TANGO DOWN brasil.gov.br & presidencia.gov.br by LulzSec



Hacker group LulzSec said it has taken two Brazilian government Web sites offline. The sites Brasil.gov.br and Presidencia.gov.br were both unavailable as of the time this story was written
"TANGO DOWN brasil.gov.br & presidencia.gov.br LulzSecBrazil", LulzSecBrazil tweeted in the early hours of Wednesday morning.
The outage, which probably stemmed from a distributed denial-of-service (DDoS) attack, follows the arrest yesterday by the Metropolitan Police's Central e-Crime Unit of a 19-year-old man who they suspect is involved with the group.
LulzSec has denied that the individual, who it names as Ryan Cleary, is part of the group.


"Ryan Cleary is not part of LulzSec; we house one of our many legitimate chatrooms on his IRC server, but that's it," the group tweeted last night.

News Source (ZDNet UK)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

newpakarmy.com hacked by Ro0t_d3vil

Ro0t_d3vil hacked newpakarmy.com

Hacked site :-
http://newpakarmy.com/

Mirror link :-
http://www.zone-h.org/mirror/id/14236456

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Turnkey solutions Provider for wholesale knztelecom.com Hacked By Stage



Turnkey solutions Provider for wholesale knztelecom.com Hacked By Stage


Hacked Site:-
http://www.knztelecom.com/

Mirror link :-
http://legend-h.org/mirror/182791/knztelecom.com/

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Obama Proposes Anti-Hacking Laws



Hackers will face tougher penalties in the U.S. if the Obama administration's proposed cyber-security measures become law, in an attempt to deter attacks on critical online infrastructure.Under the new law, hackers would face 20 years in prison for endangering national security, 10 years for stealing data and three years for accessing a government computer.
The proposal doubles the penalties from current laws in nearly every category, responding with force to the spate of hacks that have made headlines this last month.The Obama administration first suggested the law last month, before the hacking group LulzSec broke into FBI, CIA and U.S. Senate websites. If prosecuted under the new law, its members could face hefty prison terms for flaunting national security.Compared to the anonymous hacks against Lockheed Martin and the International Monetary Fund, however, LulzSec's distributed denials-of-service, or DDoS, attacks against government websites were merely an annoyance.
Groups like LulzSec, who hack for the fun of it, may face the same sentences as serious data thieves under the cyber-security plan.
Either way, the trouble lies in catching computer hackers who use botnets and server mis-location to cover their tracks. Months after Sony's disastrous data breach left 100 million users' information exposed, Sony and the FBI still haven't found those responsible for the attack.
Tracking down "smoking keyboards" is not impossible, however, as Spain and Turkey proved by arresting members of the Anonymous hacking group. Spain's authorities captured three men accused of intending to publish "sensitive data" about Spanish politicians and policemen. Turkey nabbed 32 Anonymous hackers that had coordinated DDoS attacks against the Turkish government after the country announced plans to restrict Internet services starting this August.
Arresting hackers may deter some from attempting further exploits, but in Anonymous' case the group's loose-knit organization means hundreds of new hackers can rise to fill one member's shoes.
Furthermore, some hackers may have government backing, as IMF officials believe was the case in their hack and as Google alleges happened to them in China.If governments are indeed involved in some of the major recent hacks, things could get sticky, as the Pentagon is set to publish a policy to use physical force against online crime. As one official warned, "If you shut down our power grid, maybe we will put a missile down one of your smokestacks."
The difficulties of catching and prosecuting hackers seem nearly insurmountable. But the new law in the U.S. could encourage a reduction in cybercrimes if it makes an example of even a few.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Chrome-based Web security scrutinizer by Google



