Saturday, November 20, 2010

Scan websites against XSS with OWASP Scrubbr v1.0

Scrubbr is a BSD-licensed database scanning tool that checks numerous database technologies for the presence of possible stored cross-site scripting attacks. The tool was partially inspired by "Scrawlr", a trimmed-down version of HP’s WebInspect which was released for free after the so-called "asprox" mass-SQL injection bot exploited hundreds of thousands of insecure ASP sites.

Download XSS Scanning Tool Here

BlackSheep: Way to Avoid FireSheep!

This is an intelligent tool in a sense that you get to know the IP address of the attacker who is running FireSheep. Suitably, BlackSheep is also a Firefox plugin, that is designed to combat FireSheep. It does so by dropping ‘fake’ session IDs on the wire and then monitoring traffic to see if it has been hijacked. BlackSheep identifies FireSheep via a request to a domain that it identifies session information. Using this hijacked session information, FireSheep contacts the targeted host in order to obtain the name of the hijacked user along with an image of the person, if available. When identified, the user will be receive the following warning message:





FireSheep and BlackSheep can not co-exist on the same Firefox profile as they share a lot of common code. If you need to use them on the same machine, use different Firefox profiles.

Download BlackSheep v1.0.0 (blacksheep-latest.xpi) here.

Hack Facebook/Twitter Or Any Email Account With Session Hijacking

When logging into a website you usually start by submitting your username and password. The server then checks to see if an account matching this information exists and if so, replies back to you with a "cookie" which is used by your browser for all subsequent requests.

It's extremely common for websites to protect your password by encrypting the initial login, but surprisingly uncommon for websites to encrypt everything else. This leaves the cookie (and the user) vulnerable. HTTP session hijacking (sometimes called "sidejacking") is when an attacker gets a hold of a user's cookie, allowing them to do anything the user can do on a particular website. On an open wireless network, cookies are basically shouted through the air, making these attacks extremely easy.
This is a widely known problem that has been talked about to death, yet very popular websites continue to fail at protecting their users. The only effective fix for this problem is full end-to-end encryption, known on the web as HTTPS or SSL. Facebook is constantly rolling out new "privacy" features in an endless attempt to quell the screams of unhappy users, but what's the point when someone can just take over an account entirely? Twitter forced all third party developers to use OAuth then immediately released (and promoted) a new version of their insecure website. When it comes to user privacy, SSL is the elephant in the room.
Firesheep, a Firefox extension designed to demonstrate just how serious this problem is.
After installing the extension you'll see a new sidebar. Connect to any busy open wifi network and click the big "Start Capturing" button. Then wait.



As soon as anyone on the network visits an insecure website known to Firesheep, their name and photo will be displayed:






Double-click on someone, and you're instantly logged in as them.








That's it.
Firesheep is free, open source, and is available now for Mac OS X and Windows. Linux support is on the way.
Websites have a responsibility to protect the people who depend on their services. They've been ignoring this responsibility for too long, and it's time for everyone to demand a more secure web. My hope is that Firesheep will help the users win.
By Codebutler..

PHP Programming Video Tutorial: Basics Tutorials PHP Programming

What This Course Covers (02:14)
What You Will Need (02:41)
Resources - Using PHP.net Pt.1 (04:51)
Resources - Using PHP.net Pt.2 (04:17)
Other PHP Resources (03:10)
Hosting Resources (06:23)

Starting with PHP
What is PHP (04:10)
PHP Programming Standards (04:07)
Embedding PHP in HTML (05:27)
Embedding HTML in PHP (05:15)
The All Important Semi-colon (01:38 )
Your First PHP Script (05:34)
Comments (02:24)
Chapter 2 Challenge (07:57)

PHP Basics
Variables (04:04)
PHP Statements (00:45)
Values and Value Types Part 1 (07:48 )
Values and Value Types Part 2 (02:43)
Referencing Variables and Constants (03:00)
Superglobals (05:04)
Variable Variables (03:56)
Basic Operators Part 1 (04:21)
Basic Operators Part 2 (04:35)
Advanced Operators (05:52)
Chapter 3 Challenge (06:08 )

