Showing posts sorted by relevance for query ISP. Sort by date Show all posts
Showing posts sorted by relevance for query ISP. Sort by date Show all posts

High Court Ordered ISP's To Block The Pirate Bay in U.K.

High Court Ordered ISP's To Block The Pirate Bay in U.K. 

Last month Microsoft has blocked Pirate Bay links in Windows Live Messenger, now the High Court ordered to strictly block Pirate Bay in U.K. Sky, Everything Everywhere, TalkTalk, O2 and Virgin Media and other ISP of UK must have to  prevent their users from accessing the site. A sixth ISP, BT, requested "a few more weeks" to consider their position on blocking the site. Pirate Bay is regarded as the world's largest bittorrent tracker & file shearing sites hosts links to download mostly pirated free music and video.
"Sites like The Pirate Bay destroy jobs in the UK and undermine investment in new British artists," the British Phonographic Industry (BPI) said. Chief executive of BPI Geoff Taylor said: "The High Court has confirmed that The Pirate Bay infringes copyright on a massive scale. Its operators line their pockets by commercially exploiting music and other creative works without paying a penny to the people who created them. 
"As a responsible ISP, Virgin Media complies with court orders addressed to the company but strongly believes that changing consumer behaviour to tackle copyright infringement also needs compelling legal alternatives, such as our agreement with Spotify, to give consumers access to great content at the right price." - said Virgin Media. 


-Source (BBC)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

The Pirate Bay Criticize Anonymous DDoS Attack on Virgin Media

The Pirate Bay Criticize Anonymous DDoS Attack on Virgin Media
 
Earlier in this month High Court has ruled to block The Pirate Bay in U.K. In action hacker collective Anonymous performed massive denial of service attack which targeted Virgin Media - one of those ISP who immediately followed the Court order and blocked Pirate Bay. It is said that the denial of service attack was simply a tit for tat as Virgin Media is the 1st ISP who instantly followed the High Court order while saying- "As a responsible ISP, Virgin Media complies with court orders addressed to the company but strongly believes that changing consumer behaviour to tackle copyright infringement also needs compelling legal alternatives, such as our agreement with Spotify, to give consumers access to great content at the right price." And this make Anonymous angry with Virgin and as a result they sent Virgin Media offline for a certain time. 
But here comes a twist and that is The Pirate Bay has denounced an Anonymous DDoS campaign that took down Virgin Media, calling it an "ugly" method that's no better than the UK court order for ISPs to block users from getting to The Pirate Bay. 

In their official statement TPB said - "Seems like some random Anonymous groups have run a DDOS campaign against Virgin media and some other sites. We'd like to be clear about our view on this:
We do NOT encourage these actions. We believe in the open and free internets, where anyone can express their views. Even if we strongly disagree with them and even if they hate us. So don't fight them using their ugly methods. DDOS and blocks are both forms of censorship.
If you want to help; start a tracker, arrange a manifestation, join or start a pirate party, teach your friends the art of bittorrent, set up a proxy, write your political representatives, develop a new p2p protocol, print some pro piracy posters and decorate your town with, support our promo bay artists or just be a nice person and give your mom a call to tell her you love her."
As far as the Anonymous DDoS goes, Virgin Media put out a statement that said the attack lasted one hour. Virgin Media also reiterated that it didn't have a choice to block The Pirate Bay; rather, the government forced its hand.


