Showing posts sorted by date for query game. Sort by relevance Show all posts
Showing posts sorted by date for query game. Sort by relevance Show all posts

NBC.com Compromised, Hackers Exploited The Website to Spread Malware

NBC.com Compromised, Hackers Exploited The Website to Spread Malware

The month of February is still going from bad to worse for the cyber domain, in this very month cyber criminals swallowed the security system of many giant companies like Facebook, Twitter, Apple, New York Times and many more. But the game is not over yet, as we have just passed a few weeks, when the attack on NY Times took place, which stolen the employ database; yet again the cyber criminals have targeted another media giant National Broadcasting Company widely known as NBC. During the attack, hackers have successfully gain access inside the server of NBC and planted malware, in order to harm innocent readers. Famous security expert and blogger Brian Krebs said that the hackers inserted code into the NBC.com homepage. This caused visiting browsers to load pages from third-party sites that were compromised. While explaining the nature of the attacker, Krebs said; "The compromised sites tried to foist the Citadel Trojan, a variant of the Zeus Trojan." The Zeus is a "sophisticated data theft tool that steals passwords and allows attackers to control machines remotely" he added. Not only the NBC’s home page, also several others were affected, including the pages of late night talk show hosts Jay Leno and Jimmy Fallon. Well known security firm Sophos explained how roughly attack played out, and how NBC got sucked into the equation:
  • NBC's hacked pages were altered to add some malicious JavaScript that ran in your browser.
  • The JavaScript injected an additional HTML component known as an IFRAME (inline frame) into the web page.
  • The IFRAME sucked in further malicious content from websites infected with an exploit kit known as RedKit.
  • The exploit kit delivered one of two exploit files to try to take control over your browser via a Java vulnerability or a PDF bug.
  • If the exploit worked on your computer, financially-related crimeware from the Citadel or ZeroAccess families was installed.
This, of course, is an example of a dreaded drive-by download, where the crooks use a cascade of tricks to download, install and execute software without going through any of the warnings or confirmation dialog you might expect. This, in turn, means that even if you are a careful and well-informed user, you may end up in trouble, since there are no obvious signs that you are doing anything risky, or even unexpected.
As soon as this story get spotted the American commercial broadcasting television network, NBC News reported and confirmed that its site had been attacked. The broadcaster released the following statement regarding the website: "We've identified the problem and are working to resolve it. No user information has been compromised."
The emergency response team immediately take the situation under control and restored the website, and confirmed that the site is back again and completely safe for its visitors. But so far there is no evidence of attackers who were involved in this attack. For the safety of VOGH readers we would like to recommend you to update your operating systems and browser plugins. Also note that the attack on NBC was similar to many that have occurred in recent years in that the malicious sites tried to exploit vulnerabilities in Java. So it will better to disable Java, unless it is that much necessary. So stay tuned with VOGH and be safe in the cyber domain. 






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#OP maZYNGA: Anonymous Targeted Zynga, Leaked Confidential Documents & Games

#OP maZYNGA: Anonymous Targeted Zynga, Leaked Confidential Documents & Games

Infamous hacker collective Anonymous again vows to destroy the most popular social network Facebook and one of its associate along with one of the best place to play online games Zynga. The offensive has been  named Operation MaZynga or dubbed #OP MaZynga. According to a post on AnonNews forum, the hacker group threatened to to take Facebook down on November 5 and release Zynga games to the public on that day for free if Zynga doesn't stop its alleged plans for massive layoffs and offshoring of jobs. Anonymous says that it has obtained secret documents about Zynga's strategy which includes a "massive layoff of a thousand people." The hacker group is ticked off about the jobs. "With a billion dollars cash sitting in a bank we do believe that such actions are an insult to the population and the behaviour of corporations like Zynga must change," it said. Last week, Zynga reported that it has $1.6 billion in cash, equivalents and marketable securities and confirmed that it laid off 150 people. As for rumors of bigger layoffs, these have been circulating for a while.

#OP MaZynga. Press Release From Anonymous:- 

Transcript:-

"Zynga customers and Facebook users , We are anonymous . During the last few days anonymous has been targeting Zynga for the outrageous treatment of their employees and their actions against many developers. 
We have come to believe that this actions of Zynga will result in massive layoff of a thousand people and legal actions against everyone that speaks to the public about this plan.
It will also come to end of the US game market as we know it as all this jobs will be replaced in other more convenient financial countries.
With a billion dollars cash sitting in a bank we do believe that such actions are an insult to the population and the behaviour of corporations like Zynga must change.
Anonymous could not allow this to happen so it's starting to release confidential documents we have leaked on this plan
As we speak we are planning to release also all the games we've taken from their servers for free.
That being said we will stop the idea of the distribution of such games if Zynga will cease immediately the plan.
The leaked strategy of Zynga , transcript:
Following the preliminary announced of this week the final strategy for the next two quarters has been successfully set to delivery by november 23 an additional but of 800 jobs with further raising of new capital from the market to support businesses.
We've identified our global gambling strategy with bwin.party and as we speak discussions are progressing with a partner to cover the US market.
Work is focused and on-going to completely outsource our development teams in our offices in Bangalore , India to hedge our position in the long term.
We've identified key new products from third parties such as Lovers in a Dangerous Spacetime , Shove Prod and Music Invaders in which we are starting business contacts to buy these IP for transaction value of approximately 20 million.
We strongly believe we will conclude these deals this month and compete with this titles against mobile competitors with ease.
Our business continues to evolve and we must evolve with it. We operate in a exciting and challenging industry and I am very pleased that our senior leadership team continue to strengthen and develop with us." 

