It's the festive season but would you really expect Lady Gaga to give you a free iPad 2? That was the exact message being broadcast from Lady Gaga's Twitter account earlier, promising each and every one of her 17 million followers an iPad 2 and all they had to do was click the link for details. [ATTACH=RIGHT]23296[/ATTACH]Of course, there was no iPad. The Lady Gaga Twitter account had been hacked and if you clicked on that link it would take you to a number of different sites via redirects and then dump you at a survey designed to scam you …

Member Avatar
Member Avatar
+1 forum 6

i am create my website in apps

Member Avatar
Member Avatar
+0 forum 1

It's never easy calculating the true cost of inadequate security to business, not least as there are so many variables and such reticence when it comes to full disclosure for fear of brand damage. However, the latest [Information Security Breaches Survey](http://www.pwc.co.uk/audit-assurance/publications/uk-information-security-breaches-survey-results-2012.jhtml) (ISBS) from PwC/Infosecurity Europe has had a good bash at it, at least as far as the UK is concerned, and the answer is breathtakingly big: billions of pounds. And that was just last year! ![dweb-secreport](/attachments/small/0/dweb-secreport.jpg "align-right") According to the survey which investigated a total of 447 UK-based businesses, the number of large enterprises being hacked into is at …

Member Avatar
Member Avatar
+1 forum 1

i am mahemmed alshref I hope you help me

Member Avatar
Member Avatar
-1 forum 2

The Iranian Cyber Army may be the latest elite military hacking squad to hit the headlines, but Iran has a long way to go if it's to catch up with China in terms of international data disruption. According to one newly published report into the threat from Chinese state-sponsored espionage activity, the true scale and nature of these cyber-attacks is really quite interesting. [ATTACH=RIGHT]24125[/ATTACH]Context Information Security argues in the '[URL="http://www.contextis.com/news/articles/targetedattacks/Targeted_Attacks_Whitepaper.pdf"]Hidden Tiger, Crouching Dragon, Stolen Data[/URL]' report that while cyber-attacks originating from China are nothing new, they have grown in both size and scope in recent years in order to support …

Member Avatar
Member Avatar
+0 forum 1

Following the arrest of 25 suspected members of the Anonymous hacking collective in Europe and South America, the INTERPOL website went offline. Coincidence? I don't think so. After all, Anonymous has already proven it isn't scared, or indeed incapable. of taking down law enforcement sites. Earlier in the month it managed to [URL="http://www.youtube.com/watch?v=pPZc-CqXG3U"]take the CIA website offline[/URL] and even managed to [URL="http://www.itpro.co.uk/638788/do-british-police-get-cyber-security"]listen in to a private conference call between FBI agents and Scotland Yard detectives[/URL] who were discussing how to deal with Anonymous hacking attacks amongst other things. The fact that the INTERPOL site went down within hours of INTERPOL …

Member Avatar
Member Avatar
+3 forum 1

[URL="https://www.facebook.com/TeaMp0isoN"]TeaMp0isoN[/URL], a black-hat hacking collective, has announced that it is to collaborate with Anonymous on Operation Robin Hood which swears to take money from the banks (in the form of stolen credit card data) and redistribute the wealth from the 1% to the 99% in support of the Occupy Movement. But just who exactly are TeaMp0isoN and what impact is Operation Robin Hood likely to have? [ATTACH=RIGHT]23129[/ATTACH]Let's start with the easy stuff first and get a handle on TeaMp0isoN. Although you might think that finding anything out about a hacking collective which does things the likes of the FBI and …

Member Avatar
Member Avatar
+0 forum 1

[ATTACH=RIGHT]21680[/ATTACH]The British website for pop sensation Lady Gaga has been hacked, it's official. The website was targeted by the US SwagSec hacking group it would appear, a group which has a track record (if you'll excuse the pun) of hacking the official websites of pop stars having already hit Justin Bieber and Amy Winehouse to name but two. Universal Music has now confirmed that part of a database was copied and the names and email address records of Lady Gaga fans accessed. The record label was at pains to point out that no passwords or credit card data was stolen. …

