Give your Desktop a Mozaic Touch

Experience the Windows 8 Metro Stlye UI on your Computer

Tuesday, October 23, 2012

MyWall-Your own little firewall

A simple, small yet useful utility  to save your time from unwanted websites. All of us have one or the other important tasks to complete in the next couple of hours, but most of us usually waste most of our time socializing or hovering here and there over the internet and hence cannot focus on our work because of the turmoils coming from websites like facebook, twitter, youtube, etc. It would be unfair to crown these sites as time-wasting, however because of the continuous updates, its actually very late when we realize that we have wasted a lot of time... atleast happens with me......

Saturday, August 25, 2012

Fork Bombs... Destructive Simplicity

Have you heard of fork bombs...? If no try this...Experience yourself... ;) PS: Try this on a VM (Virtual Machine) not on the actual machine Copy this in a notepad file -----------copy--here------------- :fork start %0 %0|%0 goto :fork -----------copy--here------------- save as anything.bat Execute...!! Enjoy...! make ur custom bombs... ;) This is just to demonstrate how small codes can crash a system... Don't try it on host machines... For Linux (Fedora, Ubuntu, Redhat, CentOS) this small piece of code will do the trick... :(){ :|:& };: type the above characters in a shell or...

Wednesday, May 2, 2012

Zeus Variant Targets Cloud-Based Payroll Service

          With critical business services migrating to the cloud, service providers have become a prime target for cybercriminals. In the latest example of financial malware targeting enterprises, we have discovered a Zeus attack that focuses on cloud payroll service providers. These attacks are designed to route funds to criminals, and bypass industrial strength security controls maintained by larger businesses.          ...

Shocking Statistics From The Latest Internet Threat Report

Anti malware company Symantec released its threat report for 2011 on Monday. The statistics are as follows:- Normal 0 false false false EN-IN X-NONE X-NONE ...

Skype IP address Vulnerability may not be so new

          Skype is warning users following the launch of a site devoted to harvesting user IP addresses.The Skype IP-Finder site allowed third-parties to see a user's last known IP address by simply typing in a user name.             A script has been uploaded to Github that offers these options. According to the page, it can be used to lookup IP addresses of online Skype accounts, and return...

Is $10,000 per day from Google Ads less for the Flashback malware Creator?

          In a recent analysis of the business model behind the Flashback Trojan, Symantec security researchers reported that the main objective of the malware is revenue generation through an ad-clicking component. Security researchers at Symantec are estimating that the cyber-crimibals behind the Flashback Mac OS X botnet may have raked in about $10,000 a day.            Dr. Web,...

New zero day exploit in Oracle Database

     Oracle has recommended workarounds for a zero-day Oracle Database flaw that was not fixed in the company's April critical patch update. Oracle issued a security alert for Oracle TNS Poison, the vulnerability, disclosed by researcher Joxean Koret after he mistakenly thought it had been fixed by Oracle, allows an attacker to hijack the information exchanged between clients and databases. Koret originally reported the vulnerability to Oracle...

Tuesday, April 3, 2012

Chinese hacker targeting Indian government and Tibetan activists Sites

        Websites of Indian government and Tibetan activists in the country are under attack in a cyber attack campaign engineered by a Chinese hacker, working with one of the world's largest e-tailers Tencent.           The cyber criminal in question is Gu Kaiyuan, once a graduate student at a Chinese university that receives government financial support for its computer security program and currently...

DKFBootKit - First Android BootKit Malware

          NQ Mobile Security Research Center has recently uncovered a new malware DKFBootKit. This malware is identified when monitoring and analyzing the evolution of earlier DroidKungFu variants. What sets DKFBootKit apart from malware like DroidDream, is that DKFBootKit replaces certain boot processes and can begin running even before the system is completely booted up.             DKFBootKit...

50K Cards Compromised using Credit Card Processor

          Some 50,000 credit and debit cardholders may have their information exposed following a security breach at Global Payments. The breach occurred sometime between between Jan. 21, 2012 and Feb. 25, 2012.           Both Visa and MasterCard have confirmed they have warned U.S. banks that a credit card processor was reportedly breached. Both firms say their own security systems were...

Friday, March 30, 2012

Kelihos Botnet with 110,000 PCs take down finally

       Botnets are particularly insidious, using thousands of virus-infected computers which their owners are unaware are being used for sending out spam, launching denial-of-service attacks and stealing data. But taking down a botnet poses challenges. The main problem is that legitimate security companies can’t use the same type of weapons as criminals.           A group of malware experts from security...

