28 Important Websites of India Hacked By ZCompany Hacking Crew (ZHC)

28 important Indian websites including Software Company, Marketing, Business, Indian National Science Academy, Financial Studies University of Delhi Hacked by ZCompany Hacking Crew (ZHC)
Hacked Sites:-

Indian Testing Board (ITB) is the International Software Testing Qualifications Board (ISTQB) 

Alpha Capital provides Multi Family Office , 
Management , Private Wealth Management , Family Office , 
Private Banking , Financial Advisor

Asia's Largest Collection of Antique Carpets in Delhi and India.



Indian National Science Academy, INSA, National Science, Indian Science, 
Fellowship, FNA, international Science


CPAI endeavors to put forth new & innovative ideas for smooth functioning 
and the growth of the commodity market operations

Department of Financial Studies : University of Delhi, South Campus
Offers a masters program in finance and control. Information about the department, programs, 
admissions, faculty, alumni and placements.


Mirror links:-

 

According to The ZHC officials, this is their Message:-  

"..Free Kashmir .. Freedom is our goal..// End the Occupation. . . .

This institutionalised impunity with which the killings of civilians by military and police forces in Jammu and Kashmir continues should be a source of shame for India which propagates to be a democracy!
Kashmir does not want militarized governance - STOP killing children, raping women and imprisoning the men! They just want freedom! Freedom from the evil of the Indian Military!
You will never kill the Kashmiri spirit and remember one thing India; Ghandi himself said - Freedom is never dear at any price. It is the breath of life. What would a man not pay for living?
Everyday 100s of innocent people are abused, raped and even killed in kashmir by the indian army, a third of the deaths are children, - we dont want war, take back your men, your tanks and your guns and go back to where you came from, all we ask is for freedom, you can kill us but you cant kill us all, we shall not give up, giving up is not an option.
who are the real soldiers? the childs holding stones or the Army men holding guns?..."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

BTCrack (Bluetooth PIN Bruteforcer Tool)


BTCrack is the worlds first Bluetooth Pass phrase (PIN) bruteforce tool! It works by reconstructing the PIN and link key with data sniffed during a pairing exchange. The calculated PIN can then be used to authenticate against a device in pairing mode. During a normal bluetooth pairing process, the two devices involved establish a relationship by creating a shared secret known as a link key. If you gain access to the link key, almost everything is possible! You can passively decrypt the traffic between the two devices or, connect to the Slave device pretending to be the Master and have full access and the other way round by connecting to the master pretending to be one of the slaves only to have full access. Even better, you could just pair with a bluetooth capable machine and have a remote encrypted stealth channel to that machine!
Whats more is that BTCrack also supports the Field-programmable Gate Array (FPGA). This makes it a bit faster than it’s previous versions. BTcrack was actually demoed and realeased at Hack.lu 2007 and 23C3 in Berlin. So yes, it has been a good 4 years since it’s inception.

The only problem is that if you want to capture the pairing data it is necessary to have a professional bluetooth analyzer. BTCrack comes in two versions – one for Windows and the other open source version for *NIX operating systems. On a normal P4 2Ghz Dual Core machine, you can achieve cracking speeds of upto 200.000 keys/sec. If you have a FPGA compliant device like a FPGA E14, then you can even crack at a speed of about 30.000.000 keys/sec!

Download BTCrack 1.1 (btcrack.zip) {For Windows}  here
Download the open source Linux port – BTCrack OSS (BTCrack_OSS.tar)
here.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

