Popular Post

Archive for 2014-02-16

Anonymous hacker sentenced for DDoS Attack, will pay $110,932 for the damage

By : Unknown
Anonymous hacker “Jacob Wilkens” responsible for the denial-of-service attack against Koch Industries was sent on 24 months of probation through the decision of The U.S. District Court, Eastern District of Wisconsin, in addition court ordered him to pay  $110,932.71 for the damage caused in DDoS attack.
Jacob pled guilty to take down the servers of Angel Soft bathroom tissue (which is based in Green Bay) with other members of the hacktivist collective Anonymous, the attack took place in February and March of 2011.
As a result of the DDoS Attack, Koch Industries servers was down for three days which caused losses of hundred-thousand dollars.
For the same attack, Christopher Sudlik was ordered to pay and he also sentenced to 36 Months of probation.

Share and Enjoy

SIM Cards can be Hacked; Give me any phone number i will clone that researcher says

By : Unknown
In this Modern Era everyone knows that his/her latest mobile can be hacked by hackers but now The sim card hacking flaw was discovered by German programmer Karsten Nohl, who has informed mobile operators of the potential danger.
After that all the Mobile phone users have been put on an alert that their sim cards can be hacked anytime which leads to fraud and soaring premium rate bills.
On the other hands, if we talk about the mobile operators then they says that they already aware about this flaw and taking steps to patch the flaw before customers are hit.
Worldwide Mobile Phones are Major source to be used in accessing online banking and other sensitive personal information and if the discovered flaw will be used by Hackers can make a privacy disaster, this flaw also makes some noise for the mobile customers who use their smartphones to pay bills and transfer money.
The security flaw is due to aging sim card security technology, which has struggled to keep up with high-tech smartphones such as the iPhone and Samsung’s Galaxy S4.
Flaw Researcher (Karsten Nohl) says something about his Flaw:
“Give me any phone number and there is some chance I will, a few minutes later, be able to remotely control this SIM card and even make a copy of it,”
The hack works by manipulating a coding technology used by operators to update sim cards. Properly equipped, a hacker can send a code to a sim card to gain access to a phone’s systems, from where fraudulent activity can be perpetrated.
Nohl said that a quarter of all sim cards he tested could be hacked.
However, the international umbrella mobile operator organisation, the GSMA, said that the flaw was limited to a minority of sim cards and that newer sim cards may not be affected.. It said that it had advised operators of the security risks involved.

Share and Enjoy

Lightbeam for Firefox (Shows the First and Third Party Interaction on the Web)

By : Unknown
Lightbeam is a Firefox add-on that enables you to see the first and third party sites you interact with on the Web. Using interactive visualizations, Lightbeam shows you the relationships between these third parties and the sites you visit.
Using interactive visualizations, Lightbeam enables you to see the first and third party sites you interact with on the Web. As you browse, Lightbeam reveals the full depth of the Web today, including parts that are not transparent to the average user. Using three distinct interactive graphic representations — Graph, Clock and List — Lightbeam enables you to examine individual third parties over time and space, identify where they connect to your online activity and provides ways for you to engage with this unique view of the Web.


How Lightbeam Works ::
When you activate Lightbeam and visit a website, sometimes called the first party, the add-on creates a real time visualization of all the third parties that are active on that page. The default visualization is called the Graph view. As you then browse to a second site, the add-on highlights the third parties that are also active there and shows which third parties have seen you at both sites. The visualization grows with every site you visit and every request made from your browser. In addition to the Graph view, you can also see your data in a Clock view to examine connections over a 24-hour period or in a List view to drill down into individual sites.

How You Can Use Lightbeam to Help Us Illuminate the Inner Workings of the Web ::
As a part of Lightbeam, we're creating a big-picture view of how tracking works on the Internet, and how third-party sites are connected to multiple other sites. You may contribute your data to our crowdsourced directory by simply turning on the share switch within the add-on. To disable crowdsourcing, you can turn it off at any time. You can view your local data stored within Lightbeam at any time, or save your data by clicking the "Save" button under the data section on the left side of the add-on.

How is my information stored? ::
As a default, all info generated and used for Lightbeam’s visualizations and features are only stored locally on your computer. You can save a copy of your connection history at any time, which is also where you can see the specific data collected by the add-on. You may also reset Lightbeam to erase your locally stored connection history, disable it to stop data collection or uninstall it to instantly remove all locally stored data related to Lightbeam.

- Copyright © Virus Bhabhi - Expeet Outsourcing - - - - Designed by Expeet Outsourcing -