tag:blogger.com,1999:blog-83541650895543098262024-03-18T20:28:07.754-07:00r00t@~SecurityVoidLive For Nothing Or
Die For SomethingSecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.comBlogger642125tag:blogger.com,1999:blog-8354165089554309826.post-58797746598538960312012-10-13T06:12:00.000-07:002012-10-13T06:12:02.242-07:00US prepares first-strike cyber-forces<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="introduction" id="story_continues_1">
<a href="http://news.bbcimg.co.uk/media/images/63450000/jpg/_63450968_000212218.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img alt="Aftermath of 9/11 attacks" border="0" height="304" src="http://news.bbcimg.co.uk/media/images/63450000/jpg/_63450968_000212218.jpg" width="304" /></a>Cyber-attacks could
inflict as much damage on the US as the physical attacks on 11 September
2001, the US defence secretary has warned.</div>
Leon Panetta said the country was preparing to take pre-emptive action if a serious cyber-attack was imminent. <br />
He said US intelligence showed "foreign actors" were targeting control systems for utilities, industry and transport.<br />
Advanced tools were being created to subvert key computer control systems and wreak havoc, said Mr Panetta.<br />
"An aggressor nation or extremist group could gain control of
critical switches and derail passenger trains, or trains loaded with
lethal chemicals," said Mr Panetta in a speech to business leaders held
on the USS Intrepid - a former aircraft carrier that is now a museum. <br />
"They could contaminate the water supply in major cities, or shut down the power grid across large parts of the country.<br />
"Such a destructive cyber-terrorist attack could paralyse the nation and create a profound new sense of vulnerability," he said.<br />
Smaller scale cyber-attacks were now commonplace, said Mr Panetta. <br />
<div class="caption body-narrow-width">
<span style="width: 304px;">Cyber-attacks could inflict as much damage as 9/11. warned the US defense secretary</span>
</div>
In recent weeks, many large US firms had suffered attacks that
had involved them being bombarded with huge amounts of data, he said. In
addition, oil companies in Qatar and Saudi Arabia had been hit by the
Shamoon attack, which had tried to replace computer data with gibberish.
About 30,000 machines were hit by the Shamoon attack.<br />
The US defence department had developed tools to trace
attackers, he added, and a cyber-strike force that could conduct
operations via computer networks. And it was now finalising changes to
its rules of engagement that would define when it could "confront major
threats quickly".<br />
"Potential aggressors should be aware that the United States
has the capacity to locate them and hold them accountable for actions
that harm America or its interests," he said.<br />
"If we detect an imminent threat of attack that will cause
significant physical destruction or kill American citizens, we need to
have the option to take action to defend the nation, when directed by
the president.</div>
SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-52089957418452571922012-05-26T06:28:00.001-07:002012-05-26T06:30:43.386-07:00Hackers threaten fresh wave of anti-capitalist web rioting<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://2.bp.blogspot.com/-lRhF0yAJ5rs/TrZykl5B8VI/AAAAAAAAAGk/K7fWqUkY7ho/s1600/cyber-war.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="240" src="http://2.bp.blogspot.com/-lRhF0yAJ5rs/TrZykl5B8VI/AAAAAAAAAGk/K7fWqUkY7ho/s320/cyber-war.jpg" width="320" /></a></div><h2>Hackers threaten fresh wave of anti-capitalist web rioting</h2><div class="standfirst">Sticking it to The Man, man, but for lulz too</div>A new activist group is drumming up recruits for a cyberwar campaign against corporate giants due to launch on Friday, 25 May.<br />
<a href="https://twitter.com/#%21/TheWikiBoat" target="_blank">TheWikiBoat</a> intends to hit a high profile list of more than 40 multinationals - including BT, Best Buy, Tesco, McDonald's, Wal-Mart and Apple - with denial of service attacks as well as attempts to raid corporate systems for intelligence.<br />
<div id="article-mpu-container"><div class="ad-now" id="ad-mpu1-spot" style="height: auto; margin-top: 0px; width: auto;"></div>The precise motivations behind OpNewSon, which was announced around a month ago, remain unclear but the overall flavour is part anti-capitalist and part general devilment, a characteristic found in many Anonymous-style hacktivist protests.</div>"While attacking the major companies of this planet may seem lulzy, we also wish that this operation make a difference," the group said in a <a href="http://pastebin.com/wq6KdgDg" target="_blank">manifesto</a> for OpNewSon. "We are 'sticking it to the man' so to speak."<br />
Would be participants in the campaign, which aims to take out targeted sites for at least two hours, are been encouraged to use the LOIC denial of service tool, a favourite with hacktivists. By default LOIC does nothing to shield the anonymity of its users, a factor that has allowed police to track down and arrest many suspected hacktivists across the world over recent months.<br />
Previous pre-announced activist operations to take down Facebook or launch assaults against the internet's DNS structure have turned out to be damp squibs. Security firms nonetheless argue that corporations targeted as part of Operation NewSon ought to take the threat seriously.<br />
"It remains to be seen if the hacking group live up to their claims, but any organisation which is a target would be unwise to dismiss the threat," said André Stewart, president international at Corero Network Security.<br />
"With prior knowledge of an impending attack, they have the opportunity to pro-actively put in place additional security measures to ensure that they remain secure."<br />
Stewart explained that TheWikiBoat pre-announced its intended as a tactic designed to rally recruits to its cause.<br />
“It’s not uncommon for hacking groups to announce their targets, particularly when they are ahead of a Distributed Denial of Service (DDoS) attack," he explained. "This enables them to ‘recruit’ like-minded individuals who support the ideology of the hacktivist group to join in on the attack. However, the majority of DDoS attacks are often carried out using an army of automated computers, called botnets, which can be controlled by a single user."<br />
"The hacking group is planning a second stage attack, in which they will attempt to infiltrate the organisation’s network and steal sensitive information. DDoS attacks are often used as a smokescreen to hide further, more dangerous attacks, and due to the long list of potential targets, there is a high probability that they will succeed."<br />
Additional commentary from application security firm Radware can be found <a href="http://blog.radware.com/security/2012/05/ert-threat-alert-thewikiboat" target="_blank">here</a>.<br />
#OpNewSon is due to begin begin at 4pm PST. <br />
<div class="standfirst"><br />
</div></div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-79548482634444366072012-05-26T06:27:00.000-07:002012-05-26T06:27:17.471-07:00Top 10 Android Mobile Security Apps<div dir="ltr" style="text-align: left;" trbidi="on">While 2011 was the year of the hacktivist, it looks like 2012 will be the year of mobile malware with Android users in particular facing the reality that their device may not be as secure as they'd like to think.<br />
<a href="http://www.v3.co.uk/v3-uk/news/2174873/android-malware-levels-quadrupled-past" target="_blank" title="Android malware levels quadrupled over past two years">F-Secure</a>, McAfee, Trend Micro and pretty much every other security vendor under the sun have reported seeing a massive boom in the number of attacks targeting smartphone devices.<br />
Indeed, <a href="http://www.v3.co.uk/v3-uk/news/2179042/android-malware-levels-rocket-200-cent-2012" target="_blank" title="Android malware levels rocket 1,200 per cent in 2012">McAfee reported that Android malware has rocketed by a staggering 1,200 per cent in the last year</a> as the platform continues to attract the attention of cyber criminals.<br />
There's plenty of vendors out there seeking to capitalise on the boom, with hundreds of anti-virus and security services flooding the market claiming to make your device as secure and safe as possible. However, with so much choice knowing which one to pick can be tough.<br />
But fear not as <em>V3</em>'s here to help. We've drawn up a list detailing the ins and outs of the 10 best mobile security apps currently available for Android smartphones to keep your beloved device free from the claws of cyber criminals.<br />
<strong>10. Super Security: Free </strong><br />
<img alt="Super Security Android app" border="0" class="left" height="227" src="http://www.v3.co.uk/IMG/092/222092/super-security-android-app-140x227.jpg?1337864306" title="Super Security Android app" width="140" /><br />
Super Security is a free cloud-based antivirus app that adds a "strongbox" storage area to the device. The strongbox is a storage area on the phone that lets users password protect three different folders: Pictures, Videos and SMS.<br />
As well as the strongbox, the service also boasts the standard virus scan, app manager, task manager and phone finder features seen on most other security apps.<br />
As a free service, though, the features aren't as good as certain other paid for services. It also has a significantly less polished user interface and can at times feel a little clunky to use. Still, it's not a bad place to start.<br />
<br />
<strong>9. Webroot Security and Antivirus: Free</strong><br />
<img alt="Webroot SecurityAnywhere Android app" border="0" class="left" height="243" src="http://www.v3.co.uk/IMG/096/222096/webroot-securityanywhere-android-app-150x243.jpg?1337864816" title="Webroot SecurityAnywhere Android app" width="150" /><br />
Webroot Security and Antivirus is another free app that offers users online identity protection as well as defences against malware, phishing and SMS attacks.<br />
Webroot automatically scans apps when they are added to the device. Like some of the other services on the list, Webroot can also help you to locate a lost or stolen device.<br />
The app is perfectly adequate, with the only problem we detected that it can, at points, slow down performance on lower-end handsets.<br />
This only really occurs when you're using the software on an old or underpowered 800MHz processor but is still an annoyance.<br />
<br />
<br />
<strong>8. AVG Antivirus: Free or £6.50 Pro version</strong><br />
<img alt="AVG Anti Virus Android app" border="0" class="left" height="150" src="http://www.v3.co.uk/IMG/086/222086/avg-anti-virus-android-app-150x150.jpg?1337866379" title="AVG Anti Virus Android app" width="150" />Available as a free download, AVG is a cheap, reliable option for any Android user.<br />
The app automatically scans apps as they're downloaded and also checks to see if files added via other connection methods like Wi-Fi or USB are safe.<br />
<span style="text-align: center;">As well as checking files and apps being added to the device, the free version also lets you find your phone if lost or stolen via Google Maps. It also features lock and wipe your device services.</span><br />
There is a Pro version available on the Google Play store, which costs £6.50 and adds a few features like a task killer, though for the money, given how good the free version is, we found little incentive to upgrade.<br />
<strong>7. Norton Mobile Security: £29.99</strong><br />
<img alt="Norton Mobile Security Android app" border="0" class="left" height="227" src="http://www.v3.co.uk/IMG/184/222184/norton-mobile-security-android-app-140x227.jpg?1337939626" title="Norton Mobile Security Android app" width="140" />Norton Mobile Security offers Android customers all the standard services and tools you'll require to protect your smartphone's data.<br />
The app boasts the usual anti-virus protection backed up by remote locate, lock and wipe, call and text blocker and anti-phishing web protection features.<br />
As an added bonus, the company's <a href="http://www.v3.co.uk/v3-uk/news/2179616/carphone-warehouse-pushes-mobile-security-android-half-price-norton-deal" target="_blank" title="Carphone Warehouse pushes mobile security for Android with half-price Norton deal">recently inked a deal with UK retailer Carphone Warehouse</a>, meaning you can pick it up for half-price at £14.99 instead of £29.99.<br />
<br />
<strong>6. Trend Micro Mobile Security Personal Edition: Free or £19 a year </strong><br />
<img alt="Trend Micro Mobile Security Android app" border="0" class="left" height="194" src="http://www.v3.co.uk/IMG/094/222094/trend-micro-mobile-security-android-app-120x194.jpg?1337864479" title="Trend Micro Mobile Security Android app" width="120" />Trend Micro's Mobile Security app is available in free and paid for versions, though the paid for option is the only one that offers a full security service.<br />
The free app is available on Google Play and includes a basic malware scanner that scans your phone or SD-card for malicious software.<br />
The paid for premium version is available for £19 per year. For the money you get a host of new features including parental controls, the ability to remotely locate your device and a fraudulent-website blocker that checks sites using Trend Micro's Smart Protection Network.<br />
One annoyance that can seem a little pointless for business users is the addition of parental control features to the app. While control options may be desirable for parents looking to stop their child downloading dangerous apps, they really aren't relevant to business or adult users.<br />
<strong>5. F-Secure Mobile Security: £8.08 per six months</strong><strong></strong><br />
<img alt="F-Secure Mobile Security Android app" border="0" class="left" height="194" src="http://www.v3.co.uk/IMG/089/222089/f-secure-mobile-security-android-app-120x194.jpg?1337863661" title="F-Secure Mobile Security Android app" width="120" />F-Secure's Mobile Security app offers a number of mobile security features including firewall and anti-theft protection and costs £8.08 per half year.<br />
The features on it work incredibly well and the app would rank higher if it didn't lack certain key features like an app scanner.<br />
Given the boom in Android Trojans this year, the lack of an app scanning feature is a serious flaw and means you may have to get a second security app to really protect your handset.<br />
The app also has parental control features, though as was the case with Trend Micro's app, they aren't all that useful for adult smartphone users, but nice to know they're there, just in case.<br />
<br />
<strong>4. McAfee Mobile Security: £29.99 a year</strong><br />
<span style="text-align: center;"><img alt="McAfee Mobile Security Android app" border="0" class="left" height="170" src="http://www.v3.co.uk/IMG/101/222101/mcafee-mobile-security-android-app-170x170.jpg?1337866013" title="McAfee Mobile Security Android app" width="170" /></span>McAfee Mobile Security application offers a desktop anti-virus and protection service on a smartphone.<br />
<span style="text-align: center;">The service is free for the first seven days but costs £29.99 per year after that. As well as Android, there are also BlackBerry and Symbian versions.</span><br />
In terms of features Mobile Security 2.0 offers the complete package, boasting anti-virus protection, app screening, anti-theft remote wiping, unlimited backup and call filtering services.<br />
The only reason the app didn't rank higher in our list is its liberal use of alerts. The app will pop up and intrude on your smartphone web and app browsing experience on a regular basis.<br />
One particularly annoying feature is the fact that app actually starts alerting you on a regular basis that your free trial is about to run out a full day before it happens.<br />
<strong>3. Bitdefender Mobile Security: Free or $9.99 a year</strong><br />
<img alt="Bitdefender Mobile Security Android app" border="0" class="right" height="170" src="http://www.v3.co.uk/IMG/087/222087/bitdefender-mobile-security-android-app-170x170.jpg?1337863474" title="Bitdefender Mobile Security Android app" width="170" /><br />
Bitdefender Mobile Security comes in free and premium versions, the latter retailing for a fairly reasonable $9.99 per year.<br />
The app is a solid choice for most Android users, featuring an intuitive user interface and retailing at an affordable price.<br />
