Showing posts sorted by date for query Nokia. Sort by relevance Show all posts
Showing posts sorted by date for query Nokia. Sort by relevance Show all posts

Twitter Hires Renowned Apple Hacker Charlie Miller For Twitter Security Team


Twitter Hires Renowned Apple Hacker Charlie Miller For Twitter Security Team

It is almost impossible task for social networks to keep everything safe against hacks and other vulnerabilities. Hackers will constantly find their way around anything that you put in place. So they often deals with hackers & turn themselves to beef up the security level. Social networking giant Twitter exactly did the same thing. The micro-blogging network has hired the famous/infamous Apple hacker, Charlie Miller, to be a part of its security team. Charlie Miller, a popular figure among hackers, broke the news via his Twitter account, saying, “Monday I start on the security team at Twitter. Looking forward to working with a great team there!” Twitter issued a short statement noting that Miller’s title will be that of Software Engineer, but declined to discuss any further details.
Charlie Miller has a background as a Global Exploitation Analyst in the National Security Agency, and has hacked devices running on iOS, OSX, and Android. He is considered to be a white-hat hacker, which means that he hacks to expose vulnerabilities in a system in order to have those weaknesses fixed. Five year ago, Miller was said to be the first to hack the iPhone using the device’s browser, exposing the handset’s vulnerability to security attacks. Several months after this, he was likewise able to hack a MacBook Air in just two minutes. This feat allowed Miller to win the Pwn2Own hacking competition. Miller also showed a way to hijack iPhones through SMS in 2009. In 2011, he used the MacBook power adapter to implant malware on the laptop. In the same year, his license as an Apple developer got revoked because Apple found that he breached the development agreement. 
In more recent times, Miller had been working on Android devices. In June, he was able to overcome Bouncer, Google’s security program. He has furthermore experience in using Near Field Communications to control Samsung and Nokia handsets with a simple wave of another phone that is within the vicinity. 
While talking about Charlie Miller, we must have to take another name and that is Nicholas Allegra, the world-famous hacker known as "Comex", creater of JailbreakMe.com; who later has been hired by Apple itself . In case of Twitter we must have to say, apart from Miller, Twitter also hired Moxie Marlinspike, a hacker who specializes in SSL and VPN encryption.







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

A Tribute to The 10 Most Infamous Student Hackers of All Time

A Tribute to The 10 Most Infamous Student Hackers of All Time

Since last two years, we the VOGH team has been covering all the latest cyber security updates. But today lets do some thing different. One of our frequent reader and fan Katina Solomon has requested us to share a fantastic article. Everyday VOGH draws headlines of hackers around the world and their activities. While trying to maintain speed with time, we usually forgot our past. Today we will take you into the past, where we will discuss about those heroes, who are always been ill treated by the society & the system while revamping those heroes into cyber-criminals or infamous hackers. Its our question to our humanity "Did the system has done justice with them??" 
Hacking has always been inherently a young person’s game. The first usage of the word “hacker” was to describe pranksters meddling with the phones at MIT. Many hackers have cited boredom, a desire for change, or the thrill of going somewhere one is not supposed to go as their motivation for hacking, all of which could apply to scores of common activities on college campuses. While today’s hacking scene is dominated by large hacking groups like Anonymous and Masters of Deception, many of the greatest hacks ever have been pulled off by college, high school, and even middle school kids who rose to infamy armed only with a computer and the willingness to cross the bounds of legality.
  1. Sven Jaschan: In the words of one tech expert, “His name will always be associated with some of the biggest viruses in the history of the Internet.” The viruses: the Sasser and NetSky worms that infected millions of computers and have caused millions of dollars of damage since their release in 2004. The man behind the viruses proved to be not even a man at all, legally. Seventeen-year-old hacker Sven Jaschan, a student at a computer science school in Germany, claimed to have created the viruses to become a hero by developing a program that would eradicate the rampaging Mydoom and Bagle bugs. Instead he found himself the subject of a $250,000 bounty courtesy of Microsoft, for which some of his classmates turned him in.
  2. Jonathan James: In 2000, at the age of 16, James, or “C0mrade” as he was known in the hacker community, infamously became the first juvenile federally sentenced for hacking. The targets of his notorious hack jobs were a wing of the U.S. Department of Defense called the Defense Threat Reduction Agency, NASA, and the Marshall Space Flight Center in Huntsville, Ala. (By hacking the latter James gained the ability to control the A/C in the International Space Station.) All of these were pulled off “for fun” while James was still a student at Palmetto Senior High in Miami. Unfortunately, the fun ran out when James was tied into a massive identity theft investigation. Though insisting he was innocent, James took his own life, saying he had “no faith in the justice system.”
  3. Michael Calce: Yahoo. CNN. Ebay. Amazon. Dell.com. One by one in a matter of days, these huge websites crashed at the hands of 15-year-old Canadian high school student Michael Calce, aka “MafiaBoy.” Armed with a denial-of-service program he called “Rivolta” that overloaded servers he targeted, the young hacker wreaked $7.5 million in damages, according to court filings. Calce was caught when he fell victim to a common ailment of teenage boys: bragging. The cops were turned on to him when he began boasting in chat rooms about being responsible for the attacks. On Sept. 12, 2001, MafiaBoy was sentenced to a group facility for eight months on 56 counts of cybercrime.
  4. Kevin Mitnick: Before performing hacks that prompted the U.S. Department of Justice to declare him “the most wanted computer criminal in United States history,” Kevin Mitnick had already made a name for himself as a hacker in his school days, first at Monroe High School in LA and later at USC. On a dare, Mitnick connived an opening into the computer system of Digital Equipment Corporation, which some fellow hackers then used to steal proprietary source code from the company before ratting on him. While still on probation for that crime, Mitnick broke into the premises of Pacific Bell and had to go on the run from police in the aftermath, during which time he hacked dozens of systems, including those of IBM, Nokia, Motorola, and Fujitsu.
  5. Tim Berners-Lee: “Scandalous” is a synonym for “infamous,” and for this legendary computer scientist, knight of the British Empire, and inventor of the World Wide Web to have been a hacker in his school days is certainly a juicy factoid. During his time at Oxford in the mid-’70s, Sir Tim was banned from using university computers after he and a friend were caught hacking their way into restricted digital areas. Luckily by that time he already knew how to make his own computer out of a soldering iron, an old TV, and some spare parts. And also luckily for him, he will always be revered as the father of the Internet.
  6. Neal Patrick and the 414s: In the early ’80s, hacking was still a relatively foreign concept to most Americans. Few recognized the enormous power hackers could hijack with a few strokes on a keyboard, which explains why a young group of hackers known as the 414s (after a Milwaukee area code) were virtual celebrities after they hacked into the famous Los Alamos National Laboratory, the Memorial Sloan-Kettering Cancer Center, and elsewhere. While today hacking a lab where classified nuclear research is conducted could earn you a one-way ticket to Guantanamo, the 17-year-old ringleader and high school student Neal Patrick was on the cover of Newsweek. The group members got light sentences but prompted Congress to take a stronger role in cybercrime.
  7. Robert T. Morris: The first ever Internet worm, the Morris Worm derived its name from Cornell grad student Robert Tappan Morris. In 1988, Morris released the worm through MIT’s system to cover his tracks, which would seem to contradict his claims that he meant no harm with it. But that’s exactly what resulted: the worm spread out of control, infecting more than 6,000 computers connected to the ARPANET, the academic forerunner to the World Wide Web. The damages reached as high as an estimated $10 million, and Morris earned the ignominious distinction of being the first person prosecuted under the Computer Fraud and Abuse Act. Morris got community service but was apparently not considered too infamous to be offered his current job as a professor at MIT.
  8. George Hotz: To some, George Hotz (aka “geohot,” aka “million75,” aka “mil”) is a public menace, a threat to electronic businesses everywhere. To many, Hotz is a hero. The high-schooler shot to fame/infamy in 2007 at the tender age of 17 by giving the world its first hacked, or “jailbroken” iPhone. He traded it for a new sports car and three new iPhones, and the video of the hacking received millions of hits. Apple has had to grudgingly come to terms with jailbreaking, seeing as the courts have declared it legal, but Sony Corp. is definitely not OK with such tampering. When Hotz hacked his PlayStation 3 and published the how-to on the web, the company launched a vicious lawsuit against him. In turn, the hacker group Anonymous launched an attack on Sony, stealing millions of users’ personal info.
  9. Donncha O’Cearbhaill: According to the FBI, this 19-year-old freshman at Trinity College Dublin is one of the top five most wanted hackers in the world. Well, he was; now that he’s been arrested he’s not really “wanted” anymore. The Feds contend the young man is a VIP member of the Anonymous and LulzSec hacking groups that have already been mentioned and whose targets have included the FBI, the U.S. Senate, and Sony (in the Hotz backlash). It seems “Palladium” (O’Cearbhaill) took the liberty of listening in on a conference call between the FBI and several international police forces who were discussing their investigations of the hacking groups. He could be sentenced to up to 15 years in prison if convicted for that hack alone.
  10. Nicholas Allegra: Just as George Hotz moved on from the Apple hacking game, Brown University student Nicholas Allegra is also hanging up his jersey. “Comex,” as he is known to millions of rooted iPhone fans, created the simple-to-use Apple iOS jailbreaking program JailbreakMe in 2007 and has since released two newer versions of it. However, Comex seems to have gone over to the dark side, accepting an internship with the very company whose products he became famous exploiting. Still, Allegra’s hacking skills are so advanced (one author puts him five years ahead of the authors of the infamous Stuxnet worm that corrupted Iran’s nuclear facilities) and so many people availed themselves of his talents, he will forever live in hacking infamy.

We want to dedicate the above post to the legendary hacker, who left us -Jonathan James aka “C0mrade”. Also the post is a tribute to all the so called 'infamous hackers'. You are our heroes and inspiration, you will always be there in our soul. Team VOGH salutes you...... 


