Friday, October 29, 2010

DNS Rebinding Attack Can Be Used to Hack Home Routers


A security researcher has devised a special attack that can be used to access the LAN-facing admin interfaces of many widely used home router models. The technique is a variation of DNS rebinding, but is able to bypass traditional protections against such attacks.

The attack method will be demonstrated at the upcoming Black Hat technical security conference in Las Vegas, by a ethical hacker named Craig Heffner, who currently works as a senior security engineer at Seismic. Heffner's presentation, called “How to Hack Millions of Routers” will be accompanied by the release of a tool which automates the attack.

Read More : Click Here

Researcher Forces Cash Out of Automated Teller Machines


Security researcher Barnaby Jack gave his long overdue presentation on ATM exploits in front of an audience at the Black Hat security conference in Las Vegas. The hacker managed to force two different ATM models to dispense cash using both remote and local attacks.

Automated Teller Machines (ATMs) are pretty much ubiquitous these days and most people are used to trusting them. Unfortunately, the sad reality is that these machines are far from safe and the rate of ATM crime is on a steep climb.

Attacks like ATM skimming have been around for a long time and several variants of ATM malware have also appeared in the past two years. However, Barnaby Jack's research, which involve remotely exploitable vulnerabilities, takes ATM security risks to a whole new level.

Researcher Releases Phone Call Eavesdropping Software

A security researcher has released open source software that can be used to record and decrypt communications passing over 2G GSM networks. Unlike other available solutions, that require very expensive set-ups, this free set of tools can work on off-the-shelf equipment.

The software was demoed at the Black Hat security conference in Las Vegas by Karsten Nohl, a security researcher who specializes in probing GSM security. His previous research focused on the A5/1 stream cipher used to encrypt GSM communications.

This cipher dates back to 1987 and is still widely used in Europe and the United States, despite being reverse-engineered in 1999. GSM operators have began adopting the more secure A5/3 cipher, which is used to encrypt traffic passing over 3G networks. However, when 3G coverage is not available, phones drop back to the insecure 2G standard.

Read More : Click Here

Thursday, October 28, 2010

Now, a social network for bookworms

LONDON: Penguin is set to launch a social network for teenaged bookworms called Spinebreakers, to keep them interested in reading.

Penguin views Spinebreakers, the social network, as a crucial part of future-proofing the book industry.

Spinebreakers, as a content website, already exists but does not have any tools which allow its users to communicate and interact about their shared pastime. Instead, it is a site where teenagers write about books and authors.

Anna Rafferty, managing director of Penguin Digital, who founded the site three years ago, told The Telegraph: "I set up the site as I felt there were fewer and fewer places talking about books in a way which appealed to teenagers."

Read More : Click Here

Russia To Say Bye-Bye To Microsoft's Windows!


MOSCOW: The Russian state plans to revamp its computer services with a Windows rival to reduce its dependence on US giant Microsoft and better monitor computer security, a lawmaker said.


Moscow will earmark 150 million rubles (3.5 million euros, $4.9 million) to develop a national software system based on the Linux operating system, Russian deputy Ilia Ponomarev said, confirming an earlier report in the Vedomosti daily.

"The devil is in the details," said Ponomarev, a computer expert, adding those details would be hashed out during a December meeting headed by vice-prime minister Sergei Ivanov.

Read More : click here

Monday, October 25, 2010

New Firefox add-on hijacks Facebook, Twitter sessions


A new Firefox add-on lets "pretty much anyone" scan a Wi-Fi network and hijack others' access to Facebook, Twitter and a host of other services, a security researcher warned today.

The add-on, dubbed "Firesheep," was released Sunday by Eric Butler, a Seattle-based freelance Web application developer, at the ToorCon security conference, which took place Oct. 22-24 in San Diego.

Butler said he created Firesheep to show the danger of accessing unencrypted Web sites from public Wi-Fi spots.

Read More : Click Here

Wednesday, October 20, 2010

De Dana Dan movie HD DVDRip Movie Free Download


Download good quality De Dana Dan movie....
  • Sendspace Links....
http://www.sendspace.com/file/o4rumh
http://www.sendspace.com/file/ijrx6h
http://www.sendspace.com/file/5avn6p
http://www.sendspace.com/file/qcfa6n
http://www.sendspace.com/file/xbtxjv
  • Megaupload links....
http://www.megaupload.com/?d=3HJI5JP4
http://www.megaupload.com/?d=09HDMPGX
http://www.megaupload.com/?d=AKR9DL2H
http://www.megaupload.com/?d=X4TQM6D9
  • Rapidshare Links..
http://rapidshare.com/files/338233199/De.Dana.Dan.1CD.DVDrip.2009.bychinnamama.mkv.002
http://rapidshare.com/files/338232877/De.Dana.Dan.1CD.DVDrip.2009.bychinnamama.mkv.002
http://rapidshare.com/files/338228594/De.Dana.Dan.1CD.DVDrip.2009.bychinnamama.mkv.003
http://rapidshare.com/files/338230507

India overtakes US as biggest virus producer


India has overtaken the US as the single biggest producer of viruses, according to analysis of internet threats by Network Box. India is now responsible for 13.74 per cent of the world’s viruses, up from 9.5 per cent in July. Russia is the next in line, producing just over 11 per cent of viruses - a jump from last month’s 4.01 per cent.The U.S. accounts for just over eight per cent, a significant decrease from 14.65 per cent last month. Virus levels from the UK have dropped to 2.5 per cent; down from five per cent last month. The UK is now the seventh-largest threat producing country in the world (down from fourth last month).

The highest number of firewall blocks come from the U.S. (18.3 per cent) and Korea (13 per cent). Simon Heron, internet security analyst for Network Box, says: “It is interesting to see that UDP:137 (NetBIOS’ name service) was the second most attacked port. It is obviously worth users and businesses checking their firewall rules as these figures indicate that there must still be systems out there with this port open to the internet. Also, it would appear that web proxies are also worth probing as TCP:8080 was third in the list, which suggests that hackers see this as another backdoor.”

read more : click here

'Unprecedented wave' of Java exploits hits users, says Microsoft

Microsoft said Monday that an "unprecedented wave" of attacks are exploiting vulnerabilities in Oracle's Java software.

According to a manager at Microsoft's Malware Protection Center (MMPC), attempts to exploit Java bugs have skyrocketed in the past nine months, climbing from less than half a million in the first quarter of 2010 to more than 6 million in the third quarter.

"Some of our exploit 'malware' families were telling a scary story ... an unprecedented wave of Java exploitation," said Holly Stewart, a senior program manager at the MMPC, in a post to the team's blog Monday.

Stewart went on to call the jump in Java attacks "scary" and added, "The spike in exploitation was surprising to say the least."

read more : http://www.computerworld.com

Hacker hits Kaspersky website

Scammers who try to trick victims into downloading fake antivirus software can strike almost anywhere. On Sunday they hit the website of Kaspersky Lab, a well-known antivirus vendor.

Someone took advantage of a bug in a Web program used by the Kasperskyusa.com website and reprogrammed it to try and trick visitors into downloading a fake product, Kaspersky confirmed Tuesday. Kaspersky didn't identify the flaw, but said it was in a "third-party application" used by the website.

"As a result of the attack, users trying to download Kaspersky Lab's consumer products were redirected to a malicious website," the antivirus vendor said. The website caused a pop-up window to appear that simulated a virus scan of the user's PC, and offered to install an antivirus program that was in fact bogus.

Ability to Detect Malware in Cloud-Computing Systems Improved

Researchers from North Carolina State University have developed new software that offers significantly enhanced security for cloud-computing systems. The software is much better at detecting viruses or other malware in the "hypervisors" that are critical to cloud computing, and does so without alerting the malware that it is being examined.

Georgia Tech Information Security Center Releases Cyber Threats Forecast for 2011

The Georgia Tech Information Security Center (GTISC), a national leader in information security research and education, has announced the release of the GTISC Emerging Cyber Threats Report for 2011, outlining the top three areas of security risk and concern for consumer and business Internet and computer users.

New Malware Could Steal Users Social Media Behavior and Info, Researchers Warn

A new study by Ben-Gurion University of the Negev (BGU) researchers predicts that a new generation of malware (software written for malicious purposes like identity theft) could steal data on human behavior patterns, which is more dangerous than traditional, detectable attacks.

SpamBot Wants to Be Your Friend

Social network sites such as Facebook, mySpace or Twitter are gaining popularity. But the 'Web 2.0' presents new dangers. At the Vienna University of Technology (VUT), security hazards of social network sites have been detected and studied. Researchers of the VUT now provide advice on how to increase your safety on the Web.

The last six months saw an increase in password stealing, as malware levels dropped

Predictions of an increase in attacks on social networks by password-stealing Trojans this year have been confirmed.

In McAfee’s 2010 Threat Predictions, it anticipated that attacks on social networks by password-stealing Trojans and other malware would increase in 2010, and during the current quarter it has seen several examples of that prediction in action. The most prominent of this is the Zeus family, which it usually observes as PWS-Zbot and Spy-Agent.bw, and is the pre-eminent password-stealing Trojan malware, according to its threat report for the first quarter of 2010.

The report said: “Zeus is just one of the key tools of cyber criminals, who often tie password stealers with other types of illegal online material. In this quarter we saw all kind of goodies being installed with Zeus. And whom do you imagine was the prime target for these attacks? Facebook users.”

Saturday, October 16, 2010

Indian hackers focus on botnet attacks: Microsoft


New Delhi, Oct 15: A new report released by computer giant Microsoft has revealed that the attack of 'botnets' on computers has increased in India.
A botnet is a network of computers, controlled by one computer (bot herder), which attacks another PC and makes it a part of its network. The report says that the Indian cybercriminals are looking at creating botnets.
Microsoft security Report version 9, which covered more than 200 countries and territories, ranked India 25th in terms of bot infections detected and removed in the quarter ended Jun 2010.

CWG Official Website Attacked by Pakistani & China Hackers


New Delhi: The Commonwealth Games (CWG) website, which got more than seven million visitors everyday, buckled not because of technical glitches but a deliberate mischief, sources said.

Few weeks ago, the Commonwealth Games website came under cyber attack which was possibly routed from China.

Sources tell CNN-IBN that within two hours of the Games opening ceremony, the website faced massive cyber attacks, possibly from China. India's Computer Emergency Response Team (CERTIN) had to set up a special cyber control room at the games village. But the cyber attacks continued till the end of Games.

Thursday, October 14, 2010

Microsoft, Facebook unveil deeper social search on Bing


MOUNTAIN VIEW, Calif.--Bing will soon allow searchers to see results generated by their Facebook friends' use of the "like" button on the social network, Microsoft announced today.

Microsoft's Qi Lu, president of Microsoft Online Services, and Facebook founder and CEO Mark Zuckerberg held a press conference at Microsoft's Silicon Valley headquarters to announce an extension of a long-running partnership between the two companies to feature Facebook profiles and a "liked by your friends" section that takes advantage of the way that Web publishers have implemented Facebook's "like" button on their sites.



Beware of fake 'dislike' button on Facebook


Washington, Aug 17: A fake 'dislike' button, which is not offered by Facebook, is spreading like a virus across the social networking site Facebook.

If the user clicks the fake 'dislike' button followed by a link, instead of installing a dislike button, the application uses the person's network to continue spreading the fake programme.

Facebook officials told that they are trying hard to block the fake 'dislike' button. They also told that Facebook don't have any official dislike button and asked the users not to click on the suspicious links.

US focuses on technology to face cyber threats


Washington, Aug 26: United States defence official told that Pentagon trains it's network administrators 'ethical hacking' to understand the weaknesses before they are exploited by an enemy.

US Deputy Secretary of Defence William J Lynn told that the America must face the cyber defence challenge with a focus on superior technology and productivity. He also told that the US has to focus on technology and productivity as the countries like China and India will train more highly proficient computer scientists in coming years.

Imagine : Sanskrit as computer programming language?

The idea of Sanskrit as programming language seems to stem from NASA
researcher Rick Briggs' 1985 paper, "Knowledge Representation in Sanskrit
and Artificial Intelligence," AI Magazine Vol 6, #1, 1985.

Briggs proposed Sanskrit as a good language for AI-style knowledge
representation, i.e. for machine representation of knowledge expressed in a
structured form, based on natural language. Sanskrit is apparently
well-suited to this application, partly because of its systematized grammar,
and its relative lack of ambiguity. Briggs pointed out correspondences
between KR structures used in AI, and equivalent structures in Sanskrit. At
least a couple of conferences arose as a result of this paper.

Wednesday, October 13, 2010

Avatar Movie High Definition quality HD Print Download

Download Avtar Hollywood Movie High Definition Quality HD Print...
Download Link...

http://hotfile.com/dl/33575099/b1c6494/avatar_part1.rar.html
http://hotfile.com/dl/33575269/cdd8557/avatar_part2.rar.html
http://hotfile.com/dl/33575504/97b1db1/avatar_part3.rar.html
http://hotfile.com/dl/33575645/47b9fd5/avatar_part4.rar.html

Google inserts 'extra protection' against hacking


San Francisco, Sep 21: The threats of online hacking and cyber crimes are increasing day by day. Internet users face hacking to their bank accounts, emails , social networking accounts and even to the personal websites. The security on web is the hottest issue faced by all big players in the web market. To face hacking threats, Google Inc has introduced a new security measure for Google account holders.

