30 April 2012

Taliban website hacked as Afghan cyber war heats up


Hackers have for the third time in less than a year crippled the main website of the Afghan Taliban, with a Taliban spokesman on Friday blaming Western intelligence agencies amid an intensifying cyber war with the insurgents.
The unidentified hackers broke into the Taliban's El Emara website twice on Thursday, replacing usual insurgent victory messages with images of executions and support for the Afghan government and security forces in English, Arabic and Pashto.
The Taliban have in recent months waged an intensifying information war with NATO forces in the country, distributing anti-government messages on mobile phone networks and using Twitter to claim largely improbable successes as most foreign combat troops look to leave the country by 2014.........

Solutions : www.xcyss.in

26 April 2012

Russia says many states arming for cyber warfare


Russia has stepped up its campaign for a globally binding treaty on cyber security, warning that many states are acquiring cyber warfare capabilities that, if unleashed, could subvert economies and bring down critical infrastructure...........
"We won't use nuclear weapons - it is a Doomsday weapon. But when we have a situation where we have millions of hacker attacks on our money, on our private computers, it means that it is a new form, a new level of confrontation," said Andrey Krutskikh, Russia's recently appointed special coordinator on information technology in its foreign ministry.............
The Stuxnet computer worm that affected Iranian nuclear facilities in 2009-10 had done "enormous damage" and a wide range of critical infrastructure around the world could be a target for cyber attack too...........
Highly-publicised episodes, from the blocking of U.S. and British government websites by activist hacker groups Anonymous and LulzSec to this week's suspected cyber attack on Iran's main oil export terminal, have shown the vulnerabilities of the Internet.................

Click here to read more .... 
Solutions : www.xcyss.in

25 April 2012

Government has tapped my phones: Sarandon

Oscar-winning actress and left-wing activist Susan Sarandon has claimed she was recently denied security clearance for a visit to the White House and that the government has been tapping her phone.  The 65-year-old star, who has vehemently condemned the war in Iraq, made the claims during an event in New York............

Asked whether Sarandon believed she was under surveillance by the government, she said, "We know we're under surveillance. I've had my phone tapped. I was denied a security clearance to go to the White House and I don't know why. " 

Sarandon has been actively involved in promoting liberal political causes and supporting human rights. She has encouraged protesters in the Occupy Wall Street movement to fight harder..........


Click here to read more .... 
Solutions : www.xcyss.in

24 April 2012

Summer Training / Internship for Students



State and trend of the Russian Digital Crime Market 2011 - Report by IB

Russian cybercrime investigation and computer forensics company and LETA Group subsidiary Group-IB released a 28-page reportprepared by analysts from its computer forensics lab and its CERT-GIB unit on the Russian cybercrime market in 2011.





Click here to read more .... 


Solutions : www.xcyss.in

PH-China hacker wars may affect banks, telcos


MANILA, Philippines (UPDATE 1) – An IT expert on Monday said critical services relying on the Internet may suffer from the escalating tension between alleged computer hackers from China and the Philippines.
Ivan John Uy, former chairman of the defunct Commission on Information and Communication Technology (CICT), said critical services like banking and telecommunications may suffer in case the cyber war between alleged hackers from China and the Philippines continues.
“They (alleged Chinese hackers) can retaliate, and they can attack critical infrastructures, such as those of financial institutions, telecommunications facilities, ATM network,” Uy said.

........


Click here to read more ....

 Solutions : www.xcyss.in

Defendant in hacker attack on Aeroflot seeks to prosecute investigators

MOSCOW, April 19 - RAPSI. Former head of processing company ChronoPay Pavel Vrublevsky, charged with masterminding a hacker attack on Aeroflot's web site in 2010, demands to prosecute agents of the Federal Security Service (FSB) as well as a police investigator, defense attorney Lyudmila Aivar told the Russian Legal Information Agency (RAPSI/rapsinews.com) on Thursday.
"We have studied the case and have concluded that the majority of the evidence was falsified and thus should be considered invalid," Aivar said. She also explained that FSB investigators went "beyond court-authorized sanctions" and carried out investigative activities breaching the constitutional rights of the defendant. For one thing, the investigation was carried out beyond the legal time-frame.
 ...........

Click here to read more ....

 Solutions : www.xcyss.in

Traditional Cybercrime in the Age of Cyberwar - Kaspersky Lab - Cyber 2012


Solutions : www.xcyss.in

Cyber war: Iran's oil ministry comes under attack


TEHRAN - Iran's oil ministry and its affiliates have come under a "cyber attack" and a specialised team has been assembled to confront it, Iranian media reported on Monday.
The Mehr news agency reported that the oil ministry website, as well as that of the National Iranian Oil Company (NIOC), were targeted from Sunday.
Quoting a civil defence official at the ministry, it said a "cyber crisis committee" was established to fend off the attack.
.......



Click here to read more .... http://www.middle-east-online.com/english/?id=51868

 Solutions : www.xcyss.in

Teamshatter’s analysis of the April 2012 oracle cpu

t’s a Wednesday in mid-April, so it’s Oracle CPU fallout time again. This April 2012 CPU contains 88 fixes across various Oracle product lines. Specifically, Database, Fusion Middleware, Enterprise Manager, E-Business Suite, Supply Chain, PeopleSoft, Siebel Health Sciences, Financial Services, Primavera, various Sun products and MySQL .
33 of the fixes in this CPU are for vulnerabilities that are remotely exploitable without authentication. In other words, anybody on the network can exploit these vulnerabilities. Three of the product lines have fixes for vulnerabilities that allow for a complete takeover of the host, Database, Fusion Middleware (JRockit) and Oracle Grid Engine.

Click here to read more .... https://www.teamshatter.com/topics/general/team-shatter-exclusive/teamshatter%E2%80%99s-analysis-of-the-april-2012-oracle-cpu/

 Solutions : www.xcyss.in

US President fired first formal salvo of Cyber War on Iran & Syriya

EXECUTIVE ORDER
- - - - - - -
BLOCKING THE PROPERTY AND SUSPENDING ENTRY INTO THE
UNITED STATES OF CERTAIN PERSONS WITH RESPECT TO GRAVE
HUMAN RIGHTS ABUSES BY THE GOVERNMENTS OF IRAN AND SYRIA
VIA INFORMATION TECHNOLOGY


........


I, BARACK OBAMA, President of the United States of America, hereby determine that the commission of serious human rights abuses against the people of Iran and Syria by their governments, facilitated by computer and network disruption, monitoring, and tracking by those governments, and abetted by entities in Iran and Syria that are complicit in their governments’ malign use of technology for those purposes, threaten the national security and foreign policy of the United States. The Governments of Iran and Syria are endeavoring to rapidly upgrade their technological ability to conduct such activities. Cognizant of the vital importance of providing technology that enables the Iranian and Syrian people to freely communicate with each other and the outside world, as well as the preservation, to the extent possible, of global telecommunications supply chains for essential products and services to enable the free flow of information, the measures in this order are designed primarily to address the need to prevent entities located in whole or in part in Iran and Syria from facilitating or committing serious human rights abuses. In order to take additional steps with respect to the national emergencies declared in Executive Order 12957 of March 15, 1995, as relied upon for additional steps in subsequent Executive Orders, and in Executive Order 13338 of May 11, 2004, as modified in scope and relied upon for additional steps in subsequent Executive Orders, and to address the situation described above, I hereby order....................................................................... .......................... ......................................... ............................


here to read more ...http://www.whitehouse.gov/the-press-office/2012/04/23/executive-order-blocking-property-and-suspending-entry-united-states-cer

