Vulnerability Found By Zero on The Official Website of Microsoft Store

Non-persistent XSS  vulnerability found by Zero on the official website of Microsoft Store India.

Vulnerable Site:-
http://www.microsoftstore.co.in/





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

VLC Media Player (Beta) for Android is Now Available


VLC is a popular media player for Windows, Mac and Linux computers. It was one of the first apps that could support virtually any video codec, which means that as long as you’re trying to watch a video without DRM, you can probably use VLC.
The developers have been working on an Android port of VLC for a while, and now it looks like we’re one step closer to a release. VLC for Android is now in beta testing, and you can sign up to request an invitation to participate in the private beta. There’s a key difference between VLC for desktop computers and for Android though. Most Android phones and tablets have processors that support hardware acceleration for just a few video codecs. So while VLC may be able to decode videos that aren’t supported by your device’s chipset, it will have to use software to do that, and the performance will likely vary from device to device and video file to video file.
For instance, most recent Android devices have hardware support for H.264 video files, which means you can typically play 720p or even 1080p HD video in that format on some devices. But it’s much less common (although not impossible) to find a device that has hardware support for MKV or DiVX video files. VLC may let you watch movies in those formats anyway, but I wouldn’t expect HD videos to work well unless you have hardware support.
In other words, while it’s certainly pretty cool that VLC is set to become one of the first Swiss Army Knife video players that can run on Windows, Mac, Linux, and Android, I’d be surprised if it works much better than RockPlayer, MoboPlayer, or any of the other video players currently available for Android.

To download VLC for Android Click Here

-News Source (Video LAN & Mobiputing)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Google Gets Another Chance To Operate In China For One Year


Google’s relationship with the government of China has been a tad tense over the past couple of years. There have been accusations of state-sponsored hacking, interference with access to services, and, of course, Google’s flat-out refusal to censor search results. China also wasn’t pleased with the introduction of Google Plus in Gmail this summer, which shouldn’t have come as a surprise. The Chinese government is widely regarded as being afraid of social networks and some officials even believe that they are being used by the U.S. to destabilize China.
But despite those fears and tensions with Google, a government spokesperson has announced that the license Google requires to continue operations within Chinese borders has been renewed for another year. China’s Ministry of Industry and Information Technology stated that the Google license was one of more than a hundred that were renewed following “adjustments” to operations, though no details about those changes were given.

It’s worth noting that the Internet content license doesn’t actually belong to Google, and that could very well have something to do with the renewal. The license actually belongs to a Chinese partner who works with Google, since the Ministry doesn’t allow foreign companies to own such licenses. Since the spat began, Google’s presence in China has diminished greatly. Its search market share has been devoured by Baidu, who now has its sights set on Google Chrome and Android. Baidu recently announced the Baidu Yi mobile operating system, which will begin shipping on Dell tablets and smartphones in China in the near future.

-News Source (Geek.com)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

25 Websites Hacked By dOcToR N!nJa (Urdu Hack)



25 websites hacked and defaced by dOcToR N!nJa, junior member of Urdu Hack.


Hacked Sites:-
http://vdatefinder.com/pictures/ninja.html
http://comptracker.com/ninja.html
http://debtbadcredit.net/ninja.html
http://facemakeuptips.net/ninja.html
http://internetmarketingalert.com/ninja.html
http://karim2000.info/ninja.html
http://kidsgameonline.net/ninja.html
http://musclebuildingguide.net/ninja.html
http://myiphoneunlock.net/ninja.html
http://ondailynews.com/ninja.html
http://solarhomepowersystem.com/ninja.html
http://solarpowerguideline.com/ninja.html
http://stingsocial.info/ninja.html
http://stockto.com/ninja.html
http://submitalink.info/ninja.html
http://tagzi.info/ninja.html
http://topdatingguide.net/ninja.html
http://toporg.info/ninja.html
http://tourismadvisory.com/ninja.html
http://transferwebhost.com/ninja.html
http://unitedlinks.info/ninja.html
http://vdatefinder.com/ninja.html
http://vhealthcentral.com/ninja.html
http://weightlossdietguidelines.com/ninja.html
http://yogaposessite.com/ninja.html



Mirror Links:-

http://legend-h.org/mirror/216661/comptracker.com/ninja.html
http://legend-h.org/mirror/216662/debtbadcredit.net/ninja.html
http://legend-h.org/mirror/216663/facemakeuptips.net/ninja.html
http://legend-h.org/mirror/216664/internetmarketingalert.com/ninja.html
http://legend-h.org/mirror/216665/karim2000.info/ninja.html
http://legend-h.org/mirror/216666/kidsgameonline.net/ninja.html
http://legend-h.org/mirror/216667/musclebuildingguide.net/ninja.html
http://legend-h.org/mirror/216668/myiphoneunlock.net/ninja.html
http://legend-h.org/mirror/216669/ondailynews.com/ninja.html
http://legend-h.org/mirror/216670/solarhomepowersystem.com/ninja.html
http://legend-h.org/mirror/216671/solarpowerguideline.com/ninja.html
http://legend-h.org/mirror/216672/stingsocial.info/ninja.html
http://legend-h.org/mirror/216673/stockto.com/ninja.html
http://legend-h.org/mirror/216674/submitalink.info/ninja.html
http://legend-h.org/mirror/216675/tagzi.info/ninja.html
http://legend-h.org/mirror/216676/topdatingguide.net/ninja.html
http://legend-h.org/mirror/216677/toporg.info/ninja.html
http://legend-h.org/mirror/216678/tourismadvisory.com/ninja.html
http://legend-h.org/mirror/216679/transferwebhost.com/ninja.html
http://legend-h.org/mirror/216680/unitedlinks.info/ninja.html
http://legend-h.org/mirror/216681/vhealthcentral.com/ninja.html
http://legend-h.org/mirror/216682/weightlossdietguidelines.com/ninja.html
http://legend-h.org/mirror/216683/yogaposessite.com/ninja.html




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Office of President of Nepal Hacked By Team T!g3R


The official website of Office of President (Nepal Govt.) is vulnerable to SQL-i, their entire database has been hacked by w3bd3f4c3r, n3ll@!s4mur@!, !nd!@nRuBuk, 5!l3nt k!ll3r, r00t, burn3r (Team T!g3R). The hacker group exposed sensitive credentials like admin details, server info, db user name & password, Tables nad lots more.

Website:-
http://eproc.presidentofnepal.gov.np/

Server Information:-

Host IP:              202.166.216.235
Web Server:      Apache/2.2.11 (Unix) DAV/2 mod_ssl/2.2.11 OpenSSL/0.9.8k PHP/5.2.9  mod_apreq2-20051231/2.6.0 mod_perl/2.0.4 Perl/v5.10.0
Powered-by:     PHP/5.2.9
DB Server:         MySQL >=5
Current DB:       dbpresident
Current User:    root@localhost
Sql Version:       5.1.33
Current DB:       dbpresident
System User:    root@localhost
Host Name:       eroc.presidentofnepal.gov.np
Installation dir:  /opt/lampp/
Db User & Pass: root:*4CA67FA19DAB93064ACF48DD5B62C638C79E9424:localhost
Db User & Pass: root:*4CA67FA19DAB93064ACF48DD5B62C638C79E9424:linux
Db User & Pass: ::localhost
Db User & Pass: ::linux
Db User & Pass: pma::localhost

Admin Details:-

admin_id=1
user_name=admin
pass_word=deb4ad7b764f33a331a8b722323ad257
user_level=1


Here are some Screen shots Submitted by The Hacker To prove the Data Breach:-

For more info and to see the hacked DB click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Norton Cyber Crime Report: The cost of Global Cybercrime is 114 Billion Dollar Annually


Cybercrime Cost Canadians $840 million Last Year For the first time a Norton study calculates the cost of global cybercrime: $114 billion annually.

(i) Based on the value victims surveyed placed on time lost due to their cybercrime experiences, an additional $274 billion was lost.

(ii) In Canada, more than 7.3 million people fell victim to cybercrime last year, suffering CAD$840 million in direct financial losses and an additional CAD$4.7 billion in time spent resolving the crime. With 431 million adult victims globally in the past year and at an annual price of $388 billion globally based on financial losses and time lost, cybercrime costs the world significantly more than the global black market in marijuana, cocaine and heroin combined ($288 billion).

(iii) According to the Norton Cybercrime Report 2011 more than two thirds of online adults (69 percent) have been a victim of cybercrime in their lifetime. Every second 14 adults become a victim of cybercrime, resulting in more than one million cybercrime victims every day.

