Main » Архив материалов


Usually in films about corporate espionage (or spying scientific) show the main characters, passing the fire, water and copper pipes to obtain the desired nuggets of information. However, in real life simpler - Spies enough to track the sale of obsolete computers, which suit the organization like NASA. More than once or twice normal, law-abiding citizens found on hard drives purchased a PC or laptop confidential information to which a mere mortal in the usual way to get access can not. But still, reckless organizers sales selling techniques with such data, it can recoup the money spent on equipment thousandfold. Now on this occasion is even a formal investigation within NASA.

Testing is vital, as is now coming to an end 30 years of space program, and the agency is going to make a massive sale of obsolete and outdated equipment. In principle, the initiative is completely rational, not counting how much is passed confidential information is not clear to whom.

The ... Читать дальше »
Просмотров: 713 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

In January 2007, in San Diego began to happen strange things: ATMs stopped working, lost mobile, disrupt the system monitoring flights in the airport, etc. The chaos lasted for two hours until they find out the reason: near the coast there were two U.S. Navy warships, which carried out a study simulate the conditions of loss of communication. For this system has been activated jamming GPS. By mistake, the signals of satellite communications not only drowned out by the ships, but in the city of civilians.

The one case showed how important is the GPS for various health services. It turns out that cell tower, electric networks, information banking system and even the stock market - they all rely on the time signals from satellites GPS.

According to some experts, our dependence on GPS is becoming too dangerous, given the extraordinary precariousness of this technology. The problem is that the satellite signal is very weak, and drown it extremely easy if the noise generated at ... Читать дальше »
Просмотров: 618 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)



Over the past few months Anonymus made many interesting things. In particular, the Anonymus was put on the day the site of Indian companies, which cooperated with the so-called "rights holders" Anonymus also conducted several attacks on the PayPal payment system for services of MasterCard and Visa, after they refused to transfer money to the project Wikileaks. Clearly, that did not act alone and not even ten people - probably talking about several thousands of anonymous users, DDoS-yaschih all of these resources. In the end, was caught only one Dutch hacker. We will not go into details of what happened moral, better pay attention to the study conducted by experts and the University of Twente, The Netherlands.

These experts drew attention to the software used by Anonymus, mostly they work with LOIC (Low Orbit Ion Cannon), you can download the software without any problems. However, the use of LOIC from your PC, as it turns out, fraught with hackers - have several methods ... Читать дальше »
Просмотров: 638 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)



This week, hackers managed to run an extensive "advertising" campaign advertising networks of Google and Microsoft. In quoting the word "advertising" is taken because, for understandable reasons, hackers have not advertised the real things or services. Instead, users lure attractive slogans, but by going to the site via a link, the user receives nothing, except for malicious software to your PC. Running campaigns hackers came fifth of December, advertising displays for a few days.

On Friday, Google representatives have recognized the start literally viral advertising campaign, arguing that the remedies have worked quickly, and advertisements that lead to hacker sites, ceased to exist. Google even called on the help of experts from the company Armorize, who were able to find out how the hackers were able to start working with an advertising network of Google. As it turned out, the hackers were able to do this because it used the domain of legitimate companies, AdShuffle, ... Читать дальше »
Просмотров: 668 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

As is known, for DDoS-attacks on websites Mastercard, Visa, Paypal, etc.. Anonymous groups, many participants are using the program LOIC (Low Orbit Ion Cannon), written in C # and were originally designed for stress-testing sites. The same program was previously used for DDoS-attacks on the Church of Scientology websites and website RIAA (October 2010)

The remarkable fact: from 8 to 10 December 2010 the client version of the program downloaded about 30,000 times, with the The total number of downloads for all time of its existence is about 50 000. Most downloads in the last days comes from the U.S. (10000 downloads), but the sudden interest in stress-testing sites displayed as users from the UK (3200), Germany, France, Holland, Spain and Russia (in each of these countries - from 1000 to 2000 downloads).

Server version LOIC downloaded about 33 thousand times.

With regard to on-line "instrument of vengeance» JS LOIC, the number of users out there can not be accounted ... Читать дальше »
Просмотров: 1040 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

Several chacov ago deviantart.com began sending e-mail messages that warn users that their partners "Silverpop Systems" were stolen from a database of mail addresses and possibly user name / date of birth. More details yet, but all users are assured that the other personal data access had not been received.