-Thank you Katina & Online Degrees




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Outlook.com -A New Email Service Introduced By Microsoft

Outlook.com -A New Email Service Introduced By Microsoft  

After successfully revamping it's popular mail service Hotmail through it's look and features with the name of 'Newmail', now the software giant Microsoft has launched a new email service that shares the name of its famed email software, Outlook. Outlook.com is accessible as a preview now, and anyone can sign up for an account. If you already have a Hotmail or Live email address, you can convert that to an Outlook.com address in the settings now. The old Hotmail/Live address remains active--users will still get mail sent to the old addresses--unless you explicitly choose to delete it. The interface is based on Metro, the user interface you see in Windows Phone and the upcoming Windows 8. This means you get a clean, uncluttered design and simple icons familiar to anyone who has used a Nokia Lumia smartphone. Microsoft is not requiring everyone that has a Hotmail account to switch to the new address, but it seems the plan is to eventually have everyone move over.
Research firm comScore says Hotmail has 41 million monthly unique visitors; AOL, 24 million. That makes them the No. 3 and No. 4 e-mail providers in the U.S., behind Yahoo Mail, with 84 million unique visitors, and Gmail, 68 million. Worldwide, more than 324 million people still use Hotmail monthly, making it the top provider globally. But Hotmail's user base is on the decline.
Like many email clients, you get a list of folders on the left navigation bar. What's interesting is the Quick Views dropdown below the folders, which lets you filter certain kinds of email. By default, it filters emails with documents or photos, flagged messages and those that give you shipping updates. That last one will be useful for those who frequently shop online and are always expecting packages. These categories can be customized to suit your needs.
With Outlook.com, you can also turn on a reading pane that lets you read the message either below or on the right of the email list. As a security measure, it shows a blank message by default, and not the first one in your inbox--you have to explicitly click on a message to show it, reducing the risk of being exposed to malicious emails by accident.
On the far right is an advertisement column. This shows a random selection, unlike Gmail, which uses targeted ads based on the content of your email messages. 
To find out more about the features and design of Outlook.com it will be best if you try it out yourself, just visit www.outlook.com and sign up for an account, or simply switch your current Hotmail/Live email to an Outlook.com one.



-Source (Outlook.com, Cnet)







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Microsoft Unveils Windows Phone 8 Codenamed “Apollo”

Microsoft Unveils Windows Phone 8 Codenamed “Apollo”

Few days ago in a report we have said that Microsoft is expected to launch it's own tablet (Microsoft Surface) while aiming to compete with iPad. Redmond based software and hardware giant just unveiled the next big step in its mobile software, Windows Phone 8 codenamed “Apollo” Windows Phone 8 brings the platform in line with other mobile OSes by adding support for muti-core processors, higher screen resolutions and newer wireless technologies like near field communication (NFC). Importantly, Microsoft has re-coded Windows Phone from the ground up for the new version. Previous versions of Windows Phone were based on Microsoft’s old mobile OS, Windows CE, but now the platform will share the same source code as the company’s coming desktop OS, Windows 8. That has big consequences for developers and consumers. For developers, it will be extremely easy to create a Windows Phone app if they already have a Windows 8 app that runs in the Metro environment (and vice versa). For consumers, it means more apps and better hardware to run them. It also has the effect of rendering every current Windows Phone obsolete, since those phones won’t be able to run the new software. They will, however, get an upgrade to Windows Phone 7 to 8. Windows Phone 8 adds support for many new hardware features. The most anticipated is support for multi-core devices, which have become common on both Android and iOS platforms. There’s also support for better screen resolutions, including 720p and 1,280 x 768 (WXGA). That’s not quite retina, but it’s better than the 800 x 480 screen of the Nokia Lumia 900, one of the current leading Windows Phones.

New Features At a Glance :-
  • Support for multi-core processors. Existing support for single core has been a major concern for some high-end users wanting faster processing ability.
  • Two new high-definition screen resolutions for the coming OS. They are 1280 x 768 and 1280 x 720.
  • Removeable micro-SD support for the first time to allow expansion of base storage.
  • A busier start screen with room for more live tiles than in Windows Phone 7.5. Today's Windows Phones have room for up to eight live tiles and WP8 will have room for up to 32 live tiles, which can be sized differently.
  • IT support. Adminstrators will see some gaps in the existing OS filled, including support for encryption and secure boot in WP8, as well as the ability to allow IT to deploy apps without going through Windows Marketplace.
  • Built-in Nokia Navteq map technology, with turn-by-turn driving instructions in many countries.
  • Full Internet Explorer 10 support with more features of HTML 5 added. Belfiore said that Windows Phone 8 with IE10 will download Web pages slightly faster than three other popular smartphones on the market.
  • Native code support, a feature seen as useful to developers eager to move their apps from iOS or Android to Windows Phone. 


