blog trackingRealtime Web Statistics Websites Archives | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Websites’

Hacker who brought down FBI and Home Office websites ‘sorry’

Source: National Cyber Security – Produced By Gregory Evans

Hacker who brought down FBI and Home Office websites ‘sorry’

A teenage hacker from Solihull who brought down the FBI and Home Office websites from his bedroom has said that he “honestly regrets” his actions. Charlton Floate, 19, used his internet expertise to target the US and British government sites — but avoided an immediate jail sentence last month. The 19-year-old was given an eight month prison sentence, suspended for 18 months, and was ordered to carry out 250 hours of community service. Mr Recorder John Steele QC said that Floate was “highly intelligent” with a deep and clear knowledge of information technology who had taken a lead role in the conspiracy and had recruited others. The self-styled internet and online marketing guru had previously admitted three charges under the Computer Misuse Act and two of possessing prohibited images. The teenager, then aged 16, managed to cripple the Federal Bureau of Investigation’s internet crime complaints centre (IC3) site for more than five hours, by flooding the server with huge amounts of data traffic. Speaking to BBC 5 Live Daily , the reformed hacker expressed deep regret at his actions. He said: “I honestly regret doing that type of thing now. I got caught up in a world that is rather […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker who brought down FBI and Home Office websites ‘sorry’ appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker jailed for eight months after attacking police, council, charity and porn websites

Source: National Cyber Security – Produced By Gregory Evans

Hacker jailed for eight months after attacking police, council, charity and porn websites

A jobless computer hacker was jailed today for eight months after launching a mass cyber attack on The Met Police, Tory Party and British Airways websites — from his bedroom in his parents’ house. Ian Sullivan, 51, flooded the internet servers for police forces, councils, charities and even porn sites as part of a campaign run by an international hackers’ group called Anonymous. Victims also included Merseyside Police , Trafford and Wirral councils and Crimestoppers during his five week spree, Liverpool Crown Court heard. Other sites targeted were the Bulgarian government and a political party in the oil rich West African country of Gabon, while children’s charity CAFCASS had to close for three days because of the chaos. The tech-wizard targeted official websites in revenge for his children being taken away in the late 1990s and Sullivan had ‘nursed that grievance’ for many years. He also infiltrated random sites including one featuring graphic videos of beheadings and executions related to Islamic extremism. Sullivan, who lives in his elderly parents’ semi-detached home in Farmer Place, Bootle , had admitted 21 charges of committing unauthorised acts with intent to impair the operation of or access to a computer after police from the […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker jailed for eight months after attacking police, council, charity and porn websites appeared first on National Cyber Security.

View full post on National Cyber Security

Google Chrome vulnerability allows Websites to Eavesdrop on You

Source: National Cyber Security – Produced By Gregory Evans

Just imagine, you are sitting in front of your laptop and your laptop is listening to your nearby conversations. What if the recorded audio from the system’s microphone is being instantly uploaded to a malicious website?Google has created a speech-recognition Application Programming Interface (API) that allows websites to interact with Google Chrome and the computer’s microphone allows you to speak instead of typing into any text box, to make hands-free web searches, quick conversions, and audio translator also work with them.In January, a flaw was discovered in Google Chrome that enabled malicious websites with speech recognition software to eavesdrop on users’ conversations from background without their knowledge using an outdated Google speech API.A new similar vulnerability in Google Chrome has been discovered by Israeli security researcher, Guy Aharonovsky, claimed that the Chrome’s speech-recognition API has a vulnerability that allows attackers to turn victim’s machine into a listening port without asking for any permission, even if your microphone is completely disabled. “Even blocking any access to the microphone under chrome://settings/content will not remedy this flaw.” he said in a blog post. Reported vulnerability exploits the “-x-webkit-speech” feature of Chrome’s speech-recognition API and allows a malicious web application to eavesdrop in the background […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Google Chrome vulnerability allows Websites to Eavesdrop on You appeared first on National Cyber Security.

