29 February 2012

In cyber era, militaries scramble for new skills

With growing worries about the threat of "cyber warfare," militaries around the world are racing to recruit the computer specialists they believe may be central to the conflicts of the 21st century.
But whilst money is plentiful for new forces of "cyber warriors," attracting often individualistic technical specialists and hackers into military hierarchies is another matter.
Finding the people to command them is also tough. After a decade of messy and relatively low-tech ground wars in Iraq and Afghanistan, some senior western officers are if anything less confident with technology such as smartphones and tablet computers than their civilian contemporaries.
Cyberspace requires a world-class cyber warrior ... we must develop, recruit and retain in a different way to today..

Click here to read more .... 

Solutions : www.xcyss.in

Facebook India asserts it is not responsible for user content

The quiet on the lawsuit accusing 21 social networking websites in the country for allegedly hosting objectionable content certainly doesn't mean it's over. The latest comes from Facebook India, one of the accused in the case. Now, the Economic Times reports that the social networking site, in one of  its appeals made at a trial court in Delhi stated that they are not responsible for the content that their users upload, and hence, their name be removed from the accusation list.

The report further stated that, "Facebook, which has about 46 million users in India, pleaded before the court to remove its name as one of the parties in the petition saying "it is not responsible for hosting the content that may appear on Facebook.com or any website". It said that it is being wrongly prosecuted under the incorrect description of 'Facebook' and stated that its correct addressal is 'Facebook India Online Services Pvt Ltd'."

Importantly, Facebook India added that it did not control or operate the servers, which host the Facebook.com website, located in the U.S.

Click here to read more .... 

Solutions : www.xcyss.in

Interpol site becomes new victim of cyber attack

In a suspected cyber attack, Interpol's website was brought down briefly on Tuesday. The incident comes on the heels of the international police agency announced the arrests of 25 suspected members of the hacking activist group Anonymous in Europe and South America.

According to the report Anonymous supporters have been making online claims that it had been targeted following the arrests in Argentina, Chile, Colombia and Spain. It was quickly back up and running but was loading slowly.

Click here to read more .... 
Solutions : www.xcyss.in

Government, business, military are internet security threats

Usually the bĂȘte noire of the annual RSA conference is the criminal hacking community, but security guru Bruce Schneier asserts that government, business, and the military may well pose a bigger threat to security professionals.

"The current risks to internet freedom, openness, and innovation don't come from the bad guys – they are political and technical".
Attempts at ill-conceived legislation are a major concern. Outsiders trying to legislate something they have no understanding of (a "series of tubes", anyone?) has led to some very troubling moves on behalf of government on internet security. Sometimes these laws are brought forward for the best of intentions – however misguided – but all too often they are merely the result of lobbying.

The temporary suspension of SOPA/PIPA was a case in point, he said. The laws were not a good idea, but didn’t fail for that reason – and no politician wants to be seen as soft on crime he pointed out. The success of the campaign had nothing to do with Wikipedia going dark and everything to do with Google and others using their own lobbying bodies against it.

Law enforcement was another example of government interference that Schneier highlighted..........

Click here to read more .... 

Solutions : www.xcyss.in

28 February 2012

Scammers "Phishing" For Credit Card Security Numbers

Scammers are trolling the waters for your credit card information, using a new "phishing" scam that's targeting the trust of credit card users.
The scammer poses as a representative asking if there have been any purchases or changes to your account.
If you say no then asks you to repeat the credit card number and the three number security number. Chances are they already have your information, but need the three digit code to make a purchase.

Click here to read more .... 

Solutions : www.xcyss.in

Government to set up agency to scan tweets, emails and updates

The government is setting up an internet scanning agency which will seek to monitor all web traffic passing through internet service providers in the country. The scanning agency to be called National Cyber Coordination Centre (NCCC), will issue 'actionable alerts' to government departments in cases of perceived security threats. 

The move comes as the government has been unable to prevent many terror attacks, in the absence of a credible internet scanning system. All government departments will now talk to the Internet Service Providers such as Bharti Airtel, RCOM, BSNL,MTNL and Tata Communications through NCCC for real time information and data on threats. 

All tweets, messages, emails, status updates and even email drafts will now pass through the new scanning centre. The centre may probe further into any email or social media account if it finds a perceived threat. 
Click here to read more .... 

