Pakbugs (Famous Pakistani Hackers forum) Database Hacked by Zero

Famous Pakistani Hackers forum Pakbugs database got hacked by Zero, he also revealed the admin credentials.

Website:-

Admin information:-

username:-ZombiE_KsA
email:-zombie_ksa@yahoo.com
password:-f9ad0fa817c5c78fbd3776c94e7effc0
salt:-QQ/FG#p1[h)KDiwn;`V4V}PnDwC-8

Database Information:-



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NSS Said : IE9 Blocks Virtually all Socially Engineered Malware, Rather Than Other Browsers


A study prepared by NSS Labs concludes that Microsoft's Internet Explorer 9 blocks virtually all socially engineered malware, far more than rival browsers.
The study was designed to examine one aspect of security: how a browser handled a malicious URL, such as one received in a posting on a social network or an email. The NSS goal was to find the browser which identified, warned, and/or blocked malicious URLs from being viewed by the user.
As it did in 2010, Microsoft's IE9 with Smart Screen URL detection and Application Reputation topped the field, blocking 99.2 percent of all malicious emails. Google's Chrome 12 finished far behind, blocking 13.2 percent of all malicious URLs. Apple's Safari 5 and Mozilla Firefox 4 tied at 7.4 percent, with Opera 11 finishing dead last at 6.1 percent.

 

The NSS Labs study showed that, globally, all of the browsers tested showed improvement over an NSS study performed last year, with two exceptions: Safari and Mozilla's Firefox. A year ago, Microsoft IE9 blocked 99 percent of the malicious URLs, followed by Chrome 6 (3%), Safari 5 (11%), Firefox 3.6.15 (19%), and Opera 10 (0%).
NSS attributed Microsoft's success to its Application Reputation technology, which has attempted to categorize applications across the Internet.
"The significance of Microsoft's new application reputation technology cannot be overstated," the NSS report found. "Application reputation is the first attempt by any vendor to create a definitive list of every application on the Internet. This new capability helps users discern malware, and potentially unsafe software from actual good software. The list is dynamically created and maintained, much the same way Google, (or Bing) is continuously building and maintaining a library of content for search purposes."
The NSS tests sliced the potential for malware along one specific axis, socially engineered malware, a distinction Google objected to during the 2010 tests. ""Google Chrome was built with security in mind from the beginning and emphasizes protection of users from drive-by downloads and plug-in vulnerabilities," a spokeswoman said then.
NSS also found that the combination of SmartScreen and Application Reputation means that IE9 blocked new malware in just over half and hour, while Safari 5 and Firefox 4 required 4.91 and 6.07 hours, on average, to detect a new malicious URL. Chrome 12 and Opera 11, by contrast, required 17.7 and 18.4 hours, respectively. Over time, as the malicious URLs changed in response to detection, the browsers maintained their level of protection fairly consistently, NSS found.
"Not only has the effectiveness of the technology improved, but so has the speed at which it is able to identify socially engineered malware," Roger Capriotta, director of Internet Explorer product marketing, wrote in a blog post Monday. "For our Windows customers, this means fewer infections and headaches for you."
In its report, NSS said its findings were independent, and that it had not received funding from any vendor. 

-News Source (PC Mag)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Microsoft Said : Windows 8 Will be As Revolutionary As Windows 95


Microsoft Corp's Windows 95 truly reinvented the PC experience and revolutionized the PC industry back sixteen years ago in 1995. This week Microsoft opened up Windows 8 development blog and said that its next-generation Windows 8, which will be available for public testing in the coming months, will be as revolutionary as the legendary Windows 95.
 
"So much has changed since Windows 95 - the last time Windows was significantly overhauled - when the 'desktop' metaphor was established. Today more than two out of three PCs are mobile (laptops, netbooks, notebooks, tablets, slates, convertibles, etc.). Nearly every PC is capable of wireless connectivity. Screen sizes range from under 10" to wall-sized screens and multiple HD screens. Storage has jumped from megabytes to terabytes and has moved up to the cloud," said Steven Sinofsky, the president of Windows and Windows Live division at Microsoft.
 
Although Microsoft continues to remain mum about the release date of Windows 8, many believe that the next-generation Windows will be launched in 2012. In its new blog, the world's largest designer of software plans to share how it focuses on performance, reliability, compatibility, security, and quality of Windows 8 and plans to continue the dialog around performance and fundamental engineering of Windows with its customers and end-users.
Microsoft previewed its Windows 8 in June and started by showing user experience and interface on a range of mobile devices. The graphics user interface (GUI) is one of the most important elements of operating systems as end-users interact with it every day. But Microsoft stresses that the new GUI along with compatibility with ARM-based system-on-chips are not the only innovations when it comes to Windows 8. The software giant claims it has engineered changes across the full range of Windows capabilities.
 
"We know people who care a lot about networking want to know our plans there. We know people who are invested heavily in storage want to know what is new in that area. Many want to know about performance and fundamentals. We know developers, IT pros, and gamers all want to know what's new for them. There is so much packed into Windows 8 and there are so many unique and important lenses through which to view Windows 8, and so we want to be sure to take the time to cover as many of these topics as possible, to build up a shared understanding of why we’ve taken Windows where we have. So in the next weeks we will just start talking specifics of features, since there is no obvious place to start given the varying perspectives. From fundamentals, to user interface, to hardware support, and more, if something is important to you, we promise we'll get to it in some form or another," said Mr. Sinofsky.

