Headlines

Bing Rwanda Hacked By Pakistani Hacker

Posted by Unknown | Monday, 24 June 2013 | Posted in


The Bing Rwanda  (search engine) homepage has been apparently hacked by Pakistani  hacker (THA DisasteR) . If you go to bing.rw, you will find a black page  with bing logo and greetings to hackers groups.



The reason for hacking was unclear. There is no specific message for Rawnda Govt
hacked site mirror: http://zone-h.com/mirror/id/20068135

Onida.com Hacked By Ethical Noob Indishell

Posted by Unknown | Wednesday, 19 June 2013 | Posted in ,


One Again Indian Hacker Group "Indishell" Come With bang.

Onida.com website is breached By A Famous hacker "Ethical Noob Indishell ".

      Hacker didn't Deface that site But just was testing something on Onida.com

Nepal Server rOOt by SenHaxor

Posted by Unknown | Tuesday, 18 June 2013 | Posted in ,



Nepal server which Hosted more than 900 sites is Rooted By Indian Hacker " sen Haxor ".
Sen Haxor is Famous For his Server Rooting and Now He is come with Big Bang By defaing more than 900 sites.

Following are the sites that were defaced By Sen Hax0r.

http://pastebin.com/QfuM3WHq


P.S: Enjoy The musiC

Godzilla Taken Down The Evil Network of TOR in INDIA

Posted by Unknown | | Posted in



After the TOR Black Market ExposedGodzilla aka G.O.D taken Down the Evil TOR network of INDIA.

Following are the few details of The Indian Evil network which have been breached and exposed By godzilla Hacker.

----------------------------------------------------------------------------------------

Router Name: pythonhacker
Fingerprint: 6EE5 E68E B319 4F1A C2AF 7F05 5758 5764 C4B5 F6CA
Contact: anandpillai at letterboxes dot org
IP Address: 117.213.241.213
Hostname: Unavailable
Onion Router Port: 9001
Directory Server Port: 9030
Platform / Version: Tor 0.2.3.25 on Linux

----------------------------------------------------------------------------------------

Router Name: Buddha
Fingerprint: 453C B9B2 C4DA A8B7 2666 BE06 7806 5CD2 6006 075B
Contact: None Given
IP Address: 111.118.177.101
Hostname: 111-118-177-101.Noida.Datacenter.Terapeer.com
Onion Router Port: 443
Directory Server Port: 8080
Platform / Version: Tor 0.2.4.6-alpha on Linux

---------------------------------------------------------------------------------------------

Router Name: Chippynet700k
Fingerprint: 2C11 1C8E B2B7 93F8 9158 9F0E 4DFC A820 7717 2116
Contact: None Given
IP Address: 182.73.237.77
Hostname: Unavailable
Onion Router Port: 9001
Directory Server Port: None
Platform / Version: Tor 0.2.3.25 on Linux

----------------------------------------------------------------------------------------------

Router Name: Musicmail
Fingerprint: 52E2 4E09 2E1E 3CC0 DFAA C3B0 ECFE 1086 633C 7C07
Contact: None Given
IP Address: 120.56.169.203
Hostname: Unavailable
Onion Router Port: 8080
Directory Server Port: 9030
Platform / Version: Tor 0.2.3.25 on Windows Vista
-----------------------------------------------------------------------------------------------

Router Name: Parker
Fingerprint: 6C9A AFEA 27FD F520 6E6D 59F6 7AA3 DCC2 9C60 072C
Contact: None Given
IP Address: 120.56.160.148
Hostname: Unavailable
Onion Router Port: 8080
Directory Server Port: 9030
Platform / Version: Tor 0.2.3.25 on Windows Vista


------------------------------------------------------------------------------------------------

Router Name: SC7
Fingerprint: 35CE 576A 9613 7516 A527 8ACE 6B0A A291 1EAD 3B6A
Contact: <bgp.v4 AT ya dot ru>
IP Address: 49.50.65.123
Hostname: Unavailable
Onion Router Port: 443
Directory Server Port: 9030
Platform / Version: Tor 0.2.3.25 on FreeBSD

