Discover 'Hole' in Chrome Gets USD 576 Million

Jumat, 12 Oktober 2012

If you managed to find the Google Chrome browser, you can win money of USD 60 thousand, equivalent to Rp 576 million (USD 1 = Rp 9600). This is the second part of the competition held Pwnium Google.
This is experienced by hackers calling themselves the Pinkie Pie. As reported by Cnet, on Friday (10/12/2012), he managed to win the competition find security holes in Chrome.

Such competition is not the first time Google held. The internet giant is a hobby for-for gifts for hackers who managed to find the product flaws. The goal, of course, to further strengthen the security of the user.

Took place in Kuala Lumpur, Malaysia, 2 Pwnium competition event held at Hack in the Box 2012. "We announced it had found a new loophole know Pinkie Pie. As a reward, we reward of USD 60 thousand and Chromebook," Google said via the Chromium blog.

Google Chrome team to quickly patch the gaps found. Before long, the browser update to fix these gaps immediately available within just 10 hours after it was discovered.

Interestingly, Pinkie Pie so hackers subscription winner of this competition. Previously, he also won $ 60 thousand in the first Pwnium competition held earlier this year.

Facebook tumbles, Anonymous Claims Attack Launch

Facebook reportedly run down in a number of European countries. Coinciding with this event, a group of hackers posted tweets claiming to be the mastermind behind the event.
IBTimes on Friday (12/10/2012), reported that the giant networking sites toppled in Sweden, Denmark, Ireland, Norway and Portugal on Thursday.

Is Anonymous, the hacker group who often launch the action, claiming the action. On the Twitter account @ AnonymousOwn3r they say, "I will stop # attack to facebook, soon you guys can acess".

Through the account that Anonymous was proclaimed as the leader, they acknowledge as the responsible party in temporary paralysis GoDaddy site some time ago.

As Facebook itself through a spokesman denied that the incident was the work of hackers. According to the site this friendship, down which occurs in less than 1 hour it is the impact of the technical stuff being done up.

"No action hack on Facebook, we have investigated the claim and it was not valid," they stressed.

Email and Phone Bakrie Group Indonesia Hijacked

The Bakrie Group reported acts of piracy or hacking email and phone tapping to the Police. Piracy is blamed on the group with the intent to steal corporate data. Bakrie was inflamed.
Christopher Fong, Senior Vice President of Bakrie Group explained, it has obtained the facts about the cheating and actually against the law by certain parties. Upon these findings, Bakrie said he was surprised.

The purpose of data theft and information, according to Fong, used to win the competition unfairly and illegally. Unfortunately, Fong did not explain what he meant the competition.

"We get the fact that there is fraud committed in contravention of the law by certain parties by way of hacking of email management within the Bakrie Group to steal data including telephone wiretapping," Fong said in a written statement on Thursday (11/10/2012 ).

Reporting to the police action is expected to be followed up. "The tort investigate it, find the perpetrators and punish the perpetrators in accordance with the legislation in force, the Bakrie Group expects the public can find out what is really going on," he said.

Netter instigated Internet Freedom Declaration in Indonesia

Kamis, 04 Oktober 2012

Internet is increasingly unpopular in Indonesia, a lot of things you can do in the virtual world. In order to create a good internet governance, a number of netizens country also declared freedom of surfing.
As reported suarablogger.org, the declaration wanted a free and open internet. They also support a wide range of transparent and participatory processes in order to realize the internet governance (policy governance interet).

When first initiated on October 2, 2012, this movement has been endorsed by 14 civil society institutions in Indonesia. Other Internet users can follow to give support to the visited sites suarablogger.org.

The following content is the Internet Freedom Declaration.

----

We pledge to free and open Internet. We support various processes transparent and participatory governance policies in order to realize the Internet (Internet Governance), globally in general and Indonesia in particular, based on the rule of 5 (five) of the following basic principles:



  • Expression : Do not censor the Internet that aim and / or may limit human rights.
  • Access : Increase equitable universal access to the Internet is fast and affordable.
  • Openness : Let the Internet be an open network where all people are free and responsible to communicate, learn, create, and innovate.
  • Innovation : Protect the freedom to innovate and work in the Internet, new technologies should not hinder and penalize the innovators because these things are done by the users.
  • Privacy : Protect your privacy on the Internet and defend everyone's right to control how he uses his data and tools.