PHP Conditionals and Loops
The "IF" Statement (04:45)
Extending "IF" (03:02)
"SWITCH" Statements (04:40)
The "WHILE" Structure (03:18 )
The "DO-WHILE" Structure (02:29)
The "FOR" Loop (04:41)
Chapter 4 Challenge (02:28 )

Applying What You Know
INCLUDE and REQUIRE (03:42)
Setting up Your File Structure (04:53)
Global Headers and Footers (03:16)
A Functional Website Example Pt.1 (06:23)
A Functional Website Example Pt.2 (04:18 )
A Functional Website Example Pt.3 (04:32)
A Functional Website Example Pt.4 (04:49)
A Functional Website Example Pt.5 (04:30)
A Functional Website Example - Addendum (06:09)

PHP and functions
Why use functions (03:12)
Variable Scope (02:58)
Creating and using Functions (03:12)
Functions with Parameters (06:28 )
Returning Values (04:05)
Chapter 6 Challenge (05:59)

PHP Arrays
What is an Array (02:09)
Creating Arrays (06:03)
Multidimensional Arrays (03:23)
"FOREACH" looping - basic (03:18 )
"FOREACH" looping - advanced (04:19)
Navigating Arrays (02:21)
Manipulating Keys (03:56)
Sorting Arrays (02:41)
Serialization (02:20)
Challenge (07:56)

Starting with MYSQL
Getting Information: mysql.com (02:49)
Other MYSQL Resources (02:00)
What is a relational database? (03:27)
Accessing MYSQL - the command line (04:36)

MYSQL Basics
Configuring Users in MYSQL - Part 1 (03:59)
Configuring Users in MYSQL - Part 2 (03:02)
Creating Databases and Tables (02:24)
MYSQL Data Types - Numeric Types (04:04)
MYSQL Data Types - Date Types (02:17)
MYSQL Data Types - String Types (02:58)
EXAMPLE: Creating A Table Statement - Part 1 (05:27)
EXAMPLE: Creating A Table Statement - Part 2 (03:47)
Basic MYSQL commands - INSERT (02:46)
Basic MYSQL commands - SELECT and UPDATE (05:46)
Basic MYSQL commands - DELETE and DROP (02:32)
Setting Up phpMyAdmin (05:43)
Using phpMyAdmin (06:06)

Using MYSQL with PHP
Connecting to MYSQL (02:28 )
Choosing a database (01:49)
Querying a database (03:53)
Retrieving results (05:38 )
Useful MySQL functions in PHP (03:55)

PHP and Sessions
What is a session (01:39)
set_cookie vs session_start (05:36)
Session Tracking With Built in PHP Functions (03:54)
Session Tracking With Databases Pt.1 (04:36)
Session Tracking With Databases Pt.2 (04:40)

Final Words
Where to go from here (03:02)

Credits
About the Author (02:04)



DOWNLOAD

hotfile.com
http://hotfile.com/dl/82631826/af976c0/VTC.p.h.p.part1.rar.html
http://hotfile.com/dl/82631917/f4c4373/VTC.p.h.p.part2.rar.html

fileserve.com
http://www.fileserve.com/file/tZErwTZ/VTC.p.h.p.part1.rar
http://www.fileserve.com/file/mWPEjEr/VTC.p.h.p.part2.rar

filesonic.com
http://www.filesonic.com/file/32308259/VTC.p.h.p.part1.rar
http://www.filesonic.com/file/32308093/VTC.p.h.p.part2.rar

Sunday, November 14, 2010

Computer Scientist, Student Design Software to Combat Hacking Using Keystroke Anti-Spoofing Technique

One of the serious threats to a user's computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone's identity. This form of an attack is increasing, infecting enterprise and personal computers, and caused by "organized malicious botnets," said Daphne Yao, assistant professor of computer science at Virginia Tech.

