lulu.com| 2009 | ISBN: 0557161339 | MOBI, PDF | 252 pages | 31 MB A very well-designed web site is useless if no one can find it on the web. If your company is going to succeed on the web, optimizing your site for search engine visibility is a must. Especially since it is the telephone book of the now, not the future. This book is written by the two most noted and accomplished experts in the field of search engine optimization (SEO) and provides you with proven guidelines, cutting-edge techniques, tips, and the how-to's for planning and executing a comprehensive SEO strategy.This is the first book to cover the Bing search engine in-depth. It tackles how to submit your website to the search engines, basic to advanced optimization techniques, learn how to determinetrophy keywords, keyword density, little known tricks and methods pros use, learn how to increase your rankings, and learn from those who started the entire SEO industry.Thi...

IBM uncloaks 20 petaflops BlueGene/Q super

SC10 Although everybody seems to be excited about GPU-goosed supercomputing these days, Big Blue is sticking to its Power-based, many-cored BlueGene and Blue Waters massively parallel supers, and revving them up to bust into the 20-petaflops zone. The Blue Waters massively parallel Power7-based supercomputer and its funky switching and interconnect, and very dense packaging were the big iron of last year's SC09 event in Portland, Oregon, which El Reg told you all about here. And we've covered the GPU additions to the iDataPlex bladish-rackish custom servers IBM builds, as well as the forthcoming GPU expansion blade for Big Blue's BladeCenter blade servers, which are due in December and which are also special-bid products.But the BlueGene/Q super — made of fleets of embedded PowerPC processor cores — is still, in terms of aggregate number-crunching power, the biggest and baddest HPC box on the horizon from IBM for the next two years.IBM lip-smackingly announced the sale of t...

Big Security Hole in GOOGLE

Image
Update: The site is now down. Here’s what it looked like: Facebook would probably just consider this a feature, but the rest of us will definitely consider this a big security hole. The creator of http://guntada.blogspot.com (don’t visit that site just yet) emailed us this morning to explain. If you’re already logged in to any Google account (Gmail, etc.), and visit that site, he’s harvested your Google email. And proves it by emailing you immediately. And it even works in “incognito” mode (also known as porn mode). What is the exploit? We don’t know, and Google has yet to respond to us about it. We note that the site doing the exploiting is on Google’s own blogging platform. One developer we spoke with was confused as well, saying: i have no idea what this is exploiting but there’s a decent chance it has something to do with Friend Connect and the way it passes data between iFrames (ie yes, it very well could be opensocial related). whatever is going on it’s an extremely serious secur...

Linux vs MAC: Which is Better OS for Hackers

Image
Post- by Haimant Butz Now a days there is big discussions over the usages of Mac and Linux, specially the script kiddies are very much queries bout usages of Mac and contented Linux-on-Mac .Just Look Around you will notice the surge in use of Apple hardware and Mac OS X. Since it is based so solidly on Unix, yet with an attractive GUI on top, OS X has appealed to a broad range of programmers and technical writers; especially the kind who have no affection for the Wintel way of doing things. Many of them stuck with Mac OS X because it worked. Lots wanted to explore alternatives, and install their own choice of OS. Your typical modern Mac comes with all the UNIX goodness you ever need, there are a bunch of Linux PPC distributions that you can, if you feel the need, install on your Apple hardware. By doing this please be sure about what you are doing to your computer. Especially, when your mother wants to see you as top rank programmer at Google instead of checking others skills question ...

Burning Issues over Linux-on-Mac

Image
Post- by Haimant Butz Now a days there is big discussions over the usages of Mac and Linux, specially the script kiddies are very much queries bout usages of Mac and contented Linux-on-Mac .Just Look Around you will notice the surge in use of Apple hardware and Mac OS X. Since it is based so solidly on Unix, yet with an attractive GUI on top, OS X has appealed to a broad range of programmers and technical writers; especially the kind who have no affection for the Wintel way of doing things. Many of them stuck with Mac OS X because it worked. Lots wanted to explore alternatives, and install their own choice of OS. Your typical modern Mac comes with all the UNIX goodness you ever need, there are a bunch of Linux PPC distributions that you can, if you feel the need, install on your Apple hardware. By doing this please be sure about what you are doing to your computer. Especially, when your mother wants to see you as top rank programmer at Google instead of checking others skills question ...

