Showing posts sorted by relevance for query cyber media. Sort by date Show all posts
Showing posts sorted by relevance for query cyber media. Sort by date Show all posts

NDTV Under Cyber Attack From BCA (Cyber-War Continues)

NDTV Under Cyber Attack From BCA (Cyber-War Continues) 
Cyber-War between Bangladesh and India continues. Hackers from bd mainly Bangladesh Cyber Army still targeting Indian cyber space. Earlier in our report we have covered the output of this cyberwar. Still if you do summary you will find that more than 10K websites from both India & Bangladesh get effected in this ongoing war. Among them there are many high value sites, Govt sites, media and many more. Even bd hackers launched attack on National Informatics Center (NIC), Indian Railways, Passport Dept, MIT and many more. Hackers claimed that they are continuously attacking Indian cyber fence to stand against injustice and oppression. This time the victim was a high-profile website, which is the official site of NDTV- a well known media. The NDTV server suffered from DNS failure. According to BCA The attack was done by the admin of Bangladesh Cyber Army named Bedu33n along with other members of BCA.
The above screen shot of submitted by BCA to prove the attack. This not the 1st time in the previous attack NTDV website suffers from massive denial of service attack. Also BCA released a You Tube video to send a message to Indian Govt. In their press release BCA said:-
 
"Indian hackers have hacked a number of our Government sites.
We know that the security of the sites are very weak, but we cannot allow them to hack these at any cost.
We have been forced to act back, we had no other way with our backs against the wall.
Under these circumstances, Indians have to agree to all the points as below, no matter what-
1. Stop hacking Bangladeshi websites and stop all types of access to Bangladeshi Cyber Space completely...
2. Stop killing innocent Bangladeshi citizens at BD-India borders...
3. Stop Tipaimukh Dam...
4. Sign the "Teesta Water Sharing Treaty"...
5.Either stop broadcasting of Indian Media in Bangladesh or let Bangladeshi Media enter India...
6. Stop all Anti-Bangladesh activities of BSF and punish all offenders for their deeds against Bangladesh...
7. Last but not the least, India has to stop all activities which go against Bangladesh in any possible way...
If these points are not accepted, our next attacks will be much bigger. You might think we are done, but this is just the beginning. Our next targets will be Indian Financial System, Communication System and IT Sector and Stock Exchange and we promise, those sites will be destroyed...."

VOGH Review:-
Being a media its our duty to rise awareness, so after seeing this so called cyber-war we can only see that it is just damaging thousands of websites. In short hackers from both countries are just bringing ruin to their own cyber space. While attacking websites of different countries, either knowingly or UN-knowingly they are just putting their cyber space in risk. Also such cyber-war always make negative reputation for those countries who have engaged the war. So If they do not end war - the war will end them.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Indian Govt is Working on a Robust Cyber Security Structure -Said Manmohan Singh

Indian Govt is Working on a Robust Cyber Security Structure -Said Prime Minister Manmohan Singh

After facing so many loses finally Indian government is taking the very cyber security issue seriously. India has already faced big damage in cyber space (both financially & reputation) from native countries like China, Pakistan, where sensitive data of Govt, defense, nuclear & space research has allegedly been stolen by cyber criminals. While expressing concern over India's escalating vulnerability to cyber crime, Prime Minister Dr. Manmohan Singh  said the government is working on a robust cyber security structureThe structure will help in mitigating threats, by building capacity to face them and enhancing research. Dr. Singh said the police leaders should also dedicate themselves to planned technological up-gradation of their forces. In his speech at the annual conference of DGPs/ IGPs;  Dr. Manmohan Singh said - ""There are many emerging areas where our police forces need to develop new expertise. I have already mentioned the use of new media by miscreants to spread rumours and falsehood. Another such area is our cyber-security. Our country's vulnerability to cyber crime is escalating as our economy and critical infrastructure become increasingly reliant on interdependent computer networks and the Internet"
"Large-scale computer attacks on our critical infrastructure and economy can have potentially devastating results. To this end, we need to build partnerships between Government, academia and the private sector," he added. Dr. Singh said the use of bulk SMSes and social media to aggravate the communal situation was a new challenge. "We need to fully understand how these new media are used by miscreants. We also need to devise strategies to counter the propaganda that is carried out by these new means. Any measure to control the use of such media must be carefully weighed against the need for the freedom to express and communicate," said Dr. Singh.
"I am sure that in the coming months our police forces would be able to work out effective strategies to deal with these tendencies," he added.