To combat the "spoofing attacks," Yao and her former student, Deian Stefan, now a graduate student in the computer science department at Stanford University, developed an authentication framework called "Telling Human and Bot Apart" (TUBA), a remote biometrics system based on keystroke-dynamics information.

Their work won a best paper award at CollaborateCom '10, the 6th International Conference on Collaborative Computing, held in Chicago and sponsored by the Institute of Electrical and Electronic Engineers' Computer Society, Create-Net, and the Institute for Computer Sciences.

Tuesday, November 9, 2010

A PRACTICAL WAY TO FIND ADMINISTRATOR WEB PAGE

Administrator web page is the most important pages in a web. Because, from here a web control facilities. One of the hacking technique which is still popular is trying to find the administrator account on this page through a variety of techniques such as exploits, bruteforce, SQL Injection and also include requesting assistance with a number of software password hacking.

Regardless of any technique, hackers agree if the administrator page is one of the most essential web pages and the most search for exploitation. Typically, the administrator page url address is http://www.sitename.com/admin.php, http://www.sitename.com/admin.html and so forth.

Because of the susceptibility of admin pages, its url address recently deliberate in secret by using the unique url address to make difficult to guess, at least give a little trouble on the hackers to find it.

The groups of Indian hackers (Indian Cyber Army), released a site called Admin finder that can help us to find administrator page. The web address is: http://adminfinder.cyberarmy.in/.

On a black background sites, we only are asked to enter the url address of a target site with the end slash mark (/), then press the Submit Site Bottom. AdminFinder will look for administrators pages. administrators web pages will be displayed with a description in the left column. If found, will be given a description "Found!" with Red color. While that does not exist, will be given a "Not Found!" description with yellow color. The red color with the description "Found!" is the administrator page. It’s easy right?.

Computer Scientist, Student Design Software to Combat Hacking Using Keystroke Anti-Spoofing Technique

One of the serious threats to a user's computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone's identity. This form of an attack is increasing, infecting enterprise and personal computers, and caused by "organized malicious botnets," said Daphne Yao, assistant professor of computer science at Virginia Tech.

Friday, October 29, 2010

DNS Rebinding Attack Can Be Used to Hack Home Routers


A security researcher has devised a special attack that can be used to access the LAN-facing admin interfaces of many widely used home router models. The technique is a variation of DNS rebinding, but is able to bypass traditional protections against such attacks.

The attack method will be demonstrated at the upcoming Black Hat technical security conference in Las Vegas, by a ethical hacker named Craig Heffner, who currently works as a senior security engineer at Seismic. Heffner's presentation, called “How to Hack Millions of Routers” will be accompanied by the release of a tool which automates the attack.

Read More : Click Here

Researcher Forces Cash Out of Automated Teller Machines


Security researcher Barnaby Jack gave his long overdue presentation on ATM exploits in front of an audience at the Black Hat security conference in Las Vegas. The hacker managed to force two different ATM models to dispense cash using both remote and local attacks.

Automated Teller Machines (ATMs) are pretty much ubiquitous these days and most people are used to trusting them. Unfortunately, the sad reality is that these machines are far from safe and the rate of ATM crime is on a steep climb.

Attacks like ATM skimming have been around for a long time and several variants of ATM malware have also appeared in the past two years. However, Barnaby Jack's research, which involve remotely exploitable vulnerabilities, takes ATM security risks to a whole new level.

Researcher Releases Phone Call Eavesdropping Software

A security researcher has released open source software that can be used to record and decrypt communications passing over 2G GSM networks. Unlike other available solutions, that require very expensive set-ups, this free set of tools can work on off-the-shelf equipment.

The software was demoed at the Black Hat security conference in Las Vegas by Karsten Nohl, a security researcher who specializes in probing GSM security. His previous research focused on the A5/1 stream cipher used to encrypt GSM communications.

This cipher dates back to 1987 and is still widely used in Europe and the United States, despite being reverse-engineered in 1999. GSM operators have began adopting the more secure A5/3 cipher, which is used to encrypt traffic passing over 3G networks. However, when 3G coverage is not available, phones drop back to the insecure 2G standard.

