Asia Pacific Telecommunity Portal Hacked By Anonymous in Protest Against Censorship In Asia (Database Leaked)

Anonymous hackers have defaced and leaked database of Asia Pacific Telecommunity Portal( to protest against censorship in Asia. On the defacement page, they posted a YouTube video of the Electronic Frontier Foundation. At the time of publishing, the website was still holding the defacement page. Database from the website has been uploaded on

Defaced Page:

Video Posted on Defaced Page:

What is Electronic Frontier Foundation?
The Electronic Frontier Foundation is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. We work to ensure that rights and freedoms are enhanced and protected as our use of technology grows.

New HTTP Error Code 451: Unavailable For Legal Reasons

A new error code has joined the 400 family, 451. The 451 HTTP code lets you know that you are not seeing what you want to see because it has been blocked for legal reasons.

Mark Nottingham, chair of the IETF HTTP Working Group, wrote on his blog that Tim Bray brought this draft to the HTTP Working Group some time ago because Tim and many others thought that it was important to show online censorship because "the 403 status code says "Forbidden", but it doesn't say "I can't show you that for legal reasons." " This was pushed back.

Later, with the rise of online censorship, many sites began to adopt the code for experiment and more wanted to let people know that the content were blocked due to legal reasons. Among them was, Lumen, a database that collects and analyzes legal complaints and requests for removal of online materials and Article19, which works on behalf of freedom of expression. As a result, on Friday the 18th December 2015, the IESG approved publication of 451, the formal name for which is "An HTTP Status Code to Report Legal Obstacles".

"In some jurisdictions, I suspect that censorious governments will disallow the use of 451, to hide what they're doing. We can't stop that (of course), but if your government does that, it sends a strong message to you as a citizen about what their intent is. That's worth knowing about, I think." :concluded Mark Nottingham in his blog post

Source:[Click Here!]

Crashing WhatsApp By sending A Huge Amount of Emojis

Security researcher Indrajeet Bhuyan has discovered another issue in WhatsApp messenger. The first bug was discovered last year where he discovered that by sending text messages of few thousands work, WhatsApp would crash on desktop and Android version whereas on iOS it would freeze for a short time. This bug was later patched by WhatsApp.

This time Mr Bhuyan discovered a flaw which can be used to crash WhatsApp mobile app and whastapp Web ( which is the PC version of the same ).
According to Mr Bhuyan, WhatsApp web allows 65500-6600 characters and after typing around 4200-4400 smiley, the browser starts to slow down. Since the limit of characters allowed is not reached, the attacker can continue inserting. When a user receives the message, it will overflows the buffer and crashes WhatsApp.


Cybercriminals Increasingly Targeting Apple Products

In one of its annual threat landscape reports, security firm Symantec stated that there has been a rise in malware targeting Apple operating system, both Mac OS X and iOS. With the increased popularity in recent years, attackers have begun developing more malware to infect Apple products. The threats have not only grown in numbers but have also diversified.
In 2013 Symantec did not detect any new malware targeting iOS but in 2014, three new threats were detected and seven in the first 9 months of 2015. A full list of all the threats targeting iOS and Mac OS can be found in the report below.

Download full report [Here!]

Underwear Thief Used Social Media Location Data To Find Victim's Home

Arturo Galvan, a 44 year old man from Los Angeles, has been using social media websites Instagram to find out where his victims lived, to steal their computer, iPads, panties and bras.

Galvan identified his victims by hanging out on public gathering places in Fullerton and Orange and searched for social media posts where people 'checked in'. He then allegedly searched through the victim's posted pictures through GPS data attached to the digital images and mapped them to find out where they live.

At his place, a garage-full of stolen items consisting of bras, panties and electronic devices were found. He was arrested last week and faces charges of burglary, receiving stolen property, and peeping and prowling. Galvan was released from jail Saturday after posting bail of $200,000.

Readers, do check your social media accounts and apps settings for your privacy.

Read More: [Fullerton Police]

Google Patches 19 Vulnerabilities in Latest Android Update

On Monday Google released its December Nexus Security Bulletin,in which, 19 bugs were addressed. This updates is for builds LMY48Z or later and Android Marshmallow.

The 4 critical vulnerabilities are:
  • Remote Code Execution Vulnerability in Mediaserver(CVE-2015-6616)
  • Remote Code Execution Vulnerability in Skia(CVE-2015-6617)
  • Elevation of Privilege in Kernel(CVE-2015-6619)
  • Remote Code Execution Vulnerabilities in Display Driver(CVE-2015-6633/CVE-2015-6634)

The 12 high vulnerabilities are:
  • Remote Code Execution Vulnerability in Bluetooth(CVE-2015-6618)
  • Elevation of Privilege Vulnerabilities in libstagefright(CVE-2015-6620)
  • Elevation of Privilege Vulnerability in SystemUI(CVE-2015-6621)
  • Elevation of Privilege Vulnerability in Native Frameworks Library(CVE-2015-6622)
  • Elevation of Privilege Vulnerability in Wi-Fi(CVE-2015-6623)
  • Elevation of Privilege Vulnerability in System Server(CVE-2015-6624)
  • Information Disclosure Vulnerabilities in libstagefright(CVE-2015-6626/CVE-2015-6631/CVE-2015-6632)
  • Information Disclosure Vulnerability in Audio(CVE-2015-6627)
  • Information Disclosure Vulnerability in Media Framework(CVE-2015-6628)
  • Information Disclosure Vulnerability in Wi-Fi(CVE-2015-6629)

The two moderate vulnerabilities are:
  • Elevation of Privilege Vulnerability in System Server(CVE-2015-6625)
  • Information Disclosure Vulnerability in SystemUI(CVE-2015-6630)

We advise our readers who are using affected devices to apply the patches as soon as they receive it.

Source:[Click Here!]


Free counters!

Receive all updates via Facebook. Just Click the Like Button Below...

Powered By MauriHackerS


MauriHackerS - Providing Latest IT Security and Hacking News !