A Russian Zeus attacker Sentenced from Million Dollar Fraud

         A Russian Hacker, who was part of an elaborate Cyber attack that used Zeus Banking Trojan in U.S. visas to move cash stolen from U.S. businesses out of the country was sentenced on March 23 to two years in U.S. federal prison.         Nikokay Garifulin received a two-year prison term for his involvement in a global bank fraud scheme that used hundreds of phone bank accounts to steal over $3 million...

Japan orders Google to remove auto-complete function over privacy complaint

          Google has been ordered to disable part of its autocomplete function in Japan after complaints it violates privacy. According to a report by The Japan Times, the court was acting on a petition accusing Google’s autocomplete feature of being defamatory.           The petition was filed by a Japanese man (name not disclosed) who alleged that some of the autocomplete suggestions...

Return of Lulzsec, Dump 170937 accounts from Military Dating Site

        Another Hacking group after Lulzsec, comes with name LulzsecReborn has posted names, usernames, passwords, and emails of 170,937 accounts on MilitarySingles.com on Pastebin as part of the group’s Operation Digiturk. LulzSec was a major ticket item last year as the group hacked a number of high profile Web sites all in the name of the “lulz.” After their so called “50 Day Cruise,” the group broke up and went their separate ways.Hacker claim that, There are emails such as @us.army.mil ; @carney.navy.mil ; @greatlakes.cnet.navy.mil ; @microsoft.com...

Facebook profiles can be hijacked by Chrome extensions malware

          Cybercriminals are uploading malicious Chrome browser extensions to the official Chrome Web Store and use them to hijack Facebook accounts, according to security researchers from Kaspersky Lab. The rogue extensions are advertised on Facebook by scammers and claim to allow changing the color of profile pages, tracking profile visitors or even removing social media viruses.            ...

Thursday, March 29, 2012

Facebook Profile Viewer rogue application spreads on social network

          A rogue application which claims to allow you to see who has viewed your Facebook profile is spreading between accounts on the popular social network. Messages claiming that Facebook has issued a new update which allows you to check who has visited your profile are making the rounds. New Update from facebook. Now you can check who visited your profile. check here -------->>>FAŒBOOK PROFILE VIEWER ®<<<<------Who...

Breaching Hundreds of KPN Servers

          Dutch Police Arrest 17-year-old Suspected of The Dutch High Tech Crime Team has arrested a 17-year-old suspected of compromising customer account data on hundreds of servers belonging to telecommunications operator KPN. The teenager was arrested last Tuesday in the Dutch town of Barendrecht, where police seized an encrypted computer, two laptops and other storage media including external hard drives, DVDs and USB sticks, the Dutch Public Prosecution Service announced on Monday.           "He...

Justin Bieber's Twitter account - hacked!

          Lend a little sympathy to pop star Justin Bieber today, after his Twitter account was hacked and an unauthorised message was sent to his 19 million fans. 19 million my ass. #biebermyballs           Fortunately the message was rapidly deleted, and it appears that the account was compromised more to spread embarrassing graffiti rather than with more malicious intention. Just imagine how much worse...

Friday, March 23, 2012

User IDs and Clear-Text Passwords Leaked from US Army’s CECOM

          Black Jester, the hacker who yesterday demonstrated that he managed to gain unauthorized access to a NASA site, leaked sensitive contract information from a site connected to the US Army Communications and Electronics Command (CECOM).            A number of 30 record sets that include names, user IDs, physical addresses, email addresses, telephone numbers, and clear-text passwords were published in a Pastebin document. “Old crappy server, but has good info inside it. The list is not complete...

Carberp Banking Trojan Scam - 8 Arrested in Russia

     8 Men suspected of being involved in the Carberp phishing scam have been arrested in Russia. The men were arrested after a joint investigation by the Russian Ministry of Internal Affairs (MVD) and Federal Security Service (FSB).     According to the MVD, the investigation found that two brothers were the ringleaders of the gang, and developed a plan to steal money from the accounts of online banking customers. The eight suspects allegedly...

Thursday, March 22, 2012

Mystery of Duqu Programming Language Solved

       An appeal for help from the programming community has allowed antivirus analysts to classify the unknown language used to develop key components of the Duqu Trojan. The sections responsible for downloading and executing additional modules in the Duqu Trojan, referred to by some as Stuxnet 2.0, were written in standard C++.             Kaspersky Lab experts now say with a high degree of certainty that the Duqu framework was written using a custom object-oriented extension to C, generally...

The Pirate Bay plans Low Orbit Server Drones to beat Censorship

          One of the world’s largest BitTorrent sites “The Pirate Bay” is going to put servers on GPS-controlled aircraft drones in order to evade authorities who are looking to shut the site down. In a Sunday blog post, The Pirate Bay announced new “Low Orbit Server Stations” that will house the site’s servers and files on unmanned, GPS-controlled, aircraft drones. TPB said:          ...

Page 1 of 12012345Next