Silverpop Systems managed mailings on behalf of Deviantart and served more than 13 million users. Currently Deviantart.com stopped working with them.

Message:

Silverpop Systems, Inc., A leading marketing company that sends email messages for its clients, told us that information was taken from its servers. This was probably part of a sweep by spammers. As a result, email addresses belonging to deviantART members were copied. Corresponding usernames and birth date may also have been removed.

We can assure you that nothing occurred on our systems with respect to this incident and no access was gained to private information on deviantART's servers.

... Читать дальше »
Просмотров: 847 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

Activists from the group Anonymous have come up with a new way to annoy firms wronged Wikileaks. Yesterday at 13:00 GMT they began to bombard the fax.

On IRC-channel lined with the fax numbers of six companies, culled from public sources. They are invited to send messages of arbitrary content through online download services such as faxing or MyFax.com FaxZero.com. It is recommended for this use multistep Tor proxy or other reliable chain of proxy servers. The message can include a logo of Anonymous, and random quotes from the documents on Wikileaks.



As you know, before "Operation Payback" limited only to DDoS-attacks. "The enemy adapts to our strategies. Gentlemen, but they are driven by heavy-handed bureaucracy. We can change quickly, "- said in a message on the IRC-Channel Operation Payback

It is difficult to assess what damage does the attack on the faxes. Soon after the start of the company Netcraft Web experts have estimated that it involved 73 users. ... Читать дальше »
Просмотров: 914 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

So it is that all have been waiting for - the Company "Aladdin RD" announced the completion of the certification process, "Krypto the database - information encryption (CIPF) designed to protect data in Oracle database from unauthorized access.
The decision was certified by the Russian FSB security KS1 classes and COP 2. Encrypting data in the database ORACLE GOST "Krypto the database has become the first certified under the requirements of the Russian FSB security solution for database Oracle
State-owned enterprises of the Russian Federation may use this solution to protect personal data and confidential information in Oracle.

This means that the "Krypto the database can be used on public authorities, financial companies, banks and commercial organizations, faced with the task of ensuring the protection of confidential information and personal data in the databases of Oracle.
Using the "Krypto the database" enhances the safety of DBMS Oracle, provided by the built-in ... Читать дальше »
Просмотров: 625 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

MS has released yesterday a large number of patches, many of these vulnerabilities have been known for months. And some of them already in full were used in malware, in fact from which information was received about them.

MS10-090 (IE) - a comprehensive package of patches closes the whole pack of security holes (CVE-2010-3340, CVE-2010-3342, CVE-2010-3343, CVE-2010-3345, CVE- 2010-3346, CVE-2010-3348, CVE-2010-3962). Most of these charming vulnerabilities allow remote code execution under IE6/IE7/IE8.

MS10-091 (Opentype Font driver) - this update also covers a whole bunch of security vulnerabilities (CVE-2010-3956, CVE-2010-3957, CVE-2010-3959) in Opentype Font driver (OTF) which can lead to remote code execution. An attacker could create a specially prepared OpenType font on the net the ball and when viewed in Windows Explorer is the execution of arbitrary code to be executed with system privileges.

MS10-092 (Task Scheduler) - this is the last ... Читать дальше »
Просмотров: 597 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

From December 15, started online-contest data protection - Hack
Quest 2010, representing a cut-down game infrastructure Hack
Quest, which was held in late August at the site of the festival Chaos
Constructions 2010. The contest participants can try their
skills in security assessment, search and exploitation of vulnerabilities,
reverse engineering. Games infrastructure is vulnerable live
nature. " Thus the participant can feel like a
attacker:)

The whole game infrastructure Hack Quest Online 2010 contains 17 keys
(flags) worth 100 points (points). Take part in the competition
anyone can. Details on the following link: www.securitylab.ru/hq2010

Rules of party competition

1. General authorization
During the competition participants can:
  • carry out attacks on the gaming servers (range of IP-addresses
    172.16.0.0/26) to obtain Keys (capture the flag);
  • use tools do not violate the
    Legislation of the Russian ... Читать дальше »
Просмотров: 918 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

« 1 2 ... 56 57 58 59 »