Firefox 7 For Windows, Mac, Linux and Android


The latest Mozilla Firefox Beta is now available for testing on Windows, Mac, Linux and Android. This beta includes performance enhancements that improve the browsing experience for users and enable developers to create faster Web apps and websites.
New in Firefox Beta for Windows, Mac and Linux:
  • Optimized Memory Use: Reduces memory use and improves performance areas including responsiveness, startup and page load time, even in complex websites and Web apps
  • Improved memory management: The JavaScript garbage collector works more frequently to free up memory and improve performance when you have many tabs open or keep Firefox running for a long time
  • Enhanced Firefox Sync: Your data syncs faster when a bookmark or password is added or changed
  • Azure Direct2D for Canvas: Helps Firefox speed up HTML5 Canvas-based animation rendering
  • Web timing spec: Enables developers to measure page load time and site navigation so they can identify how to make website performance improvements
  • CSS 3 Text-Overflow: ellipsis: Additional way for developers to display CSS 3 text that overflows the layout area
  • Telemetry: Install this add-on and opt-in to report browser performance data and help improve future versions of Firefox
New in Firefox Beta for Android:
  • Optimized Memory Use: Reduces memory use and improves performance areas including responsiveness, startup and page load time, even in complex websites and Web apps
  • Enhanced Firefox Sync: Your data syncs faster when a bookmark or password is added or changed
  • Copy and paste: Copy and paste selected text from mobile websites
  • Restored session history and tabs: Firefox restores browsing history and tabs so users can easily return to their previous browsing session
  • Language selection: Firefox can detect the language setting on your Android device or allow you to select from more than 10 languages during initial set up
If you already have Firefox Beta installed, you will receive an automated update notification. You can also go to the “About Firefox” menu to apply the update manually.

For Downloading Firefox 7 Beta Click Here

-News Source (Mozila) 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

DARPA Is Planning Future Cyber Security Strategies


The U.S. Defense Advanced Research Projects Agency (DARPA) Information Innovation Office (I2O) in Arlington, Va., is asking companies and colleges for ideas on technologies to safeguard U.s. Department of Defense (DOD) computer systems in the event of a cyber attack.
DARPA issued a request for information (DARPA-SN-11-55) this week entitled Future Directions in Cyber Security that poses three fundamental questions related to national information security:

1. At present, attackers in cyberspace seem to have the initiative and hence the advantage. What specific technologies should DARPA develop to address the imbalance?

2. Attacks on embedded computing systems have received much attention. What specific technologies should DARPA develop to secure embedded computing systems?

3. If DARPA could only invest in one cyber-security research area, what should that be and why?

 
DARPA is inviting the nation's cyber security experts to offer answers to these questions, and based on their answers, DARPA experts may invite them to a meeting on 7 Nov. 2011 called the DARPA Colloquium on Future Directions in Cyber Security, at which the DARPA director will give a keynote address, and leaders from government and industry, as well as DARPA program managers, will discuss current and future cyber research directions.

Attendance at the DARPA Colloquium is by invitation only and space is limited, officials say.

To respond to DARPA questions and become candidates for the DARPA Colloquium, e-mail answers as an attachment in a commonly used format to cybercolloquium@darpa.mil no later than Friday, 9 Sept. 2011. Representatives of DARPA and DARPA support contractors will review answers they receive.
 
For More information Click Here

-News Source (Military Aerospace)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

bells.ac.in Hacked By Pak Cyber Combat Squad


Bells Act India (bells.ac.in) Hacked By Pak Cyber Combat Squad.

Hacked Site:-

Mirror Link:-
http://zone-h.com/mirror/id/14748433

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Back Track 5 R1 (Penetration Testing Distribution) Released

 
Back Track 5 R1 (Penetration Testing Distribution) released. According to the earlier press release BT development team said that BT5 R1 will be available on the 10th of this month but due to some security update and other reason they delay the time and finally released the Release 1 of BT5 on the 18th of August. In this edition 120 bugs has been fixed along with that 30 new tools are added in this version. Also BT team updated 70 tools in this edition of Back Track. The kernel was also updated to 2.6.39.4 and includes the relevant injection patches.
 
According to Back Track Team:-
 
"We’re finally ready to release BackTrack 5 R1. This release contains over 120 bug fixes, 30 new tools and 70 tool updates. We will be rolling out some howto’s on our wiki in the next few days, such as VMWare tool installation, alternate compat-wireless setups, etc. The kernel was updated to 2.6.39.4 and includes the relevant injection patches. As usual, please report bugs to us through our redmine ticket system for the fastest response. Don’t forget to also check our forums and wiki (will be updated in the next few days).
We are really happy with this release, and believe that as with every release, this is our best one yet. Some pesky issues such as rfkill in VMWare with rtl8187 issues have been fixed, which provides for a much more solid experience with BackTrack.
We’ve released Gnome and KDE ISO images for 32 and 64 bit (no arm this release, sorry!), as well as a VMWare image of a 32 bit Gnome install, with VMWare Tools pre-installed.
Lastly, I would like to thank the whole BackTrack team for pulling off the late nights working on this release, as well as Offensive Security for funding all of this stuff. If you need real world Penetration Testing Training – head on over to Offensive-Security and get ready for a bumpy ride!..."

