Skip to main content

Posts

Showing posts from June, 2013

Opera Internal network hack

Hackers breached the Opera Internal network infrastructure and managed to compromise expired Opera code signing certificate. The cybercriminals used the certificate to sing their malware and distributed the malicious software to thousands of Opera users through automated update function. The malware is currently detected by half of the antivirus engines used by the virus total scanner.  According to VirusTotal  report , the malware appears to be the Zeus Trojan. The malware is able to steal stored credentials from browsers including Opera, Thunderbird, Chrome, Firefox, FileZilla, according to Avira malware  report . It also downloads additional malware files.  Opera users are advised to update to the latest version of Opera as soon as it is released. According to the official blog  post , the organization come to know about the security breach on June 19th.  The company claimed that their systems have been cleaned and there is no evidence of user data have been compromised

Android Antiviral Products Easily Evaded

Think your antivirus product is keeping your Android safe? Think again. Northwestern University researchers, working with partners from North Carolina State University, tested 10 of the most popular antiviral products for Android and found each could be easily circumnavigated by even the most simple obfuscation techniques. "The results are quite surprising," said Yan Chen, associate professor of electrical engineering and computer science at Northwestern's McCormick School of Engineering and Applied Science. "Many of these products are blind to even trivial transformation attacks not involving code-level changes -- operations a teenager could perform." The researchers began by testing six known viruses on the fully functional versions of 10 of the most popular Android antiviral products, most of which have been downloaded by millions of users. Using a tool they developed called DroidChameleon, the researchers then applied common techniques -- suc

INTERESTING FACTS ABOUT ETHICAL HACKING

Ethical hacking enjoys great popularity in the world these days. The notion ethical hacking refers to the usage of programming skills in order to determine vulnerabilities of computer system. Ethical hacking is essentially different from non-ethical hacking in the causes for this penetration. The reasons for non-ethical hacking is mischief, personal gain etc. Meanwhile, the reasons of ethical hacking are evaluation of security system, introduction of changes to the available system with the objective to make computer system less likely to be attacked by non-ethical hackers. So actually, ethical hacking represents an attack to the security system by a computer and network professional on behalf of its owner. High-Tech Bridge SA is the major Ethical Hacking organization that is founded in the city of Geneva, Switzerland. During short time High-Tech Bridge SA has reached impressive results on the market of IT technologies. Nowadays the company increases equity capital to CHF 2m an

20 Things You Didn't Know About... Computer Hacking

What's the connection between Steve Wozniak, the Pope, and Henry Kissinger? That's right, it's hacking 1   Hacker originally meant “one who makes furniture with an ax.” Perhaps because of the blunt nature of that approach, the word came to mean someone who takes pleasure in an unconventional solution to a technical obstacle. 2   Computer hacking was born in the late 1950s, when members of  MIT’s Tech Model Railroad Club , obsessed with electric switching, began preparing punch cards to control an  IBM 704 mainframe . 3   One of the club’s early programs: code that illuminated lights on the mainframe’s console, making it look like a ball was zipping from left to right, then right to left with the flip of a switch. Voilà: computer Ping-Pong! 4   By the early 1970s, hacker  “Cap’n Crunch”  (a.k.a. John Draper) had used a toy whistle to match the 2,600-hertz tone used by AT&T’s long-distance switching system. This gave him access to call routing

PENETRATION TESTING

What is Penetration Testing? It’s the process to identify security vulnerabilities in an application by evaluating the system or network with various malicious techniques. Purpose of this test is to secure important data from outsiders like hackers who can have unauthorized access to system. Once vulnerability is identified it is used to exploit system in order to gain access to sensitive information. Causes of vulnerabilities: - Design and development errors - Poor system configuration - Human errors Why Penetration testing? - Financial data must be secured while transferring between different systems - Many clients are asking for pen testing as part of the software release  cycle - To secure user data - To find security vulnerabilities in an application It’s very important for any organization to identify security issues present in internal network and computers. Using this information organization can plan defense against any hacking attempt. User privacy and data

SOME WORDS ABOUT HACKING

" Hacking" name is enough to understand the meaning and unlimitation of this one word. Day by day hackers and crackers are increasing and upon that cyber crimes are also increasing. Here, i am posting an infographic which is related to HACKING. This infographic consists some interesting hacking stories. Just look at below:-

11 Ways to Prevent Computer Viruses

It doesn’t matter if you’ve been on the Internet for five minutes or five years, you’ve probably thought about ways in which you can prevent a computer virus from entering your machine. A virus can compromise your personal information and even destroy your computer completely. Luckily, there are many low cost things you can do to protect yourself and stay one step ahead of the hackers. Here are 11 things you can do to help prevent computer viruses from invading your computer. 1. Install a reliable anti virus program – From the first moment you turn your computer on, you should have a  trusted anti virus program  by your side. Even if you have a machine that isn’t hooked up to the Internet, a reliable anti virus program is a low cost and common sense addition to any machine. There are even free anti virus programs you can download that work almost as well as industry giants like Norton and McAfee. 2. Install  anti-spyware  and anti-malware programs – As good as the best anti viru

Tips to Combat Viruses, Worms and Trojan Horses on Your Computer

Keep The Operating System Updated The first step in protecting your computer from any malicious there is to ensure that your  operating system  (OS) is up-to-date. This  is essential if you are running a Microsoft Windows OS. Secondly, you need to have  anti-virus software  installed on your system and ensure you  download  updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan horses. Additionally, you want to make sure your anti-virus program has the capability to scan e-mail and files as they are downloaded from the Internet, and you also need to run full disk scans periodically. This will help prevent malicious programs from even reaching your computer. Use a Firewall You should also install a  firewall . A firewall is a system that prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming f

The Difference Between a Computer Virus, Worm and Trojan Horse

Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three. One common mistake that people make when the topic of a computer virus arises is to refer to a  worm  or  Trojan horse  as a  virus . While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same thing. Viruses, worms and Trojan Horses are all malicious  programs  that can cause damage to your  computer , but there are differences among the three, and knowing those differences can help you better protect your computer from their often damaging effects. What Is a Virus? A  computer  virus attaches itself to a  program  or  file  enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your  hardware ,  software  or  files . Almost all v

SOME OF HACKER UPDATES

Aaron's Law would revamp computer fraud penalties Two U.S. lawmakers have introduced a bill that would prevent the Department of Justice from prosecuting people for violating terms of service for Web-based products, website notices or employment agreements under the Computer Fraud and Abuse Act (CFAA). Pirate Bay co-founder sentenced to two years in prison for hacking Pirate Bay co-founder Gottfrid Svartholm Warg has been sentenced to two years in prison by a District Court in Sweden for multiple data intrusions, attempted aggravated fraud and aggravated fraud. Microsoft tacks up first wanted poster, debuts temp bounty for IE11 bugs Microsoft on Wednesday backpedaled from a long-standing refusal to pay bug bounties when it announced a temporary program for the beta of Internet Explorer 11 (IE11). Java 7 Update fixes 40 security issues, turns on certificate revocation check Oracle addressed 40 security issues in Java and enabled online certificate r

FEW WORDS ABOUT HACKING

What is Hacking? During the 1990s, the term "hacker" originally denoted a skilled programmer proficient in machine code and computer operating systems. In particular, these individuals could always hack on an unsatisfactory system to solve problems and engage in a little software company espionage by interpreting a competitor's code. Unfortunately, some of these hackers also became experts at accessing password-protected computers, files, and networks and came to known as "crackers." Of course, an effective and dangerous "cracker" must be a good hacker and the terms became intertwined. Hacker won out in popular use and in the media and today refers to anyone who performs some form of computer sabotage. Hacker Tools There now are more than 100,000 known viruses with more appearing virtually daily. The myriad of hackers and their nefarious deeds can affect any computer owner whether an occasional home user, e-mailer, student, blogger, o