Showing posts sorted by relevance for query America. Sort by date Show all posts
Showing posts sorted by relevance for query America. Sort by date Show all posts

Microsoft Security Essentials is on the first place in North America



Microsoft (17.07 percent), AVG (15.63 percent), and Symantec (14.47 percent) were found to be the top three antivirus vendors in North America, according to the latest quarterly antivirus market share report released by OPSWAT. Microsoft increased its market share from OPSWAT's previous antivirus report to surpass Symantec and become the North American leader. AVG held steady in the second position, and Symantec fell to third.
Worldwide, the top three antivirus vendors detected were Avast (12.37 percent), AVG (12.37 percent), and Avira (12.29 percent). Microsoft was fourth (11.24 percent), followed by ESET Software (9.98 percent).
The software company analyzed more than 43,000 opt-in reports from endpoints worldwide. The reports, generated by OPSWAT's AppRemover and Am I OESIS OK? tools, utilize the detection capabilities of the OESIS Framework to list the applications installed on the endpoint computer. The full 8-page document, titled Q2 2011 Antivirus and Instant Messenger Market Share Report, includes data on the leading antivirus vendors and products in North America and worldwide, Windows OS usage in North America and worldwide, instant messaging market share worldwide, and instant messaging usage in North America and Europe.
The rest of the data wasn't too surprising: Windows 7 usage continues to increase in North America and worldwide, showing a steady trend away from Windows Vista. In both North America and worldwide, Windows XP remains the dominant Windows operating system. The top three worldwide IM applications are Windows Live Messenger, Skype, and Yahoo! Messenger. The report does not, however, account for Web-based instant messaging services such as Google Chat or Facebook. This is because it only looks at installed applications, and those services run in the browser.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Citi Bank & Bank of America Faced Sent Offline After Massive DDoS Attack (Operation Ababil)

Citi Bank & Bank of America Faced Sent Offline After Massive DDoS Attack (Operation Ababil)

Late in last year we have reported that major banking and finical sector of America faced massive cyber attack. The attack came just after 'anti Islamic' video was posted online. During the time of attack the hacker group named 'Izz ad-Din al Qassam Cyber Fighters' said "these series of attacks will continue until the Erasing of that nasty movie from the Internet". But now its seems that, the earlier deceleration of the hacker collective group was fake, as they again engaged denial of service attack against large banking sector, where Citi Bank and Bank of America fallen victim. Several website of those above banks were reported offline for a certain period of time. "Just moments ago Izz ad-Din al-Qassam Cyber Fighters attacked CitiBank and made all the parts out of reach. This was the 2nd attack this day. Banks could not stop al-Qassam Cyber fighters this week" - said the hacker group in their blog. In thier blog Hilf-ol-Fozoul reports that on Thursday several domains of Citi Bank such as citicards.com, citibank.com and citi.com were inaccessible during the pick hours. "In the 3rd week from Operation Ababil, Bank of America faced technical difficulties due to heavy traffic made by al - Qassam Cyber Fighters and users can no more reach the site." said the hackers
The Citi Bank’s representatives acknowledged the cyber attack while saying “Currently we are aware & are working on technical issues with Citi websites. We will let you know when service is fully restored. We apologize for the inconvenience. Please call the number on the back of your card if you need immediate assistance,” on Twitter. But the representatives of Bank of America have not issued any statements on the matter.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Aafia Siddiqui Court Case Leaked, US Government Exposed ByTeaMp0isoN


There is a terrorist Network that stretches the length and breadth of this very ill earth of ours - That Terrorist Network belongs to the Terrorist Empire that is The United States Of America!
In Dr. Afia Siddique, this Terrorist Empire has decided that the very 'small' and 'slight' mother, Dr. Afia Siddique, is a Jihadist! A Threat to their 'peace', a threat to their 'way of life' and lest we forget the incredulous mantra 'a threat to their freedom' - Such was the fear of the Terrorist Empire of Dr Afia Siddique, they decided to do as all criminals against humanity do; they fabricated evidence, planted bogus witnesses, and with the help of the shameful 'free press', they chose to demonize her - demonize her so much that people of conscious did not even ask 'why was it necessary to murder her baby in prison?'

The human tragedy of Dr. Afia Siddique will not be in vain! Justice will be demanded and Justice will prevail! America will pay for its crimes against Dr Afia Siddque and its crimes against humanity!
The Terrorist Empire refuses to listen, educate, and learn from the mistakes of Terrorist Empires of history - in the indomitable words of Malcolm X - 'The Chickens are coming home to roost'
"Let no man deceive you by any means: for that day shall not come, except there come a falling away first, and that man of sin be revealed......“

Americans who read this; it is the epitome of Patriotism to resist the crimes of ones nation - do not let your children pay for the sins of their fathers!