 ******

Here are the documents it mentions:-


Not that above files have already been removed for “copyright infringement”. Here we want yo give you reminder that i2011 Anonymous openly declared to take down Facebook. The operation was dubbed #Op-Facebook and Anonymous told that they will hit FB on the 5th of November last year. But in reality it was just a threat and as expected Anonymous failed to execute Operation Facebook. This year also members of Anonymous vows to re-engage the same operation on the same day (November 5th) also known as Guy Fawkes Day, named for the English historical figure from which Anonymous derives inspiration. So far neither Facebook, nor Zynga responded this message of the hacker group, so lets wait till November 5th, and stay tuned with VOGH for all the latest update on this & also other stories on cyber security, hacking & infosec industry. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Apple Releases iOS 6 With 200+ New Features & Mountain Lion 10.8.2 With Facebook Integration & Game Center

Apple Releases iOS 6 With 200+ New Features & Mountain Lion 10.8.2 With Facebook Integration & Game Center

As expected, here comes double bang from Apple. Apple has also released  iOS 6 along with OS X Mountain Lion 10.8.2 and made available for public. In case of users of recent iPad, iPhone, and iPod touch models can obtain the update either by connecting their devices to iTunes and clicking the "Check for Update" button or checking for over-the-air updates on their devices. iOS 6 adds over 200 new features, including Apple's own Maps app, Facebook integration, Siri improvements, Apple's new Passbook digital wallet app, and more. iOS 6 is compatible with the third-generation iPad, iPad 2, iPhone 4S, iPhone 4, iPhone 3GS, and fourth-generation iPod touch. It will also ship on the iPhone 5, which launches on Friday, and on the fifth-generation iPod touch launching next month. The operating system arrives as the golden master build 10A403 for existing devices, and Apple has also posted a special 10A405 build for the iPhone 5 and a 10A406 build for the upcoming fifth-generation iPod touch.

With iOS Apple quietly pushed out 10.8.2, the second minor update to Mountain Lion since it was released in July. The update is currently available via the Software Update functionality in the Mac App Store. The update includes a number of enhancements, most notably Facebook integration and Game Center. It also includes support for several features integrating with iOS 6, such as Passbook passes and  iMessage/FaceTime access via phone number. 

This update is recommended for all OS X Mountain Lion users, and includes new features and fixes:


Facebook 
• Single sign on for Facebook
• Adds Facebook as an option when sharing links and photos
• See Facebook friends' contact information and profile pictures in Contacts
• Facebook notifications now appear in Notification Center



Game Center
• Share scores to Facebook, Twitter, Mail, or Messages
• Facebook friends are included in Game Center friend recommendations
• Added Facebook "Like" button for games
• Challenge friends to beat your score or achievement



Other new features
• Adds Power Nap support for MacBook Air (Late 2010)
• iMessages sent to your phone number now appear in Messages on your Mac
• You can now add passes to Passbook (on your iPhone or iPod touch) from Safari and Mail on your Mac
• FaceTime can now receive calls sent to your phone number
• New shared Reminders lists
• New sort options allow you to sort notes by title, the date you edited them, and when you created them
• Dictation now supports additional languages: Mandarin, Cantonese, Spanish, Korean, Canadian English, Canadian French, and Italian
• Dictionary app now includes a French definition dictionary
Sina Weibo profile photos can now be added to Contacts

* Requires iOS 6


General fixes
The OS X Mountain Lion v10.8.2 update also includes general operating system fixes that improve the stability, compatibility and security of your Mac, including the following fixes:


• Adds an option to discard the changes in the original document when choosing Save As 
• Unsent drafts are now opened automatically when launching Mail
• Receive Twitter notifications for mentions and replies from anyone
• URLs are shortened when sending tweets from Notification Center
• Notifications are disabled when AirPlay Mirroring is being used
• Adds SSL support for Google searches from the Smart Search Field in Safari
• Adds a new preference to have Safari launch with previously open webpages
• Resolves an issue that may cause the "Enable Autodiscover" checkbox to always remain checked
• Enables access to the Mac App Store when Parental Controls are enabled Support for @icloud.com email addresses
• Resolves a video issue with some VGA projectors when connected to certain Mac notebooks
• Addresses an issue that may prevent Active Directory accounts from being locked out
• Resolves an issue that may cause the policy banner to re-appear prior to logging in
• Improvements to SMB
• Addresses an issue with NIS users when auto-login is enabled
• Addresses an issue in which the Keychain may not be accessible
• Ability to pre-authenticate a FileVault protected system
• Addresses an issue that may cause Xsan to not automatically start after migrating from Mac OS X Snow Leopard 


Direct downloads of OS X 10.8.2 is also available through Apple's site form the following links-



-Source (Apple & MacRumors)                             