 Solutions : www.xcyss.in

Facebook being used to blackmail Pakistan girls

As Facebook and other social sites are growing day by day in Pakistan, an important Asian country, hundreds of girls are being blackmailed by the social networking sites forcing them to limit activities to their homes and even to commit suicides.
According to the reports of Federal Investigation Agency (FIA), cyber crimes are rampant across the country specially a number of educated, respectable and distinguished girls are being blackmailed. About 99 percent of complaints are being lodged by girls that their accounts are hacked and profile picture edited..............
After that indecent pictures are uploaded on Facebook and other social websites. Hackers also develop fake accounts in the name of these girls and after that use vulgar language while communicating with family members and friends of such girls................
Hundreds of girls are compelled to leave their education and attracting job after being blackmailed through hacked Facebook accounts.............
Most of incidents of blackmail occurred after culprits failed to get engaged with any girl or breaking up engagement with that girl. As a revenge they hack the accounts to teach a lesson to that girl and her family............
Many girls have been rusticated from their educational institutes and colleges after their fake porn movies and pictures were developed and uploaded on internet........
In a scenario where the social networking sites have changed lives of people of Pakistani and other countries, it has also affected lives of millions. In countries like United States, United Kingdom, India, European states and last but not least Pakistan, Facebook has been termed as a security threat emerging as a tool to blackmail people and even risking their lives........
Personal data like details, pictures and videos which are uploaded on different social media sites including Facebook is being used wrongly and everyone should be cautious while uploading his or her personal bio data..............
Click here to read more .... 
Solutions : www.xcyss.in

Iran boasts of hacking US spy drone's secrets


Iran claims to have extracted secret intelligence information from an advanced US drone aircraft that crashed in the country in December, seeking a propaganda victory over what has been an embarrassing intelligence failure for the CIA.

The aerospace commander of Iran's Revolutionary Guard, Brigadier General Amir Ali Hajizadeh, suggested in remarks to the country's semi-official news agency that Iran had reverse-engineered the aircraft, known as the RQ-170 Sentinel, or would soon do so. US intelligence officials and experts have discounted the country's ability to do so.

General Hajizadeh cited as evidence data that he said was extracted from the drone's computer hard drives revealing its operations in the months before it went down in Iran - either because it was shot down, as Iranian officials have said, or because it experienced a technical failure, as the Americans have said......................

Click here to read more .... 

Solutions : www.xcyss.in

23 April 2012

Apple reports higher security vulnerabilities than Microsoft, Google

Apple fans won't like this one bit. As per security major Trend Micro's quarterly roundup report, Apple has claimed the unwanted crown of the technology major with most reported security vulnerabilities in Q1 2012.

Apple topped the list with 91 reported security vulnerabilities in the quarter, while Oracle came in second with 78 and Google third with 73. Microsoft, often the object of ridicule for vulnerabilities in Windows and other products, will breathe a sigh of relief at coming in fourth with 43 reported vulnerabilities. IBM (42), Cisco (36), Mozilla (30), MySQL (28), Adobe (27) and Apache (24) round up the list of shame.



Click here to read more ....



Solutions : www.xcyss.in

20 April 2012

Fake Instagram app slings SMS Trojan onto Android gear


Virus lynchpins are distributing an Android Trojan under the guise of popular photo-sharing app Instagram.

The fake version of the Instagram Android app is being distributed via unapproved sources, rather than official sites such as the Google Play Android marketplace. The rogue app has been published on a Russian website purporting to be an official Instagram site, among others.
Once installed, the app will silently send SMS messages to premium rate services, doubtless earning its creators a tidy commission at the expense of fandroids in the process.

Cybercriminals are seeking to exploit the popularity of the Instagram app – which has millions of users around the world, prompting Facebook to pay an eye-watering $1bn for the firm behind the technology earlier this month.........

The Instagram Android Trojan represents the latest example in a growing number of viral threats to target the Android smartphone platform.........

Curiously, the malware contains a random number of identical photos of a man. The photo features a cropped image of a casually dressed witness from a Moscow wedding photo, an image that has become something of a phenomenon on Russian internet forums...........