-Source (ANI)






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Cyber-War 2.0!! Bangladeshi Hackers Again Targeting Indian Cyber Fence

Cyber-War 2.0!! Bangladeshi Hackers Again Targeting Indian Cyber Fence 

Last month almost every media was busy while covering the story of Cyber-War between Bangladesh & India. The readers of VOGH get the full coverage of that issue. Earlier attack caused maximum damage (NIC, BSF, Stock Market, Media, Govt Sites, Political Party's Website & many other important & high profile sites) for India because all the attacks are coming from Bangladeshi side. Later hackers from BD stopped the attack and unofficially postponed the cyber-war. In our Magazine we have exposed the untold story of the entire issue. Being a media we did our job to raise awareness and as expected we get maximum support from all the peace lovers from the both countries. 
But now again Bangladesh Cyber Army restarted the so called cyber war, or you can call it Cyber-War 2.0. In your magazine we did maximum criticism of that very issue but it seems BCA either did not have much time to go through that PDF or just continuing the same bull shit stuff for Negative Publicity (The main object of this entire issue). So yet again they have blown more than 55 Indian sites to resend their message to Indian Govt & Indian Hackers Communities. 

VOGH Review:- 
But like earlier we are again standing against this issue, because we know what these hackers are looking for and what are the main object of engaging cyber attack & that is fake publicity stunt or you can say negative publicity. While fulfilling their bloody object they are just harassing and disturbing the cyber space which indeed causing serious problem for common people 


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Cyber War Between Bangladesh & India (Exclusive Report)

Cyber War Between Bangladesh & India (Exclusive Report)
We all may be aware of ongoing cyber war between India and Bangladesh. Where thousands of sites get penetrated. Various cyber media from both countries covers the story. In this cyber war Pakistani hackers also contributed in behalf of Bangladesh. In their report both Hackers Media & TSR said the hackers group from India named Indishell officially declared the cyber war and hacked 6 high profile Bangladesh sites & Govt sites. Later in addition they have attacked more than 100 BD govt sites. In counter attack both Bangladesh Cyber Army (BCA) and 3xp1r3 Cyber Army has more than 850 Indian sites. The hackers also hit National Informatics Centre (NIC), NDTV and many other Indian Govt and other important sites. Hackers from Bangladesh (BCA) also performed massive DDoS attack on many Indian Govt sites. In a pastebin release hacker posted those target site list. Later it was the turn of Pakistan. Dangerous hacker from Paksitan named Shadow008 with another hacker named H4x0rL1f3 hacked more than 2K Indian sites. The hackers claimed that the main object was to hit Indian cyber fence & to defend Bangladeshi hackers in this ongoing cyber war. The list of those hacked sites can be found on a pastebin release. Earlier we have seen such cyber war between India & Pakistan, Israel & Saudi Arabia, KHS & German Hackers and so on. But this is the 1st time when India & Bangladesh fought against each other.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

After Maharashtra Now Srinagar is Setting up A new Cyber-Cell

After Maharashtra Now Srinagar is Setting up A new Cyber-Cell 

To fight against rising cyber-crime Srinagar is setting up another cyber Police Station. This will be the second Cyber police station in Jammu & Kashmir.  Earlier the state’s home department had proposed to establish three cyber police station, with two in Srinagar and one in Jammu. In Srinagar, cyber police stations were supposed to be established at Crime Branch Headquarters and SOG headquarters Cargo. The cyber crime police station located at SOG headquarters Jammu was inaugurated by chief minister Omar Abdullah on February 16 this year. 
On the same day, the police and civil administration in Srinagar had made adequate arrangements for online inauguration of cyber crime police station by chief minister at Srinagar based SOG headquarters.  “The Cyber crime police station here was not inaugurated,citing the reason that one state could not have more than one such police station,” said a senior police officer.  
 “A full fledged cyber police station will start functioning in Srinagar by next month as preparations for establishing it are almost complete,” Director General of Police (DGP) J&K, Kuldeep Khoda told media. Pertinently, Jammu and Kashmir has become sixth state and seventh place in India to have separate cyber crime police station. Prior to Jammu and Kashmir, Mumbai, Chennai, Bangalore, Hyderabad, Ahmedabad and CBI Headquarters in New Delhi had set up separate police stations to deal with the cyber crime. Earlier in this month we cover that Maharashtra Govt is planning to setup 5 More Cyber-Cells In Maharashtra including Nashik, Nagpur, Aurangabad, Pune & Kolhapur. So we must have to say slowly but steadily Indian Govt is plaining to enhance cyber-security :-




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Shutdown Greek Ministry of Justice

Greece Under Cyber Attack, Anonymous Bring Down The Website Of Greek Ministry of Justice 

After releasing the sensitive conference call now hacker collective group Anonymous has targeted the cyber fence of Greece. They have launched a cyber-attack on the Greek Ministry of Justice website, and warned of plans to target a further 300 ministry and media sites. The hack was apparently a protest against the Greek government's signing of the Anti-Counterfeiting Trade Agreement (ACTA), which is designed to reduce internet piracy. 
"You have introduced a new dictatorship upon your people's shoulders and allowed the bankers and the monarchs of the EU to enslave them both economically and politically," the group's message said. "You have joined the IMF (International Monetary Fund) against your people's acquiescence…democracy was given birth in your country but now you have killed it," the hackers added.
In a message left on the Greek Justice Ministry's website, the group threatened to take down 'all the media in Greece' unless the Greek government retracts its support for the global treaty, which Britain has also signed. The website was briefly listed as 'under construction' following the attack, but was amended to display the following message from the online collective:
'We know EVERYTHING, We have your PASSWORDS , We are watching YOU.
NEXT TARGET WILL BE ALL THE MEDIA IN GREECE. ( ertTV , etc )
WE HAVE MOST OF THE MEDIA WEBSITES ADMIN PASSWORDS.
We are Legion . This is JUST the BEGINING.
www.ministryofjustice.gr is just an example of what we are capable of!
You have 2 weeks to stop ACTA in Greece otherwhise we will do CYBERWARFARE by defacing 300 sites and all the media and ministries.'


