Latest Post

Teenagers Claiming To Be Part Of Anonymous Arrested in South Korea

Three persons were arrested by the South Korean National Police Agency's Cyber Terror Response Center on Wednesday.They posted a video on YouTube stating that Anonymous will be attacking Government website on April 14.
According to the police, two of them are teenagers,Kang who is 17 and Bae 14. The third is a university student of 23.The police added that they do not have any hacking skills and were arrested for threatening.
Kang told the police that he is a member of Anonymous but the police became suspicious when Anonymous denied that there are any plans to attack South Korea government websites.

Video Posted

 
 
Source:[Click Here!]
 

Nigerian Government Launches Computer Emergency Readiness and Response Team (CERRT.ng) Ecosystem

Last Tuesday, the Nigerian government launched the Computer Emergency Readiness and Response Team(CERRT). Its main objective is to provide support in handling cyber security incidents.
Dr. Ashiru Daura, acting Director General of Nigeria’s National Information Technology Development Agency (NITDA) said at the launch in Abuja that the CERRT.ng Ecosystem is funded by the NITDA with the objective of being a trusted intermediary organisation dedicated in providing support in cyber security incidents.
He also said,
'NITDA in keeping to its mandate looks forward to sharing the cyber related policy templates it has, encouraging interested local organisations and groups to participate in hands on global cyber-drills and focusing on empowering our youth with the knowledge and tools to develop a home grown Cyber Security Solutions industry'

CERRT.ng has three main components:
  • The Fusion Centre which will monitor the cyberspace activities
  • The Awareness/Training/Liaison Communications which will bring cyber security awareness to the Nigerian and,
  • The cyber-forensic lab to analyse incidents.

Source:[AfricaTime]
 

Beware of Heartbleed Spam

Users are being advised to stay alert because cybercriminals are taking advantage of the heartbleed vulnerability to get victims. They did this using their old technique, that is, spamming. Rob VandenBrink from SANS Institute published a reminder to warn users to be on their guard. He stated that he started receiving emails asking him to change his password on services where he does not have any accounts. These emails had helpful links, back-ended by malware or credential harvesting.
He is also advising users not to click on links in emails,
" Helpful emails with links in them are in most cases NOT helpful.  Don't click that link!
If it's legitimate, and especially this week, by all means browse to the affected site and change your password.  That's always a good idea.  But following an email link to a password change page is a good way to get your credentials stolen, or a good way to pick up a nice "gift" of malware.
"

What is The Heartbleed Bug?
This flaw was discovered by Neel Mehta of Google Security on Monday [07 Apr 2014].
"The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).
The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.
"

We advise all our readers concerned to apply the fix released.

Sources:
Rob VandenBrink Advisory:[Click Here!]
Heartbleed Description:[Click Here!]
 

Nargis Fakhri Official Website Defaced By Pakistani Hackers

Pakistani hackers using the codename "ArYaNZ KhaN" and "H4$N4!N H4XOR" defaced the official website of Bollywood actress Nargis Fakhri.She announced the launching of her website through her official Facebook fan page. And just after one hour, the hacker announced the defacement.

By the time of publishing, the website was already restored. A mirror of how the website was at the time of defacement has been provided below.
Website defaced:
http://nargisfakhri.com/
Mirror:

 

Fake Antivirus Application Removed From Google Store

Researchers from Android Police are those who discovered about this fake antivirus, named, "Virus Shield". Within some weeks, the application was already #1 in the store and cost $3.99. This application reached over 10,000 downloads and was rated 4.7 stars.This application did nothing except changing the 'cross' image into a 'tick' when a user clicked the enable button. The developer made a huge amount of money with this fake security application. Users can also report fake application via the link below and we advise all readers to download and use applications from trusted and known publishers.
Researchers from Android Police have decompiled the application to show how the fake antivirus worked. They even provided a download link for the source code on their Blog for those who wanted to cross check.
Report Inappropriate Applications:[Click Here!]
Read More From Source:[Android Police Blog]

 

5-Year-Old Boy Discovered Vulnerability In Xbox [Video]

Kristoffer Von Hassel, a five year old boy from Ocean Beach, California, discovered a vulnerability in Microsoft Xbox last month (March). Some simple steps helped the little boy get access to his father's account. He first entered a wrong password 3 times. He was then sent on the password verification screen. There, he typed a series of space keys and hit enter. He was in.
The vulnerability was patched after both father and son reported it to Microsoft. The little boy's name was listed in the March 2014 Security Researcher's list. After that, on the April 2, his father published a video on YouTube showing how his son was logging in his Xbox live account to play games.


 

Egyptian Military And Government Websites Defaced

A hacker using the codename of "YMH" defaced three websites, that of the Egyptian Armed Forces Training Authority, Tourist Development Authority of Egypt and that of Military Technical College.The same deface page was uploaded on each website, on which a message in Arabic language was written.
Translated Message:
Owned by Ymh! We don’t know with whom to fight, el sisi or the Muslim Brotherhood, leave all the politics behind and enjoy yourselves a little with the tea of Om Hasan ( symbol of the reversed revolution)"

At the time of publishing, all three websites were already restored.

Websites Defaced:
http://www.mcf.mil.eg/ Egyptian Armed Forces Training Authority
http://www.tda.gov.eg/  Tourist Development Authority of Egypt
http://www.mtc.edu.eg/ Military Technical College

Mirrors:

Source:[HackRead]
 

Hackers Are After Journalists

BlackHat Conference Official Website

Two Google researchers, Shane Huntley and Morgan Marquis-Boire, reported that 21 of the top 25 news organisations in the world have been victims of hackers. These hackers either work for, or support, a government. The two researchers have been talking about this on Friday at the Black Hat hackers conference in Singapore.

Huntley told Reuters:
"If you're a journalist or a journalistic organization we will see state-sponsored targeting and we see it happening regardless of region, we see it from all over the world both from where the targets are and where the targets are from,"

Marquis-Boire said that these attacks normally come through emails and according to him, this is only the "the tip of the iceberg" because state sponsored hackers can find several other ways to attack journalists.

Read More From Reuters: [Click Here!]
 

Arrested For Insulting The Mauritian Prime Minister On Facebook

A 28 year old male nurse, Gauravsing Bagwan, has been using a fake Facebook profile to insult the Prime Minister of Mauritius.This young man has been doing this for over seven months by using the name of "Girish Baboo". The cybercrime unit was able to arrest the young man today, 27th March 2013, by tracing his IP address. Mr Bagwan's computer was seized for investigation purposes.
A provisional charge of "using an information and telecommunications services for the purpose of causing inconvenience" was retained against him.The police objected to his release on bail.
Source:[L'Express]
 

Tumblr Increases Security With Two-Factor Authentication

Tumblr added two-factor authentication method for its users. This will help in keeping hackers away. In this new system, users will need their mobile phone while accessing their account. When a user needs to sign in, Tumblr will send a code to his/her mobile phone to verify the identity of the account owner.The user will have to put this code in the space provided on the log-in page. To be able to use this new feature,the user will have to enable  this his/her account settings.
By implementing this security system, Tumblr in now in-line with other services like Gmail, Dropbox, Facebook, Twitter, etc..

Source:[Tumblr]
 
 
Support : MauriHackerS | Personal Template | Smoker
Copyright © 2012. MauriHackers - All Rights Reserved
Template Created by Creating Website Powered by Hackers
Proudly powered by Hackers