------------------------------------------------------------------------------------------------

Router Name: AnonymousRelay
Fingerprint: AB81 18CD 9542 0442 9E56 AD64 4EB0 2E88 1DD7 0C9C
Contact: KyoureeUs4nfo at tormail dot net
IP Address: 117.215.102.69
Hostname: Unavailable
Onion Router Port: 9001
Directory Server Port: None
Platform / Version: Tor 0.2.3.25 on Linux


------------------------------------------------------------------------------------------------

By breaching TOR network Godzilla not only exposed the Evil TOR network Of INDIA but He also Make False to the users among all Country Of TOR Network, Because they Thinks that A TOR can save Then and their Locations..

Tor Black Market Exposed By Godzilla

Posted by Unknown | Monday, 17 June 2013 | Posted in




Godzilla again Come Back with Big Bang !!!!

Godzilla breached the TOR Network underground Black Markets Websites

Welcome to the TOR Network, a network which is full of underground black market. TOR network is a curse for humanity. On giving up a deep look on the network structure we found many Dynamic Ips which were linking back to Gov Org. Many countries have ban TOR for several reasons.


PIC for tor network and users connected to it:
http://s1301.photobucket.com/user/god11g/media/network_zpsa3901ba8.png.html

People connecting to tor remember indirectly even you are the part of this business. Many cyber warfare attacks have registered TOR ips.

Are you using TOR or is TOR using YOU ???

Below are links of few black online market which TOR runs. If you think TOR will make you "Anonymous" then your are putting your self in danger. They know which OS you are using they are tracking your live ip address. Terrorist org and underworld groups can freely access such resources and can cause trouble to humanity.


http://torwikignoueupfm.onion - Selling Passports and ID-Cards for Bitcoins.

http://j3vsnvvcfvoduip6.onion - Fixed Match Service. Lets you buy into fixed sporting events.

http://4ia4gar2m3p4mmxd.onion - Research - Intelligence - killing Pro services (Cash)!

http://p3lr4cdm3pv4plyj.onion - TOR Spying link

http://el43z4yc7okwd6pc.onion - Learn carding, hacking, drugs cooking, everything!

http://mst2qwqxshn53jrr.onion - Anonymous visa cards and offshore bank accounts, No ID Required.

http://3nh2sffatuqx45rv.onion - No more fake CC IDs, make your own!!

http://3jtpju3oty4bcego.onion - Contract Killer

http://s3hbqapmb46ej3tr.onion - How to make a professional and powerful bomb for less than 100 USD.

http://tuu66yxvrnn3of7l.onion - Selling Guns and Ammo from the UK for Bitcoins.

http://xfnwyig7olypdq5r.onion - Become a citizen of the USA, real USA passport

http://cf6qjzygqbu2c4z5.onion - Get your Fake ID in the form of US and Canada Drivers Licenses, passports and many more

http://ybp4oezfhk24hxmb.onion - Group of contract killers from the US/Canada and EU.

http://b5s7rs8tupxmsuhh.onion -Selling fake ID's.

http://yc3yiar5ncmmdw3j.onion - Sell's Firearms to Canada and US

http://54flq67kqr5wvjqf.onion - MSR-Cardwriters for sale.

http://vfqnd6mieccqyiit.onion - Original UK Passports.

http://en35tuzqmn4lofbk.onion/ - High quality USA Fake Drivers Licenses.

http://gi4bscgpsi3eaagu.onion/ -Best place for High Quality USA and EU Passports and ID's

http://luavqzwze3mduxyw.onion/ - Get a new identity(legal citizenship) in the United States

And the list goes on..

For full list you can visit the below link:
http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page

Philippine President’s Phone Numbers Leaked By Anonymous hackers

Posted by Unknown | Saturday, 15 June 2013 | Posted in



An Anonymous Philippines hacker who uses the online moniker “#pR.is0n3r” has leaked three phone numbers, which he claims belong to Philippine President Benigno Aquino III, on his Facebook account.