Greek police said via Twitter that their cyber-crime division had already begun an investigation into the Ministry of Justice attack. Few days ago for ACTA protest another hacktivist group Teamgreyhat has hacked more than 7K websites. Also in Operation Megaupload  Anonymous has performed massive cyber attack on federal authorities, Brazil Govt, US Govt, Ireland Govt, CBS and many more.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

DHS & Public Safety Canada Started Joint Cybersecurity Action Plan

DHS Public Safety Canada Started Joint Cybersecurity Action Plan

A joint venture Cyber Security plan has been announced by US Department of Homeland Security and Canada. According to the official website of Public Safety Canada - PS Canada along with the Department of Homeland Security (DHS) are pursuing a coordinated approach to enhance the resiliency of our cyber infrastructure. The Cybersecurity Action Plan (the Action Plan) between PS and DHS seeks to enhance the cybersecurity of our nations through increased integration of PS' and DHS' respective national cybersecurity activities and improved collaboration with the private sector. This Action Plan represents just one of many important efforts between Canada and the United States to deepen our already strong bilateral cybersecurity cooperation.
As the Internet knows no borders, all countries have a responsibility to prevent, respond to, and recover from cyber disruptions and to make cyberspace safer for all citizens across the globe. Due to a shared physical border, Canada and the United States have an additional mutual interest in partnering to protect our shared infrastructure. This Action Plan aims to articulate a shared approach to fulfill PS' and DHS' vision of working together to defend and protect our use of cyberspace and to strengthen the resiliency of our nations. These efforts, combined, advance the objectives articulated by President Obama and Prime Minister Harper in the February 2011 declaration, Beyond the Border: A Vision for Perimeter Security and Economic Competitiveness.
This Action Plan outlines three goals for improved engagement, collaboration, and information sharing at the operational and strategic levels, with the private sector, and in public awareness activities, for activities conducted by PS and DHS. The Action Plan establishes lines of communication and areas for collaborative work critical to enhancing the cybersecurity preparedness of both nations. The Action Plan's goals and objectives are to be conducted in accordance with the June 2012 Statement of Privacy Principles by the United States and Canada. This Action Plan is intended to remain a living document to be reviewed on a regular basis and updated as needed to support new requirements that align to the Plan's key goals and objectives. It intends to support and inform current and future efforts to advance the goals of Beyond the Border, which ultimately seeks to enhance broad bilateral cooperation on cybersecurity efforts across both governments.

Goals and Objectives:-

1. Enhanced Cyber Incident Management Collaboration between National Cybersecurity Operations Centers

PS' Canadian Cyber Incident Response Centre intends to work jointly with DHS' United States Computer Emergency Readiness Team and Industrial Control Systems Cyber Emergency Response Team towards the following objectives:
  • 1.1 Increase real-time collaboration between analysts by improving existing channels for remote communication and arranging in-person visits;
  • 1.2 Enhance information sharing at all classification levels and collaborate on training opportunities, while promoting inter-agency coordination, as appropriate, as well as the proper protections for information, as outlined in the Statement of Privacy Principles;
  • 1.3 Coordinate on cybersecurity incident response management, relating to defense, mitigation, and remediation activities and products, including with other public and private entities consistent with each country's laws and policies;
  • 1.4 Align and standardize cyber incident management processes and escalation procedures; and
  • 1.5 Enhance technical and operational information sharing in the area of industrial control systems security.

2. Joint Engagement and Information Sharing with the Private Sector on Cybersecurity

Due to the shared nature of critical infrastructure between Canada and the United States, PS and DHS intend to collaborate on cybersecurity-focused private-sector engagement for cybersecurity activities for which they are responsible through the following objectives:
  • 2.1 Share engagement approaches for private sector;
  • 2.2 Exchange and collaborate on the development of briefing materials for the private sector;
  • 2.3 Jointly conduct private sector briefings;
  • 2.4 Review approaches and align processes for private sector engagement through requests for technical assistance and non-disclosure agreements; and
  • 2.5 Standardize protocols for sharing information.

3. Continued Cooperation on Ongoing Cybersecurity Public Awareness Efforts

Cybersecurity is a shared responsibility and everyone, including our citizens, has a role to play. With increased media attention devoted to cybersecurity incidents and with the continuing growth of electronic commerce and social media, it is imperative that citizens receive clear and trustworthy information on how to manage cyber threats to themselves and their families. Ensuring that government's cybersecurity awareness messages are consistent across our border helps to deliver that information effectively and consistently. PS Communications, the DHS Office of Public Affairs, and the National Protection and Program Directorate's Office of Cybersecurity and Communications (CS&C) intend to continue to work together as they:
  • 3.1 Collaborate on public awareness campaigns (websites, social media activities, education material, etc.);
  • 3.2 Collaborate on Cybersecurity Awareness Month (October); and
  • 3.3 Share and coordinate messaging on issues of common interest.

