Wednesday, June 27, 2012

Sedulity Groups | Anonymous Hackers shut down website of Colombia Justice Ministry


hack
Anonymous hackers shut down the websites of Colombia's Justice Ministry website on Friday evening. The website was back online Saturday morning.
Also, The website of Cambio Radical, the political party aof Interior Minister German Vargas Lleras, was hacked later Friday evening and was still showing a message saying "You have been hacked".
Anonymous said on its facebook page the Ministry's website was shut down to protest "impunity" granted to corrupt politicians by a justice reform that had been approved by Congress but was sent back to the legislative branch by President Juan Manuel Santos on Thursday because of its unconstitutionality and inconsistencies that “do not favor justice and transparency.”

Tuesday, June 26, 2012

Sedulity Groups | PayPal will Pay Security Researchers for finding Vulnerabilities

PayPal+will+Pay+Security+Researchers
Payment services provider PayPal will reward security researchers who discover vulnerabilities in its website with money, if they report their findings to the company in a responsible manner.

If you manage to find a security flaw in any of PayPal’s products, you may be entitled to a cash reward. "I'm pleased to announce that we have updated our original bug reporting process into a paid 'bug bounty' program," PayPal's Chief Information Security Officer Michael Barrett said in a blog post on Thursday. While Barrett disclosed vulnerability categories, he did not say how much cash the firm will be offering.

PayPal plans to categorize reported bugs into one of four categories:
  • XSS (Cross Site Scripting),
  • CSRF (Cross Site Request Forgery),
  • SQL Injection or
  • Authentication Bypass
 Researchers need to have a verified PayPal account in order to receive the monetary rewards.

Monday, June 25, 2012

Sedulity Groups | zAnti Pentester’s Worldcup tournament open for Hackers

zantiToday is a great day to be a security enthusiastic since Zimperium kicked off the first ever penetration testing tournament. — Welcome to the Pentester’s Worldcup! Zimperium, a mobile security software start-up was founded by Itzhak “Zuk” Avraham, a world-renowned white-hat hacker, in 2011. The Pentester’s World Cup is part of Zimperium’s efforts to increase awareness about mobile security, and simultaneously enhance the security of its range of award-winning products.

Saturday, June 23, 2012

Sedulity Groups | Hacker arrested for hacking into six million computers

Botnet-malware
Police have detained a 22-year-old hacker who created a system of networked computers that was used to steal more than 150 million rubles ($4.47 million) from people's bank accounts and already one of the most wanted hacker in the world. But now, "Hermes" is, has been tapped over six million computers and earns around 5 million francs, was caught in Russia.
 
The network infected around six million computers with a Trojan virus, which helped get access to users' bank accounts. About the Trojans secretly installed, he had arranged illegal money transfers, said the interior ministry in Moscow on Friday.

Friday, June 22, 2012

Sedulity Groups | Hacker charged for hacking into U.S. Energy Department

Hacker+charged+for+hacking+into+U.S.+Energy+Department
Andrew James Miller, a 23-year-old resident of Devon, Pennsylvania, was arrested on Thursday and charged with one count of conspiracy, two counts of computer fraud, and one count of access device fraud, according to a statement issued by the Justice Department's Criminal Division.
 

Thursday, June 21, 2012

Sedulity Groups | Indian ISPs get court relief, Torrent Sites Unblocked

Screen-shot-2012-06-20-at-5.29.04-PMAfter weeks of confusion and frustration with blocked websites, the mess finally looks to be clearing. Indians are all heaving a sigh of relief because their ISPs have unblocked the access to the file-sharing, video-streaming BitTorrent sites that include The Pirate Bay, Torrentz.eu, Vimeo among others.
It was in news last month that following Reliance, Airtel had also blocked torrent services and video sites after they received the ‘John Doe’ court order. Thousands of users from various states of India found the access to torrents blocked.

Wednesday, June 20, 2012

Tuesday, June 19, 2012

Sedulity Groups | Anonymous Takedown Bharatiya Janata Party, wants people to protest against 'web censorship'

A day after messing with servers maintained by Reliance Communications, Anonymous, an international hacker collective, defaced two websites belonging to BJP on Sunday. Through its Twitter account (@opindia_back) it announced that www.mumbaibjp.org and www.bjpmp.org.in were hacked by the group. After the hacking, the group posted a message to web users, asking them to organize protests against "web censorship" in India on June 9.
Anon+Takedown+BJP+Picture
While the message was displayed on the homepage of www.mumbaibjp.org, on www.bjpmp.org.in it was inserted as a page at www.bjpmp.org.in/ads/anon.html. On Mumbai BJP website the message was accompanied by a catchy tune embedded through a YouTube link.

"Today they took away your right to use a few websites... day after tomorrow they will take away your freedom of speech and no one will be there to speak for you. Speak Now or Never," the message read.

Monday, June 18, 2012

Sedulity Groups | Skype Vulnerability Exposing User IP Addresses

Skype+Vulnerability+Exposing+User+IP+AddressesSkype is warning users following the launch of a site devoted to harvesting user IP addresses.The Skype IP-Finder site allowed third-parties to see a user's last known IP address by simply typing in a user name.

A script has been uploaded to Github that offers these options. According to the page, it can be used to lookup IP addresses of online Skype accounts, and return both the remote and the local IP of that account on a website.

