LulzSec Security opens 'request line'



After claiming responsibility for attacking several sites, including the US Central Intelligence Agency, hacker group LulzSec opened its lines to accept hack requests.
Last Tuesday, the group posted a phone number on its Twitter account, as well as ports for online chats, inviting the public to "join the party."

"Call us: 614-LULZSEC (now accepting calls) |


 Join the party: irc.lulzco.org (port 6697 for SSL 


 channel #LulzSec or http://t.co/Sm5wHjd)," 





LulzSec had claimed it hacked the Public Broadcasting Service, an affiliate of the Federal Bureau of Investigation, and Sony. An article on PC World said the group disrupted websites during its "Titanic Takeover Tuesday." 
The PC World article said group's activities Tuesday disrupted the websites for The Escapist and the IT security company Finfisher, as well as the login servers for EVE Online, Minecraft and League of Legends. It said the group claimed to have received 5,000 missed calls and 2,500 voicemails. While the 614 area code represents Columbus, Ohio, "only an irresponsible gambler would wager that that will help authorities locate members of LulzSec in the slightest," "LulzSec is begging to get busted, but also, in a perverse way, 'giving back' to a community that enjoys seeing the flaws of big companies exposed. The ironic twist is that these big companies are made big by the average public whose private information is being revealed in the hacks,"


-News Source PCWorld

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Microsoft released Kinect SDK beta for Windows


Microsoft has only encouraged and embraced this hacking, and awhile back they announced the SDK that has been released today – albeit a little late. The SDK released now is completely free for non-commercial applications, and is intended for Academics and Enthusiasts. Kinect has seen a large enthusiast community around it despite the fact that till now it was limited to the XBOX 360. Open source drivers have been written, in so far that the upcoming Linux kernel will support the device. While the Kinect's depth sensing and motion tracking prowess has been developed to make the next generation of games more interactive, its true potential lies beyond just gaming. In the time since the Kinect's release, even before the release of this free SDK for the Kinect, people have been hacking together innovative projects that show the true potential of this technology. It makes the Kinect seem like a worthy even if you don’t like the concept of playing computer games using your body as a controller. The Kinect has been hacked to do everything, from simulating a 'Minority Report' like interface, to helping the blind and rescuing earthquake victims. Now the Kinect's reach is bound to increase even more thanks to he official SDK. As Anoop Gupta, a scientist at Microsoft Research said, “The Kinect for Windows SDK opens up a world of possibilities to developers who want to unleash the power of Kinect technology on Windows. We can’t wait to see what this community will create as we work together to build more natural, intuitive computing experiences.” Microsoft is releasing the SDK with support for “Raw Sensor Streams” from the multiple sensors on the Kinect (RGB camera, depth sensor, multi-array microphone), “Skeletal Tracking” for up to two people, and “Advanced Audio Capabilities” that will allow developers to identify the sound source, and recognize speech. 

The SDK also includes documentation, and is easy to install on Windows 7.

A commercial version of the SDK will also be offered in the future, and Microsoft is probably using this beta release a means to get feedback that can be incorporated before the final release.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

CITI Group Said that more than 36000 Citi cards was Hacked





Citigroup Inc. has revealed the extent of the recent security breach it faced after hackers got access to hundreds of thousands of its credit card customers’ information in North America. Management affirmed that around 360,083 North America Citi-branded credit cards were hacked and only accounts issued in the U.S. were impacted.
Citi came to know about this unauthorized access during a routine check up. Customers' account information such as name, account number and contact information, including email addresses were leaked. However, chances of fraud are perhaps less as more critical data remained unscathed. Such data include customers' social security number, date of birth, card expiration date and card security code (CVV).
Yet, customers remain susceptible to other problems. The extent of client information that has been hacked could be used to procure further financial information through illicit ways.


Measures by Citi:-
The affected customers are being contacted by the company and measures have been taken to avoid any such event again in the future. Around 217,657 accounts were reissued credit cards along with a notification letter by Citi.
Other customers were not re-issued credit cards because either their accounts were closed or they already received new credit cards as a result of other card replacement practices. Citi is significantly monitoring these accounts for suspicious activity.


Companies Under Attack:-
Besides Citi, the other companies that suffered cyber attacks in recent times include some big names like Google Inc. (GOOG -Analyst Report), Lockheed Martin Corp. (LMT - Analyst Report), and Sony Corp. (SNE - Snapshot Report). The most notable was that of the security breach at EMC Corp.’s (EMC - Analyst Report) RSA unit, which makes SecurID used by banks for corporate networks’ to secure log in. Such a situation raises concern about the level of protection these companies are providing to their customers.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

WebGL is 'harmful' to security said Microsoft



A security firm raised new concerns today about WebGL--but Microsoft piled on with an opinion that's likely more damaging to fans' hopes for a universal 3D Web graphics standard.
"We believe that WebGL will likely become an ongoing source of hard-to-fix vulnerabilities," Microsoft said today in a security blog post flatly titled "WebGL Considered Harmful." "In its current form, WebGL is not a technology Microsoft can endorse from a security perspective."
The move effectively kills WebGL fans' hopes, at least for now, that WebGL could become a standard Web programmers could count on finding in modern browsers. And that means one hot area of programming, games development, won't have an easy, unified way to tackle Web-based software.
WebGL was created initially at Mozilla, standardized by the Khronos Group, and supported by Google. It's built into Chrome and Firefox right now, giving those browsers a way to display hardware-accelerated 3D graphics useful for games and other visually rich tasks.
As with many technologies, though, the security scrutiny picks up once the technology leaves the labs and enters the real world. Today, Context Information Security, which issued a WebGL warning in May, issued another caution.

