Tuesday, April 24, 2012

Google raises Hackers bounties to $20,000


Google on Monday raised to $20,000 its bounty on software bugs that hackers could exploit for cyber attacks on the Internet giant's online services.

The maximum reward for exposing a vulnerability that would let an intruder's code get up to mischief in a Google data centre was ramped up from the $US3,133 ($A3,030) payout set when the bounty program was launched in November of 2010.

Remote code flaws found in Google's Web apps will also be rewarded $20,000.The term "remote code execution" refers to the most serious category of vulnerabilities, those which when exploited allow an attacker to hijack a system and/or plant malware on a machine.

A $10,000 bounty will be paid for SQL injection bugs or significant authentication bypass or data leak vulnerabilities, Google said in the revised rules for the program.

At Google’s Pwnium contest in March, Google paid out $60,000 prizes to anyone that could exploit the Chrome browser. Two people managed to do so, and collected the money. Even at that rate, security researchers have made it clear the exploits would have been worth more if sold to malicious individuals. Google’s $20,000 top payment is likely still far below the market rate.

The bounty was raised to inspire software savants to hunt for difficult-to-find, and potentially perilous, bugs hidden deep in programs

New Flashback malware variant found in the wild


A new Flashback Trojan has been discovered that infects Macs without prompting the user for a password. If you haven’t updated Java on your Mac, or disabled it entirely, you could be a victim. The new variant  dubbed Flashback.S is actively being distributed in the wild, taking advantage of a Java vulnerability that Apple has already patched.

Flashback.S drops two files in the user's home folder, then deletes cached Java files to avoid detection. However, the researchers did not indicate what this new variant was specifically designed to do or how many computers might be infected.
At its height, the original Flashback, which was designed to grab passwords and other information from users through their web browser and other applications, was estimated to be infecting more than 600,000 Macs.

After analyzing 100,000 Macs running the firm's free anti-virus software program, Sophos discovered several Apple computers carrying Windows malware.

This is not the first time that Mac users have been hit by a Windows-style computer virus. Last year, security researchers discovered that a piece of malware, called Mac Defender, was aimed at Macs until Apple released a patch at the end of May 2011.

Sunday, April 22, 2012

winAUTOPWN v3.0 Released - System vulnerability exploitation Framework


The improved GUI extension - WINAUTOPWN ACTIVE SYSTEMS TRANSGRESSOR GUI [ C4 - WAST ] is a Systems and Network Exploitation Framework built on
the famous winAUTOPWN as a backend.  C4 - WAST gives users the freedom to select individual exploits and use them.
BSDAUTOPWN has been compiled, like always for various flavours and has been upgraded to version 1.8 alongwith all applicable exploits which have been added in this release. Included this time is the bsd_install.sh, which will set chmod on all applicable BSD compiled binaries.

WINAUTOPWN requires PERL,PHP,PYTHON,RUBY and its dependencies alongwith a few others' too for smooth working of exploits included in it.

winAUTOPWN and bsdAUTOPWN are available at  HERE

Specialized Trojan can stealing credit card details from hotel


The next time you check in to a hotel, a cybercriminal could be checking you out. A remote access computer Trojan (RAT) designed to steal credit card details from hotel point-of-sale (PoS) applications is being sold on the underground forums, according to researchers from security firm Trusteer.

Trusteer, the world’s leading provider of secure web access services, detected these schemes and says hotel poaching is a virile trade in underground and tech forums. Attack codes can be purchased in Visa underground forums for $280 and the spyware cannot be detected by anti-virus software. The package even includes a manual loaded with tips on how the poacher can trick the desk clerk into loading the spyware for them.
Malware writers often repackage their malicious installers with new algorithms in order to evade signature-based antivirus detection, said Bogdan Botezatu, a senior e-threat analyst at antivirus vendor BitDefender.