Apparently she fired a rifle at the US nationals & the US Army yet there was no fingerprints found on the rifle, furthermore aafia was the only person on the scene who suffered from bullet wounds when allegedly she was the one holding the gun - the main questions till date are "why was she captured? "why has she been given 85years?" and "why has she been tortured" - all these questions will be answered.

Firstly we need to know why the US Government wanted her and what she knew that made her special, i have compiled a series of screenshots from the official US Court Case related to this case:

- Peace between the taliban and American
- AIDS Vaccine
- Cure for aging
If this idea worked it would have been implemented right across the middle-east and asia especially in Palestine and Pakistan where drone attacks are increasing yet the USA Government stopped this idea from spreading by capturing aafia. 
Now we know of some of the things she was capable of but the next question we must ask ourselves is why would USA stop her from expanding her ideas and studies? her ideas would clearly make the world a better place right?
1. Why would the US Government not want a AIDS vaccine? Because the US Government created AIDS, its all over the internet, google it.
2. Why would the US Government not want peace with the Taliban? The US Government created Taliban, they funded them with money and weapons and trained them them to fight the Soviet Union.
2. Why would Zionist Jews of Israel want to get rid of African Americans and Hispanics living in the US?
Israel is the puppeteer and the US is the puppet, Israel uses USA for security & money, deep down Israel hates everyone and anyone who is not apart of their state, but why would they target African Americans and Hispanics living in america? prisons in America are private businesses, The US Government gets paid 50,000 per year for every inmate in prison, now who are the stereotypical races that represent American prisons? African Americans and Hispanics - therefore if Zionist Jews were to affect African Americans and hispanics in anyway America would be loosing a lot of money.
We know now why she was a threat to the US Government, now i will show you what they done to her to ensure that she wouldn't be able spread her findings & knowledge :
- They tortured her, they raped her, they stripped and put images and videos of her naked on the internet, they tortured her children, they told her she was a psycho and that she was crazy, they used illegal torture methods to obtain information from her, they abused her right to practice religion by breaking her fast/Ramadan. - for what? for outsmarting the suit wearing power hungry faggots of the United States government, for wanting to make the world a better place, for wanting to protect her country and religion from corruption, from wanting to save lives, for wanting to stop diseases and viruses. 

To Download The official Case Click HERE
For More Info About Aafia Click Here

-News Source (ZHC & Team Poison)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Hit USTelecom & Tech America To Protest Against CISPA (#OpDefense)

Anonymous Hit USTelecom & Tech America To Protest Against CISPA (#OpDefense

As expected the protest against Cyber Intelligence Sharing and Protection Act (CISPA) took place. The hacker group Anonymous claimed responsibility for taking down the websites of USTelecom and Tech America while engaging massive distributed denial of service (DDoS) attack, which both back the Cyber Intelligence Sharing and Protection Act of 2011. Both sites remained unreachable as of Monday afternoon. A member of Anonymous posted a YouTube video showing USTelecom's site down Sunday, and the site was down for about 24 hours, according to a USTelecom spokesman. The trade group discovered that the site was down at about 6 a.m. Monday, he said. 
Last Friday Anonymous released a YouTube video threatening supporters of the Cyber Intelligence Sharing and Protection Act, a bill focused on encouraging U.S. government agencies and private businesses to trade information about cyberattacks. The bill would harm the Internet, the video said. "We will unleash the worst pain on those who threaten our existence," the video added. The video declared Operation Defense (CISPA) and these two attacks ware the part of this ongoing operation. Earlier we have seen massive protest from not only hackers but also different part of the world in case of controversial SOPA, PIPA & ACTA. So again the history reveled for CISPA. 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Truth Alliance Network and 20 Churches Websites Hacked By XtReMiSt (Muslim Liberation Army)


Truth Alliance Network and 20 other Churches websites Hacked By XtReMiSt of Muslim Liberation Army. According to the officials of MLA the object of these deferments are "To Raise A Voice Against Quran Burning Day and Illegal occupation of Israel and India in Palestine and Kashmir.. and to show why Muslims are raising their voice against America."