-Source (NS)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

KickAss Torrents Facing a Total Blackout in Italy

KickAss Torrents Facing a Total Blackout in Italy

After Pirate bay now another widely preferred BitTorrent website  on the Internet - KickAss Torrents , is facing a total blackout in Italy. Following an investigation by the country’s cybercrime police, an ISP blocking order has now been granted against a site which authorities say is run by criminals generating millions of dollars. FIMI boss Enzo Mazza confirmed to TorrentFreak that both the old and new domains and IP-addresses will be blocked, and added the following message - “The investigation into the criminal organization behind the site is still making progress and the public prosecutor is in touch with the authorities in the countries involved in the case. The case is followed by the Fiscal police who are usually investigating Italian mafia bosses. This means they are well equipped to take the members of the KAT gang to justice.”
In an exclusive report Torrentfreak said - KickAss Torrents has been founded just three years ago in 2009, KickAssTorrents has shown that it’s serious about becoming a leading torrent site player. Of course, that has its drawbacks too. The site’s increasing profile has caused it to appear in numerous MPAA, RIAA and government reports, in the US and elsewhere. News today reveals that the authorities in Italy have been watching the site for some time.
According to a report coming out of the police department with responsibilities for tackling cybercrime, KickAssTorrents will soon be subjected to a nationwide ISP blockade. Translated as “Financial Guard”, the Guardia di Finanza (GdF) is a department under Italy’s Minister of Economy and Finance. Part of the Italian Armed Forces, GdF has in recent years been involved in many file-sharing investigations, most recently against KickAssTorrents.
Operation ‘Last Paradise’ has just concluded with the public prosecutor of the Sardinian capital Cagliari granting an “order of inhibition” which requires the country’s ISPs to cease providing access to the site. Similar orders were previously granted against The Pirate Bay and the now-defunct BTjunkie. “This is another memorable dark day for digital piracy in Italy. After starting with The Pirate Bay in 2008 and the final closing of the doors at BTjunkie in February 2012, the Guardia di Finanza has targeted another super-pirate platform, virtually located in the Philippines and servers scattered around the world,” GdF said in a statement.
“This colossal site of 10 million active torrents receives over 3 million visits daily from all over the world and Italy was the third most popular country of origin for users behind only India and the USA.” GdF adds that by their estimates, KickAssTorrents generates $8.5 million per year from advertising and other revenue.
“This international platform has long been targeted by U.S. authorities as one of the worst sites for the illegal distribution of music,” said Enzo Mazza, chief of FIMI, Italy’s answer to the RIAA. “The intervention of the Italian authorities was very important, especially for the protection of legal music in Italy, which now represents 30% of the market. Platforms such as The Pirate Bay, BTjunkie and KickAssTorrents are run by criminal organizations that make millions from advertising. Responding to the news, Italian lawyer Giovanni Battista Gallus told TorrentFreak that unlike The Pirate Bay blockade, there is no “proper” court order for the current blockade. This also happened with the BTjunkie block earlier, which was handled by the same prosecutor. “In this case the order has been issued only by the public prosecutor, without any judicial intervention,” he said. “I have serious doubts whether this is appropriate under Italian criminal procedure law, and I’m very curious to see the outcome of an appeal against this order.”
The extent of the forthcoming blockade isn’t clear from the information currently being released. However, the GdF statement specifically mentions kickasstorrents.com, a domain the site left behind when it switched to Kat.ph in April 2011.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Massive Attack on Pakistani Cyber Fence By Indishell (ISP & 70 News Channel Get Hacked)


Indishell also known as Indian Cyber Army strikes again. After hacking into the Geological Survey of Pakistan Govt. this another major attack performed by IRFn1nj4 & Ashell, two renowned hacker from Indishell. In this attack Indishell hit the Pakistani news channels. Thus more than 70 Pak news sites get hacked by IRFn1nj4 & Ashell. Not only media also they hacked Brain Net official website. Brain Net  is pioneer in Internet Service industry in Pakistan and considered to be largest Internet service provider with greater geographical coverage and vast range of internet solutions for consumer and corporate sector. This attack of Indishell must be considered as a massive cyber attack on Pakistani Cyber fence. Because both media and ISP has been hit strongly in this attack. All the hacked sites, mirrors & other relative information of this cyber attack can be fond on a pastebin release. 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Steals 40GB User Data From Australian ISP Named AAPT

Anonymous Steals 40GB User Data From Australian ISP Named AAPT  

Australian rampage of Anonymous continues. Anonymous has claimed to have breached & stolen more than 40GB data from an Australian internet service provider named AAPT. Also the hacker collective group vows to publish those online. This cyber attack on AAPT comes just days after Australian arm of the group claimed responsibility for bringing down 10 government websites and warned that it will continue the attacks on ".gov.au" sites until plans to force ISPs to store user data and make it further available to security services are shelved. This hack comes as the second stage of a campaign against new surveillance and data retention laws that would force ISPs (Internet Service Providers) to store user data and make it available to intelligence agencies for up to two years. A formal statement purporting to be from the CEO of AAPT has appeared on PasteBin says:-
"STATEMENT FROM DAVID YUILE, CEO AAPT
IT WAS BROUGHT TO OUR ATTENTION BY OUR SERVICE PROVIDER, MELBOURNE IT, AT APPROXIMATELY 9.30PM LAST NIGHT THAT THERE HAD BEEN A SECURITY INCIDENT AND UNAUTHORISED ACCESS TO SOME AAPT BUSINESS CUSTOMER DATA STORED ON SERVERS AT MELBOURNE IT.
AAPT IMMEDIATELY INSTRUCTED MELBOURNE IT TO SHUT DOWN THE SERVERS WHEN WE WERE NOTIFIED OF THE INCIDENT. PRELIMINARY FINDINGS SUGGEST IT WAS TWO FILES THAT WERE COMPROMISED AND THE DATA IS HISTORIC, WITH LIMITED PERSONAL CUSTOMER INFORMATION. FURTHER, THE SERVERS ON WHICH THE FILES WERE STORED HAVE NOT BEEN USED OR CONNECTED TO AAPT FOR AT LEAST 12 MONTHS..."
Anon Australia claimed the attacks aimed to show how we should not trust ISPs to store personal information. "You want to trust these ISPs with your data? When they can't even keep it secured?! If I were you, I wouldn't trust anyone but myself with my data." Anonymous claimed that it plans to release a sample of the data later today, but will deliberately censor private details, because "the people were not their target".
"We don't want to publish personal innocent personal details like some of the other Anons have in other operations which have lost the public's support. Our target is the (Federal) Government who think they can get away with doing something like this," the hacker added.


