Showing posts with label Hacking News. Show all posts
Showing posts with label Hacking News. Show all posts

Iran Forms Police Unit Anticyber Crime



Tehran - Iran officially launched a cyber police unit to fight crime on the Internet that is increasingly rampant.

Police Chief Esmaeil Ahmadi Moghaddam said that the anti-cyber crime police unit operating in the capital Tehran. Then every police station will get the unit after his cyber antikejahatan respectively. Similarly, as quoted by The Age, Tuesday (25/01/2011).

Ahmad Moghaddam said that the unit will pursue antikejahatan cyber antirevolusioner groups who use social networking sites in 2009 which triggered protests against the re-election of President Mahmoud Ahmadinejad.

"Through social networking sites in our country, groups antirevolution coordination with other countries and triggered riots," said Ahmad Moghaddam, referring to the anti-Ahmadinejad protest movements that sparked riots in Tehran, causing some deaths.

Supporters of rival candidates used the internet and social networking sites like Facebook and Twitter to extract information and to coordinate protests against Ahmadinejad after the election he repeated.

The Iranian government also several times to block the internet that makes internet access is quite difficult in the country.
READ MORE - Iran Forms Police Unit Anticyber Crime

Hackers Spread Trojan Through Kamasutra


SAN FRANCISCO - Bids pornographic content on the internet the more lucrative and dangerous. Because once trapped, the virus will spread and damage the PC.

A re-discovered virus. This time the guise offer a presentation about kamasutra in PowerPoint file format. The virus was to lure potential victims to see the view of sexual relations positions in the Kamasutra.

"Be careful with the mouse movements you use," said Graham Cluley, from network security firm Sophos, was quoted as saying by the Straits Times on Saturday (15/01/2011).

"When you click on the file, you will indeed be awarded in the form of a PowerPoint presentation of the original. But the background of presentations had been infiltrated by a Trojan, identified as Troj / Bckdr-RFM," said Cluley.

The Trojan will then automatically infect a PC that has been compromised. From there, hackers will easily control the victim's computer remotely.

Cluley, once the computer is infected with malicious software so hackers can easily steal personal information in it. Even they can spy on user activity that uses the device to the interests of other harmful, such as sending spam or attacking other sites.

The virus entered along with the movement of the mouse is used to display the positions of the Kamasutra. Interestingly, the hacker really give the 'gift' drawing from the Kamasutra sex techniques in the form of a slide of more than half a dozen.
READ MORE - Hackers Spread Trojan Through Kamasutra

FBI chase ProWikileaks Hacker

WASHINGTON - U.S. intelligence  agency, the FBI, has asked all countries work together to jointly support track hackers who managed to paralyze the site Wikileaks 'enemy' Wikileaks.

Reported by Yahoo News from the Smoking Gun website on Saturday (01.01.2011), featuring FBI detailed written statement about the operation pro-Wikileaks tracking hackers. This operation will involve U.S. federal investigators in Europe, Canada and the U.S. alone. Along with the discovery of the evidence if the pro-Wikileaks hackers launched its action through the servers in those countries.

Cyber attacks were launched from this month, along with the start publicationCableGate documents on the site Wikileaks. This attack is only targeting sites that break with Wikileaks like PayPal, Visa and Mastercard.

Mid-December, the FBI track the IP address of the hacker who is in Canada, and later the FBI also found a virtual server in Callifornia.

At the same time, a separate investigation by German police show if attacks Denial of Service (DoS) to the PayPal site come from the existing server IP address in Texas.

The company partners decided Wikileaks working relationship after the site spread information considered state secrets. Starting from Amazon, PayPal, Visa to MasterCard to break and eventually became the moon-monthly hackers Wikileaks supporters.
READ MORE - FBI chase ProWikileaks Hacker

The Role of Human Computer Will Drag on the Internet

Ilustration
MOSCOW - The emergence of  artificial intelligence  is claimed will transform  the Internet  industry  and patterns of  social networks within the next 10 years.

This claim comes from a statement from Russian billionaire, Yuri Milner. CEO and owner of internet company Mail.ru Global DST was declared if later on we will not be able to membedakanyang are interacting with us in cyberspace, may be they are computers that can communicate.

"I think within the next 10 years, if you ask something in social networks and get an answer quickly, you could not tell whether the person who answered it is a human being or just computers," Milner said, as quoted by Yahoo News, Wednesday (29 / 12 / 2010).

Vice versa, further Milner, when there is a question arise, Internet users will not be able to guess if the question came from a human or a computer.

"By answering these questions, you are automatically helping to create computer algorithms," said Milner.

Mail.ru is owned by leading Russian figures, Alisher Usmanov and is now in the stage of an IPO in London. Big companies in Russia has now also started to expand to other countries through acquisitions and share purchases. Recently they have saved money by 2.4 percent stake in Facebook. And do not miss DST Global also holds approximately 10 stocks in the social networking.

"Until it's been many changes in our information world. Even the currently available information together with the information summarized above in public history in 2003," said Milner.

Mail.ru reportedly also will purchase shares of game developer Zynga and shopping discount vouchers site Groupon.

source : okezone.com
READ MORE - The Role of Human Computer Will Drag on the Internet

Aretha Franklin So in Internet Hoax Victim

LONDON - Legendary singer Aretha Franklin has become the 'latest victim' of the artist's death issue recently circulating on the internet.

However, the issue was denied by the artist himself. Franklin confirmed that he is still alive and healthy. Similarly, as quoted from newKerala, Wednesday (29/12/2010).

The singer with the nickname 'Queen of Soul' is an operation in a hospital in Detroit, Michigan, earlier this month. Some reports mentioned that he was diagnosed with pancreatic cancer.