Hacked Sites:-

Truth Alliance Network (24 Hour Daily Newspaper) (Shot)
truthalliance.net

Church of God of North America
www.chog.org

First Church of God of Crystal River, Inc
www.rockcrusherchurch.com

Legacy Church
legacychurch.tv

Kansas Ministries
www.kscog.org

First United Church of God
firstunitedchurchofgod.com

Church of God at Paradise Valley
pv-church.com

First Church of God Madisonville
fcogmadisonville.com

Treasure Valley Baptist Church
tvbc.org

Church of God - General Director's Office
www.churchofgodministries.com
churchofgodministries.org


First Baptist Church Hyannis
firstbaptistchurchhyannis.com
firstbaptistchurchhyannis.org


Home of the First Church of God -- Rushville,
fchogrushville.org

Meet the Pastors - First Church of God
www.firstchurchofgodkokomo.org

Tampa First Church of God
tampafirstchog.org

South Dakota Assembly of the Church of God
sdchog.com

Church of God of North America
www.chog.us

Spring Ridge First Church of God
srfcog.org

Pasadena Heights Church Of God
phchog.org

Macon County Health Department
www.maconcountyhealth.org

Mirror Links:-

http://zone-h.org/mirror/id/14901754
http://zone-h.org/mirror/id/14901743
http://zone-h.org/mirror/id/14901744
http://zone-h.org/mirror/id/14901745
http://zone-h.org/mirror/id/14901746
http://zone-h.org/mirror/id/14901747
http://zone-h.org/mirror/id/14901748
http://zone-h.org/mirror/id/14901749
http://zone-h.org/mirror/id/14901750
http://zone-h.org/mirror/id/14901751
http://zone-h.org/mirror/id/14901733
http://zone-h.org/mirror/id/14901734
http://zone-h.org/mirror/id/14901735
http://zone-h.org/mirror/id/14901736
http://zone-h.org/mirror/id/14901737
http://zone-h.org/mirror/id/14901738
http://zone-h.org/mirror/id/14901739
http://zone-h.org/mirror/id/14901740
http://zone-h.org/mirror/id/14901741



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Iran Accused of Carrying out Cyber Attacks Against US Banks Over Anti Islamic Movie Issue

Iran Accused of Carrying out Cyber Attacks Against US Banks Over Anti Islamic Movie Issue

Since last few days, the conspiracy with the 'Anti Islamic Movie' was the headline in every where. We have seen global violence and a mass protest mainly came from Muslim brotherhood. This protest was also touched the internet, and as expected Muslim hackers joined the movement, which cost many damages for the cyber fence. Thousands of websites became victim of cyber attack, and among them several US banks also faced huge disturbance. This protest takes a new direction when Govt of Iran announced the blockage of Google Inc's search engine and its email service. "Google and Gmail will be filtered throughout the country until further notice," an official identified only by his last name, Khoramabadi, said, without giving further details. The Iranian Students' News Agency (ISNA) said Google ban was connected to the anti-Islamic film posted on the company's YouTube site which has caused outrage throughout the Muslim world. 
This stand of Iran Govt created a controversy, which make them responsible for carrying out cyber attacks against US banks. According to NBC news report US National Security officials accused the Iranian government for engaging cyber attacks against US Banks mainly Bank of America. But when the ball goes to Iran's side then they completely denies the blame, while saying "We officially announce that we haven't had any attacks," This statement came from the Head of Iran's civil defense agency Gholam Reza Jalali when he was asked about the report. The western media reports alleged on Friday that Muslim hackers have repeatedly attacked Bank of America Corp, JPMorgan Chase & Co and Citigroup Inc over the past year as part of a broad cyber campaign targeting the United States. Security sources told Chicago Tribune and NBC News that the attacks on the three largest US banks originated in Iran, but it is not clear if they were launched by the state, groups working on behalf of the government, or "patriotic" citizens. 

Here we want to refresh your memory while digging up a story, when Iran Govt decided a permanent Internet ban in Iran, where Iran Government has announced its plans to establish a National Intranet within five months. The Iranian minister for Information and Communications Technology, announced the setting up of a national Intranet and the effective blockage of services like Google, Gmail, Google Plus, Yahoo and Hotmail, in line with Iran's plan for a "clean Internet." And that five months is almost over, so may be the blockage of Google came due to that reason, or may be not. We suggest our readers that, it will be better if you ask yourself, that whether Iran was indeed responsible for the cyber attack or not??!!


