Saturday 5 October 2013

Seized $3.5 Million worth Bitcoins from Silk Road will be deposited in the U.S. Treasury


Ross Ulbricht, the recently arrested mastermind behind Silk Road, appeared in court yesterday where his lawyer begged for more time before the detention hearing.

As the Protective Order states, The United States is further authorized to seize any and all Bitcoins contained in wallet files residing on silk road servers and can transfer the full account balance in each silk road wallet to a public Bitcoin address controlled by the United States.
Right now the FBI must be feeling pretty good too, because a federally controlled Bitcoin account , renamed as "Silkroad Seized Coins" now contains over $3.5 million worth of the digital currency, seized from Silk Road over 26,000 Bitcoins.

Facebook Graph Search becomes more powerful than ever, Review your Privacy Settings again

Facebook Graph Search is more powerful than ever, has been updated to allow people to search in greater depth on Facebook. 

Facebook expanded its Graph Search to include posts and status updates, which means everything you’ve been posting is way easier to find than ever before.
"Now you will be able to search for status updates, photo captions, check-ins and comments to find things shared with you,” says Facebook.

Crazy notepad trick to continuously Popout cd тґαy


Open Notepad and Type :
Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count -1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count -1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop


Save it as “cdtray.VBS” and send it.


Friday 4 October 2013

Simple WEP Cracking

1 Introduction


This tutorial will show you how to crack a depreciated, but still used, wireless encryption algorithm called Wired Equivalent Privacy (WEP). WEP was introduced in 1997 and was designed to provide the user with a secure connection comparable to that of traditional wired networks. But sometime in 2001 weaknesses where beginning to show and in 2004 WEP was declared depreciated due to the fact that it was unable to meet its security goals.

2 Implementation


This tutorial is written for users of Linux, you may be able to follow along using Microsoft Windows, make sure to check the aircrack-ng website. (http://www.aircrack-ng)


This tutorial is written with the then current version of aircrack, 1.0. Download and compile the aircrack tools or use you download manager, search aircrack-ng, it should be easy to do. Once that is done check it is working by typing “aircrack-ng” you should have a output that looks something like this:

GOKU@Nyu:~$ aircrack-ng

Aircrack-ng 1.0 rc3 – (C) 2006, 2007, 2008, 2009 Thomas d’Otreppe
Original work: Christophe Devine
http://www.aircrack-ng.org
etc ..

There will be four scripts from aircrack-ng that you will be using:

airmon-ng <start|stop|check> <interface> [channel or frequency]
Script used for switching the wireless network card to monitor mode

airodump-ng <options> <interface>[,<interface>,...]
Script used for WLAN monitoring and capturing network packets

aireplay-ng <options> <replay interface>
Script used to generate additional traffic on the wireless network

aircrack-ng [options <.cap /.ivs file(s)>
Script used to recover the WEP key, or launch a dictionary attack on WPA-PSK using the captured data.

You will need to know some basic Linux networking commands.

iwconfig [-v] [-a] [-s] [interface]
This is a standard Linux command it will display the status of the currently active interfaces. If a single interface is given it will display only that interfaces status.

-v Be more verbose for some error conditions
-a Displays all interfaces which are currently available, even if down
-s Displays a short list (like netstat -i)

Thursday 3 October 2013

QuickPic 3.0.3 : best photo gallery




The best photo gallery and picture browser&viewer in Android, more quick and clear, just as millions of users say!1. View and slide show with best quality, more clear than other apps.
2. Quick browsing tons of pictures, quick find all your pictures, without background service.
3. Include or exclude the specified folders to make more efficient scanning.
4. Easy hide your photos and videos from the gallery apps, protect them with a password.
5. Play animated-GIFs and standard videos.
6. Smooth experience: sliding shift or switch, single or double tap or pinch to zoom.
7. Rotate, shrink, crop pictures, set wallpaper with best quality.
8. More file management features: sort, rename, create new folder, move and copy pictures.
9. Optimized for HD tablets
10. It is free and no ads!

HTC users:
You can not share a photo to MMS again, HTC don’t allow a third app to do this again, please report it to HTC!
There are hundreds of phones/tablets running Android, I am always doing my best to make my app working fine on every device. So, if you find any issue, before you post useless comments or rating, please try to send email to me, I will help you to fix it.
Tips:
Please BACKUP YOUR IMPORTANT PHOTOS before your do file operations!
Long press a thumbnail to move/copy to another or new folder. Enter multi-select mode to find the batch operations.
Include the picture folders only in the settings to speed up the scanning.
Can’t sync Picasa or Facebook or other web albums.
Can’t show TIFF.
Can’t set lock screen’s wallpaper because of private interface.
Show 3D photos(MPO,JPS) with 2D mode.
Reinstall the app to clear your password.
Video is no my target, if you think video playing is not good enough, please go to the market and find a good one…
DOWNLOAD LINK : QuickPic 3.0.3

Sunday 29 September 2013

FBI arrested 19-Year-old Hacker for Sextortion; allegedly Hacked into Miss Teen USA's Webcam

A College 19-year-old college student and Hacker from Temecula, California has been arrested for hacking the webcams of Miss Teen USA 'Cassidy Wolf' and other women to extort nude photos and videos from them.

Earlier this year Cassidy Wolf received an anonymous email in which the sender claimed to have stolen images from the camera on her home computer. According to the complaint, he threatened to turn her "dream of being a model ... into a pornstar."
Jared James Abrahams, 19 years-old man forced several women to strip. Based on an investigation launched in March the FBI raided THE suspect's home in June, seizing computers, cell phones and hacking software.

Exclusive : New Touch ID hack allows hacker to unlock an iPhone by multiple fingerprints

The Iranian group defeated the very basic phenomenon of an iPhone Fingerprinting scanner, which allows them to unlock an iPhone device with multiple Fingerprints.

Apple‘s iPhone 5s, was launched just available in stores two weeks before with a new feature of biometrics-based security system called "Touch ID", that involves analyzing a user’s fingerprint and using that to unlock the phone.

Apple launched the technology that it promises will better protect devices from criminals and snoopers seeking access. With this you can purchase things from the iTunes App Store. Basically, you can now use it in place of your password.

"Fingerprint is one of the best passcodes in the world. It's always with you, and no two are exactly alike," according to the Apple's website.

Last week Germany Hackers showed that how they were able to deceive Apple’s latest security feature into believing they’re someone they’re not, using a well-honed technique for creating a latex copy of someone's fingerprint.
Another interesting fact is that, Touch ID is not only designed to scan the fingerprints of your fingers, it works with various human body parts and appendages which are also not fingers.

Chinese APT Espionage campaign, dubbed 'Icefog' targeted Military contractors and Governments

Kaspersky Lab has identified another Chinese APT campaign, dubbed ‘Icefog’, who targeted Governmental institutions, Military contractors, maritime / shipbuilding groups, telecom operators, industrial and high technology companies and mass media.

The Hacking group behind the attack who carry out surgical hit and run operations, is an advanced persistent threat (APT) group, used a backdoor dubbed Icefog that worked across Windows and Mac OS X to gain access to systems.
"The Mac OS X backdoor currently remains largely undetected by security solutions and has managed to infect several hundred victims worldwide," the report (PDF) said.

16-Year-Old Teenager arrested for World's biggest cyber attack ever

16-Year-Old Teenager has been arrested over his alleged involvement in the World's biggest largest DDoS attacks against the Dutch anti-spam group Spamhaus.

The teenager, whose name is unknown at this point, was arrested by British police in April, but details of his arrest were just leaked to the British press on Thursday.

He was taken into custody when police swooped on his south-west London home after investigations identified significant sums of money were flowing through his bank account. The suspect was found with his computer systems open and logged on to various virtual systems and forums.

The March 20 attack on Spamhaus has been dubbed as the “biggest cyber attack in the history of the Internet” which saw server of the Dutch anti-spam organization being bombarded with traffic in tune of 300 billion bits per second (300Gbps).

Hacker sold personal data of 4 million US citizens online; risk of potential Identity Theft

An illegal service that sells personal data of US citizens online, which can then be used for identity theft hacked into the networks of three major data brokers and Hacker stole their databases.

Cyber attack has given them access to Social Security Numbers, dates of birth, and other personal details that could put all our finances at risk.

Krebs's blog revealed that the service, known as SSNDOB (ssndob.ms) (Social Security Number Date of Birth) used malware to obtain secret access to the databases of LexisNexis, Dun & Bradstreet and Kroll Background America.
Hackers are charging from 50 cents to $2.50 per record and from $5 to $15 for credit and background checks. It was discovered in March that another website, exposed.su was using data collected by SSNDOB to sell to its customers.

Mailbox iPhone app vulnerability executes any Javascript from HTML mail body

Italian Researcher Michele Spagnuolo recently revealed a serious vulnerability in the popular Mailbox iPhone app.

Mailbox is a tidy iOS the email app recently purchased by Dropbox, has a pretty wide-open hole that could allow bad actors to hijack your device.
The flaw occurs in the latest version of Mailbox (1.6.2) currently available from the App Store, that executes any Javascript which is present in the body of HTML emails.

With exploitation of this vulnerability, users could be subject to account hijacking, spam and phishing attacks by simply opening an HTML email containing embedded javascript.

22 years-old Chartered Accountant student hacks into Celebrities E-taxation Accounts

Last week a 21-year-old chartered accountant student from Hyderabad was arrested for hacking into E-taxation Account of Industrialist Anil Ambani.

During the probe Mumbai Police’s crime branch has emerged that Anil Ambani's account was also fraudulently accessed from Noida.
After investigation, Police were able to track another CA student who not only accessed Ambani's account, but also of popular cricketers and film stars including Sachin Tendulkar, MS Dhoni, Shah Rukh Khan and Salman Khan.

22 years-old CA student named, Sanchit Katiyal -- who is doing his articleship at Vishal Kaushal Company, an accountancy firm in Noida, had hacked into Ambani’s account on 26th June. His computer and hard disks were seized by Cyber Crime Cell.

He first accessed the accounts of Shah Rukh and Salman on 22nd June, Dhoni’s account on 24th June and then broke into Ambani’s account. He again accessed Dhoni's account on June 28, and Tendulkar's on July 4.

Thousands of Wordpress blogs compromised to perform DDOS attack

There is currently a Mega cyber attack campaign being launched on a large number of WordPress websites across the Internet. 

In April, 2012 we reported about a large distributed brute force attack against millions of WordPress sites were occurring, out of that hackers are successful to compromise 90,000 servers to create a large Botnet of Wordpress hosts.

According to the DDOS attack logs report received from a 'The Hacker News' reader 'Steven Veldkamp', victim's website was under under heavy DDOS attack recently, coming from various compromised Wordpress based websites.

Possibly using the brute force attack on WordPress administrative portals with the a world list of the most commonly used username and password combinations, attackers are taking control of many poorly secured WordPress Hosts.