New Xbox 360 Media Remote & Wireless Bluetooth Headset


In Microsoft’s quest to take over the living room, they have announced two new media devices that will make interactions with the Xbox 360 more convenient.
The ongoing success of Microsoft’s Xbox 360 is partially due to the console’s performance as an all around media device. Gaming is definitely the number one focus, but other services make it attractive to non-gamers and casual players too. With uses outside of gaming in mind, Microsoft has revealed a new Media Remote and Wireless Bluetooth Headset that will be available for the Xbox 360 this fall.
The Media Remote will allow Xbox 360 owners to use a more traditional input device when operating their console for DVD, CD, and other media playback uses. The easy-to-use device will contain all the necessary buttons to navigate the Xbox 360 Dashboard, as well as all of the expected media playback controls. Additionally, the media remote will interface with most TVs and have the ability to power the TV on/off, adjust the volume, and change the TV’s input.
Clearly, Microsoft is pushing the Xbox 360 as the perfect device to have in one’s living room as an all around media center (sorry, no Blu-ray). This goes right along with the additional content such as YouTube and UFC – joining popular services like Netflix and Hulu Plus – announced during this year’s E3.
The remote is convenient, but I’m not sure how many people will want to pay for something that is such a minor convenience. I’ve never found using a Xbox 360 controller and TV remote in tandem annoying, or wished for a simpler solution.
The second accessory, a wireless headset with Bluetooth, is yet another device that integrates the Xbox 360 experience with other popular electronics. With the Bluetooth headset, gamers can both chat with their friends online, and easily switch over to answer calls from their mobile phone with the flip of a switch. The headset works with nearly all Bluetooth enabled devices and “Blue and green LED rings of light visually show which mode the device is in.” There are three sizes of ear gels and an ear loop to ensure the device remains comfortable throughout long gaming sessions. This new design is sleeker than the other Xbox 360 wireless headsets and certainly more practical than a wired headset.
It is interesting to see Microsoft further pursuing accessories that support the notion that the Xbox 360 is the best all around media device for the living room. The hurdle for each device will be whether consumers think the added convenience is worth the cost.
What do you think about these devices? Are they worth the money?

The Xbox 360 Media Remote and Wireless Bluetooth Headset will be available sometime in November, 2011 for $19.99 and $59.99 respectively.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Skype 5.5 (With Deeper Facebook Integration)


Skype has released the latest update to its online calling software for Windows, offering more options for Facebook users.
Officially out of beta since Wednesday, the latest Skype 5.5 for Windows lets you check which of your Facebook friends are online and available to chat, all without having to leave Skype. Simply clicking on the View menu in the Skype software and then choosing Facebook Friends shows you the list.
By clicking on and then closing the Skype Home screen, you can also update your Facebook status and scroll down to view your entire Facebook wall.
Beyond the Facebook integration, Skype says that its latest version offers improved controls for video and group calls for Windows, better call reliability, and various design changes in the interface.
Once it was installed, you will be able to use Skype 5.5 to view online Facebook friends, access wall, and post status updates just as easily as one could in Facebook.

To Download Skype 5.5 click Here
For More information about Skype 5.5 click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Facebook Launches Security Bug Bounty


Facebook is set to announce today a bug bounty program in which researchers will be paid for reporting security holes on the popular social-networking Web site.
Compensation, which starts at $500 and has no maximum set, will be paid only to researchers who follow Facebook's Responsible Disclosure Policy and agree not to go public with the vulnerability information until Facebook has fixed the problem.
Facebook Chief Security Officer Joe Sullivan told that "Typically, it's no longer than a day" to fix a bug,

Facebook's Whitehat page for security researchers says: 

"If you give us a reasonable time to respond to your report before making any information public and make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service during your research, we will not bring any lawsuit against you or ask law enforcement to investigate you."