14 (fourteen) Indonesian civil society institutions which first agreed to support and / or declare the freedom of the Internet was on October 2, 2012 are: ICT Watch, Volunteer Information and Communication Technology (RTIK), Center for Innovation, Policy and Governance (CIPG ), White Water Foundation, Indonesian Center for Deradicalisation and Wisdom (ICDW), the Alliance of Indonesian Journalists (AJI), Institute for Policy Research and Advocacy (ELSAM), Arus Pelangi, Institute for Criminal Justice Reform (ICJR), Combine Resource Institution (CRI) , Indonesia Online Advocacy (idol), One World, Common Room Networks Foundation and Community Voice.

Users of Internet Explorer in Danger!

Selasa, 18 September 2012

A fairly dangerous gap found in Internet Explorer 7.8 and 9. The users were advised to use other browsers such as Google Chrome or Firefox.
The shocking thing was presented in an internet forum called Rapid7 security. According to them, Internet Explorer has a bug that they call Zero-day exploits.

This vulnerability allows anyone who uses Internet Explorer version 7.8, and 9 could be attacked easily. Especially when they visit a site that has been compromised script.

"An exploit has been used by the attackers before that (gap-ed) published by Metasploit," wrote Rapid7, Tuesday (09/18/2012).

Seeing such a huge gap, Microsoft is not blind. The software giant acknowledged that they made ​​a number of browser versions do have a 'hole'.

"We realize that some of the series Internet Explorer can be attacked, but we have confirmed that Internet Explorer 10 is not affected by this issue," said Yunsun Wee, Director of Microsoft's Trustworthy Computing.

"We recommend that users use Microsoft's Enhanced Mitigation Experience Toolkit (EMET) 3.0, which provides effective protection without affecting web browsing experience," advises Wee.

Tens of thousands of Dominos India website data leak

Minggu, 09 September 2012

One of the original Turkish hacker group claimed to have hacked a website fast food pizza india www.domino.co.in their origin "Ajan hackers" publish data to pastebin 37,000 in some parts.
This domino webisite data leakage which contain personal data such as email passwords, names and telephone. Previous website was never attacked but they never get the data for this.

As we know, this company is developing fast in the fast food sector based in india

Dominos India Accounts Part 1 Dominos India Accounts Part 2 Dominos India Accounts Part 3 Dominos India Accounts Part 4 Dominos India Accounts Part 5 Dominos India Accounts Part 6 Dominos India Accounts Part 7 Dominos India Accounts Part 8 http://pastebin.com/u/Maxney

Windows 8 Still Vulnerable to Hackers hacked

Windows 8 still has loopholes that could be exploited by hackers. This recognition comes from Adobe, one of the Microsoft partner that provides support for the Flash Player.
Sunday (09/09/2012), Adobe acknowledged a gap that opens in Flash for Windows 8 is being targeted by the hackers so in recent weeks.

Windows 8 is not yet officially released by Microsoft. But its Preview Release version can be downloaded from May to tested. Well, Flash Player for browser Internet Explorer 10 (IE10) is a recognized Adobe still has weaknesses.

Microsoft has claimed not to have issued a new patch for the bug is in Flash Windows 8 until the status is officially released on 26 October.

"The version of Flash is now in Windows 8 RTM there is not the last revision. But we will release the security update through Windows Update when it comes to GA (general availability)," said Microsoft spokesman.

Every Seconds, 18 The Internet Crime Victim

Increasingly sophisticated technology, unfortunately, is directly proportional to the higher crime cyberspace. Even according to the Norton Cybercrime Report, every second there are 18 adults who were victims of cyber crime.
Other data revealed in the report is a crime on the internet cause harm USD 110 billion per year. With an average total loss by an average of USD 197 per victim in the whole world.

According to Norton, the results of this survey showed an increase in new forms of cyber crime than in previous years, such as the discovery of the social networks or mobile devices.

