Latest Post

Bangalore City Police Website Hacked By Pakistani Hacker

Pakistani hacker using the codename of H4x0r10ux m1nd hacked and defaced the official website of Bangalore City Police.The hacker left the following message on the deface page,

"? Hiya Indians !!! :-*
So This Time "Banglore City Police" Website Pwned By US .....
Hey EnDians You Had a GooD Security
But Your Fckin firewalls Cant Stop Me
Govt. Of India Its Time To Repay For what you have done to our Kashmiri Brothers
You Killed Them Just Because they Support and Want to be a part of Pakistan
You Killed Many Innocent Kashmiris In The Name Of MUJAHIDDIN. Your Army Imprisoned & Killed Many Men And Children Who Protest Against Brutatilty & Stood Up for The Freedom Of Kashmir. Raped Many Innocent Women For Their Desires & After All This You Think Kashmir Is A Part Of Baharat. We Don't Think So
Also, this Hack Is A protest Of hacking Pakistani Sites By Indian KidS....
We are Sleeping Not Dead
So Back Off From Our Cyberspace
We Are H4x0r10ux M1nd | Gujjar-PCP | Connecting Friend | MadcoDe | Haxor 99 | Ch3rn0by1 | Rummy Khan | PCA PEIN | Madleets
Free Kashmir !!!!
Pakistan Will Always Remain On the Top INSHALLAh !!!
Pakistan Zinda Bad !!!
-=- You Have Been Hacked By -=- H4x0r10ux M1n[) -=-
-=- ./Logout =-
ExPecT Me
Never forgive
Never Forget

By the time of publishing, the website was still holding the deface page.Mirror has been provided below.


Samsung Galaxy S5 Fingerprint Reader Hacked [Video]

Security researchers from SRLabs posted a video on YouTube demonstrating how they tricked the scanner with a fake fingerprint made of wood glue.They stated in the video that the same approach was used in the iPhone 5s Touch ID last year.According to the researchers, fingerprints left by the owner on the phone can be snapped with a camera giving an image of sufficient quality to print a usable mold.The wood glue is then poured into it and the replica received is then swiped on the scanner.After authentication, the attacker can use sensitive application on the phone,such as PayPal. The video below shows how the security researcher managed to trick the fingerprint scanner and uses PayPal.
PayPal responded to this video by issuing the following statement,
"PayPal never stores or even has access to your actual fingerprint with authentication on the Galaxy S5. The scan unlocks a secure cryptographic key that serves as a password replacement for the phone. We can simply deactivate the key from a lost or stolen device, and you can create a new one. PayPal also uses sophisticated fraud and risk management tools to try to prevent fraud before it happens. However, in the rare instances that it does, your eligible transactions are covered by our buyer protection policy."

Source:[Android Community]

Teenagers Claiming To Be Part Of Anonymous Arrested in South Korea

Three persons were arrested by the South Korean National Police Agency's Cyber Terror Response Center on Wednesday.They posted a video on YouTube stating that Anonymous will be attacking Government website on April 14.
According to the police, two of them are teenagers,Kang who is 17 and Bae 14. The third is a university student of 23.The police added that they do not have any hacking skills and were arrested for threatening.
Kang told the police that he is a member of Anonymous but the police became suspicious when Anonymous denied that there are any plans to attack South Korea government websites.

Video Posted

Source:[Click Here!]

Nigerian Government Launches Computer Emergency Readiness and Response Team ( Ecosystem

Last Tuesday, the Nigerian government launched the Computer Emergency Readiness and Response Team(CERRT). Its main objective is to provide support in handling cyber security incidents.
Dr. Ashiru Daura, acting Director General of Nigeria’s National Information Technology Development Agency (NITDA) said at the launch in Abuja that the Ecosystem is funded by the NITDA with the objective of being a trusted intermediary organisation dedicated in providing support in cyber security incidents.
He also said,
'NITDA in keeping to its mandate looks forward to sharing the cyber related policy templates it has, encouraging interested local organisations and groups to participate in hands on global cyber-drills and focusing on empowering our youth with the knowledge and tools to develop a home grown Cyber Security Solutions industry' has three main components:
  • The Fusion Centre which will monitor the cyberspace activities
  • The Awareness/Training/Liaison Communications which will bring cyber security awareness to the Nigerian and,
  • The cyber-forensic lab to analyse incidents.


Beware of Heartbleed Spam

Users are being advised to stay alert because cybercriminals are taking advantage of the heartbleed vulnerability to get victims. They did this using their old technique, that is, spamming. Rob VandenBrink from SANS Institute published a reminder to warn users to be on their guard. He stated that he started receiving emails asking him to change his password on services where he does not have any accounts. These emails had helpful links, back-ended by malware or credential harvesting.
He is also advising users not to click on links in emails,
" Helpful emails with links in them are in most cases NOT helpful.  Don't click that link!
If it's legitimate, and especially this week, by all means browse to the affected site and change your password.  That's always a good idea.  But following an email link to a password change page is a good way to get your credentials stolen, or a good way to pick up a nice "gift" of malware.

What is The Heartbleed Bug?
This flaw was discovered by Neel Mehta of Google Security on Monday [07 Apr 2014].
"The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).
The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.

We advise all our readers concerned to apply the fix released.

Rob VandenBrink Advisory:[Click Here!]
Heartbleed Description:[Click Here!]

Nargis Fakhri Official Website Defaced By Pakistani Hackers

Pakistani hackers using the codename "ArYaNZ KhaN" and "H4$N4!N H4XOR" defaced the official website of Bollywood actress Nargis Fakhri.She announced the launching of her website through her official Facebook fan page. And just after one hour, the hacker announced the defacement.

By the time of publishing, the website was already restored. A mirror of how the website was at the time of defacement has been provided below.
Website defaced:


Fake Antivirus Application Removed From Google Store

Researchers from Android Police are those who discovered about this fake antivirus, named, "Virus Shield". Within some weeks, the application was already #1 in the store and cost $3.99. This application reached over 10,000 downloads and was rated 4.7 stars.This application did nothing except changing the 'cross' image into a 'tick' when a user clicked the enable button. The developer made a huge amount of money with this fake security application. Users can also report fake application via the link below and we advise all readers to download and use applications from trusted and known publishers.
Researchers from Android Police have decompiled the application to show how the fake antivirus worked. They even provided a download link for the source code on their Blog for those who wanted to cross check.
Report Inappropriate Applications:[Click Here!]
Read More From Source:[Android Police Blog]


5-Year-Old Boy Discovered Vulnerability In Xbox [Video]

Kristoffer Von Hassel, a five year old boy from Ocean Beach, California, discovered a vulnerability in Microsoft Xbox last month (March). Some simple steps helped the little boy get access to his father's account. He first entered a wrong password 3 times. He was then sent on the password verification screen. There, he typed a series of space keys and hit enter. He was in.
The vulnerability was patched after both father and son reported it to Microsoft. The little boy's name was listed in the March 2014 Security Researcher's list. After that, on the April 2, his father published a video on YouTube showing how his son was logging in his Xbox live account to play games.


Egyptian Military And Government Websites Defaced

A hacker using the codename of "YMH" defaced three websites, that of the Egyptian Armed Forces Training Authority, Tourist Development Authority of Egypt and that of Military Technical College.The same deface page was uploaded on each website, on which a message in Arabic language was written.
Translated Message:
Owned by Ymh! We don’t know with whom to fight, el sisi or the Muslim Brotherhood, leave all the politics behind and enjoy yourselves a little with the tea of Om Hasan ( symbol of the reversed revolution)"

At the time of publishing, all three websites were already restored.

Websites Defaced: Egyptian Armed Forces Training Authority  Tourist Development Authority of Egypt Military Technical College



Hackers Are After Journalists

BlackHat Conference Official Website

Two Google researchers, Shane Huntley and Morgan Marquis-Boire, reported that 21 of the top 25 news organisations in the world have been victims of hackers. These hackers either work for, or support, a government. The two researchers have been talking about this on Friday at the Black Hat hackers conference in Singapore.

Huntley told Reuters:
"If you're a journalist or a journalistic organization we will see state-sponsored targeting and we see it happening regardless of region, we see it from all over the world both from where the targets are and where the targets are from,"

Marquis-Boire said that these attacks normally come through emails and according to him, this is only the "the tip of the iceberg" because state sponsored hackers can find several other ways to attack journalists.

Read More From Reuters: [Click Here!]
Support : MauriHackerS | Personal Template | Smoker
Copyright © 2012. MauriHackers - All Rights Reserved
Template Created by Creating Website Powered by Hackers
Proudly powered by Hackers