-Source (TOI)






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Justice Dept. Lobbies Against Cyber Security


James Baker of the Justice Department recently testified to the Senate Judiciary Committee about ECPA reform, and in the process he touched on the provision of ECPA that prohibits ISPs from sharing subscriber data with the government in the absence of a court order.  Mr. Baker hinted that this provision should perhaps be expanded to prohibit ISPs from sharing subscriber data with any third party in the absence of a court order:
A sixth potentially appropriate topic for legislation is the disclosure by service providers of customer information for commercial purposes.  Under § 2702(c)(6) of ECPA, there are currently no explicit restrictions on a provider disclosing non-content information pertaining to a customer or subscriber “to any person other than a government entity.”  This approach may be insufficiently protective of customer privacy.  Congress could consider whether this rule strikes the appropriate balance between providers and customers.
http://www.wired.com/images_blogs/threatlevel/2011/04/bakerepca.pdf
This strikes me as a dangerous step from the point of view of cybersecurity.  Let me give one example.  In a distributed denial of service attack, infected consumer machines are instructed to send packets to a victim site, which is then overwhelmed by malicious traffic.  An ISP can often tell which of their customers’ machines have been infected just by looking at the nature of the signals the machines are sending.  If the ISP passes that information on to the victim site, the victim site or its service provider can shunt aside or drop signals from the infected computers as part of the target’s defenses.
Mr. Baker’s casual proposal to extend the ECPA bar on disclosure would seem to make such such defensive moves illegal in the absence of a court order.  It seems to me that this would dramatically slow responses to denial of service attacks.
Am I missing something, or is the Justice Department just clueless?  Orin Kerr, the batsignal is flashing!

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Operation Blackout By Anonymous (#OpBlackout)


Hacktivist Anonymous has called #OpBlackout. Anon has threatened to fight the US government over alleged censorship of the internet. The group claims that the US government "is censoring the internet", employing ISP blocks, DNS blocks, search engine and web site censorship, and a variety of other methods to stifle freedom. Anonymous has called on the citizens of the US to stand up against their government in what it described as "not a call to arms, but a call to recognition and action". It also called on the people of other countries to "fight back", adding that their governments will most likely follow suit.

In a Press Release Anonymous Said:-


"Citizens of the United States, We are Anonymous.


This is an urgent emergency alert to all people of the United States. The day we've all been waiting for has unfortunately arrived. The United States is censoring the internet. Our blatant response is that we will not sit while our rights are taken away by the government we trusted them to preserve. This is not a call to arms, but a call to recognition and action!
The United States government has mastered this corrupt way of giving us a false sense of freedom. We think we are free and can do what we want, but in reality we are very limited and restricted as to what we can do, how we can think, and even how our education is obtained. We have been so distracted by this mirage of freedom, that we have just become what we were trying to escape from.
For too long, we have been idle as our brothers and sisters were arrested. During this time, the government has been scheming, plotting ways to increase censorship through means of I S P block aides, D N S blockings, search engine censorship, website censorship, and a variety of other methods that directly oppose the values and ideas of both Anonymous as well as the founding fathers of this country, who believed in free speech and press!
The United States has often been used as an example of the ideal free country. When the one nation that is known for its freedom and rights start to abuse its own people, this is when you must fight back, because others are soon to follow. Do not think that just because you are not a United States citizen, that this does not apply to you. You cannot wait for your country to decide to do the same. You must stop it before it grows, before it becomes acceptable. You must destroy its foundation before it becomes too powerful.
Has the U.S. government not learned from the past? Has it not seen the 2011 revolutions? Has it not seen that we oppose this wherever we find it and that we will continue to oppose it? Obviously the United States Government thinks they are exempt. This is not only an Anonymous collective call to action. What will a Distributed Denial of Service attack do? What's a website de face ment against the corrupted powers of the government? No. This is a call for a worldwide internet and physical protest against the powers that be. Spread this message everywhere. We will not stand for this! Tell your parents, your neighbors, your fellow workers, your school teachers, and anyone else you come in contact with. This affects anyone that desires the freedom to browse anonymously, speak freely without fear of retribution, or protest without fear of arrest.
Go to every I R C network, every social network, every online community, and tell them of the atrocity that is about to be committed. If protest is not enough, the United States government shall see that we are truly legion and we shall come together as one force opposing this attempt to censor the internet once again, and in the process discourage any other government from continuing or trying.


We are Anonymous.
We are Legion.
We do not forgive censorship.
We do not forget the denial of our free rights as human beings.
To the United States government, you should've expected us.
..."