"The fact that the RAT's creator decided to target the hospitality industry is consistent with a recently observed change in the focus of cybercriminals - an expansion from online banking attacks to attacks against PoS systems, Criminals are increasingly expanding the focus of their attacks from online banking targets to enterprises," said Trusteer's CTO Amit Klein.

While this credit card scam seems nearly impossible to detect and prevent, you can keep your finances, and identity, in check by routinely monitoring your bank balances, and reporting any suspicious or unauthorized transactions to your bank immediately.

Sunday, April 15, 2012

Stuxnet was planted by Iranian double agent using memory stick

The Stuxnet virus that damaged Iran’s nuclear program was implanted by an Israeli proxy — an Iranian, who used a corrupt “memory stick.32,” former and serving U.S. intelligence officials said. In the continuing battle to hold off the Iranian nuclear program, Iranian proxies have also been active in assassinating Iran’s nuclear scientists, these sources said.
These sources, who requested anonymity because of their close proximity to investigations, said a saboteur at the Natanz nuclear facility, probably a member of an Iranian dissident group, used a memory stick to infect the machines there. They said using a person on the ground would greatly increase the probability of computer infection, as opposed to passively waiting for the software to spread through the computer facility. “Iranian double agents” would have helped to target the most vulnerable spots in the system,” one source said. In October 2010, Iran’s intelligence minister, Heydar Moslehi said an unspecified number of “nuclear spies” were arrested in connection with Stuxnet.33 virus.
Former and senior U.S. officials believe nuclear spies belonged to the Mujahedeen-e-Khalq (MEK), which Israel uses to do targeted killings of Iranian nationals, they said. “The MEK is being used as the assassination arm of Israel’s Mossad intelligence service,” said Vince Cannistraro, former head of the CIA’s Counterterrorism. He said the MEK is in charge of executing “the motor attacks on Iranian targets chosen by Israel. They go to Israel for training, and Israel pays them.” Other former agency officials confirmed this.
As ISSSource reported, Stuxnet was a comprehensive U.S.-Israeli program designed to disrupt Iran’s nuclear technology. This joint program first surfaced in 2009 and worked in concert with an earlier U.S. effort that consistently sabotaged Iran’s purchasing network abroad.
But the United States never indulged in targeting killings of Iran scientists, and former senior U.S. officials said the U.S. public remained unaware of a separate Israeli program, independent of the United States, that has for ten years been assassinating key Iranian nuclear scientists and sabotaging key Iranian facilities using a proxy group of Iranian dissidents. These dissidents have a functioning, effective network inside Iran and they have access to officials in the nuclear program.
The MEK has a shadowy and unsavory history. Founded in the 1970s, the group was stridently anti-shah and allied itself with the dictatorship of Iraq’s Saddam Hussein from which it received most of its supplies. Performing security for Saddam, the MEK assisted Saddam in the slaughter of his domestic opponents and the massacre of Iraqi Shias and Kurds in the 1991 uprising.
As the military wing of the National Council of Resistance of Iran (NCRI), the MEK targeted Iranian officials and government facilities in Iran and abroad. In the 1970s, the group also attacked and killed Americans. According to one former senior CIA official who spoke on background to ISSSource, the MEK is particularly violent. In France, they conducted killings in Paris, including six or seven U.S. Army sergeants.” He added the French “were terrified of them.”
In 2003, the United States listed the NCRI as a terrorist organization and closed its Washington office. U.S. forces in Iraq captured the MEK’s weapons and turned the MEK over for investigation of terrorist acts. Since then, the group has been picking off Iranian nuclear scientists one by one.
When ISSSource asked Paul Pillar, a 28-year CIA veteran whether Israel was killing secondary or tertiary scientists instead of its major ones, he replied, “Israel kills any Iranians it can.” Since 2007, five Iranian nuclear scientists have been killed in Iranian territory, many victims dying from magnetic bombs that terrorists had attached to the exterior of their cars.