The hacker said he was leaking the phone numbers so that the people of Philippines could communicate directly with the President.

Presidential spokesman Ricky Carandang has told AFP that this is an act of “cyber vandalism,” but would not confirm if the phone numbers really belong to Aquino.

AFP tried to call the phone numbers leaked by the hacker, but a few hours after they were published, they were no longer working.

A Google search for “#pR.is0n3r” reveals that the hacker has also breached the official website of the Philippine Drug Enforcement Agency (pateros.gov.ph).

It appears that the site’s news section was defaced back in April, but at the time of writing it still displayed the defacement page added by the hacker.

Mumbai cops salary accounts hacked

Posted by Unknown | Friday, 14 June 2013 | Posted in



In a particularly bold move, hackers reportedly targeted the salary accounts of Mumbai police personnel with many of them complaining that unauthorised transactions have been made from their bank accounts.

According to a CNN-IBN report, the Mumbai Police is still trying to ascertain the scale of the incident and the number of accounts of its personnel that have been hacked into.
The Mumbai Police has been caught flatfooted in incident. Reuters

The Mumbai Police has been caught flatfooted in incident. Reuters

The accounts were all reportedly with Axis Bank and the worried cops have asked them for a report on the incident. The police are also likely to file an FIR.

The money from the accounts was reportedly withdrawn from ATMs abroad, though which country is not known presently.

The police has also formed a team headed by a Deputy Commissioner of Police to probe how the unauthorised access took place.

OpTurkey: Anonymous Disrupted Website of Radio Regulator and Turkish TV

Posted by Unknown | Thursday, 13 June 2013 | Posted in



The official website of Turkey’s Radio and Television Supreme Council (RTÜK) – the state agency that regulates, monitors and sanctions radio and television broadcasts – has been disrupted by Anonymous hackers.

The reason: RTÜK fined several private TV networks that broadcasted the incidents between Turkish police and Gezi Park protesters.

The regulator argued that it fined Halk TV, CEM TV, EM TV and others because they aired live footage that could harm the physical, moral and mental development of youths.

Currently, the website appears to be working properly.

In a statement published on Wednesday, Anonymous Turkey explained why it was important for the people of Turkey not destroy the Gezi Park.

“The reason why they stand is because Gezi Park represents a historical turning point for them. Actually, Gezi Park is the place where a rebellion leaded by a reactionary group failed on the 31st of March 1909, a rebellion which aimed to restore absolutism in Turkey,” the hackers noted.

“That is to say how the symbolic charge of the Gezi park is high. Destruction of Gezi Park symbolises the reverse of those events. And this is the main reason why the people of Turkey now demand Tayipp Erdogan's abdication. And this is obviously why the ones who peacefully found the courage to stand up and resist oppression, now have to face violence of repression,” they added.

“History is repeating itself there, just like it happened so many times, in so many regions of our planet, as those greedy of power always worked to destroy the Rights the people forged with its faith and blood. Therefore, #OccupyGezi is a fight for democracy occuring in Taksim Square.”

RARSTONE RAT Used in Targeted Attacks Against Asian Organizations

Posted by Unknown | | Posted in ,




Experts have identified a cybercriminal campaign, dubbed Naikon, that targets communications, oil, government, media and other types of organizations from Asia.

The cybercriminals rely on the RARSTONE Remote Access Tool (RAT), which is similar to PlugX, to take complete control of their targets’ computers.

Trend Micro reports that the attackers send out spear-phishing emails that purport to contain documents related to diplomatic discussions in the Asia-Pacific region.

When the documents attached to the emails are opened, a vulnerability in Windows common control is exploited, and RARSTONE is pushed onto the victim’s computer. In the meantime, a bait document is displayed to avoid raising suspicion.