-Source (Reuters, NBC & FARS News Agency)








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

United States Is Building Cyber Defense For Both Private & Public


United States is developing cyber defense for both Public and Private. In an exclusive report it said that In the 21st century, the American Dream is coded in zeroes and ones. Sophisticated information systems are now embedded in every facet of our daily lives. Whether it is an electronic payment card transaction or a smartphone search for a restaurant, nearly everything we do depends on the smooth operation of secure information systems.
Beyond our personal lives, strategic infrastructure services like power transmission, transportation and major financial transactions all rely on information systems for wide-scale safety and security. U.S. embrace of information technology offers enormous advantage. But it also exposes us to vulnerability. The usefulness and value of U.S. information systems invites attack from hackers, industrial spies, terrorists and criminals.
Cyber attacks are on the rise, and their variety, scope and scale increase monthly, imposing staggering costs. Up to 90 percent of U.S. businesses reported data intrusions over the past year, according to a recent survey, costing an estimated $96 billion in the first six months of 2011 — nearly as much as in all of 2010. The Commerce Department estimates that the theft of intellectual property, most stolen via electronic means, costs $250 billion annually and deprives U.S. workers of approximately 750,000 U.S. jobs.
U.S. businesses, which own and operate many of the most valuable information systems, are America’s first line of defense against cybersecurity threats. Chief executive officers take this responsibility seriously. We have integrated cybersecurity into the way we manage our companies and conduct our operations. But we need tools from government that only government can provide.
In a new Business Roundtable report, “Mission Critical: A Public-Private Strategy for Effective Cybersecurity,” U.S. business leaders call on Congress and the Obama administration to use smart cybersecurity policies that facilitate new levels of domestic and international collaboration — especially for cyber events that target national interests.
These include technical support essential for protecting global corporate assets against cyber attacks, and greater international cooperation in bringing cyber criminals to justice.
What business needs most is a reliable partner. Partnership, shared responsibility and coordinated response – these are the attributes of a modern, flexible and effective cybersecurity strategy. We know for sure that prescriptive government mandates are not going to work. Threats change so rapidly that solutions are often obsolete before they can be implemented. Inflexible mandates don’t fit the reality of privately owned information systems and rapidly evolving threats. 
Today, government responsibility is fragmented and cybersecurity is not integrated into the way the U.S. government does business. The U.S. legal and policy environment inhibits information sharing between business and government. Effective cybersecurity is too important to America’s future to let old ways of doing things stand in the way.
Information security is a critical component of economic and national security. It is also a necessary foundation of future U.S. prosperity and opportunity. Washington has to get this right. Congress and the administration need to make effective cybersecurity – based on flexible, collaborative and responsive public-private information sharing partnerships – an urgent national priority.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

President Obama & Congress Will Issue Long Awaited Executive Cyber Security Order

President ObamaCongress Will Issue Long Awaited Executive Cyber Security Order 

Last week we reported that Pentagon has declared that they are moving toward a major expansion of its cyber security force to counter increasing attacks on the nation’s computer networks, as well as to expand offensive computer operations on foreign adversaries. Just one week after this declaration another crucial movement came from the U.S. government.  A secret legal review on the use of America’s growing arsenal of cyber weapons has concluded that President Obama has the broad power to order a pre-emptive strike if the United States detects credible evidence of a major digital attack looming from abroad. According to sources President Barack Obama will issue a long-awaited cyber security executive order this week. Two former White House officials told the publication that the order is expected to be released after Tuesday night's State of the Union address. 
Given his status as commander-in-chief, Obama seems to be the clear choice, but since cyber warfare is such a new and unknown thing, the government hasn't actually figured out the rules of engagement yet. In the past couple of decades, the power to use America's cyber weapons has been shared between the Pentagon and the various intelligence agencies. With the exception of a series of strikes on the computer systems that run Iran's nuclear enrichment facilities an attack that Obama ordered himself the U.S. hasn't launched any major cyber attacks in recent memory, however. This probably won't be the case in the future. So the government is working on new rules of engagement, as it realizes that the capabilities of cyber weapons are evolving at a startling rate. The rules will be not unlike the set that governs how drone attacks are ordered and who orders them. Cyber warfare certainly stands to affect the average American more, though.  On Capitol Hill this week, Rep. Dutch Ruppersberger (D-Md.) and Rep. Mike Rodgers (R-Mich.) are set to reintroduce the Cyber Intelligence Sharing and Protection Act (CISPA) during a speech at the Center for Strategic and International Studies.
According to an exclusive report the bill would allow the government to share classified cyber threats with the private sector so that those companies can then protect their systems from cyber attacks. The bill was killed last year due to privacy concerns. Civil-liberty groups argued that the bill allows companies to exchange too much personal information back and forth without regulation. 