Solutions : www.xcyss.in

27 February 2012

Many parents unaware of cyberbullying

Many U.S. parents are clueless about cyberbullying when it comes to their own child, a survey indicates. 

Parents might not know about bullying incidents because their children conduct social networking activities in a number of different locations, using a wide variety of devices, and across a broad range of media platforms. 

Although many parents said they think their children will tell them about cyberbullying, but they don’t,  because they are usually: 

– Embarrassed about the situation.

– They’re afraid of backlash from the bully or others.

– They fear losing access to their computer.

– They’re worried they did something wrong.

Click here to read more ....

Solutions : www.xcyss.in

Student jailed for "extensive" Facebook hack

A British student Glenn Mangham, 26, a software development student, who hacked into Facebook's internal network risking "disastrous" consequences for the website, was jailed for eight months on Friday in what prosecutors described as the most serious case of its kind they had seen. This was the most extensive and flagrant incidence of social media hacking to be brought before British courts.

Mangham said he had previously helped search engine Yahoo Inc improve its security and wanted to do the same for Facebook. However, prosecutors rejected his explanation.

Click here to read more .... 

Solutions : www.xcyss.in

WikiLeaks publishes security think tank emails

* Stratfor has been likened to a shadow CIA
* Company defiant, says it will not be cowed
* "Anonymous" hacker group helped obtain data
* Stratfor says some emails may be forged, altered
The anti-secrecy group WikiLeaks began publishing on Monday more than five million emails from a U.S.-based global security analysis company that has been likened to a shadow CIA.
The emails, snatched by hackers, could unmask sensitive sources and throw light on the murky world of intelligence-gathering by the company known as Stratfor, which counts Fortune 500 companies among its subscribers.

Click here to read more .... 

Solutions : www.xcyss.in

22 February 2012

Satellite phone encryption cracked by German researchers

German researchers Benedikt Driessen and Ralf Hund of Ruhr University in the paper titled Don't Trust Satellite Phones claim they have found weaknesses in two commonly-used satellite encryption protocols that could render them vulnerable to eavesdropping in real time. They also describe how they reverse engineered the GMR-1 and GMR-2 encryption algorithms or stream ciphers used to secure voice traffic on a range of commercial satellite networks.

The pair attacked different digital signal processor (DSP) firmware updates for two handsets, Thuraya’s GMR-1-based SO-2510, and Inmarsat’s GMR-2 IsatPhonePro, extracting the encryption keys used to secure communications in half an hour using a $2,000 setup.
This theoretical attack is mainly for commercial users who don’t employ extra security and ETSI, the standards body that looks after GMR-1 and 2.

Read the research paper's abstract from here: 

Solutions : www.xcyss.in

17 February 2012

Cyber ​​Security is like chess

KPN's announcement that a server containing personal data of customers and businesses is hacked is just one example of the continuous threat from cyberspace. Over the past year, there are several examples to show where the security of prominent business and government was broken, where there is often data was stolen.
  • The boundaries of the corporate network fade, for example by the use of multiple devices (PCs, laptops, tablets and mobile phones) are not all by the company itself are provided and managed (Research IDC and BT Benelux: 'mobility biggest concern for Dutch CIOs' ) - but still connected to the corporate network via the cellular or Wi-Fi network.
  • The movement toward cloud-based services. Not only is 'the cloud' in principle accessible anywhere, introducing cloud-based solutions, often centralizing data result.
  • IT departments have no time, budget or manpower to protect all systems. Often also lacks awareness of the risks and thus support at board level.
  • Data, including e-mail is often not encrypted. 
  • It contains all the software code errors, and this will never change. 
You can compare it to chess, it is important to think ahead and to each time the opponent makes a move, to block it. This can be done with so-called 'ethical hackers', who think and act as hackers, and also make use of the latest resources available to hackers. However, they do not go beyond reporting the problems they discover - and so strive to be one step ahead of cyber crime. But even a master chess player loses the occasional party.
Click here to read more ....