Governance of the Joint Action Plan:-

Senior officials within PS and CS&C intend to review and provide additional guidance in order to update this Action Plan on a quarterly basis. This Action Plan is intended to be a part of broader inter-governmental coordination across government agencies in both the United States and Canada.


To Download The Full Cybersecurity Action Plan Between Public Safety Canada and the Department of Homeland Security Click Here



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Australia Joined 38 Other Nations as Part of an International Cybercrime Treaty

Australia Joined 38 Other Nations as Part of an International Cybercrime Treaty

Sitting at the edge of the latest technology, today we can easily separate our world into two parts. One is the real world where we live and another is the virtual or cyber world, in which we all are tightly attached. As these two fields are the prime factor where we have to stay happily so the matter of safety, security is highly required on the both said areas. Being one of the leading cyber media, our main concern is the cyber domain,  so we are worried as well are responsible and committed to server our readers. In this period of time many of us feel terrified to engage themselves in the cyber space due to lack of security and privacy, and also keeping in mind the major disaster done by cyber criminals. But how long? To get rid of that not only we the media people but also the sincere government of several countries make themselves committed to prepare a safe cyber world for the people. Earlier we have seen several developed countries came under a shade, in order to make an united shield to protect this cyber domain and its people. Today that shield got a new member. Yes it is Australia who has now formally joined 38 other nations as a party to the world's first international treaty on crimes committed via the internet. This deceleration came from the Attorney-General Mark Dreyfus. In his speech he said "Australia becoming a party to the Council of Europe Convention on Cybercrime will help combat criminal offences relating to forgery, fraud, child pornography, and infringement of copyright and intellectual property" 
By joining the Convention, Australian law enforcement agencies will be able to rapidly obtain data about communications relevant to cybercrimes from partner agencies around the world. With the Convention now in effect, Australia's investigative agencies are able to use new powers contained in the Cybercrime Legislation Amendment Act 2012 to work with cybercrime investigators around the globe. The Act amended certain Commonwealth cybercrime offences and enabled domestic agencies to access and share information relating to international investigations. Dreyfus says the Act also created new privacy protections, safeguards and reporting requirements for the exercise of new and existing powers.
"A warrant is always required to access the content of a communication whether the information is in Australia, or accessed from overseas under the Cybercrime Convention. The Cybercrime Act and the Cybercrime Convention do not impact in any way on the need to have a warrant to access content from a telephone call, SMS or e-mail." -Dreyfus said in his statement.


-Source (ZDNet)




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Israel Hit By Demolishing Cyber Attack From Anonymous Caused $3 Billion Damage (#OpIsrael)

VOGH Exclusive: Israel Hit By Demolishing Cyber Attack From Anonymous Caused $3 Billion Damage (#OpIsrael) 

The past 7th April will be unforgettable for Israeli cyber space, yes it was no doubt the black day for Israel, when the World's largest hacker group "Anonymous" with help of several other hackers communities caused ruin while bringing down almost all the Israeli Government websites, along with more that 100,000 other important Israeli websites, 40,000 Facebook pages, 5,000 Twitter accounts and 30,000 bank accounts belonging to Israeli people. The hacker group not only demolished the cyber space of Israel, but also caused a loss of 3 billion USD. This never forgettable hacking rampage dubbed Operation Israel became the most devastating and venturesome hacking rampage ever happened to the Israeli cyber space. In the last week of March, it was dangerous hacker collective group Anonymous who called the operation widely known as #OpIsrael, where the hacker group vows to erase Israel from the Internet. And indeed the hacker group did that, According to several Israeli source, leading media outlets it has been confirmed that almost all the important sites owned by the Government of Israel have been  either hacked and paralyzed. These sites include the site of the Israeli Police, Israeli Prime Minister, Bureau of StatisticsIsraeli intelligence agency Mossad, Stock Market and the Israel Ministry of Defense and many more. Regardless of the amount of damage done, the scale of the attack is bound to be embarrassing for the Israeli government. This is the second time that Anonymous has successfully taken down Israeli government websites. The first #OpIsrael attack happened last November and affected Israeli cyber fence heavily. Like the last November, this time also the reaction of Israel Government was indifferent and unconcerned. Despite of what Anonymous's claims of massive damage to Israel, the country's cyber security officials say that the attack caused minimal damage. "So far it is as was expected, there is hardly any real damage," Yitzhak Ben Yisrael from the government's National Cyber Bureau told the press. "Anonymous doesn't have the skills to damage the country's vital infrastructure. And if that was its intention, then it wouldn't have announced the attack ahead of time. It wants to create noise in the media about issues that are close to its heart." This is more or less what Anonymous always does, often with varying levels of success.







