Now Hollywood Leaks is Denying The Responsibility of Scarlett Johansson Nude Photo Exposure


Hollywood Leaks has denied involvement in the Scarlett Johansson nude photo scandal. The group tweeted a denial on Monday afternoon amid mounting speculation that the Anonymous offshoot was a prime suspect in recent A-list cell phone photo leaks.
At about 3 p.m. Monday, the hackers tweeted the following message:

"WE DID NOT LEAK THE SCARLETT JOHANSSON PICS, WE WOULD HAVE RELEASED IT HERE FIRST! So stop the speculating!"

Indeed, the group has not been shy about taking credit for photo leaks in the past. Hollywood Leaks gleefully claimed responsibility for hacking the phone of "Dancing With the Stars" talent Julianne Hough and circulating photos of the star in late August.


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

21 People get Busted By Israeli Police in cellphone Hacking Software Investigation

 
Israeli police arrested 21 people last week, several of which are private investigators, on suspicion of selling and distributing sophisticated software which allows the hacking and tracking of mobile phones, it was revealed Monday, after a gag order was lifted on the case.
The illegal program allows people to eavesdrop on incoming and outgoing calls, look through text messages, and find the location of the device at any given moment.
Those who purchased the software were asked to bring the mobile phone they sought to track to a specific location, where the software could be installed on the phone. The program was mostly used by men and women who believed their partners were having affairs. The police unit in charge of investigating fraud used an undercover agent which was sent to one of the businesses which sold the software. There, the agent asked to install the software on her partner’s cell phone. After gathering enough evidence against the suspects, the police began the process of arrests.
The police are continuing the investigation, and intend on locating those who requested the illegal service, along with those who sold it.


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Vulnerability In OS-X 10.7 Lion Allowing to Change Passwords UN-Authorizedly

A researcher at the Defense in Depth blog has discovered a flaw in Apple's recently released operating system, OS X 10.7 (Lion), which allows passwords to be changed without knowledge of the logged in user's password. The flaw appears related to Apple's move towards a local directory service which has permissions set in an insecure manner. An attacker who has access to a logged in Mac (locally, over VNC/RDC, SSH, etc) is able to change the currently logged in user's password without knowing the existing password as would normally be required:

testmac:~ TestUser$ dscl localhost -passwd /Search/Users/TestUser
New Password:


Historically (in Snow Leopard) you would have needed to enter your existing password first to verify that you in fact are the account holder:

testmac:~ TestUser$ passwd
Changing password for TestUser.
Old Password: -OldPass-
New Password: -NewPass-
Retype New Password: -NewPass-


Not only can a logged in user change their password without knowledge of the existing password, but you can read any other users password hash and make attempts at brute forcing it. Defense in Depth showed how you can parse the hash from openly readable directory information and recover both the hash and the salt used to encrypt the password. This is another great reason to be sure you have secured your Mac properly until Apple makes a fix available. Taking the following steps will help ensure you are protected:

  • Use a secure password to prevent brute force attacks against your account using stolen hashes.
  • Enable the screensaver and set it to prompt you for your password.
  • Disable automatic logon.
  • Never leave your Mac logged in and unattended. Use a "Hot Corner" or the Keychain lock to lock your screen.

For more information and to see the researcher blog post click Here



-News Source (NS & Defence Blog)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Harry Potter author J.K. Rowling Was Also The Victim UK Phone Hacking Scandal



In the ongoing investigation into the U.K. phone hacking scandal, Harry Potter author J.K. Rowling has been identified as one of the main targets of the illegal operations.
The phone hacking and privacy violations have created quite a stir as journalists at News International has been accused of the crimes and names such as actress Sienna Miller, Member of the Parliament Tessa Jowell and Price William have been identified as victims of the crime.
The investigation into the phone hacking has been building for months and recently Scotland Yard has demanded that the news groups reveal their phone-hacking sources, which the paper is presently refusing to do. Some investigation into the claims also includes belief that members of Scotland Yard itself were helping cover up the phone hacking until the doors blew off.
News Corporation, the parent company of News International, is chaired by Rupert Murdoch. While Murdoch is trying to keep his hands clean of the situation, his son James Murdoch has been called in to answer a number of questions in the case. The phone hacking scandal has caused the termination and resignation of a number of individuals at News International.
The recent news with J.K. Rowling named as a victim comes after revelations of the investigation led to an inquiry, which will take place in October 2011. Other than Rowling, Sienna Miller and Hugh Grant, the parents of murdered schoolgirl Milly Dowler testified that their phone was hacked while the police were still searching for their daughter.
Rowling, one of Britain's richest individuals thanks to Harry Potter is a reluctant public figure, fighting back in court against the media when pictures of her children have been published. 