Solutions : www.xcyss.in

DDoS Attackers Start Targeting IPv6 Networks

Cybercriminals have started launching distributed denial-of-service (DDoS) attacks against networks that transmit data over IPv6 (Internet Protocol version 6), according to a reportpublished recently by DDoS mitigation vendor Arbor Networks.
Even though 2011 was the first year when IPv6 DDoS attacks were recorded, such incidents remain rare because they are not economically relevant for Internet criminals.
Some companies have projected increases of more than 100 percent for their IPv6 traffic volumes over the next 12 months, but the changes will be insignificant compared to the overall traffic volume.
The majority of organizations remain reluctant to switch to the new IP protocol version because their existent network security and traffic analysis equipment is not fully compatible with it.
Many infrastructure solutions currently do not offer the same features and functionality for IPv6 as they do for IPv4. This lack of feature parity means that security teams do not have the same visibility and mitigation capabilities when trying to identify and block IPv6-based attacks against targets.
Solutions : www.xcyss.in

Identity theft, phishing top tax scams in U.S.

Identity theft and phishing top the federal U.S. tax service's list of "dirty dozen" scams, which tend to peak this time of year as millions of Americans gear up to file their tax returns.
While the "dirty dozen" schemes are common year round, many occur most frequently during tax filing season.
Identity theft occurs when thieves use a taxpayer's identity and personal information to file a tax return and claim a fraudulent refund.
Phishing is usually carried out through an unsolicited email or a fake website to lure potential victims and prompt them to provide personal and financial information..........

Click here to read more .... 

Solutions : www.xcyss.in

Five arrested on cyberbullying charges

Two men, a woman and one juvenile were arrested Thursday on cyberbullying charges by Port 
Barre Police. 

The arrests are the result of an investigation initiated more than a month ago, when Terry Mudge
 filed a complaint with the police department stating that her 15-year-old son, Spencer, had been
physically attacked at Port Barre High School and verbally threatened through Facebook.

The threats began shortly after Spencer had posted a comment on Facebook regarding 
15-year-old Eric Myers, who died Dec. 29 of an accidental self-inflicted gunshot wound.
Click here to read more .... 

Solutions : www.xcyss.in

15 February 2012

Man Jailed For Grooming Teen

An illegal immigrant has been jailed for three years for grooming a Harpenden 13 year old.
Ismail Kiggundu, 29, of Commonside East, Mitcham, encouraged the teenager to send him naked photographs of herself and persuaded her to travel from her home to his room in Surrey to have sex. 
He met her through an over 18s dating site called Tagged, where he told her he was 19. 
Even though he knew she was under-age he continued the relationship and encouraged her to bunk off school to see him. 

Click here to read more ....

Solutions : www.xcyss.in

Angry with heavy homework, Chinese student hacks govt website

In his bid to highlight his frustration due to excessive homework, a Chinese teenager hacked a government education website. 

The hacker left messages on the webpage, complaining that his school gave students homework that was "suffocating" during the winter vacation. Experts have identified the hacker as an eight-grade boy from a middle school in the district.

Click here to read more .... 

Solutions : www.xcyss.in

B’desh group hacks BSF site to ‘avenge border killings’

A group of Bangladeshi hackers have breached thousands of Indian websites, including that of the Border Security Force (BSF) and the Trinamool Congress. The attack came within hours of a Bangladeshi newspaper reporting that some Indian hackers had destroyed at least five of their government sites. 
    Simultaneously, Pakistan hackers gained access to about 2,000 Indian sites, claiming their object was “to hit Indian cyber fence and to defend Bangladeshi hackers in this ongoing cyber war”. Another hacker consortium hacked into more than 700 Indian websites. 

Click here to read more .... 

Solutions : www.xcyss.in

13 February 2012

Hacker group attacks five Bangladesh official government websites

Hacking has always been the top most problem over internet and this time hackers, claiming to be Indians have attacked five official ministries websites of Bangladesh as well as that of a trade organisation. Websites were of the ministries of communications, youth and sports, primary and mass education, education and posts and telecommunications.

The sites went black and displayed the message: "Hacked by Love the Risk, Amal Landhe, Lnx Root, Silent Killer."

In between two eyes resembling Indian flags, the hackers wrote: "We have an EYE on you."

While, the name of the hacker group named "Indian Cyber Army" was also displayed over the website. 

Click here to read more .... 

Solutions : www.xcyss.in

CIA website hacked

Hacker group Anonymous Friday night took down the website of the Central Intelligence Agency (CIA).

"CIA TANGO DOWN: https://www.cia.gov/ #Anonymous," the hacker group wrote on Twitter.

Anonymous did not make public any details about the hacking, but the group's hackers normally use distributed denial of service (DDoS) attacks to knock their targets offline.
Click here to read more .... 