View full post on National Cyber Security

Heartbleed – OpenSSL Zero-day Bug leaves Millions of websites Vulnerable

Source: National Cyber Security – Produced By Gregory Evans

It is advised to those who are running their web server with OpenSSL 1.0.1 through 1.0, then it is significantly important that you update to OpenSSL 1.0.1g immediately or as soon as possible. As this afternoon, an extremely critical programming flaw in the OpenSSL has been discovered that apparently exposed the cryptographic keys and private data from some of the most important sites and services on the Internet.The bug was independently discovered by security firm Codenomicon along with a Google Security engineer. The flaw is in the popular OpenSSL cryptographic software library and its weakness allows cyber criminals to steal the information protected, under normal conditions, by the SSL (Secure Sockets Layer) or TLS (Transport Security Layer) encryption used to secure the Internet.OpenSSL is an open-source implementation of the SSL and TLS protocols. The core library implements the basic cryptographic functions that enable SSL and TLS encryption. Mostly every websites use either SSL or TLS, even the Apache web server that powers almost half of the websites over internet utilizes OpenSSL.The discoverer of the vulnerability dubbed the bug as ‘Heartbleed bug’, as the exploit rests on a bug in the implementation of OpenSSL’s TLS/DTLS (transport layer security protocols) heartbeat extension (RFC6520).This […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Heartbleed – OpenSSL Zero-day Bug leaves Millions of websites Vulnerable appeared first on National Cyber Security.

View full post on National Cyber Security

90 Percent of Websites Leak User Data to Third Parties: Study

Source: National Cyber Security – Produced By Gregory Evans

90 Percent of Websites Leak User Data to Third Parties: Study

Internet users’ being tracked by particular websites is not a recent development and has been reported by several studies. However, a new study tries to show the magnitude of user data tracking by some popular websites. It further claims that not only did some of the top websites leak user data to third parties, but at times also shared it on the Web. Timothy Libert, a researcher with the University of Pennsylvania, has published a study that provides an analysis of the privacy compromises on one million popular websites. In his findings, the study adds that almost nine in ten websites leak user information to third-parties and claims that the “users are usually unaware of.” Further, the study suggested that over six websites in ten spawn third-party cookies and over eight in ten load Javascript code from an external party onto a user’s system. “Sites which leak user data contact an average of nine external domains, indicating users may be tracked by multiple entities in tandem. By tracing the unintended disclosure of personal browsing histories on the Web, it is revealed that a handful of American companies receive the vast bulk of user data. Finally, roughly one in five websites […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post 90 Percent of Websites Leak User Data to Third Parties: Study appeared first on National Cyber Security.

View full post on National Cyber Security

Kerala: Hacker group ‘Mallu Cyber Soldiers’ targets websites of sex rackets

Source: National Cyber Security – Produced By Gregory Evans

After hacking Pakistan’s official websites as a reply to Pak hackers’ 27 September attack on the Kerala government’s online portal — www.kerala.gov.in, online hackers “Mallu Cyber Soldiers” is in the news again. Recently, there were many reports on online prostitution by Kerala-based sex rackets, who target school children and young girls. In retaliation to such crimes, the group of hackers have now targeted the web portals of such sex rackets. They have successfully hacked two websites — callgirlsfinder.in and russian-models.in — related to online prostitution and is on a mission to crash similar websites in the coming days. However, even if a website is hacked, the admin can restore it after a point of time, therefore “Mallu Cyber Soldiers” request the government to take proper decision over this issue to swipe them off completely. “We are also seriously looking into this issue as it has become a serious threat to our society. Even school kids are trapped in this gang. Team MCS is ready to do whatever we can from our side..but that cant sort out this issue..Government has to take an ultimate decision over this online prostitution. Hope the cyberdome which has been launched newly by our cyber cell can […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Kerala: Hacker group ‘Mallu Cyber Soldiers’ targets websites of sex rackets appeared first on National Cyber Security.