Click here to read more .... 
Solutions : www.xcyss.in

18 April 2012

15-year-old arrested for hacking 259 companies


Austrian police have arrested a 15-year-old student suspected of hacking into 259 companies across the span of three months. Authorities allege the suspect scanned the Internet for vulnerabilities and bugs in websites and databases that he could then exploit...............
The boy allegedly stole data and published it publicly after breaching the security infrastructures of 259 firms. He also defaced many company websites and boasted about his accomplishments on Twitter, where he also posted links to his data dumps.
The firms were attacked between January 2012 and March 2012, and they were not limited to just Austria. He didn’t seem to target specific types of industries: everything from sports companies, to tourism services, to adult entertainment, to search services were attacked.............
The teenager used various hacking tools widely available on the Internet, including software that helped him remain anonymous. Now and then, he left messages in the systems he hacked, or simply signed them with the hacker name ACK!3STX..............

Click here to read more .... 
Solutions : www.xcyss.in

17 April 2012

US-Backed Terrorist Group, Israel behind Stuxnet Virus Attack on Iran

The Stuxnet malware was not only designed to disrupt Iran's nuclear program, but was part of a wider campaign directed from Israel that included the assassination of the country's nuclear scientists, US intelligence officials revealed.


The source for the latest explanation of Stuxnet's mysterious provenance is online title ISS Source, which cites having received information from unnamed individuals "who requested anonymity because of their close proximity to investigations". 

The source told the site that an Iranian agent infected Iranian systems at the Natanz nuclear facility with the Stuxnet malware directly using a USB stick. The malware exploited a raft of zero-day vulnerabilities to attack SCADA software. 

The individual carrying out the attack was a member of the terrorist Mojahedin-e-Khalq Organization (MKO, also known as the MEK, NCR and PMOI) which was connected to the assassination of several Iranian nuclear scientists in the last three years...........

Recent reports have also revealed that the United States' military and spying agencies have long been training members of the MKO for assassination and sabotage operations in Iran. 

Stuxnet was a comprehensive US-Israeli program designed to disrupt Iran's nuclear technology.....

If the story has a seam of truth it is dynamite; if it is untrue, it will add to the mythic status of a piece of malware that has been widely assumed to be state-sponsored since it became apparent that it targeted industrial systems. 

The story raises questions of its own. Why use a worm at all when the attack was targeted enough to be distributed using a USB stick? The worm method is designed to spread, something which by its nature draws attention. This seems like unnecessary overkill for a direct infection. 

The involvement of Israel and the US is no surprise - they have a clear motivation, given their animosity towards Iran............. 
Click here to read more ....

Solutions : www.xcyss.in

13 April 2012

Email snooping IT admins like 'Dracula in charge of the blood bank'

About 40 per cent of IT administrators go snooping through emails of employees, particularly those of high-level executives, claims the chief executive of a firm that manages the IT security of various Australian companies and government agencies.

A company's IT admins have access to virtually every document company-wide - including executive files, payroll information and medical data - and many "can't help themselves" in gaining access to emails..................

Mr Carlo Minassian, founder and CEO of Earthwave, the North Sydney-based firm that is hired by organisations looking to outsource their IT security., who also often hunts down people who are breaching IT policy within an organisation, says leaving IT admins unsupervised is like putting "Dracula in charge of the blood bank".


IT administrators snooping on email happened "regularly", went "unnoticed" in most instances, and added that it would continue to go unnoticed unless an IT admin had something to prove. Only when they get caught do police get involved....