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

A Tribute to The 10 Most Infamous Student Hackers of All Time

A Tribute to The 10 Most Infamous Student Hackers of All Time

Since last two years, we the VOGH team has been covering all the latest cyber security updates. But today lets do some thing different. One of our frequent reader and fan Katina Solomon has requested us to share a fantastic article. Everyday VOGH draws headlines of hackers around the world and their activities. While trying to maintain speed with time, we usually forgot our past. Today we will take you into the past, where we will discuss about those heroes, who are always been ill treated by the society & the system while revamping those heroes into cyber-criminals or infamous hackers. Its our question to our humanity "Did the system has done justice with them??" 
Hacking has always been inherently a young person’s game. The first usage of the word “hacker” was to describe pranksters meddling with the phones at MIT. Many hackers have cited boredom, a desire for change, or the thrill of going somewhere one is not supposed to go as their motivation for hacking, all of which could apply to scores of common activities on college campuses. While today’s hacking scene is dominated by large hacking groups like Anonymous and Masters of Deception, many of the greatest hacks ever have been pulled off by college, high school, and even middle school kids who rose to infamy armed only with a computer and the willingness to cross the bounds of legality.
  1. Sven Jaschan: In the words of one tech expert, “His name will always be associated with some of the biggest viruses in the history of the Internet.” The viruses: the Sasser and NetSky worms that infected millions of computers and have caused millions of dollars of damage since their release in 2004. The man behind the viruses proved to be not even a man at all, legally. Seventeen-year-old hacker Sven Jaschan, a student at a computer science school in Germany, claimed to have created the viruses to become a hero by developing a program that would eradicate the rampaging Mydoom and Bagle bugs. Instead he found himself the subject of a $250,000 bounty courtesy of Microsoft, for which some of his classmates turned him in.
  2. Jonathan James: In 2000, at the age of 16, James, or “C0mrade” as he was known in the hacker community, infamously became the first juvenile federally sentenced for hacking. The targets of his notorious hack jobs were a wing of the U.S. Department of Defense called the Defense Threat Reduction Agency, NASA, and the Marshall Space Flight Center in Huntsville, Ala. (By hacking the latter James gained the ability to control the A/C in the International Space Station.) All of these were pulled off “for fun” while James was still a student at Palmetto Senior High in Miami. Unfortunately, the fun ran out when James was tied into a massive identity theft investigation. Though insisting he was innocent, James took his own life, saying he had “no faith in the justice system.”
  3. Michael Calce: Yahoo. CNN. Ebay. Amazon. Dell.com. One by one in a matter of days, these huge websites crashed at the hands of 15-year-old Canadian high school student Michael Calce, aka “MafiaBoy.” Armed with a denial-of-service program he called “Rivolta” that overloaded servers he targeted, the young hacker wreaked $7.5 million in damages, according to court filings. Calce was caught when he fell victim to a common ailment of teenage boys: bragging. The cops were turned on to him when he began boasting in chat rooms about being responsible for the attacks. On Sept. 12, 2001, MafiaBoy was sentenced to a group facility for eight months on 56 counts of cybercrime.
  4. Kevin Mitnick: Before performing hacks that prompted the U.S. Department of Justice to declare him “the most wanted computer criminal in United States history,” Kevin Mitnick had already made a name for himself as a hacker in his school days, first at Monroe High School in LA and later at USC. On a dare, Mitnick connived an opening into the computer system of Digital Equipment Corporation, which some fellow hackers then used to steal proprietary source code from the company before ratting on him. While still on probation for that crime, Mitnick broke into the premises of Pacific Bell and had to go on the run from police in the aftermath, during which time he hacked dozens of systems, including those of IBM, Nokia, Motorola, and Fujitsu.
  5. Tim Berners-Lee: “Scandalous” is a synonym for “infamous,” and for this legendary computer scientist, knight of the British Empire, and inventor of the World Wide Web to have been a hacker in his school days is certainly a juicy factoid. During his time at Oxford in the mid-’70s, Sir Tim was banned from using university computers after he and a friend were caught hacking their way into restricted digital areas. Luckily by that time he already knew how to make his own computer out of a soldering iron, an old TV, and some spare parts. And also luckily for him, he will always be revered as the father of the Internet.
  6. Neal Patrick and the 414s: In the early ’80s, hacking was still a relatively foreign concept to most Americans. Few recognized the enormous power hackers could hijack with a few strokes on a keyboard, which explains why a young group of hackers known as the 414s (after a Milwaukee area code) were virtual celebrities after they hacked into the famous Los Alamos National Laboratory, the Memorial Sloan-Kettering Cancer Center, and elsewhere. While today hacking a lab where classified nuclear research is conducted could earn you a one-way ticket to Guantanamo, the 17-year-old ringleader and high school student Neal Patrick was on the cover of Newsweek. The group members got light sentences but prompted Congress to take a stronger role in cybercrime.
  7. Robert T. Morris: The first ever Internet worm, the Morris Worm derived its name from Cornell grad student Robert Tappan Morris. In 1988, Morris released the worm through MIT’s system to cover his tracks, which would seem to contradict his claims that he meant no harm with it. But that’s exactly what resulted: the worm spread out of control, infecting more than 6,000 computers connected to the ARPANET, the academic forerunner to the World Wide Web. The damages reached as high as an estimated $10 million, and Morris earned the ignominious distinction of being the first person prosecuted under the Computer Fraud and Abuse Act. Morris got community service but was apparently not considered too infamous to be offered his current job as a professor at MIT.
  8. George Hotz: To some, George Hotz (aka “geohot,” aka “million75,” aka “mil”) is a public menace, a threat to electronic businesses everywhere. To many, Hotz is a hero. The high-schooler shot to fame/infamy in 2007 at the tender age of 17 by giving the world its first hacked, or “jailbroken” iPhone. He traded it for a new sports car and three new iPhones, and the video of the hacking received millions of hits. Apple has had to grudgingly come to terms with jailbreaking, seeing as the courts have declared it legal, but Sony Corp. is definitely not OK with such tampering. When Hotz hacked his PlayStation 3 and published the how-to on the web, the company launched a vicious lawsuit against him. In turn, the hacker group Anonymous launched an attack on Sony, stealing millions of users’ personal info.
  9. Donncha O’Cearbhaill: According to the FBI, this 19-year-old freshman at Trinity College Dublin is one of the top five most wanted hackers in the world. Well, he was; now that he’s been arrested he’s not really “wanted” anymore. The Feds contend the young man is a VIP member of the Anonymous and LulzSec hacking groups that have already been mentioned and whose targets have included the FBI, the U.S. Senate, and Sony (in the Hotz backlash). It seems “Palladium” (O’Cearbhaill) took the liberty of listening in on a conference call between the FBI and several international police forces who were discussing their investigations of the hacking groups. He could be sentenced to up to 15 years in prison if convicted for that hack alone.
  10. Nicholas Allegra: Just as George Hotz moved on from the Apple hacking game, Brown University student Nicholas Allegra is also hanging up his jersey. “Comex,” as he is known to millions of rooted iPhone fans, created the simple-to-use Apple iOS jailbreaking program JailbreakMe in 2007 and has since released two newer versions of it. However, Comex seems to have gone over to the dark side, accepting an internship with the very company whose products he became famous exploiting. Still, Allegra’s hacking skills are so advanced (one author puts him five years ahead of the authors of the infamous Stuxnet worm that corrupted Iran’s nuclear facilities) and so many people availed themselves of his talents, he will forever live in hacking infamy.