The only downside is that the app doesn't have any SIM-card removal notification features and its Firewall protection only works on Android's native browser. That means Ice Cream Sandwich handset owners surfing the internet using the infinitely superior Chrome browser won't be protected.<br />
<br />
<strong>2. Kaspersky Mobile Security: Free or £11.95</strong><br />
Kaspersky Mobile Security Lite is a fantastic Android security app that's available in free and paid for versions.<br />
<img alt="Kaspersky Mobile Security Android app" border="0" class="left" height="227" src="http://www.v3.co.uk/IMG/090/222090/kaspersky-mobile-security-android-app-140x227.jpg?1337863838" title="Kaspersky Mobile Security Android app" width="140" /><br />
The paid for version costs £11.95 and offers the same features as a number of more expensive premium services.<br />
The app grants access to Kaspersky's cloud-based Security Network, which automatically checks any app you install to make sure its safe.<br />
One feature we particularly like is the educational element included in the app. Kaspersky Mobile Security doesn't take as draconian approach as other apps, with helpful hints explaining the importance of each feature being available as a shortcut on the app's user interface.<br />
The paid for version of the app also houses all the standard device wipe, call and message filter and phone tracking services expected of any security app.<br />
<strong>1. Lookout for Android: Free or $29.99 a year </strong><br />
<img alt="Lookout Android app" border="0" class="right" height="227" src="http://www.v3.co.uk/IMG/091/222091/lookout-android-app-140x227.jpg?1337866059" title="Lookout Android app" width="140" />Lookout is one of a select number of security companies purely dedicated to developing mobile security services and we have to say its Android app offers the most complete protection service currently on market.<br />
Its Android app comes in free and paid for versions, with the paid for version costing a fairly hefty $29.99 per year.<br />
The reason we'd really recommend the app is its intuitive user interface (UI). While the device features the same anti-virus protection, remote wipe controls, data backup, firewall defences and an app auditor services seen on other apps, Lookout is much more streamlined.<br />
This could be because of Lookout's specific mobile focus, with the UI being far easier to navigate and understand than a number of its competitors. This streamlined feel is enhanced by the apps nonintrusive nature, with its protection features remaining nicely out of sight.<br />
<br />
<br />
<br />
<br />
</div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-81156335734440618182012-05-26T06:23:00.000-07:002012-05-26T06:23:00.016-07:00US Mayor And Son Charged With Hacking Into Opposition Site<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://9e.img.v4.skyrock.net/9e7/titerebe93/pics/1832217941_small_1.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="212" src="http://9e.img.v4.skyrock.net/9e7/titerebe93/pics/1832217941_small_1.jpg" width="320" /></a></div><h2>US mayor and son charged with hacking into opposition site</h2><div class="standfirst">We'd rather be fending off global cyberwar, sniff Feds<br />
</div>Dr Felix Roque, 55, the mayor of West New York, New Jersey, and Joseph Roque, 22, of Passaic County, allegedly hacked into recallroque.com and illegally accessed e-mails in February. Joseph Roque is accused of gaining control of the administrative email account associated with the dot-com before interacting with its web host, Go Daddy, to shut the site down, <a href="http://www.nytimes.com/2012/05/25/nyregion/west-new-york-nj-mayor-accused-of-hacking-opponents-web-site.html" target="_blank"><i>The New York Times</i> reports</a>.<br />
<div id="article-mpu-container"> <div class="ad-now" id="ad-mpu1-spot" style="height: auto; width: auto;"> </div>The father and son team also "sought to identify, intimidate and harass" those who operated the website and other critics of Roque's administration, the <a href="http://www.justice.gov/usao/nj/Press/files/Roque,%20Felix%20et%20al%20Arrest%20News%20Release.html" target="_blank">Department of Justice alleged</a>:<br />
</div><blockquote>By the late afternoon of February 8, 2012, Joseph Roque had successfully hacked into various online accounts used in connection with the recall website. Joseph Roque then used that access to disable the website. Mayor Roque harassed and attempted to intimidate several individuals whom he had learned were associated with the recall website.</blockquote>The pair face conspiracy and computer hacking charges over the alleged political dirty tricks. Both charges carry possible fines on conviction of up to $250,000 and the risk of a substantial spell behind bars. The alleged abuse of public trust involved in the case means the charges are being treated especially seriously.<br />
FBI Special Agent in Charge Michael B. Ward commented: "In this instance, an elected official conspired to hack into a website and email account.<br />
"It's incredibly disappointing that resources have to be diverted from protecting the US against cyber intrusions targeting critical infrastructure, federally funded research and military technology, to address a public official intruding into computer systems to further a political agenda."<br />
US Attorney Paul Fishman added: "The elected leader of West New York and his son allegedly hacked into computers to intimidate constituents who were simply using the internet to exercise their Constitutional rights to criticise the government."<br />
Mayor Roque only gained office last year after leading a successful recall against the previous mayor, Sal Vega, and beating him in the subsequent election. West New York has a population of 50,000 and is located around seven miles from Manhattan. It's unclear whether or not Roque, who describes himself as an "independent conservative democrat", intends to resign as a result of the charges, <i>The Jersey Journal</i> <a href="http://www.nj.com/jjournal-news/index.ssf/2012/05/west_new_york_mayor_felix_roqu_3.html" target="_blank">reports</a><div class="standfirst"><br />
</div></div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-3095365520126697002012-05-25T01:01:00.002-07:002012-05-25T01:01:58.915-07:00Comcast phishing site contains valid TRUSTe seal<div dir="ltr" style="text-align: left;" trbidi="on"><div class="space-2 content fancy s-7"><a href="http://i.zdnet.com/blogs/comcast_phishing_site_truste_seal.png" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img alt="" class="size-full wp-image-12293 aligncenter" height="324" src="http://i.zdnet.com/blogs/comcast_phishing_site_truste_seal.png" width="475" /></a><span class="c-1 heavy">Summary: </span>Security researchers from Sophos are reporting on an intercepted Comcast-themed phishing email, which contains a valid TRUSTe seal.</div><br />
Security researchers from Sophos are reporting on an intercepted <a href="http://nakedsecurity.sophos.com/2012/05/24/comcast-users-phished-by-constant-guard-spam-lure/"><strong>Comcast-themed phishing email, which contains a valid TRUSTe seal</strong></a>.<br />
More on the phishing email:<br />
<blockquote>Like many other sites that are compromised to host phishing pages, this one appears to have been compromised through vulnerable FrontPage server extensions.Yes, I said FrontPage. The old Microsoft Office package used for building and publishing web sites. Microsoft discontinued support for FrontPage publishing extensions in 2006 and they have been the source of many web site vulnerabilities over the last 15 years.The fake page is an identical copy of the real Comcast XFINITY login page, and surprisingly includes a fully functional <a href="http://en.wikipedia.org/wiki/TRUSTe"><strong>TRUSTe</strong></a> logo which may lend further credibility to the site.</blockquote>Cybercriminals often take advantage of <a href="http://blog.webroot.com/2009/11/18/faux-verified-by-visa-phishing-scam-targets-holiday-shoppers/"><strong>visual social engineering elements</strong></a>, by embedding logos of reputable and trusted brands in order to improve of authenticity of their bogus content.<br />
Users are advised to keep in mind the fact that these security and privacy seals often have limited applicability in real-life situations, in particular in the process of ensuring a web site’s CIA (Confidentiality, Integrity and Availability).</div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-20173849413139995882012-05-25T00:51:00.000-07:002012-05-25T00:51:49.713-07:0035,000 Passwords Reset After BigPond GameArena Hacked<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2KpVxEAc3dJ9yw9NtxQGKjGnz1lyZhBDN-bgdfYTpSN0Fvqiz-Lljba4ph36bW8wIKi217K2YB5yWI4XJDJrbtcYepA34tAs-9Ea71CduQMiFWUxBHNlbTJUHuaBMc3FTROpOuf7xHzEQ/s640/100+Kenya+government+websites+breached+by+Indonesian+hacker.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="192" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2KpVxEAc3dJ9yw9NtxQGKjGnz1lyZhBDN-bgdfYTpSN0Fvqiz-Lljba4ph36bW8wIKi217K2YB5yWI4XJDJrbtcYepA34tAs-9Ea71CduQMiFWUxBHNlbTJUHuaBMc3FTROpOuf7xHzEQ/s320/100+Kenya+government+websites+breached+by+Indonesian+hacker.jpg" width="320" /></a></div><h2>BigPond GameArena hacked, 35,000 passwords reset</h2><div class="standfirst">Quick disclosure from Telstra<br />
</div>Telstra has taken the unusual – in Australia – step of proactively announcing that a service has been compromised.<br />
The carrier has announced that it’s reset the passwords of 35,000 users of its GameArena and Games Shop services, stating that “the sites, operated by a third party company, were victims of a hacking attack.”<br />
<div id="article-mpu-container"> <div class="ad-now" id="ad-mpu1-spot" style="height: auto; width: auto;"> </div>The carrier states that “no financial or credit card details were kept on the sites”.<br />
</div>“Information that might have been obtained was limited to BigPond Games usernames, the email address used to join the site and the encrypted GameArena and Games Shop passwords of up to 35,000 customers,” the statement said.<br />
Users’ BigPond Broadband passwords were not affected. Telstra will be contacting affected customers with their new passwords.<br />
Last year, a third-party customer-service provider used by BigPond was taken offline after an <a href="http://www.theregister.co.uk/2011/12/09/telstra_opens_customer_database_in_egregious_blunder/">exposure</a> that resulted in around 60,000 password resets, while in January, customer data was <a href="http://www.theregister.co.uk/2012/01/01/telstra_data_on_stupid_insecure_cloud_spreadsheet/">posted</a> to a cloud-based spreadsheet. In both cases, the data breach was the result of process failures rather than external attacks.<br />
Perhaps because of the criticism it suffered in those two incidents, the carrier has taken the commendable decision both to disclose and to act quickly<div class="standfirst"><br />
</div></div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-61807486962446231862012-05-25T00:48:00.000-07:002012-05-25T00:48:29.592-07:00Yahoo! leaks! private! key! in! Axis! Chrome! debut!<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://i1-news.softpedia-static.com/images/news2/Yahoo-Messenger-Users-Phished-for-Facebook-Credentials-2.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://i1-news.softpedia-static.com/images/news2/Yahoo-Messenger-Users-Phished-for-Facebook-Credentials-2.jpg" /></a></div>Extension launch scuppered by certificate blunder<br />
<br />
Yahoo! today released its Axis extension for Chrome – and accidentally leaked its private security key that could allow anyone to create malicious plugins masquerading as official Yahoo! software.<br />
Australian entrepreneur Nik Cubrilovic, who last year garnered notice for identifying Facebook's tracking cookies, <a href="http://nikcub.appspot.com/posts/yahoo-axis-chrome-extension-leaks-private-certificate-file">revealed the certificate blunder</a> on his blog, and said users should not install the extension “until the issue is clarified”.<br />
<div id="article-mpu-container"> <div class="ad-now" id="ad-mpu1-spot" style="height: auto; margin-top: 0px; width: auto;"> </div>Cubrilovic peeked into the extension’s source code and found the private certificate, which Yahoo! uses to sign the application to prove it is genuine and unaltered. The result, he says, is that a miscreant could forge a malicious extension that would be verified by Google's web browser as coming from Yahoo!<br />
</div>There are all sorts of attacks that could be executed with a spoofed extension; the most obvious of these, as Cubrilovic notes, would be to create and sign a traffic logger to capture a victim’s web activity. He wrote:<br />
<blockquote>The certificate file is used by Yahoo! to sign the extension package, which is used by Chrome and the webstore to authenticate that the package comes from Yahoo! With access to the private certificate file a malicious attacker is able to create a forged extension that Chrome will authenticate as being from Yahoo! The clearest implication is that with the private certificate file and a fake extension you can create a spoofed package that captures all web traffic, including passwords, session cookies, etc. The easiest way to get this installed onto a victim's machine would be to DNS spoof the update URL. The next time the extension attempts to update it will silently install and run the spoofed extension.<br />
</blockquote>He’s also produced <a href="http://github.com/nikcub/yahoo-spoof">a proof-of-concept</a> of a spoofing attack and written up instructions on how to remove the extension.<br />
Yahoo! has since apologised and posted a replacement web search extension that doesn’t include the private half of the security certificate. The new plugin, billed as a search browser, is also available for Firefox, Internet Explorer, Safari, and iPhones and iPads.<br />
</div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-6664054523827388502012-05-25T00:45:00.000-07:002012-05-25T00:45:27.766-07:00New SpyEye plugin takes control of crimeware victims!<div dir="ltr" style="text-align: left;" trbidi="on"><a href="http://i.zdnet.com/blogs/spyeye_plugin_camera_microphone_flash.jpg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img alt="" class="size-full wp-image-12288 aligncenter" height="153" src="http://i.zdnet.com/blogs/spyeye_plugin_camera_microphone_flash.jpg" width="475" /></a><span class="c-1 heavy">Summary: </span>Security researchers from Kaspersky have profiled a new SpyEye plugin known as flashcamcontrol.dll which takes control of the victim’s webcam and microphone.<br />
<br />
<br />
Security researchers from Kaspersky have <a href="http://www.securelist.com/en/blog/208193513/Big_Brother"><strong>profiled a new SpyEye plugin</strong></a> known as <strong>flashcamcontrol.dll</strong>.<br />
What does it do? Basically, it modifies an infected host’s Flash permissions, allowing cybercriminals the opportunity to control and webcam and the microphone of the infected victims.<br />
More details:<br />
<blockquote>If an infected user visits the site of a specified bank and the browser processing the page requests a flash-document via a link from the first column, the webfakes.dll plugin (which runs in a browser context) detects that request and replaces it with an address from the second column – an address controlled by the intruders. As a result, the browser will load a malicious document from the intruder’s server (statistiktop.com) instead of a flash document from the bank site.</blockquote><blockquote>It turned out that both flash documents merely create a window with a picture from the webcam. One of them sends a video stream to the intruder’s server.</blockquote>It appears that someone is experimenting, with long-term ambitions on their mind. <a href="http://www.zdnet.co.uk/news/emerging-tech/2003/12/12/online-banks-plan-face-recognition-trials-39118499/"><strong>Face recognition for online banking as a concept</strong></a> has been around for years, however, financial institutions globally have failed to implement the solution on a large scale. Personally, I believe that facial recognition as a value-added protection mechanism is a futile attempt to prevent a successful crimeware attack on the infected host.<br />
Taking into consideration the fact that on the majority of occasions users don’t know that they’re infected with crimeware, a visual representation of the fact that a particular end user is indeed in front of the computer wouldn’t change this. And now cybercriminals have developed an efficient way to undermine the facial recognition process with ease.<br />