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Now Celebrities Also Supporting #OccupyWallStreet of Anonymous

The Globe and Mail has come out in support of the Occupy Wall Street demonstrations in the captions to a celebrity photo article.
Tweets from the Anonymous group and its supporters suggest that the text is the work of a hacker, but this looks like common practice at the Globe and Mail, which often treats its celebrity subjects lightly.
Nevertheless, "#Anonymous Hack done in support of #OccupyWallStreet," tweeted the @operationleaks account on Twitter, "What the hell?!? How did photo of #occupyLA protester get in here with photos of celebrities at polo match?", added Anonyops.
The gallery and its captions have been live for some time, which adds an air of authority to them, but in case they do disappear we reproduce our favourites.
"Week Five of the Occupy Wall Street movement finds couture-and-pearls-bedecked actress Elizabeth McGovern preoccupied with America's growing income disparity at the New York Film Festival premiere of 'My Week With Marilyn' in a swank New York City hotel on Sunday."
"Yes, stars came out in force last week to show their support for the brave little people taking part in Occupy Wall Street protests across America. Here, actress Sofia Vergara demands higher taxes for the wealthy as she arrives at the Veuve Clicquot Polo Classic in Los Angeles on Sunday."
"Actor Jeremy Piven strikes a blow for the disenfranchised at the Veuve Clicquot Polo Classic in Los Angeles on Sunday."
"Clearly outraged by the excessive bonuses paid to Wall Street executives, actress Sanaa Lathan defines unostentation at the champagne-sponsored event for the elitest equestrian game sometimes known as 'The Sport of Kings' in Los Angeles on Sunday."
"Lauren Conrad, well-known chronicler of the down and out in Orange County, wore shorts to the polo match to show her support for people who can't afford long pants, something she read about online one time or something."
"Host Nacho Figueras arrives at the Veuve Clicquot Polo Classic in Los Angeles on Sunday dressed like a complete tool."
"Emma Stone attends the German premiere of 'The Help' (German title: 'Der Turkish Illegalman Arbeiter') in Hamburg last week."
"'Occupy this, losers,' Chris Albrecht, the super-wealthy president/CEO of a major Hollywood production company, says while attending a premiere with his taller, younger, way better looking wife in Los Angeles last week."
 

-News Source (The Inquirer,OccupyWallStreet)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Software piracy is on the high node


 
Global software piracy reached a record figure of $59 billion last year, a new study from the Business Software Alliance has found.
That figure represents a 14 percent increase compared with 2009 and a doubling since 2003, the trade group said today. Forty-two percent of PC software was pirated worldwide last year, the group added, down one point from the previous year.
"The software industry is being robbed blind," BSA CEO Robert Holleyman said in a statement. "Nearly $59 billion worth of products were stolen last year--and the rates of theft are completely out of control in the world's fastest-growing markets."
The Business Software Alliance operates on behalf of the software industry. Its members include Adobe Systems, Apple, Microsoft, and Symantec.
Emerging markets are the most troublesome for software makers, with the majority of all software piracy--$32 billion worth--occurring in those markets. In 2010, the BSA said, 50 percent of all PCs shipped around the world went to emerging markets. However, less than 20 percent of all paid software license revenue came from those areas.
Central/Eastern Europe and Latin America had the highest piracy rates, hitting 64 percent each in BSA's study. The Asia-Pacific region saw piracy rates jump one point to 60 percent in 2010. North America had the lowest piracy rate at 21 percent.
Though software piracy is rampant, the BSA found that not everyone knows they're committing a crime. About 60 percent of people believe buying a single software license and installing it on multiple computers--the most common form of piracy--is legal in the home. BSA said 47 percent also believe that engaging in such activity is legal in the workplace.
"The irony is people everywhere value intellectual property rights. But in many cases they don't understand they are getting their software illegally," Holleyman said in a statement.
Holleyman added that governments need to do more to help.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#opSOTU By Anonymous To Oppose Executive Cyber Security Order (The Revised CISPA)

#opSOTU By Anonymous To Oppose Executive Cyber Security Order (The Revised CISPA)

Last year the Internet and its trillion of users across the globe has faced several barrier when, number of approach from Senate and government, along with few corporate and other organization were in the target to make the entire Internet censored. To engage this motive they have approached and introduced a number of regulations and act such as SOPA, PIPA, CISPA & ACTA. But to implement those enactment was not that easy, as huge number of organization (including White House, Wikipedia & so on), billions of mass people stand against those controversial act, and as expected those acts were ruled back, that said protest might not get the full success, if hackers around the globe did not take part in it. It was the hackers communities who forced the govt to roll back those rules. But the victory was not that easy to achieve, as the president of U.S. appeared before a joint session of Congress to deliver the State of the Union Address and he plans to sign an executive order for cyber-security as the House Intelligence committee reintroduces the defeated CISPA act which turns private companies into government informants. As soon as the deceleration of the executive order for cyber-security came, immediately protest came. Hacktivist group Anonymous yet against stand against the controversial CISPA, and called an operation dubbed Operation SOTU (#opSOTU). In the campaign the hacker group states a clear intent to obstruct Internet broadcasts of the president's State of the Union address, an action the group justifies by pointing to renewed interest in Congress to pass the Cybersecurity Intelligence Sharing and Protection Act (CISPA), a measure Anonymous has long opposed. 

