
Tuesday, March 30, 2010
China is a haven for hackers, crackers, spy ware nuts, and general bad apples: China is the world center for malicious computer use

Google Chrome Retains Its Lustre in Hacking Contest Pwn2Own | A yearly Competition event in Vancouver with princely sum of $10,000

Big news that for the second year running Google’s up-and-coming Chrome browser walked untroubled from the hacking-fest, detractors may try to play this down to the relatively small portion of the market that Chrome commands, but Safari has even less market share but found itself compromised by the researchers.
Google would no doubt vaunt Chrome’s inherently secure “sandboxing” structure as the reason for these back-to-back results, but this must really put a line in said sand for next years competition. Surely any hacker looking to make a reputation for themselves will look at this browser security figure head with aspirations of making their mark.
For home users this asks the question whether this is a good reason to swap browsers – in my opinion I would look whether the browser is actively being developed, if there are regular security updates then many of the issues that effect the average web user should hopefully be addressed.
..More information can be found on Forbes.com Firewall Blog and the Google Chrome homepage.
Xbox Live Director Got His Account Hacked
Monday, March 29, 2010
Beware of Emails from Google, Hallmark, Twitter: New wave of spam attacks spreading variants of Vundo and Buzus trojan

Be careful before opening emails from suspicious or unknown senders, as online security firm eScan has warned of malicious malware that are more potent that earlier variants. Security experts have said that the new variants are network aware and pose a great danger to corporate networks, as a single infection can lead to a network outbreak within an hour.
To avoid such catastrophic scenarios, use reputed and genuine security software and have the latest security updates installed in your system.
Sunday, March 28, 2010
5 More sites for budding hackers

Securityfocus

Packetstormsecurity

Rootsecure
Proclaimed as the Security News Site For Systems Administrators & Hackers,Rootsecure provides comprehensive hand picked links to the new security related news articles every day, along with a daily mailing list bringing the latest security news direct to your inbox every morning.
Irongeek
Adrian Crenshaw's information security site which specializes in videos and articles that illustrate how to use various pen-testing and security tools.
Darknet