-Source (Mshable & CW)




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

VMWare Source Code Was Stolen at The Time of CEIEC Breach

VMWare Source Code Was Stolen at The Time of CEIEC Breach 

In the official blog VMWare, the visualization software company has revealed that a hacker associated with hacktivist calling himself "Hardcore Charlie" has stolen at least one and possibly many more source files for its software - and has begun posting them on line. VMware on Tuesday announced that a single file from its ESX server hypervisor source code has been posted online, and it held out the possibility that more proprietary files could be leaked in the future. The fact that the source code may have been publicly shared does not necessarily mean that there is any increased risk to VMware customers, Said by VMWare official. Earlier we covered that Hardcore Charlie claimed to breach China NationalElectronics Import-Export Corporation (CEIEC), based in Beijing, he got inside CEIEC and posted documents ranging from purported U.S. military transport information to internal reports about business matters on several file-sharing sites, but the authenticity of the documents could not be independently confirmed. Hacker Charlie' claims to have found program files for virtualisation software on CEIEC. In a conversation with Kaspersky Lab, the hacker claimed to have 300MB of VMWare source code. 
The hacker also claimed to have cracked cryptographic hashes on the credentials of hundreds of thousands of sina.com email accounts with the help of another hacker, who goes by the name of @Yamatough and who is thought to have been involved in the distribution of documents suggesting that the Indian government had put in monitoring systems for Nokia, RIM and Apple smartphones. The companies all denied the claim, and the documents were later shown to be faked.
VMWare insisted that the code dated back to 2003-04, though it did not say whether that section of the code had been changed since then. "We will continue to provide updates to the VMware community if and when additional information is available," said Iain Mulholland, director of VMware's security response centre in a statement. VMWare didn't indicate whether its own systems had been breached, and seemed to widen the number of potential targets to include commercial partners.  
Like VMWare, a hacker group named The Lords of Dharmaraja has managed to steal the source code of Norton anti-virus, Symantec. There also hacker leaked the source code and hacktivist Anonymous take the responsibility of the entire phenomena





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Airtel 4G LTE - India's First Fourth Generation Mobile Service

Airtel 4G LTE - India's First Fourth Generation Mobile Service

Bharti Airtel on Tuesday announced the launch of the country’s first ever fourth generation (4G) mobile services in Kolkata. Airtel will shortly roll them out in the other three circles of Karnataka, Punjab and Maharashtra (excluding Mumbai). "We will launch the 4G LTE service in Bangalore this month, followed by Pune and Chandigarh," Bharti Airtel Chairman Sunil Mittal said.
The company said high-speed wireless broadband "has the potential to transform India" and to provide a platform for "building the country's digital economy." 4G is expected to be five times quicker than 3G services. It would offer services such as high-definition mobile TV and video conferencing. Bharti and its rivals paid a total Rs 38,543 crore ($7.5 billion) to buy fourth-generation (4G) wireless broadband spectrum in a 2010 auction, which saw bids at much higher prices than initially expected. Bharti managed to win 4G spectrum in just four of India's 22 telecoms zones in the auction, paying Rs 3,314 crore for spectrum in the Maharashtra, Karnataka, Kolkata and Punjab zones. The company was allocated 20 Mhz of BWA spectrum in 2.3 Ghz frequency band which is considered suitable for transmitting signals for operating 4G services.
The network for rolling out Airtel's 4G LTE services in the city had been built by Chinese telecom equipment maker ZTE. Airtel is the first mobile operator to launch 4G services in the country. Bharti Airtel has already awarded the contract for building and operating its 4G network in Maharashtra to Nokia Siemens Networks. Currently, Airtel’s 4G pricing in Kolkata starts at Rs 999 with a usage of 6GB. Wi-fi devices (indoor CPE) are priced at Rs 7,750 while 4G multi mode dongles are priced at Rs 7,999. To know more about Airtel 4G click Here



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Qt 5.0 Alpha Released -The First Major Release Since Qt Project Started

Qt 5.0 Alpha Released -The First Major Release Since Qt Project Started 

Developers at Nokia's QT lab has officially announced the general availability of QT 5.0 Alpha. Qt is a cross-platform application and UI framework for developers using C++ or QML, a CSS & JavaScript like language. Qt Creator is the supporting Qt IDE. Qt, Qt Quick and the supporting tools are developed as an open source project governed by an inclusive meritocratic model. Qt can be used under open source (LGPL v2.1) or commercial terms. According to the release note - This is the first major release since the Qt Project went live. A lot of people have worked hard to make this release happen. A large amount of work and features that went into this alpha have been coming from people not working for Nokia. It’s great to see that the project has become a place where many people meet and together push Qt forward. 
The Qt 5 Alpha release includes the following modules:-
Essentials: Qt 3D, Qt Core, Qt GUI, Qt JS Backend, Qt Location, Qt Multimedia, Qt Network, Qt Qml, Qt Quick, Qt SQL, Qt Test and Qt WebKit.
Add ons: Qt D-Bus, Qt Graphical Effects, Qt Image Formats, Qt OpenGL, Qt Print Support, Qt Publish and Subscribe, Qt Quick 1, Qt Script, Qt Script Tools, Qt Service Framework, Qt SVG, Qt System Info, Qt Tools, Qt Wayland, Qt WebKit Widgets, Qt Widgets, Qt XML and Qt XML Patterns. 