Press Release of Anonymous (#opSOTU):- 
Citizens of the Internet,
Last year we faced our greatest threat from lawmakers. We faced down SOPA, PIPA, CISPA and ACTA.

And we won!

But that victory did not come easily. Nor did it come without a price.

Aaron Swartz was one of the leading voices in the fight against these idiotic and destructive efforts to control the last free space on Earth.

Aaron Swartz was persecuted. Now Aaron Swartz is dead.
Tonight, the President of the United States will appear before a joint session of Congress to deliver the State of the Union Address and tomorrow he plans to sign an executive order for cyber-security as the House Intelligence committee reintroduces the defeated CISPA act which turns private companies into government informants.

He will not be covering the NDAA, an act of outright tyrannical legislation allowing for indefinite detention of citizens completely outside due process and the rule of law. In fact, lawyers for the government have point-blank refused to state whether or not journalists who cover stories or groups the Government disfavors would be subject to this detention.

He will not be covering the extra-judicial and unregulated justifications for targeted killings of citizens by military drones within the borders of America, or the fact that Orwellian newspeak had to be used to make words like “imminent” mean their opposite.

He will not be covering Bradley Manning, 1000 days in detention with no trial for revealing military murders, told that his motive for leaking cannot be taken into consideration, that the Government does not have room for conscience.

He will not be covering the secret interpretations of law that allow for warrant-less wiretapping and surveillance of any US citizen without probably cause of criminal acts, or the use of Catch-22 logic where no-one can complain about being snooped on because the state won’t tell you who they’re snooping on, and if you don’t know you’re being snooped on, you don’t have a right to complain.

We reject the State of the Union. We reject the authority of the President to sign arbitrary orders and bring irresponsible and damaging controls to the Internet.
The President of the United States of America, and the Joint Session of Congress will face an Army tonight.
We will form a virtual blockade between Capitol Hill and the Internet. Armed with nothing more than Lulz, Nyancat and PEW-PEW-PEW! Lazers, we will face down the largest superpower on Earth.

And we will win!

There will be no State of the Union Address on the web tonight.

For freedom, for Aaron Swartz, for the Internet, and of course, for the lulz.

We Are Anonymous,
We Are Legion,
We Do Not forgive,
We Do Not forget,
Expect Us.

..."

But unlike last year, this time the approach of CISPA is more organized, as not only Congress but also the White House will also unveil President Barack Obama's long-awaited executive order on cyber security. So to stand against such an organized and well planned act, the protester need to be more decent and more united. As we all want and prefer freedom and privacy in our personal life as well as in the Internet, so we will fight and expect to win. So stay tuned with VOGH, and lets see what is coming for us. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Software piracy is on the high node


Global software piracy reached a record figure of $59 billion last year, a new study from the Business Software Alliance has found.
That figure represents a 14 percent increase compared with 2009 and a doubling since 2003, the trade group said today. Forty-two percent of PC software was pirated worldwide last year, the group added, down one point from the previous year.
"The software industry is being robbed blind," BSA CEO Robert Holleyman said in a statement. "Nearly $59 billion worth of products were stolen last year--and the rates of theft are completely out of control in the world's fastest-growing markets."
The Business Software Alliance operates on behalf of the software industry. Its members include Adobe Systems, Apple, Microsoft, and Symantec.
Emerging markets are the most troublesome for software makers, with the majority of all software piracy--$32 billion worth--occurring in those markets. In 2010, the BSA said, 50 percent of all PCs shipped around the world went to emerging markets. However, less than 20 percent of all paid software license revenue came from those areas.
Central/Eastern Europe and Latin America had the highest piracy rates, hitting 64 percent each in BSA's study. The Asia-Pacific region saw piracy rates jump one point to 60 percent in 2010. North America had the lowest piracy rate at 21 percent.
Though software piracy is rampant, the BSA found that not everyone knows they're committing a crime. About 60 percent of people believe buying a single software license and installing it on multiple computers--the most common form of piracy--is legal in the home. BSA said 47 percent also believe that engaging in such activity is legal in the workplace.
"The irony is people everywhere value intellectual property rights. But in many cases they don't understand they are getting their software illegally," Holleyman said in a statement.
Holleyman added that governments need to do more to help

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

CITI Group Said that more than 36000 Citi cards was Hacked





Citigroup Inc. has revealed the extent of the recent security breach it faced after hackers got access to hundreds of thousands of its credit card customers’ information in North America. Management affirmed that around 360,083 North America Citi-branded credit cards were hacked and only accounts issued in the U.S. were impacted.
Citi came to know about this unauthorized access during a routine check up. Customers' account information such as name, account number and contact information, including email addresses were leaked. However, chances of fraud are perhaps less as more critical data remained unscathed. Such data include customers' social security number, date of birth, card expiration date and card security code (CVV).
Yet, customers remain susceptible to other problems. The extent of client information that has been hacked could be used to procure further financial information through illicit ways.