We want to dedicate the above post to the legendary hacker, who left us -Jonathan James aka “C0mrade”. Also the post is a tribute to all the so called 'infamous hackers'. You are our heroes and inspiration, you will always be there in our soul. Team VOGH salutes you...... 


-Thank you Katina & Online Degrees




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

11,000 Guild Wars 2 Account Hijacked On a Campaign By Chinese Hackers

11,000 Guild Wars 2 Account Hijacked On a Campaign By Chinese Hackers 

After the security breach on GamigoBlizzard yet again online gamer's have fallen victim to cyber criminals. The second sequel of the popular Guild Wars multiplayer online RPG by ArenaNet has been released less than two weeks ago, and player accounts are already being heavily targeted by what seems to be a dedicated account hijacking campaign coming from China. ArenaNet and publisher NCSoft have been in touch to dispute the number of Guild Wars 2 accounts that have been hacked, saying in a statement: "Over the past three days we've received approximately 8,500 new support tickets related to hacked accounts and other blocking login issues." The accounts of an estimated 11,000 Guild Wars 2 players have been hacked - and developer ArenaNet says they only have themselves to blame for not using unique usernames and passwords. In a post on the official Guild Wars 2 Wiki, the developer says that its customer support team is treating the recovery of hacked accounts as a priority, and urges those who have escaped unscathed to change their passwords as a precaution.
"Hackers have lists of email addresses and passwords taken from other games and websites, and collected through spyware, and are systematically testing Guild Wars 2 looking for matching accounts," the post reads. "To protect yourself, use a strong, unique password for Guild Wars 2 that you've never used anywhere else. "If your current password isn't unique to Guild Wars 2, change it today. Do not under any circumstances use the same password for Guild Wars 2 as you do for your email account. "We've observed hack attempts against hundreds of thousands of accounts that don't even exist. To protect those people in case they purchase Guild Wars 2 and create an account, we will now disallow customers from picking passwords that we've previously seen used in a hack attempt." 
The company has so far received around 11,000 support requests related to hacked accounts, and is likely to receive more as time goes by, Here we want to draw the attention of our readers that not only  Guild Wars  2 players,  In the last few months we have been a slew of attacks against the following sites: YahooLinkedIn, eHarmonyFormspring, Android Forums, GamigoNvidia, Blizzard and  PhilipsEarlier in 2011 we have seen several other gaming sites became victim of cyber attacks, among them there are Square EnixEidosMapleStory & so onSo all customers are advised to change their passwords now to a long and unique one for Guild Wars 2 that they never before used for any other game or website. 