That is, it indicates that the cyber crime start focusing on the target device or popular service.

One in five adults who do online activities (21 percent) have been a victim of cyber crime from the victim on social networks to be a victim in mobile devices. While 39 percent of social networking users have been victims of social crime in cyberspace. Here's the breakdown:

# 15 percent of social networking users report that the profile has been hacked and someone pretending to be the owner of the profile.

# One in 10 social network users say they have been victims of a scam and deceptive links on social networking.

# While 75 percent believe that cybercrime set their sights on social networks, less than half (44 percent) actually use security solutions that protect them from the threat of social networks, and only 49 percent use privacy settings to control what information they disclose, they provide , and with whom they share.

# Almost one-third (31 percent) of mobile device users receive a text message from someone they do not know and ask them to click a link that has been connected or make outgoing calls to numbers that are not known to take a voice message.

"Crime cyberspace alter their tactics by targeting the growth of mobile devices and social networks where consumers are less concerned with security risks," said Marian Merritt, Norton Internet Safety Advocate.

City of Newark Web site Hacked, 3000+ Accounts leaked by #0x00x00

Selasa, 04 September 2012

Earlier today hacker @0x00x00 announced an attack on the City of Newark, New Jersey website (www.ci.newark.nj.us) which has resulted in over 3000 user credentials being leaked.

The attack was announced via twitter and posted to pastebin.

The website is the main website for Newark and contains a heap of information and basic news services for people interested in the Newark area. The site also claims it is newly built, user friendly website and if this is true the developers may want to fix the exploits which have allowed this to happen.

The leaked data contains user and administration which all emails/usernames and encrypted passwords.

http://pastebin.com/CiQPDQgd

FBI hack yielded 12 million iPhone and iPad IDs, Anonymous claims

Hackers associated with Anonymous claim to have swiped more than 12 million Apple iPhone and iPad device identifiers from an FBI computer.

Someone using the banner of AntiSec — a 14-month-old joint operation of Anonymous and LulzSec — posted a document to Pastebin on Monday that contained links to around a million Apple unique device identifiers (UDIDs). The anonymous poster said the release was intended to highlight the FBI's alleged tracking of Apple customers.

"We never liked the concept of UDIDs since the beginning indeed," the post read. "Really bad decision from Apple. Fishy thingie."

Every iOS device has a UDID. The number was put in place so developers and mobile advertising networks could track user behaviour. However, over the last year Apple has been phasing out apps' access to UDIDs, as the numbers were sometimes being transmitted to third parties without users' consent.

According to the post, which was linked to from a well-known Anonymous Twitter account, the hackers got into the Dell laptop of FBI special agent Christopher Stangl during the second week of March this year. Stangl works at the FBI's New York field office, and has been a prominent face in the agency's cybersecurity recruitment efforts.

AntiSec said the hack, which apparently exploited a Java vulnerability, yielded a CSV file containing "a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service [APNS] tokens, zipcodes, cellphone numbers, addresses, etc".

1,000,001 released

The hackers said they were publishing 1,000,001 of the UDIDs and APNS tokens as that was "enough to release". They stressed that they had stripped out the other personal data held in the file, noting that not all the listed devices have the same amount of personal data linked.

"We have learnt it seems quite clear nobody pays attention if you just come and say 'hey, [the] FBI is using your device details and info and who... knows [why they are] experimenting with that'," the document read. "We could have released mail and a very small extract of the data. Some people would eventually pick up the issue but well, let's be honest, that will be ephemeral... Eventually, looking at the massive number of devices concerned, someone should care about it."

The hackers added that it was "the right moment" to release the data as Apple was currently looking for alternatives to the UDID system.

"In this case it's too late for those concerned owners on the list," the document read. "We always thought it was a really bad idea. That hardware coded IDs for devices concept should be eradicated from any device on the market in the future."

The document, which is written in slightly broken English, has near its end an insult about US presidential candidate Mitt Romney, written in German.
 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. Operation Indonesian - All Rights Reserved
Template Created by Creating Website Inspired by Sportapolis Shape5.com
Proudly powered by Blogger