Julian Assange's Wikileaks Party Started it's Official Website & Opens Membership

Julian Assange's Wikileaks Party Started it's Official Website & Opens Membership 

Earlier this year we came to know about the WikiLeaks Party where we have seen Julian Assange in a different avatar who have taken the first step toward a Senate run in the Australian state of Victoria. The electoral enrollment application was submitted to the Australian Electoral Commission in February. Assange's father Mr. John Shipton said Julian Assange's enrollment was ''a first step'' in a political campaign that would focus on ''the democratic requirement of truthfulness from government''. The party, not yet registered with the Australian Electoral Commission, has an initial 10-member national council comprised of close associates of Mr. Assange and pro-WikiLeaks activists. But as per the rules of Electoral Commission the party must have to 500 members to officially register with them, in order to do that WLParty have started its official website that is wikileaksparty.org.au and opened online membership form. The official twitter account of WikiLekas urges its followers to to join the WikiLeaks Party, though the website is still under testing and expecting to be final in between seven days as shown in the picture below. 

For the fans of WikiLekas, who eager to join the party must know that, they must have to fill out at least 8 fields of personal information including full name, address, phone number, residential suburb & so on. Along with these, the members must have to agree the terms of the party constitution as published on the party website and they have to pay amount of $20 as shown the picture below.

But the WikiLeaks founder has been living at the Ecuadorian Embassy in London since June 2102 — eluding Swedish authorities, who have an outstanding arrest warrant for him in connection to a sexual assault investigation. If elected Australian Senator, Assange might still not be able to be physically present at the Australian senate as he might still be trapped in London’s Ecuadorean embassy. British authorities have vowed to detain him if he steps foot outside of the embassy in light of the European Arrest Warrant issued against him. 

-Source (WL Party & RT)






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Facebook Hacker Cup 2013: Petr Mitrichev Won The Competition Followed By Jakub Pachocki & Marcin Smulewicz

Facebook Hacker Cup 2013Petr Mitrichev Won The Competition Followed By Jakub Pachocki & Marcin Smulewicz

Now a days leading organizations offers bug bounty and other competitions by which hackers from different part of the world will participate and find out security holes, in order to make more secure product and enhance cyber security. While talking about hackers competition then the name of "Hacker Cup" organized by the social networking giant Facebook will surely be an important one. Like last last two years, this year also Facebook called Hacker Cup 2013 in February and after completing several exciting  rounds finally we have the winners of this year's championship. Last year it was Roman Andreev of Russia who won the Hacker Cup with a heavy and prestigious trophy and a check for $5,000. Just like last year, this time also thousand of hackers across the globe participated in the competition and after completing the breathtaking championship three lucky winners been rewarded by Facebook for the outstanding performance. And the winners of Hacker Cup 2013 are Petr Mitrichev,  in second place we have Jakub Pachocki and third place it was Marcin Smulewicz. The social networking giant congratulated all the competitors who taken part in Hacker Cup for a great showing and performance. This year winner Petr Mitrichev solved all the four problems (Archiver, Colored Trees, Minesweeping, Teleports) in a due time and honored with the highly coveted Hacker Cup Trophy and an amount of $10,000. Here are some key moments of this year Hacker Cup:- 
 (Hacker Cup 2103 Finalist)
 (Competition is on)
 (The Prestigious Trophy) 
(Electric Moment)
(Hacker Cup 2103 Award)

(Petr Mitrichev Hacker Cup Winner)
Brief About Facebook Hacker Cup:-
Hacking is core to how we build at Facebook. Whether we’re building a prototype for a major product like Timeline at a Hackathon, creating a smarter search algorithm, or tearing down walls at our new headquarters, we’re always hacking to find better ways to solve problems. Programmers from around the world will be judged on accuracy and speed as they race to solve algorithmic problems to advance through up to five rounds of programming challenges. This is the chance to compete against the world’s best programmers for awesome prizes and the title of World Champion. 
As expected Facebook promises to continue this event every year so keep your eye out for signups to open to be the Hacker Cup 2014. So stay tuned with VOGH, for all the upcoming updates on cyber security. 