The compensation program is a good way to provide an incentive and show appreciation to the research community for helping keep Facebook safe for users, according to the company's security team. Up until now, researchers received recognition on the Facebook Whitehat page, maybe some "swag," and--if they were lucky--a job.
"Some of our best engineers have come to work here after pointing out security bugs on our site," like Ryan McGeehan, manager of Facebook's security response team, said Alex Rice, product security lead at Facebook. (Facebook also recently hired famed iPhone jailbreaker and Sony PlayStation 3 hacker George Hotz, who works on security issues.)
Meanwhile, Facebook is allowing security researchers a way to create test accounts on Facebook to ensure they don't violate terms of use or impact other Facebook users, Rice and McGeehan said.
Facebook is following in the steps of Mozilla, which launched its bug bounty program in 2004, and Google, which offers a bug bounty program with payments ranging from $500 to more than $3,000 for finding Web security holes, as well as a program specifically for Chrome bugs.
Microsoft has offered bounties of $250,000 for information leading to the arrest of virus writers, but does not pay researchers who find bugs in its software. However, other companies do, like TippingPoint's Zero Day Initiative.
Researchers typically are paid more for finding bugs in desktop software, which can take much longer to fix and to update software on computers than bugs in Web-based software, which can be fixed much more quickly.

According To FACEBOOK:- 

Eligibility
To qualify for a bounty, you must:
  • Adhere to our Responsible Disclosure Policy:
    ... give us a reasonable time to respond to your report before making any information public and make a good faith effort to avoid privacy violations, destruction of data and interruption or degradation of our service during your research ...
  • Be the first person to responsibly disclose the bug
  • Report a bug that could compromise the integrity or privacy of Facebook user data, such as:
    • Cross-Site Scripting (XSS)
    • Cross-Site Request Forgery (CSRF/XSRF)
    • Remote Code Injection
  • Reside in a country not under any current U.S. Sanctions (e.g., North Korea, Libya, Cuba, etc.)
Our security team will assess each bug to determine if qualifies.

Rewards
  • A typical bounty is $500 USD
  • We may increase the reward for specific bugs
  • Only 1 bounty per security bug will be awarded
Exclusions
The following bugs aren't eligible for a bounty (and we don't recommend testing for these):
  • Security bugs in third-party applications (e.g., http://apps.facebook.com/[app_name])
  • Security bugs in third-party websites that integrate with Facebook
  • Security bugs in Facebook's corporate infrastructure
  • Denial of Service Vulnerabilities
  • Spam or Social Engineering techniques


                                                                                                                                                                     -News Sourec (FACEBOOK & Cnet)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

2 Hackers Community Hacked By Shadow008

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Stuxnet Clones May Be Used To Hit US


Officials at the US Department of Homeland Security are warning that cybercriminals could create clones of offshoots of the Stuxnet computer worm and attack American power plants, water treatment facilities, and other key parts of the infrastructure, various media outlets have reported.
The self-replicating malware, which was originally detected last July, was used to disrupt nuclear-enrichment programs in Iran, according to Reuters reports on Thursday. Stuxnet reportedly targeted Siemens-branded industrial control systems, exploiting four previously unidentified vulnerabilities in Microsoft Windows in order to seize control of the operating systems.
"Copies of the Stuxnet code, in various different iterations, have been publicly available for some time now," officials from Homeland Security said in a submission to the House Energy and Commerce Committee, reports Telegraph Technology Correspondent Christopher Williams.
"The Department is concerned that attackers could use the increasingly public information about the code to develop variants targeted at broader installations of programmable equipment in control systems," they continued, adding that officials would "remain vigilant and continue analysis and mitigation efforts of any derivative malware."
Forensic evidence suggests that Stuxnet, which has been referred to by cybercrime experts as one of if not the most complex computer virus ever determined, could have been the product of a joint operation launched by the US and Israel, Williams said.
According to Reuters, Roberta Stempfley, acting assistant secretary with the Office of Cyber Security and Communications, and Sean McGurk, director of the National Cybersecurity and Communications Integration Center, also testified before a House Energy and Commerce subcommittee on Tuesday.
Furthermore, Dan Goodin of the Register reports that Stempfley and McGurk warned the House Subcommittee on Oversight and Investigations that several different nation states, terrorist networks, organized crime groups, and individuals located within American territory are currently capable "of targeting elements of the US information infrastructure to disrupt, or destroy systems upon which we depend."
Williams reports that similar concerns prompted the British government to invest £650 million (approximately $1 billion) in cybersecurity in 2010.


-News Source (Red Orbit)

 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...