Solutions : www.xcyss.in

12 April 2012

Cyber war and peace

Two years agoa piece of faulty computer code infected Irans nuclear program and destroyed many of the centrifuges used to enrich uraniumSome observers declared this apparent sabotage to be the harbinger of a new form of warfareand United States Secretary of Defense Leon Panetta has warned Americans of the danger of a “cyber Pearl Harbor” attack on the USBut what do we really know about cyber conflict?
The cyber domain of computers and related electronic activities is a complex man-made environmentand human adversaries are purposeful and intelligentMountains and oceans are hard to movebut portions of cyberspace can be turned on and off by throwing a switchIt is far cheaper and quicker to move electrons across the globe than to move large ships long distances.........
Four decades agothe US Department of Defense created the Internettodayby most accountsthe US remains the leading country in terms of its military and societal useBut greater dependence on networked computers and communication leaves the US more vulnerable to attack than many other countriesand cyberspace has become a major source of insecuritybecauseat this stage of technological developmentoffense prevails over defense there..........
The term “cyber attackcovers a wide variety of actionsranging from simple probes to defacing Web sitesdenial of serviceespionageand destructionSimilarlythe term “cyber war” is used loosely to cover a wide range of behaviorsreflecting dictionary definitions of war that range from armed conflict to any hostile contest..........
If one treats so-called “hacktivism” by ideological groups as mostly a disruptive nuisance at this stagethere remain four major categories of cyber threats to national securityeach with different time horizoncyber war and economic espionage are largely associated with states,and cyber crime and cyber terrorism are mostly associated with non-state actorsFor the USthe highest costs currently stem from espionage and crimebut over the next decade or sowarand terrorism could become greater threats than they are today..............

Click here to read more .... 
Solutions : www.xcyss.in

11 April 2012

Trojans target pro-Tibet organisations


Security experts are warning of yet another targeted malware campaign using socially engineered emails to infiltrate pro-Tibet organisations in a bid to covertly nab sensitive files. The attacks are linked to the same command and control server used in the Gh0st RAT (remote access Trojan) campaign most recently observed at the end of March.............
The Gh0st Trojan has been used by suspected Chinese hackers in several advanced persistent threat (APT) style attacks, most notably the ‘Nitro’ attacks against energy firms in 2011.

Following the classic modus operandi for such attacks, the threat arrives as an innocuous looking email socially engineered to encourage the recipient to click on an embedded malicious link – in this instance it is an invitation to a Tibetan film festival..........

The user is then taken to a site which determines whether they are on a Mac or Windows system before loading a Java applet designed to exploit a vulnerability in the Java Runtime Environment. If successful, the exploit will then install a SASFIS backdoor for Windows or an OLYX backdoor for Mac OSX.....

Both backdoors report back to the same C&C server, which is the same as that used in Gh0st RAT attacks and the attacks uncovered by AlienVault recently.........

Solutions : www.xcyss.in

10 April 2012

Anonymous hacks into tech and telecom sites


Anonymous is certainly making the rounds this week. First China, now the telecom and tech industry.
The hacker group has claimed responsibility for leading denial-of-service attacks on two technology trade association Web sites,USTelecom and TechAmerica, according toBloomberg. Anonymous is reportedly lashing out because these organizations support a cybersecurity bill that some members of congress are working to pass.
The attacks began yesterday when users were unable to log onto the sites........
USTelecom represents telecom companies, including AT&T, Verizon, and CenturyLink; and TechAmerica's members include tech companies such as IBM, Microsoft, and Apple.
Both sites say that technicians are working to restore service for their users. Despite the high-profile companies that the sites represent, both organizations told Bloomberg they don't host any sensitive information.............

Click here to read more .... 

Solutions : www.xcyss.in

09 April 2012

Hackers group Anonymous 'shut down' British Home Office website


Hackers have reportedly attacked the website of theBritish Home Office, shutting it down for at least one hour on Saturday night.

Anonymous hacked the website in an apparent protest against extraditions of British citizens to the US and "draconian surveillance proposals" by the British government...............

The hacking group appeared to be angry at extradition proceedings against 46-year-old UK citizen Gary McKinnon, who is accused of hacking US military computers.

On Twitter, messages purporting to be from the hacking group, were posted under the name AnonOpUK, saying, "Anonymous is famous. UK Home Office. Maybe you should start to listen to the people." Another message, apparently urging the hackers to continue the attack said: "Keep firing!"
Click here to read more .... 
Solutions : www.xcyss.in

06 April 2012

China blames web for gun smuggling crims


The Chinese authorities are blaming the world wide web and multinational delivery companies for a rise in gun smuggling into the People’s Republic.
China Daily report claimed that criminal gangs are increasingly turning to the web to trade illegal weapons and then using express delivery networks to ship them into the country because they stand less chance of detection this way than if carrying them through land border checkpoints...........

