blog trackingRealtime Web Statistics posts Archives - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘posts’

Chief data and security posts vacant by Victorian government

The new cyber security plan will be imposed by the Victorian governmental and for that, they are looking to appoint the new Cyber Security personnel. This plan will begin from the upcoming month. The security plan is built up on the structure of the Commonwealth Attorney – General and Australian Signal Directorate. Read More….

For more information go to, http://www., or

The post Chief data and security posts vacant by Victorian government appeared first on National Cyber Security.

View full post on National Cyber Security

How The Washington Post’s New Owner Aided the CIA, Blocked WikiLeaks & Decimated Book Industry 2/2 – The Washington Post announced on Monday the paper had been sold to founder and CEO Jeff Bezos for $250 million. Bezo…

________________________ – – –

Chinese Communist Party Media Posts Execution Photos Actually Came From Fetish Porn Site

Read More….

View full post on The Cyber Wars

Havoc Of Mobb Deep Posts Nude Twitter Photo: Was He Hacked?

Today fans of Mobb Deep were given more than they bargained for, from Havoc. The Queens rapper shared a few racy and explicit nude photos on his Twitter account and quickly became a trending topic. One of the photos was a clear shot of his nether regions, which sent hip-hop heads into a tailspin. Read More….

View full post on Hip Hop Security

Worm Posts on SNS Sites and Wipes out Rivals

W32.Wergimog is a worm that attempts to spread through removable drives and opens a back door. When I looked into its variants, I found an interesting sample, which I named W32.Wergimog.B. Both samples are based …

View full post on National Cyber Security

Worm Posts on SNS Sites and Wipes out Rivals

W32.Wergimog is a worm that attempts to spread through removable drives and opens a back door. When I looked into its variants, I found an interesting sample, which I named W32.Wergimog.B. Both samples are based …

View full post on National Cyber Security

Adobe Posts Fix For Critical Flash Flaw

View full post on News ≈ Packet Storm

View full post on National Cyber Security

Busted! FBI led to Anonymous hacker after he posts picture of girlfriend’s breasts online

This is the picture that led the FBI to a catch prolific hacker allegedly responsible for releasing the personal information of scores of police officers throughout the United States.

View full post on anonymous hacker – Yahoo! News Search Results

View full post on National Cyber Security

Pastebin to filter hacktivist posts more carefully

Pastebin’s status as the favoured website on which to post evidence of stolen or hacked data could become a thing of the past with the news that its owner plans to filter content more carefully.

In an email interview with the BBC, current owner Jeroen Vader admitted that the site now examined an average of 1,200 abuse reports a day via its notification system and needed to hire more staff to cope with this volume of traffic.

The site was also becoming a target itself and now received DDoS attacks almost every day, he said.

“February was a terrible month, so many attacks. It was a real nightmare to run the site. The longest one went on for more than 48 hours,” said Vader.

The site’s biggest challenge remains its reputation as a repository for stolen data as evidenced by numerous incidents since Vader took the site over in early 2010.

The sale was partly motivated by the infamous hack that gave Pastebin unwanted public attention in 2009 when it was used to publish the logins for thousands of Gmail, Hotmail, Yahoo and AOL webmail users.

Since then, it has become associated with an increasing number of data-sharing attacks, including the Comodo hacker’s famous SSL raids on various certificate authorities, the publication of credit cards culled from Saudi Arabian credit card users, and the theft of 100,000 Facebook user logins.

However, its most famous moments were undoubtedly connected to its regular use by LulzSec and Anonymous hacking groups to publicise attacks.

Equally, it has been used to publish details of important security vulnerabilities such as the one that affected Dropbox last June, which is where Pastebin’s tricky modus operandi becomes apparent. It is designed to be a repository for open information exchange, a sort of technical or coder’s version of Wikileaks. That this is often being abused is inherent to its open model.

“I am looking to hire some extra people soon to monitor more of the website’s content, not just the items that are reported,” Vader told the BBC.

“Hopefully this will increase the speed in which we can remove sensitive information. This will give us more time to look at trending items in detail if they haven’t been reported yet.”

Pastebin also shared IP address information if it was requested by the police using a valid court order, he said.

Article source:

View full post on National Cyber Security » Computer Hacking

Hacker posts Symantec source

A hacker released the source code for antivirus firm Symantec’s pcAnywhere utility on Tuesday, raising fears that others could find security holes in the product and attempt takeovers of customer computers.

The release followed failed email negotiations over a $50,000 payout to the hacker calling himself YamaTough to destroy the code.

The email thread was published on Monday, but the hacker and the company said their participation had been a ruse. YamaTough said he was always going to publish the code, while Symantec said law enforcement had been directing its side of the talks.

The negotiations also might have bought Symantec time while it issued fixes to the pcAnywhere program, which allows customers to access their desktop machines from another location.

“Symantec was prepared for the code to be posted at some point and has developed and distributed a series of patches since January 23 to protect our users against known vulnerabilities,” said company spokesman Cris Paden.

Symantec had taken the extraordinary step of asking customers to stop using the software temporarily until it readied the patches. It issued fixes for “known vulnerabilities” in version 12.5 of the software on January 23 and fixes for versions 12.0 and 12.1 on Friday January 27.

Paden said that Symantec had contacted its customers and that it had not lost any customers. He said that if they were running up-to-date, patched versions they should not face increased risk.

Symantec also expects hackers to release other source code in their possession, 2006 versions of Norton Antivirus Corporate Edition and Norton Internet Security. “As we have already stated publicly, this is old code, and Symantec and Norton customers will not be at an increased risk as a result of any disclosure,” Paden said.

The emails over the $50,000 payoff was widely circulated, with some mocking the world’s largest standalone security company for its apparent attempt to buy protection.

But the company said the emails were in fact between the hacker and law enforcement officials posing as a Symantec employee.

“The communications with the person(s) attempting to extort the payment from Symantec were part of the law enforcement investigation,” Paden said, adding that no money was paid.

Paden declined to name the law enforcement agency, saying it could compromise the investigation.

Symantec had previously confirmed the hacker, part of a group called Lords of Dharmaraja and affiliated with Anonymous, was in possession of source code for its products, obtained in a 2006 breach of the company’s networks.

The email exchange released by the hacker, who claims to be based in Mumbai, India, shows drawn-out negotiations with a purported Symantec employee starting on January 18.

The email negotiations echoed conversations in past years, viewed by Reuters, in which police agencies directed talks between victims and hackers.

“We can’t pay you $50,000 at once for the reasons we discussed previously,” said one email from a purported Symantec employee Sam Thomas, who offered to pay the full amount at a later date.

“In exchange, you will make a public statement on behalf of your group that you lied about the hack.”

A common tactic of the FBI and others investigating extortionists and kidnappers is to seek to break down the amount of money sought by the suspects into multiple smaller payments.

This stretches out the negotiation, giving authorities more insight into the suspect and more time in which to make an arrest. It also lessens the risk to any victim inclined to pay the entire amount demanded.

Most important, it creates more transactions, each one of which provides a trail of records and human beings that can be traced as the police seek their quarry.

The hacker said he never intended to take the money.

“We tricked them into offering us a bribe so we could humiliate them,” YamaTough told Reuters.

In recent weeks, the hacker has posted segments of code for Norton Utilities and other programs. A software maker’s intellectual property, specifically its source code, is its most precious asset.

Symantec’s Norton Internet Security is among the most popular software available to stop viruses, spyware, and online identity theft.

Copyright 2012 Thomson Reuters. Click for restrictions.

Article source:

View full post on National Cyber Security » Computer Hacking

Page 1 of 41234»

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?

Find Out More, Click Here!