Blog Archives

Anonymous Hackers leaks video of Steubenville rape case


The Steubenville Files : ehack

The Steubenville Files : ehack

Two high school football players in Steubenville, Ohio are under arrest for the sexual assault of a 16-year-old girl. Newly leaked video sheds more light on what may have happened to a girl who told police she was raped by these high school football players in August.

Trent Mays and Ma’lik Richmond- have been arrested and charged with raping a fellow 16-year-old, taking her to a number of parties when she was too drunk to resist, digitally penetrating her and possibly even urinating on her.

A small group of information activists was able to do what 3 Ohio state law enforcement agencies couldn’t. The clip, released this week by an Anonymous cell calling itself “Knight Sec” is reported to show former Steubenville, Ohio high school athlete Michael Colin Nodianos bragging about the sexual assault from a friend’s apartment. On the video which recently was posted online, the boys joke about the girl appearing “dead”.

On their website, called Local Leaks: The Steubenville Files, they said that they took up the cause since “a town rife with corruption, cronyism, illegal gambling and fixated upon their star high school football team were prepared to orchestrate a major cover-up in order to sweep the entire affair under the rug.”

Steubenville rape case : ehack

Steubenville rape case : ehack

Their trial before an Ohio juvenile court judge is scheduled for February 13. The rapists themselves, and their so-called rape crew, think they’re untouchable. The rules don’t apply to them.

This video is not the first time hackers have published information about people connected with the case. Knight Sec, working with other Anonymous hackers, took over a fan site dedicated to the Steubenville football team and demanded anyone involved come forward and apologize for their actions.

A peaceful demonstration in support for the alleged victim is scheduled for January 5 at Steubenville City Hall.

 

 

Original post at – thehackernews

Thanks for reading. hope it might helped you.
http://ehack.thegeoadventure.com/

Advertisements

The Top 5 Cyber Security Threats That Could Affect Your Life


The Top 5 Cyber Security Threats That Could Affect Your Life–

Cyber Security : ehack

Cyber Security : ehack

Our electronic devices are such a big part of our lives today that it’s hard to imagine what we once did without them. But our constant use of technology to keep in touch, pay bills, stay on top of the news, shop and research things has a downside: Our data can be exposed to criminals who commit crimes such as identity theft and credit card fraud – unless we take the proper precautions. Our growing reliance on electronic devices is part of the reason why careers in cyber security are growing at a faster pace. Jobs in information security, web development and computer network architecture – three fields at the forefront of cyber security – are expected to grow 22% between 2010 and 2020. Understanding the threats can help everyone do their part to make those jobs easier. Here are five top cyber security threats and tips on how to protect yourself against them, according to experts.

 

1. Malware and Bots

How-to-protect-yourself

If you’ve ever spent a frustrating afternoon calling a help line to tackle a computer virus, then you know how pesky malicious software – or malware, for short – can be. Malware also includes nuisances like spyware, which allows digital hackers to track your every move and to view the passwords you are entering, according to the National Cyber Security Alliance, an organization focused on educating the public about how to use the Internet safely. Typically consumers get tricked into downloading malware by accident, when for instance they click on a rogue website or try to download what seems to be free software, like a screen saver. When criminals use malware to take control of individuals’ computers remotely to perpetrate financial crimes or attack computer networks and websites, the setup is known as a botnet.

Further, “malware can be spread by your Friends on social networking sites like Facebook,” says, Linda McCarthy, cyber security expert, former senior director of Internet safety at Symantec and author of Own Your Space: Keep Yourself and Your Stuff Safe Online. You need to think about that link your Friend is telling you to click on. Is that really a Friend sending that link, or was their account compromised? Don’t click on suspicious links, McCarthy warns. Spreading malware on social networking sites is growing at an alarming rate. “Even though social networking sites have systems in place to minimize the risk, you are still the first line of defense in protecting yourself. It makes sense that malware writers target social networks because you are likely to trust a link that came from one of your friends,” she says.

2. Spam

You already know that “spam” is the email equivalent of junk mail. But it can do more than clutter up your inbox. Some of these emailHow-to-protect-yourself missives can contain a link or an attachment prompting you to download a computer virus. They can also be used to defraud those close to you. For instance, someone who has hacked into your email account can send a message asking every one of your contacts to wire money because you are in distress – and possibly rope in a few people who aren’t familiar with this common fraud. The CAN-SPAM Act was set up to protect consumers from deceptive email messages, subjecting senders to fines of up to $16,000 per violation.

3.Hacked Accounts

How-to-protect-yourself

One common way for identity thieves to gain control of consumers’ personal information is through digital crimes known as “phishing.” In this practice, fraudsters create an email that looks like it was issued from a legitimate company. They will ask for a recipient’s personal information – like an account number or a password – and then use that information to commit financial crimes, such as opening fraudulent charge cards in a consumer’s name and running up big bills on them.