All the new features can be found on the project wiki page. For more details & to download QT 5.0 Alpha click Here.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Microsoft Gets Recognition Among Top 20 Linux Kernel Contributors

Microsoft Gets Recognition Among Top 20 Linux Kernel Contributors

The Linux Foundation announced the top Linux kernel development contributors, with Microsoft getting on the list for the first time. The top 10 contributors to the Linux kernel in this latest report include "Red Hat, Intel, Novell, IBM, Texas Instruments, Broadcom, Nokia, Samsung, Oracle and Google," according to the report. For the first time, Microsoft has made the list of the top 20 contributors to the Linux kernel. Microsoft placed at No. 17 among companies that have contributed the most toward developing the Linux OS's kernel. As the Linux Foundation's announcement pointed out, it represents quite a change from the time when Microsoft CEO Steve Ballmer called Linux "a cancer" is now working within the collaborative development model to support its virtualization efforts and its customers. Because Linux has reached a state of ubiquity, in which both the enterprise and mobile computing markets are relying on the operating system, Microsoft is clearly working to adapt. In other words, some might recall the old adage: "If you can't beat 'em, join 'em.". The foundation suggested that Microsoft is "clearly working to adapt" in a world where Linux is used across enterprise and mobile environments.
The foundation's latest report, "Linux Kernel Development: How Fast It is Going, Who is Doing It, What They are Doing and Who is Sponsoring It," covers work completed through the Linux kernel 3.2 release, with an emphasis on the releases made since the last update to this report in December 2010 (2.6.36 to 3.2). 

Since 2005, there have been more than 7,800 developers contributing to the Linux kernel, according to the announcement. The foundation also claimed that "75 percent" of Linux kernel developers get paid for doing it. The full report, "Linux Kernel Development: How Fast It is Going. To Download the full report click Here



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

HTC Is Going To Release First Windows Phone 7 Handset (HTC Kaixuan) For China

HTC Is Going To Release  First Windows Phone 7 Handset (HTC Kaixuan) For China

Finally the Microsoft Mobile OS reached the key market of China. Taiwanese smart phone maker HTC has planed to release what could be the first Windows Phone 7 handset for mainland China. The HTC Kaixuan (triumphant return) will be launched later this month, the company said in a statement on Tuesday. HTC is already accepting pre-orders for the device on its online store in China for 4,399 yuan (US$698). Microsoft had said it expected its Windows Phone 7 mobile OS to launch in China during the first half of this year. Handset makers Nokia and ZTE also plan to release Windows Phone 7 smartphones in 2012.
HTC, however, said the Kaixuan is different in that its Windows Phone 7.5 OS has been localized for Chinese users. For instance, the Kaixuan comes installed with Sina Weibo, China's version of Twitter. Windows Phone 7 is however coming to China at a time when Google's Android OS is dominant, with a 56 percent share of the market in 2011, according to research firm Canalys. Android's open source nature has been the big reason behind the success of the OS, said Canalys research director Nicole Peng. This has allowed Chinese companies and developers to build a strong ecosystem around Android, resulting in localized versions of the OS and apps specially built for average Chinese consumers, she added. To compete with Android, Microsoft will need to develop the same kind of ecosystem for its Windows Phone 7 OS, which it so far lacks in China. "For Windows Phone 7, the biggest problem is the system is not localized enough," Peng said.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Mobile Network Is Vulnerable, Hacker Can Easily Track Your Location

Mobile Network Is Vulnerable, Hacker Can Easily Track Your Location 
Researchers of University of Minnesota have found that phone towers are leaking location information that can be used to track a mobile phone's exact location. The most interesting thing is to exploit this vulnerability you need not to purchase any kind of hardware gadget only a laptop and a mobile phone is more than sufficient to do that. "Anybody can set up this particular apparatus to be able to listen to broadcast messages from the towers," Kune said. "They don't need any special cooperation from the service provider, don't need to grab any information from the service provider, don't need to connect to the network, they just have to listen to what the cell towers are broadcasting." 
Researchers plugged a mobile phone into a laptop to listen in on transmissions from phone towers. They then dialed the number of the mobile phone they hoped to locate, triggering signals from the tower to the phone that gives away its location within a dozen blocks. The process takes about 10 to 15 minutes. The same techniques could be used to track phones at greater distances if hackers have access to nearby phone towers. 
Video Demonstration :-