Once it finds itself on a device, a backdoor component is downloaded from a command and control (C&C) server directly to the memory. This allows the threat to go undetected by classic file-based scanning technologies.

Unlike other RATs, RARSTONE checks the Uninstall Registry Key and uses it to find out what applications are installed on the computer. The programs that interfere with its functions are removed.

In addition, C&C communications are done via SSL to protect the connection and to make sure malicious traffic blends in with legitimate traffic.

The individuals behind the Naikon campaign, named so because of the “NOKIAN95/WEB” user agent string that’s been identified in the attacks, want to ensure their infrastructure is difficult to analyze. They use dynamic DNS domains or registrars that have privacy protections.

“Targeted attacks like this are typically part of broader campaigns meant to stay under the radar and steal information from target entities,” Maharlito Aquino, Trend Micro Threats analyst, explained.

“Traditional technologies like blacklisting and perimeter controls are not enough to detect or block the components of these campaigns. Instead, enterprises need to increase their visibility and control over their networks in order to identify dubious network traffic.”

Kilim Trojan Hijacks Social Media Accounts with Rogue Browser Extensions

Posted by Unknown | | Posted in ,



Microsoft experts warn that more and more pieces of malware have started relying on social media. One perfect example is the Trojan dubbed Kilim, or Trojan:AutoIt/Kilim.A.

The Trojan starts infecting computers when users install what they believe to be legitimate software. Once the malware is downloaded and executed, it adds itself to the system registry and downloads two malicious Chrome browser extensions.

These browser extensions allow cybercriminals to hijack Facebook, Twitter, YouTube, Ask.fm, and Vk.com accounts. The attackers can leverage Kilim to like pages on Facebook, send messages and follow certain profiles on Twitter, and even comment on YouTube videos.

The Kilim variant observed by Microsoft posted a message in Turkish on Twitter. The message advertised a website that sold Twitter followers.

“Kilim appears to be selling Twitter followers for a price. There is also a possibility that Kilim can extend its functionality to do more - perhaps stealing sensitive information such as passwords, or even spreading other malware for a price and getting paid per-click-through rates, similar to a pay-per-install model,” Microsoft’s Karthik Selvaraj warned.

Most antivirus solutions should be able to remove Kilim, but some malicious components of the browser extensions might remain. Microsoft has published an advisory on how to remove the components manually.

OWASP Top 10 2013 Officially Released

Posted by Unknown | | Posted in



The Open Web Application Security Project (OWASP) has officially released the OWASP Top 10 for 2013. The previous OWASP Top 10 was released back in 2010.

Take a look at the new OWASP Top 10:

A1 Injection
A2 Broken Authentication and Session Management
A3 Cross-Site Scripting (XSS)
A4 Insecure Direct Object References
A5 Security Misconfiguration
A6 Sensitive Data Exposure
A7 Missing Function Level Access Control
A8 Cross-Site Request Forgery (CSRF)
A9 Using Known Vulnerable Components
A10 Unvalidated Redirects and Forwards

Compared to the previous list, there are some modifications. For instance, XSS was formerly A2 and Security Misconfiguration was formerly A6. CSRF was formerly A5, but it has now dropped to A8.

Insecure Cryptographic Storage (A7) and Insufficient Transport Layer Protection (A9) from the OWASP Top 10 2010 have been merged into the current A6. Failure to Restrict URL Access has been renamed and broadened to become Missing Function Level Access Control (A7-2013).

Finally, A9 from the current list is new. However, it was part of Security Misconfiguration from the old Top 10.

Trend Micro Launches Web App Security Offering

Posted by Unknown | Wednesday, 12 June 2013 | Posted in ,



World-renowned security solutions provider Trend Micro has launched a new security-as-a-service solution called Web App Security. The new offering allows organizations to make sure that their web applications and the platforms they’re deployed on are properly protected against cyber threats.

Part of Trend Micro’s Cloud and Data Center Security Solution, the service can be calibrated to the specific needs of all applications. It also includes the ability to issue unlimited Trend Micro SSL certificates.