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Bangladesh Cyber Army (BCA) Hit Indian Stock Market

Bangladesh Cyber Army (BCA) Hit Indian Stock Market (Cyber-War Continues)

The Cyber-War between India and Bangladesh is going on and on. But now its became rather one sided and most of the attack is coming from the Bangladeshi side. Recently they have released their second video where they vow to hit Indian Stock Market websites. During peak hour three main sites of Indian stock market was apparently down due to massive denial of service attack from BD hackers. As expected this DDoS attack surely effect the financial & banking sector of India. 

Targeted Sites:-

Press Release of BCA:-

The video mentioned the reason to be the killing another of innocent Bangladeshi citizens in the Bangladesh-India border zone yesterday. In the last 3-4 days, a huge number of Indian sites fell victim to hacking attacks of Bangladesh Cyber Army. Two other groups, Bangladesh Black Hat Hackers and 3xp1r3 Cyber Army were also involved in the attacks. Besides, they also have supports from Pakistani hackers which we have already covered. National Informatics Center (NIC), Indian Railways, Passport Dept, MIT, NDTV all became victim of this cyber attack.

VOGH Review:-
Being a media its our duty to rise awareness, so after seeing this so called cyber-war we can only see that it is just damaging thousands of websites. In short hackers from both countries are just bringing ruin to their own cyber space. While attacking websites of different countries, either knowingly or UN-knowingly they are just putting their cyber space in risk. Also such cyber-war always make negative reputation for those countries who have engaged the war. In short if they do not end war - the war will end them. 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Chinese Hackers Breached New York Times & Stolen Employee's Password

Chinese Hackers Breached New York Times & Stolen Employee's Password 

Yet again the story of cyber espionage by Chinese hackers spotted in the wild, when the famous and one of the most popular American news daily reported that their system has been compromised by a round of sophisticated cyber attack generated from China. After the hack of White House unclassified network, it is the second time in last six month; when Chinese hackers have targeted the American cyber spaceThe New York Times has reported that for the last four months Chinese hackers have been infiltrating its networks, broken into the email accounts of senior staff, stolen the corporate passwords for every Times employee and used those to gain access to the personal computers of  more than 50 employees
According to a blog post of NYT - The timing of the attacks coincided with the reporting for a Times investigation, published online on Oct. 25, that found that the relatives of Wen Jiabao, China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings. Security experts hired by The Times to detect and block the computer attacks gathered digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times’s network. They broke into the e-mail accounts of its Shanghai bureau chief, David Barboza, who wrote the reports on Mr. Wen’s relatives, and Jim Yardley, The Times’s South Asia bureau chief in India, who previously worked as bureau chief in Beijing. 
“Computer security experts found no evidence that sensitive e-mails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied,” said Jill Abramson, executive editor of The Times. The hackers tried to cloak the source of the attacks on The Times by first penetrating computers at United States universities and routing the attacks through them, said computer security experts at Mandiant, the company hired by The Times. This matches the subterfuge used in many other attacks that Mandiant has tracked to China.

Cyber Espionage of China (2011-2012) at a Glance:-
While talking about this cyber attack, we would like to refresh your memory last two years, where the scenario of big cyber attack and espionage by Chinese hackers have been spotted several times. In 2012 Chinese hackers had  breached Telvent's corporate network & gained control of US Power GridAlso in the middle of last year, we have seen that Chinese hackers have broken into Indian Navy's Computer System & stolen sensitive data. Few months before this hack, Tokyo based computer security firm Trend Micro confirmed that Chinese hackers were responsible for biggest cyber-espionage in India, Japan & Tibet. Also the director of National Security Agency (NSA) General Keith Alexander confirmed that hackers from China was responsible for the serious attack on one of the leading IT security & cyber security company RSAAlso in 2011 China was responsible behind the attack on US Chamber of Commerce, Satellite System of U.S, Nortel Network & so on.  But few days ago National Computer Network Emergency Response Coordination Center of China (CNCERT/CC), China's primary computer security monitoring network claimed that China fallen victim of one of biggest cyber attacks originated from US, Japan & South Korea. We must have to say that this statement is truly irrelevant. Cyber crime investigator have found that China was directly responsible for the hack into Japan's Biggest Defense Contractor Mitsubishi, Japan Aerospace Exploration Agency (JAXA) & Parliament of Japan. In case of South Korea  more than 13 Million of MapleStory players data has been stolen, there also hackers from China was responsible. 
All those above stories it has been clearly identified that China was the point of those said attacks, but it doesn't necessarily prove that it the operation is backed by the Chinese government or intelligence services. It could just as easily be a patriotic group of skilled, independent Chinese hackers upset with how the Western media is portraying their country's rulers. For all kind of cyber related topics and expert reviews on those matters just stay tuned  with only VOGH




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

PandaLabs Exclusive Report: Privacy Violations Will Be The Biggest Security Threat in 2012