Specifically, Context publicized a problem that could let a Web site capture a screenshot of a Firefox user's computer, the company said in a blog post. It found the problem by checking Firefox with Khronos' WebGL conformance tests, which it said Firefox and Chrome don't pass. It also called insufficient Khronos' response to the earlier concern, employing a feature called GL_ARB_robustness.
"Context therefore recommends that users and system administrators disable WebGL," Context concluded.
Khronos downplayed the concerns in a statement from spokesman Jonathan Hirshon:
1. All browser vendors are still working toward passing the WebGL conformance suite. Only once they have successfully done so can they claim support of Canvas.getContext("webgl") instead of Canvas.getContext("experimental-webgl").
2. The issue of theft of arbitrary windows on the desktop is due to a bug in Firefox's WebGL implementation, and cannot be generalized across other browsers' WebGL implementations. Moreover, that bug was addressed May 26 and is resolved in Firefox 5, slated for release June 21.
3. Browser vendors are still in the process of supporting the GL_ARB_robustness extension, so it is expected that the previously reported denial-of-service issues are still present. It is expected that the reported denial-of-service issues will be solved with the integration of this extension.
Context's warnings are reinforced by the practical reality that Microsoft just wrote it off. The company has been frosty toward WebGL, but today it publicized Context's findings and explained why it views WebGL as unsafe.
Microsoft concluded that WebGL "would have difficulty passing Microsoft's Security Development Lifecycle requirements," a stance that seems likely to doom hopes at least for now that WebGL would become a standard supported by all major browsers. Universal support means that Web developers could count on WebGL being available and therefore could use it; its absence means that some Web sites and Web apps--Angry Birds for Chrome, for example--will require compatibility checks and fallbacks.
Among Microsoft's views on WebGL's security problems are the following:
The security of WebGL as a whole depends on lower levels of the system, including OEM [original equipment manufacturer] drivers, upholding security guarantees they never really [needed] to worry about before. Attacks that may have previously resulted only in local elevation of privilege may now result in remote compromise. While it may be possible to mitigate these risks to some extent, the large attack surface exposed by WebGL remains a concern...
As WebGL vulnerabilities are uncovered, they will not always manifest in the WebGL API itself. The problems may exist in the various OEM and system components delivered by IHVs [independent hardware vendors such as video card makers]. While it has been suggested that WebGL implementations may block the use of affected hardware configurations, this strategy does not seem to have been successfully put into use to address existing vulnerabilities. It is our belief that as configurations are blocked, increasing levels of customer disruption may occur...
Modern operating systems and graphics infrastructure were never designed to fully defend against attacker-supplied shaders and geometry [software that run on a graphics chip]. Although mitigations such as ARB_robustness and the forthcoming ARB_robustness_2 may help, they have not proven themselves capable of comprehensively addressing the DoS [denial of service] threat... If this problem is not addressed holistically it will be possible for any web site to freeze or reboot systems at will.
Don't expect WebGL to vanish, though. The movement toward Web apps is powerful, with notable allies. And some of Microsoft's concerns, such as the difficulties of assigning responsibility for plugging holes, aren't as bad outside the Windows PC world. Windows PCs use a vast array of hardware combinations, but Apple computers, Google Chromebooks, and new-generation smartphones don't.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

2 Bangladeshi Site hacked by PAKLEETS



Two Educational website of Bangladesh get hacked by Pakleets.


Hacked Site:-

http://www.aitb.edu.bd/
http://www.scholars.edu.bd/

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous stated #op-Malaysia & 51 GOV site Hacked


Malaysia's Communications and Multimedia Commission said that 51 websites in the .gov.my domain were attacked beginning late Wednesday, and that 41 of the sites suffered various levels of disruption. The MCMC, the country's Internet and telecommunications regulator, did not however provide information on the nature of the attacks, or the people behind it, describing them only as "unknown hackers". DDoS attacks can make a website inaccessible to users by swamping the website with traffic from hundreds or thousands of computers.
Such attacks are a known tactic of Anonymous, a hacker group that had threatened to attack Malaysia. However, it made references to some of the websites recovering quickly, suggesting that these sites faced a DDoS or distributed denial-of-service attack rather than a hack. The MCMC had noticed a reduction in the levels of attack by 4 a.m. local time Thursday, it said. The attacks had little effect on Malaysian users, and most of the websites have already recovered, it said. "We do not expect the overall recovery to these websites to take long," it said. "The public is advised to report any information they may have regarding the identity of these hackers as the act to disrupt network services is a serious offence," it said.
Anonymous has used various online forums to threaten Malaysia with an attack in protest against the government's decision to block 10 websites that reportedly allowed the download of pirated content. Earlier this week, Anonymous invited people to join Operation Malaysia, targeting a government website from 7.30 p.m. GMT on Wednesday (3.30 a.m. Thursday, local time).

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

i-Phone Users are in Risk

Millions of iPhone users are at risk of having their devices hacked as they are picking up password combinations that are highly predictable, a new study has revealed. According to a research conducted by iPhone developer Daniel Amitay, 10,000 possible passwords are available for the device and15 percent of users choose one of ten four-digit combinations that are highly predictable.
Amitay conducted the experiment by tracking the passwords entered by users of the Big Brother Camera Security application he developed, the Daily Mail reports. He collected 204,508 passwords in the process, making the assessment using the logic that the password set-up to the application and the iPhone lock screen are nearly identical. “Because Big Brother's passcode setup screen and lock screen are nearly identical to those of the actual iPhone passcode lock, I figured that the collected information would closely correlate with actual iPhone passcodes,” Amitay said.
His findings show roughly ten percent of iPhone users use 1234 or 0000.
Amitay determined the high frequency of 199* could represent the 1990s, indicating a birth year or the year of graduating college. His findings showed the least used numbers are seven and six.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...