This latest development once again proves that cybercriminals are steps ahead of the security industry, and will continue to innovate in an attempt to increase their fraudulently obtained revenues.<br />
<br />
</div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com1tag:blogger.com,1999:blog-8354165089554309826.post-47873253091360411032012-05-22T04:57:00.003-07:002012-05-22T05:03:56.029-07:00Hacking ebooks collection!<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFQGrbNFX4oxhMe9O3o8mqmDDMisqU0gTe13TrmeEAxmaBM9VY4kcmzCTfu6HZEgwPrUOdbOUDHk5Y_jzPrkQC7YD8wq_gLsMcau3EsK5NrKzy-35C8mJ9eZCfEWOwRiC92RSgUC93xuU/s1600/thebestebookcollection.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFQGrbNFX4oxhMe9O3o8mqmDDMisqU0gTe13TrmeEAxmaBM9VY4kcmzCTfu6HZEgwPrUOdbOUDHk5Y_jzPrkQC7YD8wq_gLsMcau3EsK5NrKzy-35C8mJ9eZCfEWOwRiC92RSgUC93xuU/s1600/thebestebookcollection.jpg" /></a></div>(Ebook - Computer) Hacking The Windows Registry.pdf 0 MB<br />
(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf 0 MB<br />
(eBook pdf) Hacking into computer systems - a beginners guide.pdf 1 MB<br />
(ebook_-_pdf)_Hacking_IIS_Servers.pdf 0 MB<br />
0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf 2 MB<br />
0764578014.Wiley.The Database Hacker's Handbook- Defending Database Servers.chm 1 MB<br />
076459611X.John Wiley &_ Sons.Hacking GMail (ExtremeTech).pdf 0 MB<br />
076459611X.John Wiley &amp_ Sons.Hacking GMail (ExtremeTech).pdf 5 MB<br />
1246523-Hacking.Guide.V3.1.pdf 1 MB<br />
1931769508.A-List Publishing.Hacker Linux Uncovered.chm 4 MB<br />
2212948-Hacker'S.Delight.chm 2 MB<br />
285063-Hacker.Bibel.[278.kB_www.netz.ru].pdf 0 MB<br />
3077366-HackerHighSchool.pdf 3 MB<br />
731986-Hacker's Desk Reference.pdf 1 MB<br />
A Beginners Guide To Hacking Computer Systems.pdf 1 MB<br />
Addison Wesley - Hackers Delight 2002.pdf 6 MB<br />
Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb.chm 14 MB<br />
Anti-Hacker ToolKit - McGraw Hill 2E 2004.chm 29 MB<br />
Attacking the DNS Protocol.pdf 0 MB<br />
Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf 144 MB<br />
Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf 18 MB<br />
Certified Ethical Hacker (CEH) v3.0 Official Course.pdf 26 MB<br />
Computer - Hackers Secrets - e-book.pdf 0 MB<br />
Crc Press - The Hacker'S Handbook.pdf 18 MB<br />
Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru].pdf 0 MB<br />
DangerousGoogle-SearchingForSecrets.pdf 2 MB<br />
Dummies - Hack How To Create Keygens (1).pdf 0 MB<br />
For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf 11 MB<br />
For.Dummies.Hacking.for.Dummies.Apr.2004.eBook-DDU.pdf 9 MB<br />
Hack IT Security Through Penetration Testing.pdf 12 MB<br />
Hack Proofing - Your Network - Internet Tradecraft.pdf 3 MB<br />
Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress - ISBN 1-928994-34-2.pdf 12 MB<br />
Hack Proofing Sun Solaris 8.pdf 7 MB<br />
Hack Proofing Your E-Commerce Site.pdf 7 MB<br />
Hack Proofing Your Identity In The Information Age.pdf 9 MB<br />
Hack Proofing Your Network Second Edition.pdf 9 MB<br />
Hack Proofing Your Network_First Edition.pdf 3 MB<br />
Hack Proofing Your Web Applications.pdf 9 MB<br />
Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm 6 MB<br />
Hack_IT_Security_Through_Penetration_Testing.chm 5 MB<br />
Hacker Disassembling Uncovered.chm 5 MB<br />
Hacker Linux Uncovered.chm 4 MB<br />
Hacker Web Exploitation Uncovered.chm 1 MB<br />
Hacker'S.Delight.chm 2 MB<br />
Hacker_s_Guide.pdf 4 MB<br />
Hackers Beware.pdf 5 MB<br />
Hackers Secrets Revealed.pdf 0 MB<br />
Hackers Secrets.pdf 0 MB<br />
Hackers, Heroes Of The Computer Revolution.pdf 0 MB<br />
Hackers_Secrets.pdf 0 MB<br />
Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf 3 MB<br />
Hacking - The Art of Exploitation.chm 1 MB<br />
Hacking Cisco Routers.pdf 0 MB<br />
Hacking Exposed - Network Security Secrets & Solutions, 2nd Edition.pdf 10 MB<br />
Hacking Exposed Network Security Secrets & Solutions, Third Edition ch1.pdf 2 MB<br />
Hacking For Dummies 1.pdf 0 MB<br />
Hacking For Dummies 2.pdf 0 MB<br />
Hacking For Dummies.pdf 0 MB<br />
Hacking GMail.pdf 5 MB<br />
Hacking IIS Servers.pdf 0 MB<br />
Hacking Windows XP.pdf 10 MB<br />
Hacking into computer systems - a beginners guide.pdf 1 MB<br />
Hacking the Code - ASP.NET Web Application Security Cookbook (2004) .chm 5 MB<br />
Hacking-Hacker's Guide.pdf 4 MB<br />
Hacking-Hackers Secrets Revealed.pdf 0 MB<br />
Hacking-Hugo Cornwall-The Hacker's Handbook .pdf 0 MB<br />
Hacking-The Hacker Crackdown.pdf 1 MB<br />
Hacking-ebook - CIA-Book-of-Dirty-Tricks1.pdf 0 MB<br />
Hacking.For.Dummies.Access.To.Other.People's.System.Made.Simple.pdf 1 MB<br />
Hacking.Guide.V3.1.pdf 1 MB<br />
Hackproofing Oracle Application Server.pdf 0 MB<br />
Halting.The.Hacker.A.Practical.Guide.To.Computer.Security.chm 1 MB<br />
How to Crack CD Protections.pdf 0 MB<br />
John Wiley & Sons - Hacking For Dummies.pdf 9 MB<br />
John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eBook-DDU.pdf 10 MB<br />
John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eBook.pdf 10 MB<br />
John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.Feb.2005.ISBN0764569597.pdf 3 MB<br />
Jon.Erickson.Hacking.The.Art.Of.Exploitation.No.Starch.Press.2003.chm 1 MB<br />
Linux-Server.Hacks-OReilly.pdf 34 MB<br />
McGraw Hill - Web Applications (Hacking Exposed).pdf 8 MB<br />
McGraw-Hill - Hacking Exposed, 3rd Ed - Hacking Exposed Win2.pdf 6 MB<br />
McGraw.Hacking.Exposed.Cisco.Networks.chm 10 MB<br />
McGraw.Hill.HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU.pdf 3 MB<br />
McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eB.pdf 4 MB<br />
McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eBook-DDU.pdf 4 MB<br />
McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-.pdf 3 MB<br />
McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf 3 MB<br />
McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eB.pdf 5 MB<br />
McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eBook-DDU.pdf 5 MB<br />
Mind Hacks - Tips & Tricks for Using Your Brain.chm 3 MB<br />
No.Starch.Press.Hacking.The.Art.Of.Exploitation.chm 1 MB<br />
O'Reilly - Online Investing Hacks.chm 5 MB<br />
O'Reilly.-.Network.Security.Hacks.chm 2 MB<br />
O'Reilly.Windows.Server.Hack.chm 2 MB<br />
O'Reilly.Windows.Server.Hack.rar 2 MB<br />
OReilly Google Hacks, 1st Edition2003.pdf 3 MB<br />
OReilly - Flickr Hacks Tips and Tools for Sharing Photos Online (Feb 2006).chm 5 MB<br />
OReilly - Google Hacks.pdf 3 MB<br />
OReilly,.Digital.Video.Hacks.(2005).DDU.LotB.chm 3 MB<br />
OReilly,.IRC.Hacks.(2004).DDU.chm 3 MB<br />
OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596008570.chm 5 MB<br />
OReilly.Google.Maps.Hacks.Jan.2006.chm 9 MB<br />
OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005.chm 2 MB<br />
OReilly.Network.Security.Hacks.chm 2 MB<br />
OReilly.PC.Hacks.Oct.2004.eBook-DDU.chm 6 MB<br />
OReilly.PayPal.Hacks.Sep.2004.eBook-DDU.chm 2 MB<br />
OReilly.Perl.Hacks.Tips.and.Tools.for.Programming.Debugging.and.Surviving.May.2006.chm 1 MB<br />
OReilly.SQL.Hacks.Nov.2006.chm 2 MB<br />
OReilly.Skype.Hacks.Tips.and.Tools.for.Cheap.Fun.Innovative.Phone.Service.Dec.2005.chm 4 MB<br />
OReilly.Statistics.Hacks.May.2006.chm 1 MB<br />
OReilly.Ubuntu.Hacks.Tips.and.Tools.for.Exploring.Using.and.Tuning.Linux.Jun.2006.chm 4 MB<br />
OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Telephony.Dec.2005.chm 3 MB<br />
OReilly.Word.Hacks.Oct.2004.eBook-DDU.chm 3 MB<br />
OSB.Ethical.Hacking.and.Countermeasures.EC.Council.Exam.312.50.Student.Courseware.eBook-LiB.chm 14 MB<br />
O_Reilly_-_Windows_XP_Hacks.chm 5 MB<br />
Oreilly Access Hacks Apr 2005.chm 18 MB<br />
Oreilly, Paypal Hacks (2004) Ddu.chm 2 MB<br />
Oreilly.Amazon.Hacks.eBook.LiB.chm 3 MB<br />
Oreilly.Linux.Desktop.Hacks.Mar.2005.eBook-LiB.chm 0 MB<br />
PC Games - How to Crack CD Protection.pdf 0 MB<br />
Que - UNIX Hints Hacks.chm 1 MB<br />
Que.Certified.Ethical.Hacker.Exam.Prep.Apr.2006.chm 8 MB<br />
SQL Hacks.chm 2 MB<br />
SQLInjectionWhitePaper.pdf 1 MB<br />
Security and Hacking - Anti-Hacker Tool Kit Second Edition.chm 29 MB<br />
SoTayHacker1.0.chm 76 MB<br />
Syngress - Hack Proofing Linux (2001).pdf 12 MB<br />
Syngress - Hack Proofing Your Identity in the Information Age - 2002.pdf 9 MB<br />
Syngress - Hacking a Terror Network. The Silent Threat of Covert Channels.pdf 9 MB<br />
Syngress -- Hack Proofing Your Wireless Network.pdf 7 MB<br />
Syngress Hack Proofing Your Identity in the Information Age.pdf 9 MB<br />
Syngress.Buffer.Overflow.Attacks.Dec.2004.eBook-DDU.pdf 5 MB<br />
Syngress.Hack.the.Stack.Oct.2006.pdf 7 MB<br />
Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf 8 MB<br />
The Little Black Book Of Computer Virus.pdf 1 MB<br />
The_20Little_20Black_20Book_20of_20Computer_20Viruses.pdf 1 MB<br />
Websters.New.World.Websters.New.World.Hacker.Dictionary.Sep.2006.pdf 5 MB<br />
Wiley.Hacking.Firefox.More.Than.150.Hacks.Mods.and.Customizations.Jul.2005.eBook-DDU.pdf 14 MB<br />
Wiley.Hacking.GPS.Mar.2005.ISBN0764598805.pdf 10 MB<br />
Wiley.Hacking.Google.Maps.and.Google.Earth.Jul.2006.pdf 11 MB<br />
Wiley.Lifehacker.Dec.2006.pdf 7 MB<br />
Wiley.The.Database.Hackers.Handbook.Defending.Database.Servers.chm 1 MB<br />
Win XP Hacks oreilly 2003.chm 5 MB<br />
WinXP SP1 Hack.pdf 0 MB<br />
Windows Server Hacks.chm 2 MB<br />
Xbox-hack - AIM-2002-008.pdf 1 MB<br />
Yahoo.Hacks.Oct.2005.chm 7 MB<br />
[0735710090]Hackers Beware Defending Your Network From The Wiley Hacker.pdf 5 MB<br />
addison wesley - web hacking - attacks and defense.chm 6 MB<br />
amazon-hacks.chm 3 MB<br />
bsd-hacks.pdf 2 MB<br />
ceh-official-certified-ethical-hacker-review-guide-exam-312-50.9780782144376.27422.pdf 5 MB<br />
cracking-sql-passwords.pdf 0 MB<br />
database hacker handbook.chm 1 MB<br />
eBooks.OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools.chm 4 MB<br />
ebay-hacks-100-industrial-strength-tips-and-tools.pdf 4 MB<br />
ebook.oreilly.-.windows.xp.hacks.sharereactor.chm 5 MB<br />
ethical hacking, student guide.pdf 7 MB<br />
excel-hacks.chm 3 MB<br />
google-hacks.pdf 3 MB<br />
hacker ethic.pdf 13 MB<br />
hacker-disassembling-uncovered.9781931769228.20035.chm 5 MB<br />
hacking the windows registry .pdf 0 MB<br />
hacks.sfv 0 MB<br />
linux-server-hacks.pdf 33 MB<br />
little_black_book_oc_computer_viruses.pdf 1 MB<br />
mac-os-hacks.chm 9 MB<br />
network-security-hacks.chm 2 MB<br />
online-investing-hacks.chm 5 MB<br />
oreilly,.visual.studio.hacks.(2005).ddu.lotb.chm 6 MB<br />
oreilly.firefox.hacks.ebook-lib.chm 3 MB<br />
oreilly.windows.xp.hacks.2nd.edition.feb.2005.lib.chm 13 MB<br />
prentice hall - pipkin - halting the hacker- a practical guide to computer security, 2nd edition.chm 1 MB<br />
spidering-hacks.chm 1 MB<br />
the-database-hackers-handbook-defending-database-servers.9780764578014.25524.chm 1 MB<br />
tivo-hacks.100-industrial-strength-tips-and-tools.pdf 9 MB<br />
u23_Wiley - Hacking GPS - 2005 - (By Laxxuss).pdf <br />
<br />
Torrent Link - <a href="http://bitsnoop.com/hacking-and-security-ebooks-collect-q20229056.html" target="_blank">Click!</a></div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-65612838309698022942012-05-22T04:03:00.000-07:002012-05-22T04:03:54.636-07:00Backdoor sniffed in ZTE's US Android smartphones<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://phandroid.s3.amazonaws.com/wp-content/uploads/2012/02/android-malware.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="221" src="http://phandroid.s3.amazonaws.com/wp-content/uploads/2012/02/android-malware.jpg" width="320" /></a></div>Chinese handset manufacturer ZTE has confirmed the presence of a backdoor in one of its Android smartphones.<br />
ZTE's Score M ships with an application featuring a hardcoded password that gives the user, or software running on the device, administrator-level access. Running the program with the password spawns a root shell prompt on the Linux-powered mobes, allowing the phone to be completely taken over.<br />
<div id="article-mpu-container"> <div class="ad-now" id="ad-mpu1-spot" style="height: auto; margin-top: 0px; width: auto;"> </div>News of the ZTE Score M smartphone backdoor first surfaced last week in posts on the code-sharing website pastebin.com. The password needed to access the backdoor, located in the <code>/system/bin/sync_agent</code> file, is readily available online.<br />
</div>The world's fourth largest mobe-maker acknowledged a problem, but said it was restricted to the Score M, which runs Android 2.3.4 and is distributed through MetroPCS in the US. ZTE is working on an "over the air" patch to close the security hole, and the handset manufacturer insists that the issue does not affect Skate smartphones - contrary to internet rumours.<br />
Mobile security firm Lookout advises users of the model to be particularly careful about apps they download and websites they visit until they get the security patch from ZTE. The poorly protected setuid executable on the smartphones allows an application to grant itself superuser privileges and run as the root user, Lookout explains.<br />
"This type of access allows an attacker full control over a target device – which includes the ability to install or uninstall applications without notice and access to any sensitive personal information on a device," Lookout <a href="http://blog.mylookout.com/blog/2012/05/21/zte-security-vulnerability" target="_blank">warns</a>.<br />
"While this issue does not expose a remotely accessible vulnerability on affected phones, it is an issue that could be exploited by targeted, malicious applications installed to the phone. In addition, affected users should download and install patches provided by ZTE and/or Metro PCS as soon as they are rolled out to their device," it adds.<br />
The sync_agent tool might have been put there to manage preloaded applications, such as MetroPCS Visual Voicemail or MetroStudio, according to Lookout.<br />
Dmitri Alperovitch, co-founder of security startup CrowdStrike, said ZTE was using the backdoor to update the smartphone's software, suggesting that the feature was placed there deliberately. However he said that it was unclear to him if the application was planted with malicious intent or left available as the result of some careless oversight, Reuters <a href="http://www.reuters.com/article/2012/05/18/us-zte-phone-idUSBRE84H08J20120518" target="_blank">reports</a>.<br />
"There are rumours about backdoors in Chinese equipment floating around," Alperovitch said. "That's why it's so shocking to see it blatantly on a device."<br />
The circumstances of the problem, especially the fact that the problem was restricted to smartphones supplied to the US, is bound to provide plenty of fodder for conspiracy theorists. China is repeatedly accused of using technology to spy on the West's high-tech biz, defence contractors, human right activists and energy firms. Allegations of backdoors in devices supplied by Chinese network equipment manufacturers have been a hot topic among Western politicians.</div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-19436587096783953722012-05-22T04:00:00.000-07:002012-05-22T04:00:02.348-07:00Anonymous Hacks Bureau Of Justice, Leaks 1.7GB Of Data<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://upload.wikimedia.org/wikipedia/commons/thumb/4/49/AnonOps.jpg/200px-AnonOps.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://upload.wikimedia.org/wikipedia/commons/thumb/4/49/AnonOps.jpg/200px-AnonOps.jpg" /></a></div><span class="c-1 heavy">Summary: </span>Anonymous has apparently hacked the United States Bureau of Justice Statistics and posted 1.7GB of data belonging to the agency on The Pirate Bay. This is a Monday Mail Mayhem release.<br />
<br />
The hacktivist group Anonymous claims to have leaked 1.7GB of data belonging to the United States Bureau of Justice Statistics (<a href="http://bjs.ojp.usdoj.gov/">BJS</a>). The file, which has been uploaded as a torrent and posted on <a href="https://thepiratebay.se/torrent/7287633/1.7GB_leaked_from_the_Bureau_of_Justice">The Pirate Bay</a>, reportedly contains internal e-mails as well as the website’s “entire database dump.”<br />
It remains to be seen if there’s anything incriminating in this leak. After all, the BJS is simply a federal government agency belonging to the U.S. Department of Justice (<a href="http://www.justice.gov/">DOJ</a>) that collects, analyzes, and publishes data relating to crime in the U.S. (including hacker attacks).<br />