In addition to detecting web app vulnerabilities, the solution also checks for malware and web reputation.

The automatic protection mechanisms integrated into Trend Micro Web App Security are powered by web application firewalls.

The security firm is confident that the number of false positives can be kept at a minimum, allowing organizations to focus on actual areas of concern, such as compliance auditor for regulations like HIPAA and PCI.

“For organizations that face rigorous regulations, such as HIPAA in the health care environment, securing data is essential,” said Carl Minear, administrative director of technology infrastructure, Florida Hospital.

“Ensuring that our information is safe when made accessible through a Web application can be a security and cost challenge, but Trend Micro provides effective and affordable security for all of our sensitive clinical applications through a single, integrated offering.”

It’s also worth noting that Web App Security is partly powered by a couple of technologies recently acquired by Trend Micro. The detection functionality comes from IndusGuard from Indusface, and the SSL component stems from the acquisition of AffirmTrust.

“As attacks grow in sophistication and volume, our team is working diligently to ensure that customers are ready,” said Kevin Simzer, senior vice president, marketing and business development, Trend Micro.

“Providing comprehensive detection and protection capabilities through a scalable cloud service helps to set Trend Micro apart from traditional offerings. Organizations deploying Web App Security are able to benefit from proven security combined with a compelling package of cost-effective detection, protection and SSL certificates.”

Web App Security is currently available only in North America. The solution will be rolled out globally next year

Florida Identity Thief Sentenced to 60 Months in Jail, Ordered to Pay Restitution to IRS

Posted by Unknown | | Posted in



Johnny Alexander Melo, aged 36, of Miramar, Florida, has been sentenced to 60 months in prison and ordered to pay $18,594 (€13,900) to the IRS for his involvement in an identity theft tax refund scheme.

The sentence comes after Melo pleaded guilty to one count of possession of five or more identification documents, one count of conspiracy to use a false identification document, one count of aggravated identity theft, and one count of theft of government funds.

According to the United States Attorney’s Office of the Southern District of Florida, the man and his co-conspirators stole the identities of at least 22 individuals and used them to file false tax returns.

Melo attempted to cash out the checks issued by the US Treasury by utilizing fake driver’s licenses made with the names of his victims.

Google Trying To Improve Mapping Services

Posted by Unknown | Tuesday, 11 June 2013 | Posted in

Google has acquired Waze, the Israel-based company behind the mapping app Facebook was also reportedly vying for, according to blog posts from both Google and Waze.
The deal, for which terms weren't disclosed, follows months of speculation about who would land the startup. Reports in recent days said Google was close to a $1.3 billion deal and that Facebook talks had fallen apart.
The acquisition could help Google improve its own mapping services and put a bigger moat around them against the likes of Facebook and Apple. Monday, Apple promised to bring iOS maps integration into cars.
At its Worldwide Developer Conference keynote, Apple Vice President Eddy Cue said Honda, Mercedes, Nissan, Ferrari, and Infiniti are all working on functional integration of more iOS features in their cars, including making its maps program available on a car's LCD like music functions already are. Cue said this integration could come out as soon as 2014, making it likely to be in 2015 models.
Apple's troubled map program has vexed users since its launch, when it was panned for charting some wildly inaccurate locations and having awkward usability. The backlash brought about a rare public apology from Apple, but earlier this year Chief Executive Officer Tim Cook said at a conference that his company didn't enter the race for Waze, after taking a look at its books.
For its part, Google said in its post about the takeover that it planned to enhance Google Maps with some of the traffic update features provided by Waze and bolster Waze with its own search capabilities. The Waze product development team will remain in Israel and operate separately for now.
Waze leverages a growing community of drivers to find the best routes through traffic. It said joining Google's ranks, rather than moving toward an IPO, will keep attention focused on its community of drivers, instead of shifting it to lawyers and Wall Street.