Measures by Citi:-
The affected customers are being contacted by the company and measures have been taken to avoid any such event again in the future. Around 217,657 accounts were reissued credit cards along with a notification letter by Citi.
Other customers were not re-issued credit cards because either their accounts were closed or they already received new credit cards as a result of other card replacement practices. Citi is significantly monitoring these accounts for suspicious activity.


Companies Under Attack:-
Besides Citi, the other companies that suffered cyber attacks in recent times include some big names like Google Inc. (GOOG -Analyst Report), Lockheed Martin Corp. (LMT - Analyst Report), and Sony Corp. (SNE - Snapshot Report). The most notable was that of the security breach at EMC Corp.’s (EMC - Analyst Report) RSA unit, which makes SecurID used by banks for corporate networks’ to secure log in. Such a situation raises concern about the level of protection these companies are providing to their customers.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Operation Unmask- Interpol Arrested 25 Suspected Anonymous Hackers

Operation Unmask- Interpol Arrested 25 Suspected Anonymous Hackers 
The international police agency (Interpol) says 25 suspected members of the Anonymous hackers have been arrested in a sweep across Europe and South America. Interpol says the arrests in Argentina, Chile, Colombia and Spain were carried out by national law enforcement officers working under the aegis of Interpol's Latin American Working Group of Experts on Information Technology Crime. "Operation Unmask was launched in mid-February following a series of coordinated cyber-attacks originating from Argentina, Chile, Colombia and Spain," said Interpol, based in the French city of Lyon. The statement cited attacks on the websites of the Colombian Ministry of Defence and the presidency, as well as on Chile's Endesa electricity company and its National Library, among others.
The operation was carried out by police from Argentina, Chile, Colombia and Spain, the statement said, with 250 items of computer equipment and mobile phones seized in raids on 40 premises in 15 cities. Police also seized credit cards and cash from the suspects, aged 17 to 40. The operation, carried out after trawling through computer logs in order to trace IP addresses, also netted 10 suspects in Argentina, six in Chile and five in Colombia, Spanish police said.
They said one of the suspects went by the nicknames Thunder and Pacotron and was suspected of running the computer network used by Anonymous in Spain and Latin America, via servers in the Czech Republic and Bulgaria. He was arrested in the southern Spanish city of Malaga. Two of the suspects were in detention while one was bailed and the fourth was a minor who was left in the care of his parents. In Santiago, deputy prefect Jaime Jara said police confiscated computer equipment belonging to five Chileans and a Colombian, aged between 17 and 23. Jara said the suspects appeared to have hacked web pages in Chile, Colombia and Spain.
The six suspects did not know each other and were released after voluntarily giving statements, police said, though they will likely be ordered to appear in court to face possible charges relating to online crimes.
Earlier in this month three Greek teenagers have been arrested for hacking into the Ministry of Justice website, also in January a 22 year aged student arrested in south-western Poland for allegedly hacking the prime minister's website and local authority said that he was a part of Hactivist Anonymous.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

WikiLeaks Releases 'Detainee Policies' The Dark History of U.S. Post-9/11 Military Prisoners

WikiLeaks Releases 'Detainee Policies' The Dark History of U.S. Post-9/11 Military Prisoners 