-Source (Edge, Net Security)







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Wikipad -Android Based Gaming Tablet Coming on October For $499

Wikipad -Android Based Gaming Tablet Coming on October For $499

The long awaited gaming tablet with detachable controls based on Android  is set for release on October 31st. The mobile gaming tablet is named 'Wikipad' will be available for $499. Online retailing store, GameStop which has tied-up with Wikipad, has already started taking pre-orders for the Tegra-3 based tablet. Furthermore, those who pre-order a Wikipad will receive value added extras, including one issue of the GameStop-owned Game Informer digital magazine, and "full-length titles." Though these games were not announced, but GameStop plans to reveal them soon. The Wikipad will support games downloadable through PlayStation Mobile, Nvidia's Tegra Zone, Google Play and other forthcoming platforms.
Wikipad sports a 10.1-inch IPS display and will have a 1280×800 resolution. It is powered by an Nvidia Tegra 3 processor clocking at 1.4GHz. It will come with 1GB RAM and 8GB on-board storage expandable to 64GB. To put your game face on, just attach the gaming controller which features multiple buttons and analog joysticks.
Wikipad has also partnered with Gaikai for streaming video games. Gaikai, previously known as the Sony Cloud service, was bought by the company for $380 million. Gamers will be able to stream Gaikai's library of titles to their Wikipad, including big titles like Battlefield 3, Mass Effect 3 and Saints Row: The Third

About Wikipad:- Wikipad Inc. is a leading developer and designer of video game console tablets and devices. Headquartered in Los Angeles, California, Wikipad Inc. is uniquely positioned as pioneers and innovators in the mobile entertainment world. Wikipad is leading the way with its accessible and comfortable consumer devices focused on video game content while enabling traditional functions such as productivity, web, education, media and music content.

For Pre-Order Booking Click Here



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

22 Indian Govt. & 1 NIC Website Defaced By D0m (Pakistan Cyber Army)

22 Indian Government & 1 NIC  Website Defaced By D0m (Pakistan Cyber Army)
A hacker from Pakistan codenamed D0m has targeted several Indian Government websites. He managed to get access inside the web-server of Jawahar Navodaya Vidyalaya (Govt. of India) and defaced the index page of more than 22 websites hosted on that particular server. The game is yet not over the hacker also hacked & defaced one website of NIC (Kendriya Vidyalaya Eklinggarh,Udaipur). This NIC domain is still unavailable, but the authority has removed the hacker's page from the server. But still several websites of Jawahar Navodaya Vidyalaya is defaced. As per sources it has confirmed that "D0m" belongs to infamous hacker's community named Pakistan Cyber Army. The list of all those hacked sites with deface mirror can be found on a pastebin note.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Four LulzSec Hackers Appeared In Court Together For The First Time


Four LulzSec Hackers Appeared In Court Together For The First Time

For the first time the four men, Ryan Ackroyd, 25, Ryan Cleary, 20, Jake Davis, 19 and a 17-year-old male who could not be named appeared in Court together. They are charged with taking part in cyber attacks under hacking group LulzSec, an offshoot of Anonymous, appeared in court Friday afternoon, appearing side-by-side for first time before a judge.  British prosecutors allege that the quartet last engaged with one another under the guises of online pseudonyms to wreak havoc on the web. These LulzSec key members are accused of accessing computers operated by News Corp. (NWSA) (NWSA)’s Twentieth Century Fox, Sony Corp. (6758), the U.K.’s National Health Service, the Arizona State Police, and technology-security company HBGary Inc.
Four of the eight counts listed in the updated British indictment today, were levelled solely on 20-year-old Cleary. He is accused of supplying a botnet — or a network of thousands of infected computers that can be used to paralyze websites — to others, and operating one himself to attack the website of DreamHost, a web hosting company. He is also accused of “installing and/or altering computer programs” on computers at the Pentagon controlled by the U.S. Air Force, between May 1 and June 22, 2011.
Cleary was the only one of the four defendants who was still in police custody. He was arrested on March 6 of this year — the same day Hector “Sabu” Monsegur was unveiled as an informant — for breaching his bail conditions. 
According to the new indictment, the four men also targeted denial of service attacks against: Westboro Baptist Church, which has staged anti-homosexual demonstrations at military funerals; the online role-playing game Eve Online; the U.S. Central Intelligence Agency; and Britain’s Serious Organised Crime Agency.





-Source (Forbes) 






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Bing Goes Social in Search, Added Search for Facebook, Twitter & More


Bing Goes Social in Search, Added Search for Facebook, Twitter & More

Microsoft's recent movement to boost Bing's social networking feaures could finally give the company an opportunity to truly take on Google's dominant search engine. The updated Bing search engine, which was unveiled on Thursday, can now include the user comments, likes and activities posted in popular social networks like Facebook and Twitter. Bing's new interface, which is expected to move from a private to a public beta test period soon, offers users a sidebar that focuses on people in the user's social networks and their opinions and search queries, Microsoft said. The social sidebar also is designed to let users ask their friends questions about their query topic, and those friends can respond either through Bing or Facebook, Microsoft added.
Since Microsoft first launched Bing in the summer of 2009, the company faced a daunting task in taking on Google's dominant search engine. And Google has remained dominant. Despite all of Microsoft's efforts, including an upgrade in 2011, Bing simply hasn't been able to take a significant bite out of Google's market share. Now, Microsoft is hoping that its social search capabilities can become the game-changer the company needs in the battle against Google.

-Source (Computer World)




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Trade.Gov.Cn Hacked By Anonymous, Database Dumped

Trade.Gov.Cn Hacked By Anonymous, Database Dumped 

China Unit of hacktivist Anonymous still continuing their China Rampage. Earlier this hacker collective group took responsibility of hacking into thousand of high profile, commercial & Govt websites of China. But the game is yet not over, at least their activity is proving that. In their twitter account Anonymous China tweeted their latest activity and that is as expected another big attack on Chinese cyber space. This time the victim was Trade.Gov.Cn & ec.shandongbusiness.gov.cn financial transaction market of China Govt. In a public note on Pastebay the hacker group leaked the entire database of those said sites which includes credentails like username & passwords hash of more than 750 users, admin details, and many more. In short the full database has been dumped by the hacker group. Several twitter accounts of Anonymous re-twitted about this data breach. Immediately after the hack, authorities sent the site offline for a certain period but now it came back to its normal format. 