Read More : Click Here

Thursday, October 28, 2010

Now, a social network for bookworms

LONDON: Penguin is set to launch a social network for teenaged bookworms called Spinebreakers, to keep them interested in reading.

Penguin views Spinebreakers, the social network, as a crucial part of future-proofing the book industry.

Spinebreakers, as a content website, already exists but does not have any tools which allow its users to communicate and interact about their shared pastime. Instead, it is a site where teenagers write about books and authors.

Anna Rafferty, managing director of Penguin Digital, who founded the site three years ago, told The Telegraph: "I set up the site as I felt there were fewer and fewer places talking about books in a way which appealed to teenagers."

Read More : Click Here

Russia To Say Bye-Bye To Microsoft's Windows!


MOSCOW: The Russian state plans to revamp its computer services with a Windows rival to reduce its dependence on US giant Microsoft and better monitor computer security, a lawmaker said.


Moscow will earmark 150 million rubles (3.5 million euros, $4.9 million) to develop a national software system based on the Linux operating system, Russian deputy Ilia Ponomarev said, confirming an earlier report in the Vedomosti daily.

"The devil is in the details," said Ponomarev, a computer expert, adding those details would be hashed out during a December meeting headed by vice-prime minister Sergei Ivanov.

Read More : click here

Monday, October 25, 2010

New Firefox add-on hijacks Facebook, Twitter sessions


A new Firefox add-on lets "pretty much anyone" scan a Wi-Fi network and hijack others' access to Facebook, Twitter and a host of other services, a security researcher warned today.

The add-on, dubbed "Firesheep," was released Sunday by Eric Butler, a Seattle-based freelance Web application developer, at the ToorCon security conference, which took place Oct. 22-24 in San Diego.

Butler said he created Firesheep to show the danger of accessing unencrypted Web sites from public Wi-Fi spots.

Read More : Click Here

Wednesday, October 20, 2010

De Dana Dan movie HD DVDRip Movie Free Download


Download good quality De Dana Dan movie....
  • Sendspace Links....
http://www.sendspace.com/file/o4rumh
http://www.sendspace.com/file/ijrx6h
http://www.sendspace.com/file/5avn6p
http://www.sendspace.com/file/qcfa6n
http://www.sendspace.com/file/xbtxjv
  • Megaupload links....
http://www.megaupload.com/?d=3HJI5JP4
http://www.megaupload.com/?d=09HDMPGX
http://www.megaupload.com/?d=AKR9DL2H
http://www.megaupload.com/?d=X4TQM6D9
  • Rapidshare Links..
http://rapidshare.com/files/338233199/De.Dana.Dan.1CD.DVDrip.2009.bychinnamama.mkv.002
http://rapidshare.com/files/338232877/De.Dana.Dan.1CD.DVDrip.2009.bychinnamama.mkv.002
http://rapidshare.com/files/338228594/De.Dana.Dan.1CD.DVDrip.2009.bychinnamama.mkv.003
http://rapidshare.com/files/338230507

India overtakes US as biggest virus producer


India has overtaken the US as the single biggest producer of viruses, according to analysis of internet threats by Network Box. India is now responsible for 13.74 per cent of the world’s viruses, up from 9.5 per cent in July. Russia is the next in line, producing just over 11 per cent of viruses - a jump from last month’s 4.01 per cent.The U.S. accounts for just over eight per cent, a significant decrease from 14.65 per cent last month. Virus levels from the UK have dropped to 2.5 per cent; down from five per cent last month. The UK is now the seventh-largest threat producing country in the world (down from fourth last month).

The highest number of firewall blocks come from the U.S. (18.3 per cent) and Korea (13 per cent). Simon Heron, internet security analyst for Network Box, says: “It is interesting to see that UDP:137 (NetBIOS’ name service) was the second most attacked port. It is obviously worth users and businesses checking their firewall rules as these figures indicate that there must still be systems out there with this port open to the internet. Also, it would appear that web proxies are also worth probing as TCP:8080 was third in the list, which suggests that hackers see this as another backdoor.”

read more : click here

'Unprecedented wave' of Java exploits hits users, says Microsoft

Microsoft said Monday that an "unprecedented wave" of attacks are exploiting vulnerabilities in Oracle's Java software.

