Indishell.net hacked by Pakleets



The Cyber war is on between Indian and Pakistani Hackers. Today Indian hacker group Indishell (TEAM ICA) hacked into the pakhackerz.com & now in counter Pakleets hacked the Indishell Forum also they gave message to the Indishell guys. 


"This is the Revenge of Hacking my Brother Site PakCyberArmy (shak) and Als0 U Comments On Faceb00k Piss me Off S0 today i Was s0 Bore i thought to Play with U and Here i am xD N0w Admit that U r Skid and Visit Google and learn Some More shits ...
Dont Even Dare t0 Visit Pakistani Sites again
0therwise U Come t0 Kn0w what I and Pakistani Hackers Can D0 :P"


Hacked Site:- 
http://indishell.net/


Mirror Link:-
http://mirror.sec-t.net/defacements/?id=42923

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Microsoft gave comment about LulzSec



Microsoft has commented on LulzSec's posting of emails and addresses, some of which may be associated with Xbox Live accounts. Microsoft has sent us this comment on the data, which is an info dump and not a hack.
"This group appears to have posted a list of thousands of potential email addresses and passwords, and encouraged users to try them across various online sites like Xbox LIVE in the event one of the users happens to use the same password and email address combination.  At this time we do not have any evidence Xbox LIVE has been compromised. However we take the security of our service seriously and work on an ongoing basis to improve it against evolving threats."
The group dumped a list of 62,000 emails and passwords on a file sharing site (the list has been taken down multiple times) for accounts of sites and services like Xbox Live, PayPal, WOW, and much more (confirmed on LulzSec's Twitter, even). We've also had one poor reader tell us the credit card attached to his Xbox Live account has already been hit for $100 and the account's password changed.Just to clarify: LulzSec hasn't hacked Xbox Live, they've simply released people's emails and passwords that may pertain to an Xbox Live or PayPal or WOW, etc. account.  Hacker group LulzSec has released emails and passwords for some people's Xbox Live account info, among other sites and services. LulzSec has also been involved in attacks on Nintendo, Minecraft, EVE Online, and (of course) Sony, among others. And for those of you keeping score out there, hactivists Anonymous deal more in denial of service attacks, while exposing user info is one of LulzSec's deals. Whatever the method or rationale, though, it's annoying. 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Pakhackerz hacked by Team ICA


Pakhackerz Site hacked by Team ICA


Hacked Site:-
http://pakhackerz.com/


You May Also Like This:-


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

4 Website Hacked by PCA

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Security Experts are saying that China at Risk From Cyber Attacks



A report from the U.S. Department of Homeland Security has revealed that software systems used by China to run its weapons, utilities and chemical plants systems suffer from an inherent bug, leaving them vulnerable to hacker's cyber attacks. The report, which was first disclosed to Reuters, saw the department warn China over the vulnerabilities in its software. The software was designed by Beijing-based Sunway Force Control Technology Co. According to the department, hackers could exploit the bug to inflict an attack that could cause lasting damage on critical parts of the country's infrastructure.

Dillon Beresford, a researcher for NSS Labs -- the private security firm that discovered the bugs -- commented to Reuters, "These are vulnerabilities that hackers could leverage to cause destruction".The department's advice comes in the wake of numerous cyber attacks against several big-name companies and government departments and agencies. Sunway's products, widely used in China, are also deployed to a lesser extent in other countries including the United States, DHS's Industrial Control Systems Cyber Emergency Response Team said in its advisory  Since its advice, Sunway has reportedly  developed software patches to plug the security holes. Experts have since revealed that even with these fixes, it will take the software's users weeks, maybe months to install the new security fixes. In this month alone there have been reports of successful attacks on Citibank, The International Monetary Fund, the U.S. Senate and CIA.  The news comes a month after public attention turned to China after the search giant Google reported a hacking attempt on its Gmail email service. China was widely expected of involvement in the attack after Google traced the origin of the hackers to one of the country's provinces. There is as yet no firm date when the security fixes will be fully functional. Sunway's products, while most widely used in China, are also used by certain Western companies.  