Solutions : www.xcyss.in

Microsoft's India store hacked, usernames & passwords stolen

Hackers, allegedly belonging to a Chinese group called Evil Shadow Team, struck at www.microsoftstore.co.in on Sunday night, stealing login ids and passwords of people who had used the website for shopping Microsoftproducts.

While it is troublesome that hackers were able to breach security at a website owned by one of the biggest IT companies in the world, it is more alarming that user details - login ids and passwords - were reportedly stored in plain text file, without any encryption......

Click here to read more ....

Solutions : www.xcyss.in

10 February 2012

Man arrested in online sexting sting

A Bayonne man who was near the end of the hiring process to become a substitute teacher for Rutherford High School was arrested Wednesday by the Passaic County Sheriff's Department on charges of attempted sexual assault of a minor.
24-year-old Richard D'Amato Jr. was arrested as part of an online sting in which he is alleged to have sent explicit messages to an officer who posed as a 12-year-old girl.

Click here to read more .... 

Solutions : www.xcyss.in

Spammers dangle the V-Day bait

Anita Aggarwal, 21, found an alluring offer on her FB account: a perfect gift for her fiancé. Excited about the gift, she filled in the application sharing all her information including her personal id. Soon Anita realised that her email id had been hacked.

With Valentine’s Day just a few days away, it is not surprising if you have already started receiving mails and enticing messages on your Facebook pages which include big discounts on jewellery, food and even slimming products. However, these are tricks with a target — to infect computers, and steal personal details.

Spam companies have also come across Facebook page-based attacks centring around Valentine’s Day. Users are asked to post a Valentine’s theme in their Facebook profile from where they are redirected to another website which asks users to download the theme which is a fake website. On installing the theme, cyber criminals can access your personal information and data on your personal PC’s and Computers.

Click here to read more .... 

Solutions : www.xcyss.in

Changes in IT Act crucial for fighting cyber crime: IT experts

Mobile devices have more computing power than most sophisticated PCs. We have become dependent on them to the extent that once they conk out, we are utterly helpless. These vital devices store a lot of critical information. However, they are not governed by clearly laid out laws. The need of the hour is to enact a new legislation or amend the existing act, say cyber security experts.

“If you list out the top five important laws passed in this country post independence, the IT Act of 2000 would definitely be one of them. Information technology now governs every aspect of our lives,” says Pavan Duggal, advocate of the Supreme Court of India, who was part of the team that drafted the act. “However, what we now have is a grossly lopsided act. The law was amended in 2008 when there was no social media. Mobile usage was also not that prevalent. Today mobile phone plays a part in a large number of common crimes. The need of the hour is to have a law for communication devices and social media.”

Click here to read more .... 

Solutions : www.xcyss.in

'Anonymous' hacker group threatens 'reign of terror' against Israel

The hacker group “Anonymous” released a video Friday threatening to begin a ‘reign of terror’ against Israel, in the latest round of cyber warfare between pro-Palestinian and pro-Israeli hackers.
The video blamed Israel for committing 'crimes against humanity,' and criticizing it for its treatment of Palestinians.
The video also makes reference to the possibility of an Israeli strike on Iran, claiming that Israel has “taken steps to ensure a nuclear holocaust,” and that it will not be allowed “to attack a sovereign country based upon a campaign of lies.”........

Click here to read more .... 

Solutions : www.xcyss.in

09 February 2012

Terrorism acts vs cyber threats, new offense scenarios

By Pierluigi Paganini 9a824a3f55b26adad5431f6715dbec2e

We are at an historical turning point today in U.S., and the situation is similar all over the world, threat of terrorist acts have been surpassed by cyber threats, this is the opinion of FBI Director Robert Mueller. Cyber crime, cyber-espionage, massive attacks, hacktivism, usage of cyber weapons against critical infrastructure are all phenomena that are increasing in frequency and able to induce more terrible damages of a pure act of terrorism. Consider also that cyber crime are difficult to identify and can be perpetrated for a long time with in silent mode with terrifying consequence.
MCAfeeeCyberSituation 258x300 Terrorism acts vs cyber threats, new offense scenarios
Russia and China are the nations responsible for the major number of attacks moved to steal foreign intellectual property, trade secrets and national security information, that is the new frontier of espionage. From cyber security perspective we observed  an exponential grow of the threats, consider that every day more than 60,000 new malware are identified and with the same trend of growth we recorded continuous attacks of hacking groups to the main structures of a nation like the U.S.

