JailbreakMe Security Flaws Will be Patched by Apple


Shortly after the JailbreakMe hack that uses Mobile Safari to jailbreak iPhones, iPads and the iPod touch hit the Web, Apple announced that it will be patching the potential security flaw the hack takes advantage of, according to Yahoo! Finance
Jailbreaking is a process that hacks iOS so third-party apps that aren’t available through Apple’s iTunes-based App Store can be installed. Unlike other jailbreak tools, JailbreakMe doesn’t require a computer to handle the hacking process. Instead, users only need to go to the JailbreakMe Web site on their iPhone, iPod touch or iPad, and the security flaw the hack takes advantage of is exactly what Apple plans to patch. 
While patching the flaw will take away the ease of use that JailbreakMe offers, it will also block a security flaw that could potentially be used for more nefarious deeds. The flaw takes uses specially crafted PDF documents to install software on user’s iOS devices, potentially without their permission or knowledge. So far, there aren’t any reports of malicious uses of the flaw, only the JailbreakMe hack.
Bethan Lloyd, a spokesperson for Apple, said the company is “aware of this reported issue and developing a fix that will be available to customers in an upcoming software update.” There isn’t any word yet on when to expect the security update to be released

-News Source (Mac observer)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

SQLNinja v0.2.6-rc1

Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote access on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a DB Server when a SQL Injection vulnerability has been discovered.
 
What is New In SQLNinja v0.2.6-rc1
  • Added ICMP shell
  • Added support for CVE-2010-0232 (KiTrap0d)
  • Added header-based injection
  • Removed conf file autogen (unsuited to new way to configure injection)
  • Bug fixes


This release is basically an official release with all the new features that have been in the SVN for a while. More specifically, it adds support for CVE-2010-0232 that escalates the sqlsrvr.exe process to SYSTEM privileges and the essential ICMP shell!

Download SQLNinja v0.2.6-rc1 (sqlninja-0.2.6-rc1.tgz) Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Motorola’s Latest Phone will no loger be Friendly With Hackers


For phone modification junkies, the Android software platform comes with a host of mod-friendly features. It’s too bad, then, that Motorola’s latest Android phone lacks all of them.
Motorola’s Droid 3 features a locked boot loader, which is a program that loads the operating system software on every smart phone when it’s turned on. The company said it planned to change the policy this year.

The news first came from a Motorola support forums representative.

“As we’ve communicated, we plan to enable the unlock-able/re-lockable bootloader in future software releases, starting in late 2011, where channel and operator partners will allow it,” said a Motorola spokesperson in a statement provided to Wired.com. “DROID 3 is not built on a software version that includes this feature.”

Locking down the bootloader is a big pain for those who want to modify their Android phone operating systems. Essentially, it drastically limits the extent of modification and customization you can accomplish on your phone. If you wanted to install a particularly popular piece of modding software like, say, CyanogenMod — a very popular custom Android build that optimizes a phone’s hardware performance and adds a number of nifty flourishes — with a locked bootloader, you’re out of luck.

In today’s smart-phone landscape, handset manufacturers face pressure from wireless carriers like Verizon and AT&T to lock down phone boot-loaders. This is done especially to prohibit the potential installation of software used to do things that carriers don’t want you doing, like, say, capture licensed streaming content. There’s also software available that lets you tether your phone to your computer (providing it with an internet connection) for free, a feature for which wireless companies normally charge users. Bypassing that charge means cutting into a carrier’s bottom line.

Motorola doesn’t want to deal with the tech support nightmare that widespread phone hacks entail. “If you brick your phone messing with it” — which basically means rendering the device useless (like an electronic “brick,” as it were) — “we don’t want to have to fix it under warranty,” a Motorola representative wrote in a message board post.

Because of all this, hacker-unfriendly phones aren’t uncommon. Motorola’s Atrix debuted with a locked boot-loader, as have many of the company’s phones since the release of the Droid 2. Motorola’s upcoming Photon 4G smart-phone will also be locked down.

Android modification junkies aren’t happy about Motorola’s decisions. In March, one Motorola smartphone owner started an online petition, asking others who don’t agree with the company’s locked bootloader decisions to sign and bring up the issue on Moto’s Facebook page. As of this post’s publishing time, the petition has over 10,000 signatures.

Given the hardware specs on the Droid 3, it’s especially disappointing for hackers to see the phone debut as mod-unfriendly. The Droid 3 has a beefy dual-core 1GHz processor under the hood, which when used in conjunction with modding software, can be overclocked to faster speeds.

The future isn’t entirely grim for phone hackers. Motorola continually promises a change in locked bootloader policy come late-2011, and other companies like Sony Ericsson have even begun to court the modding community, providing a detailed list of instructions on how to unlock the company’s phones.

It seems as if the predominant feeling is: We’ll believe it when we see it.

“There’s not a single reason to believe that Motorola has truly changed their views,” wrote an angry Motorola message board user in a post. “We’re not saying you have to unlock all our devices now, but a little sign of good faith would be much appreciated.”

