Saturday, June 23, 2012

The arrest of a Russian hacker 22 years old managed to penetrate a computer 6000000

The Russian police arrested a young man at the age of 22 years, managed to configure the network botnets and wide, with 6 million computers could this hacker penetrated by Trojan of its programming. Trojan from which the user was able to steal more than $ 4.5 million dollars from various bank accounts and credit cards managed by Alasala breakthrough for the duration of these computers, which are mostly residents of the cities of the Russian
The police managed to arrest the young man after the track to its effects on the Internet for a long time before determining the place of residence, and attack him for throwing. Captured and directed to a fair trial

Windows 8 will be a challenge for programmers Virus

Researchers believed protection in Microsoft that Windows 8 is a step towards him the best in the area of ​​protection and that Windows 8 will be much better in the field of protection from previous versions of Windows


Where programs are designed memory management (Windows Heap Manager, Windows Kernel Pool Allocator) in Windows 8 way that makes it almost impossible for hackers that they broke the hardware or implant malicious software which, as added security sandbox to Windows 8, is a mechanism to restrict security programs and prevent them from carrying out jeopardize the security of the operating system, also contains Windows 8 on the browser Internet Explorer 10 supplied function allows to disable plugins such as Flash, Java




Trojan aimed at printers and hit it crazy


Company Symantec found trojan cause 'mad printers "and it is full of printed pages Bakherbashat force until the amount of paper in the printing, the company monitored the activity of this Trojan Mokhtvlh in countries of the world, but countries that were most affected are the United States and India
Experts Symantec rated the Trojan as a kind of Milicenso, a Trojan sneak to the device through the implementation of an attack back door backdoor, as they said that there are several ways to hit this type of Trojan, may be by opening the compressed files contain this Trojan and be attached with the mail random Web, or download the software fake video codecs

Friday, June 22, 2012

Risks of opening PDF files with unknown source and how to protect

We deal with many of the PDF files on an almost daily basis, we either downloaded from the sites, or reach them via e-mail, but few of us who know the real risk of this type of file in particular. So I decided in my article for the day to tell you about the dangers of opening PDF files anonymous.

Danger

In fact, the risk to open PDF anonymous ranging from injection computer Bmaloyr and espionage on the part of your activity on the Internet to hack full, which can be a target which, by integrating file The PDF to use vB malicious enable the attacker as soon as you open the file from Aatsal inversely your computer, often this type of hack included in the hack using some advanced projects such as Almitasploat. An attacker could also merge with the Trojan PDF file here and the attacker will target a random person who opens a PDF file BBC.

Methods of protection


When we talk about protection methods must first define a very important concept, which is that there was no protection programs are able to protect you from risk The PDF in full, it remains liquid supplement only. For this as steps and precautions to avoid always open PDF files you receive anonymous email through. Also, when you download a PDF file from an unknown source to Atqm open directly into the computer only after making sure of his safety by testing sites and some of you:
http://virusscan.jotti.org/fr

https://www.virustotal.com/

http://virusscan.jotti.org/fr

http://www.viruschief.com/

MasterCard denies penetration Reckz0r data customers

A few days before we had we published the news of penetration of 79 bank by hacker Rakazhor, which in turn confirmed that he had hacked data clients both MasterCard and also Ú¤iza Card, New in the case that the company MasterCard has denied that he had received a violation of its informational, and that the data published by the not contain any data related to payment information. According to this reporter one site, "Bessie World," that after contact with some of the victims found that the data published by the hacker is finished
Validity of 7 years. It is also after the research has been detected that the data published by this hacker found published a week ago by another group, which said it had looted this data from a data center Israeli (see photo) Thus, the hypothesis of a breakthrough Rakazhor company MasterCard has become fade, especially after the verification the identity of the hacker. To be placed again that the probability of hacker Rakazhor only child hacker knew very well how to bring the spotlight to him.

Pirates UGNazi group claims responsibility for Twitter stopped yesterday


Suffered many of the surfers Twitter yesterday from the cessation of the site for more than 50 minutes, where the subject of a number of sites news sites yesterday, but it is after the company Tother fixes the problem, confirmed that the damage caused by a technical fault led to a halt destruction of the site, which is impossible with him browsing and access to Twitter. However, the hacker group called the
Confirmed responsibility for the attack blocking service on Twitter yesterday, although a spokesman denied UGNazi
. The name of a company Twitter, stressing that the site was stopped for output only a technical fault and not attack blocking service
Of the strongest groups hacker managed to penetrate where a number of groups are classified UGNazi
Sites of interest as a U.S. Intelligence and the location of the famous Cold Flair to speed up and protect sites as well as the site bp.com

Thursday, June 21, 2012

Penetration site of the Ministry of Defense by a group WIKIBOAT

A few weeks ago a group hacker wiki bot itself to the world through the overthrow of several popular sites, and today the group has the location of the overthrow of the U.S. Defense Department and the Pentagon, one of the sites believing strongly in the virtual world. Where deliberately

The group immediately after penetration of the site database published several phone numbers and names, addresses and e-mail to several employees. So be a wiki bot may view the world's attention to it in the second carried out by a blow from the group of the month, which was established in the month of March.