The WikiLeaks website began publishing the 'Detainee Policies' on Thursday what it said more than 100 classified or otherwise restricted files from the United States Department of Defense covering the rules and procedures for detainees in U.S. military custody. “The Detainee Policies,” a collection of more than a hundred once-secret files outlining America’s military detainee practices from Guantanamo to Iraq since 2002. WikiLeaks says it plans to release the files in chronological order to paint a picture of the evolution of America’s military detainee practices since September 11th in prisons from Guantanamo to Iraq to Europe. Unlike other recent releases, with the Detainee Policies WikiLeaks seems to be focusing on history more than news: Its first release is the 2002 Guantanamo Camp Delta standard operating procedure manual, a kind of prequel to the 2003 and 2004 manuals from camp it’s already published in past years. Other documents in the collection, WikiLeaks says, will show American attempts to “disappear” detainees by delaying the process of entering them into the detainment system’s records, or detail psychological torture methods. According to WikiLeaks official site - "Over the next month, WikiLeaks will release in chronological order the United States’ military detention policies followed for more than a decade. The documents include the Standard Operating Procedures (SOPs) of detention camps in Iraq and Cuba, interrogation manuals and Fragmentary Orders (FRAGOs) of changes to detainee policies and procedures. A number of the ’Detainee Policies’ relate to Camp Bucca in Iraq, but there are also Department of Defense-wide policies and documents relating to Abu Ghraib, Guantanamo Bay and European U.S. Army Prison facilities." 
According to the press release of WikiLeaks :-  The previously unpublished 2002 manual went on to shape successive years in the Guantanamo Bay prison complex and other U.S. military prisons around the world, such as Abu Ghraib. "This document is of significant historical importance. Guantanamo Bay has become the symbol for systematised human rights abuse in the West with good reason," said WikiLeaks founder Julian Assange. "But how is it that WikiLeaks has now published three years of Guantanamo Bay operating procedures, but the rest of the world’s press combined has published none?"
In relation to Iraq, the release includes Operation Orders (OPORD) regarding policies for screening and interrogating detainees. The documents also include routine instructions relating to staffing, scheduling of legal visitation, procedures for administering medical treatment, how medical records and daily staff journals are to be kept, cigarette rationing and what items are "authorised for detainee possession".
A number of what can only be described as ’policies of unaccountability’ will also be released. One such document is the 2005 document ’Policy on Assigning Detainee Internment Serial Numbers’. This document is concerned with discreetly ’disappearing’ detainees into the custody of other U.S. government agencies while keeping their names out of U.S. military central records – by systematically holding off from assigning a prisoner record number (ISN). Even references to this document are classified "SECRET//NOFORN". Detainees may be disposed of in this manner without leaving a significant paper trail.
Another formal policy of unaccountability is a 2008 Fragmentary Order that minimises the record-keeping surrounding interrogations. Following revelations of torture tapes and pictures from Abu Ghraib and the political scandal over the destruction of Central Intelligence Agency interrogation tapes, the FRAGO eliminates "the requirement to record interrogation sessions at Theatre Internment Facilities". Although the FRAGO goes on to state that interrogations that take place at Division Internment Facilities and Brigade Internment Facilities must be recorded, it then states that these should be "purged within 30 days". This policy was subsequently reversed by the new Obama administration.
WikiLeaks founder Julian Assange said: "The ’Detainee Policies’ show the anatomy of the beast that is post-9/11 detention, the carving out of a dark space where law and rights do not apply, where persons can be detained without a trace at the convenience of the U.S. Department of Defense. It shows the excesses of the early days of war against an unknown ’enemy’ and how these policies matured and evolved, ultimately deriving into the permanent state of exception that the United States now finds itself in, a decade later."
A number of documents relate to the policies surrounding the interrogation of detainees (2004, 2005, 2008). Direct physical violence is prohibited, in writing, but a formal policy of terrorising detainees during interrogations, combined with a policy of destroying interrogation recordings, has led to abuse and impunity. We learn of policies that apply to international forces: a 13-page interrogation policy document from 2005 relates to all personnel in the Multi-National Force–Iraq (MNF–I). It details "approved" "interrogation approaches". The documents detail the promotion of exploitative techniques such as the "Emotional Love Approach: Playing on the love a detained person has for family, homeland or comrades". In the "Fear Up (Harsh)" approach, by contrast, "the interrogator behaves in an overpowering manner with a loud and threatening voice in order to convince the source he does indeed have something to fear; that he has no option but to co-operate".
The ’Detainee Policies’ provide a more complete understanding of the instructions given to captors as well as the ’rights’ afforded to detainees. We call upon lawyers, NGOs, human rights activists and the public to mine the ’Detainee Policies’ and investigate important issues such as the denial of access to the ICRC (International Committee of the Red Cross) to detainee facilities, as well as to research and compare the different generations of SOPs and FRAGOs to help us better understand the evolution in these policies and why they have occurred. Publicise your findings using the hashtag #WLfindDP
Here we want to give you reminder that earlier in this year we got several leaks from WikiLeaks, among them -SpyFilesGI Files (Global Intelligence Files & Five Million E-mails From Stratfor) & The Syria Files Containing 2.5 Million Emails of Syrian Politicians, Govt, Ministries & Companies.  


For detailed information & to download to latest release by WikiLeaks on 'Detainee Policies' Click Here



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...