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Targets Australian Security Intelligence Organisation (ASIO) & Defence Signals Directorate (DSD)

Anonymous Targets Australian Security Intelligence Organisation (ASIO) & Defence Signals Directorate (DSD)

Australian rampage of Anonymous continues, after took down of several Australian Government website & a massive data breach from Australian ISP named AAPT now the nuisance hacker collective group today attempted to hack into both the Australian Security Intelligence Organisation (ASIO) and Defence Signals Directorate (DSD) websites. The attack was took place in early Friday, and here also Anon enlisted this cyber attack among their F**k Friday rampage also known as #FFF. The hacker group claimed to have shut down a computer server belonging to Australia's domestic spy agency ASIO, reportedly briefly closing down access to its public webpage. On its Twitter feed Anonymous Australia (@AuAnon) wrote: "The anonymous Operation Australia hackers have today again been busy with further attacks on the ASIO and DSD website."
According to sources - ASIO server faced massive traffic generated from a DDoS botnet, which immediately effected the normal service and later when loads get increased then as expected ASIO became passive and gone offline. The Australian Security Intelligence Organisation (ASIO) acknowledged some disruption to its website. "ASIO's public website does not host any classified information and any disruption would not represent a risk to ASIO's business."- said ASIO spokesman. The Sydney Morning Herald reported that ASIO's website was down for at least 30 minutes Friday morning, but it appeared to be loading normally Friday afternoon. Operation Australia, which has its own @Op_Australia Twitter stream said it would "stop the attacks at 10pm Aus. BUT we will never stop watching!". 





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

My Pakistan Webhost & PMU (Govt. of Pakistan) Hacked By Ashell


Couple of days ago Pakistani hacker THA Disastar has hacked the official website of Bharatiya Janata Party (BJP). In counter attack now Indian Cyber Army widely known as Indishell has hacked the official website of Project Management Unit (Pakistan Govt.) and also the largest web hosting company of Pakistan My Pakistan Webhost blown in this attack. According to Ashell, member of Indishell who hacked these sites said that this defacement is a Christmas git to Pakistan. After 12 hours of attack still the web hosting company's website is down. The defacement mirror of those two sites are posted on legend-h by the hacker. I would also like to give you reminder that yesterday Indishell guys performed a massive attack on the Pakistan Cyber fence and hacked more than 70 News channels and ISP's websites. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Brazilian ISP Under Massive DNS Poisoning Attack, Redirecting Users To Malicious Sites


Major Cyber Attack on Brazilian Internet Services Provider. The attackers are performing massive DNS poisoning attack to redirect their account holders into the malicious websites. 

According to Kaspersky's SecureList:-
"In the past few days several Brazilian ISPs have fallen victim to a series of DNS cache poisoning attacks. These attacks see users being redirected to install malware before connecting to popular sites. Some incidents have also featured attacks on network devices, where routers or modems are compromised remotely. Brazil has some big ISPs. Official statistics suggest the country has 73 million computers connected to the Internet, and the major ISPs average 3 or 4 million customers each. If a cybercriminal can change the DNS cache in just one server, the number of potential victims is huge.
Last week Brazil’s web forums were alive with desperate cries for help from users who faced malicious redirections when trying to access websites such as YouTube, Gmail and Hotmail, as well as local market leaders including Uol, Terra and Globo. In all cases, users were asked to run a malicious file as soon as the website opened..."'


For more information click Here


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Pirate Bay & WikiLeaks Goes Offline After Prolonged Denial of Service Attack

Pirate Bay & WikiLeaks Goes Offline After Prolonged Denial of Service Attack
 
Most popular and controversial file sharing site "The Pirate Bay" faced a prolonged distributed denial of service which interrupts the service. In their official Facebook page confirmed the attack. DDoS attack left the site largely inaccessible for the last 24 hours, with only intermittent service in the UK. The Pirate Bay took to its Facebook page to confirm the attack, saying that it did not know who was behind it, although it ‘had its suspicions’. There had initially been speculation that the attack on The Pirate Bay was initiated as an act of revenge by the Anonymous hacker collective after members of The Pirate Bay criticised Anonymous for organizing DDoS attacks on UK internet service provider (ISP) Virgin Media for blocking access to The Pirate Bay. The Pirate Bay has said, however, that Anonymous is not to blame for the attack on its site.
Meanwhile, a former Anonymous member by the name of AnonNyre has claimed responsibility for DDoSing the Pirate Bay site. There is no evidence though to confirm that AnonNyre was actually behind the attacks. 

Not only TPB, but also Wikileaks official website faced massive distributed denial of service attack which hampers the site for 72 long hours. According to official twitter of Wikileaks "WikiLeaks has been under sustained DDOS attacks over the last 72 hours..."  
This not the first time, before this Wikileaks have faced cyber attack and an Anonymous member took responsibility of that Attack on Wikileaks website. That  time the attacker executed a massive Denial of Service while using newly developed tool #refref. In an exlusive report by Corero Network Security said the attack on Wikileaks site was one of the largest DDoS attack ever took place in 2011. But still it is not clear if there is any connection between the two incidents. 





