SlideShare a Scribd company logo
NEWS Bytes
Rahul Arun
15 Goa Government Websites hacked
by Pakistani Hacker "H4x0r HuSsY”
A Hacker with Handle "H4x0r HuSsY" from
Pakistan has managed to take control of few
Indian Government websites and has
defaced them. All of the hacked websites
are belong to Goa State
The affected websites includes NRI Commission of
Goa(nri.goa.gov.in), Directorate of Agriculture
(www.agri.goa.gov.in), Directorate of Art and Culture
(artandculture.goa.gov.in/uploads/index.html), Department of
Information and Publicity
(artandculture.goa.gov.in/uploads/index.html) ,Directorate of
Fire & Emergency Service (goadfes.gov.in/media/index.php),
Goa Dental College (gdch.goa.gov.in), Government Printing
Press & Stationery (goaprintingpress.gov.in).
City of Mobile Police Hacked &
Data Leaked by Turkish Ajan
While it's been widely speculated that
the notorious computer worm Stuxnet
was the result of partnership between
US and Israel, the famous NSA
Whistleblower "Edward Snowden" has
confirmed it. Stuxnet was a highly-
complex malware discovered in 2010,
used as cyber weapon against the
Iran's nuclear program..
Snowden answered a few interesting questions in an Interview had
with Germany's Der Spiegel Magazine.When Interviewer asked
about the NSA involvement in Stuxnet, Snowden confirmed that
saying "NSA and Israel co-wrote it“.When asked about German
authorities involvement in NSA surveillance system, Snowden
confirmed that saying "Yes, of course. We're 1 in bed together with
the Germans the same as with most other Western countries.".
Anonymous Hackers Breach Systems of
Spain’s People’s Party, Leak Documents
Anonymous hackers have defaced the
official website of Spain’s People’s
Party (Partido Popular), the country’s
governing party. In addition
to defacing the website – which has
been restored –, the hacktivists have
also leaked 5 gigabytes of documents
that allegedly represent the party’s
financial accounts from 1990 to 2011.
Darknet.in reports that the party refused to release the documents after a
judge overseeing a political corruption scandal asked to see them. The
information has been posted on torrent sites, blogs and other websites so
that citizens can analyze it. According to a video statement published by
the hackers a couple of days ago, the documents show that the People’s
Party has used public money to buy expensive cars, a pony and other
items.The hacktivists are displeased with the fact that the party keeps
talking about austerity and cuts while it “robs” the people.
Mobile malware grows by 614 %
Mobile malware creators and
smartphone makers seem to be in a
neck-and-neck software race, but new
data shows that the malware creators
could be taking the lead.
Juniper Networks released its third annual Mobile Threat Report on
Tuesday and the findings aren't pretty. Mobile malware grew at a
rate of 614 percent from March 2012 to March 2013 -- that's equal to
276,259 malicious apps floating around out there. Last year, the
increase was amere 155 percent.
The report is based on an analysis of more than 1.85 million mobile
apps and vulnerabilities across major mobile operating systems.
in last year
WellPoint takes $1.7 million hit
over HIPAA slip
WellPoint, a managed health care giant,
agreed to pay $1.7 million to the U.S.
Department of Health and Human Services
for violating HIPAA regulations. HIPAA, the
Health Insurance Portability and
Accountability Act of 1996, is a set of rules to
maintain patient privacy.
These fines may also pick up given that HIPAA liability will extend to
business partners that receive and store health information. HIPAA will
extend to contractors and subcontractors on Sept. 23.
According to the HHS, WellPoint left patient health data accessible to
unauthorized users over the Internet. The HHS began its WellPoint
investigation following a data breach report.
Kremlin finds way to avoid
leaks:Typewriters
Dust off your Olivetti.
It might be the future. The future of national
security, at least.
This quaint thought comes to mind as the result
of news emerging from the inner bowels of the
Kremlin.
So the Kremlin has started ordering typewriters. Lots
of them. Indeed, the Telegraph, relying on sources
at Russia's Federal Guard Service, says that about
$15,000 is being spent to purchase new electronic
typewriters.
Cyberattack on South Korea was part
of 4-year spying campaign
"Our analysis of this attack -- known first as Dark Seoul and now as
Operation Troy -- has revealed that in addition to the data losses of
the MBR wiping, the incident was more than cybervandalism,"
McAfee's report reads. "The attacks on South Korean targets were
actually the conclusion of a covert espionage campaign."
South Korea has been under a concerted
cyberattack for the last four years, according to
a comprehensive new report (PDF) released
Monday by security firm McAfee. That means
the hack that crippled three TV broadcasters
and two banks in March was possibly just the tip
of the iceberg.What has been the goal of these
hackers? To steal South Korean government
and military secrets, according to McAfee.
Secunia and VLC get into
Fight overVulnerability report
Secunia and VLC Team got into a hot argument
after Secunia set the patch status of their VLC
vulnerability report to "UnPatched". At the end of
last year, Secunia team reported a vulnerability
(SA51464) in VLC version 2.x.The root cause of the
vulnerability lies in the underlying FFmpeg library,
which VLC statically links to. It was reported that the
vulnerability was caused due to a buffer overflow
issue when parsing SWF files, which was incorrect.
When the VLC team came to know about the issue they tried to
fix it but they missed the root cause and didnot solve the core
problem. They released the next VLC version and claimed it to
be safe but this was not the case as said by Secunia team. The
VLC team kept on releasing the version from 2.0.5 to 2.0.7 and
claimed that the vulnerability was fixed -
Pakistani Google,Yahoo, Apple,
Microsoft hacked by Turkish Hacker
group Eboz A Turkish hacker group called Eboz has hacked
and defaced Pakistani high profile websites
which includes Search Engine giant Google,
Yahoo, Microsoft and Apple, Visa, HSBC, Coca
Cola, Blogspot, Sony, HP, eBay and PayPal .
The hackers has defaced Google.pk,
Google.com.pk, Yahoo.pk, Apple.pk,
Microsoft.pk and 279 other sites in Pakistan
It seems like hackers compromised the Pakistan's TLD operator PKNIC
which administers and registers all .pk domains. Hackers modified the
DNS servers records such that it points to some other server, points to
two nameservers, dns1.freehostia.com and dns2.freehostia.com
Convicted Hacker Says He
Committed Credit Card Heist for
U.S. Government
The hacker who orchestrated the biggest computer crime
operation in U.S. history is alleging that the American
government authorized him to do so. Last year, 29-year-old
Albert Gonzalez pleaded guilty to hacking into computer
systems at TJX, Office Max, Dave & Busters, Heartland
Payment Systems and other companies, in order to steal
some 130 million credit card numbers. He received a 20-year
prison sentence, which he's currently serving at a low-security
facility in Michigan.
"I still believe that I was acting on behalf of the United States
Secret Service and that I was authorized and directed to
engage in the conduct I committed as part of my
assignment to gather intelligence and seek out international
cyber criminals," Gonzalez wrote. "I now know and
understand that I have been used as a scapegoat to cover
someone's mistakes."
ITV News Twitter account hacked
by Syrian Electronic Army
British broadcaster ITV on Friday
became the latest media outlet to
have one of its Twitter feeds hacked by
anonymous supporters of Syria's
President Bashar al-Assad, just days
after Twitter beefed up security to
prevent such attacks.
ITV's London news Twitter account @itvlondon was hijacked on Friday
afternoon and used to promote spoof stories about Syrian rebels,
before the hackers tweeted "Just kidding. The Syrian Electronic Army
was here. #SEA via @Official_SEA12."
the security breach was triggered by a phishing email.
Netherlands Domain Registrar
SIDN websites hacked via SQL
Injection
Unknown hackers have penetrated into the Netherlands Top
domains registrar(.nl) SIDN and placed malicious files in a number of
SIDN sites.
According to official statement, hackers have managed to breach
the site by Exploiting a SQL Injection vulnerability in 25jaarvan.nl. To
prevent further attack the organization shut down the web
application and temporarily suspended the zone file publication. "As
a result of our precautionary action, some areas of the website that
registrars use to download registrar ship-related data have been
unavailable since Tuesday". In an email to registrars, SIDN reports the
login credentials of Registrars' site have also been compromised in
the Security breach.
Sources:
www.news.softpedia.com
www.ehackingnews.com
www.thehackernews.com
Thank You…

