Malware is complex, seemingly everywhere and is often difficult to stop. It knows how to find your data?even on your mobile device and Mac. Targeting high-profile organizations, damaging data loss incidents and web threats — such as fake antivirus and SEO poisoning – continue to make headlines for malware attacks this year.
Friday, October 21, 2011
Security Threat Report 2011 Released
Malware is complex, seemingly everywhere and is often difficult to stop. It knows how to find your data?even on your mobile device and Mac. Targeting high-profile organizations, damaging data loss incidents and web threats — such as fake antivirus and SEO poisoning – continue to make headlines for malware attacks this year.
Wednesday, October 19, 2011
Exposure about privacy on facebook !
“Here we have the world's most comprehensive database about people, their relationships, their names, their addresses, their locations and the communications with each other, their relatives, all sitting within the United States, all accessible to U.S. intelligence.”
Web Cookies Sniffer
WebCookiesSniffer is a new packet sniffer utility that captures all web site cookies sent between the web browser and the web server and displays them in a simple cookies table. The upper pane of WebCookiesSniffer displays the cookie string and the web site/host name that sent or received this cookie. When selecting a cookie string in the upper pane, WebCookiesSniffer parses the cookie string and displays the cookies as name-value format in the lower pane.
Sesame Channel Hacked, Porn Posted
On Sunday afternoon, some of the world’s worst lowlifes decided to hack the Sesame Street YouTube channel and replace some of the videos with pornographic clips.
For about 20 minutes yesterday, visitors to the YouTube channel of the popular children’s show saw hardcore porn instead of Elmo and Big Bird. The channel has nearly 150,000 subscribers, and usually hosts dozens of clips from the PBS program.But Sunday, the hackers replaced the page’s banner to read,
For about 20 minutes yesterday, visitors to the YouTube channel of the popular children’s show saw hardcore porn instead of Elmo and Big Bird. The channel has nearly 150,000 subscribers, and usually hosts dozens of clips from the PBS program.But Sunday, the hackers replaced the page’s banner to read,
10,000 accounts hacked by TeamSwaSTika
Another group of Hackers, self titled Team Swastika, have caused panic amongst Facebook users after releasing the details of 10,000 accounts onto popular text sharing site, Pastebin.
Pastebin, usually used to share source code, has frequently been host to a number of text files that contain the details of specific hacks by hackitivists and hacker groups.
Pastebin, usually used to share source code, has frequently been host to a number of text files that contain the details of specific hacks by hackitivists and hacker groups.
"Times of money" Database Hacked
{Source: The Hackers News}
General Information About the Vulnerability
This is again a critical vulnerability discovery made by zSecure Team in TimesofMoney website. The group claims that there exist a critical SQL Inejction Vulnerability in the timesofmoney's website using which an attacker can gain access to the site's entire database which contains the huge amount of customers confidential information. Even many indian banks are availing the service of the timesofmoney. This vulnerability may prove to be very critical for the company because TimesofMoney is India's one of the leaders in e-payment system. Existence of such a critical flaw in company's web may cause huge to the existing market reputation of the company concerned.
Social Engineering Toolkit Released
The Social Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of penetration testing. It’s main purpose is to augment and simulate social-engineering attacks and allow the tester to effectively test how a targeted attack may succeed.
Hacking Password Protected Sites
There are many ways to defeat java-script protected websites. Some are very simplistic, such as hitting
[ctl-alt-del ]when the password box is displayed, to simply turning offjava capability, which will dump you into the default page.You can try manually searching for other directories, by typing the directory name into the url address box of your browser, ie: you want access to www.target.com .
Hacking Voicemail System
Voice Mail is a relatively new concept and not much has been said about it.
It is a very useful tool for the business person and the phreak. The way it
works is that somebody wishing to get in touch with you calls a number,
usually a 1-800, and punches in on his touch-pad your mailbox number and then
It is a very useful tool for the business person and the phreak. The way it
works is that somebody wishing to get in touch with you calls a number,
usually a 1-800, and punches in on his touch-pad your mailbox number and then
101 Ways To Increase Blog Traffic
This summary is not available. Please
click here to view the post.
AIO Password Recovery Tools
Recover Gmail , Gtalk, MSN, Windows Live , AIM Passwords
AIM.Password.Recovery.v1.09.Incl.KeyGen-F4CG
FileZilla.Password.Recovery.v1.05.Incl.KeyGen-F4CG
Gmail.Password.Recovery.v1.10.Incl.KeyGen-F4CG
Google.Password.Recovery.v1.10.Incl.KeyGen-F4CG
Google.Talk.Password.Recovery.v1.10.Incl.KeyGen-F4CG
PalTalk.Password.Recovery.v1.09.Incl.KeyGen-F4CG
Password.Recovery.for.MSN.v1.08.Incl.KeyGen-F4CG
AIM.Password.Recovery.v1.09.Incl.KeyGen-F4CG
FileZilla.Password.Recovery.v1.05.Incl.KeyGen-F4CG
Gmail.Password.Recovery.v1.10.Incl.KeyGen-F4CG
Google.Password.Recovery.v1.10.Incl.KeyGen-F4CG
Google.Talk.Password.Recovery.v1.10.Incl.KeyGen-F4CG
PalTalk.Password.Recovery.v1.09.Incl.KeyGen-F4CG
Password.Recovery.for.MSN.v1.08.Incl.KeyGen-F4CG
INSTALLING XP IN 10 MINUTES!
STEP1 : After the Copy Part is Over … System is Rebooted as we all know In general Foramatting Procedure…
Now After Reboot The Below Image Will Appear….
Now After Reboot The Below Image Will Appear….
STEP 2: Now As This Image APPEARS You Have to Press ”Shift + F10 ” . This Will Open The command Prompt… Now type taskmgr in it. This will open the Task manager .
Tuesday, October 18, 2011
Pii Protection
Virtually every organization acquires, uses and stores personally identifiable information about its customers, employees, patients, students and other individuals. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft. Misusing, losing or otherwise compromising this data can carry a steep financial cost, damage a business’s reputation, and even lead to criminal prosecution, because of complex and frequently changing regulations. This white paper examines the challenges organizations
Charge Your Laptop In Few Munites
By using this technique will not charge you to sit for hours. U.S. Illinois University scientists have developed a technique through which your laptop or mobile will be charged in very less time . Three-D nano-structure is based on the technique used this technique not only mobile and laptop batteries to be charged but for the operation of the patients used the great big machines will be charged batteries in minutes with this technique.
Bypass Window XP Without Password
Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password.
You have several options to try and get around this problem.
If you have access to another user account with administrator rights, you can use that account to change the passwordof the account that is locked out. You can also use the default Administrator account that is built into Windows XP.
Cracking Zip Password Files
Tut On Cracking Zip Password Files..
What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com.
Spyware Info
There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.
What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product,
Make Windows XP Run Faster
Services You Can Disable
There are quite a few services you can disable from starting automatically.
This would be to speed up your boot time and free resources.
They are only suggestions so I suggestion you read the description of each one when you run Services
and that you turn them off one at a time.
20 Great Google Secret
Google is clearly the best general-purpose search engine on the Web
www.pcmag.com/searchengines
But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still a struggle to pare results to a manageable number.
Subscribe to:
Posts (Atom)