Israeli Hacker Claims to Have Breached Iran Airtour Airlines Website

Posted by Unknown | Monday, 10 June 2013 | Posted in




An Israeli hacker that uses the online moniker Yourikan claims to have penetrated the systems of Iran Airtour Airlines (iranairtours.ir), a Teheran-based airline that’s a subsidiary of Iran Air.

The hacker has told Cyber War News that he has deleted data from the organization’s systems, causing major damage.

“Say no to nuclear Iran. Say no to terror,” the hacker said.

He allegedly obtained access to accounting, e-ticket and billing systems. To demonstrate his accomplishment, the hacker has published several screenshots that show he had access to the systems of Iran Airtour Airlines.

I’m attempting to contact Iran Airtour Airlines to get their side of the story. I’ll update the post in case they respond to my inquiries.

This is not the first time when Yourikan targets Iranian organizations. Last summer, he defaced 91 Iranian websites, including ones of state agencies and universities.

In around the same period, he also claimed to have leaked over 600 user account details from the Niroo Research Institute.

FBI Raids Anonymous Hacker Involved in Steubenville Abuse Case

Posted by Unknown | Sunday, 9 June 2013 | Posted in ,

Back in April, US federal authorities raided the house of Deric Lostutter. They were tipped off that he was KYAnonymous, a hacker of KnightSec, the Anonymous-affiliated collective involved in the case of the 15-year-old Ohio girl who was abused by members of the Steubenville High School football team.

KYAnonymous was the one who published several documents, videos and pictures incriminating the offenders. In March, two members of the Steubenville High School football team were found guilty of assaulting the girl.

The raid took place in mid-April. Around a dozen FBI agents went into his house and seized his belonging while he was cuffed outside his house. He told The Huffington Post that a couple of laptops, flash drives, an internal drive, two cell phones, and an Xbox were seized.

“I was detained on the back patio, I asked if I was going to jail, they said no, they said who are you, I responded KYAnonymous. They asked me a few questions, asked me for my passwords for my account,” the hacker wrote on his blog.

The agents involved in the raid had told him not to tell anyone about the raid or he would face additional charges. However, Lostutter decided to come forward with his story in hopes that the media and the Anonymous community could help him.

Lostutter says he will likely be indicted for a federal offence before a grand jury. He doesn’t know what charges will be brought against him, but in the meantime he teamed up with Jason Flores-Williams, a lawyer with the Whistleblower Defense League.

“This is my call to you, in the media, in the world of anonymous, who look to change the world to a free, transparent one, to my friends and family as well, to come to my aid,“ he wrote on his blog.

“If you can find it in your heart, share my story, donate, buy a sticker, rally in the streets to demand the investigation against me be dismissed. I stood up for a rape victim, I shared information that was public, I had an opinion, and now I am needing you to stand up for me. “

Over 665,000 Defacements Submitted to Zone-H.org in 2013

Posted by Unknown | Wednesday, 5 June 2013 | Posted in



Later this week, we’ll publish an interview with Alberto Redi, the CEO of Security Lab, the company that owns the renowned defacement archive Zone-H.org.

Until we publish the full interview, we’re going to provide you with a few interesting facts we've learned from Redi.

One notable aspect is that 665,367 defacements have already been submitted to zone-h.org in 2013. In 2012, the number of defaced websites submitted to the service dropped to around 1.2 million from 1.6 million submissions made in 2011.

Last year, we witnessed the emergence of several defacement archive websites, which might explain the drop in Zone-H submissions.

However, Redi has told us that he is not too concerned with the competition.

“Every now and then some new web site of this kind pops-up. Most of the time they disappear after a while. To run a web site like this requires time and money, to be good willing is not enough. And zone-h is there since more than 10 years, with a constant grow trend,” Redi noted.

Here is the total number of defacements submitted each year.

2001 - 21.097
2002 - 77.766
2003 - 285.951
2004 - 392.459
2005 - 493.720
2006 - 752.039
2007 - 480.622
2008 - 517.406
2009 - 544.097
2010 - 1.419,388
2011 - 1.608,929
2012 - 1.192,326
2013 - 665.367

Total number so far: 8.456.434.