As you can see in the video above, the group also claims the BJS took down its website in response to the attack. By then it was supposedly too late. Here’s the video’s transcript of the English part:<br />
<blockquote> Greetings world,<br />
We are Anonymous.<br />
Today we are releasing 1.7GB of data that used to belong to the United States Bureau of Justice, until now.<br />
Within the booty you may find lots of shiny things such as internal emails, and the entire database dump.<br />
We Lulzed as they took the website down after being owned, clearly showing they were scared of what inevitably happened. <br />
We do not stand for any government or parties; we stand for freedom of people, freedom of speech and freedom of information.<br />
We are releasing data to spread information, to allow the people to be heard and to know the corruption in their government. We are releasing it to end the corruption that exists, and truly make those who are being oppressed free.<br />
The price we pay very often is our own freedom. The price governments pay is the exposure of their corruption and the truth being revealed, for the truth will set us free in the end.<br />
So once more we call on you. Hackers, activists, and freedom fighters; join us in our struggle against these corporate <br />
</blockquote>Curiously, an unmasked gentleman is shown at the end of the video. He says the following:<br />
<blockquote> What’s next? What’s next is… all they can do is shut down the Internet itself. And we see, how that went for them, in Egypt. And we the people know, that when the government shuts down the Internet, that’s when it’s time to shut down the government. </blockquote>He then puts on the Guy Fawkes mask and repeats the well-known Anonymous slogan:<br />
<blockquote> We are Anonymous<br />
We do not forgive<br />
We do not forget<br />
Expect us </blockquote>To keep things more interesting, he throws in a little something extra: “And now, expect a whole lot more.”<br />
I have contacted the United States Bureau of Justice Statistics and will update you if I hear back.<br />
<br />
</div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-89560074735932428332012-05-21T01:19:00.000-07:002012-05-21T01:19:13.286-07:00Call Of Duty Hacker Jailed After Meatspace Burglary<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://www.geek.com/wp-content/uploads/2011/06/500x_blackops.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="291" src="http://www.geek.com/wp-content/uploads/2011/06/500x_blackops.jpg" width="400" /></a></div>A Brit who distributed a Trojan horse that posed as a patch for popular shoot-em-up game <i>Call of Duty</i> has been jailed for 18 months.<br />
Lewys Martin, 20, of Deal in Kent, used the malware to harvest bank login credentials, credit card details and internet passwords from the compromised Windows PCs of his victims. Martin then apparently laundered the credentials via underground cybercrime forums, earning $5 or less for every credential, directing proceeds of his criminal activity towards an offshore account in Costa Rica, funds which remain beyond the reach of UK police.<br />
<div id="article-mpu-container"> <div class="ad-now" id="ad-mpu1-spot" style="height: auto; margin-top: 0px; width: auto;"> </div>Martin's activities might have gone undiscovered if not for his arrest during what police described as a drunken attempt to break into a local college and steal computer equipment. Police who raided his home discovered printouts of stolen credit card numbers and papers relating to a fraudulent bank loan, obtained under a false name.<br />
</div>The student was convicted last November but sentence was deferred to allow him to complete a university computer course. However, bail was revoked after Martin was caught with several other individuals trying to break into Walmer Science College in Deal.<br />
He caused hundreds of pounds of damages in criminal damages during the bungled burglary, according to <a href="http://www.kentonline.co.uk/kentonline/news/2012/may/17/call_of_duty.aspx" target="_blank">local reports</a>.<br />
Martin was prosecuted and subsequently convicted for three burglary and fraud charges, leading up to a sentence hearing this week when he was jailed for 18 months.<br />
A court clerk at Canterbury Crown Court confirmed the terms of the sentencing this week, which following earlier guilty pleas on the specimen charges. Further fraud charges were taken into consideration in sentencing Martin to a substantial spell behind bars.<br />
Gamers are a popular target for malware distributors. Much of this malign activity is directed at gamers in the Far East but Western shoot-em-up and role-playing fans are also at risk and ought to be wary of malware posing as gaming cracks and other common tricks, as explained in a blog post by Sophos <a href="http://nakedsecurity.sophos.com/2012/05/17/call-of-duty-trojan-horse-jail" target="_blank">here</a></div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-249085243241191552012-05-19T03:54:00.006-07:002012-05-19T04:16:13.061-07:00Website Source Code Grabber<div dir="ltr" style="text-align: left;" trbidi="on">it will create source.txt in the same directory<br />
<br />
import urllib<br />
import httplib<br />
import socket<br />
<br />
print "\n\nFast Webpage Saver"<br />
print "input URL and run it. It will Save Webpage Within Seconds"<br />
<br />
print "\n\n\t|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||"<br />
print "\t||||| |||||"<br />
print "\t||||| |||||"<br />
print "\t||||| Coded By Ajith KP |||||"<br />
print "\t||||| |||||"<br />
print "\t||||| |||||"<br />
print "\t|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||"<br />
<br />
try:<br />
url = raw_input("URL:")<br />
url =url.replace("http://","")<br />
txt = open('source.txt','w')<br />
cobra = urllib.urlopen('http://'+url)<br />
for source in cobra.readlines():<br />
print source.rstrip()<br />
txt.write(source.rstrip())<br />
txt.close()<br />
cobra.close()<br />
raw_input('Complete: Open source.txt')<br />
except (httplib.HTTPResponse, socket.error):<br />
print "\n\t[!] Session Cancelled; Error occured. Check internet settings"<br />
except (KeyboardInterrupt, SystemExit):<br />
print "\t[x] Session cancelled"<br />
<code class="plain"></code><code class="plain"><br />
</code></div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com2tag:blogger.com,1999:blog-8354165089554309826.post-51073053729189967962012-05-19T03:52:00.000-07:002012-05-19T03:52:45.497-07:00Website Response Checker<div dir="ltr" style="text-align: left;" trbidi="on">import httplib<br />
print "Coded by Ajith KP"<br />
print "This code can capture the response from website"<br />
print "Eg. Website for Check: www.facebook.com"<br />
print "Eg. Page for check: index.php"<br />
site=raw_input("\t\nWebsite for Check:")<br />
pages=raw_input("\t\nPage for Check:")<br />
pages = "/" + pages<br />
conn = httplib.HTTPConnection(site)<br />
conn.request("GET", pages)<br />
capture = conn.getresponse()<br />
print capture.status, capture.reason<br />
<br />
I dont want my readers to become lazy since its a small program write the code on your own :P</div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-33085413867722669092012-05-19T03:47:00.000-07:002012-05-19T03:47:47.838-07:00Area Calculator in .py<div dir="ltr" style="text-align: left;" trbidi="on">print "Select shape:"<br />
print "1 rectangle"<br />
print "2 Circle"<br />
print "3 Triangle"<br />
shape=input("> ")<br />
if shape==1:<br />
l=input("Length:")<br />
b=input("breadth:")<br />
area=l*b<br />
print "The area of rectangle is", area<br />
if shape==2:<br />
r=input("radius:")<br />
area=3.14*r*r<br />
print "The area of circle is", area<br />
if shape==3:<br />
b=input("b:")<br />
h=input("h:")<br />
area=0.5*b*h<br />
print "The area of Triangle is", area<br />
<br />
Paste Link - <a href="http://paste.ubuntu.com/995640/" target="_blank">Click</a></div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-40786651849565618392012-05-19T03:45:00.000-07:002012-05-19T03:45:54.681-07:00Admin Page Finder in .py<div dir="ltr" style="text-align: left;" trbidi="on">#Created for coded32 and his teamopenfire Eliminated Some bugs from my last code shared here as Guest.<br />
#Greets To T.O.F and Indishell<br />
#Thanks friends for find bugs and give suggetions<br />
<br />
#cd direcory/to/code<br />
#direcory/to/code>python code.py<br />
<br />
#improved Error Handling<br />
#Find out usefull stuffs from www.teamopenfire.com<br />
#"wE aRe gREat inDIans"<br />
<br />
import httplib<br />
import socket<br />
import sys<br />
<br />
<br />
try:<br />
print "\t################################################################"<br />
print "\t# www.teamopenfire.com #"<br />
print "\t# ############### ######## ############ #"<br />
print "\t# # # ## ## # # #"<br />
print "\t# ###### ###### ## ## # ######## #"<br />
print "\t# # # ## ## # # #"<br />
print "\t# # # ## ## # ##### #"<br />
print "\t# # # ## ## # ##### #"<br />
print "\t# # # ## ## # # #"<br />
print "\t# # # ## ## # # #"<br />
print "\t# ##### [#] ######## [#] ##### AdminFinder #"<br />
print "\t# #"<br />
print "\t# coded by Ajith KP #"<br />
print "\t# Greets to Coded32 and T.O.F members #"<br />
print "\t################################################################"<br />
var1=0<br />
var2=0<br />
<br />
php = ['admin/','administrator/','admin1/','admin2/','admin3/','admin4/','admin5/','usuarios/','usuario/','administrator/','moderator/','webadmin/','adminarea/','bb-admin/','adminLogin/','admin_area/','panel-administracion/','instadmin/',<br />
'memberadmin/','administratorlogin/','adm/','admin/account.php','admin/index.php','admin/login.php','admin/admin.php','admin/account.php',<br />
'admin_area/admin.php','admin_area/login.php','siteadmin/login.php','siteadmin/index.php','siteadmin/login.html','admin/account.html','admin/index.html','admin/login.html','admin/admin.html',<br />
'admin_area/index.php','bb-admin/index.php','bb-admin/login.php','bb-admin/admin.php','admin/home.php','admin_area/login.html','admin_area/index.html',<br />
'admin/controlpanel.php','admin.php','admincp/index.asp','admincp/login.asp','admincp/index.html','admin/account.html','adminpanel.html','webadmin.html',<br />
'webadmin/index.html','webadmin/admin.html','webadmin/login.html','admin/admin_login.html','admin_login.html','panel-administracion/login.html',<br />
'admin/cp.php','cp.php','administrator/index.php','administrator/login.php','nsw/admin/login.php','webadmin/login.php','admin/admin_login.php','admin_login.php',<br />
'administrator/account.php','administrator.php','admin_area/admin.html','pages/admin/admin-login.php','admin/admin-login.php','admin-login.php',<br />
'bb-admin/index.html','bb-admin/login.html','acceso.php','bb-admin/admin.html','admin/home.html','login.php','modelsearch/login.php','moderator.php','moderator/login.php',<br />
'moderator/admin.php','account.php','pages/admin/admin-login.html','admin/admin-login.html','admin-login.html','controlpanel.php','admincontrol.php',<br />
'admin/adminLogin.html','adminLogin.html','admin/adminLogin.html','home.html','rcjakar/admin/login.php','adminarea/index.html','adminarea/admin.html',<br />
'webadmin.php','webadmin/index.php','webadmin/admin.php','admin/controlpanel.html','admin.html','admin/cp.html','cp.html','adminpanel.php','moderator.html',<br />
'administrator/index.html','administrator/login.html','user.html','administrator/account.html','administrator.html','login.html','modelsearch/login.html',<br />
'moderator/login.html','adminarea/login.html','panel-administracion/index.html','panel-administracion/admin.html','modelsearch/index.html','modelsearch/admin.html',<br />
'admincontrol/login.html','adm/index.html','adm.html','moderator/admin.html','user.php','account.html','controlpanel.html','admincontrol.html',<br />
'panel-administracion/login.php','wp-login.php','adminLogin.php','admin/adminLogin.php','home.php','admin.php','adminarea/index.php',<br />
'adminarea/admin.php','adminarea/login.php','panel-administracion/index.php','panel-administracion/admin.php','modelsearch/index.php',<br />
'modelsearch/admin.php','admincontrol/login.php','adm/admloginuser.php','admloginuser.php','admin2.php','admin2/login.php','admin2/index.php','usuarios/login.php',<br />
'adm/index.php','adm.php','affiliate.php','adm_auth.php','memberadmin.php','administratorlogin.php']<br />
<br />
asp = ['admin/','administrator/','admin1/','admin2/','admin3/','admin4/','admin5/','moderator/','webadmin/','adminarea/','bb-admin/','adminLogin/','admin_area/','panel-administracion/','instadmin/',<br />
'memberadmin/','administratorlogin/','adm/','account.asp','admin/account.asp','admin/index.asp','admin/login.asp','admin/admin.asp',<br />
'admin_area/admin.asp','admin_area/login.asp','admin/account.html','admin/index.html','admin/login.html','admin/admin.html',<br />
'admin_area/admin.html','admin_area/login.html','admin_area/index.html','admin_area/index.asp','bb-admin/index.asp','bb-admin/login.asp','bb-admin/admin.asp',<br />
'bb-admin/index.html','bb-admin/login.html','bb-admin/admin.html','admin/home.html','admin/controlpanel.html','admin.html','admin/cp.html','cp.html',<br />
'administrator/index.html','administrator/login.html','administrator/account.html','administrator.html','login.html','modelsearch/login.html','moderator.html',<br />
'moderator/login.html','moderator/admin.html','account.html','controlpanel.html','admincontrol.html','admin_login.html','panel-administracion/login.html',<br />
'admin/home.asp','admin/controlpanel.asp','admin.asp','pages/admin/admin-login.asp','admin/admin-login.asp','admin-login.asp','admin/cp.asp','cp.asp',<br />
'administrator/account.asp','administrator.asp','acceso.asp','login.asp','modelsearch/login.asp','moderator.asp','moderator/login.asp','administrator/login.asp',<br />
'moderator/admin.asp','controlpanel.asp','admin/account.html','adminpanel.html','webadmin.html','pages/admin/admin-login.html','admin/admin-login.html',<br />
'webadmin/index.html','webadmin/admin.html','webadmin/login.html','user.asp','user.html','admincp/index.asp','admincp/login.asp','admincp/index.html',<br />
'admin/adminLogin.html','adminLogin.html','admin/adminLogin.html','home.html','adminarea/index.html','adminarea/admin.html','adminarea/login.html',<br />
'panel-administracion/index.html','panel-administracion/admin.html','modelsearch/index.html','modelsearch/admin.html','admin/admin_login.html',<br />
'admincontrol/login.html','adm/index.html','adm.html','admincontrol.asp','admin/account.asp','adminpanel.asp','webadmin.asp','webadmin/index.asp',<br />
'webadmin/admin.asp','webadmin/login.asp','admin/admin_login.asp','admin_login.asp','panel-administracion/login.asp','adminLogin.asp',<br />
'admin/adminLogin.asp','home.asp','admin.asp','adminarea/index.asp','adminarea/admin.asp','adminarea/login.asp','admin-login.html',<br />
'panel-administracion/index.asp','panel-administracion/admin.asp','modelsearch/index.asp','modelsearch/admin.asp','administrator/index.asp',<br />
'admincontrol/login.asp','adm/admloginuser.asp','admloginuser.asp','admin2.asp','admin2/login.asp','admin2/index.asp','adm/index.asp',<br />
'adm.asp','affiliate.asp','adm_auth.asp','memberadmin.asp','administratorlogin.asp','siteadmin/login.asp','siteadmin/index.asp','siteadmin/login.html']<br />
<br />
cfm = ['admin/','administrator/','admin1/','admin2/','admin3/','admin4/','admin5/','usuarios/','usuario/','administrator/','moderator/','webadmin/','adminarea/','bb-admin/','adminLogin/','admin_area/','panel-administracion/','instadmin/',<br />
'memberadmin/','administratorlogin/','adm/','admin/account.cfm','admin/index.cfm','admin/login.cfm','admin/admin.cfm','admin/account.cfm',<br />
'admin_area/admin.cfm','admin_area/login.cfm','siteadmin/login.cfm','siteadmin/index.cfm','siteadmin/login.html','admin/account.html','admin/index.html','admin/login.html','admin/admin.html',<br />
'admin_area/index.cfm','bb-admin/index.cfm','bb-admin/login.cfm','bb-admin/admin.cfm','admin/home.cfm','admin_area/login.html','admin_area/index.html',<br />
'admin/controlpanel.cfm','admin.cfm','admincp/index.asp','admincp/login.asp','admincp/index.html','admin/account.html','adminpanel.html','webadmin.html',<br />
'webadmin/index.html','webadmin/admin.html','webadmin/login.html','admin/admin_login.html','admin_login.html','panel-administracion/login.html',<br />