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Permanent Internet Ban in Iran, Govt Launching National Intranet Service

Permanent Internet Ban in Iran, Govt Launching National Intranet Service  

The Iran Government has announced its plans to establish a National Intranet within five months. As a result millions of Internet users in Iran will be permanently denied access to the World Wide Web (WWW) and cut off from popular social networking sites, email services & so on. The government is set to roll out the first phase of the project in May, following which Google, Hotmail and Yahoo services will be blocked and replaced with government Intranet services like Iran Mail and Iran Search Engine. At this stage, however, the World Wide Web, apart from the aforementioned sites, will still be accessible. Iran government has already started the registration procedure to apply for procuring Iran Mail ID, which mandates authentic information pertaining to a person's identity, including national ID, address and full name. Registration will be approved only after verifying it against the government data on the particular applicant. The second and final stage of the national Intranet will be launched in August, which will permanently deny Iranians access to the Internet. "All Internet Service Providers (ISP) should only present National Internet by August," Taghipour said in the statement. Iranian ISPs already face heavy penalties if they fail to comply with the government filter list. By establishing the Intranet, the government control is set to become stricter. Foreign sites can still be accessed over the Intranet provided they are mentioned in a "white list" set up by the government. The government is also believed to be planning for better control on proxy servers which allow users to access banned sites. Accordint to statement of Reza Taghipour, the Iranian minister for Information and Communications Technology, announced the setting up of a national Intranet and the effective blockage of services like Google, Gmail, Google Plus, Yahoo and Hotmail, in line with Iran's plan for a "clean Internet."

-Source (IB Times)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Federal Trade Commission Server Breached By Anonymous #Antisec (#ACTA Protest)

Federal Trade Commission Server Breached By Anonymous #Antisec (#ACTA Protest)
Hacker collective group Anonymous along with Antisec continues their protest against ACTA. This time the blown the  Web server of the Federal Trade Commission's Bureau and hacked the official website of U.S. Federal Trade Commission, consumer rights, & National Consumer Protection Week. Hacker released a note in pastebin where the have breached all the security of the FTC server, rooted the server & hacked into the database to expose user name, email-id, passwords and many other very sensitive data of the Govt. They have also written a note while addressing FTC - 
"Dear Fuctarded Troglodyte Clusterfuck (FTC):
Congratuations! You got rooted and rm'd (AGAIN). U MAD!? Don't like it? Oh wait,
you want some lube? Ohhhh, you want MORE lube. (Well ok then, you silly bitch!)
So, how’s it feel when your entire site is jack-hammered off the internet? Do
tell!
Guess what? We’re back for round 2. Well, with the doomsday clock ticking down
on Internet freedom, Antisec has leapt into action. Again. Holy déjà vu hack
Batman! Expect us yet?
Hey FTC! Y u no ask Google to delay the privacy-violating changes to its terms
of service? Y u let Google combine user data without user consent? Y u collect 8
million Do Not Call List complaints online from bothered citizens, but u only
took action 83 times? Y u suck?
Even more bothersome than your complete lack of competence in maintaining your
own fucking websites and serving the citizens you are supposed to be protecting,
is the US federal government’s support of ACTA. You really want to empower
copyright holders to demand that users who violate IP rights (with no legal
process) have their Internet connections terminated? You really want to allow a
country with an oppressive Internet censorship regime to demand under the treaty
that an ISP in another country remove site content? Well, we have a critical
warning for you, and we suggest you read the next few paragraphs very, very
closely.
If ACTA is signed by all participating negotiating countries, you can rest
assured that Antisec will bring a fucking mega-uber-awesome war that rain
torrential hellfire down on all enemies of free speech, privacy and internet
freedom. We will systematically knock all evil corporations and governments off
of our internet.
And just think, as you’re reading this statement, we are already sailing into
new waters with our allied shiny epic lulzfleet. Don’t fret, we’ve already
prepared treasure chests of stolen booty, diamonds and pizzas for our next raid.
We are s(h)itting on hundreds of rooted servers getting ready to drop all your
mysql dumps, child pr0n and mail spools (to be honest, fucking too much for us
to read on our own, so we swap with all criminal underground allies for sex and
0days). Oh wait, what’s that? Your passwords? Addresses? Your precious bank
accounts? Even your online dating details?! (yep, We know you're cheating on
your…well, we won’t get into that here. Yet.)
Yep, we know all about you. All of your little secrets will be laid bare for the
world to see. So, how does it feel to be the one spied on?
Oh, eat cock now. Kthxbai. :D"



Later in an official statement FTC spokesperson Cecelia Prewett said "The Bureau of Consumer Protection’s Business Center website and the partnership site NCPW run by the Federal Trade Commission were hacked earlier today, The FTC takes these malicious acts seriously. The sites have been taken down and will be brought back up when we’re satisfied that any vulnerability has been addressed."
Earlier for #OpMegaupload hackers from Antisec has hacked the official site of OnGuardOnline Of Federal Trade Commission(FTC) and breached the database. That attack was a part of protest against censorship (SOPA/PIPA/ACTA)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