Expert Develops Fake Chrome Browser for Phishing Attack POC

Posted by Unknown | Monday, 3 June 2013 | Posted in



Phishing attacks usually involve a fake webpage that replicates the legitimate site of the targeted company.

However, British web developer Jack Shepherd has developed a fake browser – by using only HTML, CSS and JavaScript – to demonstrate another type of phishing attack.

The attack starts with a link. When it’s clicked by victims, a genuine-looking browser is apparently opened. When the user navigates to Gmail, he/she is taken to a phishing website that seems to be hosted on gmail.com.

The browser made for demonstration purposes works best for Chrome running on OS X. However, Shepherd explains that an attacker could first identify the OS and the browser used by the victim, and launch a fake browser window that corresponds with what they’re utilizing.

In addition, cybercriminals can duplicate much more of the browser's functionality to make the bogus application look more realistic.

To try out the POC and to see the source code, visit Jack Shepherd’s website.

European Police College Hacked

Posted by Unknown | | Posted in




The website of the European Police College (CEPOL), hosted on the official domain of the European Union (cepol.europa.eu), has been defaced by hackers of OMarXarMY.

“Your system has been hacked. You must be looking for Islam,” reads a message posted by the hackers on the defacement page.

According to Cyber War News, the CEPOL website was defaced on May 26. However, the defacement page added by the hackers to the website’s “fileadmin” folder was still live at the time of writing.

In addition to defacing the website, the attackers have also leaked some database information allegedly obtained from CEPOL’s systems.

Even more worrying is a 6MB file that appears to contain the names, email addresses, and some encrypted passwords belonging to users and administrators. A total of 14,000 records have been identified in the file by Cyber War News.

Official Site of SEIKO Hacked

Posted by Unknown | | Posted in




A hacker that uses the online moniker Ag3nt47 claims to have breached the official Spanish website of SEIKO, the world renowned Japanese watch company.

The names, email addresses, mailing addresses and phone numbers of hundreds of customers have been leaked online by the hacker.

Various other pieces of information have also been leaked from the SEIKO Spain's databases.

When we asked the hacker about his reasons for targeting SEIKO, Ag3nt47 simply replied, “I'm a Rolex man ;)”

We’ve attempted to contact SEIKO Spain, but their website’s contact page doesn’t appear to be working.

Last week, Ag3nt47 claimed to have breached the systems of the Albany International Airport, New York. At the time, we attempted to contact the airport’s representatives to see if they could comment on the incident, but so far we haven’t heard back from them.

Android Devices May Have up to 11 Vulnerabilities

Posted by Unknown | | Posted in



Companies have published numerous infographics lately. That’s because they represent a simple way to show the most important results of a research.

The latest Trend Micro infographic is no exception. It highlights the fact that if you own or recently purchased Android device, chances are that you’re missing out on operating system updates, nifty features, and security improvements.

According to the security firm, because almost all Android updates have to pass through device manufacturers and service providers before reaching the end user, many customers are stuck with outdated versions of the operating system.

These outdated variants can be plagued by up to 11 vulnerabilities that can be exploited by cybercriminals.

More precisely, if your device is running the Gingerbread version of Android, it might be riddled with as many as 11 security holes. Ice Cream Sandwich devices can have up to 5 vulnerabilities.

Jelly Bean 4.1 and 4.2 are the most secure, but even these variants can have up to 3 security vulnerabilities each.

Saudi Arabian Hackers Target Australian Film and Television Jobs Website

Posted by Unknown | | Posted in



Saudi Arabian hackers of Group Hp-Hack, the ones who defaced the official website of Syria’s Ministry of Legal Affairs last week, have turned their attention to sites from other parts of the world.

They claim to have penetrated the systems of Screen Hub, a website that provides news and jobs for the Australian television and film industry.

