Give your Desktop a Mozaic Touch

Experience the Windows 8 Metro Stlye UI on your Computer

Sunday, May 29, 2011

Hackers attack on Norwegian military Computers

          The Norwegian security police is investigating a hacker attack that zoned in on military computers shortly after Norway joined the Libya air campaign in March.            The army says about a hundred computers were targeted in the attack, where staff received a fake email from a Norwegian government agency containing a malicious code           ...

14 - Yr Old Hacker Hired by MICROSOFT after doing phishing via Call of Duty Server !!

           These are the kinds of things dreams are made of, a 14 year old hacker on Call of Duty was just recruited by Microsoft. You heard me right, Microsoft.             This is exactly what Sony should have done with George Hotz – given him a job as a security specialist, instead of suing him in court and getting its PlayStation Network and other Sony websites hacked day in and out.           ...

Group learns email hacking from online tutorials in 15 minutes

          Study finds that people can learn and hack email accounts by watching online tutorial.           Email accounts face increasing threats from hackers with online tutorials making it possible for people with little technical knowledge to hack in to accounts in less than 15 minutes, according to a new study. A TV producer, a self-employed baker and a retiree learnt hacking from freely available...

Saturday, May 28, 2011

ICC Twenty20 World Cup 2012 website Hacked !

Hacked site link :-  http://twenty20worldcup2012.co.in/ If you are lucky, you can even witness it live..!! Hurry up!!!  ...

ISI (Pakistan) hack email account of Indian Army Major !!!

          A serving Inter-Services Intelligence (ISI) officer Major Sameer Ali hacked an Indian Army major's e-mail account in 2010 and extracted many sensitive documents, intelligence sources said. Ali has been named by India in the list of 50 'most wanted' terrorists sheltered by Pakistan for involvement in the Mumbai attacks conspiracy,The news of the hacking was given to Indian probe agencies by the FBI, which was then interrogating Mumbai...

Pakistan AirForce Official Server Hacked by Indian Cyber Army

          The server of Pakistan air force has been compromised by hackers from India identifying themselves as indian cyber army. the hackers hacked into the Internal RDP ( Remote Desktop ) of the air force server and gained access to whole LAN of the company.                     This is not the first time such incidence took place this silent cyberwar...

Friday, May 27, 2011

IT experts develop 'Decaptcha' to crack Captcha

          Widely used online word test reverse engineered.           IT experts have developed a new software 'Decaptcha' that cracks 'Captcha', the online word test tool that is used by websites to identify humans.           A Captcha is a program that protects websites against bots by generating and grading tests, such as distorted tests, that humans can...

Thursday, May 26, 2011

UK had highest ratio of malicious emails in May: Symantec

           Russia is the most spammed in May with a spam rate of 82.2%; in UK 75.4% of email was spam The UK had the highest ratio of malicious emails in May, as one in 91.7 emails was blocked as malicious, according to a new report by Symantec.                A new report by the security company said that in May, spam increased by 2.9 percentage points with spammers establishing their own fake URL-shortening services to perform URL redirection. The MessageLabs Intelligence...

Insider data theft costs Bank of America $10 million

          A Bank of America insider who sold customer data to criminals cost the bank at least US$10 million in losses.           Bank of America began notifying customers of the incident recently, but is not providing many details of the case which is still under investigation. The theft, "involved a now former associate who provided customer information to people outside the bank, who then used the information to commit fraud against our customers," said Bank of America spokeswoman Colleen Haggerty,...

Hackers dont do different things, they do same things differently... (Part V)

5. Hackers controlling your car           The age of the connected car is dawning. Vehicles like the Ford Edge now provide 3G network access, a Wi-Fi router in the car, and the ability to tap into your home Wi-Fi network (only while parked). In the next few years, more automakers will provide wireless access for Web browsing and streaming high-def movies. And by 2013, a new FCC-mandated wireless signal called DSRC (dedicated short-range communications) will run at 5.9GHz and provide a vehicle-to-vehicle communication network.           ...

Wednesday, May 25, 2011

Add "Open with Notepad" to the Context Menu for All Files

How to open any file using notepad ??                    The default method of opening unknown files forces you to go through a list of known applications and is generally a pain to deal with. That’s why I like to have a context menu option for “Open with Notepad” so that I can quickly open up files without having to go through a lot of trouble.              Manual...

State highway Police Website hacked!!!

          The state highway police's website was allegedly hacked by an unknown person, who changed the accident figures to show a steep decline in the number of deaths for the year 2010. The changed statistics show the number of fatalities went down by almost 9,000 between 2009 and 2010. In 2009, th e number of deaths was 11,396. The records for 2010 show the number of deaths to be 1,762, even though an earlier table shows the number of deaths...

Tuesday, May 24, 2011

Hackers dont do different things, they do same things differently... (Part IV)

4. Cyberstalking           Social networks like Twitter and Facebook have changed the way we communicate in our personal and work lives, many would say for the better. Yet these useful portals also provide conduits that others can use to make our lives miserable.           Workplace-related cyberstalking might involve another employee or someone trying to steal company information. A relatively new concept...

Monday, May 23, 2011

Hackers dont do different things, they do same things differently... (Part III)

3. Social network account spoofing            Many of us use Facebook, LinkedIn and other social networks to connect with friends, family and colleagues -- which leaves us vulnerable to a new technique called social network account spoofing. The idea is that a scammer poses as either someone you know or a friend of a friend to get close to you and fool you into revealing personal information. He then uses that information to gain access to your...