'admin/cp.cfm','cp.cfm','administrator/index.cfm','administrator/login.cfm','nsw/admin/login.cfm','webadmin/login.cfm','admin/admin_login.cfm','admin_login.cfm',<br />
'administrator/account.cfm','administrator.cfm','admin_area/admin.html','pages/admin/admin-login.cfm','admin/admin-login.cfm','admin-login.cfm',<br />
'bb-admin/index.html','bb-admin/login.html','bb-admin/admin.html','admin/home.html','login.cfm','modelsearch/login.cfm','moderator.cfm','moderator/login.cfm',<br />
'moderator/admin.cfm','account.cfm','pages/admin/admin-login.html','admin/admin-login.html','admin-login.html','controlpanel.cfm','admincontrol.cfm',<br />
'admin/adminLogin.html','acceso.cfm','adminLogin.html','admin/adminLogin.html','home.html','rcjakar/admin/login.cfm','adminarea/index.html','adminarea/admin.html',<br />
'webadmin.cfm','webadmin/index.cfm','webadmin/admin.cfm','admin/controlpanel.html','admin.html','admin/cp.html','cp.html','adminpanel.cfm','moderator.html',<br />
'administrator/index.html','administrator/login.html','user.html','administrator/account.html','administrator.html','login.html','modelsearch/login.html',<br />
'moderator/login.html','adminarea/login.html','panel-administracion/index.html','panel-administracion/admin.html','modelsearch/index.html','modelsearch/admin.html',<br />
'admincontrol/login.html','adm/index.html','adm.html','moderator/admin.html','user.cfm','account.html','controlpanel.html','admincontrol.html',<br />
'panel-administracion/login.cfm','wp-login.cfm','adminLogin.cfm','admin/adminLogin.cfm','home.cfm','admin.cfm','adminarea/index.cfm',<br />
'adminarea/admin.cfm','adminarea/login.cfm','panel-administracion/index.cfm','panel-administracion/admin.cfm','modelsearch/index.cfm',<br />
'modelsearch/admin.cfm','admincontrol/login.cfm','adm/admloginuser.cfm','admloginuser.cfm','admin2.cfm','admin2/login.cfm','admin2/index.cfm','usuarios/login.cfm',<br />
'adm/index.cfm','adm.cfm','affiliate.cfm','adm_auth.cfm','memberadmin.cfm','administratorlogin.cfm']<br />
<br />
js = ['admin/','administrator/','admin1/','admin2/','admin3/','admin4/','admin5/','usuarios/','usuario/','administrator/','moderator/','webadmin/','adminarea/','bb-admin/','adminLogin/','admin_area/','panel-administracion/','instadmin/',<br />
'memberadmin/','administratorlogin/','adm/','admin/account.js','admin/index.js','admin/login.js','admin/admin.js','admin/account.js',<br />
'admin_area/admin.js','admin_area/login.js','siteadmin/login.js','siteadmin/index.js','siteadmin/login.html','admin/account.html','admin/index.html','admin/login.html','admin/admin.html',<br />
'admin_area/index.js','bb-admin/index.js','bb-admin/login.js','bb-admin/admin.js','admin/home.js','admin_area/login.html','admin_area/index.html',<br />
'admin/controlpanel.js','admin.js','admincp/index.asp','admincp/login.asp','admincp/index.html','admin/account.html','adminpanel.html','webadmin.html',<br />
'webadmin/index.html','webadmin/admin.html','webadmin/login.html','admin/admin_login.html','admin_login.html','panel-administracion/login.html',<br />
'admin/cp.js','cp.js','administrator/index.js','administrator/login.js','nsw/admin/login.js','webadmin/login.js','admin/admin_login.js','admin_login.js',<br />
'administrator/account.js','administrator.js','admin_area/admin.html','pages/admin/admin-login.js','admin/admin-login.js','admin-login.js',<br />
'bb-admin/index.html','bb-admin/login.html','bb-admin/admin.html','admin/home.html','login.js','modelsearch/login.js','moderator.js','moderator/login.js',<br />
'moderator/admin.js','account.js','pages/admin/admin-login.html','admin/admin-login.html','admin-login.html','controlpanel.js','admincontrol.js',<br />
'admin/adminLogin.html','adminLogin.html','admin/adminLogin.html','home.html','rcjakar/admin/login.js','adminarea/index.html','adminarea/admin.html',<br />
'webadmin.js','webadmin/index.js','acceso.js','webadmin/admin.js','admin/controlpanel.html','admin.html','admin/cp.html','cp.html','adminpanel.js','moderator.html',<br />
'administrator/index.html','administrator/login.html','user.html','administrator/account.html','administrator.html','login.html','modelsearch/login.html',<br />
'moderator/login.html','adminarea/login.html','panel-administracion/index.html','panel-administracion/admin.html','modelsearch/index.html','modelsearch/admin.html',<br />
'admincontrol/login.html','adm/index.html','adm.html','moderator/admin.html','user.js','account.html','controlpanel.html','admincontrol.html',<br />
'panel-administracion/login.js','wp-login.js','adminLogin.js','admin/adminLogin.js','home.js','admin.js','adminarea/index.js',<br />
'adminarea/admin.js','adminarea/login.js','panel-administracion/index.js','panel-administracion/admin.js','modelsearch/index.js',<br />
'modelsearch/admin.js','admincontrol/login.js','adm/admloginuser.js','admloginuser.js','admin2.js','admin2/login.js','admin2/index.js','usuarios/login.js',<br />
'adm/index.js','adm.js','affiliate.js','adm_auth.js','memberadmin.js','administratorlogin.js']<br />
<br />
cgi = ['admin/','administrator/','admin1/','admin2/','admin3/','admin4/','admin5/','usuarios/','usuario/','administrator/','moderator/','webadmin/','adminarea/','bb-admin/','adminLogin/','admin_area/','panel-administracion/','instadmin/',<br />
'memberadmin/','administratorlogin/','adm/','admin/account.cgi','admin/index.cgi','admin/login.cgi','admin/admin.cgi','admin/account.cgi',<br />
'admin_area/admin.cgi','admin_area/login.cgi','siteadmin/login.cgi','siteadmin/index.cgi','siteadmin/login.html','admin/account.html','admin/index.html','admin/login.html','admin/admin.html',<br />
'admin_area/index.cgi','bb-admin/index.cgi','bb-admin/login.cgi','bb-admin/admin.cgi','admin/home.cgi','admin_area/login.html','admin_area/index.html',<br />
'admin/controlpanel.cgi','admin.cgi','admincp/index.asp','admincp/login.asp','admincp/index.html','admin/account.html','adminpanel.html','webadmin.html',<br />
'webadmin/index.html','webadmin/admin.html','webadmin/login.html','admin/admin_login.html','admin_login.html','panel-administracion/login.html',<br />
'admin/cp.cgi','cp.cgi','administrator/index.cgi','administrator/login.cgi','nsw/admin/login.cgi','webadmin/login.cgi','admin/admin_login.cgi','admin_login.cgi',<br />
'administrator/account.cgi','administrator.cgi','admin_area/admin.html','pages/admin/admin-login.cgi','admin/admin-login.cgi','admin-login.cgi',<br />
'bb-admin/index.html','bb-admin/login.html','bb-admin/admin.html','admin/home.html','login.cgi','modelsearch/login.cgi','moderator.cgi','moderator/login.cgi',<br />
'moderator/admin.cgi','account.cgi','pages/admin/admin-login.html','admin/admin-login.html','admin-login.html','controlpanel.cgi','admincontrol.cgi',<br />
'admin/adminLogin.html','adminLogin.html','admin/adminLogin.html','home.html','rcjakar/admin/login.cgi','adminarea/index.html','adminarea/admin.html',<br />
'webadmin.cgi','webadmin/index.cgi','acceso.cgi','webadmin/admin.cgi','admin/controlpanel.html','admin.html','admin/cp.html','cp.html','adminpanel.cgi','moderator.html',<br />
'administrator/index.html','administrator/login.html','user.html','administrator/account.html','administrator.html','login.html','modelsearch/login.html',<br />
'moderator/login.html','adminarea/login.html','panel-administracion/index.html','panel-administracion/admin.html','modelsearch/index.html','modelsearch/admin.html',<br />
'admincontrol/login.html','adm/index.html','adm.html','moderator/admin.html','user.cgi','account.html','controlpanel.html','admincontrol.html',<br />
'panel-administracion/login.cgi','wp-login.cgi','adminLogin.cgi','admin/adminLogin.cgi','home.cgi','admin.cgi','adminarea/index.cgi',<br />
'adminarea/admin.cgi','adminarea/login.cgi','panel-administracion/index.cgi','panel-administracion/admin.cgi','modelsearch/index.cgi',<br />
'modelsearch/admin.cgi','admincontrol/login.cgi','adm/admloginuser.cgi','admloginuser.cgi','admin2.cgi','admin2/login.cgi','admin2/index.cgi','usuarios/login.cgi',<br />
'adm/index.cgi','adm.cgi','affiliate.cgi','adm_auth.cgi','memberadmin.cgi','administratorlogin.cgi']<br />
<br />
brf = ['admin/','administrator/','admin1/','admin2/','admin3/','admin4/','admin5/','usuarios/','usuario/','administrator/','moderator/','webadmin/','adminarea/','bb-admin/','adminLogin/','admin_area/','panel-administracion/','instadmin/',<br />
'memberadmin/','administratorlogin/','adm/','admin/account.brf','admin/index.brf','admin/login.brf','admin/admin.brf','admin/account.brf',<br />
'admin_area/admin.brf','admin_area/login.brf','siteadmin/login.brf','siteadmin/index.brf','siteadmin/login.html','admin/account.html','admin/index.html','admin/login.html','admin/admin.html',<br />
'admin_area/index.brf','bb-admin/index.brf','bb-admin/login.brf','bb-admin/admin.brf','admin/home.brf','admin_area/login.html','admin_area/index.html',<br />
'admin/controlpanel.brf','admin.brf','admincp/index.asp','admincp/login.asp','admincp/index.html','admin/account.html','adminpanel.html','webadmin.html',<br />
'webadmin/index.html','webadmin/admin.html','webadmin/login.html','admin/admin_login.html','admin_login.html','panel-administracion/login.html',<br />
'admin/cp.brf','cp.brf','administrator/index.brf','administrator/login.brf','nsw/admin/login.brf','webadmin/login.brfbrf','admin/admin_login.brf','admin_login.brf',<br />
'administrator/account.brf','administrator.brf','acceso.brf','admin_area/admin.html','pages/admin/admin-login.brf','admin/admin-login.brf','admin-login.brf',<br />
'bb-admin/index.html','bb-admin/login.html','bb-admin/admin.html','admin/home.html','login.brf','modelsearch/login.brf','moderator.brf','moderator/login.brf',<br />
'moderator/admin.brf','account.brf','pages/admin/admin-login.html','admin/admin-login.html','admin-login.html','controlpanel.brf','admincontrol.brf',<br />
'admin/adminLogin.html','adminLogin.html','admin/adminLogin.html','home.html','rcjakar/admin/login.brf','adminarea/index.html','adminarea/admin.html',<br />
'webadmin.brf','webadmin/index.brf','webadmin/admin.brf','admin/controlpanel.html','admin.html','admin/cp.html','cp.html','adminpanel.brf','moderator.html',<br />
'administrator/index.html','administrator/login.html','user.html','administrator/account.html','administrator.html','login.html','modelsearch/login.html',<br />
'moderator/login.html','adminarea/login.html','panel-administracion/index.html','panel-administracion/admin.html','modelsearch/index.html','modelsearch/admin.html',<br />
'admincontrol/login.html','adm/index.html','adm.html','moderator/admin.html','user.brf','account.html','controlpanel.html','admincontrol.html',<br />
'panel-administracion/login.brf','wp-login.brf','adminLogin.brf','admin/adminLogin.brf','home.brf','admin.brf','adminarea/index.brf',<br />
'adminarea/admin.brf','adminarea/login.brf','panel-administracion/index.brf','panel-administracion/admin.brf','modelsearch/index.brf',<br />
'modelsearch/admin.brf','admincontrol/login.brf','adm/admloginuser.brf','admloginuser.brf','admin2.brf','admin2/login.brf','admin2/index.brf','usuarios/login.brf',<br />
'adm/index.brf','adm.brf','affiliate.brf','adm_auth.brf','memberadmin.brf','administratorlogin.brf']<br />
<br />
try:<br />
site = raw_input("Web Site for Scan?: ")<br />
site = site.replace("http://","")<br />
print ("\tChecking website " + site + "...")<br />
conn = httplib.HTTPConnection(site)<br />
conn.connect()<br />
print "\t[$] Yes... Server is Online."<br />
except (httplib.HTTPResponse, socket.error) as Exit:<br />
raw_input("\t [!] Oops Error occured, Server offline or invalid URL")<br />
exit()<br />
print "Enter site source code:"<br />
print "1 PHP"<br />
print "2 ASP"<br />
print "3 CFM"<br />
print "4 JS"<br />
print "5 CGI"<br />
print "6 BRF"<br />
print "\nPress 1 and 'Enter key' for Select PHP\n"<br />
code=input("> ")<br />
<br />
if code==1:<br />
print("\t [+] Scanning " + site + "...\n\n")<br />
for admin in php:<br />
admin = admin.replace("\n","")<br />
admin = "/" + admin<br />
host = site + admin<br />
print ("\t [#] Checking " + host + "...")<br />
connection = httplib.HTTPConnection(site)<br />
connection.request("GET",admin)<br />
response = connection.getresponse()<br />
var2 = var2 + 1<br />
if response.status == 200:<br />
var1 = var1 + 1<br />
print "%s %s" % ( "\n\n>>>" + host, "Admin page found!")<br />
raw_input("Press enter to continue scanning.\n")<br />
elif response.status == 404:<br />
var2 = var2<br />
elif response.status == 302:<br />
print "%s %s" % ("\n>>>" + host, "Possible admin page (302 - Redirect)")<br />
else:<br />
print "%s %s %s" % (host, " Interesting response:", response.status)<br />
connection.close()<br />
print("\n\nCompleted \n")<br />
print var1, " Admin pages found"<br />
print var2, " total pages scanned"<br />
raw_input("[/] The Game Over; Press Enter to Exit")<br />
<br />
<br />
if code==2:<br />
print("\t [+] Scanning " + site + "...\n\n")<br />
for admin in asp:<br />
admin = admin.replace("\n","")<br />
admin = "/" + admin<br />
host = site + admin<br />
print ("\t [#] Checking " + host + "...")<br />
connection = httplib.HTTPConnection(site)<br />
connection.request("GET",admin)<br />
response = connection.getresponse()<br />
var2 = var2 + 1<br />
if response.status == 200:<br />
var1 = var1 + 1<br />
print "%s %s" % ( "\n\n>>>" + host, "Admin page found!")<br />
raw_input("Press enter to continue scanning.\n")<br />
elif response.status == 404:<br />
var2 = var2<br />
elif response.status == 302:<br />
print "%s %s" % ("\n>>>" + host, "Possible admin page (302 - Redirect)")<br />
else:<br />
print "%s %s %s" % (host, " Interesting response:", response.status)<br />
connection.close()<br />
print("\n\nCompleted \n")<br />
print var1, " Admin pages found"<br />
print var2, " total pages scanned"<br />
raw_input("The Game Over; Press Enter to Exit")<br />
<br />
if code==3:<br />
print("\t [+] Scanning " + site + "...\n\n")<br />
for admin in cfm:<br />
admin = admin.replace("\n","")<br />
admin = "/" + admin<br />
host = site + admin<br />
print ("\t [#] Checking " + host + "...")<br />
connection = httplib.HTTPConnection(site)<br />
connection.request("GET",admin)<br />
response = connection.getresponse()<br />
var2 = var2 + 1<br />
if response.status == 200:<br />
var1 = var1 + 1<br />
print "%s %s" % ( "\n\n>>>" + host, "Admin page found!")<br />
raw_input("Press enter to continue scanning.\n")<br />
elif response.status == 404:<br />
var2 = var2<br />
elif response.status == 302:<br />
print "%s %s" % ("\n>>>" + host, "Possible admin page (302 - Redirect)")<br />
else:<br />
print "%s %s %s" % (host, " Interesting response:", response.status)<br />
connection.close()<br />
print("\n\nCompleted \n")<br />
print var1, " Admin pages found"<br />
print var2, " total pages scanned"<br />
raw_input("The Game Over; Press Enter to Exit")<br />
<br />
if code==4:<br />
print("\t [+] Scanning " + site + "...\n\n")<br />
for admin in js:<br />
admin = admin.replace("\n","")<br />
admin = "/" + admin<br />
host = site + admin<br />
print ("\t [#] Checking " + host + "...")<br />
connection = httplib.HTTPConnection(site)<br />
connection.request("GET",admin)<br />
response = connection.getresponse()<br />
var2 = var2 + 1<br />
if response.status == 200:<br />
var1 = var1 + 1<br />
print "%s %s" % ( "\n\n>>>" + host, "Admin page found!")<br />
raw_input("Press enter to continue scanning.\n")<br />
elif response.status == 404:<br />
var2 = var2<br />
elif response.status == 302:<br />
print "%s %s" % ("\n>>>" + host, "Possible admin page (302 - Redirect)")<br />
else:<br />
print "%s %s %s" % (host, " Interesting response:", response.status)<br />
connection.close()<br />
print("\n\nCompleted \n")<br />
print var1, " Admin pages found"<br />
print var2, " total pages scanned"<br />
raw_input("The Game Over; Press Enter to Exit")<br />
<br />
if code==5:<br />
print("\t [+] Scanning " + site + "...\n\n")<br />
for admin in cgi:<br />
admin = admin.replace("\n","")<br />
admin = "/" + admin<br />
host = site + admin<br />
print ("\t [#] Checking " + host + "...")<br />
connection = httplib.HTTPConnection(site)<br />
connection.request("GET",admin)<br />
response = connection.getresponse()<br />
var2 = var2 + 1<br />
if response.status == 200:<br />
var1 = var1 + 1<br />
print "%s %s" % ( "\n\n>>>" + host, "Admin page found!")<br />
raw_input("Press enter to continue scanning.\n")<br />
elif response.status == 404:<br />
var2 = var2<br />
elif response.status == 302:<br />
print "%s %s" % ("\n>>>" + host, "Possible admin page (302 - Redirect)")<br />
else:<br />
print "%s %s %s" % (host, " Interesting response:", response.status)<br />
connection.close()<br />
print("\n\nCompleted \n")<br />
print var1, " Admin pages found"<br />