-News Source (Examiner) 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Linux Mint Debian 201109 Final (Gnome & Xfce) Released!


Linux Mint Debian 201109 Final Edition (Gnome & Xfce) Released.

What is LMDE:-
  • Linux Mint Debian Edition (LMDE) is a rolling distribution based on Debian Testing.
  • It’s available in both 32 and 64-bit as a live DVD with Gnome or Xfce.
  • The purpose of LMDE is to look identical to the main edition and to provide the same functionality while using Debian as a base.

What’s new in this Release:-
  • All Linux Mint 11 features
  • Installer improvements (keyboard variants, locale, bug fixes, UUID in fstab)
  • Update Packs, dedicated Update Manager and staged repositories
  • GTK2/GTK3 theme compatibility
  • Updated software and packages
Multi-core and multi-CPU support in 32-bit kernel:-

To guarantee compatibility with non-PAE processors, the 32-bit versions of Linux Mint Debian come with a 486 kernel by default. This kernel does not support SMP, and as a consequence is only able to detect one core and one CPU. If your CPU has multiple cores, or if you have more than one CPU, simply install the 686-PAE kernel and reboot your computer.

To download LMDE Click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

FBI & NCFTA Combining Forces to Fight Better Against Cyber Crime



Long before it was acknowledged to be a significant criminal and national security threat, the FBI established a forward-looking organization to proactively address the issue of cyber crime. Since its creation in 1997, the National Cyber Forensics and Training Alliance (NCFTA), based in Pittsburgh, has become an international model for bringing together law enforcement, private industry, and academia to share information to stop emerging cyber threats and mitigate existing ones.
“The exchange of strategic and threat intelligence is really the bread and butter of the NCFTA,” said Special Agent Eric Strom, who heads the FBI unit—the Cyber Initiative and Resource Fusion Unit (CIRFU)—assigned to the NCFTA. “The success of this effort at every level comes down to the free flow of information among our partners.”
When the nonprofit NCFTA was established, the biggest threat to industry was from spam—those annoying unsolicited e-mails that fill up inboxes. Today, the organization deals with malicious computer viruses, stock manipulation schemes, telecommunication scams, and other financial frauds perpetrated by organized crime groups who cause billions of dollars in losses to companies and consumers.
The NCFTA essentially works as an early-warning system. If investigators for a major banking institution, for example, notice a new kind of malware attacking their network, they immediately pass that information to other NCFTA members. Alliance members—many have staff permanently located at the NCFTA—then develop strategies to mitigate the threat. FBI agents and analysts from CIRFU, also located at NCFTA headquarters, use that information to open or further existing FBI investigations, often in concert with law enforcement partners around the world.
“Cyber crime has changed so much since those early days of spamming,” Strom said. “And the threat continues to evolve globally, which is why the NCFTA’s work is so critical to both business and law enforcement.”
The organization draws its intelligence from hundreds of private-sector members, Carnegie Mellon University’s Computer Emergency Response Team (CERT), and the FBI’s Internet Crime Complaint Center (IC3). That extensive knowledge base has helped CIRFU play a key role in some of the FBI’s most significant cyber cases in the past several years. (See sidebar.)

-News Source (NCFTA & FBI)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

6 Pakistani Website (Edu.pk) Hacked By Team Hindustan Cyber Force


6 educational website of Pakistan hacked and defaced by H@ck3r h!t3sh,cha0,Dr. Inferno(Team Hindustan cyber force). According to HCF they did this due to take revenge of  Indian Railway website hacking case. Again we are on the same conclusion and that is Cyber war between India & Pakistan is on

Hacked Websites:-

http://tuf.edu.pk/
http://jumdc.tuf.edu.pk/
http://qec.tuf.edu.pk/
http://ucs.tuf.edu.pk/
http://ucw.tuf.edu.pk/
http://umdc.tuf.edu.pk/

Mirror Links:-

http://www.zone-ar1.com/attackmirror/mirror.php?id=4036
http://www.zone-ar1.com/attackmirror/mirror.php?id=4040
http://www.zone-ar1.com/attackmirror/mirror.php?id=4041
http://www.zone-ar1.com/attackmirror/mirror.php?id=4042
http://www.zone-ar1.com/attackmirror/mirror.php?id=4043





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...