-News Source (Gadget Lab)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Exposed full Details of IRCFederal.com


Hacker group Anonymous Exposed full details and sensitive data of IRCFederal 

According to Anon:-

"Today we release the ownage of another government-contracted IT company, IRC Federal. They brag about their multi-million dollar partnership with the FBI,
Army, Navy, NASA, and the Department of Justice, selling out their "skills" to the US empire. So we laid nuclear waste to their systems, owning their pathetic windows box, dropping their databases and private emails, and defaced their professional looking website.
In their emails we found various contracts, development schematics, and internal documents for various government institutions including a proposal for the FBI to develop a "Special Identities Modernization (SIM) Project" to "reduce terrorist and criminal activity by protecting all records associated with
trusted individuals and revealing the identities of those individuals who may pose serious risk to the United States and its allies". We also found
fingerprinting contracts for the DOJ, biometrics development for the military, and strategy contracts for the "National Nuclear Security Administration
Nuclear Weapons Complex".
Additionally we found login info to various VPNs and several Department of Energy login access panels that we are dumping *live* complete with some URLs
to live ASP file browser and upload backdoors - let's see how long it takes for them to remove it (don't worry we'll keep putting it back up until they pull
the box ;D)
 
Before we begin the drop, a personal message to the employees of IRC Federal:
 
If you place any value on freedom, then stop working for the oligarchy and start working against it. Stop aiding the corporations and a government
which uses unethical means to corner vast amounts of wealth and proceed to flagrantly abuse their power. Together, we have the power to change
this world for the better.
 
“He who passively accepts evil is as much involved in it as he who helps to perpetuate it.” –Martin Luther King, Jr.
 
Props to our black hat and antisec comrades: bantown, dikline,
h0no, phrack high council, ~el8 and all you kick-ass motherfuckers
we've never even heard of. Thank you...."

For More Details Click HERE

You May also Download this torrent file 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

More than 808 Indian Websites Defaced By ZHC(ZCompany Hacking Crew)


ZHC TOSHIRO & ZHC MONGOOSE from ZHC(ZCompany Hacking Crew) defaced more than 808 Indian Websites. They Gave message to the Higher Authority 

"...stop killing innocents in Kashmir.
Women are being raped in Kashmir everyday and the man are being brually beaten and sometimes
killed by the Indian Police Force. Kashmir want freedom! Freedom from the evil of the Indian Military!
                          We won't stop until we have the freedom!
                         who are the real soldiers? the childs holding stones
                            or the Army men holding guns?"

To View The Defaced Sites Click HERE

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

ANONYMOUS Shuts Down Ministry of Education Website

Hacker Group ANONYMOUS Shuts Down Ministry of Education Website.The Chile’s education  related sites “mineduc.cl” “convivenciaescolar.cl” “mineduc.gov.cl” “ayudamineduc.cl” “becapres.gob.cl” “divesup.cl sies.cl.” have been shut down. Some, like the Chilean Ministry of Education website have been able to come back online, but are soon shot back down by the hackers.
The “MalEducados” cyber-operation follows several weeks of student protests in Chile, offering them online suppor students protesting for better access to education.  They have been protesting for several months. Anonymous has announced via the facebook profile of “Operation Storm of the South,” a profile that had been used in the past to publish announcements, and call for support. “The “MalEducados” operation is born as a consequence of the absolute ineptitude of the Latin American governments to watch over the fundamental human right to an education and the free access to knowledge,” the organization wrote. “We wish to adhere to the protests of Chilean students for a quality and free education. The Chilean government can’t continue allowing and much less encouraging the profiting from the people’s education.”


-News Source (Hispanically Speaking News)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Again WikiLeaks Shuts Down Visa Card Payments

The brief, accidental lull in the fighting between WikiLeaks and the card companies that refuse to allow the group donations has ended. After WikiLeaks announced Thursday that a “workaround” had appeared for those hoping to contribute to the group via credit card, Visa has moved to shut down that channel and reinstitute the card companies’ financial blockade of the secret-spilling group. Payments to WikiLeaks from all card companies have been blocked again since early Friday, according to Sveinn Andri Sveinnson, an Icelandic lawyer for WikiLeaks and its payment gateway DataCell. More than six months after the Danish payment processor Teller shut down Visa and MasterCard payments to WikiLeaks at the card companies’ request, DataCell had made a new contract with the Icelandic processor Valitor,which unbeknownst to Visa allowed payments to WikiLeaks.

“When we signed this contract, it was clear to Valitor that this was for WikiLeaks donations, and they assented,” says Sveinnson. “Visa was saying that they hadn’t ended their financial blockade but people could see they could make payments. So it was very embarrassing for Visa and very hilarious.”

But Visa, which has claimed that WikiLeaks may violate its terms of service for encouraging illegal activity, didn’t find the situation so funny. It quickly shut down that new line of payment, pressuring Valitor to end its relationship with DataCell and WikiLeaks Friday morning. A spokesperson for Visa confirms in a somewhat convoluted statement that “An acquirer briefly accepted payments on a merchant site linked to WikiLeaks. As soon as this came to our attention, action was taken with the suspension of Visa payment acceptance to the site remaining in place.”

That means all card payments to DataCell and WikiLeaks–including MasterCard and American Express–are blocked again, says Sveinnson.
DataCell chief executive Andreas Fink told Bloomberg News that in the brief window in which WikiLeaks could receive credit card donations, it amassed “five-to-six digit figures” in contributions.
WikiLeaks and DataCell had been planning to file a complaint Thursdaywith the European Union Commission against Visa, MasterCard, and the Danish payment processor Teller. Sveinnson said they held off on filing that complaint after it seemed the card companies might have reopened payments. Now Sveinsson says they will go ahead with their complaint against the card companies early next week, and will file an additional protest against Valitor with the Icelandic Financial Authority.

“Now we’re back to the same position,” says Sveinnson. “It’s a strange world we live in.”

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...