print var2, " total pages scanned"<br />
raw_input("The Game Over; Press Enter to Exit")<br />
<br />
if code==6:<br />
print("\t [+] Scanning " + site + "...\n\n")<br />
for admin in brf:<br />
admin = admin.replace("\n","")<br />
admin = "/" + admin<br />
host = site + admin<br />
print ("\t [#] Checking " + host + "...")<br />
connection = httplib.HTTPConnection(site)<br />
connection.request("GET",admin)<br />
response = connection.getresponse()<br />
var2 = var2 + 1<br />
if response.status == 200:<br />
var1 = var1 + 1<br />
print "%s %s" % ( "\n\n>>>" + host, "Admin page found!")<br />
raw_input("Press enter to continue scanning.\n")<br />
elif response.status == 404:<br />
var2 = var2<br />
elif response.status == 302:<br />
print "%s %s" % ("\n>>>" + host, "Possible admin page (302 - Redirect)")<br />
else:<br />
print "%s %s %s" % (host, " Interesting response:", response.status)<br />
connection.close()<br />
print("\n\nCompleted \n")<br />
print var1, " Admin pages found"<br />
print var2, " total pages scanned"<br />
raw_input("The Game Over; Press Enter to Exit")<br />
except (httplib.HTTPResponse, socket.error):<br />
print "\n\t[!] Session Cancelled; Error occured. Check internet settings"<br />
except (KeyboardInterrupt, SystemExit):<br />
print "\n\t[!] Session cancelled"<br />
<br />
Paste link - <a href="http://paste.ubuntu.com/995637/" target="_blank">Click</a></div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-3859368894905740252012-05-19T03:41:00.000-07:002012-05-19T03:41:04.872-07:00Fast Wepage Saver In Python<div dir="ltr" style="text-align: left;" trbidi="on">#it will create source.txt in the same directory<br />
<br />
import urllib<br />
import httplib<br />
import socket<br />
<br />
print "\n\nFast Webpage Saver"<br />
print "input URL and run it. It will Save Webpage Within Seconds"<br />
<br />
print "\n\n\t|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||"<br />
print "\t||||| |||||"<br />
print "\t||||| |||||"<br />
print "\t|||||Coded By Ajith KP |||||"<br />
print "\t||||| |||||"<br />
print "\t||||| |||||"<br />
print "\t|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||"<br />
<br />
try:<br />
url = raw_input("URL:")<br />
txt = open('savedpage.html','w')<br />
cobra = urllib.urlopen('http://'+url)<br />
for source in cobra.readlines():<br />
print source.rstrip()<br />
txt.write(source.rstrip())<br />
txt.close()<br />
cobra.close()<br />
raw_input('Complete: Open savedpage.html')<br />
except (httplib.HTTPResponse, socket.error):<br />
print "\n\t[!] Session Cancelled; Error occured. Check internet settings"<br />
except (KeyboardInterrupt, SystemExit):<br />
print "\t[x] Session cancelled"<br />
<br />
Paste link - <a href="http://paste.ubuntu.com/995631/" target="_blank">Click Here</a></div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-9061546041583647892012-05-19T01:40:00.000-07:002012-05-19T01:40:34.496-07:00FBI 'looking at' law making Web sites wiretap-ready, director says<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://asset0.cbsistatic.com/cnwk.1d/i/tim/2012/05/18/mueller2_550x349_270x171.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="405" src="http://asset0.cbsistatic.com/cnwk.1d/i/tim/2012/05/18/mueller2_550x349_270x171.jpg" width="640" /></a></div>Director Robert Mueller says FBI needs to be able to "capture communications" of people under surveillance, but declines to elaborate on renewed lobbying effort reported by CNET two weeks ago.<br />
<br />
FBI Director Robert Mueller confirmed that the bureau has renewed its push for a new Internet wiretapping law, which CNET <a href="http://news.cnet.com/8301-1009_3-57428067-83/fbi-we-need-wiretap-ready-web-sites-now/">reported two weeks ago</a>. <br />
In an appearance this week on Capitol Hill, Mueller downplayed privacy concerns, saying the FBI's wiretap proposals -- social-networking Web sites and providers of VoIP, instant messaging, and Web e-mail are the primary targets -- would still require a court to be involved. <br />
We want to "be able to obtain those communications," Mueller said on Wednesday. "What we're looking at is some form of legislation that will assure that when we get the appropriate court order that those individuals -- individual companies are served with that order do have the capability and the capacity to respond to that order." <br />
<div id="survChart"> <h2>'Going Dark' timeline</h2><b>June 2008:</b> FBI Director Robert Mueller and his aides brief Sens. Barbara Mikulski, Richard Shelby, and Ted Stevens on "Going Dark." <br />
<b>June 2008:</b> FBI Assistant Director Kerry Haynes holds "Going Dark" briefing for Senate appropriations subcommittee and offers a "classified version of this briefing" at Quantico. <br />
<b>September 2008:</b> FBI completes a "high-level explanation" of CALEA amendment package. <br />
<b>May 2009:</b> FBI Assistant Director Rich Haley briefs Senate Intelligence committee and Mikulsi staffers on how bureau is "dealing with the 'Going Dark' issue.'" Mikulski plans to bring up "Going Dark" at a closed-door hearing the following week. <br />
<b>November 2008:</b> FBI Assistant Director Marcus Thomas, who oversees the Quantico-based Operational Technology Division, prepares briefing for President-Elect Obama's transition team. <br />
<b>December 2008:</b> FBI intelligence analyst in Communications Analysis Unit begins analysis of VoIP surveillance. <br />
<b>February 2009:</b> FBI memo to all field offices asks for anecdotal information about cases where "investigations have been negatively impacted" by lack of data retention or Internet interception. <br />
<b>March 2009:</b> Mueller's advisory board meets for a full-day briefing on Going Dark. <br />
<b>April 2009:</b> FBI distributes presentation for White House meeting on Going Dark. <br />
<b>April 2009:</b> FBI warns that the Going Dark project is "yellow," meaning limited progress, because of "new administration personnel not being in place for briefings." <br />
<b>April 2009:</b> FBI general counsel's office reports that the bureau's Data Interception Technology Unit has "compiled a list of FISA dockets... that the FBI has been unable to fully implement." That's a reference to telecom companies that are already covered by the FCC's expansion of CALEA. <br />
<b>May 2009:</b> FBI e-mail boasts that the bureau's plan has "gotten attention" from industry, but "we need to strengthen the business case on this." <br />
<b>July 2010:</b> FBI e-mail says the "Going Dark Working Group (GDWG) continues to ask for examples from Cvber investigations where investigators have had problems" because of new technologies. <br />
<b>September 2010:</b> FBI staff operations specialist in its Counterterrorism Division sends e-mail on difficulties in "obtaining information from Internet Service Providers and social-networking sites." <br />
</div>The FBI believes that the historic shift in communication from telephones to the Internet has made it far more difficult for agents to wiretap Americans suspected of illegal activities, which it refers to as the "Going Dark" problem. Its solution: a proposed law that would require Internet companies including Apple, Microsoft, Facebook, Yahoo, and Google, to build in back doors for government surveillance. <br />
Mueller's remarks came in response to prodding from two senators, Chuck Grassley (R-Iowa) and Patrick Leahy (D-Vt.), who wanted him to elaborate on the new lobbying push reported by CNET. <br />
"We have been waiting patiently for the administration to put forth a proposal with necessary fixes to ensure the 'Going Dark' problem is addressed," Grassley said. "I want the director to give us the status on this proposal (and) when the administration plans to send something up to the Hill." <br />
"Should I be expecting a specific legislative proposal from the FBI or the administration in the near future?" Leahy asked. He said he has not yet seen the draft bill, saying the "administration is not sending it up here." <br />
Mueller didn't answer their question directly about timing, instead saying that the goal of the legislation is "to capture communications of a particular individual" under surveillance. An FBI spokesman said, in response to questions this afternoon, that "we cannot comment on pending legislation." <br />
The FBI's proposal would amend a 1994 law, called the <a href="http://epic.org/privacy/wiretap/calea/calea_law.html">Communications Assistance for Law Enforcement Act</a>, or CALEA, that currently applies only to telecommunications providers, not Web companies. From the FBI's perspective, expanding CALEA to cover VoIP, Web e-mail, and social networks isn't expanding wiretapping law: If a court order is required today, one will be required tomorrow as well. Rather, it's making sure that a wiretap is guaranteed to produce results. <br />
Mueller is not asking companies to support the bureau's CALEA expansion, but instead is asking them not to oppose it. The bureau is also "asking what can go in it to minimize impacts," one participant in the closed-door discussions says. That included a scheduled trip this month to the West Coast -- which was subsequently postponed -- to meet with Internet companies' CEOs and top lawyers.<br />
In February 2011, CNET <a href="http://news.cnet.com/8301-31921_3-20032518-281.html">was the first to report</a> that then-FBI general counsel Valerie Caproni was planning to warn Congress of the "Going Dark" problem. Caproni singled out "Web-based e-mail, social-networking sites, and peer-to-peer communications" as problems that have left the FBI "increasingly unable" to conduct the same kind of wiretapping it could in the past. <br />
A further expansion of CALEA is unlikely to be applauded by tech companies, their customers, or privacy groups. Apple (which distributes iChat and FaceTime) is currently lobbying on the topic, according to disclosure documents filed with Congress last month. Microsoft (which owns Skype and Hotmail) says its lobbyists are following the topic because it's "an area of ongoing interest to us." <br />
Representatives of the FBI's Electronic Surveillance Technology Section in Chantilly, Va., began quietly lobbying the FCC nearly a decade ago to force broadband providers to provide more-efficient, standardized surveillance facilities, which CNET <a href="http://news.cnet.com/FBI-targets-Net-phoning/2100-1028_3-5056424.html">reported at the time</a>. The FCC <a href="http://news.cnet.com/Feds-back-wiretap-rules-for-Internet/2100-7352_3-5296417.html">approved that requirement</a> a year later, sweeping in Internet phone companies that tie into the existing telecommunications system. It was <a href="http://news.cnet.com/Appeals-court-upholds-Net-wiretapping-rules/2100-1028_3-6082085.html">upheld in 2006</a> by a federal appeals court. <br />
But the FCC never granted the FBI's request to rewrite CALEA to cover instant messaging and VoIP programs that are not "managed" -- meaning peer-to-peer programs like Apple's FaceTime, iChat/AIM, Gmail's video chat, and <a href="http://www.cnet.com/xbox-360/">Xbox</a> Live's in-game chat that use the Internet, not the public telephone network. <br />
<br />
</div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-54049969521406563532012-05-19T00:53:00.000-07:002012-05-19T00:53:12.378-07:00Seeing Ads On Wikipedia? Then You're Infected<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://upload.wikimedia.org/wikipedia/commons/thumb/8/80/Wikipedia-logo-v2.svg/250px-Wikipedia-logo-v2.svg.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://upload.wikimedia.org/wikipedia/commons/thumb/8/80/Wikipedia-logo-v2.svg/250px-Wikipedia-logo-v2.svg.png" /></a></div>Click fraudsters are milking you for cash<br />
<br />
Surfers who see ads when they visit Wikipedia are likely infected with malware, the online encyclopedia warns.<br />
Wikipedia relies on donations to fund its work, resisting the temptation to put ads on its pages. So internet users who see commercial ads when they visit the encyclopedia are been served content via cybercrime affiliates, a blog post by Wikipedia <a href="http://blog.wikimedia.org/2012/05/14/ads-on-wikipedia-your-computer-infected-malware" target="_blank">explains</a>.<br />
<div id="article-mpu-container"> <div class="ad-now" id="ad-mpu1-spot" style="height: auto; width: auto;"> </div><blockquote>We never run ads on Wikipedia. Wikipedia is funded by more than a million donors, who give an average donation of less than 30 dollars. We run fundraising appeals, usually at the end of the year. If you're seeing advertisements for a for-profit industry (see screenshot for an example) or anything but our fundraiser, then your web browser has likely been infected with malware.<br />
</blockquote></div>Wikipedia doesn't warn over any specific malware but rather about the symptoms of click fraud, one of they more common ways that virus writers turn an illicit profit. The approach was used as the business model behind the infamous Flashback Trojan, which notoriously created a huge botnet on Mac machines until Apple belatedly patched the Java vulnerability that the malware had exploited. Cupertino released a <a href="http://www.theregister.co.uk/2012/05/15/mac_leopard_security_update/">clean-up tool</a> earlier this week.<br />
An <a href="http://www.symantec.com/connect/blogs/osxflashback-how-turn-your-botnet" target="_blank">updated analysis</a> by Symantec, published on Wednesday, reveals that over a three-week period in April, the botnet displayed over 10 million ads on compromised computers. "Approximately 400,000 of those ads were clicked on, which would have netted the attackers $14,000 if they were able to collect it," an anonymous Symantec researcher explains. "Many PPC providers employ anti-fraud measures and affiliate-verification processes before paying. Fortunately, the attackers in this instance appear to have been unable to complete the necessary steps to be paid.<br />
"It is estimated the actual ad-clicking component of Flashback was only installed on about 10,000 of the more than 600,000 infected machines. In other words, utilising less than 2 per cent of the entire botnet the attackers were able to generate $14,000 in three weeks, meaning that if the attackers were able to use the entire botnet, they could potentially have earned millions of dollars a year," Symantec adds.<br />
</div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-78031582399526682432012-05-18T22:09:00.000-07:002012-05-18T22:09:00.256-07:00IDM Autocracker script<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://3.bp.blogspot.com/-6HCkv32_lH8/T7Z4ReBhUhI/AAAAAAAAAbc/mMuyFrZ6j7Q/s320/IDM.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="292" src="http://3.bp.blogspot.com/-6HCkv32_lH8/T7Z4ReBhUhI/AAAAAAAAAbc/mMuyFrZ6j7Q/s640/IDM.PNG" width="640" /></a></div>-> Code by Subir aKa Whiskey<br />
<br />
-> This a automated python script from which you can crack IDM and make it to full version<br />
<br />
-><a href="http://www.mediafire.com/?p33ld90qykhcnme" target="_blank">Click Here To Download</a><br />
<br />
</div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-74337781091747360932012-05-18T07:55:00.000-07:002012-05-18T07:55:48.192-07:00Android hackers hone skills in Russia<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://cdn.mactrast.com/wp-content/uploads/2012/05/Android-Malware-1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="412" src="http://cdn.mactrast.com/wp-content/uploads/2012/05/Android-Malware-1.png" width="640" /></a></div><h2>Sophos says they're starting in Russia, but will expand with success<br />
</h2><div id="first_paragraph"><span class="source">CSO -</span> The malware business growing around Google Android -- now the leading smartphone operating system -- is still in its infancy. Today, many of the apps built to steal money from Android users originate from Russia and China, so criminal gangs there have become cyber-trailblazers.</div>Sophos and Symantec on Wednesday released their latest Android malware discoveries written in Russian. While the language narrows the number of potential victims, the social-engineering tactics used to get Android users to install the malware is universal. The gang tracked by Sophos is using fake antivirus scanners, while Symantec is tracking cybercriminals using mobile websites to offer bogus versions of popular games.<br />
<strong>[See also: <a href="http://www.csoonline.com/article/706335/companies-slow-to-react-to-mobile-security-threat" target="new">Companies slow to react to mobile security threat</a>]</strong><br />