(iv) For the first time, the Norton Cybercrime Report reveals that 10 percent of adults online have experienced cybercrime on their mobile phone. In fact, the Symantec Internet Security Threat Report, Volume 16

(v) reported there were 42 percent more mobile vulnerabilities in 2010 compared to 2009 - a sign that cybercriminals are starting to focus their efforts on the mobile space. The number of reported new mobile operating system vulnerabilities increased, from 115 in 2009 to 163 in 2010. In addition to threats on mobile devices, increased social networking and a lack of protection are likely to be some of the main culprits behind the growing number of cybercrime victims.
Canada not immune to digital dangers There are close to 20,000 Canadian adults falling victim to cybercrime everyday - that's about 14 every minute.
Most are experiencing computer virus or malware attacks, or responding to online scams. Largely, Canadians are cognizant of online dangers with 77 percent of respondents noting the possibility of cybercrime is something they are always aware of when online. However, some are not taking the necessary precautions with 35 percent of Canadian adults revealing they don't have up-to-date security software.
"Canadians are becoming more aware that cybercrime is real and can affect anyone, but some work needs to be done to further educate them on how to protect themselves," said Lynn Hargrove, Director of Consumer Solutions, Symantec Canada "This survey is important because it shows the costs of cybercrime and people tend to do something to protect themselves when they see it can have a big impact on their bottom line." Male, Millennial, Mobile The study identifies men between 18 and 31 years old who access the Internet from their mobile phone as even more likely victims: in this group four in five (80 percent) have fallen prey to cybercrime in their lifetime. Globally, the most common - and most preventable - type of cybercrime is computer viruses and malware with 54 percent of respondents saying they have experienced it in their lifetime. Viruses are followed by online scams (11 percent) and phishing messages (10 percent). Earlier this year the Symantec Internet Security Threat Report, Volume 16, found more than 286 million unique variations of malicious software ("malware") compared to the 240 million reported in 2009, representing a 19 percent increase.

(vi) "There is a serious disconnect in how people view the threat of cybercrime," said Adam Palmer, Norton Lead Cybersecurity Advisor.
"Cybercrime is much more prevalent than people realize. Over the past 12 months, three times as many adults surveyed have suffered from online crime versus offline crime, yet less than a third of respondents think they are more likely to become a victim of cybercrime than physical world crime in the next year. And while 89 percent of respondents agree that more needs to be done to bring cybercriminals to justice, fighting cybercrime is a shared responsibility. It requires us all to be more alert and to invest in our online smarts and safety." The disconnect between awareness and action is further illustrated by the fact that while 74 percent of respondents say they are always aware of cybercrime, many are not taking the necessary precautions. Forty-one percent of adults indicated they don't have an up to date security software suite to protect their personal information online. In addition, less than half review credit card statements regularly for fraud (47 percent), and 61 percent don't use complex passwords or change them regularly. Among those who access the Internet via their mobile phone, only 16 percent install the most up to date mobile security.

For More information and to see the Norton cyber crime report click Here

-News Sourec (Norton & Tmcnet)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Released A New Twitter Tool Named URGE (Universal Rapid Gamma Emitter)




The Anonymous group of online activists released a new tool today designed to allow people to hijack trending topics on Twitter and tweet messages within them.The name of the tool is URGE (for Universal Rapid Gamma Emitter), the beta software is available for download for Windows computers and requires .Net Framework 4 to work.

According to the official Press Release of Anonymous:- 
We recently have become tired of seeing trending topics on twitter that were redundant and “pop culture” like.  We have also grown tired of Twitter not trending hash tags that actually serve a cause and mean something to free thinkers of the world.  We have taken note of why Twitter would not do so, they only trend topics which would “appeal” to people and can get people to tweet more.  This was pathetic in our eyes, and we could not stand by and take it anymore.  We have developed a program called “U.R.G.E. Universal Rapid Gamma Emitter (twitter edition)” which hijacks trending topics of our choice and and lets us tweet messages within them.  This will help raise awareness of problems going on in this world and show people that real problems exist outside of “Jersey Shore” and “Sex”.  We will distribute this program amongst Anonymous and anyone else who cares to use this for awareness and bashing corrupt politicians.  This is not a hacking tool nor is it an exploit tool, it was created to make it easier for us to tweet faster without copying and pasting constantly. 


To download U.R.G.E Click Here
The user manual of U.R.G.E is also available to see that click Here



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...