By leveraging an SQL Injection vulnerability, the hackers managed to gain access to the site’s databases from which they leaked the usernames and clear text passwords of over 3,500 users.

Other websites targeted by the hacker group over the past days include the St. Francis Preparatory School in New York, Russian auto accessories provider Auto-Dress.ru, and the University of Pittsburgh’s McGowan Institute for Regenerative Medicine.

The details of hundreds, and in some cases thousands, of users have been leaked from these websites, including user passwords in clear text.

Group Hp-Hack claims that its main target is still Syria, but in the meantime, it has targeted these sites “for the lulz.”

Vietnamese Police Arrest 8 Alleged Credit Card Fraudsters

Posted by Unknown | | Posted in ,




Eight individuals, suspected of being involved with a criminal organization responsible for stealing credit card and e-commerce information, were arrested last week by Vietnamese police. Documents, expensive cars, high-tech telecom equipment and other luxury items were seized from the alleged scammers.

According to Tuoitrenews, authorities believe the suspects have gained access to information that allowed them to steal millions of dollars from individuals located in several countries.

Investigators believe a 24-year-old named Truong Hai Duy, from the southern Hau Giang Province, is the mastermind of the cybercrime group.

In addition to stealing credit card details, the ring has also been operating a number of gambling websites.

Vietnamese authorities are currently trying to identify other individuals involved in the criminal ring.

The UK Criminal Investigation Department and the US Federal Bureau of Investigation have also collaborated on the investigation.

Famous Author Salman Rushdie Twitter Account Hacked

Posted by Unknown | | Posted in

One of the 588,000 Twitter followers of Salman Rushdie, the famous British Indian novelist and essayist, has informed us that the author’s account was compromised a few hours ago.

The cybercriminals that took over the account abused it to distribute links to shady miracle diet websites.

Rushdie managed to quickly recover the account and changed its password to protect it from hackers.

“Apologies. My twitter account was hacked. Have changed password so the spam should stop,” he wrote on Twitter shortly after the incident.

Salman Rushdie is not the only celebrity whose Twitter account is hijacked by miracle diet spammers. Last week, the Twitter accounts of singer Cher and actor Alec Baldwin were compromised in the same way.

It appears the cybercrooks behind this scheme are phishing out the credentials for Twitter accounts that have a large number of followers to ensure that as many people as possible visit their scammy websites.

CRIMINAL CASE REAL HACK TOOL

Posted by Unknown | Sunday, 2 June 2013 | Posted in

                                          HACK TIME IN CRIMINAL CASE 


Criminal case is one of the famous game on Facebook with more then 15 million active players.
Many players use to search for its hack on Google but they found nothing .
instead of getting coins,money or energy they just become a part of spammer group.
There is nothing like coin hack or money hack in this game.

Now m going to share the trick which u ppl can use for improving your score in this game
Tools required: 1.Process Explorer (download link given below)
                          2.Good browser (chrome recomended) 
1.Start the game :D
2.Add as much as teammate as u can (helps in getting more energy) .
3.Click on processexplorer.exe .
3.Check for ur browser's process , Right-click on the first process of ur browser .
 eg :-

4.Now click on "suspend" the process ; U can see that ur browser will not
   respond.
6.Now its time to click on all the hints provided below in the game.
7.After clicking on all the hints on ur browser , go back to process explorer
   & right click on same browser process & click on "resume".
8.U can see all items of hints are clicked at once with consuming less time.
  Thus u can hav large time bonus added to ur score .
9.This will help u in improving ur score as well as rank :D









Screenshots of my gameplay :-


Now u can click on all hints at once .
its quite interesting when u play bonus level with this trick .
hope u will like this trick :D

Download link of software :-
     http://adf.ly/PuSF5

                                                               ~ MADFOXX
                                                   


Blogumulus by Roy Tanck and Amanda Fazani

Pages

Powered by Blogger.

Labels

Labels

Blogger news

Labels

Blogger templates

Popular Posts