According to a manager at Microsoft's Malware Protection Center (MMPC), attempts to exploit Java bugs have skyrocketed in the past nine months, climbing from less than half a million in the first quarter of 2010 to more than 6 million in the third quarter.

"Some of our exploit 'malware' families were telling a scary story ... an unprecedented wave of Java exploitation," said Holly Stewart, a senior program manager at the MMPC, in a post to the team's blog Monday.

Stewart went on to call the jump in Java attacks "scary" and added, "The spike in exploitation was surprising to say the least."

read more : http://www.computerworld.com

Hacker hits Kaspersky website

Scammers who try to trick victims into downloading fake antivirus software can strike almost anywhere. On Sunday they hit the website of Kaspersky Lab, a well-known antivirus vendor.

Someone took advantage of a bug in a Web program used by the Kasperskyusa.com website and reprogrammed it to try and trick visitors into downloading a fake product, Kaspersky confirmed Tuesday. Kaspersky didn't identify the flaw, but said it was in a "third-party application" used by the website.

"As a result of the attack, users trying to download Kaspersky Lab's consumer products were redirected to a malicious website," the antivirus vendor said. The website caused a pop-up window to appear that simulated a virus scan of the user's PC, and offered to install an antivirus program that was in fact bogus.

Ability to Detect Malware in Cloud-Computing Systems Improved

Researchers from North Carolina State University have developed new software that offers significantly enhanced security for cloud-computing systems. The software is much better at detecting viruses or other malware in the "hypervisors" that are critical to cloud computing, and does so without alerting the malware that it is being examined.

Georgia Tech Information Security Center Releases Cyber Threats Forecast for 2011

The Georgia Tech Information Security Center (GTISC), a national leader in information security research and education, has announced the release of the GTISC Emerging Cyber Threats Report for 2011, outlining the top three areas of security risk and concern for consumer and business Internet and computer users.

New Malware Could Steal Users Social Media Behavior and Info, Researchers Warn

A new study by Ben-Gurion University of the Negev (BGU) researchers predicts that a new generation of malware (software written for malicious purposes like identity theft) could steal data on human behavior patterns, which is more dangerous than traditional, detectable attacks.

SpamBot Wants to Be Your Friend

Social network sites such as Facebook, mySpace or Twitter are gaining popularity. But the 'Web 2.0' presents new dangers. At the Vienna University of Technology (VUT), security hazards of social network sites have been detected and studied. Researchers of the VUT now provide advice on how to increase your safety on the Web.

The last six months saw an increase in password stealing, as malware levels dropped

Predictions of an increase in attacks on social networks by password-stealing Trojans this year have been confirmed.

In McAfee’s 2010 Threat Predictions, it anticipated that attacks on social networks by password-stealing Trojans and other malware would increase in 2010, and during the current quarter it has seen several examples of that prediction in action. The most prominent of this is the Zeus family, which it usually observes as PWS-Zbot and Spy-Agent.bw, and is the pre-eminent password-stealing Trojan malware, according to its threat report for the first quarter of 2010.

The report said: “Zeus is just one of the key tools of cyber criminals, who often tie password stealers with other types of illegal online material. In this quarter we saw all kind of goodies being installed with Zeus. And whom do you imagine was the prime target for these attacks? Facebook users.”

Saturday, October 16, 2010

Indian hackers focus on botnet attacks: Microsoft


New Delhi, Oct 15: A new report released by computer giant Microsoft has revealed that the attack of 'botnets' on computers has increased in India.
A botnet is a network of computers, controlled by one computer (bot herder), which attacks another PC and makes it a part of its network. The report says that the Indian cybercriminals are looking at creating botnets.
Microsoft security Report version 9, which covered more than 200 countries and territories, ranked India 25th in terms of bot infections detected and removed in the quarter ended Jun 2010.

