SlideShare a Scribd company logo
1 of 15
Download to read offline
NEWS Bytes
Rahul Arun
15 Goa Government Websites hacked
by Pakistani Hacker "H4x0r HuSsY”
A Hacker with Handle "H4x0r HuSsY" from
Pakistan has managed to take control of few
Indian Government websites and has
defaced them. All of the hacked websites
are belong to Goa State
The affected websites includes NRI Commission of
Goa(nri.goa.gov.in), Directorate of Agriculture
(www.agri.goa.gov.in), Directorate of Art and Culture
(artandculture.goa.gov.in/uploads/index.html), Department of
Information and Publicity
(artandculture.goa.gov.in/uploads/index.html) ,Directorate of
Fire & Emergency Service (goadfes.gov.in/media/index.php),
Goa Dental College (gdch.goa.gov.in), Government Printing
Press & Stationery (goaprintingpress.gov.in).
City of Mobile Police Hacked &
Data Leaked by Turkish Ajan
While it's been widely speculated that
the notorious computer worm Stuxnet
was the result of partnership between
US and Israel, the famous NSA
Whistleblower "Edward Snowden" has
confirmed it. Stuxnet was a highly-
complex malware discovered in 2010,
used as cyber weapon against the
Iran's nuclear program..
Snowden answered a few interesting questions in an Interview had
with Germany's Der Spiegel Magazine.When Interviewer asked
about the NSA involvement in Stuxnet, Snowden confirmed that
saying "NSA and Israel co-wrote it“.When asked about German
authorities involvement in NSA surveillance system, Snowden
confirmed that saying "Yes, of course. We're 1 in bed together with
the Germans the same as with most other Western countries.".
Anonymous Hackers Breach Systems of
Spain’s People’s Party, Leak Documents
Anonymous hackers have defaced the
official website of Spain’s People’s
Party (Partido Popular), the country’s
governing party. In addition
to defacing the website – which has
been restored –, the hacktivists have
also leaked 5 gigabytes of documents
that allegedly represent the party’s
financial accounts from 1990 to 2011.
Darknet.in reports that the party refused to release the documents after a
judge overseeing a political corruption scandal asked to see them. The
information has been posted on torrent sites, blogs and other websites so
that citizens can analyze it. According to a video statement published by
the hackers a couple of days ago, the documents show that the People’s
Party has used public money to buy expensive cars, a pony and other
items.The hacktivists are displeased with the fact that the party keeps
talking about austerity and cuts while it “robs” the people.
Mobile malware grows by 614 %
Mobile malware creators and
smartphone makers seem to be in a
neck-and-neck software race, but new
data shows that the malware creators
could be taking the lead.
Juniper Networks released its third annual Mobile Threat Report on
Tuesday and the findings aren't pretty. Mobile malware grew at a
rate of 614 percent from March 2012 to March 2013 -- that's equal to
276,259 malicious apps floating around out there. Last year, the
increase was amere 155 percent.
The report is based on an analysis of more than 1.85 million mobile
apps and vulnerabilities across major mobile operating systems.
in last year
WellPoint takes $1.7 million hit
over HIPAA slip
WellPoint, a managed health care giant,
agreed to pay $1.7 million to the U.S.
Department of Health and Human Services
for violating HIPAA regulations. HIPAA, the
Health Insurance Portability and
Accountability Act of 1996, is a set of rules to
maintain patient privacy.
These fines may also pick up given that HIPAA liability will extend to
business partners that receive and store health information. HIPAA will
extend to contractors and subcontractors on Sept. 23.
According to the HHS, WellPoint left patient health data accessible to
unauthorized users over the Internet. The HHS began its WellPoint
investigation following a data breach report.
Kremlin finds way to avoid
leaks:Typewriters
Dust off your Olivetti.
It might be the future. The future of national
security, at least.
This quaint thought comes to mind as the result
of news emerging from the inner bowels of the
Kremlin.
So the Kremlin has started ordering typewriters. Lots
of them. Indeed, the Telegraph, relying on sources
at Russia's Federal Guard Service, says that about
$15,000 is being spent to purchase new electronic
typewriters.
Cyberattack on South Korea was part
of 4-year spying campaign
"Our analysis of this attack -- known first as Dark Seoul and now as