Shellene Johnson, program manager at the Minnesota Coalition for Battered Women, said many victims of domestic violence or stalking rely on mobile phones to find help or call police. "If victims are unaware this is happening — they may be going into a safe location or into a shelter — it gives very easy access to information of her whereabouts," Johnson said. "The tool she's using to hopefully protect herself could be used to harm or possibly kill her."
Carol Arthur, executive director of the Domestic Abuse Project, said knowledge of a person's location is another way that some abusers can maintain control over their victims. "If you have changed your address and you're trying to get away from this person... but all of a sudden they found you, it's like you feel trapped, like you'd never be able to get away from this person," Arthur said.
The university report also speculated that the vulnerability could be exploited by oppressive governments or burglars. The researchers found that they could tap into the locations of phones on T-Mobile and AT&T networks. Kune said it also likely worked on Verizon and Sprint phones, although the tests weren't run on those networks.
The research team proposed fixes to the information leakage to AT&T and phone manufacturer Nokia. Kune said that Nokia has given the researchers feedback on the viability of their fixes. AT&T has not yet responded to the research team, but AT&T spokesman Alex Carey said the company takes all reports of network vulnerabilities seriously.
"If it's something that's identified as a valid threat, we would act on it right away, devote whatever resources we need to combat the threat," Carey said. The research was presented in early February at the Annual Network & Distributed System Security Symposium in San Diego, Calif.


-Source (MPR News)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

FBI Is Paying Attention To The US-China Commission Data Breach Issue



US-China Commission Data Breach issue is again on high node. Now Federal Bureau of Investigation (FBI) is investigating claims made by an Indian computer hacking group that India’s intelligence services intercepted the communications of the US-China Economic and Security Review Commission.

The documents posted on the Internet about a month ago and allege to be from the Indian government’s Directorate General of Military Intelligence and include about 10 emails from the Congressionally mandated Commission from September and October 2011. The commission reports to Congress annually on national security, trade and economic issue with China.

The Commission released their annual report to Congress in November 2011 this year. One federal law enforcement official indicated that the Indian government may have been snooping for early details on the assessments of the Commission if the documents are genuine.
While the emails do appear to be genuine the document has not been authenticated. Emails and phone calls made to the Indian embassy in Washington were not returned on Wednesday.
The alleged Indian military intelligence memo can be found Here
Though An FBI spokeswoman declined to comment on the investigation. The documents include an e-mail received by Michael Danis, the Commission’s executive director concerned General Electric’s business and joint ventures in China. The documents posted on the Internet were allegedly obtained by a group called the Lords of Dharamraja which has also compromised the source code on Symantec’s popular Norton antivirus software.
The document that is allegedly from the Indian intelligence service claims that the emails were obtained by using backdoors from mobile device manufacturers Apple, Research in Motion and Nokia. In the United States the Communications Assistance for Law Enforcement Act mandates that the FBI and police must have “backdoor” access to phone and internet communications with a lawful court order. The Bureau has been pushing for expanded surveillance powers with new technology such as Skype and Twitter in what they have termed their “Going Dark” program.
The inquiry into the data breach at the Commission follows the disclosure last month that China had infiltrated the US Chamber of Commerce computer system targeting the work by the Chamber’s Asia policy analysts.


-Source (ABC News)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NQ Mobile Security & Antivirus (Advanced Security Tool For Android)


NQ Mobile Security has released a security tool & Antivirus to remove malware, Spyware & Viruses. Award wining mobile security and privacy protection company NQ has claimed that NQ Mobile Security will protect your android phone and tablet from viruses, malware, spyware, trojans and phone hacking. Download NQ Mobile Security & Antivirus is a free Antivirus which will enhance your privacy protection, phone locator, data backup, safe browsing, traffic monitoring and safe apps recommendations for your Samsung Galaxy, HTC Desire, HTC Evo, LG Optimus, Motorola Droid, Milestone, Huawei etc.

Video Demonstration:-



Key Features:- 


ANTIVIRUS & SECURITY PROTECTION:-
  • Antivirus: blocks viruses, malware, spyware and trojans, and uninstalls malicious apps to protect you from phone hacking
  • Safe browsing: protects you from phishing, fraud sites and malware while browsing the Internet
  • Safe download: scans apps in real-time during download
  • FREE virus database update ensures you’re always protected from the latest threats

NETWORK MANAGER:-
  • Traffic monitoring: provides real-time updates on data usage to ensure you don’t go over your plan’s limits
  • Traffic usage trends and statistics over the past 30 days
  • Traffic consumption ranking of the apps
  • Monitors traffic usage details of your apps

PRIVACY PROTECTION:-
  • Privacy protection: monitors apps that access your private data without your permission

SYSTEM OPTIMIZATION:-
  • One-touch device optimization: ensures your Android phone is running at top speed by closing apps that run in the background without your knowledge
  • Traffic monitoring: provides real-time updates on data usage to ensure you don’t go over your plan’s limits

BACKUP & RESTORE:-
  • Backup & restore: allows you to easily backup and retrieve contacts and messages on mobile phones running on different operating systems, including iOS, Android, BlackBerry or Nokia phone and manages your backup data from web with a free account at NQ Space (i.nq.com)

FIND YOUR PHONE:- 
  • Remotely locate your lost phone


NQ Mobile Security is freely available to download from Android Market




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

15 High Profile Pakistani Websites Hacked By IRFn1nj4 & Ashell (Indishell)


Indian Cyber Army (ICA) widely known as Indishell again hits the Pakistan Cyber fence. This time 15 Pak websites get hacked & defaced by IRFn1nj4 & Ashell. Among them there are many high profile and important sites, such has Hosting Company's official site, Shopping Mall, Commercial Sites, Educational Sites, Style & Passion based sites and many more. List of hacked sites and the message of hackers can be found on a pastebin release. Earlier Ashell has hacked many important Pakistani sites like Nokia House, Cell Sniper, Geological Survey &PMU of Pakistan Govt, ISP & many media houses.  