“Phishing scams are successful because they use social engineering techniques to gain your trust,” says McCarthy. For example, one scam claims to be a relative traveling in another country reaching out for your help. It’s an email from your nephew. He was mugged, lost his wallet, and he needs you to wire him money right away. “It’s a natural reaction to want to help someone in trouble. That’s what the phishers count on. Beware of social networking techniques and be sure to protect your accounts,” she adds.

4.Unsecured Home Wireless Networks

How-to-protect-yourselfMany of us have converted to home wireless Internet networks to connect our TVs, smartphones, laptops, computers and tablets. And why not? It’s very convenient. But with these home networks come risks. Without certain protections, cyber criminals in the area may be able to access the Internet through your network and possibly gain access to your computer and other devices.

 

5. Data Gone AWOL

How-to-protect-yourself

Given all of the places where we tote mobile devices such as laptops, tablets and smartphones, it becomes very easy to lose them. If the data on those devices falls into the wrong hands and isn’t properly protected through techniques like encryption (the process of masking information using an algorithm, so that it becomes unreadable), it can be a field day for cybercriminals. It’s not just consumers who lose data. Forty-five percent of data breaches at companies are caused by lost laptops and mobile devices, according to a 2012 study by the Ponemon Institute, a research center based in Traverse City, Mich., that is dedicated to consumer privacy, data protection and information security policy. Even use of YouSendIt, Dropbox and other Internet-based file-sharing tools by employees – now a common phenomenon – raise the risk that confidential corporate data will be leaked, according to Ponemon.

But even if devices don’t get lost, it’s possible that in using them we’ll fall prey to cyber criminals while checking emails in an airport lounge using Wi-Fi on a smartphone, or while reading on a tablet over a mocha latte in a café.

“With all of your devices and more to come, be sure to have a backup strategy,” advises McCarthy. Many of the security software packages now include backup as an option. That won’t help with all of the data on every device, so be sure you plan and back up all of your important devices. There’s no telling what types of devices will be part of our lives years from now. The tech explosion presents immense opportunity for those with the creativity and know-how to make the gadgets we use better and better – and to simply keep them running smoothly. In the meantime, building a few smart cyber security habits is a good way for all of us to enjoy the technology we use every day with few hassles.

Advances in technology are not likely to slow down in the future, nor is our increased reliance on the fruits of that growth. New security threats will be a constant reality, which makes it more important than ever that skilled individuals step up to fill the increasing number of jobs available in cyber security, and that those who choose other career paths take steps to protect their own security.

 

Original Post at http://www.devry.edu/know-how/top-5-cyber-security-threats-that-could-affect-your-life/

Thanks for reading. hope it might helped you.
http://ehack.thegeoadventure.com/

India developing own OS to boost cybersecurity


Summary: Defense Research and Development Organization is creating country’s own operating system to reduce its dependence on foreign operating systems, which it says may contain security risks.

india's OS : ehack

india’s OS : ehack

The Indian Defence Research and Development Organization (DRDO) is developing the country’s own operating system (OS) in a bid to establish a more robust cybersecurity environment.

India currently is dependent on many imported OSes based on Windows and Linux, which are likely to have malicious worms and security issues, DRDO’s Director-General VK Saraswat said at the Navigation and Communication (NAVCOM) conference, The Times of India reported Thursday. Hence, it is essential India builds its own operating system, he said.

Saraswat added the DRDO is 18 months into a programme in which 150 engineers across the country had been working on creating an Indian OS. It will take another three years before this platform will be ready, he said.

The made-in-India OS does not involve any foreign investments and is exclusively “India’s effort”, Saraswat noted. He also advised defence researchers and scientists to start working together with the industry, DRDO, and other scientific departments to drive the development of the OS, so “[India is] independent from what is coming from [the] outside world”.

This initiative is part of India’s latest efforts to beef up its cybersecurity. Earlier this week, the government unveiled a five-year plan to revamp the country’s cybersecurity posture, whereby, operations will be coordinated and connected to major critical infrastructure agencies across India, to monitor real-time information and react faster to cyberattacks.

 

Original Post at Zdnet

Thanks for reading. hope it might helped you.
http://ehack.thegeoadventure.com/

India government unveils five-year plan to revamp cybersecurity


Summary: Operations will be coordinated and connected to major critical infrastructure agencies in the country, to monitor real-time information and react faster to cyberattacks.

Cyber Security : ehack

Cyber Security : ehack

The Indian government has set in motion a five-year project to revamp cybersecurity apparatus of critical sectors in the country to meet the growing challenge of cyberattacks.

The National Critical Information Infrastructure Protection Center (NCIIPC), the agency to coordinate cybersecurity operations for critical infrastructure across the country, has been given this responsibility, The Times of India reported on Tuesday.

The five-year plan will be prepared by the agency to revamp and integrate the cybersecurity apparatus of all critical infrastructrure such as power, transportation, water, telecommunications and defence, the agency said at a presentation.

NCIIPC also plans to set up a sectoral Computer Emergency Response Team (CERTs) that would be connected to it, and will install censors on all critical systems to provide real-time information to its command and control (C&C) center about any cyberattack to formulate a quick response.

