.
4shared.com - Free file sharing and storage

Sabtu, 17 April 2010

Growled Priok Tragedy, The goal Hacker Government Sites

0 comments
JAKARTA - The bloody incident that occurred in the territory of Koja, Tanjung Priok make growled all circles, including hackers. The site also became targets of government.

"Stop the violence of the people," wrote cracker named Megatron who claimed in a message left on the website of Prima Tani owned by the Department of Agriculture.

The site is still in a state of being hacked. Even when opened through a Google search also looks have not changed. Apparently the site admin Prima Tani has not realized its website at MOA-crack.

In the same action, the cracker also write other messages,

Our leader is a murderer
motivate subordinates for mass murder
bejadnya so leaders of this country
only a wisp of apology to several people who flew and scattered thousands of drops of blood
it's time to rise against the oppression
DEAD OR ALIVE with the motto
Justice For All
2010

Apparently, other than to inform the 'hole' on the site, the hackers use this opportunity to voice their opinions about the bloody events in Tanjung Priok some time ago. Even to strengthen their statement, a photograph was displayed. Photos showing the object holding demonstrations titled 'Pol PP = Thugs'.

In okezone monitoring, not only the site of Prima Tani is broken into by crackers MOA. There are at least two more sites that experienced the same, Alvin and Kaikids Tour. Until now, Kaikids site has 'recovered', unlike two other sites.
Read full story

Russian Hacker Site collapse Telegraph

0 comments
LONDON - Action internationally renowned media sites burglary occurred again. This time a group of Romanian origin hackers successfully change the appearance of a fairly large online media in the UK.

Eastern European hackers who named himself the successful Romanian Gypsies into the Telegraph online site's security system. In fact, they successfully change the look of the front page with a face icon from an American politician, Sarah Palin, and also the photo image Romanian flag.

"They returned to find the hole that was discovered in March 2009. And without doubt they had defaced the two subdomains as well, namely 'shortbreaks (dot) telegraph.co.uk and wine-and-Dine (dot) telegraph.co.uk / site / index.php '. "

"It seems that company at the Telegraph did not learn from past experience. The evidence, they let the hole until hackers can exploit," he added.

Blogs that mention, the hacker wrote if bobolnya Telegraph website this happens because of the vulnerability SQLi. Moreover, could not have sounded repeatedly ignores the fact that even today, the password in the usual view is wrong. The fact that all IT security experts recommended that a password must have at least encription, it should be obeyed.

Long enough that vandalism occurred, although this time the Guardian newspaper sites competitors can already be accessed again in the normal state by the visitors who are not only from outside the UK alone.
Read full story

Google: Email Spam Declining Slowly

0 comments
SAN FRANCISCO - The volume of spam in the virtual world slowly begins to experience predicted a decrease in the count per quarter, although when compared to last year, the figure is still rising.

"In the first quarter of this year 2010, spam volume was lower than the last quarter of 2009. However, when compared to the same quarter last year, volumes increased approximately 6 percent."

From these data, the contribution of the largest spam comes from email spam viruses masquerade, the rampant spread by spammers in the second quarter of 2009. Email bervirus has a 0.3 per cent of the overall percentage of spam that is the first quarter of 2009. But these numbers then it jumped to 3.7 percent in the second quarter of 2009. Although then came back down approximately 1.1 percent in the first quarter of 2010, these figures nonetheless still 12 times more than the first quarter last year.

This March, Google also estimates the increase in spam sent to capacity. Spam-spam that are distributed on average have a memory capacity of 30 per cent heavier than the last. This is because most of the spam emails include pictures of no importance to attract victims.

"Spammers are expected to use the way of promotion of new models that will make it easier and faster to pull the victim, like a plug and play components commonly used spammers," said Senior Product Marketing Manager for the Google Postini Adam Swidler.

The data were also found, subject to spam email still does not change much, ie cheap drugs, celebrity gossip, breaking news, and the tragedy of natural disasters. In January, spammers also use the lure of donations from the earthquake on behalf of Haiti to profiteer name of foundation donations, politicians and celebrities.
Read full story

Indonesian Hacker Attack 4 Country Together

1 comments
JAKARTA - In one night, a hacker managed to bombard the Indonesian claim that there are dozens of sites in Turkey, Russia, India and Latvia.