Friday, June 15, 2012

Sedulity Groups | How To Secure Your Data


The most valuable thing in our computer or network is the data we create. After all, that data is the reason for having the computer and network in the first place. Anybody for whom data is important, security is more important than that and if you’ll not follow the security guidelines then it would be very difficult to secure your information from the external attacks. Operating systems and applications can always be reinstalled, but user-created data is unique and if lost, may be irreplaceable. Here are some tips on Data security from loss and/or unauthorized access which are mentioned below as following;

Sedulity Groups | United States Department of Defense data leaked by Anonymous hackers

dod-coin-on-american-flag

A group called the "Wikiboat" belongs to Anonymous hackers have attacked the Defense.gov website and leaked data from the website. They have published the leaked data to the pastebin note. Also, today the Wikiboat targeted the GEMA.de website and took it offline.

The leaked data includes some officials name, Emails ID's and Phone numbers as shown below:

Thursday, June 14, 2012

Sedulity Groups | E-Mail, an important source of Communication


In today’s electronic world, E-Mail is critical to any business being competitive. In most cases it now forms the backbone of most organizations’ day-to-day activities, and its use will continue to grow. E-Mails have enabled an efficient means of communication, without the limitations of time zones, speed or cost, usually associated with many of the other forms of communication. Though it has lot of advantages, however; E-Mails can easily be used for the negative purposes as well, making SPAM and virus E-Mails a problem especially by the hackers. In this Unit, we’ll understand the key elements that comprise a successful E-Mail Crime & its Investigation and eventually work out on securing the E-Mails.

Wednesday, June 13, 2012

Sedulity Groups | Serious Mysql Authentication Bypass Vulnerability

CVE-2012-2122 : Serious Mysql Authentication Bypass Vulnerability
mysql_logoA serious security bug in MariaDB and MySQL Disclosed, According to Advisory All MariaDB and MySQL versions up to 5.1.61, 5.2.11, 5.3.5, 5.5.22 are vulnerable. This issue got assigned an id CVE-2012-2122.

Tuesday, June 12, 2012

Sedulity Groups | 10000 Twitter User oauth token hacked and Exposed by Anonymous

10000 Twitter User oauth token hacked and Exposed by Anonymous
data

Anonymous Hackers, with Twitter account "LulzsecReborn" Hack into TweetGif (http://tweetgif.com) and Hack complete Database, Later they publish that on Internet also. TweetGif is a website which allow you to use animated GIF image as your twitter picture.
 
LulzSec Reborn, a 3.0 version of the earlier LulzSec, has leaked 10,000 Twitter profiles’ passwords,  Usernames, real names, locations, bios, avatars and secret tokens used to authenticate their accounts.
Pastebin message posted: The leaked data was uploaded to embed upload and contains a 4 MB SQL file with all the users details.
Users table from http://tweetgif.com/ nothing serious like 10.000 twitters…
 
http://www.embedupload.com/?d=9ZMOMGIIQA


How Hackers and Spammer can use this?
OAuth is an authentication protocol that allows users to approve application to act on their behalf without sharing their password. If your Twitter oauth Secret Key and Token get compromised , then application or Hacker can user your Twitter account on Behalf of Your access. You can get sample script here. These accounts can be used to spam over 10000 of compromised twitter accounts.

Also if hackers are able to compromise the keys of popular applications like TweetGif and use those keys to evade Twitter's abuse controls. By using the consumer key and consumer secret key from a popular third-party Twitter application, a spammer can make it harder for Twitter to lock out all of his spam accounts at once without also locking out a large number of legitimate users of the compromised application.

How you can Protect your Twitter Account: If you are also TweetGif  User, you need to go to settings > apps > deauthorize app. #TweetGif. "Revoke Access".

Monday, June 11, 2012

Sedulity Groups | Important Security tips for Internet Computer Users


Whenever we talk about the Cyber Security, we should always remember that precaution is the best countermeasure, however there are few countermeasures which should be followed by every computer user in order secure themselves from the professional crackers while using computers and internet. The countermeasures are mentioned as follows;

  • Always make sure that your Password is Alpha Numeric (i.e. combination of both letters & numbers and also use some special characters if you can).
  • Always keep your Password length of minimum 8 characters.

Friday, June 8, 2012

Sedulity Groups | Anonymous hackers take down MTNL website


New Delhi: A hacking group said it attacked the Mahanagar Telephone Nigam Limited (MTNL) website, accusing the company of censoring content on the Internet.
The corporate website of MTNL, which caters to the major Indian cities of New Delhi and Mumbai, was down for at least six hours. A post on hacking group Anonymous India's blog said the company was attacked because it had blocked several file sharing websites.

Thursday, June 7, 2012

Sedulity Groups | Open Source Technologies: Enchanting Charge in India



Technology; a vast term to understand and to explain, however it becomes more complicated and difficult when it keeps changing very often. There are lots of technical glitches which every technical person face. In today’s computer Modernization, Security is the biggest challenge for every Technology and to implement it is another good question.

Wednesday, June 6, 2012

Sedulity Groups | Different types of crimes in Cyber World:


Dear Readers, in this edition I am trying to give precise information about ‘different types of Cyber Crimes’ which is very important to know in this Computer Era and I am sure that it will help you all to be aware of all such crimes. Over the past 10 years the Internet has become very important source in the India. People of all ages use it on a regular basis, and it has become one of the driving forces of the economy. From banking to shopping, it has radically changed the way many people go about their daily lives. The increased availability of broadband connections allows more people to experience all that the Internet has to offer. However, there are lot of crimes which are being held so frequently which are mentioned as below;