To See of official Blog of Windows 8 Click Here 

-News Source (Xbitlabs)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

New Swype Keyboard (With Customized Features)

It’s hard to believe that it’s been nearly three years since Swype first made a splash at Tech Crunch 50, and since then it’s quickly popped up on handset after handset. Easily one of the most popular alternative input methods out there, Swype has announced today a special agreement for users of the Sprint Nexus S 4G: you bring the hardware, they’ll bring the latest version of Swype.
While the concept behind the keyboard remains the same, the new update packs some few nifty new tricks. The biggest by far is the keyboard’s newly added support for gestures: basic moves like Cut (Swype key -> X), Copy (Swype key -> C) and Select All (Swype key -> A) are all here, but the new Swype integrates with certain apps with aplomb.
Consider Twitter: if you highlight a bit of text and swipe from the Swype key through ‘T’ and ‘W,’ your Twitter app will open up and your witticisms will be good to go. Ditto for addresses: highlight and swipe from Swype key through ‘G’ and ‘M,’ and Google Maps will open and point out your path. Custom dictionary management has also been pumped up, which will hopefully make working with specialized vocabularies less of a headache.
Sprint Nexus S 4G users are getting the update exclusively at first (available at this page) — which, of course, is really just a fancy way of saying “Sprint Nexus S 4G users will have it exclusively for a few hours before the hacking communities find a way to tear it out”. For all of you itching to get your fingers swyping on the latest and greatest, fear not: someone out there is bound to release a working .apk soon.

For more information about swype click here



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

blog of .co.in Compromised, 78000+ Indian Sites Hacked BY ZHC


blog of .co.in compromised more than 78000 Indian sites hacked by ZCOMPANY HACKING CREW (ZHC) to raise the awareness. We must have to consider that this was indeed one of the biggest ever hactivism ever done on the cyber fence of India.
The Attack was done for the 15 August (The independence day of India). ZHC displays that kashmiri people observe black day on 15th August and the same message had been shown by ZHC on each and evry deface page (78000+) for all indian people in protest ...

Official Message of ZHC :-

"ZCompany Hacking Crew Observes Black Day with the people of Indian occupied Kashmir on 15th August

Free Kashmir .. Freedom is our goal..// End the Occupation. . . .

This message is not for Indian government but common Indian people who dont know what their government hides. For those of your politicians who boast of Kashmir being an integral part of India read your own law books:

" Indian Penal Code(Act No. 45 of 1860) CHAPTER-II SEC 18: “India”.- “India” means the territory of India excluding the State of Jammu and Kashmir."

The 15th of August is special for you because you got freedom on this day yet you should think that do you really deserve to celebrate this freedom if you do not stop the wrong doings in Kashmir. Everyday people are not only being humiliated but killed as well. Fake encounters and rape is the order of the day in Kashmir. Kashmiris have protested time and again against Indian occupation and many people were killed mostly teenagers. When media tried to show it they were banned ( eg PRESS TV ), people were arrested for even protesting on Facebook and still India claims to be the largest democracy in the world. We ZHC will reveal what Your Govt try to conceal, if you really want to be proud of your nation rise for what is right. Support Kashmiris in their dream to achieve Freedom which is everyone's basic human right.

We are ZHC - UNITED WE STAND DIVIDED WE FALL ..."
To See the List of those hacked Sites Click Here 

-News Source (ZHC)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Firefox Ver 6.0 is Now Available (With Lots of New Features)

Mozilla released Firefox v6.0 on the 16th of August. To know what is new on this version and more information cheek the following statements.  

What’s New in Firefox 6.0:-

The latest version of Firefox has the following changes:
  • The address bar now highlights the domain of the website you're visiting
  • Streamlined the look of the site identity block
  • Added support for the latest draft version of WebSockets with a prefixed API
  • Added support for EventSource / server-sent events
  • Added support for window.matchMedia
  • Added Scratchpad, an interactive JavaScript prototyping environment
  • Added a new Web Developer menu item and moved development-related items into it
  • Improved usability of the Web Console
  • Improved the discoverability of Firefox Sync
  • Reduced browser startup time when using Panorama
  • Fixed several stability issues
  • Fixed several security issues
To see the fixed Bug in this version of Firefox click Here


To download Firefox v6.0 Click Here  

To see the official press release of Mozilla cheek the following Link:-
http://www.mozilla.com/en-US/firefox/6.0/releasenotes/

-News Source (Mozilla) 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Bootloader Unlocker Tool By HTC


The good news is that as promised phone-maker HTC has launched a new web tool that you can use to unlock the bootloader on selected Android smartphones. The bad news is that right now selected smartphones means the European version of the HTC Sensation… and that’s it.
Soon HTC plans to add the HTC Evo 3D and HTC Sensation 4G phones from Sprint and T-Mobile in the US to the list, but for now US customers are going to have to stick with unofficial bootloader unlocking tools.
The bootloader is a program that loads the operating system on your device. By locking the bootloader HTC could tighten security on a smartphone. But by giving users the ability to unlock their own bootloaders, HTC is making it easier for customers to load custom software such as CynaogenMod or other complete operating system replacements onto their phones.
While HTC is making it easier for users to unlock their bootloaders, the company is not officially supporting phones once the bootloader is unlocked. In other words, if you use the HTC tool to unlock your device you’ll void your warranty.
The unlocking process is a little complicated, and requires you to have the Android software development kit installed, Java running, and HTC Sync software.

Fore More Information Click Here

-News Source (HTC & Mobiputing)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...