minute workers
Subscribe to My Blog
Showing posts with label News. Show all posts
People search is one of the most important and powerful feature of Buzzom. Since its launch we have been adding advance features to the system to make people search more interesting and efficient. Recently, we added advance filter option that allowed user to add different search criteria like bio, location and name.
Today, we are announcing an interesting feature to Buzzom People search. The new feature allows you to filter the search result according to :

1. Followers count
2. Following count
3. Profile Image present or absent
These criteria will allow to be more efficient in your people search.

buzzom_new_search


For More Info Visit Bezzom
    21 Aug 2010:
    Pak Cyber Army has hacked the official website of primeminister Manmohan Singh & congress president  Sonia Gandhi.Offlate, we saw huge no of pakistani websites getting hacked by Indian Cyber Army,India Shell.Here are the links
 
Link : http://www.manmohansingh.org/documents
         http://www.soniagandhi.org/documents/
  
20 Aug 2010:
Pakistani Hacker who identifies himself as "Soldier of God" has hacked Punjab BSNL website.
Hacker has managed to redirect a page of Punjab BSNL.
 Here is the url which gets redirected:

http://www.punjab.bsnl.co.in/more_news.php
Microsoft Arc Touch Mouse has been finally been unveiled to the world. It is one sexy looking mouse by Microsoft with a design very similar to the last-generation Arc Mouse by Microsoft, except that this one has touch-sensitive shell on top, and you can curve and straighten it anyway you like! awesome isn’t it?

microsoft-arc-touch-mouse-1282132397-crop

Of course it hasn’t been announced by Microsoft yet. These images were taken off from a German online store which is displaying it for October 13th availability. It was first earlier this month when Twitter account of Microsoft Hardware teased a couple of images of this mysterious looking “flat” and “touchy” device.
According to the German online store, features of Arc Touch mouse are as follows:
  • Touch Scrolling
  • Battery Indicator
  • The ability to track on any sort of surface (glass, wood etc.)
  • 2.4 GHz nano transceiver which plugs into USB 

atmafrontcurvedfy11

You will be able to grab Microsoft Arc Touch mouse for a price of €69.99 in Europe, or for $69.95 in US. [via Engadget]
A hack attack that can expose users to malware exploits has infected more than 1 million webpages, at least two of which belong to Apple.

The SQL injection attacks bombard the websites of legitimate companies with database commands that attempt to add hidden links that lead to malware exploits. While most of the sites that fell prey appear to belong to mom-and-pop operations, two of the infections hit pages Apple uses to promote iTunes podcasts. The malicious links appear to have been removed since Google last indexed the pages in early August.
In all, at least 538,000 pages have been compromised by the same attack. Attacks the bear similar fingerprints but point to different domains have claimed close to 500,000 more.

“These attacks have been ongoing and are changing pretty often,” said Mary Landesman, a senior researcher with ScanSafe, a Cisco-owned service that provides customers with real-time intelligence about malicious sites. “Interestingly, many of the sites compromised have been involved in repeated compromises over the past few months. It’s not clear whether these are the work of the same attackers or are competing attacks.”
SQL injection attacks succeed because web applications don’t properly filter search queries and other user-supplied input for malicious text. When the data is processed, commands are passed to a website’s backend server, causing it to add links or cough up sensitive information.

The attacks that hit Apple used highly encoded text strings to sneak past web-application filters. They are only the latest in a series of hack attacks to hit large numbers of websites.

The exploits used this time around weren’t as effective as they might have been. According to Landesman, many of the iframes buried into the websites contained HTML that couldn’t be rendered.
A hacker has accessed the Argentinian data of site users to share torrent files. These data have been altered or resold.
 
The pirates hijacked ? A hacker named Argentine Ch Russo claims to have introduced into the database sharing site Pirate Bay. With the help of two accomplices, he would have discovered that several SQL injection vulnerabilities in web administration interface have been done.
“Reflection for rightholders”

He gained access to user information, including their nicknames, email addresses and IP. Information that the three stooges have neither sold nor modified, preferring to stick to a reflection on the value they might have on beneficiaries.

The goal, as so often in these attacks, would be educational. “[The right - holders] would surely be interested in this information but we do not want to sell. We rather wanted to inform people that their data are perhaps not so well protected, “says Russo Ch on site Krebs Security.

The reaction of The Pirate Bay has been to cut the site for maintenance. The home page displays for the moment more than the message “Upgrading some stuff, database is in use for backups, soon back again.. Btw, it’s nice weather outside I think.”

The information is the nicknames of members, e-mail and IP addresses. The Pirate Bay proposed a registration system so that users can comment on the torrent links or make them available to users in the site index. If IP addresses are associated with the upload original content protected by copyright , imagine the benefit of certain claimants to get their hands on this data …

The Pirate Bay Database Hacked, User Information Exposed
A hacker has accessed the Argentinian data of site users to share torrent files. These data have been altered or resold.

The pirates hijacked ? A hacker named Argentine Ch Russo claims to have introduced into the database sharing site Pirate Bay. With the help of two accomplices, he would have discovered that several SQL injection vulnerabilities in web administration interface have been done.