More Related Content

What's hot

How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?Michael Soltys
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerAnonDownload
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17Ed Alcantara
 
Cyber war
Cyber warCyber war
Cyber war
Praveen
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
Parsons Behle & Latimer
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza Belayneh
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
State of Internet 1H 2008
State of Internet 1H 2008State of Internet 1H 2008
State of Internet 1H 2008
Kim Jensen
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight IntelliaggGavin O'Toole
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
IronCore Labs
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
khansalman19
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
ERPScan
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
Pierluigi Paganini
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in May
Sathish Kumar K
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11captsbtyagi
 

What's hot (18)

How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
Cyber war
Cyber warCyber war
Cyber war
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
State of Internet 1H 2008
State of Internet 1H 2008State of Internet 1H 2008
State of Internet 1H 2008
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
 
Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in May
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11
 
RSTREET17
RSTREET17RSTREET17
RSTREET17
 

Similar to News bytes-July 2013

LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
smile790243
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
PECB
 
News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal
Jaskaran Narula
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
ndcmanagement
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
Labris Networks
 
Threatsploit-Adversary-Report-August-2022.pdf
Threatsploit-Adversary-Report-August-2022.pdfThreatsploit-Adversary-Report-August-2022.pdf
Threatsploit-Adversary-Report-August-2022.pdf
Abishek867180
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
Shreedeep Rayamajhi
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
CloudCamp Chicago
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
Lior Rotkovitch
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCMicrosoft Asia
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
fasttrackcomputersol
 
Chinese Cyber attack on mumbai power plant
Chinese Cyber attack on mumbai power plantChinese Cyber attack on mumbai power plant
Chinese Cyber attack on mumbai power plant
RohanMistry15
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
Charlie Lewis M.S.
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
cowinhelen
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Alisha Deboer
 
Cybersecurity Events 2017
Cybersecurity Events 2017Cybersecurity Events 2017
Cybersecurity Events 2017
Rachael Lewis Anna
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
MuhammadAbdullah201796
 
Professional Practices PPT Slide on Chapter 5: Crime
Professional Practices PPT Slide on Chapter 5: CrimeProfessional Practices PPT Slide on Chapter 5: Crime
Professional Practices PPT Slide on Chapter 5: Crime
frazaslam10
 

Similar to News bytes-July 2013 (20)

LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
Threatsploit-Adversary-Report-August-2022.pdf
Threatsploit-Adversary-Report-August-2022.pdfThreatsploit-Adversary-Report-August-2022.pdf
Threatsploit-Adversary-Report-August-2022.pdf
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
 
Chinese Cyber attack on mumbai power plant
Chinese Cyber attack on mumbai power plantChinese Cyber attack on mumbai power plant
Chinese Cyber attack on mumbai power plant
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
Cybersecurity Events 2017
Cybersecurity Events 2017Cybersecurity Events 2017
Cybersecurity Events 2017
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
Professional Practices PPT Slide on Chapter 5: Crime
Professional Practices PPT Slide on Chapter 5: CrimeProfessional Practices PPT Slide on Chapter 5: Crime
Professional Practices PPT Slide on Chapter 5: Crime
 

More from n|u - The Open Security Community

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
n|u - The Open Security Community
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
n|u - The Open Security Community
 
Metasploit primary
Metasploit primaryMetasploit primary
Api security-testing
Api security-testingApi security-testing
Api security-testing
n|u - The Open Security Community
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
n|u - The Open Security Community
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
n|u - The Open Security Community
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
n|u - The Open Security Community
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
n|u - The Open Security Community
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
n|u - The Open Security Community
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
n|u - The Open Security Community
 
Cloud security
Cloud security Cloud security
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
n|u - The Open Security Community
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
n|u - The Open Security Community
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
n|u - The Open Security Community
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
n|u - The Open Security Community
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
n|u - The Open Security Community
 
Linux for hackers
Linux for hackersLinux for hackers
Android Pentesting
Android PentestingAndroid Pentesting

More from n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 

News bytes-July 2013

  • 2. 15 Goa Government Websites hacked by Pakistani Hacker "H4x0r HuSsY” A Hacker with Handle "H4x0r HuSsY" from Pakistan has managed to take control of few Indian Government websites and has defaced them. All of the hacked websites are belong to Goa State The affected websites includes NRI Commission of Goa(nri.goa.gov.in), Directorate of Agriculture (www.agri.goa.gov.in), Directorate of Art and Culture (artandculture.goa.gov.in/uploads/index.html), Department of Information and Publicity (artandculture.goa.gov.in/uploads/index.html) ,Directorate of Fire & Emergency Service (goadfes.gov.in/media/index.php), Goa Dental College (gdch.goa.gov.in), Government Printing Press & Stationery (goaprintingpress.gov.in).
  • 3. City of Mobile Police Hacked & Data Leaked by Turkish Ajan While it's been widely speculated that the notorious computer worm Stuxnet was the result of partnership between US and Israel, the famous NSA Whistleblower "Edward Snowden" has confirmed it. Stuxnet was a highly- complex malware discovered in 2010, used as cyber weapon against the Iran's nuclear program.. Snowden answered a few interesting questions in an Interview had with Germany's Der Spiegel Magazine.When Interviewer asked about the NSA involvement in Stuxnet, Snowden confirmed that saying "NSA and Israel co-wrote it“.When asked about German authorities involvement in NSA surveillance system, Snowden confirmed that saying "Yes, of course. We're 1 in bed together with the Germans the same as with most other Western countries.".
  • 4. Anonymous Hackers Breach Systems of Spain’s People’s Party, Leak Documents Anonymous hackers have defaced the official website of Spain’s People’s Party (Partido Popular), the country’s governing party. In addition to defacing the website – which has been restored –, the hacktivists have also leaked 5 gigabytes of documents that allegedly represent the party’s financial accounts from 1990 to 2011. Darknet.in reports that the party refused to release the documents after a judge overseeing a political corruption scandal asked to see them. The information has been posted on torrent sites, blogs and other websites so that citizens can analyze it. According to a video statement published by the hackers a couple of days ago, the documents show that the People’s Party has used public money to buy expensive cars, a pony and other items.The hacktivists are displeased with the fact that the party keeps talking about austerity and cuts while it “robs” the people.
  • 5. Mobile malware grows by 614 % Mobile malware creators and smartphone makers seem to be in a neck-and-neck software race, but new data shows that the malware creators could be taking the lead. Juniper Networks released its third annual Mobile Threat Report on Tuesday and the findings aren't pretty. Mobile malware grew at a rate of 614 percent from March 2012 to March 2013 -- that's equal to 276,259 malicious apps floating around out there. Last year, the increase was amere 155 percent. The report is based on an analysis of more than 1.85 million mobile apps and vulnerabilities across major mobile operating systems. in last year
  • 6. WellPoint takes $1.7 million hit over HIPAA slip WellPoint, a managed health care giant, agreed to pay $1.7 million to the U.S. Department of Health and Human Services for violating HIPAA regulations. HIPAA, the Health Insurance Portability and Accountability Act of 1996, is a set of rules to maintain patient privacy. These fines may also pick up given that HIPAA liability will extend to business partners that receive and store health information. HIPAA will extend to contractors and subcontractors on Sept. 23. According to the HHS, WellPoint left patient health data accessible to unauthorized users over the Internet. The HHS began its WellPoint investigation following a data breach report.
  • 7. Kremlin finds way to avoid leaks:Typewriters Dust off your Olivetti. It might be the future. The future of national security, at least. This quaint thought comes to mind as the result of news emerging from the inner bowels of the Kremlin. So the Kremlin has started ordering typewriters. Lots of them. Indeed, the Telegraph, relying on sources at Russia's Federal Guard Service, says that about $15,000 is being spent to purchase new electronic typewriters.
  • 8. Cyberattack on South Korea was part of 4-year spying campaign "Our analysis of this attack -- known first as Dark Seoul and now as Operation Troy -- has revealed that in addition to the data losses of the MBR wiping, the incident was more than cybervandalism," McAfee's report reads. "The attacks on South Korean targets were actually the conclusion of a covert espionage campaign." South Korea has been under a concerted cyberattack for the last four years, according to a comprehensive new report (PDF) released Monday by security firm McAfee. That means the hack that crippled three TV broadcasters and two banks in March was possibly just the tip of the iceberg.What has been the goal of these hackers? To steal South Korean government and military secrets, according to McAfee.
  • 9. Secunia and VLC get into Fight overVulnerability report Secunia and VLC Team got into a hot argument after Secunia set the patch status of their VLC vulnerability report to "UnPatched". At the end of last year, Secunia team reported a vulnerability (SA51464) in VLC version 2.x.The root cause of the vulnerability lies in the underlying FFmpeg library, which VLC statically links to. It was reported that the vulnerability was caused due to a buffer overflow issue when parsing SWF files, which was incorrect. When the VLC team came to know about the issue they tried to fix it but they missed the root cause and didnot solve the core problem. They released the next VLC version and claimed it to be safe but this was not the case as said by Secunia team. The VLC team kept on releasing the version from 2.0.5 to 2.0.7 and claimed that the vulnerability was fixed -
  • 10. Pakistani Google,Yahoo, Apple, Microsoft hacked by Turkish Hacker group Eboz A Turkish hacker group called Eboz has hacked and defaced Pakistani high profile websites which includes Search Engine giant Google, Yahoo, Microsoft and Apple, Visa, HSBC, Coca Cola, Blogspot, Sony, HP, eBay and PayPal . The hackers has defaced Google.pk, Google.com.pk, Yahoo.pk, Apple.pk, Microsoft.pk and 279 other sites in Pakistan It seems like hackers compromised the Pakistan's TLD operator PKNIC which administers and registers all .pk domains. Hackers modified the DNS servers records such that it points to some other server, points to two nameservers, dns1.freehostia.com and dns2.freehostia.com
  • 11. Convicted Hacker Says He Committed Credit Card Heist for U.S. Government The hacker who orchestrated the biggest computer crime operation in U.S. history is alleging that the American government authorized him to do so. Last year, 29-year-old Albert Gonzalez pleaded guilty to hacking into computer systems at TJX, Office Max, Dave & Busters, Heartland Payment Systems and other companies, in order to steal some 130 million credit card numbers. He received a 20-year prison sentence, which he's currently serving at a low-security facility in Michigan. "I still believe that I was acting on behalf of the United States Secret Service and that I was authorized and directed to engage in the conduct I committed as part of my assignment to gather intelligence and seek out international cyber criminals," Gonzalez wrote. "I now know and understand that I have been used as a scapegoat to cover someone's mistakes."
  • 12. ITV News Twitter account hacked by Syrian Electronic Army British broadcaster ITV on Friday became the latest media outlet to have one of its Twitter feeds hacked by anonymous supporters of Syria's President Bashar al-Assad, just days after Twitter beefed up security to prevent such attacks. ITV's London news Twitter account @itvlondon was hijacked on Friday afternoon and used to promote spoof stories about Syrian rebels, before the hackers tweeted "Just kidding. The Syrian Electronic Army was here. #SEA via @Official_SEA12." the security breach was triggered by a phishing email.
  • 13. Netherlands Domain Registrar SIDN websites hacked via SQL Injection Unknown hackers have penetrated into the Netherlands Top domains registrar(.nl) SIDN and placed malicious files in a number of SIDN sites. According to official statement, hackers have managed to breach the site by Exploiting a SQL Injection vulnerability in 25jaarvan.nl. To prevent further attack the organization shut down the web application and temporarily suspended the zone file publication. "As a result of our precautionary action, some areas of the website that registrars use to download registrar ship-related data have been unavailable since Tuesday". In an email to registrars, SIDN reports the login credentials of Registrars' site have also been compromised in the Security breach.