Operation Troy -- has revealed that in addition to the data losses of
the MBR wiping, the incident was more than cybervandalism,"
McAfee's report reads. "The attacks on South Korean targets were
actually the conclusion of a covert espionage campaign."
South Korea has been under a concerted
cyberattack for the last four years, according to
a comprehensive new report (PDF) released
Monday by security firm McAfee. That means
the hack that crippled three TV broadcasters
and two banks in March was possibly just the tip
of the iceberg.What has been the goal of these
hackers? To steal South Korean government
and military secrets, according to McAfee.
Secunia and VLC get into
Fight overVulnerability report
Secunia and VLC Team got into a hot argument
after Secunia set the patch status of their VLC
vulnerability report to "UnPatched". At the end of
last year, Secunia team reported a vulnerability
(SA51464) in VLC version 2.x.The root cause of the
vulnerability lies in the underlying FFmpeg library,
which VLC statically links to. It was reported that the
vulnerability was caused due to a buffer overflow
issue when parsing SWF files, which was incorrect.
When the VLC team came to know about the issue they tried to
fix it but they missed the root cause and didnot solve the core
problem. They released the next VLC version and claimed it to
be safe but this was not the case as said by Secunia team. The
VLC team kept on releasing the version from 2.0.5 to 2.0.7 and
claimed that the vulnerability was fixed -
Pakistani Google,Yahoo, Apple,
Microsoft hacked by Turkish Hacker
group Eboz A Turkish hacker group called Eboz has hacked
and defaced Pakistani high profile websites
which includes Search Engine giant Google,
Yahoo, Microsoft and Apple, Visa, HSBC, Coca
Cola, Blogspot, Sony, HP, eBay and PayPal .
The hackers has defaced Google.pk,
Google.com.pk, Yahoo.pk, Apple.pk,
Microsoft.pk and 279 other sites in Pakistan
It seems like hackers compromised the Pakistan's TLD operator PKNIC
which administers and registers all .pk domains. Hackers modified the
DNS servers records such that it points to some other server, points to
two nameservers, dns1.freehostia.com and dns2.freehostia.com
Convicted Hacker Says He
Committed Credit Card Heist for
U.S. Government
The hacker who orchestrated the biggest computer crime
operation in U.S. history is alleging that the American
government authorized him to do so. Last year, 29-year-old
Albert Gonzalez pleaded guilty to hacking into computer
systems at TJX, Office Max, Dave & Busters, Heartland
Payment Systems and other companies, in order to steal
some 130 million credit card numbers. He received a 20-year
prison sentence, which he's currently serving at a low-security
facility in Michigan.
"I still believe that I was acting on behalf of the United States
Secret Service and that I was authorized and directed to
engage in the conduct I committed as part of my
assignment to gather intelligence and seek out international
cyber criminals," Gonzalez wrote. "I now know and
understand that I have been used as a scapegoat to cover
someone's mistakes."
ITV News Twitter account hacked
by Syrian Electronic Army
British broadcaster ITV on Friday
became the latest media outlet to
have one of its Twitter feeds hacked by
anonymous supporters of Syria's
President Bashar al-Assad, just days
after Twitter beefed up security to
prevent such attacks.
ITV's London news Twitter account @itvlondon was hijacked on Friday
afternoon and used to promote spoof stories about Syrian rebels,
before the hackers tweeted "Just kidding. The Syrian Electronic Army
was here. #SEA via @Official_SEA12."
the security breach was triggered by a phishing email.
Netherlands Domain Registrar
SIDN websites hacked via SQL
Injection
Unknown hackers have penetrated into the Netherlands Top
domains registrar(.nl) SIDN and placed malicious files in a number of
SIDN sites.
According to official statement, hackers have managed to breach
the site by Exploiting a SQL Injection vulnerability in 25jaarvan.nl. To
prevent further attack the organization shut down the web
application and temporarily suspended the zone file publication. "As
a result of our precautionary action, some areas of the website that
registrars use to download registrar ship-related data have been
unavailable since Tuesday". In an email to registrars, SIDN reports the
login credentials of Registrars' site have also been compromised in
the Security breach.
Sources:
www.news.softpedia.com
www.ehackingnews.com
www.thehackernews.com
Thank You…

More Related Content

What's hot

How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
Michael Soltys
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
AnonDownload
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
Ed Alcantara
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
Beza Belayneh
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
sunnysmith
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
Gavin O'Toole
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
Jenny O'Meara
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
Raj Goel
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11
captsbtyagi
 

What's hot (18)

How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
Cyber war
Cyber warCyber war
Cyber war
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
State of Internet 1H 2008
State of Internet 1H 2008State of Internet 1H 2008
State of Internet 1H 2008
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in May
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11
 
RSTREET17
RSTREET17RSTREET17
RSTREET17
 

Similar to News bytes-July 2013

LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
smile790243
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
Lior Rotkovitch
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
Microsoft Asia
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
fasttrackcomputersol
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
cowinhelen
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
ericbrooks84875
 

Similar to News bytes-July 2013 (20)

LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
Threatsploit-Adversary-Report-August-2022.pdf
Threatsploit-Adversary-Report-August-2022.pdfThreatsploit-Adversary-Report-August-2022.pdf
Threatsploit-Adversary-Report-August-2022.pdf
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
 
Chinese Cyber attack on mumbai power plant
Chinese Cyber attack on mumbai power plantChinese Cyber attack on mumbai power plant
Chinese Cyber attack on mumbai power plant
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
Cybersecurity Events 2017
Cybersecurity Events 2017Cybersecurity Events 2017
Cybersecurity Events 2017
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 

More from n|u - The Open Security Community

More from n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 

News bytes-July 2013

  • 2. 15 Goa Government Websites hacked by Pakistani Hacker "H4x0r HuSsY” A Hacker with Handle "H4x0r HuSsY" from Pakistan has managed to take control of few Indian Government websites and has defaced them. All of the hacked websites are belong to Goa State The affected websites includes NRI Commission of Goa(nri.goa.gov.in), Directorate of Agriculture (www.agri.goa.gov.in), Directorate of Art and Culture (artandculture.goa.gov.in/uploads/index.html), Department of Information and Publicity (artandculture.goa.gov.in/uploads/index.html) ,Directorate of Fire & Emergency Service (goadfes.gov.in/media/index.php), Goa Dental College (gdch.goa.gov.in), Government Printing Press & Stationery (goaprintingpress.gov.in).
  • 3. City of Mobile Police Hacked & Data Leaked by Turkish Ajan While it's been widely speculated that the notorious computer worm Stuxnet was the result of partnership between US and Israel, the famous NSA Whistleblower "Edward Snowden" has confirmed it. Stuxnet was a highly- complex malware discovered in 2010, used as cyber weapon against the Iran's nuclear program.. Snowden answered a few interesting questions in an Interview had with Germany's Der Spiegel Magazine.When Interviewer asked about the NSA involvement in Stuxnet, Snowden confirmed that saying "NSA and Israel co-wrote it“.When asked about German authorities involvement in NSA surveillance system, Snowden confirmed that saying "Yes, of course. We're 1 in bed together with the Germans the same as with most other Western countries.".
  • 4. Anonymous Hackers Breach Systems of Spain’s People’s Party, Leak Documents Anonymous hackers have defaced the official website of Spain’s People’s Party (Partido Popular), the country’s governing party. In addition to defacing the website – which has been restored –, the hacktivists have also leaked 5 gigabytes of documents that allegedly represent the party’s financial accounts from 1990 to 2011. Darknet.in reports that the party refused to release the documents after a judge overseeing a political corruption scandal asked to see them. The information has been posted on torrent sites, blogs and other websites so that citizens can analyze it. According to a video statement published by the hackers a couple of days ago, the documents show that the People’s Party has used public money to buy expensive cars, a pony and other items.The hacktivists are displeased with the fact that the party keeps talking about austerity and cuts while it “robs” the people.
  • 5. Mobile malware grows by 614 % Mobile malware creators and smartphone makers seem to be in a neck-and-neck software race, but new data shows that the malware creators could be taking the lead. Juniper Networks released its third annual Mobile Threat Report on Tuesday and the findings aren't pretty. Mobile malware grew at a rate of 614 percent from March 2012 to March 2013 -- that's equal to 276,259 malicious apps floating around out there. Last year, the increase was amere 155 percent. The report is based on an analysis of more than 1.85 million mobile apps and vulnerabilities across major mobile operating systems. in last year
  • 6. WellPoint takes $1.7 million hit over HIPAA slip WellPoint, a managed health care giant, agreed to pay $1.7 million to the U.S. Department of Health and Human Services for violating HIPAA regulations. HIPAA, the Health Insurance Portability and Accountability Act of 1996, is a set of rules to maintain patient privacy. These fines may also pick up given that HIPAA liability will extend to business partners that receive and store health information. HIPAA will extend to contractors and subcontractors on Sept. 23. According to the HHS, WellPoint left patient health data accessible to unauthorized users over the Internet. The HHS began its WellPoint investigation following a data breach report.
  • 7. Kremlin finds way to avoid leaks:Typewriters Dust off your Olivetti. It might be the future. The future of national security, at least. This quaint thought comes to mind as the result of news emerging from the inner bowels of the Kremlin. So the Kremlin has started ordering typewriters. Lots of them. Indeed, the Telegraph, relying on sources at Russia's Federal Guard Service, says that about $15,000 is being spent to purchase new electronic typewriters.
  • 8. Cyberattack on South Korea was part of 4-year spying campaign "Our analysis of this attack -- known first as Dark Seoul and now as Operation Troy -- has revealed that in addition to the data losses of the MBR wiping, the incident was more than cybervandalism," McAfee's report reads. "The attacks on South Korean targets were actually the conclusion of a covert espionage campaign." South Korea has been under a concerted cyberattack for the last four years, according to a comprehensive new report (PDF) released Monday by security firm McAfee. That means the hack that crippled three TV broadcasters and two banks in March was possibly just the tip of the iceberg.What has been the goal of these hackers? To steal South Korean government and military secrets, according to McAfee.
  • 9. Secunia and VLC get into Fight overVulnerability report Secunia and VLC Team got into a hot argument after Secunia set the patch status of their VLC vulnerability report to "UnPatched". At the end of last year, Secunia team reported a vulnerability (SA51464) in VLC version 2.x.The root cause of the vulnerability lies in the underlying FFmpeg library, which VLC statically links to. It was reported that the vulnerability was caused due to a buffer overflow issue when parsing SWF files, which was incorrect. When the VLC team came to know about the issue they tried to fix it but they missed the root cause and didnot solve the core problem. They released the next VLC version and claimed it to be safe but this was not the case as said by Secunia team. The VLC team kept on releasing the version from 2.0.5 to 2.0.7 and claimed that the vulnerability was fixed -
  • 10. Pakistani Google,Yahoo, Apple, Microsoft hacked by Turkish Hacker group Eboz A Turkish hacker group called Eboz has hacked and defaced Pakistani high profile websites which includes Search Engine giant Google, Yahoo, Microsoft and Apple, Visa, HSBC, Coca Cola, Blogspot, Sony, HP, eBay and PayPal . The hackers has defaced Google.pk, Google.com.pk, Yahoo.pk, Apple.pk, Microsoft.pk and 279 other sites in Pakistan It seems like hackers compromised the Pakistan's TLD operator PKNIC which administers and registers all .pk domains. Hackers modified the DNS servers records such that it points to some other server, points to two nameservers, dns1.freehostia.com and dns2.freehostia.com
  • 11. Convicted Hacker Says He Committed Credit Card Heist for U.S. Government The hacker who orchestrated the biggest computer crime operation in U.S. history is alleging that the American government authorized him to do so. Last year, 29-year-old Albert Gonzalez pleaded guilty to hacking into computer systems at TJX, Office Max, Dave & Busters, Heartland Payment Systems and other companies, in order to steal some 130 million credit card numbers. He received a 20-year prison sentence, which he's currently serving at a low-security facility in Michigan. "I still believe that I was acting on behalf of the United States Secret Service and that I was authorized and directed to engage in the conduct I committed as part of my assignment to gather intelligence and seek out international cyber criminals," Gonzalez wrote. "I now know and understand that I have been used as a scapegoat to cover someone's mistakes."
  • 12. ITV News Twitter account hacked by Syrian Electronic Army British broadcaster ITV on Friday became the latest media outlet to have one of its Twitter feeds hacked by anonymous supporters of Syria's President Bashar al-Assad, just days after Twitter beefed up security to prevent such attacks. ITV's London news Twitter account @itvlondon was hijacked on Friday afternoon and used to promote spoof stories about Syrian rebels, before the hackers tweeted "Just kidding. The Syrian Electronic Army was here. #SEA via @Official_SEA12." the security breach was triggered by a phishing email.
  • 13. Netherlands Domain Registrar SIDN websites hacked via SQL Injection Unknown hackers have penetrated into the Netherlands Top domains registrar(.nl) SIDN and placed malicious files in a number of SIDN sites. According to official statement, hackers have managed to breach the site by Exploiting a SQL Injection vulnerability in 25jaarvan.nl. To prevent further attack the organization shut down the web application and temporarily suspended the zone file publication. "As a result of our precautionary action, some areas of the website that registrars use to download registrar ship-related data have been unavailable since Tuesday". In an email to registrars, SIDN reports the login credentials of Registrars' site have also been compromised in the Security breach.