During the last couple of years we had a long list of cyber attacks really striking like the data breach of RSA and Symantec companies, don’t forget also the operations made by the Anonymous groups like the intrusion and the data breach in the systems of cyber-security firm HB Gary with more af 50,000 emails were exposed.
Regarding the cyber security there is an open debate on global scale, cyber threats have no countries, have no names, are an invisible enemy that could be dammed only with cooperation and awareness of entire populations.

Click here to read more ....
 Solutions : www.xcyss.in

Trojan gang targets BT, Talk Talk and Sky customers

Criminals using a dangerous variant of the Zeus bank Trojan have started hacking BT, Talk Talk and Sky phone accounts as a way of redirecting phone calls from bank fraud services away from victims.

Malware gangs are wary of post-transaction verification and will typically test the system to work out the fraud threshold for different institutions and customers.


"Faudsters are increasingly turning to these post-transaction attack methods to hide fraudulent activity from the victim and block email and phone communication from the bank," said Trusteer CTO, Amit Klein.
"This allows attackers to circumvent security mechanisms that look for anomalies once transactions have already been executed by the user."

Click here to read more ....

 Solutions : www.xcyss.in

Hacking Ukraine: Govt retreats after massive cyber-siege

Ukrainian government websites have suffered a two-day cyber attack after the authorities closed a popular file-sharing service. The police have withdrawn the blocking order, but their investigation into alleged piracy is very much ongoing.
Users lost access to dozens of official websites in Ukraine after they came under attack on Tuesday. Websites belonging to the president, the government, Ukraine’s security service, the national bank, and the interior ministry were among those affected.
Click here to read more ....
 Solutions : www.xcyss.in

UK Government Response to the Intelligence and Security Committee’s Annual Report 2010–2011


d. the Committee is disappointed that government departments and agencies
do not view investment in Information  assurance as important, and that this
has led to GChQ having to subsidise CesG by several million pounds per year.
We are concerned that there appears to have been little progress in achieving a
resolution since last year. the deputy national security adviser must prioritise the
development of an effective funding model, which should be implemented within the
next six months.
The Government welcomes the Committee’s recognition of the importance of Information
Assurance (IA) across government. IA is fully represented in the work of the Cabinet
Office, which co-ordinates work on cyber security. The Government supports fully the
Committee’s recommendation and the Deputy National Security Adviser will continue to
work with the Communications-Electronics Security Group (CESG) to develop a suitable
funding model that will ensure the long-term sustainability of their IA work.

e. We are concerned about GCHQ’s inability to retain a suitable cadre of
internet specialists to respond to the threat. We therefore urge GCHQ to investigate
what might be done within existing pay constraints to improve the situation. We
also recommend that the Cabinet Office – as lead department for cyber security –
considers whether a system of bonuses for specialist skills, such as exists in the
united states, should be introduced.
The Government shares the Committee’s concerns regarding maintaining a highly skilled
cadre of internet security specialists and is taking a number of proactive steps to address
the issue.
Policies for the recruitment and retention of specialist staff are the responsibility of
individual departments; however, under the National Cyber Security Programme the
Government will support individual departments and agencies in developing cyber
security training and skills programmes for their staff.


The full report

 Solutions : www.xcyss.in

Defendant Ordered to Decrypt Laptop May Have Forgotten Password

A Colorado woman ordered to decrypt her laptop so prosecutors may use the files against her in a criminal case might have forgotten the password, the defendant’s attorney said Monday.

“It’s very possible to forget passwords,” the woman’s attorney, Philip Dubois, said in a telephone interview. “It’s not clear to me she was the one who set up the encryption on this drive. I don’t know if she will be able to decrypt it.”
The decryption case is a complicated one, even if solely analyzed on the underlying Fifth Amendment issue. Such decryption orders are rare, and they have never squarely been addressed by the Supreme Court.
The judge refused Friday to suspend his order to allow time for an appeal to the Denver-based 10th U.S. Circuit Court of Appeals.
Dubois, Fricosu’s attorney, said Monday he would petition the appeals court anyway in hopes that it agrees with his position that Judge Blackburn’s order breaches Fricosu’s Fifth Amendment right against compelled self-incrimination.