19 Million+ UK Households Being Used As Cyber Weapon (Botnets)


You are also a cyber criminal. Don't get panic, we are sorry to say this for that is truth. An exclusive report is saying that more than a million households of UK is either used or misused as cyber weapons meainly Botnets.
Dutch researchers investigating ways to curtail the hijacking of domestic computers for criminal use, found that more than one million UK households’ PCs are linked to criminal networks known as ‘botnets’, which are groups of Internet-connected computers that have been compromised by a third party and put to malicious use. With around 6% of the UK’s 19m Internet households thought to be part of a botnet, this helps criminals spread spam around the Web more effectively, whilst it can also be used to attack websites and even garner bank details from the unsuspecting public.
The data was gathered from a number of different sources, though most emanated from what is known as ‘spam traps’, which are fake email addresses set up for the sole purpose of receiving junk mail. It’s thought that more than 90% of spam is sent through botnets, and it’s the Internet addresses on these botnets which are a good indicator of where the so-called ‘drone’ machines are located. The researchers then used the IP addresses of the machines that were sending the spam, and traced each one to an Internet Service Provider (ISP). And feeding into this was data about the Conficker botnet, which is thought to be one of the biggest examples of such a network, and incident reports from a computer security company called DShield. The UK figure is placed at number 19 in the top 20 nations with the biggest botnet problem, but it’s roughly in-line with the global average which sits at around 5-10% of domestic computers that are thought to be linked to botnets. Greece and Israel were way out on top, though, with around a fifth of all broadband subscribers thought to be unwittingly recruited into botnets. 
It goes without saying that the biggest ISPs have the biggest botnet problem. It has been figured out that the level of spam on BT’s network peaked at the end of July 2010, at which point more than 30m junk email messages were being sent each week.  

Here is a Statistic:- 


The good news, however, is that these figures have fallen sharply since then with a number of anti-cyber crime groups helping to bring down some of the biggest botnets. One takedown earlier this year saw spam fall massively overnight, when just an entire network, called Rustock, stopped sending junk.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hacker Breached Verizon Server & Stolen 3 Million Customer Data

Hacker Breached Verizon Server & Stolen 3 Million Customer Data

Verizon one of the most popular and largest Network provider and ISP of America faced a large scale cyber attack. A hacker going by the name of TibitXimer claimed to have breached one of major server of Verizon, by which he managed to gain access inside the database of Verizon customer. This data breach effected more than 3 Million Verizon FiOS customers including full names, addresses, mobile serial numbers, the opening date of each account, and account passwords. However, he said that figure was an estimate and had "no clue" exactly how many records there were, and that it was a "low estimate based on the size of one record and the size of all the files." A fraction of leaked data have been allegedly posted on pastebin, but later the post was removed. In a report Zdnet said that the cyber attack was taken place earlier in July, this year which allowed him to gain root access to the server holding the customer data. Tibit gained access to a server with little difficulty after working with another hacker to identify the security flaw. Though Tibit denied to mention the reason of this hack, and also he did not expose the nature of the vulnerability by which he managed to get access in the server. The hacker also said that after he informed Verizon of the exploit, the company "ignored my report," and did not comment. 
 He also noted that the exploit "still exists." "The worst part of it all, every single record was in plain text," he said. "I did not have to decrypt anything." He said he couldn't understand "why they still haven't fixed the exploits," months after informing the company of its poor network security.

Immediately after this hack Verizon authorities posted a notice while saying- "This incident was reported to the authorities when we first learned of it months ago and an investigation was launched. Many of the details surrounding this incident are incorrect and exaggerated. No Verizon systems were breached, no root access was gained, and this incident impacted a fraction of the number of individuals being reported. We take any and all attempts to violate consumer and customer privacy and security very seriously, so we notified individuals who could potentially have been impacted and took immediate steps to safeguard their information and privacy. Verizon has also notified law enforcement of this recent report as a follow-up to the original case.
....
There was no hack, and no access gained. A third party marketing firm made a mistake and information was copied. As for wireless v. wired customers, some of the individuals listed were Verizon customers who are not wireless customers but wired/wireline customers or prospective customers...."





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Red Hat Enterprise Linux 6.4 Beta Released & Available For Download

Red Hat Enterprise Linux 6.4 Beta Released & Available For Download 

Red Hat the global leader in open source solutions released another update of its enterprise Linux (RHEL Version 6). Since Red Hat Enterprise Linux has been released, we have got several updates, including three beta release and three final release (RHEL 6.1RHEL 6.2RHEL 6.3). Now the American software company added another beta, that is RHEL 6.4 and made it available for its customers. The beta release includes a broad set of updates to the existing feature set and provides rich new functionality in the areas of identity management, file system, virtualization, and storage as well as productivity tools. In their release note the RHEL Team said that -through collaboration with partners, customers and the open source community, we are committed to delivering technology that is tested and stable – including in the beta phase of development. Red Hat Enterprise Linux 6.4 demonstrates this commitment and has been designed for optimized performance, stability and flexibility to cater to today’s diverse workloads running in physical, virtual and cloud environments.