Sited as one of the top 5 security blogs,its always updated with latest news in information security. It offers latest tools of trade,updates to security tools and comments on various security topics which are not mainstream otherwise. A great site to learn and bookmark.
Keep learning
PS : Like this article ? You can always support me by buying me a coffee or You can always try some of the cool merchandize from PROHACK.
POSTED BY XERO ALL RIGHTS RESERVED.
Saturday, March 27, 2010
Hackers invade cell phone: A Hawaii Kai man's bill hits $5,000 for unauthorized calls after he answers a call from a phone number he did not know
Callers then hack into mobile phones and use the phone number to make long-distance calls and possibly gain access to other information.
"It's crazy. ... Now, with all these smart phones ... everybody has to be careful," said Hawaii Kai resident Kaulana Chang.
Chang has one piece of advice after his experience: Use caller identification and don't answer unless you know the telephone number of the caller.
Chang, 30, said he apparently answered a call on his BlackBerry from someone with a number in the 866 area code, which is normally set aside for toll-free numbers.
The caller was able to use a computer program to obtain enough information to use his phone number and charge $5,000 worth of international calls to his account.
Chang said luckily, his cell phone carrier, Sprint, was understanding and canceled the charges.
He said the illegal charges accumulated over a six-month period, and he notified Sprint of them.
Chang, who works as an event coordinator and magician, said that four or five times, he was unable to use his mobile phone when hackers were using it, and he lost business.
"It's not just me. I've had some people ... tell me stories," he said.
Cybercrime specialist Chris Duque, who worked for the Honolulu Police Department for nearly 30 years, said the scam has been happening for several years.
Duque said the 866 area code caller used a computer program to gather information to make third-party calls using Chang's number.
"It's pretty common," Duque said.
He said the scam usually originates in a foreign country, making capture and prosecution difficult.
Duque said these kinds of scams financially affect communications companies.
"The industry is taking a hit," he said. "It goes into the millions of dollars."
Duque said if you don't recognize who the caller is, don't respond.
"Personally, I don't answer calls if I don't recognize the number," he said.
Duque said he waits for callers to leave a message, and if he doesn't recognize them, he doesn't call back.
"You've got to be in control," he said. "You don't let the caller be in control."
He said phone users should be especially suspicious about numbers with the area codes 800, 888, 866 and 900.
The Federal Trade Commission said to minimize risk of identity theft:
» Be wary of where you put your personal information, including your Social Security number, mother's maiden name, account numbers and other identifying information.
» Before you share any personal information, confirm that you are dealing with a legitimate organization. Check an organization's Web site by typing its URL in the address line rather than cutting and pasting it. Many companies post scam alerts when their name is used improperly. Or call customer service using the number listed on your account statement or in the telephone book.
Facebook Shores Up, Clarifies User Controls Over Privacy
With a posting on its blog page today, Facebook is inviting users to submit comments on proposed revisions to its Privacy Policy and Statement of Rights and Responsibilities.
It is also announcing possible partnerships with websites that Facebook pre-approves “to offer a more personalized experience at the moment you visit the site.”
“In such instances, we would only introduce this feature with a small, select group of partners and we would also offer new controls,” wrote Michael Richter, deputy general counsel for Facebook.
As its popularity continues unabated, Facebook is facing mounting criticism from U.S. privacy advocates and foreign governments over its lack of privacy controls. It is also hearing warnings from the online security community about its vulnerability to hackers.
“It is important to note that, while we’re still developing many aspects of these products, user control over privacy remains essential to our innovation process and we’ll continue to develop new tools to help you control the things you share on Facebook,” Richter said.
Users can view the redlined deletions and additions to the policies. Most of them involve detailed elaborations on the privacy settings available to users.
One section explains in further detail the “Everyone” setting, which is designed to enable users to share content “as broadly as possible.”
“To enable this distribution, we allow others to see, access, display, export, distribute and redistribute content set to ‘Everyone’ and we’ve tried to make this even clearer,” Richter said.
In another revision, the following has been added:
”Your contact information settings control who can contact you on Facebook, and who can see your contact information such as your email and phone number(s). Remember that none of this information is required except for your email address, and you do not have to share your email address with anyone.”
Facebook has come under increasing criticism from European authorities who contend that Facebook users are posting content containing private information on non-users without getting proper consent.
The issue of privacy extends into the area of online security. Both Facebook and Twitter have come under well-publicized attacks in recent weeks by scammers using phishing emails to gain access to user passwords.
Friday, March 26, 2010
iPhone, IE, Firefox, Safari owned at Pwn2Own
At Vancouver this year,the best hackers flocked to show off their skills CanSecWest conference. Pwn2own 2010 as its called exemplified a platform for beating the best security protections of industry giants and like wise it turned out that it became another grim day for internet security at the annual Pwn2Own hacker contest Wednesday, with Microsoft's Internet Explorer, Mozilla's Firefox and Apple's Safari and iPhone succumbing to exploits that allowed for remote administration.
The rules were simple..use previously unknown exploits and undocumented vulnerabilities to to expose sensitive system data or allow the remote execution of malicious code. In its 4th year of organizing,Pwn2Own has come to highlight the alarming insecurity of most internet-facing software. The exploits were impressive as they bypassed state of art security protocols and mitigations designed by software giants with no sweat. Microsoft’s DEP or data execution prevention, ASLR, or address space layout randomization and the code signing by Apple were thrashed at Pwn2Own.