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Jadavpur University Official Website is Vulnerable to Sql Injection

Jadavpur University Official Website is Vulnerable to Sql Injection 

An ethical hacker from India named Chirag Singh have figured out serious loopholes in the official website of Jadavpur University -one of the most renowned and prestigious university of India. Chirag find blind Sql injection vulnerability which can be exploited by malicious purpose in order to harm the website and gain access. From the vulnerability report submitted by the hacker, it has been found that the web-server of Jadavpur University is using Red Hat Enterprise Linux 5 (Tikanga) where the web application technologies are Apache 2.2.3 and PHP 5.1.6; along with the back-end database is PostgreSQL. The hackers also managed to dump 11 database with more than 215 tables as shown in the picture below 

This issue has already been reported to the concern person and the webmaster of Jadavpur University, and due to security and privacy we are not exposing and mention the vulnerable link and dumped database.







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous & RedHack Breached Israeli Intelligence Agency 'Mossad' Leaked Personal Data of 35K Officials

AnonymousRedHack Breached Israeli Intelligence Agency 'Mossad' Claimed to Have Personal Data of 35K Officials (#OpIsrael)

A week ago infamous hacker collective group Anonymous called for Operation Israel (#OpIsrael) second phase, where they vows to engage massive cyber attack against Israeli cyberspace in order to interrupt all the necessary service, which the hacker called a complete outage. The main phase of attack was planned at 7th April, but now it looks that those hacker collectives changed their strategy, or may be they can't wait till April, and as result anti-Israel hacking collective affiliated with Anonymous managed to breach several Israeli government servers, causing a big data leak of more than 35,000 Israeli government officials, including politicians, military leaders, and police officers. The hack was done under the banner of #OpIsrael, and from the twitter feed of Anonymous, the hacker group took responsibility of the cyber attack. A comprehensive spreadsheet purporting to include the information of all 35,000 Israeli officials was published by the website Cryptome, though it did not independently verify the information. The coalition of hackers appears to have ties to the Iranian government, Pakistan, Syria, Egypt, and the terror group Hezbollah, according to a report published by Cryptome. 
In our last report on this story we covered that, the attack will be organized as Anon ask other hackers and other underground communities to join the campaign. As expected, it happens; RedHack, a Turkey-based Marxist hacker group responded to Anonymous and they claimed to breach Israeli intelligence agency known as 'Mossad.' RedHack claimed to gain access inside Mossad's server; which lead them release personal information including phone numbers, emails and addresses of Mossad officials"Yes, we realize we are sailing in dangerous water but we like swimming,” said hackers of RedHack. From a report of RT we came to know that not only data breach but also hackers performed massive denial of service attack against Mossad. In spite of RedHack’s claims, some argue that the names and information do not belong to Mossad officers or informants. 
“Whatever they stole, it probably wasn’t secure details of top Israeli brass, either from the army or the Mossad,” internet researcher Dr. Tal Pavel told the media. “There is no doubt that they got some identification information about Israelis, but the claims that they hacked the Mossad site and got a list of Mossad agents is most likely psychological warfare, and not a hack into an important database,” Pavel added. 
Whether those leaks are not that classified, whether those data does not belongs to Mossad, but one thing is clear and that is in-spite of having precaution, Israel government yet again failed to protect themselves from massive attack which caused a massacre. And from this story it is also predictable that hackers around the globe came under one shade or one unity, in order to target Israel over Gaza issue. As 7th April is still a week away from today so lets wait for the time, and stay tuned with VOGH to get all the latest update on this story and also other cyber issues.







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

"We Steal Secrets: The Story of WikiLeaks" -Documentary Movie Based on WikiLeaks

"We Steal Secrets: The Story of WikiLeaks" -Documentary Movie Based on Julian Assange & WikiLeaks 

Millions of WikiLeaks fans will be happy when they will come to know that a documentary type movie is coming in this year which will be based on the true story or in other sense, based on the journey of WikiLeaks. As per sources several active projects are currently running on WikiLeaks such as a feature called “The Fifth Estate” which stars  Benedict Cumberbatch as Julian Assange. Other versions are planned as well, but the very first one which is out of the gate is the one we are talking about. The name of much waited coming movie is “We Steal Secrets: The Story of Wikileaks” which will be a documentary coming later this year from the insanely prolific filmmaker Alex Gibney. People like us who love the cyber space have already seen many movies based on hacking like Hackers, Takedown, The Matrix, Die Hard 4, The Italian Job, Anti TrustSwordfish, The Girl With Dragon Tattoo, Reboot & so on. So the special expectation  will deferentially be on "We Steal Secrets" and the official trailer is saying so. 
According to IMDB, it has been confirmed that WikiLeaks founder Julian Assange himself is acting on the movie where another world famous hacker Adrian Lamo playing an important role in We Steal Secrets- a documentary that details the creation of Julian Assange's controversial website, which facilitated the largest security breach in U.S. history. 