To Download Back Track Click Here

-News Source (Back Track)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Fake Facebook Profile of SP (Patna) Case, The Cyber Crime Cell Is Investigating


The Cyber Crime Cell of the Patna Police has sent letters to three centres of Google in the country to know the Internet Protocol (IP) address of the person who created the fake Facebook account of Patna City SP (Central), Shivdeep Lande, recently. These centres are in Chandigarh, Kolkata and Mumbai. DSP (law & order) L M Sharma, who heads the Cyber Crime Cell, said that it would take some time as Patna Police would have to wait for the reply of the centres. "We would have to wait till the IP address of the Facebook account creator is passed on to the Patna Police," the DSP said.
Meanwhile, Lande said, the address of the person who had created the fake website of the Patna high court recently, was traced to Kankarbagh. "But when the police team went there, it found that no youth of that name lived in the locality," he said.
"Another police team reached a particular cybercafe to inquire about the creation of the fake Facebook account, but the manager said that the staff never maintained a register of the customers," he said.
It may be mentioned here that a fake Facebook account of Lande was detected recently. The police official had earned the wrath of youths, including girls, as he had carried out raids at different cybercafes and restaurants in the city and detained over a dozen young couples. Dozens of boys and girls visited the site and listed themselves as Lande's friends.
In another case, a fake website of the Patna high court was created and several youths were duped in the name of jobs in the court.

-News Source (TOI)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#Op-Bart Continues, This Time 100+ Officers Details Leaked By Anonymous


#Op-Bart continues, after hacking into the myBART.org website belonging to San Francisco's BART (Bay Area Rapid Transit) system Anonymous extracted more than 2,000 records containing names, user names, passwords (plain text), emails, phone numbers, addresses and zip codes.

But yet it is not over anon strikes again, and this time more than 100 officers personal data leaked.Including user-names, email address, password and other sensitive information.
To see the official statement of BART about this data-breach Click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Researchers Found Flaws On The IPv6 Handling System Of Windows 7

Researchers have found a flaw in the way Windows 7 handles IPv6, one of the key protocols underlying the internet, saying attackers could use the vulnerability to crash PCs.
The security firm Barracuda Labs said on Tuesday that someone would have to make a targeted denial-of-service attack to exploit the vulnerability, but exploitation could cause failure in a PC's network connectivity, applications and sound system.
Microsoft has acknowledged and reported the flaw, but has said it will not patch it in a security update, because exploiting the vulnerability requires local network access.
According to Barracuda Labs researcher Thomas Unterleitner, the vulnerability lies in the way Windows 7's remote procedure call (RPC) function handles malformed DHCPv6 requests — DHCP (Dynamic Host Configuration Protocol) being the automatic configuration protocol that lets servers allocate IP addresses to clients at start-up.
DHCPv6 is part of IPv6, the new version of the internet protocol that is being slowly rolled out. 128-bit IPv6 addressing can handle a vastly greater number of connected network devices than 32-bit IPv4, which was introduced in 1981 and is now running out of address space.

Intercept DHCPv6 traffic:-

"To exploit this vulnerability, an attacker would need to intercept DHCPv6 traffic," Unterleitner wrote. "Once a DHCPv6 request has been intercepted, the corresponding reply would have to be modified to contain the malformed Domain Search List option. On reception of this malformed packet, RPC on the remote machine would fail. Exploiting this vulnerability would cause the RPC service to fail, losing any RPC-based services, as well as the potential loss of some COM functions."
Unterleitner told ZDNet UK on Wednesday that a successful attack would "crash the RPC service from the Windows operating system, and without this service Windows 'collapses' slowly — no sound, no IP and so on".
 
Barracuda Labs confirmed the DHCPv6 vulnerability on both 32-bit and 64-bit versions of Windows 7 Ultimate with Service Pack 1, and said it was "very likely" that other versions of Windows 7, and possibly earlier versions of Windows, are also affected.
After the security researchers warned Microsoft of the flaw, the company replied in late July, saying it had replicated the vulnerability. However, Microsoft said that executing a man-in-the-middle attack or establishing a rogue DHCPv6 server to exploit the flaw would require local access, so the flaw would only be fixed in the next version of Windows.
Unterleitner said an incorrectly-configured or buggy Linux DHCP server could also trigger similar effects on the client PC, but the method described by Barracuda Labs is the easiest way for a "pinpoint denial-of-service" attack to compromise a client.
ZDNet UK has asked Microsoft for comment on the vulnerability, but had received none at the time of writing.


-News Source (ZDNet)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...