 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Popular Gaming Site of France Infecting Visitors With ZeuS

Popular Gaming Site of France Infecting Visitors With ZeuS 

Researcher from Anti-virus company and security firm Avast, has find out that a French website of popular game Assassin’s Creed has been serving ZeuS malware variants to its visitors for over 8 weeks. The site has been infected with a Trojan java script redirector that sends visitors to a Russian malware site and connects them to a ZeuS powered botnet. The infection was last confirmed by the AVAST Virus Lab at 12.00 CET, April 10, 2012. And, just to make it clear, this Assassinscreedfrance.fr site is not affiliated with Ubisoft, the developers of the Assassin’s Creed franchise. 
The web site is currently returning a Parse error: syntax error, unexpected T_CONSTANT_ENCAPSED_STRING in /homepages/23/d207590046/htdocs/wp-content/plugins/countdown-timer/fergcorp_countdownTimer.php on line 1050 error message. 
According to Avast official blog post - So far, Avast has blocked over 179,800 visits by its users to this site. And, Assassinscreedfrance.fr is just one of 1,841 sites around the globe that has been infected with this specific Trojan during the month of March. The infection, a Trojan redirector, sends users to Russian malware distribution server with an IP registered in Saint Petersburg, Russia. And yes, this sever is still working, even after Microsofts’ recent takedown of a few dozen botnet servers. The infection at Assassinscreedfrance.fr is located in the countdown timer in the JavaScript module, a common WordPress plugin. Other sites had infections hitting a wide range of WordPress vulnerabilities. “The bad guys are using an automatic tool that is looking for some holes,” said Jan Sirmer, analyst from the AVAST Virus Lab. “Assassinscreedfrance.fr may have become vulnerable by using an outdated version of WordPress, even though their JavaScript plugin is up-to-date. For the rest of these sites, we can safely say that older programs and plugins are common ways to get infected.” 

-Source (Avast Blog)




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Apple Working On TV With Integrated Voice/Motion Controller & Gaming Console

Apple Working On TV With Integrated Voice/Motion Controller & Gaming Console

Apple is planning an assault on the living room with a TV that will come equipped with an Apple-branded, Kinect-like video game console. According to sources Apple is working on a television set with an iTunes-integrated touch screen remote and Siri-like voice command technology. The TV set will be coming before the end of 2012. Rumors and patents have said as much for the past year, so that’s nothing new. But that’s not all we’ve heard. Also it has come to light that Apple’s television set will come with an Apple-branded, Kinect-like video game console. The interface will rely heavily on motion and touch controls. The rumor gained more traction following claim made by Walter Isaccson in Steve Jobs’ biography that the late Apple CEO would ‘like to create an integrated television set that is completely easy to use’ that would ‘ seamlessly synced with all of your devices and with iCloud. ‘Jobs also claimed to have ‘finally cracked’ the user interface problem to make the whole package easy to use.
Here comes few Doubts:-
  • Outside of the iOS platform (iPhone and iPad), Apple isn’t known as a gaming company.
  • A TV with a built-in voice and motion controller and a games console? How much is this thing going to retail for exactly?
  • The games console market is tightly stitched up by Microsoft, Sony and Nintendo. Breaking into this new market would be extremely difficult.
  • Valve does have a portfolio of Mac games, but not enough to create a new ecosystem for a games console.
  • Apart from branding, what differentiates an Apple games experience from PC/Mac/Xbox 360/PS3?
  • Wouldn’t it make more sense for Apple to bring iOS games into the living room through an updated Apple TV set top box? There’s a massive ecosystem of games here ready to exploit, along with a healthy developer base.
  • That said, folks who own an iPhone/iPad and an Apple TV device can use AirPlay to put games on any HDMI-enabled TV without the need for an Apple-branded TV or an Apple-branded games console. Where does a console fit into the picture?

-Source (Cut of Mac, Forbes, Rumor) 





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Malicious Android Application Stealing User Data & Personal Information

Malicious Android Application Stealing User Data & Personal Information 

Yet again security vulnerability found in Android application. An information security company has warned about malicious Android smartphone applications that steal and transmit personal data, such as contact information stored in users' address books. The company said these types of free applications have been downloaded up to 270,000 times, indicating that potentially millions of people have had their personal information stolen. An Internet security expert said, "It's possible that creating applications that transmits users' information without consent can be considered a crime under the Penal Code, which criminalises the creation of computer viruses." The malicious application only has three buttons: Steal SD Card Contents, Steal App Data, and Upload Identifying Data.Every application has at least read-only access to the contents of this external storage. No Permissions scans the /sdcard directory and returns a list of all non-hidden files. All the files discovered can be fetched. The worrying part is that the SD card usually stores some of our most private files, including photos, backups, external configuration files, and, in some cases, even Open VPN certificates.
According to NetAgent, a Tokyo-based information security company, the applications were disguised as video tutorials for popular games on Google Inc.'s Android operating system. The applications were named by affixing the expression "the Movie" to existing game titles. The company found at least 16 of these applications.
The company's analysis revealed that when these applications are activated, they can automatically transmit not only a person's telephone number, their e-mail address and the phone's ID number, but also the personal names, telephone numbers and e-mail addresses of contacts stored on the smartphone's address book. Although the creators of these applications aren't well known, the stolen information was sent to the same domestic server. When users download the malicious applications, a message pops up on the display screen requesting permission for access to contact information. What ever the malicious application was immediately deleted from Android market. For additional information click here.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Department of Homeland Security & U.S. Navy Hires Company To Hack Into Video Game Consoles

