Archive for 2014-02-16
Anonymous hacker sentenced for DDoS Attack, will pay $110,932 for the damage
By : Unknown
Anonymous hacker “Jacob Wilkens” responsible for the
denial-of-service attack against Koch Industries was sent on 24 months of
probation through the decision of The U.S. District Court, Eastern District of
Wisconsin, in addition court ordered him to pay
$110,932.71 for the damage caused in DDoS attack.
Jacob pled guilty to take down the servers of Angel Soft
bathroom tissue (which is based in Green Bay) with other members of the
hacktivist collective Anonymous, the attack took place in February and March of
2011.
As a result of the DDoS Attack, Koch Industries servers was
down for three days which caused losses of hundred-thousand dollars.
For the same attack, Christopher Sudlik was ordered to pay
and he also sentenced to 36 Months of probation.
Share and Enjoy
SIM Cards can be Hacked; Give me any phone number i will clone that researcher says
By : Unknown
In this Modern Era everyone knows that his/her latest mobile
can be hacked by hackers but now The sim card hacking flaw was discovered by
German programmer Karsten Nohl, who has informed mobile operators of the
potential danger.
After that all the Mobile phone users have been put on an
alert that their sim cards can be hacked anytime which leads to fraud and
soaring premium rate bills.
On the other hands, if we talk about the mobile operators
then they says that they already aware about this flaw and taking steps to
patch the flaw before customers are hit.
Worldwide Mobile Phones are Major source to be used in
accessing online banking and other sensitive personal information and if the
discovered flaw will be used by Hackers can make a privacy disaster, this flaw
also makes some noise for the mobile customers who use their smartphones to pay
bills and transfer money.
The security flaw is due to aging sim card security
technology, which has struggled to keep up with high-tech smartphones such as
the iPhone and Samsung’s Galaxy S4.
Flaw Researcher (Karsten Nohl) says something about his
Flaw:
“Give me any phone number and there is some chance I will, a
few minutes later, be able to remotely control this SIM card and even make a
copy of it,”
The hack works by manipulating a coding technology used by
operators to update sim cards. Properly equipped, a hacker can send a code to a
sim card to gain access to a phone’s systems, from where fraudulent activity
can be perpetrated.
Nohl said that a quarter of all sim cards he tested could be
hacked.
However, the international umbrella mobile operator
organisation, the GSMA, said that the flaw was limited to a minority of sim
cards and that newer sim cards may not be affected.. It said that it had
advised operators of the security risks involved.
Share and Enjoy
Lightbeam for Firefox (Shows the First and Third Party Interaction on the Web)
By : Unknown
Lightbeam is a Firefox add-on that enables you to see the
first and third party sites you interact with on the Web. Using interactive
visualizations, Lightbeam shows you the relationships between these third
parties and the sites you visit.
Using interactive visualizations, Lightbeam enables you to
see the first and third party sites you interact with on the Web. As you
browse, Lightbeam reveals the full depth of the Web today, including parts that
are not transparent to the average user. Using three distinct interactive
graphic representations — Graph, Clock and List — Lightbeam enables you to
examine individual third parties over time and space, identify where they
connect to your online activity and provides ways for you to engage with this
unique view of the Web.
How Lightbeam Works ::
When you activate Lightbeam and visit a website, sometimes
called the first party, the add-on creates a real time visualization of all the
third parties that are active on that page. The default visualization is called
the Graph view. As you then browse to a second site, the add-on highlights the
third parties that are also active there and shows which third parties have
seen you at both sites. The visualization grows with every site you visit and
every request made from your browser. In addition to the Graph view, you can
also see your data in a Clock view to examine connections over a 24-hour period
or in a List view to drill down into individual sites.
How You Can Use Lightbeam to Help Us Illuminate the Inner
Workings of the Web ::
As a part of Lightbeam, we're creating a big-picture view of
how tracking works on the Internet, and how third-party sites are connected to
multiple other sites. You may contribute your data to our crowdsourced directory
by simply turning on the share switch within the add-on. To disable
crowdsourcing, you can turn it off at any time. You can view your local data
stored within Lightbeam at any time, or save your data by clicking the
"Save" button under the data section on the left side of the add-on.
How is my information stored? ::
As a default, all info generated and used for Lightbeam’s
visualizations and features are only stored locally on your computer. You can
save a copy of your connection history at any time, which is also where you can
see the specific data collected by the add-on. You may also reset Lightbeam to
erase your locally stored connection history, disable it to stop data
collection or uninstall it to instantly remove all locally stored data related to
Lightbeam.