<strong></strong>Sophos says the criminals are like other entrepreneurs launching startups. They're starting in Russia, but have far greater ambitions.<br />
"I don't think we can say that they're necessarily using it as a testing ground -- think of it more as a local business that as it grows may gain multinational ambitions," Graham Cluley, senior technology consultant at Sophos, said in an email interview on Wednesday.<br />
While criminals today are writing consumer-focused apps, it's only a matter of time before the hackers go after corporate data, particularly if the number of people accessing employers' networks with personal devices continue to grow, experts say. Android is the leading <a href="http://www.computerworld.com/s/topic/75/Smartphones" title="Computerworld coverage of smartphones">smartphone</a> OS.<br />
In the first quarter, <a href="http://www.computerworld.com/s/article/9227208/Android_Samsung_top_smartphone_sales_beat_Apple_s_iPhone" target="_blank">56% of the smartphones sold ran Android</a>, compared with 23% with <a href="http://www.computerworld.com/s/article/9137163/Apple_Update" title="Computerworld coverage of Apple Computer Inc.">Apple</a> iOS, according to the latest figures from Gartner.<br />
The cyber scam tracked by Sophos was reported this week by GFI Lab, which discovered links to the bogus antivirus software on <a href="http://www.computerworld.com/s/article/9157658/Twitter_update_News_blogs_opinions_and_more_about_the_microblogging_service" title="Computerworld coverage of Twitter">Twitter</a>. <a href="http://www.computerworld.com/s/article/9227243/Fake%20anti-virus%20disguises%20used%20by%20Android%20malware" target="_blank">Sophos dug deeper</a> and found that the .ru domains pointed to the same Internet protocol address hosted in Ukraine.<br />
When visited, the Web pages serve an Android .apk file that offers an AV scan. If activated, the scan installs an app that uses an icon to trick the victim in to believing it is from Russian security vendor Kaspersky Lab.<br />
Instead of <a href="http://www.computerworld.com/s/topic/85/Malware+and+Vulnerabilities" title="Computerworld coverage of viruses and security holes">virus</a> protection, the app sends expensive text messages to premium services that charge the Android user through their wireless providers. The malicious code also has the ability to download and install code from the internet.<br />
<a href="http://www.symantec.com/connect/blogs/thieves-temple-androidopfake-makes-another-run" target="_blank">Symantec's discovery</a> involves the latest version of the Android.Opfake malware the vendor has been following for a while. In the past, the malware masqueraded as an installer for the Opera Web <a href="http://www.computerworld.com/s/topic/211/Browsers" title="Computerworld coverage of browsers">browser</a> or a pornographic movie, and charged the user when either was downloaded.<br />
The latest version is disguised as popular games made available through dummy sites that link back to a central back-end site that acts as a file generator or repository. Bogus versions of Fruit Ninja, SIMS 3, TempleRun and Angry Birds are used to disguise the malware.<br />
Cluley expects these criminal enterprises to expand, once the founders are confident they can scam people in other countries. "What makes money in Russia today, could be used in attacks against American users tomorrow," he said.<br />
<h2><br />
</h2></div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-66293974465291294522012-05-18T03:20:00.000-07:002012-05-18T03:20:04.418-07:00Scan a Windows PC for Viruses from a Ubuntu Live CD<div dir="ltr" style="text-align: left;" trbidi="on">Getting a virus is bad. Getting a virus that causes your computer to crash when you reboot is even worse. We’ll show you how to clean viruses from your computer even if you can’t boot into Windows by using a virus scanner in a Ubuntu Live CD.<br />
There are a number of virus scanners available for Ubuntu, but we’ve found that avast! is the best choice, with great detection rates and usability.<br />
Unfortunately, avast! does not have a proper 64-bit version, and forcing the install does not work properly. <em>If you want to use avast! to scan for viruses, then ensure that you have a 32-bit Ubuntu Live CD</em>.<br />
If you currently have a 64-bit Ubuntu Live CD on a bootable flash drive, it does not take long to wipe your flash drive and go through <a href="http://www.howtogeek.com/howto/13379/create-a-bootable-ubuntu-9.10-usb-flash-drive/">our guide</a> again and select normal (32-bit) Ubuntu 9.10 instead of the x64 edition. For the purposes of fixing your Windows installation, the 64-bit Live CD will not provide any benefits.<br />
Once Ubuntu 9.10 boots up, open up Firefox by clicking on its icon in the top panel.<br />
<img alt="sshot-1" border="0" height="102" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot110.png" style="border-width: 0px; float: none; margin-left: auto; margin-right: auto;" width="309" /><br />
Navigate to <a href="http://www.avast.com/linux-home-edition" title="http://www.avast.com/linux-home-edition">http://www.avast.com/linux-home-edition</a>.<br />
<img alt="" border="" class="lazyLoad" height="440" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot26.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="640" /><br />
Click on the Download tab, and then click on the link to download the DEB package.<br />
<img alt="" border="" class="lazyLoad" height="428" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot31.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="640" /><br />
Save it to the default location.<br />
<img alt="" border="" class="lazyLoad" height="228" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot41.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="488" /><br />
While avast! is downloading, click on the link to the registration form on the download page. Fill in the registration form if you do not already have a trial license for avast!.<br />
<img alt="" border="" class="lazyLoad" height="500" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot51.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="640" /><br />
By the time you’ve filled out the registration form, avast! will hopefully be finished downloading.<br />
Open a terminal window by clicking on Applications in the top-left corner of the screen, then expanding the Accessories menu and clicking on Terminal.<br />
<img alt="" border="" class="lazyLoad" height="358" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot61.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="444" /><br />
In the terminal window, type in the following commands, pressing enter after each line.<br />
<blockquote>cd Downloads<br />
sudo dpkg –i avast*</blockquote><img alt="" border="" class="lazyLoad" height="268" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot72.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="614" /><br />
This will install avast! on the live Ubuntu environment.<br />
To ensure that you can use the latest virus database, while still in the terminal window, type in the following command:<br />
<blockquote>sudo sysctl –w kernel.shmmax=128000000</blockquote><img alt="" border="" class="lazyLoad" height="132" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot7b.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="510" /><br />
Now we’re ready to open avast!. Click on Applications on the top-left corner of the screen, expand the Accessories folder, and click on the new avast! Antivirus item.<br />
<img alt="" border="" class="lazyLoad" height="99" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot81.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="429" /><br />
You will first be greeted with a window that asks for your license key. Hopefully you’ve received it in your email by now; open the email that avast! sends you, copy the license key, and paste it in the Registration window.<br />
<img alt="" border="" class="lazyLoad" height="245" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot91.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="395" /><br />
avast! Antivirus will open. You’ll notice that the virus database is outdated.<br />
<img alt="" border="" class="lazyLoad" height="627" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot101.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="473" /><br />
Click on the Update database button and avast! will start downloading the latest virus database.<br />
<img alt="" border="" class="lazyLoad" height="627" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot111.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="473" /><br />
To scan your Windows hard drive, you will need to “mount” it. While the virus database is downloading, click on Places on the top-left of your screen, and click on your Windows hard drive, if you can tell which one it is by its size.<br />
<img alt="" border="" class="lazyLoad" height="346" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot131.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="225" /><br />
If you can’t tell which is the correct hard drive, then click on Computer and check out each hard drive until you find the right one. When you find it, make a note of the drive’s label, which appears in the menu bar of the file browser.<br />
<img alt="" border="" class="lazyLoad" height="456" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshotxx.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="522" /><br />
Also note that your hard drive will now appear on your desktop.<br />
<img alt="" border="" class="lazyLoad" height="317" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot142.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="185" /><br />
By now, your virus database should be updated. At the time this article was written, the most recent version was 100404-0.<br />
<img alt="" border="" class="lazyLoad" height="87" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot121.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="473" /><br />
In the main avast! window, click on the radio button next to Selected folders and then click on the “+” button to the right of the list box. It will open up a dialog box to browse to a location.<br />
<img alt="" border="" class="lazyLoad" height="660" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot151.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="481" /><br />
To find your Windows hard drive, click on the “>” next to the computer icon. In the expanded list, find the folder labelled “media” and click on the “>” next to it to expand it. In this list, you should be able to find the label that corresponds to your Windows hard drive.<br />
<img alt="" border="" class="lazyLoad" height="436" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot161.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="354" /><br />
If you want to scan a certain folder, then you can go further into this hierarchy and select that folder. However, we will scan the entire hard drive, so we’ll just press OK.<br />
<img alt="" border="" class="lazyLoad" height="627" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot171.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="481" /><br />
Click on Start scan and avast! will start scanning your hard drive.<br />
<img alt="" border="" class="lazyLoad" height="627" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot191.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="481" /><br />
If a virus is found, you’ll be prompted to select an action. If you know that the file is a virus, then you can Delete it, but there is the possibility of false positives, so you can also choose Move to chest to quarantine it.<br />
<img alt="" border="" class="lazyLoad" height="411" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot181.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="640" /><br />
When avast! is done scanning, it will summarize what it found on your hard drive. You can take different actions on those files at this time by right-clicking on them and selecting the appropriate action. When you’re done, click Close.<br />
<img alt="" border="" class="lazyLoad" height="384" src="http://www.howtogeek.com/wp-content/uploads/2010/04/sshot201.png" style="border-width: 0px; display: inline; float: none; margin-left: auto; margin-right: auto;" width="640" /><br />
Your Windows PC is now free of viruses, in the eyes of avast!. Reboot your computer and with any luck it will now boot up!<br />
<br />
Credits - how to geek</div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-23664396015589085492012-05-17T09:31:00.000-07:002012-05-17T09:31:07.913-07:00iPhone 4S Jailbreak: Why Not to Jailbreak<div dir="ltr" style="text-align: left;" trbidi="on">So, you may have heard. The untethered <a href="http://www.gottabemobile.com/tag/jailbreak">jailbreak</a> for the <a href="http://www.gottabemobile.com/tag/iphone-4s">iPhone 4S</a> (and the <a href="http://www.gottabemobile.com/tag/ipad-2">iPad 2</a>), called Absinthe, has <a href="http://www.gottabemobile.com/2012/01/20/iphone-4s-jailbreak-finally-released">finally arrived</a> courtesy of a “dream team” of hackers/developers. And if you own an iPhone 4S, you might be thinking about taking the plunge. We don’t blame you, but there are definitely some reasons why you might want to think about holding off from doing so.<br />
<strong>Read: <a href="http://www.gottabemobile.com/2012/01/23/ultimate-iphone-4s-jailbreak-guide/">Ultimate iPhone 4S Jailbreak Guide</a></strong><br />
If you’re not familiar with the term jailbreak, we’ll break it down for you real quick. We know for a lot of you, the iPhone 4S represents your first iPhone, so there is no reason to be ashamed.<br />
Jailbreaking means exactly what you’re probably thinking it means.<br />
<div style="text-align: center;"><img alt="iPhone 4S" class="aligncenter wp-image-91735" height="224" src="http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/2012/01/iPhone-4S-Jailbreak-App-620x2801.jpg" title="iPhone 4S" width="496" /></div>It unlocks parts of your phone that Apple has locked down with its software which in turn allows you to customize your phone and install applications that you can’t find through the official iOS App Store.<br />
For a lot of you, this will be a dream come true. Others may end up wishing that they didn’t jailbreak.<br />
We’re here to help make that decision as easy as possible and so we wanted to point out a couple of pitfalls that come with jailbreaking your iPhone 4S.<br />
Keep in mind (trolls, I am looking at you), not all of these will happen in every use case. But just because something didn’t happen to you, doesn’t mean it won’t happen to someone else.<br />
So, with that, let’s take a look at some reasons why you may not want to jailbreak your iPhone 4S.<br />
<h2><img alt="Cydia" class="alignright wp-image-91733" height="240" src="http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/2012/01/cydia-300x300.jpg" title="iPhone 4S Jailbreak: Why Not to Jailbreak" width="240" />Your iPhone 4S May Lose Stability</h2>While the developers of Absinthe have gone to great lengths to provide as seamless of an experience as possible, jailbreaking is still a hack and there are unexpected things that could happen because of that. It’s possible, after jailbreaking your iPhone and installing applications via Cydia – the unofficial App Store, your iPhone 4S may become buggy and slow.<br />
It may even crash.<br />
Now, for power users and those willing to troubleshoot, this probably won’t be too much of an issue. However, for the average person, it can and probably will become a headache.<br />
For many of you, having a stable iPhone 4S will be more of a priority then having a customized one.<br />
<h2>Updating Is a Pain</h2>While the stability issue might not be one that affects everyone that jailbreaks, the pain in the rear end known as updating your jailbroken phone does. If you’re the kind of person that wants the latest and greatest software right off the bat, jailbreaking might not be fore you.<br />
When Apple releases an update, you will have to wait for the devs to either release a patch or a new jailbreak for your iPhone. When it comes to smaller iOS updates, it’s usually a fast process.<br />