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NokiaHouse Hacked By Ashell (Indishell)


Nokiahouse.com hacked by Ashell, an Indian hacker from Indishell also known as Indian Cyber Army. Another domain named mastienjoy.com hosted on that same server also get hacked by the hacker. The defacement mirror has been created by Indishell on Zone-h


Brief About Nokia House:-
Nokia House is part of Famous mobile phone manufacturer company Nokia. From Nokia House you can download free nokia attractive games interesting applications melodious ringtones and High Quality videos, themes for you phone.


Hacked Sites:-

Mirror Links:-





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Nokia Maps Compromised

After Nokia drive get hacked now the Nokia XDA developper has confirmed that Nokia Map get hacked Nokia Maps and is now available for all Windows Phone 7 (WP7) devices . The new app launched with the Lumia 710 and 800 would very soon be available for other WP7 devices as well according to Nokia, but now you can test it out now by downloading the XAP file.
The app can only be installed in a unlocked WP7 device (dev-unlock or ChevronWP7 Labs). Nokia Maps is was developed specifically for their new line of WP7 phones and Nokia were banking on this as one of their key selling points. Now that two exclusive apps have already been leaked at a very early stage even before the phones hit the market, it hurt the sales of the new devices as they loose some of the exclusivity. At this point, Nokia can’t really do much about this, but just wait and hope that the new Lumia duo has enough going for it for them to stand out in the competition.


-News Source (Engadget, Tech2)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

"Asha" News Smartphone By Nokia (Lumia 800 & Lumia 710)



Amid loss of market share to Apple and Samsung in the smartphone category, Finnish phone maker Nokia has launched two new phones with Windows Operating System in the price range between Rs 19,000-Rs 29,000. In a bid to retain its leadership position in the Indian market, the company also announced a new series — Asha, a Hindi word for hope.
Nokia has for the first time showcased six new phone models at the ongoing Nokia World 2011 conference, that includes four models of the ‘Asha’ series priced between €60 (about Rs 4,100) and €115 (about Rs 8,000), and two new smartphones with Windows operating system platforms branded as ‘Lumia 800’ and ‘Lumia 710’ priced at €420 (about Rs 29,000) and €270 (about Rs 19,000) respectively.
The company plans to launch the new products across the globe, including India starting this year end. Nokia will soon roll out a marketing campaign ‘The Amazing Everyday’ globally to support the new launches. 
Commenting on the ‘Asha’ series, Stephen Elop, Nokia president and CEO, said: “Asha signifies Nokia’s focus on connecting million of people to new opportunities that help them reach their aspirations.” 
While three Asha models will be launched this year, one model will be launched early next year. For more information click Here
  
-News Source (Yahoo, Nokia) 


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Nokia is Developing "Meltemi" Linux OS For Low-end Smartphones


Nokia has underlined the importance of low-cost smartphones and now it appears that the company is developing a Linux-based OS for smartphones that will cost less than US$100 without subsidies.
The new OS is code-named "Meltemi," and the project is being led by Mary McDowell, Nokia's executive vice president in charge of mobile phones, according to sources familiar with the matter, the Wall Street Journal reported on Thursday.
The company has been hinting at plans for a reboot of its low-end smartphone portfolio. At its Connection event in Singapore Nokia said that Qt -- a Linux-compatible cross-platform application and user interface framework -- would be a good fit for lower-end devices, and before that McDowell said that Nokia needs to find a replacement for Series 40, according to Carolina Milanesi, research vice president at Gartner.
"So if you put the two together, we can see where this would fit in," said Milanesi.
Series 40 is the OS Nokia today uses on its feature phones, a product segment that is going away as users want smartphones. Nokia dabbled with a Linux phone two years ago, introducing the N900 running Linux. On the record, Nokia is keeping mum about its plans.
"Of course, we don't comment on future products or technologies. However, I can say that our Mobile Phones team has a number of exciting projects in the works that will help connect the next billion consumers to the Internet," a spokesman said via email.
Nokia choosing Windows Phone over Android has put the company in a tight spot when it comes to low-end smartphones. There is no question that Android is pushing the price of smartphones to levels that are considerably lower than that of smartphones based on Windows Phone in the near-term, which means that Nokia has a gap in its portfolio, according to Ben Wood, director of research at CCS Insight. "That means Nokia either needs to scale up Series 40 and make it a more robust competitor with a smart-like experience or look at alternative options, and [Meltemi] could be one of the other options," said Wood.
Nokia can't afford to bet its entire future on Windows Phone and if it wants to remain the volume leader it needs to step up its efforts in the low-end smartphone segment, he said.
The low-end smartphone market is increasingly important and will become the largest smartphone market segment, according to Francisco Jeronimo, research manager at IDC. Sales of less expensive smartphones are already growing faster that high-end models in Western Europe and the availability of low-end smartphones will be crucial to increase sales in emerging markets, he said.