While China continues to grow economically and has done much to engage internationally on the political and diplomatic front, the country is widely seen to have taken a turn for the worse when it comes to online freedoms under the presidency of Hu Jintao.
Aside from the shuttering of thousands of web sites deemed fraudulent, pornographic or harmful to society in some other way, the authorities have now turned their attention to micro-blogs, which they view with suspicion as a potentially disruptive force.......


Click here to read more .... 

Solutions : www.xcyss.in

Hacker attack hits more than 600,000 Mac PCs

More than 600,000 Apple Inc Mac computers were affected by a hacking attack, a sign that the once rarely targeted company is becoming a bigger focus for people intent on spreading malware, a security-research firm said.

The attack affects computers running Apple'sMac OS X software, according to Russianantivirus software maker Doctor Web. Most of the infected computers are in the United States (X) and Canada, the firm said in a blog posting. Apple fixed a security hole this week that let the malicious software spread. Users who haven't downloaded the necessary updates are vulnerable...........

Macs have historically been an unappealing hacking target because of their low market share. Instead, criminals have attacked personal computers running Microsoft Corp's Windowssoftware, seeking the biggest number of victims for illicit moneymaking schemes. Windows runs on more than 90 per cent of the world's desktop computers, according to market researcher Net Applications..........
Click here to read more .... 

Solutions : www.xcyss.in

Sudbury man charged with child porn

A 32-year-old Sudbury man has been charged with child pornography following an extensive investigation by Greater Sudbury Police Service's cyber crime unit.

He has been charged with possession of child pornography, making available child pornography and accessing child pornography.............

After a forensic investigation, evidence of child pornography in the form of graphic image files and sexually graphic videos associated to the suspect was located........


Click here to read more .... 

Solutions : www.xcyss.in

05 April 2012

We are building our lives around our wired and wireless networks. The question is, are we ready to work together to defend them?

The FBI certainly is. We lead the national effort to investigate high-tech crimes, including cyber-based terrorism, computer intrusions, online sexual exploitation, and major cyber frauds. To stay in front of emerging trends, we gather and share information and intelligence with public and private sector partners worldwide.
Click here to read more ....


Solutions : www.xcyss.in

Hacker jailed for stealing 8 million identities

Summary: A British hacker has been sentenced to 26 months for stealing 200,000 PayPal accounts, 2,701 bank card numbers, as well as 8,110,474 names, dates of birth, and postcodes of U.K. residents.

23-year-old Edward Pearson of York, Northern England, will spend two years and two months behind bars for his hacking spree. The sentence would have been greater if he made more use of the huge amount of stolen data.

Click here to read more ....

Solutions : www.xcyss.in

Anonymous hacks hundreds of Chinese government sites

Summary: Anonymous has hacked hundreds of Chinese government websites. Some sites were just defaced, but others have had administrator accounts, phone numbers, and e-mail addresses leaked.

The hacktivist group Anonymous now has a Chinese branch. An Anonymous China Twitter account was created late last month, was endorsed by the YourAnonNews Twitter account, which by the way has over 562,000 followers now, and the individuals behind it went to work. Boy have they been busy. Hundreds of Chinese government, company, and other general websites have been hacked and defaced in the span of a few days. A couple have also had their administrator accounts, phone numbers, and e-mail addresses posted publicly. On the hacked sites, the group even posted tips for how to circumvent the Great Firewall of China.
Click here to read more ....


Solutions : www.xcyss.in

04 April 2012

School boys in trouble over FB kiss photos

A Philippine Catholic school is witholding the diplomas of six high school boys who uploaded Facebook photos that appear to show them kissing each other, an education official said Friday.

A day earlier, a Philippine court rejected another Catholic school's decision to bar five girls from graduation ceremonies because they had posed in bikinis for photos posted on Facebook. The cases test the limits of privacy in a conservative Catholic nation that is also among the world's most prolific users of social networking sites...................

The six boys told that they had taken prank photos to make it appear that their lips touched. One of the boys uploaded the pictures on Facebook and mistakenly made them available to others............

One Facebook photo at issue showed a girl holding a cigarette and a liquor bottle, while others showed all five girls wearing bikinis at a beach party early this year.
School officials took action against the girls for what they called "engaging in immoral, indecent, obscene or lewd acts........................
Click here to read more ....

Solutions : www.xcyss.in

03 April 2012

Parents shocked by priestly PowerPoint pr0n


Parents in Northern Ireland were shocked when a priest's PowerPoint presentation in preparation for their children's First Holy Communion displayed gay pornography.
Father Martin McVeigh, the local Catholic priest, was giving the presentation to parents (and one child) at St Mary's School in Pomeroy when he inserted a USB stick into his computer. Images of men in various states of undress were then displayed via the school projector (16 in all, suggesting that someone wasn't too shocked to count) before McVeigh realized what was wrong..............
First Holy Communion is an important event for Catholics, during which children first partake in the ritual of transubstantiation, in which the church's collection of wafers and wine is transformed into the actual body and blood of Jesus Christ – at which point communicants eat the body bits, but not always have the opportunity to imbibe the fermented, grape-based blood.

Certainly there's nothing in the Catholic ceremony requiring the introduction of gay pornography, and it could be argued that McVeigh had inadvertently launched a presentation centered on the sin of Onan, who spilled his seed rather than obeying the law and impregnating his sister-in-law.........

Before people rush to judge Father McVeigh, however, it's not clear if the offending images were manually stored on the USB stick and appeared due to AutoRun, or if this was a pop-up window caused by malware. 

Click here to read more .... 

Solutions : www.xcyss.in

How China Steals US Secrets

For the last two months, senior government officials and private-sector experts have paraded before Congress and described in alarming terms a silent threat: cyberattacks carried out by foreign governments. Robert S. Mueller III, the director of the FBI, said cyberattacks would soon replace terrorism as the agency's No.1 concern as foreign hackers, particularly from China, penetrate American firms' computers and steal huge amounts of valuable data and intellectual property................ 


Many companies do not even know when they have been hacked. According to Congressional testimony last week, 94 percent of companies served by the computer-security firm Mandiant were unaware that they had been victimized. And although the Securities and Exchange Commission has urged companies to reveal when they have been victims of cyberespionage, most do not. Some, including SonyCitibank, Lockheed, Booz Allen, Google, EMC and the Nasdaq have admitted to being victims............
.
Because it is fearful that government monitoring would be seen as a cover for illegal snooping and a violation of citizens' privacy, the Obama administration has not even attempted to develop a proposal for spotting and stopping vast industrial espionage. It fears a negative reaction from privacy-rights and Internet-freedom advocates who do not want the government scanning Internet traffic..............


But by failing to act, Washington is effectively fulfilling China's research requirements while helping to put Americans out of work......................................
.
Click here to read more .... 
Solutions : www.xcyss.in

02 April 2012

Bangladeshi Prime Minister's Email-id Hacked By Teamgreyhat

After remaining silent for a certain time hacktivist group Teamgreyhat strikes again. The past records says this hacker group is know for hacking large number of sites but this time they did some thing different. Here the target was Sheikh HasinaPrime Minister of Bangladesh. Teamgreyhat took responsibility for hacking into the official Email-id of Bangladesh PM (pm@pmo.gov.bd). Also they have claimed to have access to rest of other 73 email-id's of Bangladesh Prime Minister Office...........



The screen shots taken during the hack (submitted by TGH), is clearly indicating that the hacker group has successfully breached the Web-mail of Bangladesh Prime Minister office and exported all the emails from the pm@pmo.gov.bd. Earlier this group has taken a major role in the past cyber-war between India & Bangladesh while hacking into Bangladeshi Stock MarketIslami Bank Ltd Bangladesh and few other high profile website of BD...........

Solutions : www.xcyss.in