Click here to read more ....
 Solutions : www.xcyss.in

How IT is making govt responsive

The government is seen as slow, bureaucratic and corrupt. But in recent times, in several services, it has dramatically transformed itself with the use of technology, sometimes in partnership with the private sector. 

It started with the spectacularly successful railway online reservation system, but has since moved to newer areas, thereby substantially reducing hassles, paper work and corruption, and accelerating the speed of delivery of services. In some cases, the scale of the service is so massive that it is lowering the prices of IT services and products, and generating new lessons for the global IT industry. 
Click here to read more .... 

Solutions : www.xcyss.in

Sexting could become a crime

Sexting may not be too smart but should it be against the law?  Senate Bill 2222 prohibits adults from asking minors for nude pictures and it would also outlaw minors from sending nude pictures of themselves to adults or other kids. 
The idea is to protect the child because once the image is sent out there is little control over it going public.  The photos can be used as blackmail and have led to suicide in other states..........

Click here to read more ....

Solutions : www.xcyss.in

Cyberbullying leaves itsvictims close to suicide

HUNDREDS of thousands of young people are being subjected to cyberbullying with many being victimised for more than a year, new research has shown.
A study by the charity Beatbullying reveals the long-term impact of cyber abuse, with youngsters reluctant to go to school, living in fear of their safety and even resorting to self-harming or attempting suicide.
Cyberbullying is the bullying of another person through technology, such as mobile phones or the internet.

Click here to read more .... 

Solutions : www.xcyss.in

Suspect in Teacher’s Murder was Convicted Stalker

An intense manhunt is underway for a Painesville man accused of shooting to death a teacher, 40-year-old Stacey Sutera in Mahoning County. The gunman is 64-year-old Robert McLaughlin, of Painesville.

Stacey was a science teacher at the Mahoning County Career and Technical Center in Canfield. According to court records, she had known McLaughlin since 2000 and he began stalking her in 2010.

Police say last year, they searched McLaughlin’s Painesville home and found pictures of Stacey as well as pornography and dozens of guns. Stacey filed a lawsuit against him, claiming he was sending her pornographic emails and sending obscene fliers and letters to schools, government offices and other places around Mahoning, Trumbull and Columbiana counties.
Click here to read more .... 

Solutions : www.xcyss.in

08 February 2012

New virus takes over PC without opening infected mails

Now, a new class of cyber attack has emerged that can infect you computer even if you do not open virus-infected email attachments.

In the new form of cyber attack, users will not even be warned this is happening, the only message that appears is ‘loading’. The email then automatically downloads malware into your computer from elsewhere the moment a user clicks to open it.

The emails themselves are not infected, therefore will not ‘set off’ many web-security defence packages.

Previous generations of email-borne viruses and trojans required users to click on an attachment, often an office document such as a PDF but the new generation of e-mail-borne malware consists of HTML e-mails, which automatically downloads malware when the e-mail is opened.

Click here to read more .... 

Solutions : www.xcyss.in

BEWARE! World War III report is a Facebook scam

A new virus scam is circulating on Facebook that tricks people into downloading malware by asking them to open a fake CNN report about World War III. The story, using CNN logos, offer video footage of a breaking news story, but says users need to upgrade their Flash video software to watch.

The fake news page says that US attacks Iran and Saudi Arabia, and begins of World War III. When users ‘upgrade’, their PC gets infected with a trojan. Videos are often used as ‘bait’, because computer users are used to upgrading video software such as Flash, so installing software does not set off alarm bells.

Click here to read more .... 

Solutions : www.xcyss.in

07 February 2012

VeriSign SEC Report Reveals 2010 Data Breaches

VeriSign, the company responsible for the .com, .net and .gov domain spaces, acknowledged in a recent filing with the Securities and Exchange Commission that it was hacked several times in 2010. The company had not disclosed the incidents at the time they occurred.

The SEC recommended companies disclose any security issues that pose a risk for operations or incidents that can have material impact on the business.
"In 2010, the Company faced several successful attacks against its corporate network in which access was gained to information on a small portion of our computers and servers," VeriSign reported in the quarterly filing.
The attackers successfully stole data during the breaches, and the company was "unable to assure" that the information was not or could not be used by the attackers. VeriSign claimed it has implemented new defensive measures to prevent similar incidents.
It also appears the security team hid the breaches from VeriSign senior management when they occurred in 2010, and were not reported up the chain of command until September 2011, according to the SEC filing. "The occurrences of the attacks were not sufficiently reported to the Company's management at the time they occurred for the purpose of assessing any disclosure requirements," VeriSign claimed.