A hacker forum 'black' on behalf of himself emerging as Hacker Cisadane. In its action, nearly 100 sites that exist in these countries berhsail dikerjai.

In his testimony, Wednesday (04/14/2010), hackers claimed to do all the action only in a single night, from Tuesday night until Wednesday morning.

"Hackers are hackers Cisadane Indonesian who lived in Tangerang and the surrounding area, taken from the name of a river of pride and the biggest river in the town of Tangerang. Many people are not aware of and heard of this new forum, because there are too many hackers forum in Indonesia. The forum was surfacing new Cyber world, 'the hacker wrote.

"We are doing these attacks because we do not want the hackers and hacker forums in Indonesia, slaughtering each other and play off each other. We want them to understand this message and try to come out of myself for not doing any less pleasing, because it will destroy the unity of hackers in this beloved country, "they wrote again.

Although some sites still in view in-hack, a few other sites that some are not accessible like http://www.1-univermag.ru/, http://aglajaflowers.com/, or http://www.xt . lv /.
Read full story

Hackers infiltrated anti-terror forces

0 comments
MOSCOW - Russian hackers who attacked the spread of new malware smartphone. Action by the spread of malware to infiltrate a game about the anti-terrorist forces '3 D Anti-Terrorist Action. "

According to Sophos Senior Technology Consultant Graham Cluley, a new malware attack that most mobile-phone operating system based on Windows Mobile. Any phone owners who download the '3 D game Anti-Terrorist Action 'will automatically direct infected when installing them.

"Malware will also make your phone bills to swell, especially when you do international calling."

Sophos detects new malware such as Troj / terdial-A. Origin of Russian hackers, malware entering into one download site Windows Mobile applications.

"We are appealing that mobile phone users to be careful in downloading and installing applications on mobile malware is the biggest threat, especially for companies," said Cluley.

He said that the last six years of cyber criminals start utilizing a lot of malware on mobile phones to get money. As happened in 2004, Symbian phone ever hit by a Trojan Mosqit
Read full story

Attacks in the Adobe PDF Reader Warn

0 comments
SAN FRANCISCO - Adobe warned users of Adobe Acrobat and PDF Reader about a new attack on the application of the risk is potentially exposing user data.

These attacks take advantage of Adobe Acrobat Reader and the ability to mess up the content and other applications. This attack does not mean that Adobe software is weak, but the ability of social engineering to trick users into clicking on something that could cause malicious code execution.

Credit card security research firm says Didier Stevens warning also came from the U.S. Department of Homeland Security U.S. Computer Emergency Readiness Team (US-CERT), which noted the danger that after the PDF Reader and Adobe Acrobat.

'When users open a PDF that contains a warning dialog box that users and application file viewer that is set to be launched by a PDF file. "

"An attacker can manipulate the contents of the file name of the dialog box in an attempt to convince users to open a file that is actually dangerous," he added.

Steve Gottwals Adobe said in a posting on the blog so that users Adobe Reader and Acrobat Reader to open files that can really be trusted, and not arbitrarily open the document from an unknown person.

US-CERT notes that Adobe Acrobat and Reader did a little mistake by providing the option to disable the warning message, which allows users to easily pass through security mechanisms.

News about the attacks through Adobe layana is old, last quarter TrendLabs security firm TrendMicro reported this week that have been identified in the updated Adobe spoofing attacks.
Read full story

Jumat, 16 April 2010

Beware, Create Virus Mobile Pocket Game in Bolong

0 comments
Jakarta - antivirus company Sophos reported the emergence of new viruses are ready to pounce on the mobile phone users. This virus infiltrate in gaming applications and potential to make a perforated bag.

Sophos detects this malware with the name Troj / Terdial-A. He is said to derive from the virtual world mafia groups from Russia, which systematically targeting the mobile-phone operating Windows Mobile.