Panda Security anti-malware laboratory, today announced its predictions for top security trends to watch for in the coming year. Cyber-espionage, along with privacy violations and social networking attacks facilitated by the increased use of mobile and tablet devices, will be the source of increased security threats over the coming months.
Cyber-espionage targeting companies and government agencies around the world will dominate corporate and national information security landscapes, with the integrity of classified and other protected information on the line. Trojans are expected to be the weapon of choice for hackers focused on these highly-sensitive targets.
According to Luis Corrons, technical director of PandaLabs, “We live in a world where all information is in digital form and is easily accessible if you know how. Today’s spies no longer need to infiltrate a building to steal information. As long as they have the necessary computer skills, they can wreak havoc and access even the best-kept secrets of organizations without ever leaving their homes.”
Consumers will continue to be targeted by cyber-criminals as they find ever more sophisticated ways to target social media sites for stealing personal data. Social engineering techniques exploiting users’ naïveté have become the weapon of choice for hackers targeting personally-identifiable information. “Social networking sites provide a space where users feel safe as they interact with friends and family. The problem is that attackers are creating malware that takes advantage of that false sense of security to spread their creations,” says Corrons. “It is very easy for cyber-criminals to trick users with generic messages like ‘Look, you’re on this video,’ for example. Sometimes, curiosity can be our own worst enemy.”

Summary of what PandaLabs predicts as the major security trends of 2012:-

  • Mobile Malware:- A year ago, PandaLabs predicted a surge in cyber attacks on mobile phones, and the fact that Android has become the number one mobile target for cyber-crooks in 2011 confirms that prediction. That trend will continue in 2012, with a new focus on mobile payment methods using Near-Field Communications (NFC) as these applications become increasingly popular.
  • Malware for Tablets:- Since tablets share the same operating system as smartphones, they are likely be targeted by the same malware. In addition, tablets might draw a special interest from cyber-crooks since people are using them for an increasing number of activities and are more likely to store sensitive data.
  • Mac Malware:- As the market share of Mac users continues to grow, the number of threats will grow as well. Fortunately, Mac users are now more aware that they are not immune to malware attacks and are increasingly using antivirus programs to protect themselves. The number of malware specimens for Mac will continue to grow in 2012, although still at a slower rate than for PCs.
  • PC Malware:- PC malware has grown exponentially over the past few years, and everything indicates that the trend will continue in 2012. Trojans, designed to sit silently on users’ computers, stealing information and transmitting it back to their handlers will continue to be cyber-crooks’ weapon of choice; 75 percent of new malware strains in 2011 were Trojans.
  • SMBs Under Attack:- Financial institutions are fairly well protected these days against malware. But smaller businesses are easier and cheaper targets to attack, and their customer databases can be a real treasure trove for hackers, particularly if credit card and other financial data is stored “in the clear”. Unfortunately, many small to medium-sized companies do not have dedicated security teams, which makes them much more vulnerable.
  • Windows 8:- While not scheduled until November 2012, the anticipated next version of Microsoft’s operating system will offer cyber-crooks new opportunities to create malicious software. Windows 8 will allow users to develop malware applications for virtually any device (PCs, tablets and smartphones) running this platform, although this will likely not take place until 2013.

Corrons concludes, “The malware game continues. As new technologies advance, cyber-crooks develop new modes of attack, often by simply adapting old techniques to the new platforms – which is an area software vendors need to pay attention to. In the end, though, it’s users’ false sense of security that is the hacker’s best friend.”


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Uganda Under Cyber Attack, 5 Govt. Site Hacked By Rwandan Hackers

Uganda Under Cyber Attack, 5 Govt. Site Hacked By Rwandan Hackers
Uganda under massive cyber attack. A hacker group named Rwandan Hackers took responsibility of this attack. Hackers targeted the official website of Ministry of Internal Affairs, Justice Law and Order Sector, Office of the Prime Minister of the Republic of Uganda, The Petroleum Exploration and Production Department of the Ministry of Energy and Mineral Development & National Medical Stores - Uganda. 
In this attack the hacker has hacked the database of all those sites and in a pastebin release he has posted all the credentials including server details, tables, user credentials, admin password hash and so on. According to the hacker the main aim of this cyber attack is "Freedom of the Press in Uganda"

Message Of the Hackers:-
"A new bill tabled before parliament threatens the freedom of the press in Uganda. The country's journalists need the world to speak out against it
that's why we hack uganda gov website.
One of the reasons why Museveni was originally labelled one of a new breed of African leaders was because of media freedoms. Magazines and newspapers thrived under the new "visionary" leader and broadcast media were liberalised, leading to the creation, over the years, of more than 150 private radio and television stations.
There have always been cracks in this relationship between state and the fourth estate, but they have become ever more glaring over the last 10 years, characterised by harassment of journalists critical of the government and the closure of media houses. In Uganda today, radio stations, especially those upcountry, in more rural areas where most Ugandans live, are considered very brave to host senior opposition figures, like Kizza Besigye of the Forum for Democratic Change. Some stations have denied him paid-for airtime, citing "orders from above" or for fear of being blacklisted by the Intelligence and the Broadcasting Council.
But the latest assault on the media, which has sent chills down the spines of independent newspaper editors, is the press and journalists (amendment) bill 2010. Reports indicate it has been tabled in Cabinet, although a minister recently said it is yet to be discussed...."



