The Dutch government’s 2012 budget will be presented to parliament by finance minister Jan Kees de Jager tomorrow – but the text is already in the public domain, thanks to a student hacker. Bram Talman hacked into the IT company that puts the information online, found last year’s document by using its uniform resource locator (URL) – the character-string that allows information to be retrieved – replaced “2010” with “2011” and up came with the latest version.
The history student tweeted the document from his Twitter address, making himself an instant celebrity. “Every year there is a huge struggle between the different media companies to get the budget details first, so I started searching and came up with it pretty easily. Since then I’ve been inundated with interview requests and still have 200 missed calls.”
Its publication forced the prime minister, Mark Rutte, to concede that the document was genuine and all the details correct, including a breakdown of €3 billion in tax increases for industry.
Mr Rutte was clearly angry. “The leak is extremely irritating and unfortunate,” he said. The IT company, Facetbase, said the cause of the embarrassment had been human error, which it very much regretted. Normally, said its head of crisis management, Peter van der Maat, a fake version of the new document would be put online until the real one was ready – but that had not happened.
Malaysian web hosting company Jomhosting.net web-server compromised and more than 150 sites hacked and defaced by Teamgreyhat (TGH). 1st TGH hacked into the web server and defaced all the websites on that server. Later according to the TGH official's:-
"honestly saying there ware tooo many sites to deface.....so we are just bloody tired...also our mass defacer script was not working so we (R00t3r, 3rr0R, Skywalk3r & Zero) dumped the entire server. Hope the admin will forgive our silly mistake... :P lolzzzz..."
Now a days its become very common case of spreading fake news on twitter. Previously we have seen such things when fox news twitter was hacked and a fake news spread that obama died. Same thing happens with Jenson Button's Official Website, the site was Defaced With Fake Accident Report of the famous F1 driver. This time the victim is Famous footballer David Beckham. This morning twitter lit up with a rumor that David Beckham had died. While it appears to be nothing more than a rumor, it is the latest in a long line of hacks and rumors that spread like wildfire across the social networks. However, it is nothing more than the latest in a series of hacks trending over the social networking site Twitter. There is no official confirmation of the news, although that hasn't stopped sites from speculating. Extraordinarily, certain unaccounted-for reports have gone further to state details of the unconfirmed crash.
Twitter had numerous tweets quashing the rumors, while most reacted angrily to whoever is behind the story although the more gullible tweeters expressed fear and grief.
It is believed that David Beckham's name initially trended following a promotional campaign for his cologne with in the Elen Degeneres show, wherein he dressed up as a salesman selling his own perfume, before propagandists spread these false rumors.
Ani-Shell v1.4 Released with MD5 Hash Cracker , Python Bind-Shell, Anti-Crawler Feature and so on.
What is Ani-Shell:-
Ani-Shell is a simple PHP shell with some unique features like Mass Mailer , A simple Web-Server Fuzzer , a DDoser , A MD5 hash Cracker , Python and PHP Bind-Shells , Anti-Crawler Features etc! This shell has immense capabilities and have been written with some coding standards in mind for better editing and customization!
Mitsubishi Heavy Industries, Japan's biggest defense contractor, has revealed that it suffered a hacker attack in August that caused some of its networks to be infected by malware. The firm - which is involved in a wide range of activities including space rockets, the production of jet fighters, shipbuilding, and running nuclear power plants - said that 45 network servers and 38 PCs became infected with malware at ten facilities across Japan.
The infected sites included its submarine manufacturing plant in Kobe and the Nagoya Guidance & Propulsion System Works, which makes engine parts for missiles.
The Japanese newspaper Yomiuri claimed that at least eight different pieces of malware, including some which stole data, were discovered at Mitsubishi sites. A Mitsubishi spokesperson, however, was quoted as saying that "there is no possibility of any leakage of defense-related information at this point."
The company first noticed the attack on August 11th, and expects to have the results of an investigation into the security breach by the end of September.
If Mitsubishi Heavy Industries was targeted by hackers, the obvious question to ask is who was behind the attack and what was the motive?
A Cross-Site Scripting vulnerability exists in the "Chat Message" window in Skype 3.0.1 and earlier versions for iPhone and iPod Touch devices. Skype uses a locally stored HTML file to display chat messages from other Skype users, but it fails to properly encode the incoming users "Full Name", allowing an attacker to craft malicious JavaScript code that runs when the victim views the message. Executing arbitrary Javascript code is one thing, but I found that Skype also improperly defines the URI scheme used by the built-in webkit browser for Skype. Usually you will see the scheme set to something like, "about:blank" or "skype-randomtoken", but in this case it is actually set to "file://". This gives an attacker access to the users file system, and an attacker can access any file that the application itself would be able to access.
File system access is partially mitigated by the iOS Application sandbox that Apple has implemented, preventing an attacker from accessing certain sensitive files. However, every iOS application has access to the users AddressBook, and Skype is no exception. I created a proof of concept injection and attack that shows that a users AddressBook can indeed be stolen from an iPhone or iPod touch with this vulnerability.
Here is a Video Which Will Guide you about the Vulnerability:-
Hollywood Leaks has denied involvement in the Scarlett Johansson nude photo scandal. The group tweeted a denial on Monday afternoon amid mounting speculation that the Anonymous offshoot was a prime suspect in recent A-list cell phone photo leaks.
At about 3 p.m. Monday, the hackers tweeted the following message:
"WE DID NOT LEAK THE SCARLETT JOHANSSON PICS, WE WOULD HAVE RELEASED IT HERE FIRST! So stop the speculating!"
Indeed, the group has not been shy about taking credit for photo leaks in the past. Hollywood Leaks gleefully claimed responsibility for hacking the phone of "Dancing With the Stars" talent Julianne Hough and circulating photos of the star in late August.