Earlier in January, the FBI agents have performed searches of more than 40 residents across the U. S., however, no arrest results were announced following those searches. Afterwards, a team of investigators from the Federal Bureau of Investigation have raided a natives’ home in Hamilton, suspected as a member of hacker group LulzSec . However, the FBI Spokesman has refused to utter any further details while confirming the search. Sources have claimed that arrested man is an alleged LulzSec member.
Additionally, British Police in collaboration with FBI have made around seven arrests, this particular year, including 19-years-old Ryan Cleary followed by LulzSec. During the last week, the prosecutors have charged him with five different cyber offences when authorities accused him for infecting computers as an attempt to establish a computer network, botnet, and make its use to launch online attacks against various websites including Serious Organised Crime Agency, organization similar to FBI.
It was only yesterday whenSkype 2.0 for Android was released, but the latest version of the popular instant messenger has already been hacked to allow video calls to be made over Wi-Fi or 3G/4G usingnon-supported devicesas well. Thanks to that, it is not onlyGoogle Nexus S,HTC Desire S,Sony Ericsson Xperia neoandXperia proowners who can enjoy Skype's newly-added and long-anticipated feature. The hacked Skype 2.0 version has been intended to run on theSamsung Galaxy S II, and our test showed that it works without a hitch. However, the program has been successfully tried out on a number of other smartphones and tablets. So far, the list of devices that reportedly run the unofficial Skype
Users of Sina Weibo, the Chinese Twitter alternative, were targeted by a cross-site scripting (XSS) worm spreading through a vulnerability on the micro blogging site.
With over 140 million users, Sina Weibo is the most popular social networking site in China, a country where both Twitter and Facebook are banned. The site's administrators announced that an worm exploiting an XSS weakness hit the platform on Tuesday evening. The worm propagated through messages that lured users with videos, pictures and software. For example some advertised bloopers from a new film, while others nude pictures of Chinese actress Fan Bingbing. Clicking on the included links forced users to re-post the spam messages from their own accounts, therefore helping the worm spread.
The attack was apparently launched from an account called @hellosamy, a name possibly chosen as a tribute to the Samy (Spacehero) worm released on MySpace back in 2005.
The work of security enthusiast Samy Kamkar, Spacehero was the first large-scale worm to spread on a social network by exploiting a cross-site scripting vulnerability and paved the way for many similar attacks that have occurred since then.
There is barely any social network left that hasn't been affected by such a worm. Some of them have had to deal with such problems multiple times and on some occasions the attacks distributed malware or spam.
There doesn't seem to have been any malicious component behind the Weibo worm, though, except for its spreading mechanism.
When such attacks happen if webmasters are not quick enough there is a high risk that the worms will mutate as other users modify the code and launch their own versions. In this case, the Weibo staff plugged the hole in around one hour, which is a rather long time for such an attack.
The latest spoof on a classic MasterCard ad campaign comes from one of the credit card company’s best known adversaries. “There are some people who don’t like change,” ends theshort videothat was recently posted to Vimeo. “For everyone else, there’s WikiLeaks.”
On-screen text encourages people to learn more about the financial blockade that a number of major financial institutionsannounced they would instatein December. According to the video, these companies’ refusal to process any of WikiLeaks’s payments has cost the group $15 million in lost donations. “What do MasterCard, Visa, Bank of America, Paypal and Western Union all have in common?” reads the video’s description.”They help you pay for what you want? Well, yes… that is unless you want to help WikiLeaks make the world a better place.”
Wikileaks founder Julian Assange, who has been under house arrest in Britain since December when Sweden issued anextradition requeston accusations of sexual misconduct, makes a cameo appearance. By its own calculations, WikiLeaks is spending $500,000 on his house arrest and $1 million in legal fees. The video directs supporters toward alternate donation methods (some of these methods,The Atlanticpoints out, do not support WikiLeaks’s greater goals, but rather Assange’s legal expenses). Because, it argues, “change as a result of your work: priceless.”
Click HERE to See The Video On Vimeo Posted By Wikileaks
Whenever you buy a laptop lock you expect it to do just that, lock your laptop in place to make sure it doesn’t get stolen. And if you are going through the trouble of actually buying and using the lock, it’s pretty safe to assume that whatever information is on that laptop is pretty important to you and worth locking up. So imagine the surprise laptop users got when they found out that their secure laptop locks can be opened in about 15 seconds with a simple screwdriver. That’s right, only 15 seconds without any sophisticated techniques or tools required. All there is to penetrating the security of these locks is a simple tapping of a plastic screwdriver’s handle on the correct point of the lock.
Security expert Marc Tobias demonstrates for us just how insecure most of these laptop locks really are, particularly Hewlett Packard’sBV411AAandBV411UTmodels that sell for up to $40. Watch the attached video to see Marc Tobias in action.
Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.
What Is new In Version 0.58:-
The Hive (registry viewer) features three new reports: email accounts, TCP/IP interfaces, and computer descriptions. All registry reports can be exported as CSV and the user password… report can be exported in a format suitable for John the Ripper as well.
Six news registry reports were added: user assist, recent docs, product keys, O.S. folders, user logon info, and computer info.
A small bug in the startup code is fixed
The Hive Report features 8 new registry reports: installed programs, storage devices, optical devices, network adapters, video adapters, imaging devices, monitor devices, and user passwords.