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Threatens Israel to Erase From The Internet (#OpIsrael)

Anonymous Threatens Israel to Erase From The Internet (#OpIsrael)
Infamous hacker collective group Anonymous along with some organized hacker communities together started a massive rampage against Israeli cyber space. The hacker group threatened Israel government while  planning to engage a massive cyber-attack on Israel, saying that, they will "erase" the country from the Internet. From some legitimate sources it has been confirmed that the hackers are planning to execute the attack on 7th of April. One of the twitter account of Anonymous also confirmed the date and timing, while saying "Hacktivists Starting Cyber Attack against Israel on 7th of April." Also twitter feed of Anonymous invited numerous hackers communities around the world to join up for the cyber rampage dubbed Operation  Israel Phase 2 (#OpIsrael). On the other hand Israel government took the threat seriously and taking almost every steps to avoid any kind of disaster. Ofir Ben Avi, director of online group Accessible Government of Israel told the media -“It’s something being organized online over the past few days. What distinguishes this plan when compared to previous attacks is that it really seems to be organized by Anonymous-affiliated groups from around the world in what looks like a joining of forces”
As you all might know that past experience of Israel while dealing hackers was not at all sweet. In case of Anonymous then we would like to remind you that, this would be the second attack on Israel by the group, as they launched the first “OpIsrael” in November 2012 in response to Israel’s attack on the Gaza Strip.  If you dig the recent past you will come to know that not only Anonymous, but also hackers from different part of the world targeted Israeli cyber space and caused big damages. For instance we can recap the hack of Kosova Hackers Security (KHS) where they hacked and exposed personal data of 35,000 Israeli people. Here we must have to name the hackers from Pakistan who are constantly against Israel causing massive cyber attack against leading IT industry of Israel and other high profile Israeli sites. Just a couple of months ago, the world seen what it call the black day in the history if Israeli cyber space where another Pak hackers community hacked the main domain controller of Israel, which causes a massive hack against almost all the big Israeli sites such as government, MSN, Bing, Live, Skype, Microsoft Store, BBC, CNN, Coca-Colla, XBOX, Windows, Intel & many more. Here we can also take the name of Indian hacker Godzilla & Arabian hacker community (Group-XP) who also harassed and harmed the Israeli cyber space very very badly. After observing all the scenario mentioned above, it is expected to watch some sensational fight between hackers and Israeli government. So lets wait for the time, and stay tuned with VOGH to get all the latest update on this story and also other cyber issues.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Twitter Hacked, More Than 250,000 User Data Compromised

Twitter Hacked, More Than 250,000 User Data Compromised

The social networking giant and the world famous micro blogging site Twitter again fallen victim of cyber attack. Last year we have seen that the tight security system if twitter have been compromised many times. Yet again in this year the San Francisco based social media giant who have more than 500 million registered users failed to protect them selves from hackers. On last Friday Twitter acknowledged that it had become the latest victim in a number of cyber-attacks against media companies, saying hackers may have gained access to information on 250,000 of its more than 200 million active users. The micro blogging giant said in a blog posting that earlier this week it detected attempts to gain access to its user data. It shut down one attack moments after it was detected. According to reports usernames, email addresses, session tokens and encrypted/salted passwords for 250,000 users might have been accessed in what it described as a “sophisticated attack” 

"This attack was not the work of amateurs, and we do not believe it was an isolated incident,” said Bob Lord, Twitter’s director of information security. “The attackers were extremely sophisticated, and we believe other companies and organisations have also been recently similarly attacked” Bob added. 

Jim Prosser, a Twitter spokesman, would not say how hackers infiltrated Twitter’s systems, but Twitter’s blog post said hackers had broken in through a well-publicized vulnerability in Oracle’s Java software. Last month, after a security researcher exposed a serious vulnerability in the software, though Oracle patched the security hole, but Homeland Security said the fix was not sufficient. The DHS issued a rare alert that warned users to disable Java on their computers. Prosser said Twitter was working with government and federal law enforcement to track down the source of the attacks. For now, he said the company had reset passwords for, and notified, every compromised user. The company encouraged users to practice good password hygiene, which typically means coming up with different passwords for different sites, and using long passwords that cannot be found in the dictionary.
Twitter said it “hashed” passwords — which involves mashing up users’ passwords with a mathematical algorithm — and “salted” those, meaning it appended random digits to the end of each hashed password to make it more difficult, but not impossible, for hackers to crack. Once cracked, passwords can be valuable on auction-like black market sites where a single password can fetch $20.

