Home » Security » Hacking & Cracking

Hacking & Cracking

CyberSecurity for the Next Generation in 2014 Held Again

Bring together young researchers, a leading IT security experts and professors from universities around the world in a collaborative environment, fun and creative to discuss the hottest issues on the cyber security held back. Kaspersky Lab has just announced the resumption of the annual competition for students, “CyberSecurity for the Next Generation” for the new academic year. In 2014, the conference “CyberSecurity” consists of four rounds and one regional global finals. Participants can submit their paper or project starting today via the new online through the following link. Competition “CyberSecurity for the Next Generation” is open to students around the …

Read More »

Four Types Scam and Spam to Avoid on Facebook

With more than 800 million registered accounts and 400 million user visits each day, Facebook continues to lead the race dominance of social networking with a unique and innovative products and intelligent marketing strategies that lead to user without stopping to press the ‘like’ and post status updates whole day. Facebook is not only a major media to share ideas and interact with friends, but the place is booming attack for almost every cyber criminals in the world. By taking advantage and user confidence in their network connection, the virtual world players spread malicious code and send spam messages using …

Read More »

How to Secure Online Transactions? Tips to Securing and Vulnerabilities

Can not be denied, the number of users online transactions each year continues to increase. Harris Interactive survey conducted in February-March 2012 said there were 57 percent of Internet users who manage bank accounts online and make online shopping. Of these, about 31 percent admitted they store data banking on the hard drive. Therefore not surprising that banking information is very tempting targets for cyber criminals. The target was none other data such as login passwords, code validation and confirmation of transactions that they could use to fake himself as the owner of an electronic account. In addition, e-mail is …

Read More »

Break Up to 450 Million Passwords per Second with Extreme GPU Bruteforcer

Extreme GPU Bruteforcer, developed by InsidePro is a program meant for the recovery of passwords from hashes of different types, utilizing the power of GPU which enables reaching truly extreme attack speed of approx 450 Millions passwords/Second . The software supports hashes of the following types: MySQL, DES, MD4, MD5, MD5(Unix), MD5(phpBB3), MD5(WordPress), NTLM, Domain Cached Credentials, SHA-1, SHA-256, SHA-384, SHA-512 and many others. The software implements several unique attacks, including mask and hybrid dictionary attacks, which allow recovering even the strongest passwords incredibly fast. Utilizing the power of multiple graphics cards running simultaneously (supports up to 32 GPU), the …

Read More »

Duqu Trojan Use an Unknown Programming Language

Some time later, Duqu Trojan increasingly popular as a dangerous malware targeting intelligence. Duqu was first discovered in September 2011. However, according to Kaspersky Lab, the Duqu trace have been tracked since August 2007. Kaspersky Lab found that Duqu Trojan written in a programming language that is not known. Duqu a sophisticated Trojan that was created by the same people who make Stuxnet. This malware has goal as a system backdoor and facilitate the stealing confidential data. Kaspersky recorded the biggest victims in Iran. Duqu generally looking for information about production management systems in various industrial sectors, as well as …

Read More »

Over Weekend, GitHub hacked with Ruby on Rails public key vulnerability

Github, the service that many professional programmers use to store their work and collaborate on coding, was hacked over the weekend. A young Russian developer Egor Homakov exploited a gaping vulnerability in GitHub that allowed him (or anyone else with basic hacker know-how) to gain administrator access to projects such as Ruby on Rails, Linux, and millions of others. When Github saw what happened, they suspended Homakov’s account, which created a firestorm of protest. A blog post entitled, Github, You Have Let Us All Down. Github has succumbed to a public key vulnerability in Ruby on Rails allowing a user …

Read More »

From Sony, Michael Jackson's entire back catalog stealed by Hackers

Entertainment giant Sony has confirmed that hackers accessed its systems and compromised Michael Jackson’s entire back catalog, including many unreleased songs. Michael Jackson’s entire back catalog has been stolen by Internet hackers. Sony music suffered its second major security breach in a year, with thieves targeting songs and unreleased material by the superstar singer. It’s alleged they downloaded more than 50,000 music files worth $253 million in the biggest ever cyber-attack on a music company.The news comes just a year after Sony paid $395 million for the seven-year rights to the songs following Jocko’s death. The buy-up came with a …

Read More »

Total $60000 Prize for Exploiting Google Chrome, Hackers at Pwnium work

Google has offered prizes, totaling $1 million, to those who successfully hack the Google Chrome browser at the Pwn2Own hacker contest taking place next week i.e 7 March 2012. Chrome is the only browser in the contest’s six year history to not be exploited like at all. Therefore Google will hand out prizes of $60,000, $40,000, and $20,000 for contestants able to remotely commandeer a fully-patched browser running on Windows 7. Finding a “Full Chrome Exploit,” obtaining user account persistence using only bugs in the browser itself will net the $60k prize. Using webkits, flash, or a driver-based exploit can …

Read More »

Russian Hackers Stealing Money American Citizen, Around U$3,2 Million

More recently, after a weekend that everyone thinks to get ready back activity, Trend Micro, the security company of mobile and cloud in the world , had just discovered the activities from a gang cyber hackers from Russia by using SpyEye-Zeus trojan to steal the money from U.S. citizens since January 2011 around U$ 3.2 million or approximately U$ 17,000 per day. During the six periods since January 2011, Trend Micro found that “Soldier” has been infiltrated into various business institutions in America, such as banks, airports, research institutions, and even into the government and the U.S. military. A total …

Read More »

WordPress Security that You Must to Know

WordPress is the undisputed CMS with the most widely used, both for the benefit of organizations and individuals. Along with its popularity, more and more also are trying to find the weaknesses of this engine, like a tree more higher then the wind will grew louder. The following tips to increase the security that must be known by you who use WordPress as a Content Management System or platform that is working to set the look, content, user administration, plugins, addons and similar. User Administrator / Admin By default after installing wordpress, then we will get the admin user. Never! …

Read More »