Google today released an open-source tool called DOM Snitch that tries to flag Web site software that would be dangerous to run in a browser.
The software is an experimental Chrome extension that examines how Web site code executes to see if commands could lead to cross-site scripting or other attacks used to deliver malware to computers via a Web browser.
DOM Snitch (download) "enables developers and testers to identify insecure practices commonly found in client-side code," said Google security test engineer Radoslav Vasilev in a blog post. He elaborated:
To do this, we have adopted several approaches to intercepting JavaScript calls to key and potentially dangerous browser infrastructure such as document.write or HTMLElement.innerHTML (among others). Once a JavaScript call has been intercepted, DOM Snitch records the document URL and a complete stack trace that will help assess if the intercepted call can lead to cross-site scripting, mixed content, insecure modifications to the same-origin policy for DOM access, or other client-side issues.
The move is one of many Google has made of late to improve security on the Web--a medium the company believes is the programming platform of the future and that holds a dominant role in its own business. The company also is working hard to improve Chrome's own security.
Other open-source Google security products include Skipfish and Ratproxy, which let people test the security of Web applications.
-NEWS  SOURCE (Cnet)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hackers are using Critical Flash Bug



Adobe said that the vulnerability, which it referred to by the identifier CVE-2011-2110 in its update, "could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being exploited in the wild in targeted attacks via malicious web pages." Last week, Adobe released a series of security patches for their products, fixing a number of issues that included this vulnerability. 



More recently, security company Websense has discovered that this vulnerability is being used in two separate forms of attack. This includes so-called drive-by attacks, where users need only to visit a site in order to be served malware. The other form is spear-phishing, a targeted phishing attack that attempts to lure an internet user into clicking a malicious link by claiming to come from a legitimate business. The vulnerability only exists in versions of Flash which have yet to be patched with the latest security update. Websense recommends that all users patch the latest version as soon as possible. "As always, it's crucial that you install the latest version of Adobe Flash Player as soon as possible if you haven't done so already. The vulnerable versions are any version older than 10.3.181.26," said the company.
Hackers are using a critical security vulnerability in Flash to attack users despite a recent update from Adobe designed to fix the bug. 


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Firefox 5 is now Available for Download after Fixing Some Serious Flaws


Mozilla released Firefox 5.0 that fixes several security issues, stability issues and introduces new features.
Privacy-aware users will be happy to learn that the Do-Not-Track header preference has been moved to increase discoverability.

The latest version of Firefox has the following changes:

  • Added support for CSS animations
  • Tuned HTTP idle connection logic for increased performance
  • Improved canvas, JavaScript, memory, and networking performance
  • Improved standards support for HTML5, XHR, MathML, SMIL, and canvas
  • Improved spell checking for some locales
  • Improved desktop environment integration for Linux users
  • WebGL content can no longer load cross-domain textures
  • Background tabs have setTimeout and setInterval clamped to 1000ms to improve performance.
Fixed in Firefox 5
  • It was possible for a non-whitelisted site to trigger an install dialog for add-ons and themes.
  • HTML-encoded entities were being improperly decoded when displayed inside SVG elements. This could lead to XSS attacks on sites relying on HTML encoding of user-supplied content.
  • Two crashes in WebGL code. One crash was the result of an out-of-bounds read and could be used to read data from other processes who had stored data in the GPU. The severity of this issue was determined to be high. The second crash was the result of an invalid write and could be used to execute arbitrary code. The severity of this issue was determined to be critical.
  • An image from a different domain could be loaded into a WebGL texture, and then each pixel could be rendered into a canvas element with a shader program, creating an approximation of the image in a form that was readable by the creator of the WebGL texture. This could be used to steal image data from a different site and is considered a violation of the same-origin policy.
  • When a JavaScript Array object had its length set to an extremely large value, the iteration of array elements that occurs when its reduceRight method was subsequently called could result in the execution of attacker controlled memory due to an invalid index value being used to access element properties.
  • A crash on multipart/x-mixed-replace images due to memory corruption.
  • Under certain conditions, viewing a XUL document while JavaScript caused deleted memory to be accessed. This flaw could potentially be used by an attacker to crash a victim's browser and run arbitrary code on their computer.
  • Several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products have been fixed. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.

Click Here to Download

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...