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Threatens Israel to Erase From The Internet (#OpIsrael)

Anonymous Threatens Israel to Erase From The Internet (#OpIsrael)
Infamous hacker collective group Anonymous along with some organized hacker communities together started a massive rampage against Israeli cyber space. The hacker group threatened Israel government while  planning to engage a massive cyber-attack on Israel, saying that, they will "erase" the country from the Internet. From some legitimate sources it has been confirmed that the hackers are planning to execute the attack on 7th of April. One of the twitter account of Anonymous also confirmed the date and timing, while saying "Hacktivists Starting Cyber Attack against Israel on 7th of April." Also twitter feed of Anonymous invited numerous hackers communities around the world to join up for the cyber rampage dubbed Operation  Israel Phase 2 (#OpIsrael). On the other hand Israel government took the threat seriously and taking almost every steps to avoid any kind of disaster. Ofir Ben Avi, director of online group Accessible Government of Israel told the media -“It’s something being organized online over the past few days. What distinguishes this plan when compared to previous attacks is that it really seems to be organized by Anonymous-affiliated groups from around the world in what looks like a joining of forces”
As you all might know that past experience of Israel while dealing hackers was not at all sweet. In case of Anonymous then we would like to remind you that, this would be the second attack on Israel by the group, as they launched the first “OpIsrael” in November 2012 in response to Israel’s attack on the Gaza Strip.  If you dig the recent past you will come to know that not only Anonymous, but also hackers from different part of the world targeted Israeli cyber space and caused big damages. For instance we can recap the hack of Kosova Hackers Security (KHS) where they hacked and exposed personal data of 35,000 Israeli people. Here we must have to name the hackers from Pakistan who are constantly against Israel causing massive cyber attack against leading IT industry of Israel and other high profile Israeli sites. Just a couple of months ago, the world seen what it call the black day in the history if Israeli cyber space where another Pak hackers community hacked the main domain controller of Israel, which causes a massive hack against almost all the big Israeli sites such as government, MSN, Bing, Live, Skype, Microsoft Store, BBC, CNN, Coca-Colla, XBOX, Windows, Intel & many more. Here we can also take the name of Indian hacker Godzilla & Arabian hacker community (Group-XP) who also harassed and harmed the Israeli cyber space very very badly. After observing all the scenario mentioned above, it is expected to watch some sensational fight between hackers and Israeli government. So lets wait for the time, and stay tuned with VOGH to get all the latest update on this story and also other cyber issues.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NATO Prepared Tallinn Manual -International Law Applicable to Cyber Warfare

NATO Prepared Tallinn Manual -International Law Applicable to Cyber Warfare

NATO finally published the final version of a document expected to shape cyber warfare policies among Western nations was published last week, clarifying when and how countries can legally conduct online aggression against one another. The International law of Cyber Warfare have been  published by the Cooperative Cyber Defence Centre of Excellence (CCDCOE) set up in Estonia, in 2008, the Tallinn Manual on the International Law Applicable to Cyber Warfare. Spanning 215 pages, the Tallinn Manual makes it clear that a full-scale war can be triggered by network-borne attacks on computer systems and that civilian activists that participate in those are considered legitimate targets. However, the manual specifically rules out state-sponsored attacks on critical civilian infrastructure. Nuclear power plants, hospitals, dams and similar are all out of bounds for cyber war, the manual states.

The Tallinn Manual:-
The Tallinn Manual on the International Law Applicable to Cyber Warfare, written at the invitation of the Centre by an independent ‘International Group of Experts’, is the result of a three-year effort to examine how extant international law norms apply to this ‘new’ form of warfare. The Tallinn Manual pays particular attention to the jus ad bellum, the international law governing the resort to force by States as an instrument of their national policy, and the jus in bello, the international law regulating the conduct of armed conflict (also labelled the law of war, the law of armed conflict, or international humanitarian law).  Related bodies of international law, such as the law of State responsibility and the law of the sea, are dealt within the context of these topics.
The Tallinn Manual is not an official document, but instead an expression of opinions of a group of independent experts acting solely in their personal capacity.  It does not represent the views of the Centre, our Sponsoring Nations, or NATO.  It is also not meant to reflect NATO doctrine.  Nor does it reflect the position of any organization or State represented by observers. 

The Tallinn Manual is available in both paper and electronic copies from Cambridge University Press



-Source (IT News & CCDCOE)










SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...