Chinese hackers targeting human rights news sites

Image
Nart Villeneuve has published a detailed summary of recent malware attacks on media and human rights groups who work on Chinese issues. He highlights a disturbing new trend. On Wednesday, Amnesty Hong Kong's website was repurposed by hackers to infect visitors with a wide variety of nasty malware. The Nobel Prize's website was also defaced earlier this month, for the same ends. As with the e-mailed Nobel invite malware CPJ described earlier this week, these attacks target one vulnerable member of the dissident community, then use that person's own communications to infect others. If you're an organization whose audience in China is of interest to the authorities, please take extra care with the security of your website. As Villeneuve says, even if this spate of attacks ebbs, attacking online news sites to spread targeted spyware is a trend that is bound to continue. ---Like this post, Just leave a comment as your feedback. If you want us to post an article on some sp...

Top 10 Security trends for 2011

Image
Man in the browser (MITB) attacks are a new threat which consumers will face and the hacking industry is widely adopting, especially as many security products are not mature enough yet to deal with this problem. File security. With Sharepoint being the fastest growing product in Microsoft history and data growing at a 60% annual rate, file security will become the top security issue. With PCI DSS being expanded to refer not only to databases and web apps but also to files, organisations will need to carefully consider how they protect their files. Smartphones will be the new target in 2011. Hackers are using mobile devices (smartphones and tablets) as a new attack platform. With a number of applications on mobile devices (CRM, Salesforce, Access to work e-mails), these will become more susceptible to attack. Hackers and security side-by-side in the cloud . As organisations' IT infrastructure moves to the cloud, so will their security controls. However these services will also bec...

Cyber Crime: Things You should know

Image
The use of computers and the internet has expanded exponentially over the years. Along with this increased use of the World Wide Web comes a surge of crimes that are specific to the cyber world and very detrimental to a society that relies on these computers. Everyone who uses the internet is a potential victim. In the enforcement of these criminal offenses, it is imperative to incarcerate the small percentage who are criminal users and to protect the majority of users who are innocent. There is a broad spectrum of computer and internet crimes and they are often covered by both state and federal laws. Computer offences can be defined as a crime in which a computer, or a network of computers, are used in the commission of the crime. If an individual takes advantage of the internet in the commission of a crime, this is sometimes called a netcrime. The direct victim of a computer crime can either be the computer, or network, itself. These crimes can victimize something independent of the ...

Cyber Criminals Are Also Human: Cyber Terrorists are People Too

Image
In my openion, the Cyber security is a human problem, but not a technology problem. Sure it manifests itself through technology, but unless, and until you realise that humans are at the heart of it, you are never going to crack it. What does this mean? It means we doesn’t just hire computer geeks — not just brought electronic engineers and computer scientists — But better is to hires human scientists and even sociologists..BUT WHY??? Because We can’t claim to understand the system we are trying to tackle until we understand the human component & that should be very obvious. People in the cybersecurity “community” view the world from their own view point. They simply step out of from the anglo-centric view of the world. They Have to think about how people’s geographies and their cultures interact with the system. For the term “cyberspace”, it is one of the geometry, a boundary or a perimeter & it leads us to thinking about perimeter defense also. Here we need to defend our perim...

Social Engineering and Face book community

Image
All unknown faces yet they are called friends, we may not see them but they are close to your heart, he can be a saint, a terrorist, a hacker, or an undercover agent may be some police official you never know who they are....but on face book they are termed as frinds. When they share place in your account they automatically become a part of your FB family,community and friend..  Almost all my Face Book friends are aware of the fact that I love to interact with every friend of mine in detail. I mean I give them time; Cat is still big question mark and puzzle for many of my readers and friends.   What I come across the word always is Social Engineering. That has fascinated me a lot bur also understood that how this particular word is misunderstood here, especially in hackers community.There was a young face book friend chintan pinged to chat and pounced saying you don’t have time to chat or what? In reply I typed “ na sweet heart I was Busy..The reply came to asking ‘A...

Botnet Infection Takes Less Than Five Minutes to Infect the System

According to reports released by the security researchers of Microsoft's Internet Safety Enforcement Team, the average time a botnet takes to infect a computer is less than five minutes. The researchers also stated that botnets have advanced so rapidly in recent months that it has become harder to detect them. In 2007, botnets started using a technique called fast-flux in which a rapidly changing series of Internet addresses are generated that make spotting and blocking of a botnet attack more difficult. Though experts have reduced the size of botnets to approximately 300,000 PCs, it continues to be twice the total number detected in 2007. However, the exact numbers might be far more. Microsoft researchers, who trace about 1,000 botnets at any point of time, stated that the biggest network still commands several million computers. Moreover, computer security officials said that no computer running with an internet connection is free from botnet attacks. They suggest computer owners...