While talking about Twitter and cyber issues, I would like to remind you that in last year twitter faced several cyber attacks where more than 55,000 twitter account details was leaked, after this issue in the middle of last year the social networking giant faced massive denial of service which interrupted its services. Later a huge number of Twitter users across the globe received  emails warning that their account have been compromised and their passwords had been reset, and it was another security breach which affected twitter. Such big organization are not at all careless about security, so as twitter and it has been proved when they hired renowned white hat hacker Charlie Miller to boost up their security, but after this current massacre, it seems that twitter need to think more and emphasize a lot to make sure that their system is good enough to prevent cyber attacks. For all the hot cyber updates and reviews stay tuned with VOGH.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Iran Accused of Carrying out Cyber Attacks Against US Banks Over Anti Islamic Movie Issue

Iran Accused of Carrying out Cyber Attacks Against US Banks Over Anti Islamic Movie Issue

Since last few days, the conspiracy with the 'Anti Islamic Movie' was the headline in every where. We have seen global violence and a mass protest mainly came from Muslim brotherhood. This protest was also touched the internet, and as expected Muslim hackers joined the movement, which cost many damages for the cyber fence. Thousands of websites became victim of cyber attack, and among them several US banks also faced huge disturbance. This protest takes a new direction when Govt of Iran announced the blockage of Google Inc's search engine and its email service. "Google and Gmail will be filtered throughout the country until further notice," an official identified only by his last name, Khoramabadi, said, without giving further details. The Iranian Students' News Agency (ISNA) said Google ban was connected to the anti-Islamic film posted on the company's YouTube site which has caused outrage throughout the Muslim world. 
This stand of Iran Govt created a controversy, which make them responsible for carrying out cyber attacks against US banks. According to NBC news report US National Security officials accused the Iranian government for engaging cyber attacks against US Banks mainly Bank of America. But when the ball goes to Iran's side then they completely denies the blame, while saying "We officially announce that we haven't had any attacks," This statement came from the Head of Iran's civil defense agency Gholam Reza Jalali when he was asked about the report. The western media reports alleged on Friday that Muslim hackers have repeatedly attacked Bank of America Corp, JPMorgan Chase & Co and Citigroup Inc over the past year as part of a broad cyber campaign targeting the United States. Security sources told Chicago Tribune and NBC News that the attacks on the three largest US banks originated in Iran, but it is not clear if they were launched by the state, groups working on behalf of the government, or "patriotic" citizens. 

Here we want to refresh your memory while digging up a story, when Iran Govt decided a permanent Internet ban in Iran, where Iran Government has announced its plans to establish a National Intranet within five months. The Iranian minister for Information and Communications Technology, announced the setting up of a national Intranet and the effective blockage of services like Google, Gmail, Google Plus, Yahoo and Hotmail, in line with Iran's plan for a "clean Internet." And that five months is almost over, so may be the blockage of Google came due to that reason, or may be not. We suggest our readers that, it will be better if you ask yourself, that whether Iran was indeed responsible for the cyber attack or not??!!


-Source (Reuters, NBC & FARS News Agency)








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Cupid Media Network Breach Exposes 42 Million Passwords in Plain Text

Cupid Media Network Breach Exposes 42 Million Passwords in Plain Text (Uunencrypted)

Cupid Media one of the leading niche online dating network that have more than 35 large online dating website, faced a massive intrusion that effects more than 42 million of its registered users. From an exclusive report of Kerbs On Security we came to know that the breach was taken earlier in this year. Where the hackers managed to gain access into the crucial servers belongings to Cupid Media network. According to the managing director of Cupid Media, Mr Andrew Bolton - "In January we detected suspicious activity on our network and based upon the information that we had available at the time, we took what we believed to be appropriate actions to notify affected customers and reset passwords for a particular group of user accounts.” After a preliminary investigation it has been found that the purloined database of Australia-based niche dating service Cupid Media was found on the same server where hackers had amassed tens of millions of records stolen from AdobeMore than 42 million peoples' unencrypted names, dates of birth, email addresses and passwords have been found from the pinched database. I am very much wearied to see that a high value site like Cupid is unconcerned about the basic security counter measure. Even their confidential tables remained unencrypted which allows the hacker to gain the personal information in plain text. Like the Cupid Media security team, the registered users also found very much inadvertent and unaware of basic security measures. I am saying this because of the leaked passwords, almost two million picked "123456", and over 1.2 million chose "111111". "iloveyou" and "lovely" both beat out "password", and while 40,000 chose "qwerty", 20,000 chose the bottom row of the keyboard instead - yielding the password "zxcvbnm"
Jason Hart of famous data protection firm Safenet said "The true impact of the breach is likely to be huge. Yet, if this data had been encrypted in the first place then all hackers would have found is scrambled information, rendering the theft pointless."
This security breach of Cupid Media reminds us  the decent history of breach where we have seen a slew of attacks against the following sites: Drupal.org  Scribd, Guild Wars 2, Gamigo, Blizzard, Yahoo, LinkedIn, eHarmony, Formspring, Android Forums, Gamigo,  Nvidia,Blizzard, Philips, Zynga, VMWare, Adobe,  Twitter,  New York Times, Apple and so on. While covering this story on behalf of VOGH, I am warning our readers across the globe to use strong alphanumeric passwords to avoid such disaster. Also the webmasters and security administrator are highly recommended to use salted encryption in their database to prevent fortuitousness cyber attack


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...