Key New Features & Enhancement :-
  • Identity Management
System Security Services Daemon (SSSD) enhancements improve the interoperability experience with [Microsoft Active Directory] by providing centralized identity access control for Linux/Unix clients in a heterogeneous environment.

  • File system
pNFS (Parallel NFS) client (file layout only) remains in technology preview, however now delivers performance improvements with the addition of Direct I/O for faster data access. This drives particular performance benefits for I/O intensive use cases including database workloads.

  • Virtualization
Red Hat Enterprise Linux 6 now includes the Microsoft Hyper-V Linux drivers, which were recently accepted by the upstream Linux community, improving the overall performance of Red Hat Enterprise Linux 6 as a guest on Microsoft Hyper-V.
Installation support for VMware and Microsoft Hyper-V para-virtualization drivers. This new feature enhances the user deployment experience of Red Hat Enterprise Linux as a guest in either of these virtualization environments.
In this release, KVM virtualization virtio-scsi support, a new industry storage architecture, provides industry leading storage stack scalability.

  • Management
The use of swap functionality over NFS enables more efficient read/write tradeoffs between local system memory and remote disks. This capability increases performance in very large, disk-less server farms seen in ISP and Web hosting environments.
Enhancement in c-groups delivers the ability to migrate multi-threaded applications without errors.
Optimized perf tool for the latest Intel processors

  • Storage
New system log features identify mapping from block device name to physical device identifier – allowing an administrator to easily locate specific devices as needed.

  • Productivity Tools
Microsoft interoperability improvements with Microsoft Exchange and calendar support in Evolution. Productivity functions, such as calendar support with alarm notification and meeting scheduling is improved.
Customers such as animation studios and graphic design houses now have support for the newer Wacom tablets.


Through this next beta release of Red Hat Enterprise Linux 6, Red Hat team is proud to deliver the highest quality open source enterprise platform. To download the beta release of Red Hat Enterprise Linux 6.4 click Here




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous is attacking US Chamber of Commerce website






In protest of the "PROTECT IP" bill, hacker group Anonymous plans to attack the US Chamber of Commerce website Monday evening. Hacktivist group Anonymous plans to launch attack the US Chamber of Commerce website today at 8pm EST, according to a flier posted to 4chan.org and Reddit.com, which urges Internet users to join in the fight. The distributed denial of service (DDoS) campaign is an act of protest against a piece of supposed anti-piracy legislation proposed by Sen. Patrick Leahy (D-VT) known as the “Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property” bill, or “PROTECT IP.” Anonymous, known for its campaigns against both corporations and governments around the world who the group believes stifle the free flow of information, argues that, if passed, PROTECT IP “would allow the US Government to force [Internet service providers] and search engines to censor websites they do not like under the guise of ‘copyright protection.’” The online protest was first announced Sunday in a statement released by the group, which reads:
“As pioneers of this new world, it’s our duty to resist and fight those who attempt to stop us. Whether you’re a journalist or blogger, or a participant of Anonymous, or the activists on the ground who protest against these corporate thugs and oppressive regimes and risk everything for freedom of information and speech, we are all in this battle together and we have a responsibility to protect our civil liberties.
“This attack tomorrow will send yet another message to the pigs that run the state that we will not be another cog in the f****d up clock that these corporate entities attempt to preserve through their political puppets in Washington.
“This is our world now and we will fight for it. Take it or leave it.” 
The PROTECT IP bill, a reiteration of the failed COICA bill, would give the US Justice Department broad powers to shut down access to websites it deems “dedicated to infringing activities.” As Anonymous accurately describes, these powers include forcing ISPs to block access to targeted websites, and even requiring search engines, like Google and Bing, to completely remove the websites from their search indexes. Perhaps even more troubling, the bill would also give private citizens — i.e. copyright holders — the ability to request that the government block a websites’ ability to display advertising, or process payments. Anonymous says that, rather than reduce piracy, the bill simply “endangers the free flow of information,” through the use of “domain seizures, ISP blockades, search engine censorship, and the restriction of funding to accused websites,” says Anonymous. All of this, they say, “takes Internet censorship to the next level.” The hacker’s interpretation of the bill, a summary of which leaked online last week, is echoed by a variety of other privacy advocates, who say the legislation is woefully misguided, and will result in rampant government censorship. “Protecting copyright and trademark are of course important objectives,” writes author and technology expert Larry Downes in an analysis of the bill posted to CNet. “But doing so by trampling due process rights, tinkering dangerously with the mechanics of the Internet, and impressing into police duties an expanding set of Internet service providers, hardly seems the best solution.” Anonymous first came into the world spotlight after launching a series of similar attacks on the corporate websites of PayPal, Master Card and Visa, all of which stopped processing donation payments made to whistle blowing website WikiLeaks. Most recently, members of the group were accused by Sony of initiating (or, at least, facilitating) an attack on its PlayStation Network, which resulted in the theft of nearly 13 million user credit cards, and could cost the company upwards of $170 million in damages. Those who wish to join in the DDoS attack — which simply overloads a website’s servers with an overwhelming amount of traffic, causing it to go offline — can join other Anons in the #OperationPayback IRC channel, where countless supporters have gathered to coordinate the attack. 