CWG Official Website Attacked by Pakistani & China Hackers


New Delhi: The Commonwealth Games (CWG) website, which got more than seven million visitors everyday, buckled not because of technical glitches but a deliberate mischief, sources said.

Few weeks ago, the Commonwealth Games website came under cyber attack which was possibly routed from China.

Sources tell CNN-IBN that within two hours of the Games opening ceremony, the website faced massive cyber attacks, possibly from China. India's Computer Emergency Response Team (CERTIN) had to set up a special cyber control room at the games village. But the cyber attacks continued till the end of Games.

Thursday, October 14, 2010

Microsoft, Facebook unveil deeper social search on Bing


MOUNTAIN VIEW, Calif.--Bing will soon allow searchers to see results generated by their Facebook friends' use of the "like" button on the social network, Microsoft announced today.

Microsoft's Qi Lu, president of Microsoft Online Services, and Facebook founder and CEO Mark Zuckerberg held a press conference at Microsoft's Silicon Valley headquarters to announce an extension of a long-running partnership between the two companies to feature Facebook profiles and a "liked by your friends" section that takes advantage of the way that Web publishers have implemented Facebook's "like" button on their sites.



Beware of fake 'dislike' button on Facebook


Washington, Aug 17: A fake 'dislike' button, which is not offered by Facebook, is spreading like a virus across the social networking site Facebook.

If the user clicks the fake 'dislike' button followed by a link, instead of installing a dislike button, the application uses the person's network to continue spreading the fake programme.

Facebook officials told that they are trying hard to block the fake 'dislike' button. They also told that Facebook don't have any official dislike button and asked the users not to click on the suspicious links.

US focuses on technology to face cyber threats


Washington, Aug 26: United States defence official told that Pentagon trains it's network administrators 'ethical hacking' to understand the weaknesses before they are exploited by an enemy.

US Deputy Secretary of Defence William J Lynn told that the America must face the cyber defence challenge with a focus on superior technology and productivity. He also told that the US has to focus on technology and productivity as the countries like China and India will train more highly proficient computer scientists in coming years.

Imagine : Sanskrit as computer programming language?

The idea of Sanskrit as programming language seems to stem from NASA
researcher Rick Briggs' 1985 paper, "Knowledge Representation in Sanskrit
and Artificial Intelligence," AI Magazine Vol 6, #1, 1985.

Briggs proposed Sanskrit as a good language for AI-style knowledge
representation, i.e. for machine representation of knowledge expressed in a
structured form, based on natural language. Sanskrit is apparently
well-suited to this application, partly because of its systematized grammar,
and its relative lack of ambiguity. Briggs pointed out correspondences
between KR structures used in AI, and equivalent structures in Sanskrit. At
least a couple of conferences arose as a result of this paper.

Wednesday, October 13, 2010

Avatar Movie High Definition quality HD Print Download

Download Avtar Hollywood Movie High Definition Quality HD Print...
Download Link...

http://hotfile.com/dl/33575099/b1c6494/avatar_part1.rar.html
http://hotfile.com/dl/33575269/cdd8557/avatar_part2.rar.html
http://hotfile.com/dl/33575504/97b1db1/avatar_part3.rar.html
http://hotfile.com/dl/33575645/47b9fd5/avatar_part4.rar.html

Google inserts 'extra protection' against hacking


San Francisco, Sep 21: The threats of online hacking and cyber crimes are increasing day by day. Internet users face hacking to their bank accounts, emails , social networking accounts and even to the personal websites. The security on web is the hottest issue faced by all big players in the web market. To face hacking threats, Google Inc has introduced a new security measure for Google account holders.

Monday, October 11, 2010

3 Idiots HD Quality Movie Free Download

Download 3 Idiots Movie DVD Rip HD Good Quality...
Download Links...
  1. http://rapidshare.com/files/334588466/3I.TEAM-TDK.mkv.001
  2. http://rapidshare.com/files/333620275/3I.TEAM-TDK.mkv.002
  3. http://rapidshare.com/files/333609023/3I.TEAM-TDK.mkv.003
  4. http://rapidshare.com/files/333574663/3I.TEAM-TDK.mkv.004
  5. http://rapidshare.com/files/334553603/3I.TEAM-TDK.mkv.005
  6. http://rapidshare.com/files/333571990/3I.TEAM-TDK.mkv.006
  7. http://rapidshare.com/files/333570691/3I.TEAM-TDK.mkv.007
copy and paste links into your browser then hit enter....

Sunday, October 10, 2010

Russian hacker selling Facebook users' details

Auckland, Apr 26: The New Zealand police is on the look out for a Russian hacker, who is allegedly selling secret details of Facebook users.

According to a report in tvnz.co.nz, the police believe that the hacker may have set up an underground nexus in New Zealand for selling secret details of people using popular social networking site Facebook.


The hacker has allegedly sold details of millions of Facebook users. He sells names and passwords of Facebook users in an underground forum.

Microsoft introduces online web applications in new version of Office

Microsoft has announced the release of the latest versions of the business editions of Office and Share Point.

A key feature of the launch is the ability to ‘work virtually anywhere’ with Microsoft Office Web Apps, what it calls the online companions to Word, PowerPoint, Microsoft Excel and OneNote.

It claimed that this will help preserve the look and feel of a document regardless of device, so the content and format are generally preserved while moving between the PC, phone and browser.

There is also added capabilities for mobile use, as Office Mobile 2010 has been made available for free via Windows Phone Marketplace for all Windows Mobile 6.5 phones with a previous version of Office Mobile.

Virus attack on Orkut fixed, says Google blog


California, Sep 26: The search Engine giant Google Inc has announced that the virus attack on their Social Networking Site Orkut was removed.

Orkut was hit by Bom Sabado virus, which means 'Good Saturday' in Portuguese, on Saturday, Sep 25. This virus posted scraps to the Orkut users with the text Bom Sabado and is sent to the users account by the name of the other friends account. It also added affected users to new Orkut groups.

Virus attacks Twitter, sent visitors to porn sites


Washington, Sep 22: The popular Social Networking Site Twitter was affected by virus attack on Tuesday, Sep 21.
Millions of Twitter users faced the problem for more than two hours. Users scrolled over links on Twitter only to find ugly content appeared without warning, in some cases re-tweeting the links to followers and spreading the bug around the globe.

Later Twitter officially announced that the attack was fixed. But some of the security experts told that virus attack on the popular website exposed the serious security flaw, one that could be exploited by hackers in the future to install malicious software and steal personal information.

Hackers using Facebook holiday posts to loot money Hackers using Facebook holiday posts to loot money

Sydney, Sep 21: Think twice before you post your holiday plans on Facebook. Australia's national consumer regulator has reported that online hackers are using Facebook holiday posts to hack users bank accounts.

10-10-10 virus to attack web on Sunday Oct 2010?



London, Oct 8: Rumors about a possible virus attack on web on Sunday, Oct 10 spread on internet.
Some of the experts have warned about the malware attack on web at 10:10 am/pm Sunday, Oct 2010 as it appears like 10.10.10, a date whose symmetry has occurred once a year since 2001 and will do so until 2012.

Different news like computers internal clock will either jam or let loose a virus were spread on internet. Also a Facebook page has been set up with the title "Will my computer still work on 10/10/10 at 10.10am?".

Some computer safety experts suggested users to reset their computers internal clock to avoid the risk of virus attack.

Hackers penetrate Carder forum

Hackers have penetrated German underground forum carders.cc, copied login details, e-mail addresses and private e-mails from several thousand members and published them on RapidShare. According to a list seen by The H’s associates at heise Security, the forum software had also logged the IP addresses of nearly one thousand members over a specific period. These have also been published.

Ultimate guide to Windows 7 security

Windows 7 has been warmly received and swiftly adopted by businesses, with the result that many IT admins are now struggling with the platform’s new security features. In addition to changes to User Account Control, BitLocker, and other features inherited from Windows Vista, Windows 7 introduces a slew of security capabilities that businesses will want to take advantage of.