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

ESET Released Antivirus for Android in Beta



ESET is well-known in the PC arena for its NOD32 antivirus and ESET Smart Security suite. The company's existing mobile security product supports Windows Mobile and Symbian devices. ESET Mobile Security for Android Beta (free, direct) extends the same protection to the Android realm.
ESET Mobile naturally includes protection against Android malware. It checks processes and new apps in real time and also scans for threats on demand. Some mobile security products eliminate almost all antivirus configuration settings. Lookout Mobile Security is an example. ESET includes a full set of configuration choices, much like what you'd find in a PC-based antivirus. It uses heuristic analysis, it can quarantine suspect files, and it optionally scans inside archives, among other things.
Like Kaspersky Mobile Security 9, Norton Mobile Security 2.0 Beta, and others ESET Mobile can respond to coded SMS messages by locking the phone, transmitting its GPS location, or wiping all data from the phone. You can't track the phone by logging in to a Web site the way you can with GadgetTrak Mobile Security for Android & Blackberry 3.1, Mobile Superhero, and others, but ESET's SMS response to a location request includes a Google Maps link.
A thief who attempts to evade ESET's protection by swapping out the SIM card won't get far. Insertion of a SIM card not already marked as trusted will cause the phone to automatically lock and secretly send an alert SMS to one or more predefined contacts. The alert SMS contains the new SIM card's phone number, the IMSI (International Mobile Subscriber Identity) number and the phone's IMEI (International Mobile Equipment Identity) number. ESET also protects against uninstallation on Android 2.2 and later.
ESET's antispam feature isn't as ambitious as that of PrivacyStar and Mr. Mr. Number, which use crowdsourcing to block known spam callers. You can set ESET to block specific blacklisted numbers or to block all incoming calls and texts that don't come from your contacts. The app retains information about blocked contact attempts, so you can review the contact log and make any necessary adjustments.
The most unusual feature ESET offers is the security audit. This isn't an audit of app permissions like that found in Lookout and in Webroot Mobile Security for Android. ESET audits the device daily and automatically fixes everything it can. You can also manually run an audit at any time. ESET alerts if battery power or free disk space are too low. It reports security problems with Bluetooth, GPS, and GSM Network as well as with installed applications and stored data. The included Task Manager lets you view running processes and terminate non-system processes.
This app, currently in beta testing, can be downloaded from the Android Market or directly from the ESET Web site.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

SEGA Hacked



SEGA took the SEGA Pass system offline Thursday. Friday morning, it sent an email to Pass members alerting them that an unauthorized and unidentified third party had gained access to the SEGA Pass database. SEGA Pass, the gaming company’s member database and online network, has been hacked. Members’ email addresses, birth dates and encrypted passwords were obtained in the attack, according to the company. SEGA is also telling members that it has reset their passwords, that all access to SEGA Pass has been temporarily suspended and that Pass users should consider changing their passwords on other sites. No party has stepped up to claim responsibility as of yet, though hacker group LulzSec tweeted at SEGA Friday morning:


 “We want to help you destroy the hackers that attacked you. We love the Dreamcast, these people are going down.” Meanwhile, LulzSec recently claimed responsibility for hacking Sony’s and Nintendo’s servers, taking down the CIA’s website and hacking the U.S. Senate.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

THC-HYDRA 6.4 is Now Available



One of the most famous network logon cracker – THC-HYDRA, has been updated. We now have THC-HYDRA version 6.4!
THC-HYDRA is a very fast network logon cracker which support many different services. This tool is a proof of concept code, to give researchers and securityconsultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. It was tested to compile cleanly on Linux,Windows/Cygwin, Solaris, FreeBSD and OSX.

Changelog for thc-hydra v6.4

Update SIP module to extract and use external IP addr return from server error to bypass NAT
Update SIP module to use SASL lib
Update email modules to check clear mode when TLS mode failed
Update Oracle Listener module to work with Oracle DB 9.2
Update LDAP module to support Windows 2008 active directory simple auth
Fix to the connection adaptation engine which would loose planned attempts
Fix make script for CentOS, reported by ya0wei
Print error when a service limits connections and few pairs have to be tested
Improved Mysql module to only init/close when needed
Added patch from the FreeBSD maintainers
Module usage help does not need a target to be specified anymore
configure script now honors /etc/ld.so.conf.d/ directory


Download THC-HYDRA v6.4 (hydra-6.4-src.tar.gz)  here.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Another Fake Publicity stunt of The Hacker News (THN) get exposed, This time by PCA



Another Fake Publicity stunt of The Hacker News (THN) get exposed, This time by Pakistan cyber Army (PCA). Today THN published that ftp of HP get hacked and their Data Base will be licked also they specific the space of that DB and that was around 9 GB. But the reality is that ftp of HP is not at all hacked. It is a rumor, created to get fake attention.  
Today the Official Authority of PCA inform the VOGH team about this stuff. They also want to expose these hole story in front of the world. 


According to PCA:- 
"...Dear All,


This is PCA yea yea you know us Pakistan Cyber Army with "mission Exposed". Copy Cats are around every where in the world. We have just read a story of "HexCode" hacking into HP ftp. He calim to have GB's of DATA from the HP server. "HexCode" script kiddie so called l33t forgot that the folder he is showing is a "public" folder "/pub" and it is mainly use to download update patches. Go on and just access "ftp://ftp.hp.com/pub/" from your ftp client or firefox LOL..... HP Hacked ROFL

Acer ftp was critical because it exposes user information about the "packerd Bell" Users. "HexCode" grow up kiddoz you cant be a hacker realize this reality ROFL. Fake stuff by a kid... and .... Ahhh forget it LOL.... "HexCode" another script kiddie expose by PCA ROFL........ ROFL.......  PCA will keep exposing kids like before.... Grow Up and drink RedBull ROFL..



Thehackernews is posting fake news LOL... "








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...