Department of Homeland Security & U.S. Navy Hires Company To Hack Into Video Game Consoles 

The U.S. government has hired a California-based company to hack into video game consoles, such as Xbox 360 and PlayStation 3, to watch criminals, especially child predators, and learn how to collect evidence against them. The $177,000 contract with Obscure Technologies of San Rafael, Calif., is being executed by the U.S. Navy on behalf of the Department of Homeland Security because of the Navy’s expertise in the field, officials said. Under the contract, Obscure Technologies will purchase used gaming systems from abroad that are believed to hold “sensitive information from previous users” and try to hack into them. Obscure’s experts will then report back on how they gained access to the systems, provide instructions to obtain users’ chat room activity, and even report back on the data gleaned, according to the contract and tasking documents. Obscure will also purchase new systems and construct a device that can capture data and activity, the documents state.
Over the past few decades, video game systems have grown in sophistication and capabilities by leaps and bounds. Consoles like the Nintendo Wii, Sony PlayStation 3, and Microsoft Xbox can be found in many U.S. households and are popular among servicemembers, with Internet access and hard drives that rival personal computers.
With these advances, Garfinkel said, the systems have become a playground of illegal activity for criminals. In 2008, law enforcement agencies contacted the DHS’s Science and Technology Directorate and requested help in analyzing gaming systems seized during court-authorized searches, Garfinkel said. While some tools exist to extract data from gaming consoles, the consoles are hard to crack as they are designed with copyright protection systems, he said. Navy and DHS officials declined to comment on whether the gaming consoles of Americans will ever be hacked and monitored. They also declined to comment as to whether the system manufacturers had been approached about this research.


-Source (Stars & Stripes)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Microsoft Planned To Release Skype Application For Windows Mobile

Microsoft Planned To Release Skype Application For Windows Mobile
Microsoft Corporation has planned to release Skype video-calling application for its Windows Phone. The application will be avalable on April this year. Terry Myerson, head of the Redmond, Washington-based company’s mobile business, said in an interview last week. It will unveil the software today at the Mobile World Congress in Barcelona, Spain, and release a version for beta testers. Terry Myerson, head of the Redmond, Washington-based company’s mobile business, said in an interview last week. It will unveil the software today at the Mobile World Congress in Barcelona, Spain, and release a version for beta testers.
Microsoft bought Skype to gain customers and enhance its existing products -- such as Windows phones and Xbox game consoles, along with Internet-calling and videoconferencing software. Skype customers made more than 300 billion minutes of calls last year, Microsoft Chief Executive Officer Steve Ballmer said in January. The service, which handles both voice and video calls, is the top provider of international calling. Windows Phone has just 2 percent of the mobile operating- system market, and lags behind Apple Inc. and Google Inc. in providing apps. Both those rivals already have Skype apps.
Microsoft bought Skype to gain customers and enhance its existing products -- such as Windows phones and Xbox game consoles, along with Internet-calling and videoconferencing software. Skype customers made more than 300 billion minutes of calls last year, Microsoft Chief Executive Officer Steve Ballmer said in January. The service, which handles both voice and video calls, is the top provider of international calling.
Windows Phone has just 2 percent of the mobile operating- system market, and lags behind Apple Inc. and Google Inc. in providing apps. Both those rivals already have Skype apps.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Mac OS X 10.8 Mountain Lion Developer Preview Released By Apple

Mac OS X 10.8 Mountain Lion Developer Preview Released By Apple


Apple released a developer preview of the next major release of its operating system named Mac OS X 10.8 Mountain Lion. If you are a registered Mac developer then you can test the new flavor of Apple. Not to mention in this release Apple has added lost of charming features among them Gatekeeper is really handy one at leat from security point of view. Apple says gatekeeper will "help prevent you from unknowingly downloading and installing malicious software". Some of other features included by apple are iCloud, AirPlay Mirroring, Messages, Reminders, Notification Center, Share Sheets, Twitter Integration, Game Center and so on.
Brief About Gatekeeper:-
The Gatekeeper feature has three levels of security for running applications downloaded from the Internet; "Mac App Store", "Mac App Store and identified developers" and "Anywhere". The first setting only runs applications downloaded from the Mac App Store, in a style similar to the iPhone only running apps from the App Store. Unlike the iPhone though, Gatekeeper lets users allow applications from other sources. The "Mac App Store and Identified Developers" option only allows applications from the store and from developers who have signed their program with an Apple-issued Developer ID, while "Anywhere" allows any program to be downloaded and run. It is unclear how Gatekeeper interacts with software loaded from other media, such as a USB memory stick or CD/DVD.

For More Information & To Download Mac OS X 10.8 Mountain Lion Developer Preview Click Here


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Microsoft Shutdown Fake Domain Of Halo 4 Beta

Fake Domain Of Halo 4 Beta Shutdown By Microsoft 
We know that you all are very familiar with one of world's famous game Halo. Since few months some cyber criminals started a fake domain for Halo. It was Halo4beta.net but today Microsoft has unleashed its finest legal hounds against the owners of the domain name Halo4beta.net. 

The move comes after David Ellis, creative director of 343 industries, through his Twitter account warned that this website, which claims to allow sign up for Halo 4 beta, is fake. Apparently Microsoft has filed a complaint with the National Arbitration Forum. But the operator appears to have shut down the website. It looks like Microsoft did not consider the move enough and is starting to apply the legal thumbscrews. Most people think that Microsoft will be successful in pursuing the National Arbitration Panel to order the transfer of the name. In June 2011 Microsoft acquired the domain name Halo4.com paying an undisclosed amount. Halo 4 will be in the shops for the Xbox 360 by the end of 2012.


-Source (FudZilla)




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

EA Official Forum Hacked !!

EA (Electronics Art) Official Forum Hacked  
Few days ago famous first person shot game Battlefield 3 server get hacked and also in that attack the hacker exploited the server security system in such a way that any one Can Play online without Using EA's digital distribution platform. After that once again famous game developer EA faced cyber attack. The home page of the EA official forum get hacked. According to EA authority the hacker exploited a vulnerability and gained access. Later the fixed the loophole also EA confirmed that user informations are safe and nothing get comprised in the attack. Dan Sheridan, Marketing Manger EA addressed the community to give some assurance to users by saying:  
“As some of you noticed, the homepage of the forums was defaced by a hacker yesterday using a very new exploit for the software which runs the forums. This was noticed quickly and we took the action to take the forums offline while we investigated the details. This work is now complete, and the vulnerability we believe was used has now been fixed. There is no evidence that any personal data was compromised, and as passwords aren’t stored in a recoverable manor, we are confident they remain secure.
Thank you for your patience whilst the forums were offline and we took the necessary steps to investigate this.”

Earlier lots of other gaming giant faced such cyber attack for example Square Enix, Star Wars Galaxies, MapleStory, and so on.


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Malware Named "Gameover" Targeting Bank Accounts


Another malware named "Gameover" is targeting bank accounts via phishing emails. Cyber criminals have found yet another way to steal your hard-earned money: a recent phishing scheme involves spam e-mails—purportedly from the National Automated Clearing House Association (NACHA), the Federal Reserve Bank, or the Federal Deposit Insurance Corporation (FDIC)—that can infect recipients’ computers with malware and allow access to their bank accounts.
The malware is appropriately called “Gameover” because once it’s on your computer, it can steal usernames and passwords and defeat common methods of user authentication employed by financial institutions. And once the crooks get into your bank account, it’s definitely “game over.” Gameover is a newer variant of the Zeus malware, which was created several months ago and specifically targeted banking information. Few days ago Ramnit worm did the same thing. It steals more than 45K Facebook Login details not only that but also more than 250K PC has been infected by Ramnit worm. It clearly showing that the rate of this cyber threat is going high and high. 

How The Gameover Malware Is Working:- 
Typically, you receive an unsolicited e-mail from NACHA, the Federal Reserve, or the FDIC telling you that there’s a problem with your bank account or a recent ACH transaction. (ACH stands for Automated Clearing House, a network for a wide variety of financial transactions in the U.S.) The sender has included a link in the e-mail for you that will supposedly help you resolve whatever the issue is. Unfortunately, the link goes to a phony website, and once you’re there, you inadvertently download the Gameover malware, which promptly infects your computer and steals your banking information.
After the perpetrators access your account, they conduct what’s called a distributed denial of service, or DDoS, attack using a botnet, which involves multiple computers flooding the financial institution’s server with traffic in an effort to deny legitimate users access to the site—probably in an attempt to deflect attention from what the bad guys are doing.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Square Enix Server Hacked, More Than 1.8 Million Gamers Accounts Compromised


Square Enix the famous franchise for the Final Fantasy and Dragon Quest compromised. The Square Enix Authority reported that a hacker gained unauthorized access to one of their servers thus the attacker managed to access the personal information of 1.8 million gamers in the US and Japan. Though the company spokes man claimed that no credit card information was compromised in this attack. The video game industry has been the target of several hacker attacks this year. Few days ago 13 million MapleStory players personal data was also stolen. It was one of the largest cyber attack happened in South Korea. Earlier such phenomena took place in Sony PSN breaching case, there more than 93K user details ware compromised
In an exclusive report it is demonstrated that  the target of the attack was a free fan site called Square Enix Members. Officials at Square Enix noticed the unauthorized access on December 12 and subsequently shut the site down to investigate. Members of the site register using their email addresses but some enter additional information like names, addresses and phone numbers. A spokesperson for Square Enix said no credit card information is stored on the server.
Those affected include 1 million users from Japan and 800,000 gamers in the US. As of writing, the Square Enix Members site remains offline, instead redirecting visitors to a page explaining the breach and actions the company is taking moving forward. The message indicates that the suspension will continue for a few days until the security team completes their investigation and counter-measures are in place.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...