His health condition was only made direct to the news that he had died.

A spokesman from Aretha Franklin has denied the issue by saying "Aretha's fine,"

Franklin is one of the celebrities who are rumored to be dead, after Charlie Sheen reportedly died due to ice ski accident on Sunday (26). Then singer Aaron Carter is also rumored died last week, the issue has also been denied by him.

source : okezone.com
READ MORE - Aretha Franklin So in Internet Hoax Victim

2010, Germany was hit by Cyber Attack 1600

BERLIN - The German government to detect the number of  attempted attacks through cyberspace throughout 2010. They also set up special institutions  to anticipate this in 2011.

In its report, the German government revealed that there are approximately 1600 experimental cyber attacks targeting the public network and the German government. This figure is almost two times higher than that detected the attack came in 2009, which is only approximately 900 attacks. That number also does not include hundreds of other attacks that are not detected.

"Germany is classified as countries with relatively high technological capabilities. No wonder so many cyber attacks are posted here. Most recognizable cyber attacks originating from China," said Interior Minister Stefan Paris, as quoted by Yahoo News, Tuesday (28/12 / 2010).

Improvement, continued Paris, also due to the increasing number of businesses, both government owned and private, who began using the network and electronic devices.

European countries with considerable economic level is indeed not alone in matters of cyber attacks. In fact, almost all European countries experienced the same thing, not only target to attack government networks, but also companies and individuals menjasi easy target for hackerstry to to break into their computer networks .

Last year, the U.S. made new Cyber Command. Also in November, NATO leaders also agreed to make cyber security a top priority military alliance of 28 nations that joined.

The data was recorded, approximately 65 percent of two billion Internet users in the world is predicted to have become victims of cyber crime. Until now regarded as a crime cyber crime is quite lucrative. Even greater profits than drug trafficking
READ MORE - 2010, Germany was hit by Cyber Attack 1600

Israel Ever Plough Internet Egypt?

Photo : Ilustration
LONDON - Israel's intelligence agency, Mossad, is considered responsible for the termination of Internet connection  in Egypt two years ago.

This was stated from a recognition of a businessman named Tareq Abdul Razzaq Hassan, who was arrested on spy case.

Egyptian internet service break in December 2008 and submarine data cable damage, caused by a ship anchor was blamed for the incident. Similarly, as quoted from TechEye, Tuesday (12/28/2010).

When Tareq Abdul Razzaq Hassan questioned by police about a spy case involving himself, he replied that Israeli intelligence was responsible for the incident.

Recognition is disclosed in an Egyptian newspaper, also admitted that Hassan received the money to recruit spies in Siriah and Egypt.

Recently, Israel associated with Stuxnet, a powerful computer worm that caused serious damage to Iran's nuclear program.

This is quite surprising, considering that Israel and Egypt along enough in the year 2008. Egypt is one Arab country with a fairly neutral diplomatic policy.

However, the Israelis simply 'naughty' at that time following the collapse of peace talks between Israel and the Palestinians.

source : www.okezone.com
READ MORE - Israel Ever Plough Internet Egypt?

Hide phone Prisoners In Intestine

Naivasha - An inmate at the prison Naivasha Kenya hide the phone in the gut in order to avoid prison officials raid. However, officers finally managed to find the phone after checking by X-Ray.

Until now, the prisons in Kenya banned all prisoners to bring mobile phones into the cell. To fool the officer, the prisoners often menyeleundupkan phone that is the way to hide in the stomach.


"We found a device in a body of a prisoner, so we took him to the hospital to perform surgery," said the chief town of Naivasha prison as reported by Patrick Mwenda DigitalOne, Sunday (12/26/2010).

Mwenda yet to investigate, how the phone can go into the belly of a known convict named Bernard Kosgey it.

According to the doctor who operated on Kosgey, the phone has been in the stomach Kosgey during the month.

The medical team at the hospital in the town of Naivasha, managed to lift the phone is wrapped in a plastic bag from the intestine.

Mwenda said earlier, the officer also has conducted tests with metal detectors. "Sure, we know that Kosgey carrying metal objects, but the officers did not find anything before eventually using the beam of X-Ray, and we found the device in a perutanya," said Mwenda.
READ MORE - Hide phone Prisoners In Intestine

This is the Main Enemy Hacker Wikileaks

Wikileaks repeatedly reported to have attacks of the hackers who do not like the post-its news on the site. Wikileaks considered dangerous to the United States (U.S.) for leaking a diplomatic document Uncle Sam's country.
One of the hackers who claims to have crippled the site Wikileaks is the owner of the Twitter account @ th3j35t3r (Jester). Thus was launched Hufftingtonpost on Monday (6/12/2010).
Who Jester? in the bio on Twitter account he claims he is a 'Hacktivist'. Is that post claims about the attack on Wikileaks.Jester post a series of tweets on Sundays ago and claimed it was he who made Wikileaks.org down. He also plans to make Wikileaks remains down without time limit.
In addition, FoxNews has also been reported that the Jester, who allegedly is Hacker U.S. citizenship, is the person responsible for attacks on Islamic sites, especially sites with content about jihad.
Since last year Jester built its reputation in the technology community as cybervigilante site targeting Al Qaeda and other jihadist sites. He stated that one of the known target is Iran's President Mahmoud Ahmadinejad.
Motivation Jester WikiLeaks allegedly targeted because he considered that the site was established Jullian Assange is to try to endanger the lives of U.S. troops and other U.S. assets.
"For me personally WL (WikiLeaks-red) is the target side. I am more interested in Jihad website," Jester wrote.
READ MORE - This is the Main Enemy Hacker Wikileaks

 
 
 

Follower