Sunday, May 22, 2011

Hackers dont do different things, they do same things differently... (Part II)

2. Hacking into smart grids A common misconception is that only an open network -- say, your corporate wireless LAN for visitor access -- is hackable. "Stuxnet proved that it is relatively simple to cause potentially catastrophic damage" to an industrial control network, says Neustar's Joffe.            Even some nuclear plants and power grids have wireless networks for employees to use. According to Morehouse, another new attack point will be smart grids, which use electronic metering to streamline power management. Utility companies around the...

Saturday, May 21, 2011

Hackers dont do different things, they do same things differently... (Part I)

          Criminal hackers never sleep, it seems. Just when you think you've battened down the hatches and fully protected yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. There are 6 different vulnerabilities which can be called Generation-Next vulnerabilities which I would be covering in 6 different editorials:- 1. Text-message malware                  ...

Facebook to use Microsoft tech to find child porn

          Facebook will use PhotoDNA, an image analysis technology co-invented by Microsoft, to find child pornography on its site, the company said Thursday.           The social networking giant will run PhotoDNA on all images uploaded to the site to help find and block images showing child pornography. The technology will also help Facebook report incidents to the National Center for Missing & Exploited Children (NCMEC) and the police, to allow them to take immediate action, according to Chris...

Over 99% Android phones leak personal data

          German researchers find unencrypted 'token' files moving between phone. Security researchers in Germany have detected a leak in Android phones which can be exploited by criminals to tap information being transmitted between phones.           The discovery was made by University of Ulm researchers Bastian Konings, Jens Nickels, and Florian Schaub. They detected the risk in Android phones when they were studying the way Android phones handled identification information for Web-based services,...

Ronaldinho's Website Hacked By Osama Bin Laden Supporters

          Football supremo Ronaldinho has become the latest celebrity to have his website attacked, with the star suffering a somewhat unflattering comparison to a certain Star Wars character at the hands of an unknown pro-terrorism cracker. One of the most famous athletes in the world had a rough Saturday afternoon. World renown soccer player Ronaldinho has his own website, just like seemingly every big name athlete in 2011, and he uses it for...

Wednesday, May 18, 2011

Hackers hit video game developer Square Enix

           Details of 25,000 customers at risk; credit card details safe, says company Japanese video game and publishing company Square Enix has become the latest victim of cyber attacks with hackers breaching into its security.                     The second Japanese video game company to be hacked in less than two months, Square Enix is best known for its Final Fantasy, the Dragon Quest, Tomb Raider and Hit Man series. The Tokyo-based company has ...

SunSpot trojan targets North American banks

          Only 21% of major anti-virus programs can identify the Microsoft Windows malware platform Web security provider Trusteer has said that it has identified a Microsoft Windows malware platform dubbed "Sunspot" that attacks North American financial institutions and their customer accounts. The Trojan has already caused financial losses in the US and has the ability to steal sensitive financial details, including credit card details from infected computers.                  ...

Tuesday, May 17, 2011

Zeus leaks give tools to researchers, attackers

        The source code and a manual to the popular crimeware creation kit Zeus has been leaked, perhaps giving defenders additional tools to fight infections but also raising concerns that criminals may use the source code to create a rapidly expanding compendium of variants.               Nearly a week ago, copies of the source code to Zeus appeared on the Internet, according to Danish security firm CSIS. The release comes about the same time that a manual describing Zeus's functionality also appeared...

Monday, May 16, 2011

Unable to hide Menu Bar in Windows Explorer

PROBLEM:- If you cannot hide the Menu Bar in Windows Vista or Windows 7 Explorer, here are some trouble-shooting steps you may want to try. SOLUTION:- 1) First Rt click on the menu bas and uncheck Lock the Tool bars. Then, click Organize > Layout > Ensure Menu bar is un checked. 2) Click Organize > Folder Options > General > Tasks > Ensure Show preview and folders is checked > Apply > OK. Additionally : Rt click Computer > Properties > Advanced System Settings...

Sunday, May 15, 2011

Hacker Invites Strangers To Woman's House For "Sex"

Omaha, NE - An woman's privacy is shattered after someone uses a computer to ruin her reputation. The woman is too afraid to reveal her identity. But, someone did use her identity to play a vicious prank. She believes an ex-boyfriend stole her password, then posted personal information online. That included an advertisement on Craigslist calling for strangers to come over for sex."I had over 500 text messages. I had over 10 people show up at my house. I had hundreds of phone calls. There are a lot of creeps in Omaha I guess." She posted a note on her front door threatening to call police...

Saturday, May 14, 2011

Facebook inadvertently leaked user data for years: Symantec

Social networking site has 7.5 million underage users in US, finds report IT security company Symantec has said that Facebook could have inadvertently leaked users' personal information to third parties and advertisers over the past few years. The revelation comes at a time when there are growing privacy and security concerns about the services of some of the biggest IT companies, including Google, Apple and Sony. Symantec said in its official blog that a programming bug on Facebook's website...

Monday, May 9, 2011

Bin Laden video might contain a malware, warns FBI

          Computer experts warn users of malware scams in the name of bin Laden. The Federal Bureau of investigation (FBI) has issued a warning to computer users across the world to exercise caution while opening emails claiming to carry bin Laden content in them. Malware has been found in on several websites sowing the news of the death of the al-Qaeda leader. Computer security experts have also said that online scammers were quick to exploit the death of bin Laden to spread malware.           Bin...

Friday, May 6, 2011

Firefox 5 beta released... :-)

The Web is all about innovation, and Firefox sets the pace with dozens of new features to deliver a faster, more secure and customizable Web browsing experience for all. User Experience. The enhancements to Firefox provide the best possible browsing experience on the Web. The new Firefox smart location bar, affectionately known as the "Awesome Bar," learns as people use it, adapting to user preferences and offering better fitting matches over time. Performance. Firefox is built on top of the...

Page 1 of 12012345Next