The opportunity is so big that no one can afford to ignore it, not even Apple, Jeronimo said, adding that he won't be surprised if the company releases a cheaper version of the iPhone next week. For Nokia, a logical venue for the public launch of Meltemi would be at Nokia World in London at the end of October. The drawback is that Meltemi risks being drowned by the expected launch of Nokia's first Windows Phone, according to Wood. 


-News Source (PC World)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Nokia developer Forum Hacked By pr0twctor & Later Nokia Decided To Shut Down Their Developer Forum Temporally


Nokia developer site  hacked and defaced by pr0twctor AKA mrNRG. After this phenomena Nokia decided to shut down their  developer forum temporally. 
Developers of apps for Nokia phones have been warned that their personal information may have been stolen by hackers, after a security breach on the official developer.nokia.com/community discussion forum.
The first warning that many Nokia developers would have had that something was amiss would have been when they visited the forum and instead of the usual chit-chat about technical issues, been taken to a third-party webpage containing an image of Homer Simpson

The web-page contained a message seemingly from those responsible for the hack:-
Owned by pr0tect0r AKA mrNRG
LOL. Worlds number 1 mobile company but not spending a dime for server security! FFS patch you security holes otherwise you will be just another antisec victim. No Dumping, No Leaking!
According to the Finnish telecoms giant, hackers exploited a SQL injection vulnerability in the forum software used on the Nokia Developers site to access databases containing members' email addresses and (in some cases) birth dates, and usernames for AIM, ICQ, MSN, Skype or Yahoo.
Passwords and credit card information is not believed to have been exposed - which is a relief for affected members and must be causing a sigh of relief inside Nokia.


-News Source (Naked Security)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

developer.nokia.com is Vulnerable to SQl-i, Said Zero


The official website of Nokia developer is vulnerable to SQl-i said Zero. He also hacked and exposed the credentials user-name, database info, login email-ids, passwords and so on.  

Database:-

database version:-5.0.45-log
database name:-dibo
database user:-diboadmin@jagamon.dmz

user information 

username : salt 
password : 698df1f11d93736f280e801db71f8d4e

For More Information Cheek the following Link:- 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Linux-based mobile OS Targeting Android


A Linux-based mobile OS is set to launch in China, presenting a possible threat to competitors as they vie for smartphone and tablet customers in the Asian market.
Chinese ecommerce company Alibaba says it will launch its Aliyn OS at the end of the month, after working on it for three years. Phone manufacturer Tianyu intends to sell the Aliyn-based K-Touch Cloud-Smart Phone W700 for $416 in several days, with plans to market a tablet soon.
Aliyn's main features include the ability to run Android apps in the cloud, as well as those created with JavaScript and HTML5. It offers users cloud-based email, data, text message and photo storage too, besides regular web search and GPS.
"Introducing cloud apps to mobile devices not only brings a whole new user experience, but also greater ease for third-party mobile software developers who will be able to use Internet technology such as HTML5 and JavaScript to reduce the complexity in the app development process," said Wang Jian, president of Alibaba Cloud Computing.
In most regions of the world, Aliyn would face fierce and nearly devastating competition from Google's Android and Apple's iOS. But in China where Tianyu's new phone is set to launch, the OS may have a chance. The country's mobile broadband infrastructure is still underdeveloped and essentially up for grabs to whoever can create the biggest presence there first.
China is still behind in the smartphone market, though 3G subscriber numbers jumped nearly 50 percent to almost 70 million last April. But given the country's enormous population, 70 million is a small number compared to the U.S. market, in which nearly half of phone owners have smartphones.
If Aliyn can create a foothold in time, then, it may stand a chance against planned marketing onslaughts from rivals Apple, Google and Nokia, which are also angling for the Chinese market.
Apple's COO Tim Cook reportedly held talks with China Mobile to introduce the iPhone on its network. Doing so would give it 600 million more customers in the country, especially if Apple also decides to provide a cheaper, prepaid version of its iPhone 3GS.
Android smartphone maker HTC also reports increased success in the Asian market, shipping 11 million smartphones inside China this last quarter.
Other Android phone manufacturers too have their eyes on the populous country, as analysts predict over one billion people there will own smartphones in the next five years.
Nokia too is looking to push into Asia with lower-end handsets, which could take a chunk out of smartphone sales since the latter tend to be more affordable.
The competition is fierce, but this unexplored market is up for grabs, and upstarts like Aliyn may see success if it can grapple with rivals for the upper hand. 

-News Source (Mobiledia)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...