The damage caused by the MEK is not confined to killing individuals. On Oct. 12, 2011, just before Iranian President Mahmoud Ahmadinejad was to arrive in Lebanon, a huge blast destroyed an underground site near the town of Khorramabad in western Iran that housed most of Iran’s Shehab-3 medium-range missiles capable of reaching Israel and Iraq. A far right wing Israeli website, Debka, reported Iran suffered a “devastating blow” to its nuclear program. The blast killed 18 and wounded several more.
Former and serving U.S. officials both fingered the MEK as the killers. One such official said “computer manipulations,” caused the blast. They said the spies inside Iran had the access, the contacts, the positions and technical skill to do the job. “Given the seriousness of the impact on Iran’s (nuclear) program, we believe it took a human agent to spread the virus,” said one former U.S. intelligence source.
Meanwhile, going back to Stuxnet, once the memory stick was infected, the virus was able to infiltrate the network and take over the system. U.S. officials said they believe the infection commenced when the user simply clicked on the associated icon in Windows. Several reports pointed out this was a direct application of one of the zero-day vulnerabilities Stuxnet leveraged.
Building and deploying Stuxnet required extremely detailed intelligence about the systems it was supposed to compromise, and has made reprogramming highly specific installations on legacy systems more complex, not less. According to reports, the Stuxnet mystery was unveiled in June 2010, when a small company called VirusBlokAda in Minsk, the capital of Belarus was emailed by a dealer in Tehran about an irritating problem some of his clients were having with their computers.
The company analyst saw the computers were constantly turning off and restarting. At first the analyst thought it was just a problem with the hardware. But when they said several computers were affected, not just one, VirusBlokAda understood it was a problem with the software the computers were running.
U.S. officials confirmed Stuxnet takes advantage of zero-day vulnerabilities. This type of virus had been previously undetected, and remained unidentified by anti-virus software. According to public reports, early versions of Stuxnet used certificates by Realtek Semiconductor systems – later versions used certificates from JMicron Technology Corp. The use of these certificates gives the worm the appearance of legitimate software to Microsoft Windows.
In a report, Symantec said yes, Stuxnet was “splattered” far and wide, but it only executed its damaging payload where it was supposed to. The virus was so efficient that it could deliver its payload only to the designated target, and would not damage adjacent machines. Another expert, a former CIA official, likened it to a flu virus that only makes one family sick. Stuxnet was designed for sabotage, not crime.
It is interesting to note Stuxnet was not the first virus used by the U.S. military intelligence to try and disable opponents. In the 1980s, the United States had considerable success at planting viruses inside Soviet military-industrial structure that could be activated in time of war, a process still continuing with China. “We put in bugs inside the Soviet computers to feed back satellite information that had been ‘leeched’ off hard drives, in the Soviet Defense Ministry and others,” said a former U.S. intelligence official.
In December 1991, just before Desert Storm, the CIA and the British Government Communication Headquarters (GCHQ) had experimented with all sorts of viruses to inject into Iraq’s computers. In December, CIA operatives, working in Jordan, infiltrated bugs into hardware smuggled across the border and into Baghdad.
Once in place, NSA and GCHQ believed the virus would spread like a virulent cancer through the Iraqi Command and Control system, infecting every computer system it came across. But before the virus had reached its target, the air war began. U.S. planes destroyed Saddam’s command and control network, including the buildings where the infected computer hardware had been so successfully inserted. As a result, one of the most successful intelligence operations of the war was buried beneath the rubble. “The intelligence people were very pissed — all that work for nothing,” said a former senior DoD official.

Sabpab - Another Mac os Backdoor Trojan Discovered


Security firm Sophos has discovered more malware for the Mac OS X platform called Sabpab. It uses the same Java vulnerability as Flashback to install
itself as a “drive-by download.” Users of older versions of Java now have still more malware to worry about.

It also doesn't require any user interaction to infect a system either just like Flashback all that needs to happen is for you to visit an infected webpage. Sabpab, according to Sophos, installs a backdoor that allows the hackers to capture screen snapshots, upload or download files and execute commands on infected Macs remotely.

The Trojan creates the files
  • /Users//Library/Preferences/com.apple.PubSabAgent.pfile
  • /Users//Library/LaunchAgents/com.apple.PubSabAGent.plist

Android Video Malware found in Japanese Google Play Store


A new Trojan has been found, and removed, from the Google Play/Android Market, McAfee reported on Friday afternoon. The post says applications carrying the Trojan promise
, and in some cases deliver, trailers for upcoming video games or anime or adult-oriented clips, but they also request "read contact data" and "read phone state and identity" permissions before being downloaded.

McAfee Mobile Security detects these threats as Android/DougaLeaker.A, the company said.McAfee said that the fifteen malicious applications of this sort had been found on Google Play, and that all had been removed from the market.
The app gathers the Android ID not the IMEI code that can uniquely identify the device, but the 64-bit number that is randomly generated on the device's first boot and remains with it for the life of the device. The app also harvests the phone's phone number and contact list, along with every name, phone number, and email of every person in the contact list.

The apps had been downloaded by at least 70,000 users, it added. McAfee says its Mobile Security product detects the threats as Android/DougaLeaker.A, and that Google Play users should check to be sure apps aren't requesting inappropriate permissions.

Friday, April 13, 2012

Ransomware replaces Windows MBR and asking users for Money

Ransomware replaces Windows MBR and asking users for Money
Ransomware+replaces+Windows+MBR

Security researchers from TrendMicro, F-Secure and Dr. Web have intercepted two new ransomware variants currently circulating in the wild. This new ransomware variant prevents infected computers from loading Windows by replacing their
master boot record (MBR) and displays a message asking users for money.

Cris Pantanilla, a threat response engineer at Trend Micro said, "Based on our analysis, this malware copies the original MBR and overwrites it with its own malicious code," "Right after performing this routine, it automatically restarts the system for the infection take effect."

The MBR is a piece of code that resides in the first sectors of the hard drive and starts the boot loader. The boot loader then loads the OS. Instead of starting the Windows boot loader, the rogue MBR installed by the new ransomware displays a message that asks users to deposit a sum of money into a particular account via an online payment service called QIWI, in order to receive an unlock code for their computers.

Both F-Secure and Dr.Web have intercepted an identical ransomware variant. Upon execution it encrypts all files, by adding a .EnCiPhErEd file extension. End users are given the option to have 5 attempts to try and enter the unlock code, in between the malware deletes itself and leaves the files encrypted.

The ransomware displays the following message to infected users:
Attention! All your files are encrypted! You are using unlicensed programms! To restore your files and access them, send code Ukrash or Paysafecard nominal value of EUR 50 to the email koeserg@gmail.com. You have 5 attempts to enter the code. If you exceed this of all data irretrievably spoiled. Be careful when you enter teh code!


Repairing the MBR is no trivial matter and usually requires booting from the Windows installation disk, getting into the recovery command console and typing special commands.Ransomware infections are typically more common throughout Eastern Europe and South America, but this type of malware is slowly gaining traction in other regions of the world as well. 

Wednesday, April 11, 2012

Your Facebook credentials at risk on Android - iOS jailbroken devices

 
Facebook allows its authentication credentials to be stored in plain text within the Apple iOS version of its mobile app, allowing an attacker complete control over your Facebook account if he knows where to look.

Security researcher Gareth Wright noted the vulnerability and alerted Facebook. Wright wrote on his blog that he discovered the issue while exploring the application directories in his iPhone with a free tool and came across a Facebook access token in the Draw Something game on his phone.

The simple ‘hack’ allows a user to copy a plain text file off of the device and onto another one. This effectively gives another user access to your account, profile and all on that iOS device.
Facebook’s native apps for the two platforms not encrypting your login credentials, meaning they can be easily swiped over a USB connection, or more likely, via malicious apps. Facebook has responded that this issue only applies to compromised or jailbroken devices.

"My jaw dropped as over the next few minutes I watched posts appear on my wall, private messages sent, webpages liked and applications added," Wright wrote. Wright said that he harvested over 1,000 plists over the course of a week, although he copied no data.

As for the USB connection scenario, Facebook says there’s no way to fix this problem. Note that in this case it doesn’t matter if your device is jailbroken or not, because whoever is doing the deed has physical access to your phone or tablet.

Facebook said in a statement that the modifications made to the phone were responsible for exposing the data:
Facebook's iOS and Android applications are only intended for use with the manufacture provided operating system, and access tokens are only vulnerable if they have modified their mobile OS (i.e. jailbroken iOS or modded Android) or have granted a malicious actor access to the physical device. We develop and test our application on an unmodified version of mobile operating systems and rely on the native protections as a foundation for development, deployment and security, all of which is compromised on a jailbroken device. As Apple states, "unauthorized modification of iOS could allow hackers to steal personal information ... or introduce malware or viruses." To protect themselves we recommend all users abstain from modifying their mobile OS to prevent any application instability or security issues.

Wright called Facebook's statement "rubbish," adding that the vulnerability is present on both jailbroken and non-jailbroken phones.
 

Anonymous plans to take down Great Firewall of China



Anonymous plans to launch more attacks on Chinese government Web sites in an effort to highlight corruption and push for human rights improvements. While they managed to deface well over 500
sites we are now hearing they aren’t finished yet and have even more plans for the Chinese government coming soon, and bigger targets.

The group used the Twitter account “Anonymous China” to publicise the attacks, posting links to data files that contained passwords and other personal information from the hacked websites. This comes just days after all the attacks last week that even had messages warning of the downfall of the Chinese government.
The attacks are part of a bigger plan according to Anonymous hacker “f0ws3r” who told Reuters that the group is hoping to take down the “Great Firewall of China” A recent tweet from the Anonymous China Twitter feed confirms the group’s plans.

They claim to have hundreds of translators helping them hack Chinese Web sites. This is consistent with the hacks that happened a few weeks ago being displayed in English instead of Chinese.

The hacker declined to give further details on the next round of attacks, except to say it may hit bigger targets.The United States says it has suffered many high-profile hacking attacks that appear to come from China, often targeting human rights groups as well as U.S. companies. China maintains that it too is a victim of hacking attacks.

Learning Objective-C : Memory Management (ENG)



iDeveloper - Learning Objective-C : Memory Management (ENG)
English | 160 Min | 960 x 540 | x264 - 128Kbps | 25.000fps | ACC - 108Kbps

Objective-C is the language you have to use if you want to write fantastic apps for Mac OS and iOS. This soup-to-nuts course on Objective-C gives you the solid basis in Objective-C that you absolutely need for writing applications for these platforms. This course is designed to be the the perfect foundation for you to start from whether youre going to be coding on either Mac OS or iOS.

Click on read more to download  :)


Part 1      Part 2       Part 3       Part 4      Part 5     Part 6 
  Part 7    Part 8    Part 9     Part 10   Part 11   Part 12   Part 13

TigerBot - SMS Controlled Android Malware Stealing Information


A new form of Android malware controlled via SMS messages has been discovered and the malware can record
phone calls, upload the device’s GPS location,
Researchers at NQ Mobile, working alongside researchers at North Carolina State University, have discovered this Android malware called "TigerBot", differs from “traditional” malware in that it is controlled via SMS rather than from a command & control (C&C) server on the Internet.

A common aspect of Android malware is the use of a command and control server that tells the malware what to do next and acts as a repository for any captured passwords or banking information.

The current information about this malware show that it can execute a range of commands including uploading the phone’s current location, sending SMS messages, and even recording phone calls. It works by intercepting SMS messages sent to the phone and checking to see if they are commands for it to act. If they are, it executes the command and then prevents the message from being seen by the user.

TigerBot tries to hide itself from the user by not showing any icon on the home screen and by using legitimate sounding app names (like System) or by copying names from trusted vendors like Google or Adobe.

Based on our current analysis, it supports the following commands:
  • Record the sounds in the phone, including the phone calls, the surrounding sounds and etc.
  • Change the network setting.
  • Upload the current GPS location.
  • Capture and upload the image.
  • Send SMS to a particular number.
  • Reboot the phone.
  • Kill other running processes.
To avoid becoming a victim, Only download applications from trusted sources, reputable application stores, and markets, and be sure to check reviews, ratings and developer information before downloading.
and reboot the phone, among other things.

Monday, April 9, 2012

Total Training - Adobe Dreamweaver CS4 Essentials


Total Training - Adobe Dreamweaver CS4 Essentials | 644MB

Click on read more to go to download page
PART0   PART1   PART2   PART3   PART4   PART5   PART6  PART7  PART8  PART9  PART10  PART11

PART12    RAR 

Lynda.com – WordPress Creating Custom Widgets and Plugins 396MB


Topics include:

* Installing WPI and MAMP server solutions
* Administering WordPress plugins
* Introducing hooks
* Writing the PHP for a plugin
* Using template tags and shortcode
* Building a new widget
* Creating an admin interface
* Accessing the WordPress database
* Using jQuery and AJAX for posts and pages
* Registering and promoting plugins

Password : http://free-4-free.blogspot.com/

 Go down to read more to download


PHP Programming: The Basics Tutorials 587MB_Mediafire links






Direct links  !! Down here

 

Part1     Part2     Part3     Part4     Part5     Part6

Thursday, April 5, 2012

The Pirate Bay Buys Greek Airspace for Launching Low Orbit Server Drones


Few days back we reported that, One of the world's largest BitTorrent sites "The Pirate Bay" is going to put servers on GPS-controlled aircraft drones in order to evade authorities who are looking to shut the site down.

Most of the people from World didn't take it serious, well
but The Pirate Bay is apparently deadly serious about investing in drone servers that it will fly in international airspace to make it incredibly difficult for governments to stop its expansion.A blog posting on the Pirate Bay site said the service had gone offline for a few hours on 18th March to move its front machines (which redirect a user’s traffic to a masked location). “We have now decided to try to build something extraordinary,” it said.

If actually happening, it is part of a wider move to stay several steps ahead of the law, with The Pirate Bay gleefully thumbing its nose at the legislative attempts to bring it down. While a number of users are relying on VPNs (virtual private networks) to mask what they are doing online, some services are offering something similar, but on a mass scale.

Here’s the full announcement.
“Political power in Athens, Greece, today signed an agreement with representatives for The Pirate Bay (TPB) about exclusive usage of the greek airspace at 8000-9000ft.

- This might come as a shock for many but we believe that we need to both raise money to pay our debts as well as encourage creativity in new technology. Greece wants to become a leader in LOSS, says Lucas Papadams, the new and crisply elected Prime Minister of Greece.

LOSS that he is referring to is not the state of finances in the country but rather Low Orbit Server Stations, a new technology recently invented by TPB. Being a leader for a long time in other types of LOSS, TPB has been working hard on making LOSS a viable solution for achieving 100% uptime for their services.

- Greece is one of few countries that understands the value of LOSSes. We have been talking to them ever since we came up with the solution seeing that we have equal needs of being able to find financially sustainable solutions for our projects, says Win B. Stones, head of R&D at TPB.

The agreement gives TPB a 5 year license to use and re-distribute usage of the airspace at 8000-9000 ft as well as unlimited usage of the radio space between 2350 to 24150 MHz. Due to the financial situation of both parties TPB will pay the costs with digital goods, sorely needed by the citizens of Greece.”

The sign off in the Pirate Bay blog – “when time comes we will host in all parts of the galaxy, being true to our slogan of being the galaxy's most resilient system” appears intentionally hyperbolic.