Senior technology consultant at Sophos, Graham Cluley, said it had received reports from a number of mobile users to the Windows Mobile OS that found its communication tools to make the call 'stealth'.

It means, do automatically without dialing the desired phone owners. Tragically, who conducted the international calls so that users can create invoices pulses swell.

"It seems that Russian hackers have been slipped a trojan in the game '3 D Anti-terrorist Action '. The way to upload it on the Windows Mobile site on the web."

Thus, these viruses infect when the user try to install game updates or '3 D Anti-terrorist Action 'is. "Principals may want to drain the victim of money by making calls nan expensive premium. So the user should be more vigilant when it wants to download and install new applications," continued Cluley.

Mode mobile phone virus that makes it true perforated bag is not new, because geliatnya been detected since 6 years ago.

"In 2004 for example, there is a trojan that infects Mosqit Nokia phones and Symbian OS to take action to send SMS premium numbers. Only this time, the new viruses targeting mobile games," concluded Cluley.
Read full story

Erotic video 'Toxic' Try to Attract facebookers

0 comments
Jakarta - Facebook Users must be careful if there is a message that hereafter erotic video links. Because it could be a provocation from malicious worms Koobface who intends to fool the prospective victim.

ESET security security agencies said that the worm operates by spreading the messages to a number of Facebook users inboxes. Offered this message is quite interesting some people, namely the links that would display the hidden camera video erotic.

"Though this message is just a trick that was sent from a computer that also had been infected. Computers have become victims of the post to all the contacts they have and send a link to the site titled 'Video posted by Hidden Camera' is.

Then, the user that the message is timeless gentle persuasion will be asked to download a video codec that is said to be able to watch a video nasty in question.

"But instead of flash codec download, an existing program that is downloaded is Koobface. Well, if malicious programs are then installed, the system user's computer will be infected," continued ESET.
Read full story

Beware, virus infiltrate the PDF Files

0 comments
Jakarta - Acrobat file format PDF or commonly referred to may be claimed to be very safe to view a document. I was so safe, credit card companies send bills through this format.

In fact, almost all banks use to send documents, important letters, and invoices. But now users of PDF format have to be more vigilant. The hackers tried to break into your PC using this format.

According to Websense Security Labs, Zbot Trojan or commonly called 'Zeus' is a virus that will steal any data on the infected PC. The virus spreads very fast through the email. Until now have been found infected emails in India 2200.

"Do not ever open an attachment with the name 'Royal_Mail_Delivery_Notice.pdf' in it. Most people think PDF is a file safe so no problem to store it on your PC. But no, it will remove some of the PDF file and take over the computer. Anti-virus latest also has a 80% risk of error in detecting the virus in this file, "said a spokeswoman for Websense.

How the virus is doubling itself in the Windows operating system, where all programs are vital and changing the registry so the computer virus is active every time the PC is turned on.

"Registry is available in computer databases. Functioning to track hardware, software and other information. For instance, when new software has been installed then the registry will contain all the information about the software, the" lid.
Read full story

Trojan Lovers drill Kenzero Japanese Porn Game

0 comments
Tokyo - A new type of malicious programs make fans anxious porn pirated games in Japan. Kenzero named Trojan infects your PC via file sharing sites.

The problem, then publish the net Kenzero the infected user's history to the public website. If the victim wants the private data is deleted, they are being blackmailed to give some money.

"All information will be published on the website and then, the victim will receive an e-mail. E-mail came from a company called Romancing Inc., which promised to remove the data if it is paid," said security vendor Trend Micro.

This Trojan installs itself using file share service popular in Japan, Winni. Kenzero attack targets are those who download illegal copies hentai games porn genre in Japan.

According to reports, there were 5500 people in the country who claim to Sunrise Kenzero infected. This virus is being monitored closely by Trend Micro.
Read full story
Twitter Delicious Facebook Digg Stumbleupon Linkedin Yahoo! Bookmarks Google Buzz Google Reddit Mixx Technorati RSS Favorites
 

Blog Archive

News Antivirus © 2008 Business Ads Ready is Designed by Choi Rozs Supported by Blogger