Under a newly defined mandate, NCIIPC will look after critical sectors with high dependency on computer and information technology (IT), while other sectors will be under India’s CERT, CERT-IN.

“There are also plans to open a Cyber Security Operation Centre, a [round-the-clock] control room for real-time information and response, and a National Institute of Critical Information and Infrastructure Protection for training of chief information security officers (CISOs). We will also issue daily cyberalerts,” Muktesh Chander, NCIIPC center director said, during the presentation.

According to sources who spoke to the Indian news site, this is part of the government’s step to create awareness and ensure a robust security system in all critical government agencies. The task had also been divided into five phases, and once agencies set up their security infrastructure, it will be connected to the NCIIPC.

Shivshankar Menon, national security advisor, who also addressed the gathering, stressed on the participation of the private sector

“The NCIIPC is setting up a joint working group with representatives of industry assocations to bring out guidelines for protection of critical information infrastructure in India,” he said.

India’s critical infrastructure agencies are no stranger to cyberattacks. Just last week, a hacker group leaked Indian telco BSNL’s passwords and database, calling for the withdrawal of a controversial legislation which allegedly suppresses freedom of speech and expression. In April, Chinese hackers allegedly planted a bug via flash drives on India’s navy computers, which relayed sensitive data to China IP addresses.

Original Post at Zdnet

Thanks for reading. hope it might helped you.
http://ehack.thegeoadventure.com/

Cybercrime Changes Track to Mobile and Social Media in India


cyber crime : ehack

cyber crime : ehack

 

Bangalore: Crime hasn’t left any stone unturned and this also applies to cybercrime. Cybercrime in the world is keeping up with the changing avenues available to commit fraud and con people in large number as per a recent Symantec Corporation’s Norton Cybercrime report 2012. In India there are 137 million Internet users, 7 out of 10 users use their mobile to surf the net. Moreover, the social media user base in India has grown from 38 million in 2011 to 60 million in 2012 making both mobile and social media prone to cybercrime, reported K Rajani Kanth for Business Standard.

 
Both of these fast growing portals have been consistently targeted by cybercriminals though advance means and the users are barely aware of the security risks involved. This highly transforming trend has impacted many individuals with loss of identities, data and finances, which are only the few among the many crimes committed online. As per the report in the past 12 months more than 42 million people have turned victims to cybercrime in India alone, which has led to an unbelievable $8 billion loss in direct finance.

David Hall, the Asia Pacific regional consumer product marketing manager of Norton by Symantec, said, “Many of us at Symantec and Norton have been putting our heads together to predict some of what we can expect to see in 2013. Of the predictions we have come up with, I want to draw your attention in particular to two –– the likelihood that cyber terrorism will get highly personal as attacks focus on individuals or minority groups and the possibility that new electronic payment methods could be vulnerable to hacks and breaches,” as reported by Business Standard.

The report informs that in the cyber world future, conflicts between nations, organizations and individuals will play a key role. Hall claims “In 2013, we will see the cyber equivalent of saber rattling, where nation states, organisations and even groups of individuals will use cyber attacks to show their strength and ‘send a message’. Additionally, we expect more targeted attacks on individuals and non-government organisations such as supporters of political issues and members of minority groups in conflict.”

Adding to this quagmire is the software madware, mobile adware which is capable of disrupting the user experience with pop up alerts, by adding icons and altering browser settings. It can also expose location details, device identifiers and contact information to cybercriminals. The software is primarily used by advertising network to promote targeted advertising through all the access the software provides. Madware usually sneaks into a user device while downloading an app, much without the user’s knowledge and gathers information which can be easily accessed by cybercriminals as there isn’t any full proof security installed on the device. Strong passwords are one of key solutions, informed the report.

On this note the report said, “In just the past nine months, the number of apps including the most aggressive forms of madware has increased by 210 percent. Because location and device information can be legitimately collected by advertising networks, it helps them target users with appropriate advertising and we expect increased use in madware as more companies seek to drive revenue growth through mobile ads. This includes a more aggressive and potentially malicious approach towards the monetisation of ‘free’ mobile apps,” reported Business Standard.
As predicted in the report  that the hackers will go where the user and devise goes, and at present it is the mobile devices and the cloud. It also informs that without much ado in 2013 the majorly targeted platforms will be mobile and cloud services for crime and breaches. Confirming this is the swift rise of Android malware in 2012. While users add applications they will also let in malware into their devices. As informed by the report certain malware can duplicate old threats such as stealing information from the device.

As per the Report, 31 percent mobile users in India have received unwanted SMS text asking them to call the unknown number mentioned or click on the given link. To worsen the situation, most of the mobile Internet usage is being managed by unsecure mobile applications, thus increasing the risk in hand. The report adds that by 2013 it’s certain that mobile technology will continuously advance and in turn provide fresh opportunities for cybercriminals to commit more crimes mounting the crime list.

 

 

Original Post at SiliconIndia

Thanks for reading. hope it might helped you.
http://ehack.thegeoadventure.com/

%d bloggers like this: