Showing posts sorted by relevance for query NBC. Sort by date Show all posts
Showing posts sorted by relevance for query NBC. Sort by date Show all posts

Chicago Police Department Website Under Attack From AntiS3curityOPS (#Anonymous)

Chicago Police Department Website Under Attack From AntiS3curityOPS (#Anonymous)

A hackers collective group named "AntiS3curityOPS" associated with hacktivist Anonymous claims to have taken down Chicago's police department website. As of about 11:10 a.m., the Chicago Police Department website, cityofchicago.org/police, was down along with Chicago's city website,  cityofchicago.org . The sites were back up just before 1 p.m. Chicago Police News Affairs said they weren't aware the sites weren't working as usual, but Supt. Garry McCarthy confirmed to reporters at noon the sites were indeed down. Chicago's Office of Emergency Management site, hosted on the city of Chicago site, also would not load and shortly after also went down. Officials say they continue to investigate. 

In the video statement posted online, the group AntiS3curityOPS claimed they are "actively engaged in actions against the Chicago Police Department." Earlier we have seen similar attack when Anon members targeted websites of several Police organizations like Salt Lake City Police Dept, Los Angeles Police Department, International Association of Chief of Police & so on. 


-Source (NBC Chicago)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Huffington Post Official Twitter Account Hacked


Yet another high profile and verified twitter account get compromised. This time the victim is famous news portal Huffington Post. The hacker twitted "cloverfdch is a Fucking god! Hacked :)" & "New York Postrules!!!"  from the Huffington Post official twitter account.
Huffington Post representatives did not immediately respond to a request for comment this morning but were apparently aware of the intrusion; the posts in question were quickly deleted from the site's Twitter page, although they still appear on subscribers' third-party Twitter clients.
Later Huffington Post  tweeted "Sorry about that, Twitterverse! We know we've been hacked and are working to resolve the issue as quickly as possible,"
If you dig the decent past then you will find that hijacking twitter accounts has became a common phenomena. Earlier NBC News, Fox News Politics, USAToday, Lady Gaga’s Twitter Account, Anders Breivik’s twitter, Mahesh Bhatt twitter account became victim.


-Source (CNet)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Teyana Taylor Twitter Account Hacked & Nude Photo Leaked

Teyana Taylor Twitter Account Hacked & Nude Photo Leaked 
Yet again another celebrity became the victim of twitter account hacking. This time "Christmas in Harlem" singer Teyana Taylor became the target of the hacker. Not only her twitter account get hacked but also the hacker leaked few personal photo of this star among those there are few topless pictures all those hacked photos are posted on her Yfrog a/c. Though it is not yet confirmed that those photos really belongs to Taylor or not because leaked photos do not showing the face of the victim. What ever you can still see the picture. Earlier  NBC News, Fox News Politics, USAToday, Lady Gaga’s Twitter Account, Anders Breivik’s twitter, Mahesh Bhatt Huffington Post Twitter Account became the victim of such twitter hacking. In 2011 another celebrity named Scarlett Johansson became the victim of such nude photo leaks. In her case her mobile phone get hacked which leaks few controversial photos of the star.





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Sky News Twitter Account Compromised & Said James Murdoch Arrested


The official twitter account of Sky News hacked and claimed that James Murdoch has been arrested. The compromised twitter account tweeted that the News Corporation's Chief Executive and Chairman Mr. James Murdoch had been arrested by police in London.


The false tweet was erased within minutes, but not before other Twitter users had shared it across the network. The @SkyNewsBiz account was later updated to deny the story, and claim that a hacker was most likely responsible. Previously the twitter a/c of Fox News get hacked and rumor spread that "Barack Obama has just passed. Neraly 45 Minutes ago. he shots twice in the lower pelvic area and in the neck; shooter unknown bled out." Also USA today, NBC news twitter was hacked.


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Popular American Singer-Songwriter Kesha's Twitter Account Hacked

Popular American Singer-Songwriter Kesha's Twitter Account Hacked
Again another celebrity became the victim of twitter hacking. Popular American singer-songwriter stylized Ke$ha Twitter account allegedly hacked yesterday. The hacker immediately tweeted the latest song Ke$ha was about to release. Here is the controversial tweet:- "Single out in a couple hours. Ugh so f**kin stressful… wish I could stay on da (the) beach forever.”
The open tweet was seen by more than 3.1 Million follower of Ke$ha. After the singer spotted the false message, she realized her account had been compromised and quickly deleted it. She then posted this explanation:- "animals!! i love u! i got hacked. single is not out YET. promissse you’ll be the first to know!xx"
The twitter account of Ke$ha was verified, so it’s currently unclear if someone outside of Kesha’s inner circle actually managed to gain access to her account. It’s certainly possible that someone she knows and has entrusted her Twitter account password with decided to post the malicious tweet.
Earlier  NBC News, Fox News Politics, USAToday, Lady Gaga’s Twitter Account, Anders Breivik’s twitter, Mahesh Bhatt Huffington Post Twitter Account became the victim of such twitter hacking. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Mahesh Bhatt's Twitter Account Hacked


Famous Bollywood director Mahesh Bhatt's twitter account get compromised. On the 29th of November an abusive comment was tweeted from Bhatt's account. Celebrities like Poonam Pandey, Sunny Leone and KRK has been abused with slang on that particular tweet. 
"@ghantaasingh @kamaalrkhan @SunnyLeone @iPoonampandey #AapChutiyeHain,"

Later Bhatt tweeted that  "Someone has hacked my account and used it to abuse Kamal Khan and few others. This is dangerous."

A flabbergasted Kamaal Khan couldn't believe his eyes as he read the message addressed to him from none other than Mahesh Bhatt.  On reading the abusive message, Kamaal immediately wrote back to Mahesh Bhatt asking, "bhai jaan I shall appreciate if you can clarify whether you are calling me chutiye?" 
Later Poonam Pandey, who was abused on that tweet said that 

"i Guess this Words cant be of @MaheshNBhatt as he is a gem of person and a gentleman! #HACKED," reacted Poonam Pandey on her twitter page. 
Poonam Pandey's hunch was true as Mahesh Bhatt posted after a few hours, "Someone has hacked my account and used it to abuse Kamal Khan and few others. This is dangerous."
Now a days hacking into celebrities twitter account became a common phenomena. Earlier lots of high profile twitter a/c get compromised among them Fox News, NBC News, USA Today, Sky News and many more. Earlier in this year the mail a/c of Bollywood actor and director Arbazz Khan was also hacked and now Mahesh Bhatt also became the victim. It seems that Bollywood celebrities are on the hot-list of cyber criminals. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

E!Online Official Twitter Account Hijacked By Syrian Electronic Army (#twithackery)

E!Online Official Twitter Account Hijacked By Syrian Electronic Army (#twithackery) Fake Tweet Claimed Justin Bieber is Gay

The massive ongoing twitter hijacking also known as twithackery carried by carried by the infamous pro-Assad group of hackers known as the Syrian Electronic Army targeted another high profile twitter account. After the successful hijack of three high profile twitter account of CBS news followed by the hack of BBC and the Associated Press twitter account, now Syrian Electronic Army aka SEA have caught another big fish  that is E! Online -one of the leading resource of entertainment and celebrity gossip news. The official twitter account of E!Online that has over five million followers fallen victim to these dangerous hacker collective group. As per several legitimate sources this high valued twitter account was hacked on Saturday afternoon and subsequently posted several false tweets about a few celebrities, most specifically Justin Bieber. After the successful hijack, exactly like earlier the hacker group started tweeting false message. Among those One tweet read, “Exclusive: Justin Bieber to E!Online: I’m a gay,” followed by a shortlink.  Another read, “Exclusive: Selena Gomez tells E! she will fully supporting Justin in his coming out” [sic], also followed by a shortlink.  (Selena Gomez was Bieber’s girlfriend up until recently).  And another made reference to Angelina Jolie blaming Jordan for “the Syrian refugees’ atrocious conditions.” Here is screen capture of those fake tweets:- 

After this mishap security experts have figured out that many of those links associated with the above fake tweets redirecting users to malicious webpages. So users were urged not to click on the links. Not only the official twitter account, but also the hacking group also managed to infiltrate the E!’s text messaging system, sending hundreds of thousands of subscribers similar messages including an obscene message relating to President Barack Obama

While talking about twitter hacking, widely known as #twithackery; we would like to remind you the following names, WWE champion John CenaStar Rita OraJustin BieberTeyana Taylor,American pop singer KeshaNBC NewsFox News PoliticsUSAToday, Lady Gaga’s Twitter AccountAnders BreivikMahesh Bhatt, Huffington Post & CBSthese are the famous names who have fallen victim to twithackery before E!Online. In the wake of all the recent cyberattacks on news organizations, Twitter has warned media accounts that they will continue to be targets of hackers, and has advised them to take all appropriate steps to further secure their Twitter accounts. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

American Actress & Model Lindsay Lohan's Twitter Account Hacked

American Actress & Model Lindsay Lohan's Twitter Account Hacked

Now a days hacking of celebrities, singer, Media, high profile personalities' twitter has became a natural phenomena. Here again another twitter hacking, also known as #twithackery occurs. After John Cena, Justin BieberTeyana Taylor,American pop singer Keshanow it was time for popular  American actress, fashion designer, model and recording artist Lindsay Morgan Lohan. A fake tweet was posted to the 26-year-old star's feed on the social-media site, leaving all of Lohan's 4.5 million followers a bit confused. According to sources Lindsay Lohan’s Twitter account was hacked on Tuesday with the tweet, 
“How does Hitler tie his shoes?” including a link to the answer on @oatmeal's blog. 
As soon as this tweet was spotted on the wild, immediate step has been taken from the side of Lindsay Lohan, and as expected that fake tweet has been deleted. So far the actress hasn’t expressed much concern for this slight security breach. 


But after regaining access on the twitter page Lindsay Lohan confirmed that her page indeed hacked while tweeting "my twitter was hacked, please ignore the last tweet."  as shown on the above picture. While talking  Lindsay Lohan twitter hacking, we also want to include the name of those celebrities  who have fallen victim to these nonstop #twithackery : NBC NewsFox News PoliticsUSAToday, Lady Gaga’s Twitter AccountAnders Breivik’s twitterMahesh Bhatt, Huffington Post & many more. 











SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

BlackBerry PlayBook The Most Secure Tablet For BYOD Solution

BlackBerry PlayBook The Most Secure Tablet For BYOD Solution

Now a days users of tablet is increasing everyday. Millions of people across the globe are using tablet for both personal and professional purposes. While the number of users and purposes of using tablet are rising, besides the matter of privacy and security arises. There are many companies who are manufacturing tablet, but before choosing, we should know which one is secured than others. According to a recent report by Context Information Security -the PlayBook of BlackBerry is the only device among three top tablets that gives users a good, safe division between their work and personal computing, a recent technology audit concluded.  The report faulted the PlayBook, as well as the Apple iPad and the Samsung Galaxy Tab, for default settings that don't automatically encrypt backups, and for not offering complementary and compatible tools for IT teams to manage a large number of devices at the business level. According to Jonathan Roach, Principal Consultant at Context and author of the report "While the iPad and BlackBerry PlayBook performed better, both still have security deficiencies -- including desktop software that fails to encrypt backups by default." He also said "Context found the PlayBook to be the most work-ready personal tablet of the three, due to its Bridge application's excellent support of barriers between work and personal profiles," 
According to report by contrast, Apple's wildly popular iPad sold more than 17 million units last quarter. Context found the iPad to be the second-most-secure device, citing its "robust data protection and damage limitation facilities," but said on its news page that the device was still vulnerable to jailbreak attacks and "ineffective disk encryption unless a strong passcode policy is applied." 
The report also found the Galaxy Tab's security features to be the least work-play ready, with weak disk-encryption support. The Galaxy Tab's lack of tools tailored to enterprise use makes it "very difficult to manage more than a small number of Galaxy Tabs in an enterprise environment," a point Apple also falls short on. The report criticized the Galaxy Tab's encryption as well. Even with encryption enabled, the report found that Samsung's device still "allows badly-written apps to store sensitive information on the unencrypted SD card." The report also praised all three tablets for their support of Exchange ActiveSync, a feature that allows crucial security settings to be managed from a central server running Microsoft software. But the study noted important differences among the devices that may make some tablets more appropriate for dual use in both the home and the office.
"Despite that security advantage, RIM only managed to ship 130,000 tablets last quarter. By contrast, Apple's wildly popular iPad sold more than 17 million units last quarter. Context found the iPad to be the second-most-secure device, citing its 'robust data protection and damage limitation facilities,' but said on its news page that the device was still vulnerable to jailbreak attacks and 'ineffective disk encryption unless a strong passcode policy is applied" -Jonathan added


To Download the full Report Click Here


-Source (Context Information Security & NBC News)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

The Washington Post Server Breached! Chinese Hackers Apprehend For This Cyber Attack

The Washington Post Server Hacked! Suspected That Chinese Hackers Are Behind This Cyber Attack 
Last week the story of Chinese eavesdropping on European ministries and diplomats at G20 summit draws the attention of the entire cyber world and made headlines. Yet again another breathtaking issue came in-front where also China found responsible for security breach that effected The Washington Post - the most widely circulated newspaper published in Washington, D.C. Sources reveled that hackers broke into The Washington Post’s servers and gained access to employee user names and passwordsMandiant, a cyber security contractor that monitors The Washington Post’s networks, said the intrusion was of relatively short duration. The extent of the loss of company data was not immediately clear, still the matter of relief is that the company passwords are stored in encrypted form, hackers in some cases have shown the ability to decode such information. although to avoid any further mishap Washington Post have planned to ask all employees to change their user names and passwords on the assumption that many or all of them may have been compromised. Officials at Washington Post said that they saw no evidence that subscriber information, such as credit cards or home addresses, was accessed by the hackers. Nor was there any sign that the hackers had gained access to The Post’s publishing system, e-mails or sensitive personal information of employees, such as their Social Security numbers. Post officials found that this hack is more-recent than the 2011 one. They also said, began with an intrusion into a server used by The Post’s foreign staff but eventually spread to other company servers before being discovered. “This is an ongoing investigation, but we believe it was a few days at most,” said Post spokeswoman Kris Coratti. 
China not only targeted Washington Post,  If you look at the story of major cyber attacks of this year we will find that the name of China has been involved several times for engaging cyber attacks against several high profile news organization of U.S. including New York TimesNBC and so on. So far Chinese Government have not responded to this issue, also none of Chinese hacker community take the responsibility of this breach. For upcoming updates on this story stay tuned with VOGH




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

PayPal Sent 1,000 IP Addresses List of Anonymous to FBI


In cooperation with the FBI, PayPal sent them a list of about 1,000 IP addresses that carried malicious code during Anonymous' attacks on it last year, which helped agents target specific people in recent raids that led to 16 arrests.
An affidavit filed by Special Agent Chris Thompson reveals that PayPal worked closely with the feds to nail down those responsible for the attacks on it, from the time the attacks started to about a week later, when PayPal found warnings about the FBI sweeps circulating amongst participants in the attacks.  
As early as December, FBI agents had been in contact with Dave Weisman, PayPal's senior manager of its Electronic Crimes and Threat Intelligence Unit. They shared a conference call two days after PayPal was hit with a distributed denial of service (DDos) attack in retaliation for suspending donations  to WikiLeaks through its PayPal account. PayPal reported several attacks to the FBI that occurred between Dec. 6 and 10.
On Dec.15, PayPal provided agents with a thumb drive that contained "logs and report detailing information regarding approximately 1,000 IP addresses that sent malicious network packets to PayPal during the DDoS attacks."
The 1,000 IP addresses were derived from logs created by a PayPal-owned Radware device that records the attackers' IP addresses and the malicious signature it's programmed to recognize. According to the affidavit, a senior security engineer at eBay identified the specific set of strings being used in the attacks, and found only half a dozen variations, leading investigators to be able to pinpoint the patterns of the infiltration.
The IP addresses captured by PayPal were able to be linked to specific premises through subpoenas served upon AT&T and other Internet Service Providers. One of the 1,000 IP addresses given to the FBI by PayPal sent more than 3,600 "malicious network packets" to PayPal between Dec. 8 and 9. A federal grand jury subpoena was served on AT&T on Jan. 6, which AT&T complied with a response on Jan. 18, which led to Valori S. Reid and Peter B. Reid, and their 19-year-old son Ethan, in Arlington, Texas. 
The Reids weren't arrested, but their home was the site of one of 35 search warrants executed by the FBI in relation to the Anonymous investigation. 

Here is a screen shots or warning for every suspects who might have been involved in that operation:-  


-News Source (NBC)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Young Pop Star Justin Bieber's Twitter Account Compromised

Young Pop Star Justin Bieber's Twitter account Compromised 
World famous pop singer from Canada, Justin Drew Bieber also enlisted his name among those celebrities whose twitter account get hacked. The attacker has tweeted an unauthorized message in-front of the 19 Million of twitter follower. 
The hacker has tweeted the above message but fortunately that very tweet was immediately deleted. The hashtag "biebermyballs" sounds familiar, it should, same words were tweeted repeatedly from Carly Rae Jepsen's Twitter account after it was hacked several weeks ago. It is not clear if Bieber's account was hacked same person. The hacker responsible for Jepsen's hack was not identified yet. Few days ago another American pop singer "Kesha" twitter a/c get hacked. Same things happen to Teyana Taylor twitter which even caused exposure of few personal photo of this star among those there are few topless pictures.
Not only these two but also we have seen such attacks many times. Earlier  NBC News, Fox News Politics, USAToday, Lady Gaga’s Twitter Account, Anders Breivik’s twitter, Mahesh Bhatt Huffington Post Twitter Account became the victim of such twitter hacking.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Evernote Security Breached! Causing 50 Million Passwords Reset

Evernote Security Breached! Causing 50 Million Passwords Reset

World famous online information storage firm Evernote, allows millions of people to store and organised personal data on an external server from cross-platform have fallen victim to latest round of cyber attacks where hackers had managed to breach the company network which results a massive data breach effecting more than 50 million of its registered users. The breach on Evernote follows malicious activity at Twitter, NBC, New York Times, Facebook and others in recent weeks. In their blog release the firm has acknowledged the incident while saying "Evernote’s Operations & Security team has discovered and blocked suspicious activity on the Evernote network that appears to have been a coordinated attempt to access secure areas of the Evernote Service." But the matter of relief for the millions of its users are that, whether the hackers have gained access inside Evernote user information, which includes usernames, email addresses associated with Evernote accounts, but due to salted encryption; hackers fail to gain decrypt those  credentials. But to avoid further massacre Evernote did password reset of all it's registered users. Phil Libin, Evernote’s CEO and founder, told press that the services are running, although if you try to access the site things may not work as normal at the moment: “We just pushed out a password reset, so the servers are going to be saturated for a bit,” he wrote. “Everything is up, although response is choppy. There’s no threat to user data that we’re aware of” -said Phil. Evernote also claimed that also have no evidence of any payment information for Evernote Premium or Evernote Business customers was accessed during the hack. 
The security response team of Evernote apologized for the annoyance of having to change your password, but, ultimately, they believed that; this simple step will result in a more secure Evernote experience.





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Prolific "spokesman" for Anonymous leaves the hacker group




In one year, Barrett Brown made himself into one of the best-known public faces of the hacker collective Anonymous—and now he's stepping away from the group.
"There's little quality control in a movement like that, which was not a huge problem when the emphasis was on assisting with North African revolutions and those who came on board thus tended to be of a certain sort," he told Ars this week.
"But as things like OpSony arise, you attract a lot of people whose interest is in fucking with video game companies—which is not to say that there aren't legitimate reasons for OpSony or that the majority involved aren't quality people, but to the extent that someone sits things out when we're working to promote liberty and fight dictatorships but then hops on board when we start going after an electronics firm that's perpetrated far lesser villainy, one has to question those peoples' priorities."

Public face

Brown has been an unofficial "spokesman" of sorts for Anonymous, a go-to guy whenever a news outlet needed a real name or a face to put on TV. He and another Anon, Gregg Housh, have become public symbols of a movement that largely cloaks itself in anonymity, hiding behind Guy Fawkes masks and Internet Relay Chat handles.
How many other Anons would sit for a lengthy profile of the sort featured in the March issue of Dallas' D magazine that talks about Brown's heroin use, his sexual escapades, and the reason he wears cowboy boots—while running a photo of him slumped in a chair beneath a stuffed bobcat? And that featured descriptions like this?
The 378-square-foot efficiency was dimly lit and ill-kept. Dirty dishes were piled high in the sink. A taxidermied bobcat lay on the kitchen counter. Brown is an inveterate smoker—Marlboro 100’s, weed, whatever is at hand—and the place smelled like it. An overflowing ashtray sat on his work table, which stood just a few feet from his bed in the apartment’s “living room.” Two green plastic patio chairs faced the desk. I left with the feeling that I needed a bath.
Brown got publicly involved in Anonymous in early 2010, when the group launched Operation Titstorm and targeted the Australian government's Web censorship proposals (which included a plan to ban depictions of nude small-breasted women who might resemble underage girls—hence the name of the operation). Brown wrote a piece for the Huffington Post at the time in which he saw the Anonymous attack as a new kind of "revolutionary engine" that might one day remake the world and even threaten the concept of the nation-state.
"Having taken a long interest in the subculture from which Anonymous is derived and the new communicative structures that make it possible, I am now certain that this phenomenon is among the most important and under-reported social developments to have occurred in decades, and that the development in question promises to threaten the institution of the nation-state and perhaps even someday replace it as the world's most fundamental and relevant method of human organization," he wrote.
To help create this world of spontaneous communities linked only by shared goals and not by geography or ethnicity, Brown decided to help Anonymous in a public fashion after being contacted by Housh. He had a front-row seat for the late 2010 Anonymous ops targeting Middle Eastern regimes. "What I saw and did during the next few weeks convinced me that these sorts of efforts can and should be used to channel dissatisfaction with injustice into concrete action in opposition to such things," he told me.
But it wasn't the Anonymous Middle East ops that captured the world's attention; it was the group's pro-WikiLeaks attacks on financial firms that had cut off the site's access to donations which led to international headlines. Anonymous staged denial of service attacks on MasterCard, Visa, and others—and the FBI got involved, eventually executing 40 search warrants against the group.
Meanwhile, HBGary Federal CEO Aaron Barr decided to "unmask" the supposed leadership of Anonymous, only to see the group break into his company's computers, make off with his private e-mails, and expose some terribly shady goings-on to the light of day. Barr eventually resigned his job—but Anonymous gained even more press. Brown even took the lead role in a national NBC News segment on Anonymous earlier this year, one that called him "an underground commander in a new kind of war." (The stuffed bobcat is visible in the background.)

The HBGary operation showed Brown that he had been right. "The HBGary operation demonstrated that small teams of individuals with relevant skills can do a great deal of damage to institutions that are otherwise effectively invincible by virtue of their position within the system," he told me.
"The fact that the FBI had just raided 40 alleged participants in DDoS attacks in conjunction with a sweeping international investigation into Anonymous even as Team Themis' various criminal conspiracies were facilitated by the Justice Department and have thus far been ignored by 'law enforcement,' meanwhile, has reaffirmed my belief that the rule of law is void."

Creating "pursuants"

What's going to replace the rule of law? Private bands of citizens engaged in a "massive campaign of investigation and exposure." While Anonymous could do some of the work, the group seems unable to shake its juvenile rhetoric, its thirst for "lulz," and its reputation for drama. These traits were certainly on display in the last few weeks when an Anon known as "Ryan" took over the main AnonOps IRC servers and posted chat logs and IP addresses of users—temporarily depriving Anonymous of its main gathering point. Ryan said his actions were taken to overthrow the dictators off in invite-only chat rooms, making plans and acting like the group's leaders. Was this true? And does the truth even matter?
For Brown, Anonymous has become a distraction to the work he really wants to accomplish. "To the extent one works out of AnonOps or some other venue of that sort, one has to deal with those people, as well as with a lot of frankly disturbed hacker types like Ryan—who continues to fuck with my projects," he said. So Brown and some like-minded associates will do some of the same work, but under a different banner—Brown's existing "Project PM."
What is Project PM? According Brown's description of the project, it's "a pursuant—an autonomous online entity composed of individuals who have come together to conduct activism in pursuit of a particular end and who wish to do so by the most efficient means available." The first big project is OpMetalGear, which has set up a wiki to collate information on defense and intelligence contracting, especially as it related to the "persona management" software sought by the US government and discussed in some of the HBGary Federal e-mails.
To some, Brown looks like a spotlight-hogging "namefag"; a Radio Free Europe blogger recently suggested that Brown could be the next Julian Assange. "There are clear parallels with Assange," wrote Luke Allnutt on May 18. "A broken home, interrupted education, a fierce independent streak, a conspiratorial mind, and a clear desire to be in the limelight. They both like to see themselves (in Assange's case, with some justification) as plucky digital outlaws taking on the Internet’s evil corporate and state overlords."
Critics of Anonymous routinely single out Brown for criticism due to his public identity. "Barrett Brown, you are one dumb son of a bitch. Ballsy, but dumb," said one critic on Twitter, who complained that Brown was little more than an apologist for a gang of crooks. Conservative blogger Robert Stacy McCain wants to know if the FBI is watching Brown, "and if they’re not already, shouldn’t they?"
Others suggest that Anons don't like him much, or perhaps worry about what he knows. Earlier this week, security firm Kaspersky Labs noted Brown's departure, saying, "Anonymous observers, who asked to remain anonymous themselves, said there's reason to believe that Brown is being cut off by core Anonymous members worried about having their identities exposed, or wary of Brown's focus on government wrongdoing."
As for Brown, he plans to keep working "with people who are themselves still very much associated with Anonymous and AnonOps in particular," but he won't be operating under the "Anonymous" banner any longer.
Funding this kind of work can be a challenge. When he announced Project PM last year, Brown asked readers for donations.
"You’ll also get a lot of bang for your buck in terms of the marginal utility of your patronage, as I am extraordinarily frugal, even Spartan insomuch as that I spend a lot of time sitting around without a shirt on, or pants, or more than one sock," he wrote. "I smoke Top rolling tobacco, which goes for around $3 a package and is sold in many prison commissaries. I eat oatmeal for breakfast rather than endangered condor eggs dipped in wasabi-infused veal compote like Christopher Hitchens does. Anyway, the tobacco is necessary for my work."
Thanks to his heightened profile, Brown did secure a writing gig with The Guardian newspaper in the UK, which brings in a bit of cash. He also writes for magazines like our sister publication Vanity Fair here in the US. (Update: Brown clarifies that both the Guardian and Vanity Fair gigs began before he got involved with Anonymous.)
He's now working on pieces for Al-Jazeera that discuss what he has learned from OpMetalGear. Brown also has hopes for a film script. "It's a sort of dark political comedy about a guy who secretly ends up as a speechwriter for both candidates in the same campaign," he said.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Supercookies Of MSN Has Been Disabled By Microsoft


Microsoft has eliminated controversial "supercookies" that were present on MSN.com, in response to research that detailed the user-tracking technique. Unlike regular cookies, or even newer Flash cookies, the latest generation of tracking technologies can't be disabled by browser users, even with privacy add-ons. That revelation surfaced late last month, in two separate research papers.
The first paper, "Tracking the Trackers: Microsoft Advertising (cache and ETag supercookies)," written by Stanford University graduate student Jonathan R. Mayer, highlighted new, persistent-cookie techniques being used by Microsoft on its MSN.com site.
In response to that paper, released in July, Microsoft on Thursday disclosed that it had immediately investigated Mayer's assertions, identified the code in question, and disabled it. 

"We determined that the cookie behavior he observed was occurring under certain circumstances as a result of older code that was used only on our own sites, and was already scheduled to be discontinued," said Mike Hintze, associate general counsel for regulatory affairs at Microsoft, in a blog post.
"We accelerated this process and quickly disabled this code. At no time did this functionality cause Microsoft cookie identifiers or data associated with those identifiers to be shared outside of Microsoft," he said. "We are committed to providing choice when it comes to the collection and use of customer information, and we have no plans to develop or deploy any such 'supercookie' mechanisms."

Interestingly, the use of ETag supercookies that Mayer discovered wasn't limited to Microsoft. In fact, a separate group of researchers found similar techniques at use in a wide range of websites, as detailed in their paper, "Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning," released late last month.
That report's co-author, Ashkan Soltani, an independent privacy researcher, said in a blog post that the team discovered the new tracking techniques when recreating their 2009 study,  

"which found that websites were circumventing user choice by deliberately restoring previously deleted HTTP cookies using persistent storage outside of the control of the browser (a practice we dubbed 'respawning')." The technique is often used by online advertisers and their affiliates to track online behavior.
In the course of the new research, the team identified 5,600 HTTP cookies used on popular sites, 88% of them from third parties. Google-run cookies were present on 97 of the top 100 websites--including government websites--and Flash cookies were also present on 37 of the top 100 websites. In addition, 17 sites used HTML5, with seven also used "HTML5 local storage and HTTP cookies with matching values," said Soltani.
In addition,  
"we found two sites that were respawning cookies, including one site--hulu.com--where both Flash and cache cookies were employed to make identifiers more persistent," he said. "The cache cookie method used ETags, and is capable of unique tracking even where all cookies are blocked by the user and 'Private Browsing Mode' is enabled."
 
Exactly what are ETags? According to the report, "ETags are tokens presented by a user's browser to a remote webserver in order to determine whether a given resource (such as an image) has changed since the last time it was fetched. Rather than simply using it for version control, we found KISSmetrics returning ETag values that reliably matched the unique values in their 'km_ai' user cookies."

Wired first reported those findings, which led television streaming website Hulu.com to sever ties with one of the supercookie-using tracking firms detailed in the report, startup KISSmetrics. Spotify also suspended its relationship with the company, pending an investigation.
In a blog post, Hiten Shah, CEO of KISSmetrics, slammed the report for inaccuracies, arguing that it "significantly distorts our technology and business practices." Namely, he said, while his company employs a unique identifier for every person it tracks, even across websites, "internally, these identifiers are instantly translated into unique identifiers for each customer, and KISSmetrics has gone to extensive lengths to avoid linking any information from different customers, including segregating each customer's data in a completely separate database."
According to Shah, the same day the report was released, the first of two related lawsuits were filed against his company.
Hulu's move to sever ties over controversial marketing practices isn't surprising, considering it had been named in a previous class action lawsuit that resulted from Soltani's original respawning study, released in 2009. The result of that lawsuit was a $2.4 million settlement in December 2010, and a promise by Clearspring and Quantcast to discontinue using the technology.
Meanwhile, other defendants in the suit--ABC, ESPN, Hulu, JibJab Media, MTV Networks, NBC Universal, and Scribd--agreed to warn user if Flash was being used to track them, and to detail in their website privacy policies how to block the practice.
How can users stop supercookies? While do not track capabilities in browsers have attracted much attention lately as a way to block persistent tracking, supercookies can't currently be stopped from within the browser. Accordingly, blocking supercookies might require some type of privacy legislation that compels U.S. businesses to respect users' "do not track" intentions, as well as to disclose their tracking techniques. 


-News Source (Information Week)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...