Anonymous Message on IP ACT






To read a full summary of PROTECT IP  CLICK HERE

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Russian Hacker Behind Cyber Attack on Georgia Caught on His Webcam

Suspected Russian Hacker Behind Cyber Attack on Georgia Caught on His Webcam 

It said that there may be hundred ways to commit crimes but there are chances of one hundred and one times to get busted. Exactly the same things happened for a Russian hacker who was behind the cyber attack against the country of Georgia. Since 2011 Georgia is blaming that few Russian hackers are disturbing their cyber space while attacking its computer networks, injecting malicious code into websites, and planting spyware to steal classified information. After discovering that a cyber-spy was infecting government computers with malware designed to mine important documents, government officials decided to fight fire with fire. They intentionally allowed the malicious software to infect one particular computer, and baited it with a ZIP file called “Georgian-Nato Agreement” — exactly the sort of thing they knew the intruder would be looking for. Instead of important documents, however, the bait file was loaded with the hacker’s own malware. Once the hacker downloaded and opened the file, the software went to work stealing his documents and, best of all, hijacking his webcam to capture clear video of his face. According to the CERT-Georgia report, an analysis of the attack's command-and-control center revealed that at least 390 computers were infected in the attack. 70% of compromised PCs were based in Georgia, with other victims found in the USA, Canada, Ukraine, France, China, Germany and Russia. Computers hit in Georgia were predominantly based in government agencies, banks and critical infrastructure the report claims. 
In a 27 page report, the Georgian government explains in details that, how in early 2011 Georgian news websites were hacked in order to exploit vulnerabilities, and spread malware that hijacked infected computers and searched for sensitive documents. 
According to report by Naked SecurityGeorgian officials lay a trap. Georgia's CERT deliberately infected one of its own PCs with the malware, and planted a ZIP file named "Georgian-Nato Agreement" on its drive, hoping it would prove irresistible for the hacker. Sure enough the hacker stole the archive file and ran malware that Georgia CERT had planted inside, meaning that now investigators had control over the hacker's own computer. This made it relative child's play to capture images of the suspect at work in front of his PC. The CERT researchers claim that they also found a Russian email conversation on the suspect's computer in which he gives instruction on how to use his malware and infect targets. Furthermore, the suspected hacker's city, ISP, email address and other information were also acquired. Curiously, a domain used by the attackers was registered to an address in Moscow belonging to the Russian Ministry of Internal Affairs, department of logistics - which just happens to be based close to the Russian Secret Service (FSB). Furthermore, according to CERT-Georgia, websites used to control the infected Georgian computers have links with RBN, the notorious Russian Business Network.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hackers Shut Down The Entire Internet Service Provider's (ISP) Network In Palestinian


Internet service is completely cut off in Gaza Tuesday and partially shut down in the West Bank after an attack on the main Internet provider to the Palestinian territories, according to a minister with the Palestinian Authority.
"This is a very serious and vicious attack," Dr. Mashour Abu-Daqqa, the minister of Communications and Information Technology, told Media. The attack, which affected most of the Palestinian Internet communication network, also targeted domain addresses, said Abu-Daqqa. The minister said hackers are using international IP servers originating in Germany, China, and Slovenia to send millions of attacks in the form of viruses to penetrate and disrupt the Internet communications. There is no word on who, exactly, is behind the attacks.
"It does not mean the attackers are from there, it is only the origin of these virus attacks using these international servers and other international country servers," Abu-Daqqa said. Officials have not ruled out the possibility that the attack could be related to Monday's decision by the United Nations education and science agency, UNESCO, to accept a Palestinian bid for full membership in the organization. The move prompted the United States to withhold funding from UNESCO.
Abu-Daqqa said the hacking "is not the act of an individual or group" but possibly a "state-sponsored attack" intended to paralyze Internet communications in the Palestinian territories. Efforts to restore Internet service continue, the minister said.


-News Source (CNN)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

15 High Profile Pakistani Websites Hacked By IRFn1nj4 & Ashell (Indishell)


Indian Cyber Army (ICA) widely known as Indishell again hits the Pakistan Cyber fence. This time 15 Pak websites get hacked & defaced by IRFn1nj4 & Ashell. Among them there are many high profile and important sites, such has Hosting Company's official site, Shopping Mall, Commercial Sites, Educational Sites, Style & Passion based sites and many more. List of hacked sites and the message of hackers can be found on a pastebin release. Earlier Ashell has hacked many important Pakistani sites like Nokia House, Cell Sniper, Geological Survey &PMU of Pakistan Govt, ISP & many media houses.  




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...