Serious Security Flaw : iPhone Bug Allows SMS Spoofing

A rather serious security flaw in the iPhone’s SMS messaging system has been discovered and revealed by well-known security researcher and jailbreak extraordinaire ‘pod2g’. Security flaw affecting all iPhones that he says could facilitate hackers or thieves to access your personal information.

The researcher claims that the flaw has actually been present in Apple’s iPhone software ever since the first iPhone was launched in 2007, but has failed to have been picked up on by anybody, including Apple it seems.

Anonymous hackers target Australian Intelligence

Hacking group Anonymous claimed to have shut down a computer server belonging to Australia's domestic spy agency ASIO, reportedly briefly closing down access to its public web page. The Australian Security Intelligence Organization acknowledged some disruption to its website.

The ASIO website was down for about 30 minutes after the attack and is now operating slowly or not at all. It appears the attack may be ongoing, but ASIO’s technical staff are recovering the situation.

What is Firewall Forensics?

Dear Readers, in this edition I am trying to throw some light on Firewall Forensics and please
try to implement few important things that has been given in this article and I am sure that it
will help you all in your relative fields where, You will need to conduct a forensics analysis
using your firewall logs at some point. The underlying objective of a forensic analysis is trying
to determine what happened and to establish facts that can be used in court. If you have never
reviewed the firewall logs previously, this can be a costly and almost insurmountable process

Internet users are exposed to vulnerabilities

A recent survey of more than 5,000 active Internet users across 10 cities in India suggests that
users are becoming increasingly concerned about online security. According to the VeriSign
commissioned study, ninety 1 % of the respondent Internet users have experienced some case

of cyber fraud, such as Phishing, key logging, identity theft and account takeover. Despite the
exposure to cyber fraud, a majority of respondents were unaware of ways to combat it. This
study clearly indicates that while users may be unaware of how to protect themselves online,

Internet Protocol a unique identity of a Computer

What is Ip Address?
You might have come across this term very often, haven’t you! Every machine on the Internet has a unique identifying number, called an IP Address. A typical IP address looks like this: 216.27.61.137, 921.168.1.6, 59.22.1.1 etc.

What is the use of IP Address?

A student SMS her father, a minute before committed suicide

"I am sorry Papa. I am committing suicide," said a text message from Rekha Singh, second year polytechnic student in electronics stream, to her father Ranjeet, a WCL manager at Kamptee. The 22-year-old Rekha had been afraid to face her father since she had lied to him about her repeated failures. She jumped to her death from the third-floor balcony of her hostel within a minute of sending the SMS.

Mariposa botnet creator goes on trial

26-year-old Slovenian hacker known as Iserdo stands thought to have been behind the Mariposa botnet is on trial in Slovenia, charged with having masterminded an international cybercrime gang.

At its height, the Mariposa botnet infected up to 12.7 million PCs, with more than half of the Fortune 1,000 companies believed to have been compromised, including 40 major banks. Once a computer had been compromised and brought into the botnet, operators could steal information from innocent users - including credit card details and banking passwords.

Fake Syria News Posted from Hacked Reuters blog and Twitter account

On Friday, Reuters blog platform was hacked with false posts and on Saturday, the @ReutersTech account on Twitter was taken over and renamed @TechMe. False tweets were sent before it was taken down.

The first attack came Friday after Syrian hackers loyal to President Bashar al-Assad allegedly gained access to Reuters’ blogging platform, which they used to post a fake interview with rebel Free Syrian Army (FSA) leader Riad al-Assad. The interview essentially said the general was withdrawing troops after a battle.

Demonstration of hardware based backdoor called Rakshasa by Researchers

Security researcher Jonathan Brossard created a proof-of-concept hardware backdoor called Rakshasa that replaces a computer's BIOS (Basic Input Output System) and can compromise the operating system at boot time without leaving traces on the hard drive.
In short, firmware is software that is stored in non-volatile memory on a computer chip, and is used to initialise a piece of hardware’s functionality. In a PC, the BIOS is the most common example of firmware but in the case of wireless routers, a whole Linux operating system is stored in firmware.

Pakistani hackers deface inactive Southern Railways website

An inactive website of the Southern Railways www.southernrailway.gov.in has been defaced apparently by Pakistani hackers.
The hacker group that calls itself ‘Pak Cyber Pyrates’ replaced the home page of the website with a page with content that denounces India’s role in Kashmir.
The official Southern Railways website moved to a new domain www.sr.indianrailways.gov.in back in 2010.

Syndicate content