thn google
+13,700
twitter big logo icone 5336 48
1,755
Advertisers Tag Here
Join over 45,931 Daily Readers, Users, Subscribers
..who get notifications via Emails !
Jobs

Monday, 13 January 2014

Universitas Muria Kudus Hacked and Defaced by Dr.3v1l

No comments:

Universitas Muria Kudus Hacked abd defaced by Dr.3v1l. The hacker Dr.3v1l mentioned us on twitter about the hack. The hacker has defaced the website of Universitas of Muria Kudus.
The hackers has left the following message
Hacked by Dr.3v1l
Iranian Hackers Was Here
b.devils.b@gmail.com
@Doctor.3v1l
Spc Tnx 2 : Red Hat Hackers Bax
Nothing extra or anything else has been mentioned by the hacker.
http://staff.blog.umk.ac.id/?page_id=2111
http://en.umk.ac.id/download/
http://umk.ac.id/download/
http://jurnal.umk.ac.id/files/
http://infomuria.umk.ac.id/images/
http://pendaftaran.umk.ac.id/25/configuration.php
http://muriastudies.umk.ac.id/?page_id=524

Many defaced links and mirror has been pasted by hacker on pastebin, Link is available:- http://pastebin.com/NZSBS3iR
Read More

Wednesday, 4 December 2013

Anonymous Hackers hacks and defaced Interpol Honduras and State Police websites

No comments:

‘Anonymous Honduras‘ has hacked and defaced 6 Honduras government ministries high profile websites against the alleged fraud in country’s presidential elections.

 Ministry of Culture, National Police of Honduras, Superintendent of Public Alliance, Honduras, Zolitur Island under Ministry of Tourism and nterpol Honduras were targeted by Anonymous Honduras.

As Against alleged rigging and fraud in 2013 during country’s Vice Presidential Election and for thie reason anonymous left a deface page along with a message on all hacked websites a. The hackers urge the people not to vote until the whole electoral system is improved.

According to the message

“We are Anonymous! From past couple of day we have been spreading news about electoral fraud in the election. Where , with the help of citizens, collect all the evidence, in order to prove fraud in the election procedures and results. So this day we appeal to all to join in and protest but as a collective we have no commitments with any political party to consider all of the same. We urge that democracy and true decision of the people we respect.”

 “Let’s go out to the streets peacefully and not compare ourselves , or we challenge oppression , remember that they have the guns and money , we only our voice, our indignation and our desire for freedom . If you are in protest in front of foreign embassies. If we can wake up now , there will be a possible time.”


Links of targeted websites are available here.
Read More

Friday, 2 November 2012

HALF OF ALL ANDROID DEVICES ARE VULNERABLE TO ATTACK

No comments:

#Android_thb





Android users who do not upgrade their operating systems when new versions become available jeopardize the security of their devices, according to new research from Web security firm Duo Security. That lag in upgrades means that almost half of all Android devices have vulnerabilities that could be exploited by a hacker to assume control of the device.


Duo Security launched a free vulnerability scanning app for Android, X-Ray, last summer, and the preliminary data it collected revealed this troubling trend.

Android users tend to have outdated operating platforms because Android – which has the largest market share of any mobile platform – does not have a uniform timeframe for pushing out updates to its operating system, complete with security upgrades and patches. Instead, each carrier is responsible for pushing the updates out, each does so on its own timeline and users aren’t required to install the updates. Apple, on the other hand, pushes out updates of its iOS to all users at the same time, regardless of their carrier.

Duo Security’s X-Ray app scans Android devices for known vulnerabilities; attackers have targeted Android devices with malicious apps and other exploits for known vulnerabilities for several years.

“Since we launched X-Ray, we’ve already collected results from over 20,000 Android devices worldwide. Based on these initial results, we estimate that over half of Android devices worldwide have unpatched vulnerabilities that could be exploited by a malicious app or adversary,” Jon Oberheide of Duo Security wrote in a blog post about the research results.

Oberheide went on to say that the 50 percent figure might be a conservative estimate, and that the research underscores the importance of installing updates as soon as they become available.



Source-kaspersky
THE ARTICLE IN THIS POST IS FOR INFORMATIVE AND EDUCATIONAL PURPOSE ONLY..WE ARE NOT RESPONSIBLE FOR ANY TYPE OF USE BY YOU..FOR MORE INFORMATION OR FOR ANY QUERIES CONTACT US.

See All Posts From


Read More

Thursday, 1 November 2012

Beware Its A Trick! - Your computer has been hacked by the Anonymous Hackers Group and locked for the moment

No comments:

it's not #anonymous -  



Dump Information

Submission Date2012-Nov -01 
Dump Size47.0 KB ( 48128 bytes )
Attack MethodLocking Down Access
TargetYour PC | laptops
Target TypeComputers
What Is ItRansomware malware





Today on Twitter account , we were notified by Anonymous about the Ransomware malware, That are being spread by some CyberJurks just to Earn money, but spreading and claiming to be done by Anonymous Hackers.

It is to clearified that Anonymous hackers has no relation To such type of things.

CyberJurks are just Utilizing the Anonymous Banner, and creating a bad image of anonymous to the public.

Most of the Anti-virus are capable to catch the malware, and alert you.

Spread this news to everyone, so that no one becomes a victim and the Image of Anonymous remain same in the eyes of public. Just Tweet To spread and also share in facebook, And Alert your Friends




This message appears when the malware is successful to attack you



Ransomware malware restricts access to the computer system that it infects and demands a ransom paid to the creator of the malware in order for the restriction to be removed. Message read "Your computer has been hacked by the Anonymous Hackers Group and locked for the moment.".

Ransomware asking for €100 in order to restore victims computer to normal stage, otherwise malware warn that if user will not pay money in 24 hours, all files from computer will be deleted and their personal infomation can be posted online, and moreover malware claim to overclock system and burn motherboards and rams.

Add Your Views about this post...Comment Below


Alert
THE ARTICLE IN THIS POST IS FOR INFORMATIVE AND EDUCATIONAL PURPOSE ONLY..WE ARE NOT RESPONSIBLE FOR ANY TYPE OF USE BY YOU..FOR MORE INFORMATION OR FOR ANY QUERIES CONTACT US.

See All Posts From



Read More

Key Indian websites shut down briefly after cyber attack

No comments:

#SanFour25


cover

Dump Information

Submission Date2012-Nov-01
Claimed bySanFour25
Targethttp://iii.gov.in  AND  www.rac.gov.in



Following suspicious and unwanted activity on websites of key Indian government organisations, including that of an advisor to the prime minister and the defence establishment DRDO, the websites were shut down briefly yesterday. The websites, maintained by the National Informatics Centre (NIC), were victims of cyber attacks believed to have been carried out by group called SanFour25. The group victimised five other Indian websites and defaced them.

The websites were restored after they were checked. Sources, however, maintain that the websites in question did not contain any secrets, and that all the information was already in the public domain. Among compromised sites were those of the prime minister's advisor on public information, infrastructure and innovations (http://iii.gov.in), and the Recruitment and Assessment Centre (RAC) of the Defence Research and Development Organisation (DRDO) (www.rac.gov.in). The RAC handles scientists' recruitment for the DRDO.


-->
THE ARTICLE IN THIS POST IS FOR INFORMATIVE AND EDUCATIONAL PURPOSE ONLY..WE ARE NOT RESPONSIBLE FOR ANY TYPE OF USE BY YOU..FOR MORE INFORMATION OR FOR ANY QUERIES CONTACT US.

See All Posts From



Read More

Defcon.org Data leak By YEIZETA

No comments:

#Defcon data leaked



Yesterday While Searching over the Internet We Found a message from YeiZeta claiming that Defcon.org should be attacked for working with the FBI whether they are one of the best hackers or not.

They will be the best hackers and crackers in the world but when they infiltrate the FBI must be attacked.
YeiZeta claims to target the defcon.org website with "The joker hack". I think YeiZeta will be starting a DDOS. When you take a look at the PasteBin account you will see a massive collection of exploits and passwords.


Dump Information

Submission Date2012-Nov-01
Claimed byYEIZETA 
Targethttp://www.Defcon.org





They will be the best hackers and crackers in the world but when they infiltrate the FBI must be attacked.
----------------------------------------------------------------------------------------------------------
target:defcon.org port:80 ("The joker hack")
----------------------------------------------------------------------------------------------------------
Users
====================
Associate software qa engineer India
Associate software qa engineer
Mcafee Associate software engineer
Karthik R r
Karthik R R
Karthik .r
Ajay Dhaka
Bill Imhoff
John Dilley
Kyle Osborn
Alexander Diaz
Vivek Ramachandran
Bob Imhoff
B. DeLong
Advisory programmer
Chris Imes
Justin Searle
Aditya Sood
Karthik R
n In-charge
NYC OWASP
Sze Siong Teo
The Prophet
Alexey Sintsov
Karthik
Search
Hari Krishnan
Jonathan Brossard
Robin Wood
Josh Foote
Manav Gautama
Ohad Plotnik
Paul Haas
Julian Ho
Rohit Bansal
SHAPE forum
Ian Whiting
Aina Roxx
Robert Dery
Drexx Laggui
Raghavendra Karthik D
Itzik Kotler
Mohammed muntaka
Denny Alexander Rodriguez Diaz
Carlos Fragoso
PHDays Everywhere
Gautham Ganapathy
Parimal Naigaonkar
Nicholas Johnson
Garner
Eli Omen
Ravi kumar
Marvin Odor
Rafel Ivgi
Dhaka
Ajin Abraham
Karl Smith
Cecil Su
=====================================================================================================
solarwind@defcon.org
dtangent@defcon.org
grifter@defcon.org
chris@defcon.org
jm@defcon.org
russ@defcon.org
noid@defcon.org
daddict@defcon.org
DTangent@defcon.org
jam@defcon.org
=====================================================================================================
173.14.243.228:www.defcon.org
66.240.206.93:media.defcon.org
216.222.83.82:wifireg.defcon.org
173.14.243.230:forum.defcon.org
173.14.243.231:pics.defcon.org
216.222.83.80:dc20-media.defcon.org
216.222.83.81:updates.defcon.org
66.240.206.93:Media.defcon.org
173.14.243.230:Forum.defcon.org
173.14.243.228:Www.defcon.org
173.14.243.231:Pics.defcon.org



-->
THE ARTICLE IN THIS POST IS FOR INFORMATIVE AND EDUCATIONAL PURPOSE ONLY..WE ARE NOT RESPONSIBLE FOR ANY TYPE OF USE BY YOU..FOR MORE INFORMATION OR FOR ANY QUERIES CONTACT US.


See All Posts From



Read More

Yahoo! Experts Warn Users of SWF Vulnerability in YUI 2

No comments:

#Yahoo!



Yahoo! experts warn users that a SWF security hole exists in Yahoo! User Interface Library (YUI) 2.

According to a post published on the YUI Blog, the vulnerability affects self-hosted YUI 2 SWF files, but customers of YUI 3 and those of YUI 2 via yui.yahooapis.com or a different CDN are not affected by the flaw.

No other details are provided, but engineers advise the owners of projects that host YUI 2 SWF files on their own servers to email them at security@yuilibrary.com for support and more information.

The H Security believes that the vulnerability might have something to do with the SWFStore class, which supports the persistence of data utilizing Flash Player.

In the meantime, customers don’t seem to be too pleased by the fact that the developers have decided to keep the details of the vulnerability to themselves.

“You haven’t created a meaningful barrier for malicious people; you’ve only made it harder for people who are legitimately affected by this issue to get the information they need to fix it,” one unhappy customer wrote.




-->
THE ARTICLE IN THIS POST IS FOR INFORMATIVE AND EDUCATIONAL PURPOSE ONLY..WE ARE NOT RESPONSIBLE FOR ANY TYPE OF USE BY YOU..FOR MORE INFORMATION OR FOR ANY QUERIES CONTACT US.

Source - softpedia
See All Posts From


Read More

National Telecommunications Commission of Philippines hacked

No comments:

#MANILA, Philippines—The website of the National Telecommunications Commission 




Dump Information

Submission Date2012-Nov-01
Attack Date2012-Nov-01
Claimed bySh4d0wFiend_h4x0r And Wizkidl33t 
Targethttp://www.ntc.gov.ph
Target Typewebsite of the National Telecommunications Commission (NTC)



MANILA, Philippines—The website of the National Telecommunications Commission (NTC) was hacked Thursday noon.

The site was defaced at around 1 p.m. Upon entering the site it showed a pop-up message saying “Sh4d0wFiend_h4x0r and Wizkidl33t were here!”  and would later redirect to another page displaying the hacker’s message.

The hacker’s message said “hello and welcome: presented by Wizkidl33t and Sh4d0wFiend_h4x0r” with animated blood and stylized fire text.

When a “proceed” button was clicked, a new page loads with the message “Welcome to the world of Halloween, in a moment you will see a couple of scary and entertainment media, this is not about a government issues this is for Halloween special click proceed to go to the next page.”

The following pages showed a trailer of the horror film The Grudge from YouTube.

The NTC adds to the list of government websites that have been hacked and defaced by hacktivists allied with international group Anonymous.

The hacker group has claimed responsibility for the hacking of several government websites protesting the passage of the Cybercrime Prevention Act in the Philippines.




Source - Twitter, inquirer
THE ARTICLE IN THIS POST IS FOR INFORMATIVE AND EDUCATIONAL PURPOSE ONLY..WE ARE NOT RESPONSIBLE FOR ANY TYPE OF USE BY YOU..FOR MORE INFORMATION OR FOR ANY QUERIES CONTACT US.

See All Posts From



Read More

Wednesday, 31 October 2012

Drac-101code hacked Lady Gaga's website

No comments:

#Oops lady gaga..




After defacing the website, he wrote  " Dont you want the Reason For This "
And Replied
There Is Not Patch To Human Stupidity.

And nothing more was written or said by him.

Drac-101code Left the Following Message in the Defaced website.



root@server:/root # query result: 404 - error
root@server:/root # Hacked By Drac-101code  | 
root@server:/root # Loading...
root@server:/root # Loading...
root@server:/root # Loading...
root@server:/root # Found bugs in this system

root@server:/root # If you see this index then you are .... pwned ;)
Read More

New Composing mail System From Gmail - fast, Simple And Powerful

No comments:

New mailing system from gmail


The New Gmail Information

Submission Date2012-10-30
Note(s)New Composing mail System From Gmail - fast, Simple And Powerful
Source(s)http://google.com





Gmail's new compose and reply experience

You can now write messages in a cleaner, simpler experience that puts the focus on your message itself, not all the features around it. Here are some of the highlights:
  • Fast: Compose messages right from your inbox.
  • Simple: Redesigned with a clean, streamlined look.
  • Powerful: Check emails as you're typing, minimize drafts for later, and even compose two messages at once.

Try it out!



Once you click the Compose button, click the "new compose experience" link right next to the Labels button at the top of the message. Until the change is fully launched, you'll be able to choose whether you use the new or current experience.If you change your mind or if you need to use a feature that isn't available yet, you can switch back to the old experience at any time. Here's how:
  1. Click Compose
  2. At the bottom corner of the message pane, click the More menu icon More options drop-down arrow next to the Discard button.
  3. Select "Switch back to old compose."

Details of the compose window

Instead of taking up your entire Gmail window, clicking Compose now opens a smaller window at the bottom of your screen. Here are some of the features that you'll see:
  • Recipients: Click this text field to type email addresses. You can also click the Cc orBcc links to add a new set of recipients. Drag and drop recipients from one field to another, or click the "x" to remove them from your message. Hover over the recipient to see details about them, or double-click on them to edit their address.
  • Text formatting: Click this icon Formatting options icon to add formatting like font size, bold, underline, and bullets. Or, use our new formatting keyboard shortcuts. Hover over each button to learn the keyboard shortcut you can use for that option. Alignment and indentation options are now collapsed under the alignment icon.
  • Attachments: Click the Attachment icon Paperclip attachment iconto attach files to your message. Hovering over the Attachment icon will also open the insert options menu.
  • Insert options: Hover over the plus icon insert menu plus icon to embed photos, links, emoticons, and Google Calendar events. This menu will also open when hovering over the Attachment icon.
  • Discard: Click the trash can icon Discard draft icon to delete your draft.
  • More options: Click this menu More options drop-down arrow to see other tools such as spell check, plain text format, print, adding labels, and including original attachments. Some options may not yet be ready; you’ll see them in grey until they become available to use.
  • Window size: The writing pane grows as your message gets longer. If you want the window to be bigger, click the middle icon at the top right of the pane to open the message in a new window. Use the other icons to minimize or close the window (which will also save your draft). Window size icon
  • Saving: Gmail automatically saves your drafts while you’re writing, so we've removed the "Save now" button (but you can verify that it’s saved if you see the word, "Saved" next to the Discard button). Your draft will also be automatically saved when you close the compose window.
  • Send mail as: If you use Gmail to send mail from another address (like your work address), click into the "To" field, then click the "From" link to select which address you’d like to send mail from.

Changes when replying or forwarding

You’ll also see some differences when replying to or forwarding messages. Most of the changes are similar to those that you'll see when composing a brand new message. Here are a few additional changes:
  • Recipients: To change who your message should be sent to, click into the recipient field when you’re replying.
  • Type of response: Click the arrow Recipient arrow next to the recipient’s name to choose whether your message is a reply, reply all, or forward.
  • Subject: To change the subject of your message, click the arrow Recipient arrow next to the recipient’s name and click "Start separate conversation."
  • Respond inline: If you want to see the previous message within your reply, scroll down until you see the "Show trimmed content" icon Show trimmed content and click it.

Coming soon

A few familiar features aren’t yet available yet, but we're working hard to make them available to you soon.
  • Insert emoticons and event invitations
  • Print drafts from the More menu
  • Add labels to outgoing messages from the More menu
  • Send read receipts (Google Apps users only)
  • Canned responses




THE ARTICLE IN THIS POST IS FOR INFORMATIVE AND EDUCATIONAL PURPOSE ONLY..WE ARE NOT RESPONSIBLE FOR ANY TYPE OF USE BY YOU..FOR MORE INFORMATION OR FOR ANY QUERIES CONTACT US.

See All Posts From



Read More