Halvar Flake, a security researcher for Germany-based Zynamics commented "Code signing by Apple is tough, though I'm not sure if they do it for security or just to lock people into their platform," . Flake compromised the iPhone using an exploit written by his colleague Vincenzo Iozzo. The iPhone's code signing mechanism requires code loaded into memory to carry a valid digital signature before it can be executed. To get around it, the researchers used a technique known as return-oriented programming, which takes pieces of valid code and rearranges them to form the malicious payload.
As a result, hackers were able to create a malicious website that when visited by iPhone allowed to compromise the sms database revealing the list of contacts as well as complete copies of messages that have been sent and received and even deleted ones (unless a user has deleted them manually ).
DEP and ASLR, which Microsoft began implementing with the release of Service Pack 3 for Windows XP, didn't fare much better as Peter Vreugdenhil, a Netherlands-based researcher hijacked a laptop running IE 8 running on Windows 7 using an information disclosure exploit, a combination widely considered by white hat hackers as among the hardest to compromise.
Firefox running on Windows 7 and Safari were also smitten at Pwn2own.The iPhone hack fetched $15,000 and the browser exploits were awarded $10,000 each.
The genius of a contest like Pwn2Own is that it exposes the insecurity of software that rarely gets exploited by criminals. Plenty of Linux and Mac fans cite the absence of real-world exploits on those platforms as proof positive that they are inherently safer than the prevailing Microsoft operating system. It's an argument that carried little weight in Vancouver.
"The problem Microsoft has is they have a big market share, said Vreugdenhil, the hacker who attacked IE. "I use Opera, but that's basically because it has a tiny market share and as far as I know, nobody is really interested in creating a drive-by download for opera. The web at the moment is pretty scary, actually."
The Register
PS : Like this article ? You can always support me by buying me a coffee or You can always try some of the cool merchandize from PROHACK.
POSTED BY XERO ALL RIGHTS RESERVED.
Thursday, March 25, 2010
YouTube – Service Unavailable: A YouTube spokesman confirmed the outage without throwing much light on what was happening
3 Best Gmail Tips: How to Use Custom Gmail Addresses | How to Use Gmail as a Hard Drive | How to access GMAIL without Internet
France: Man Accused of Hacking Twitter Accounts of several high-profile people, including the official account of President Obama
Go Daddy to Stop Registering .cn Domain Names in China
Wednesday, March 24, 2010
The Conservatives party in Britain has been embarrassed after hackers attack on a party website: Visitors redirected to pornography website
Halo Custom Edition – Relentless wild fun for Free !!
Some games never lose their charm…They are supposed to be played over and over with friends and foes alike till your fingers start aching and mind gets numb,and no,I m not exaggerating. Halo:Combat Evolved was launched in 2001 by Bungie and it redefined the fps genre then. When it was launched on PC, it gave new horizons on fps genre,making an already good game to an insanely good one. Its been 9 years and the killing has continued. Although not on same level as Counter strike, but still, just jump into a Halo game and you will find plenty of servers out there.Then came Halo Custom Edition..released in 2004 by Gearbox software,its a multiplayer only, standalone unsupported version of Halo on the PC. Halo CE includes several new multiplayer features and options, the most notable of which is the ability to play user-created content.The point of Halo: Custom Edition is to allow game modders and fans to create their own content such as new maps and mods which will hopefully result in a more varied game experience and extend the lifetime of Halo and it succeeds entirely. Along with the ability to mod the game Gearbox Software also fixed a number of bugs and graphical issues that can still be found in Halo: PC.
I spend my entire weekends having a blast while playing Halo CE with my friends,and trust me, its a blast you wont forget :P You can also find a portable edition with some googling around.
You can download it here
You might wanna also look at Halo Tips and tricks and Learn how to mod it..or you can join me at Xfire :)
Cheers
PS : Like this article ? You can always support me by buying me a coffee or You can always try some of the cool merchandize from PROHACK.
POSTED BY XERO ALL RIGHTS RESERVED.
Tuesday, March 23, 2010
JSKY - Free Vulnerability Scanner
With hordes of vulnerability scanners and frameworks launching everyday (mostly commercial) Jsky makes an impressive attempt to set itself apart by keeping it free and keeping it real by packaging everything in a small package. Don't be fooled by its small size, it packs quite a punch when compared to other professional packages considering its release version.Good vulnerability scanner ? check ! Web backdoor and SQL Injection? Check ! Directory traversal,sensitive directory and file scan? check ! Jsky is quite promising in its features..
Jsky packs powerful web spider and multi-threaded scanner which crawls hundreds of thousands of pages with ease & allows to extract links from JavaScript and flash.It uses Pangolin as its engine and allows for advanced and in-depth SQL injection,and hence can detect these vulnerabilities exactly with no sweat unlike others which using method of Pattern Matching.Supported databases include Oracle, MSSQL, Mysql, Informix, DB2, Access, Sqlite, Sybase, PostgreSQL and even more. Jsky has a modular design which allows for everybody to code and share their custom modules. Also a XML-based vulnerability file system and an integrated a Web vulnerability executive parser means you can design a vulnerability just by editing the XML file, no need to code any program.
The best part ? ITS FREE !
- SQL Injection
- XSS
- Unsecure object using
- Local path disclosure
- Unsecure directory permissions
- Server vulnerabilities like buffer overflow and configure error
- Possible sensitive directories and files scan
- Backup files scan
- Source code disclosure
- Command Execute
- File Include
- Web backdoor
- Sensitive information
I was lying about its bbest part..The best part is that it can also be used to launch and test exploits.. A must have for any security professional :)
Download it from Here
PS : Like this article ? You can always support me by buying me a coffee or You can always try some of the cool merchandize from PROHACK.
POSTED BY XERO ALL RIGHTS RESERVED.
Hackers target Facebook accounts: Beware email comes with a subject line - Facebook password reset confirmation customer support
Monday, March 22, 2010
John the Ripper – Password cracking at its best

Here is a sample output of JTR in Debian environment (shamelessly taken from Wikipedia)
root@0[john-1.6.37]# cat wpass.txt
user:AZl.zWwxIh15Q
root@0[john-1.6.37]# john -w:password.lst wpass.txt
Loaded 1 password hash (Traditional DES [24/32 4K])
example (user)guesses: 1 time: 0:00:00:00 100% c/s: 752 trying: 12345 - pookie
You can download JTR from here
PS : Like this article ? You can always support me by buying me a coffee or You can always try some of the cool merchandize from PROHACK.
POSTED BY XERO ALL RIGHTS RESERVED.
Google To Shut Down Chinese Division In April | Leaving China On April 10th

Sunday, March 21, 2010
Hackers attacked 20 district websites operated by the Prime Minister's Office
Thursday, March 18, 2010
Online Security Firm Warns Of Rogue Gambling Sites


Wednesday, March 17, 2010
New Cisco Ethernet switches to play broader video, security roles: CISCO also includes energy efficiency, location-awareness into Ethernet switches
Learn how to hack a PC or remote system using Trojan & Backdoor: Download LOST DOOR RAT all versions here for free

- Reverse connection
- Webcam shot
- Date and time manager
- printer
- Control panel
- PC control
- Executor
- Dos command
- Windows manager
- Screen shot
- Remote server manager
- Server remover
- Ip Grabber
- Server Downloader
- Icon Changer
- Audio Streaming
- Encrypt Settings
- Volume Control
- Connection Logs
- Installed Application
- Infect All USB
- Multilanguage
- Services Viewer
- Remote passwords
- MSN Controller
- Remote Shell
- Chat with server
- Send fake messages
- files manager
- Find files
- Change remote screen resolution
- Information about remote computer
- Clipboard manager
- Internet Explorer options
- Running Process
- Online key-logger
- Offline keylogger
- Fun Menu

- http://www.checkpoint.com/defense/advisories/public/2009/cpai-30-Mar.html
- http://www.megasecurity.org/trojans/l/lostdoor/Lostdoor_all.html
- http://www.techmantras.com/content/lost-door-32-rat
Tuesday, March 16, 2010
Another DDOS Attack against a gambling portal Casinomeister.com
Iran takes down human rights websites – accuses them of espionage


Monday, March 15, 2010
Dot-com (.com) marks 25th anniversary today on March 15
Friday, March 12, 2010
How to bypass anti virus? Make Keylogger and Trojan Fully Undetectable (FUD) using Xenocode


Thursday, March 11, 2010
Is The India Ready For A Cyberwar ?? All major sectors like government, military, infrastructure and international businesses contains huge RISK