Click here to read more ....

 Solutions : www.xcyss.in

Your deleted facebook pics remain accessible

It may come as a rude shock, butFacebook users should not feel surprised if tomorrow they come across their photos existing in the webworld despite having deleted them personally long ago. 

The photos do not disappear even after they are deleted but can still be accessed by anyone with a link to the images themselves. The company admits that its systems "do not always delete images in a reasonable period of time".

Deleted images vanish from 'normal' views of the site, meaning if you log in to Facebook and look on somebody's photo page, they won't be visible. But they would still remain visible to anyone with a direct URL link to the picture. 
That means that if, for instance, a picture has been circulated by email, the image will still be there for anyone who clicks the link.
Click here to read more .... 

Solutions : www.xcyss.in

NBN website hacked by anti-Assad activist

The NBN television station's website was hacked Monday by one "DarkCoder," who claims to represent the "free people of Hama."
The main webpage of the National Broadcasting Network, which is affiliated with Parliament Speaker Nabih Berri, now features a picture of a poster commemmorating the Hama Massacre of 1982, as well as a condemnation of NBN.

The hacking attack by "DarkCoder" is the first of its kind against a Lebanon-based TV station following former Libyan leader Moammar Gadhafi's blocking the broadcast of a number of Lebanese stations, including NBN, for their coverage of the Libyan uprising against his rule.

Click here to read more .... 

Solutions : www.xcyss.in

06 February 2012

Hackers seize NSW Government-run website

A mysterious band of cyber pirates has hijacked a NSW Government sailing website, re-directing users to a page of threatening messages written in Turkish.

The group took control of the government-run Sydney International Regatta Centre website, redirecting customers away from the homepage to a site filled with cryptic messages in Turkish.A message on the homepage translated into English says that "each of you will feel fear", followed by what appears to be gloating by the hackers about their conquest..
Click here to read more .... 

Solutions : www.xcyss.in

Scamsters using I-T Dept website to dupe people: experts

Cyber experts have warned Internet users of phishing scamsters who are luring people with government domain names and sending unscrupulous e-mails to collect financial and personal information.
Mail boxes of people are being hit by an e-mail sent from "ref.init@incometaxindia.gov.in", informing them of a tax refund pending with the department which can be collected by entering their financial and bank-related information by clicking on a given hyperlink in the mail. The Income Tax Department's web link also has the address "www.incometaxindia.gov.in." which gives the scamsters' email a genuine image and even prompts people to share the information.

According to private cyber security firm XCySS, such e-mails show that the department had not properly secured its server.

Mukesh Saini, chairman of the firm, said, "It seems that the website has an open proxy domain which allows anyone to assume the name of the Income Tax Department domain and send mails from it and it can be changed if the mandarins of the department instruct their service providers". If someone received an e-mail or found a website to be pretending of the I-T Dept, the e-mail or website URL could be forwarded to phishing@incometaxindia.gov.in with a copy to incident@cert-in.org.in.

"This is a very serious mistake on part of the I-T Dept and service providers which are maintaining their servers. There are some settings which need to be done in the the server on which the web site of the department of hosted," Saini said.

According to Saini, a former Naval commander, open proxy can be misused for sending notices, if not phishing messages, and extortions can be made by unscrupulous elements.

Click here to read more .... 

Solutions : www.xcyss.in

03 February 2012

Hackers publish names, addresses of hundreds of Texas police officers

The hacking group known as 'Anonymous' has published the names, addresses and police departments of more than 700 officers across the state, including dozens in North Texas, after stealing the data from the Texas Police Association's web site.

The hacking is apparently in response to a story News 8 broke last week about a Wylie policeman put on administrative leave while he's investigated for child pornography.
'Anonymous' has become notorious for cyber crime after hacking and attacking high-profile websites.

Click here to read more .... 

Solutions : www.xcyss.in

Beware of phishing scams during tax season

As tax season approaches, everyone is preparing and gathering information. With all of the important personal documents circulating, be careful not to allow others access to that information.
When tax time comes around, crooks follow. A big problem this time of year is phishing e-mails. Scammers use the phony messages in attempts to obtain personal information.....

Click here to read more .... 

Solutions : www.xcyss.in