<div style="text-align: center;"><img alt="iPhone 4S" class="aligncenter wp-image-91731" height="446" src="http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/2012/01/iPhone-4S-Restore-437x446-custom.jpg" title="iPhone 4S Jailbreak: Why Not to Jailbreak" width="437" /></div>However, when it comes to larger updates like <a href="http://www.gottabemobile.com/2011/12/05/ios-5-1-release-date-what-to-expect-from-ios-5-1/" title="iOS 5.1 Release Date: What to Expect From iOS 5.1">iOS 5.1</a>, it takes awhile. So, if you’re the impatient type, keep this in mind.<br />
And once you get the update, your headache might remain as you’ll need to re-install the jailbreak and all of the apps that you downloaded from Cydia. There are definitely tools out there that can help you restore, but it’s still going to take some time.<br />
In other words, it’s not the seamless process you might expect from an official update.<br />
<h2>Factory Resets Aren’t Fun</h2><strong>Loss of Genius Bar Support</strong><br />
If you run into a problem with your iPhone 4S, you might decide to take it to the Genius Bar in an Apple retail location. Well, if you’ve jailbroken your phone, chances are, the Genius will refuse to help you.<br />
Suggestion: Don’t mention that your phone is jailbroken.<br />
You can also un-jailbreak your phone but if you find yourself bringing it in on a semi-regular basis, you’re going to start getting annoyed with doing that over and over again.<br />
A factory reset will work as well but that will wipe everything from your phone.<br />
Fun.<br />
<strong>Loss of Warranty</strong><br />
Back in 2012, jailbreaking your iPhone became a legal thing to do. Seriously, this was illegal at one point. But just because it’s not legal doesn’t change the fact that it will void your iPhone 4S warranty with Apple.<br />
So if your phone starts acting up, even it has nothing to do with the jailbreak, you more than likely won’t get the support that you need to get the issue fixed.<br />
That means that you’ll have to factory reset.<br />
Again, lots of fun.<br />
So yes, it’s possible to avoid both of these, but for many of you it won’t be worth the hassle.<br />
–<br />
Now that you know some of the risks involved with jailbreaking, you can make an informed decision. And if interested in going through with it and freeing your iPhone 4S from Apple’s chains, you’ll want to read our <strong>How to Jailbreak the iPhone 4S</strong> to find out exactly how to do it.</div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-52527412023084290682012-05-17T09:29:00.002-07:002012-05-17T09:29:49.800-07:0018 Reasons to Jailbreak the iPhone 4S<div dir="ltr" style="text-align: left;" trbidi="on">The iPhone 4S has been available for a month, and we are still waiting for a proper jailbreak. You might want to know why so many of us are excited for an iPhone 4S jailbreak, so I have rounded up 18 reasons to jailbreak the iPhone 4S.<br />
I’ve already shared <a href="http://www.gottabemobile.com/2011/10/20/5-reasons-i-want-an-iphone-4s-jailbreak-now/">5 reasons I am excited</a>, and you’ll notice a little overlap. This is a companion to our <a href="http://www.gottabemobile.com/2011/11/14/5-reasons-you-shouldnt-jailbreak-your-iphone-4s/">5 reasons not to jailbreak the iPhone 4S</a>. You’ll be quick to notice that there are more reasons for most users to jailbreak their iPhone than there are reasons not to.<br />
<strong>Update: <a href="http://www.gottabemobile.com/2012/01/20/iphone-4s-jailbreak-how-to-jailbreak-the-iphone-4s/">How to Jailbreak the iPhone 4S</a></strong><br />
The iPhone 4S jailbreak <del>is still a ways off</del>, but the iPhone jailbreaking community has successfully <strong><a href="http://www.gottabemobile.com/2011/11/10/iphone-4s-jailbreak-status-progress-made-avoid-ios-5-0-1/">jailbroken the iPhone 4S</a></strong>. That’s the good news. The bad news is that you will need to wait until it is ready for the public release, which could be as early as December, but may not come along until 2012.<br />
When the iPhone 4S jailbreak is available to the public, it won’t cost you anything, and there are a number of reasons I think you’ll want to join me in jailbreaking your new iPhone.<br />
<h2>18 Reasons to Jailbreak the iPhone 4S</h2><h3>Cydia Apps</h3><a href="http://www.gottabemobile.com/2011/11/18/reasons-iphone-4s-jailbreak/cydia/" rel="attachment wp-att-82594"><img alt="Cydia" class="aligncenter size-full wp-image-82594" height="68" src="http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/Cydia.jpg" title="Cydia" width="292" /></a><br />
Cydia is an alternate app store that makes it easy to find and install apps that Apple wouldn’t approve. Many of the reasons to jailbreak will require a trip to this new app store, only available on jailbroken iPhones. This is the place to go for all the cool apps and features you want on your iPhone, but that Apple won’t deliver until iOS 6.<br />
<h3>BrowserChanger</h3><a href="http://www.gottabemobile.com/2011/11/18/reasons-iphone-4s-jailbreak/browserchanger-2/" rel="attachment wp-att-82598"><img alt="BrowserChanger" class="aligncenter size-full wp-image-82598" height="480" src="http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/BrowserChanger.jpg" title="BrowserChanger" width="320" /></a><br />
If you want to use an alternate iPhone browsers like Opera or Dolphin, you don’t need to jailbreak, but then all of your apps will use the open in safari behavior and skip right past your favorite browser. Not anymore. Install BrowserChanger and you can choose which browser you want to open when you grab a link from Facebook or Twitter.<br />
<h3>Real Google Voice</h3><div class="wp-caption aligncenter" id="attachment_77278" style="width: 595px;"><a href="http://www.gottabemobile.com/2011/10/20/5-reasons-i-want-an-iphone-4s-jailbreak-now/google-voice-extension-iphone-4s-jailbreak/" rel="attachment wp-att-77278"><img alt="Google Voice Extension iPhone 4S Jailbreak" class="size-full wp-image-77278" height="295" src="http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/Google-Voice-Extension-iPHone-4S-Jailbreak.jpg" title="Google Voice Extension iPhone 4S Jailbreak" width="585" /></a><div class="wp-caption-text">Google Voice Extension - iPhone 4S Jailbreak</div></div>As I mentioned, this is one of my biggest reasons for wanting an iPhone 4S Jailbreak. The <a href="http://gvexts.appspot.com/phone/phone.html">PhoneGV Extension</a> and SMS GV Extension will allow your phone to handle all the nasty tapping and routing, that you must use the Google Voice app for, in the background. Once you install these apps, all the hard work is done behind the scenes, just use Messages and your Dialer like you normally would.<br />
<h3>3G Facetime</h3><div style="text-align: center;"> <a href="http://www.gottabemobile.com/2011/11/18/reasons-iphone-4s-jailbreak/facetime-over-3g/" rel="attachment wp-att-82599"><img alt="Facetime over 3G" class="aligncenter size-full wp-image-82599" height="378" src="http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/Facetime-over-3G.jpg" title="Facetime over 3G" width="672" /></a></div>Once you jailbreak your iPhone, you can trick your phone into thinking you are connected to WiFi so that you can make FaceTime calls over WiFi. I don’t make many FaceTime calls, but I am more likely to want to do a video call when I am far from my home WiFi network.<br />
<h3>SB Settings</h3><span class="embed-youtube" style="display: block; text-align: center;"></span><br />
SB Settings gives you fast access to your WiFi, Bluetooth and brightness settings. Of all the things Apple makes simple, it sucks at giving you fast access to these essential controls. SB Settings puts them right in your notification pull down so that you can quickly change brightness, turn on Bluetooth and more.<br />
<h3>Customized Looks</h3><span class="embed-youtube" style="display: block; text-align: center;"></span><br />
If you wan to change the whole look of your iPhone, to something like OS X Lion or your favorite color combination, you can do this when you Jailbreak your iPhone 4S. There are a number fo WinterBoard themes available to change how your iPhone looks. From minor tweaks to massive changes, you get to customize your iPhone 4S.<br />
<h3>MyWi – 3G Hotspot</h3><a href="http://www.gottabemobile.com/2011/11/18/reasons-iphone-4s-jailbreak/mywi-2/" rel="attachment wp-att-82591"><img alt="MyWi" class="aligncenter size-full wp-image-82591" height="338" src="http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/MyWi.jpg" title="MyWi" width="225" /></a><br />
If you want to use your iPhone 4S as a hotspot without signing up for a plan from your carrier, you can use MyWi. This could end up getting you in trouble with certain carriers, and if you use a lot of data you may be better off paying for a hotspot from your carrier. A cool tool, but definitely one to use at your own risk.<br />
<h3>Mario on Your iPhone</h3><span class="embed-youtube" style="display: block; text-align: center;"></span><br />
Another awesome addition when you jailbreak is the ability to load up your favorite emulators like nes4iPhone, snes4iPhone and others. These tools will let you play Roms from your favorite old-time game systems. ROMS are a grey area, so if you don’t own the actual game, you are probably breaking the law. Another fun hack, but one to do at your own risk. You can see the this in action, using the Wiimote as a controller.<br />
<h3>Five Icon Dock<span class="Apple-style-span" style="font-size: 13px; font-weight: normal;"> </span></h3><a href="http://www.gottabemobile.com/2011/11/18/reasons-iphone-4s-jailbreak/five-icon-dock/" rel="attachment wp-att-82590"><img alt="five icon dock" class="aligncenter size-full wp-image-82590" height="101" src="http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/five-icon-dock.jpg" title="five icon dock" width="336" /></a><br />
If you want to add another favorite program to your dock, Five Icon Dock will do that for you by packing in icons tighter. A small tweak, but we all have one more program we want on the home screen at all times. right?<br />
<h3>Five Icon Switcher<span class="Apple-style-span" style="font-size: 13px; font-weight: normal;"> </span></h3><a href="http://www.gottabemobile.com/2011/11/18/reasons-iphone-4s-jailbreak/five-icon-switcher/" rel="attachment wp-att-82586"><img alt="Five Icon Switcher" class="aligncenter size-full wp-image-82586" height="142" src="http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/Five-Icon-Switcher.jpg" title="Five Icon Switcher" width="317" /></a><br />
If you’re going to put 5 icons in your home dock, you’ll want the same five icon look in the multitasking switcher, which is exactly what this app does for you.<br />
<h3>Overboard</h3><span class="embed-youtube" style="display: block; text-align: center;"></span><br />
Even after you add an extra icon to your dock, you’ll want to have Overboard installed. You can pull up a a listing of all of your iPhone screens for easy jumping and navigation. This one is $2 in the Cydia app store and essential if you have page after page of apps. You can see how Overboard works in the video shown above.<br />
<h3>BiteSMS</h3><span class="embed-youtube" style="display: block; text-align: center;"></span><br />
Forget about going into the Message app to reply to texts and iMessages, Bite SMS allows you to reply directly from the notification. This is fully compatible with iOS 5 and works with iMessaging. Check out the BiteSMS features in the demo above.<br />
<h3>IntelliscreenX</h3><span class="embed-youtube" style="display: block; text-align: center;"></span><br />
If you want to do even more in the Notification Center, IntelliscreenX looks like the best solution. You can access more than just notifications with this jailbreak only app. Check out the video above for all the details.<br />
<h3>Add More Gestures</h3><span class="embed-youtube" style="display: block; text-align: center;"></span><br />
Activator will add more gestures to your iPhone 4S. You can swipe left ont he status bar to launch a specific app or double tap to start a new text message in Bite SMS. You’ll be amazed by how much time you save using this app. Ignore the horrible music, and look at Activator in action in the video shown above.<br />
<h3>Arrange Icons As You Want</h3><span class="embed-youtube" style="display: block; text-align: center;"></span><br />
Instead of filling up from the upper left to the lower right, Gridlock allows you to place your iPhone apps wherever you want them, leaving open places if you want to keep space around your favorite app for easy tapping. Check out Gridlock in action in the video above.<br />
<h3>Never Enter Your App Store Password Again</h3><span class="embed-youtube" style="display: block; text-align: center;"></span><br />
With PasswordPilot, you don’t need to enter your password every time you download an app or download updates. This isn’t good if you are sharing your iPhone, but if you keep a passcode on your iPhone and are sick of typing in your password with every purchase and download it is awesome.<br />
<h3>Add Pictures To Your Contacts</h3><span class="embed-youtube" style="display: block; text-align: center;"></span><br />
With Copic, you can add pictures to your iPhone contacts, phone call log and SMS message screens. A nice touch for browsing through your messages quickly. You can see a demo of Copic in the video above.<br />
<h3>No More Lockscreen</h3><span class="embed-youtube" style="display: block; text-align: center;"></span><br />
If you want to skip the slide to unlock feature, you can turn on this app and it will automatically unlock your phone to the home screen when you press the power button. Unfortunately, you still see the unlock screen for a second, but it beats sliding to unlock for some users.<br />
–<br />
When you can Jailbreak the iPhone 4S, you will be able to search for these apps and hacks in Cydia. If you have a jailbroken iPhone 4, you can get to using them right now.</div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0tag:blogger.com,1999:blog-8354165089554309826.post-38426860976857500002012-05-17T09:28:00.000-07:002012-05-17T09:28:19.028-07:00iPhone 4S Jailbreak Finally Released<div dir="ltr" style="text-align: left;" trbidi="on"><a href="http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/2012/01/Absinthe-iPhone-4S-Jailbreak.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img alt="Absinthe iPhone 4S Jailbreak" border="0" class="size-full wp-image-91639" height="380" src="http://gottabemobile.wpengine.netdna-cdn.com/wp-content/uploads/2012/01/Absinthe-iPhone-4S-Jailbreak.jpg" title="Absinthe iPhone 4S Jailbreak" width="508" /></a>Rejoice iPhone 4S and iPad 2 owners. Today you can finally jailbreak the iPhone 4S and iPad 2 thanks to the A5 Jailbreak Dream Team.<br />
The new <strong><a href="http://greenpois0n.com/?p=173">Absinthe Jailbreak tool</a></strong> allows you to perform a untethered jailbreak on the iPhone 4S and iPad 2. This covers all models of Apple’s latest phone and tablet, and works on the newest iOS 5.0.1 software release.<br />
<strong>READ: <a href="http://www.gottabemobile.com/2012/01/20/iphone-4s-jailbreak-how-to-jailbreak-the-iphone-4s/">How to Jailbreak the iPhone 4S and iPad 2</a>.</strong><br />
By joining forces, pod2G, The Chronic Dev Team and the iPhone Dev Team were able to get around a number of Apple walls and locks to free your iPhone 4S and iPad 2.<br />
The new tool is called Absinthe, and is only available for the Mac, but Windows and Linux versions are coming.<br />
<div class="wp-caption aligncenter" id="attachment_91639" style="width: 518px;"><div class="wp-caption-text">Jailbreak the iPhone 4S with Absinthe.</div></div>You can download the Absinthe iPhone 4S and iPad 2 jailbreak tool from greenpois0n.com, but be warned that you may have trouble getting to the page due to high demand. Keep trying and you will eventually get in.<br />
I am in the process of jailbreaking my iPhone 4S as I share this news, and will soon walk you through the iPhone 4S jailbreak process. This will take place on a Mac, but should be very similar on Windows.<br />
Before you jailbreak, be sure to read these <strong><a href="http://www.gottabemobile.com/2011/11/14/5-reasons-you-shouldnt-jailbreak-your-iphone-4s/" title="5 Reasons You Shouldn’t Jailbreak Your iPhone 4S">5 concerns</a></strong>, and know that we aren’t responsible if you break your iPhone or iPad.<br />
If you are OK with these cautions, go ahead and jailbreak your device. I look forward to hearing about your favorite jailbreak apps and jailbreak tweaks.<br />
If you wish to thank the dream team of iPhone hackers, you can donate to a joint fund that will be split between the members.</div>SecurityVoidhttp://www.blogger.com/profile/05628711947842649444noreply@blogger.com0