Monday, October 11, 2010

3 Idiots HD Quality Movie Free Download

Download 3 Idiots Movie DVD Rip HD Good Quality...
Download Links...
  1. http://rapidshare.com/files/334588466/3I.TEAM-TDK.mkv.001
  2. http://rapidshare.com/files/333620275/3I.TEAM-TDK.mkv.002
  3. http://rapidshare.com/files/333609023/3I.TEAM-TDK.mkv.003
  4. http://rapidshare.com/files/333574663/3I.TEAM-TDK.mkv.004
  5. http://rapidshare.com/files/334553603/3I.TEAM-TDK.mkv.005
  6. http://rapidshare.com/files/333571990/3I.TEAM-TDK.mkv.006
  7. http://rapidshare.com/files/333570691/3I.TEAM-TDK.mkv.007
copy and paste links into your browser then hit enter....

Sunday, October 10, 2010

Russian hacker selling Facebook users' details

Auckland, Apr 26: The New Zealand police is on the look out for a Russian hacker, who is allegedly selling secret details of Facebook users.

According to a report in tvnz.co.nz, the police believe that the hacker may have set up an underground nexus in New Zealand for selling secret details of people using popular social networking site Facebook.


The hacker has allegedly sold details of millions of Facebook users. He sells names and passwords of Facebook users in an underground forum.

Microsoft introduces online web applications in new version of Office

Microsoft has announced the release of the latest versions of the business editions of Office and Share Point.

A key feature of the launch is the ability to ‘work virtually anywhere’ with Microsoft Office Web Apps, what it calls the online companions to Word, PowerPoint, Microsoft Excel and OneNote.

It claimed that this will help preserve the look and feel of a document regardless of device, so the content and format are generally preserved while moving between the PC, phone and browser.

There is also added capabilities for mobile use, as Office Mobile 2010 has been made available for free via Windows Phone Marketplace for all Windows Mobile 6.5 phones with a previous version of Office Mobile.

Virus attack on Orkut fixed, says Google blog


California, Sep 26: The search Engine giant Google Inc has announced that the virus attack on their Social Networking Site Orkut was removed.

Orkut was hit by Bom Sabado virus, which means 'Good Saturday' in Portuguese, on Saturday, Sep 25. This virus posted scraps to the Orkut users with the text Bom Sabado and is sent to the users account by the name of the other friends account. It also added affected users to new Orkut groups.

Virus attacks Twitter, sent visitors to porn sites


Washington, Sep 22: The popular Social Networking Site Twitter was affected by virus attack on Tuesday, Sep 21.
Millions of Twitter users faced the problem for more than two hours. Users scrolled over links on Twitter only to find ugly content appeared without warning, in some cases re-tweeting the links to followers and spreading the bug around the globe.

Later Twitter officially announced that the attack was fixed. But some of the security experts told that virus attack on the popular website exposed the serious security flaw, one that could be exploited by hackers in the future to install malicious software and steal personal information.

Hackers using Facebook holiday posts to loot money Hackers using Facebook holiday posts to loot money

Sydney, Sep 21: Think twice before you post your holiday plans on Facebook. Australia's national consumer regulator has reported that online hackers are using Facebook holiday posts to hack users bank accounts.

10-10-10 virus to attack web on Sunday Oct 2010?



London, Oct 8: Rumors about a possible virus attack on web on Sunday, Oct 10 spread on internet.
Some of the experts have warned about the malware attack on web at 10:10 am/pm Sunday, Oct 2010 as it appears like 10.10.10, a date whose symmetry has occurred once a year since 2001 and will do so until 2012.

Different news like computers internal clock will either jam or let loose a virus were spread on internet. Also a Facebook page has been set up with the title "Will my computer still work on 10/10/10 at 10.10am?".

Some computer safety experts suggested users to reset their computers internal clock to avoid the risk of virus attack.

Hackers penetrate Carder forum

Hackers have penetrated German underground forum carders.cc, copied login details, e-mail addresses and private e-mails from several thousand members and published them on RapidShare. According to a list seen by The H’s associates at heise Security, the forum software had also logged the IP addresses of nearly one thousand members over a specific period. These have also been published.

Ultimate guide to Windows 7 security

Windows 7 has been warmly received and swiftly adopted by businesses, with the result that many IT admins are now struggling with the platform’s new security features. In addition to changes to User Account Control, BitLocker, and other features inherited from Windows Vista, Windows 7 introduces a slew of security capabilities that businesses will want to take advantage of.