Member Avatar
Member Avatar
+2 forum 3

[ATTACH=RIGHT]16335[/ATTACH]On August 1, [URL="http://www.tombom.co.uk/blog/?p=262"]Defcon attendee Chris Paget showcased the vulnerability of the AT&T network[/URL] by eavesdropping on cell phone calls in front of a live audience. Paget warned attendees ahead of time what he planned to do: [I]1. If you’re in an area where your cellphone calls might be intercepted, there will be prominent warning signs about the demo including the time and date as well as a URL for more info. This will be the only time when unknown handsets will be allowed to connect; at all other times only pre-registered handsets will be granted access. You will be …

Member Avatar
+0 forum 0

I have used Resource Hacker to extract all the files from an .exe so I could translate the menus right (translating in the program shows me wrong characters). Now I want to compile these files into an .exe file. How can I do that? Thank you in advance.

Member Avatar
Member Avatar
+0 forum 2

On Thursday, notorious computer hacker [URL="http://en.wikipedia.org/wiki/Albert_Gonzalez"]Albert Gonzalez (aka SoupNazi)[/URL] was sentenced to 20 years in prison. That is the longest sentence ever to be slapped on someone for hacking. He was accused of targeting a bunch of retail stores in the U.S. including Barnes & Noble, BJ's Wholesale Club, OfficeMax, The Sports Authority and TJ Maxx to name a few. According to [URL="http://www.law.com/jsp/article.jsp?id=1202446860357&Computer_Hacker_Albert_Gonzalez_Sentenced_to__Years"]Law.com[/URL], on September 11, 2009 [ironically] this cyber terrorist pleaded guilty to several counts of computer fraud, wire fraud, access device fraud and aggravated identity theft. It was believed that Gonzalez would hack into and steal information from …

Member Avatar
+0 forum 0

A friend of mine posted this on his FB page a few hours ago... [B][I]HACKER WARNING! There is a new way to hack your Facebook. A Notification will be sent to you that one of your friends has commented on your status, it will open a new page and tell you to re-enter your Facebook user name and password. The page looks just like the FB login page so be on the look out!! please repost this to your status to let your facebook family know.[/I][/B] Has anyone else heard about this and can either confirm or deny? Until we …

Member Avatar
Member Avatar
+0 forum 3

Just when it looked like every avenue to prevent the extradition of self-confessed NASA Hacker Gary McKinnon had been exhausted, especially when just last week a couple of High Court judges denied him leave to appeal his case to the highest court in the UK, it looks like the [URL="http://www.daniweb.com/blogs/entry3877.html"]hacking cause célèbre[/URL] has got a reprieve. In an unexpected twist, Home Secretary Alan Johnson has delayed the extradition proceedings while he considers the medical evidence. Diagnosed with Asperger's Syndrome, it has been argued by the Free Gary campaign that to send him to prison in the US would be the …

Member Avatar
+0 forum 0

Gary McKinnon is either a UFO-obsessed nerd who happens to suffer from a form of autism, or a fugitive from justice who was responsible for the biggest military hack of all time. The description varies depending upon whether you are a balanced individual with no axe to grind or the US authorities looking for a scapegoat to deflect the simple fact that their own cyber-defences are woefully inadequate. Rather predictably, but nonetheless sadly, Gary McKinnon today lost his judicial review in London which he was hoping would allow him to be tried for his crimes in the UK rather than …

Member Avatar
Member Avatar
+0 forum 1

Anyone else getting pretty fed up with the number of headlines both online and in the print media which have been exclaiming 'Twitter hacked' this week? I have even just got a press release, from a storage systems company of all things, that has the strap line of "Twitter hack caused by lack of security" and starts "News that Twitter has been hacked yet again comes as no surprise." Well it comes as something of a surprise to me, to be honest, not least considering that Twitter has not actually been hacked at all. It is surely stretching both journalistic …

Member Avatar
Member Avatar
+0 forum 1

Hackers managed to get root access to a large Internet Service Provider, reportedly via a zero day vulnerability over the weekend, and destroy data from 100,000 websites as a result. The UK-based ISP, VAServ, has [URL="http://www.theregister.co.uk/2009/06/08/webhost_attack/"]stated[/URL] that the attackers apparently exploited a vulnerability in virtualisation software called HyperTM in order to gain access to the servers. It would appear that around 100,000 of the websites hosted at Vaserv had data destroyed in one hit on Sunday, possibly courtesy of a recursive delete 'rm -rf' Unix command. Unfortunately, many VAServ customers have an unmanaged account with no data backup. It is …

Member Avatar
Member Avatar
+0 forum 1

I guess that is what you might call a turn up for the books, as the US [URL="http://www.daniweb.com/blogs/entry1506.html"]Department of Homeland Security[/URL] announces the 16 members which have been sworn in to serve on the Homeland Security Advisory Council. Especially when you consider that one of them, Jeff Moss, is best known for being the founder of the [URL="http://www.itwire.com/content/view/19935/53/"]Black Hat[/URL] and [URL="http://www.itwire.com/content/view/19947/53/"]DEFCON[/URL] hacker conferences and something of a hero to the hacker community. At DEFCON there is even a 'spot the fed' competition where prizes are awarded for those who can pick out undercover FBI agents in the crowd. The official …

Member Avatar
+0 forum 0

Gary McKinnon, the British hacker who is still fighting against extradition to the US despite the European Court of Human Rights ruling he should go, has played yet another card in his battle for justice in the UK. Apparently, lawyers representing McKinnon have told the British Crown Prosecution Service that he would be prepared to plead guilty to offences under the Computer Misuse Act if prosecuted in the UK. This rather than face trial for his crimes, where it is argued he would face lengthy prison time as a consequence of being something of a scapegoat for the authorities there. …

Member Avatar
+0 forum 0

Cast your minds back a couple of years to 2007 and as far as hacking was concerned there was only really one big story, and I do mean big. The biggest reported case of cyber-criminals using hacking skill to steal something in the region of 40 million credit card details. Although most widely reported as the [URL="http://www.daniweb.com/blogs/entry1975.html"]TJ Maxx hack[/URL] thanks to TJX (which operates as TJ Maxx or TK Maxx depending upon where in the world you shop) other stores such as Barnes & Noble, Sports Authority and OfficeMax were also impacted by the hacking gang. Now, according to [URL="http://www.sophos.com"]Graham …

Member Avatar
Member Avatar
+0 forum 2

According to an application vulnerability specialist, Fortify Software, HUB Computer Systems in the US has been hit by a $52,000 phone bill following the [URL="http://www.itexaminer.com/hacking-victim-hit-with-52000-phone-bill.aspx"]unauthorised access[/URL] of the company IP-enabled PBX by hackers. "The advent of IP-enabled PBXs, and the facility of remotely- programmable `conventional' PBX systems, means that hackers can – with sufficient time and access - rack up large phone bills on the unfortunate victim's account" said [URL="http://www.fortify.com"]Robert Rachwald[/URL], Fortify's director of product marketing. Of course, it now being holiday season and companies priming for a prolonged shutdown, the risk is even greater for business and the opportunity …

Member Avatar
+0 forum 0

Isn't anything safe from hackers? Now they've apparently found a way to hack into systems through a media stream, threatening users with denial of service attacks that can bring down servers and desktops alike. The vulnerability was reported yesterday by VoIPshield Laboratories, a security tools maker in Canada. The flaws were found in Microsoft Office Communications Server 2007, Office Communicator and Windows Live Messenger, which Microsoft said could impact as many as 250 million people. The flaws also affect [url=http://www.voipshield.com/research.php]many other applications[/url] and systems that use the [url=http://en.wikipedia.org/wiki/Real-time_Transport_Protocol]Real-time Transport Protocol[/url] (RTP), including those from Avaya, Cisco and Nortel, according to …

Member Avatar
Member Avatar
+0 forum 1

You've got to love this one. A Bangladesh government website, for the Rapid Action Battalion, was hacked last week. It was one of those hacktivism style affairs, with the home page defaced and a message left in its place. The message, in this instance, read: "GOVERNMENT DOES NOT TAKE ANY STEP FOR ICT DEVELOPMENT. BUT PASSED A LAW ABOUT ANTI-CYBER CRIME. YOU DO NOT KNOW WHAT IS THE CYBER SECURITY OR HOW TO PROTECT OWNSELF. LISTEN. HACKERS R NOT CRIMINAL. THEY R 10 TIME BETTER THAN YOUR EXPERT. WE ARE GINIOUS THAN YOU CAN'T THINK. DEFACED FROM BANGLADESH." Trouble is, …

Member Avatar
Member Avatar
+0 forum 3

I guess you could call it karma. HD Moore's company, BreakingPoint, found that traffic was being diverted to a scammer Google page. This kind of cache poisoning attack on DNS servers is not unusual, however this particular case was because HD Moore is the man who created the Metasploit hacking toolkit. What's more this kind of poisoning was recently made a lot easier than it used to be, in no small measure thanks to the HD Moore Metasploit project being the first to release software that exploits the new technological method for doing so. According to [URL="http://www.pcadvisor.co.uk/news/index.cfm?newsid=13879&"]PC Advisor[/URL] it would …

Member Avatar
Member Avatar
+0 forum 1

According to the [URL="http://www.guardian.co.uk/world/2008/jul/27/internationalcrime.hacking?gusrc=rss&feed=technologyfull"]Observer newspaper this morning[/URL] Gary McKinnon, the British hacker accused of what US prosecutors refer to the biggest military computer hack of all time, has claimed he was threatened with a military tribunal at Guantanamo Bay. His lawyers are using this as part of their defence against his extradition, arguing that such an attempt at getting McKinnon to accept a plea bargain were an unlawful abuse of the court process. The Observer claims the lawyers say that US prosecutors suggested "he would be treated like a terrorist" if he did not agree to plead guilt at a …

Member Avatar
Member Avatar
+0 forum 1

Amazingly, according to [URL="http://www.theinquirer.net/gb/inquirer/news/2008/06/20/teen-faces-years-hacking"]The Inquirer[/URL], an Orange County hacker is facing an incredible 38 years in prison if found guilty of several counts relating to hacking into his school computer. It seems that Omar Khan, 18, of Coto de Caza, California hacked into computer in order to change his grades. Indeed, it is reported that he attempted to change all his C, D and F grades to As and Bs. The discrepancy soon came to light when school administrators were asked for a new school transcript by Khan as he appealed a denial of admission to the University of California. …

Member Avatar
Member Avatar
+0 forum 2

It has been estimated that something in the region of 70 percent of the ATMs in current use are based not on the proprietary hardware, software and communication protocol platforms of old but instead on PC/Intel hardware and commodity operating systems, the most popular being Windows XP embedded. In fact, it is not too much of a stretch of the imagination to think of these ATMs as being simple PCs running simple PC operating systems and using the standard Internet Protocol that we are all used to. Of course, all this is housed in a very secure vault-like box along …

Member Avatar
Member Avatar
+0 forum 5

According to Oxford, UK based database security specialists [URL="http://www.secerno.com/"]Secerno [/URL]databases are open to attack from growing insider threats that give employees carte blanche to access confidential data. Naturally, the company has a product to plug, a database assurance platform called Secerno.SQL, but to be honest I am more interested in the results of an independent survey published as part of the publicity push. This revealed that over 60 percent of UK employees have access to computer records at their place of work, 56 percent have no restrictions whatsoever placed upon the information they have privileges to access, 41 percent have …

Member Avatar
Member Avatar
+0 forum 2

The End.