He gained access to user information, including their nicknames, email addresses and IP. Information that the three stooges have neither sold nor modified, preferring to stick to a reflection on the value they might have on beneficiaries.

The goal, as so often in these attacks, would be educational. “[The right - holders] would surely be interested in this information but we do not want to sell. We rather wanted to inform people that their data are perhaps not so well protected, “says Russo Ch on site Krebs Security.

The reaction of The Pirate Bay has been to cut the site for maintenance. The home page displays for the moment more than the message “Upgrading some stuff, database is in use for backups, soon back again.. Btw, it’s nice weather outside I think.”

The information is the nicknames of members, e-mail and IP addresses. The Pirate Bay proposed a registration system so that users can comment on the torrent links or make them available to users in the site index. If IP addresses are associated with the upload original content protected by copyright , imagine the benefit of certain claimants to get their hands on this data …

Computer scientists have brought new meaning to the term war driving by hacking into a moving car's wirelessly-connected warning systems and generating fake error messages.
A team from the University of South Carolina and Rutgers sent fake tire pressure messages to the onboard computer, generating bogus warning messages. Tire pressure monitoring systems have been compulsory for US vehicles since 2008. The same technology may soon become compulsory in Europe, The H Security reports.

The researchers got the transmission of fake messages to work over a range of up to 40 metres or, more impressively, between two moving vehicles in close proximity travelling at 70kph. The technology to carry out the hack only costs about $1,500 but the trick reportedly took a great deal of ingenuity to pull off. The clever bit involved spoofing wireless sensors and transmitting messages rather than bypassing security controls, which were notable by their absence, as the researchers explain:

Reverse-engineering of the underlying protocols revealed static 32 bit identifiers and that messages can be easily triggered remotely, which raises privacy concerns as vehicles can be tracked through these identifiers. Further, current protocols do not employ authentication and vehicle implementations do not perform basic input validation, thereby allowing for remote spoofing of sensor messages. We validated this experimentally by triggering tyre pressure warning messages in a moving vehicle from a customized software radio attack platform located in a nearby vehicle.

The researchers presented their findings, which included recommendations on how to improve in-car wireless network security and privacy, in a paper presented to the 19th Usenix Security Symposium in Washington on Thursday. Screenshots of the hack in action can be found in a write-up of the attack by motoring news site Jalopnik, here.
Cars are increasingly run using multiple embedded micro-processors. This has opened up a new avenue of research for computer security scientists, but up until now demonstrated hacks have relied on obtaining a physical connection to a car's computer. The latest research shows that wireless hacks are possible, so we should be thankful that malware infections of vehicle systems have never occurred.
Two German nationals have been arrested and charged with involvement in a gang that has allegedly stolen 100 million baht by hacking into online banking systems in Europe, the US and Thailand.


German nationals Dominik Iacono, left, and Dave Ackermann appear at a news conference at the Crime Suppression Division following their arrest yesterday on charges of electronic banking fraud. SURAPOL PROMSAKA NA SAKOLNAKORN

Dominik Iacono, 22, and Dave Ackermann, 23, were arrested at the weekend in Watthana district, Crime Suppression Division (CSD) officers said.

The two were allegedly found with two Bangkok Bank passbooks, two ATM cards, two laptops, five mobile phones and a USB storage device containing bank and credit card transaction information.
Acting CSD chief Supisarn Bhakdinarinath said his officers had received a complaint from Khattiyaporn Kham-at, 44, who said she had lost about 700,000 baht after someone used her name to access her online account through internet banking.

Col Khattiyaporn said the money had disappeared from an account linked to Bangkok Bank's internet banking system.

The CSD's investigation concluded at the weekend with the arrest of the two Germans who were captured recently on a security camera withdrawing funds from an ATM in Pattaya.

Pol Col Supisarn alleged the CSD's investigation found the two were working with a Russia-based group of hackers who steal the login information and passwords of people who use online banking.
The group targets victims in Europe, the US and Thailand, he said, and has robbed victims of the equivalent of about 100 million baht this year, he said.

The gang would gain access to a victim's computer through a trojan - a virus that could possibly come from an email attachment, or a program downloaded from an unknown source - Pol Col Supisarn said.
Once the trojan was active on a victim's computer, the hackers could monitor a user's online use, including banking transactions. The hackers would then be able to access the victim's online banking account and add an additional account - one they had opened - for third-party transfers, said Siripong Timula, deputy chief of the Technological Crime Suppression Division.

After the hackers had transferred money to the third account, they would have other gang members standing by to withdraw the money from an ATM immediately before the transaction could be suspended, Pol Col Siripong said.

Kitti Khosawisut, Bangkok Bank's IT security manager, said the bank was well protected against such hacking.

In Col Khattiyaporn's case, he said, the bank's internet security system had sent her a message notifying her that a third-party account had been added to her file for transfers.

Col Khattiyaporn was asked by the system to verify and confirm the addition, Mr Kitti said.
He said it was important to distinguish that it was the victim's computer that was hacked, not the bank's.
Online banking users must be cautious when conducting any transactions online, Pol Col Siripong said.
He warned account holders against putting too much money in accounts that can be accessed online.

"If something unusual happens during an online transaction, you should stop and check for irregularities," Pol Col Siripong said.