Showing posts with label HACKING NEWS. Show all posts
Showing posts with label HACKING NEWS. Show all posts

Wednesday, 6 November 2013

CYBER LAWS

Cyber Laws under Information Technology Act in India

- Section 43 of IT Act states any act of destroying, altering or stealing computer system/network or deleting information with act of damaging data or information without authorization of owner of that computer is liable for payment to be made to owner as compensation for damages

- Section 43A of IT Act states any corporate body dealing with sensitive information and negligent with implementing reasonable security practices causing loss or wrongful gain to any other person will also be liable as convict for compensation to the affected party

Monday, 24 June 2013

WHISTLE BLOWER UPDATE

Several stories involving whistle-blower/espionage suspect Edward Snowden cropped up over the weekend, including word of a U.S. demand for his extradition and that he flew to Moscow Sunday, and is likely heading for another destination. And news of a Justice Department search of a former WikiLeaks volunteer's Gmail account has also surfaced. Here's a quick summary:
Snowden was allowed to leave Hong Kong because a U.S. extradition request did not fully comply with Hong Kong law. He landed in Moscow early Sunday morning, but his final destination is unclear. According to a report in the New York Times, he may be headed to Ecuador, Cuba or Venezuela. Via its statement on its website  and  on Twitter, WikiLeaks said that it provided assistance to Snowden in his search for political asylum, and that he landed in Moscow accompanied by WikiLeaks legal advisers."

Saturday, 22 June 2013

Bank Accounts And Zeus Virus

How Your Bank Accounts Can Be Stolen With Zeus Virus?

 
 The 'Zeus Trojan Horse' Virus once again had a come back. According to a resource, it has an ability to drain your Bank accounts easily. Zeus Virus can propagate through phishing messages that are generated from the account that was already compromised with phishing. That phished account will then start sending messages to your friends containing links to the ads and would ask them to simply check-out the video or product by clicking on such links. This way the virus will go viral. Readers are requested to stay refrain from clicking such links, because they might end up getting their accounts compromised The virus is very sophisticated, so that it could replace the website of a bank with the mimicked page of its own. That fake page could then ask for your security information and some other important data that could be easily sold in black market. According to many sources, perhaps it has been confirmed that those pages are being hosted by Russian Mafia (known as Russian Business Network as well). About Zeus(Virus) The virus is well-known for what it use to do. It was detected once back in 2007, and after that detection it started to spread online. The virus is well-designed so that if you would click on it, the possible and important data like Passwords and Bank Accounts can be stolen easily. Does Facebook Took Action Against It? Facebook is aware of it, but it is unlikely that Facebook is going to take any action against it. The founder of advocacy group Fans Against Kounterfeit Enterprise (FAKE) said that he was trying to alert Facebook about this issue to take action against it as soon as possible, but unluckily he was not satisfied well with their response. Those who are using windows should stay much careful about this issue. It has been said that Windows devices are much infected with this virus. Hence, Mac OS X or Linux are still safe of this virus. Some countries like USA and UK are badly infected, though, India, Russia, Canada and France are also infected with the virus at some moderate limits. Some other countries like Australia, Argentina, Brazil, South Africa, Chile, Saudi Arabia, Pakistan, Indonesia and some other South-East Asian and European countries are less affected by this virus.

Sunday, 16 June 2013

TOP 15 FREE HACKING TOOLS




1. Nmap





Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

NSA whistleblower: U.S has been hacking into China, Hong Kong

Former CIA employee Edward Snowden says the NSA's controversial PRISM program extends to China and Hong Kong, according to an interview with a Hong Kong newspaper.
 
The U.S. government had been hacking into computers in Hong Kong and China for years, says NSA whistleblower Edward Snowden.
The former CIA employee stirred up a hornet's nest recently when he leaked details about PRISM, a National Security Agency program that collects certain user information from Internet companies and phone service providers in an effort to track down terrorists.
In an interview with the South China Morning Post, Snowden said that PRISM actually extends to people and institutions in Hong Kong and mainland China. The NSA itself has been hacking into computers in Hong Kong and China since 2009, he added, citing documents that had not been verified by the Post.

Mozilla, EFF, ACLU rally public against electronic surveillance


Monday, 10 June 2013

NSA PROGRAM OF US

What is the NSA's PRISM program? (FAQ)
 
We now know that the NSA uses something called PRISM to monitor private Web data. Sounds like "1984." What does it really mean?
 
You've been hearing about a top-secret government program reportedly giving the NSA access to digital consumer information held by large tech companies. But what is it, really, and how does it affect you? Reports are changing fast, so we created this FAQ to let you know what is known so far. We will continue to update it as the facts become clear.
 
What is PRISM?
PRISM stands for "Planning Tool for Resource Integration, Synchronization, and Management," and is a "data tool" designed to collect and process "foreign intelligence" that passes through American servers. Details about its existence were leaked to The Washington Post and The Guardian by Edward Snowden, a 29-year-old NSA contractor.
It has now been acknowledged by the Obama administration.
In the words of national security reporter Marc Ambinder, "PRISM [is] a kick-ass GUI that allows an analyst to look at, collate, monitor, and cross-check different data types provided to the NSA from Internet companies located inside the United States."

Sunday, 9 June 2013

Once Again Anonymous And Hacktivists Shocked The World

How Anonymous And Hacktivists Shocked The World In 2013 ?


1. Anonymous Hacks FBI Cybercrime Conference Call
 The LulzSec gang announced its retirement in June 2011, and while some alleged members, such as Jake Davis — accused of being the group’s spokesman, “Topiary” — were arrested, at the beginning of 2012, many participants appeared to be still at large.
 Come February 2012, elements of Anonymous even took down the CIA’s public-facing website, and leaked an FBI conference callin which investigators coordinated Anonymous and LulzSec participants” arrests. Curiously, however, key details — such as the alleged hacktivists’ names — had been blanked out of the audio file that was ultimately released.
 
2. Stratfor Hack Upends Private Sector Intelligence Provider
 Also in February, Anonymous announced the release of a trove of emails and personal data stored by Strategic Forecasting, better known as Stratfor, which is an intelligence contractor. A member of Anonymous — who turned out to be LulzSec leader Sabu – reported that the plaintext emails and customer information had been obtained by exploiting known vulnerabilities in the Stratfor network. Ultimately, the breach exposed personal information on 860,000 Stratfor customers, 60,000 credit card numbers and a massive trove of emails between Stratfor and its sources.