View full post on National Cyber Security

Anonymous Hacks Saudi Websites in Response to Decision of Crucifying A 17 Years Old Lad

#OpNimr Anonymous Knocks Saudi Government Websites Offline In Protest Against Planned Beheading And Crucifixion Of Ali Mohammad Baqir Al-Nimr

Hactivist group Anonymous targeted Saudi websites and brough them down in response to the death sentence to a 17 year old boy Mohammed al-Nimr.

Hacktivist group Anonymous has called out Saudi Arabia for its horrific human rights record by attacking the Gulf kingdom’s government websites. The attack is in response to the upholding of a death sentence handed down to 17-year-old Mohammed al-Nimr.

Earlier in September, Nimr’s final appeal to the Saudi courts was dismissed, and his sentence of death by crucifixion for alleged anti-government activities in 2012 can now be carried out at any moment.

“Ali Mohammed al-Nimr, an innocent young teenage boy has been sentenced to death in Saudi Arabia and we will not stand by and watch,” Anonymous said in a statement directed at Saudi Arabia. “Naturally, the sentence was appealed but the appeal hearing was held in secret and apparently dismissed.”

Here is their upload on YouTube as a warning to Saudi Government.

Some of the websites that appear to have been knocked offline included those of the Ministry of Justice (www.saudinf.com), the Ministry of Civil Service (www.mcs.gov.sa), the General Administration of Education (tabukedu.gov.sa), PSATRI, Saudi Arabia’s technological center for its military and security sectors (psatri.ksu.edu.sa); and even Saudi Airlines (saudiairlines.com). Currently, most of the sites are back up except for the Ministry of Justice’s.

A full list of targeted websites has been published on Paste bin.
The hacktivist group called for Nimr’s release, adding that he had been denied a lawyer and subjected to torture. “Campaigners also claim he was forced to sign a confession, which has formed the basis of the case against him … Now, with all legal avenues exhausted, Ali could be crucified at any moment.”

Anonymous announced that it began #OpNimr by attacking government websites and taking them offline. “We hope you listen to us this time and release the young man. You will be treated as a virus and we are the cure.”

“Hundreds of innocent people die each year because of the Saudi Arabian government and they will now be punished for their actions,” the group’s statement said.

The hacktivists also criticized the UK for not standing up for Nimr and not doing more to pressure Riyadh. They also attacked the UN for delegating Saudi Arabia a key “human rights role” despite the country’s questionable record.

Anonymous spoke directly to King Salman and the Saudi Arabian government in one of their video messages.

“13 Judges have already approved the death sentence of Ali Mohammed al-Nimr meaning only King Salman bin Abdulaziz Al Saud has to approve it. We cannot and will not allow this to happen. The ministry of justice was taken offline a few days ago and we will continue to do this to other government websites.”

Nimr was arrested in 2012, reportedly after participating in a protest. He was found guilty of joining a criminal group and attacking police officers. Other charges against him included using a BlackBerry device to encourage others to come out and join the protest.

The UN has called the trial “short of international standards” and asked Saudi Arabia to halt the execution. Human rights groups including Amnesty International have alleged that Nirm was tortured and forced to confess to some of the charges.

The sentence of crucifixion likely means that Nimr is set to be beheaded before his body is displayed on a cross in a public place.

Reports indicate that Nimr did attend a demonstration, but was not an activist. Other sources have said that the sentence of crucifixion is likely political “revenge” because Nimr is a nephew of Shia cleric and activist Sheikh Nimr Baqr al-Nimr, who is also facing execution.

The cleric has been sentenced to death on charges of terrorism for “waging war on God” because he gave a speech at anti-government protests in Qatif, Amnesty International reported.

This video was posted by Anonymous just after they carried out the task.

Here is a glimpse of havoc created by Anonymous.
CP28qQaWsAALkIW

The post Anonymous Hacks Saudi Websites in Response to Decision of Crucifying A 17 Years Old Lad appeared first on TechWorm.

View full post on TechWorm

Latest Opera Mini for Android update lets you save data without breaking websites

Opera Mini for Android sports a nifty data saving feature that lets you access the internet without worrying about hitting your bundle limit. Unfortunately, this does result in websites being severely compressed, making the experience rather ugly and less user-friendly. The company has now added a new “high” setting to the browser, which saves you some data but does not break websites in the process.

View full post on MobileNations

UK Teenager Arrested for Hacking Important Government Websites

Source: National Cyber Security – Produced By Gregory Evans

Theinquirer.net reported on 20th August, 2015 stating that Charlton Floate, a 19 year old UK teenager, has been arrested with some others for the cyber attacks who seemingly hacked the websites of FBI (Federal Bureau of Investigation) and Home Office. Floate was arrested in Birmingham for his online crimes and has pleaded guilty to three charges under the Computer Misuse Act along with other charges related to the holding of prohibited material. The attacks occurred in January 2013 when Floate and a gang of other cybercriminals severely damaged government websites with floods of digital traffic sent from malware-infected systems. Such systems are frequently referred to as zombie computers and they are broadly used in botnets to gang up on websites with a DDoS or distributed denial of service attack. The gang managed to pull down the site of UK’s Home Office for 83 minutes which is a heavily used website which provides details on passports and immigration along with other things. The group also knocked down an FBI site for more than five hours which allowed users to report crime. Nakedsecurity.sophos.com published news on 24th August, 2015 quoting Kevin Barry, Prosecutor, as saying “Floate performed two test runs in November […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post UK Teenager Arrested for Hacking Important Government Websites appeared first on National Cyber Security.

View full post on National Cyber Security

Islamic group hack six government websites in Thailand

Source: National Cyber Security – Produced By Gregory Evans

Bangkok: Six official websites of Thai government were hacked on Monday allegedly by an Islamic group from Tunisia which posted pictures of Rohingya Muslims fleeing persecution in Myanmar on the webpages. The Islamic group calling itself Fallag Gassrini & Dr Lamouchi, left messages saying: “Your sites have been hacked by Fallag Gassrini & Dr Lamouchi hacker group from Tunisia. You have to give respect to our people. We, the Fallaga team, are Muslims. We are peace-loving people.” They also posted pictures of Rohingya Muslims fleeing persecution in Myanmar and Muslim child victims of bomb attacks were posted on the sites, Bangkok Post reported. This hacker group previously worked with other Islamic groups and hacked several Israeli and French websites. An official at the Ministry of Information and Technology Communication said the hacking was conducted simultaneously worldwide, using the Linux command line. Source: http://zeenews.india.com/news/world/islamic-group-hack-six-government-websites-in-thailand_1652107.html

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Islamic group hack six government websites in Thailand appeared first on National Cyber Security.

View full post on National Cyber Security

Page 1 of 1212345»10...Last »

My Twitter

  • 81-Year-Old eHarmony Founder On Gay Marriage And Tinder https://t.co/R3YGKf81XT #dating @gregorydevans
    about 3 hours ago
  • It’s Valentine’s Day, My Dear Valentine! https://t.co/Jm9UiaWfYA #dating @gregorydevans
    about 7 hours ago
  • RT @LatestAnonNews: Latest Anonymous News is out! https://t.co/VS7Sbe8pWj Articles via --- @Legionof7 @BlakeDontCrack @GregoryDEvans
    about 8 hours ago
  • 8 Problems that Will Make Your Relationship Stronger https://t.co/MrGmg2LeT5 #dating @gregorydevans
    about 19 hours ago
  • Cyber Security News Today is out! https://t.co/xEaxm4V4N5 @gregorydevans #hacker
    about 20 hours ago

AmIHackerProof.com By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans