Tuesday, December 28, 2010
Operation Pay Back & LOIC
Sunday, December 05, 2010
Full stop from being tracked online :An attempt from FIREFOX
Thursday, November 04, 2010
Removing METADATA from JPEG & IMAGE FILES
3. Another easy way is to simply take a screen shot of the image and paste it in paint brush.But this would be cumbersome to do when the images are in bulk quantity.To download JHEAD...click here
Get Paid to Hack GOOGLE
Tuesday, November 02, 2010
MICROSOFT & Failures!!!
- February 2010 saw Microsoft announcing discontinuation of "Xbox Live service for original Xbox consoles and games.
- April 2010, Microsoft confirmed stopped working on tablet project, codenamed Courier which was touted to be an Apple iPad rival.
- September 2010, Microsoft announced that the Windows Live Spaces blogging service will be Terminate gradually in favour of WordPress.com.
- May 2010, Microsoft announced halt on the Response Point phone system.
- June 2010 saw Microsoft announcing discontinuation its new generation of smartphones.
- September 2010, Microsoft announced closure of Vine, a service built to help keep friends and family in touch during emergencies.
Mozilla @ Prone again!!!!
Monday, November 01, 2010
Bredolab grabs Attention
- Users of computers with viruses from this network will receive a notice of at the time of next login with information on the degree of infection.
- Bredolab, known for spreading spam and rogue antivirus, is thought by some experts to have infected at least 30 million computers.
- Spread via drive-by attack websites and spam email attachments.
- Infecting machines with a backdoor that downloads additional malware without the victim's knowledge.
- Sends out spoofed password reset messages to Facebook users in an attempt to spread malware and infect users of the social network.
- Has the power to obtain information on the user's computer including the ability to copy, change or delete files and other information,"
- Pushdo botnet uses Facebook to spread malicious email attachment: A phony message warns users that their Facebook password has been reset.
- Majority of infections are in the U.S. and the U.K. and many Western European countries.
- Discovered by the Dutch High Tech Crime Team in the late summer.
- Capable of infecting 3 million computers a month. The botnet network used servers hired in the Netherlands from a reseller of LeaseWeb, which is the largest hosting provider in the Netherlands, and one of the largest hosts in Europe.
- Able to constantly change its appearance to avoid detection by traditional antivirus signatures. Like other botnets, the Trojan communicated with the command-and-control server using encrypted messages.
Adobe flash Player hit!!!!
Intel opens first chip plant in China??
6$ is all to shut down a Cloud Client site!!!!
Sunday, October 31, 2010
OPERATION CISCO RAIDER
VIRUS in Boot Sector in Hard Disk fresh from OEM!!!!
Image Ballistics : Incredible IT
3. I checked up the state of pics clicked from my camera years back and all answers were correct.....few Nikon,few sony.......one easy and free tool for such investigation is JPEGSNOOP.Simple to download,very small size and great analysis report.....
Tuesday, October 26, 2010
Crack 14 Character passwords in Seconds : Objectif Sécurité
Wednesday, October 20, 2010
Collection of Forensic Softwares : TUCOFS
Tuesday, October 19, 2010
Service Packs & Infection Rates
Monday, October 18, 2010
CaaS : CRIME WARE AS A SERVICE at offer now
Saturday, October 16, 2010
Stuxnet : Some more good info
Is ur Account Hacked ?- Common ways u get compromised.
- Password re-use: You sign up for an account on a third-party site with your Google username and password. If that site is hacked and your sign-in information is discovered, the hijacker has easy access to your Google Account.
- Malware: You use a computer with infected software that is designed to steal your passwords as you type (“keylogging”) or grab them from your browser’s cache data.
- Phishing: You respond to a website, email, or phone call that claims to come from a legitimate organization and asks for your username and password.
- Brute force: You use a password that’s easy to guess, like your first or last name plus your birth date (“ujjwal3008”), or you provide an answer to a secret question that’s common and therefore easy to guess, like “dosa” for “What is your favorite food?”
Friday, October 15, 2010
CANURE : 100 on ACID3 Test
Another Wowwwwww!!!!-CYBERTECTURE
Tuesday, October 12, 2010
Biggest release of Patch update by MICROSOFT
Monday, October 11, 2010
Stuxnet : A Milestone in Malicious Code History
Friday, October 08, 2010
Here comes Trojan-PWS-Nslogm to steal Passwords and credentials from Mozilla
RISK MANAGEMENT : Beware while u update with Patches
ALL izz WELL!!!!!inside this- Check out FREE STUDIO
Security Enabled Hardware :INTEL - McAfee Merger
Thursday, October 07, 2010
CLEANERS & FOOTPRINTS
Thursday, September 30, 2010
Shadows in the Cloud : Cyber Espionage
Shadows in the Cloud
Sunday, September 19, 2010
Browser Forensics - Not Simple
Saturday, September 18, 2010
Root Kits : Hidden Undetected Threats
ZERO DAY EXPLOIT : ???
Thursday, September 16, 2010
Cyber Warfare : It has started
Wednesday, September 15, 2010
ORDER OF VOLATILITY OF DIGITAL EVIDENCE
1. Not all information-based evidence is the same! Evidence can be organized into an “order of volatility” meaning how long it will stick around for you to collect until it automatically is lost.
2. Dan Farmer & Wietse Venema created the below table of evidence volatility, which is commonly referenced by forensic professionals. For example, information stored on a CD-R or some optical storage media can last for about 10-100 years depending on the brand used. Information stored in a computer’s main memory, by contrast, will last for only tens of nanoseconds before it is wiped out by the computer’s normal processing.
TYPE OF DATA | LIFESPAN |
Registers, peripheral memory, caches, etc. | Nanoseconds or less |
Main memory | Ten nanoseconds |
Network state | Milliseconds |
Running processes | Seconds |
Disk | Minutes |
Floppies, backup media, etc. | Years |
CD-ROMs, printouts, etc. | Tens of years |
3. Very critical from forensics point of view.....most people would want to turn a computer off (or at the very least unplug it from the network) when they realize an incident has occurred. However, as noted in the chart above, one will lose evidence in main memory and “network state” information (which other systems the computer is connected with and what information they are exchanging) with such an approach. Even shutting down a computer the “normal” way (Start / Turn Off Computer / Turn Off in Windows XP) can delete evidence, as Windows performs a number of housekeeping tasks in the shutdown process, such as closing opened files and clearing out the temporary disk cache.
4. Thanks Peter C. Hewitt (Read from Browser Forensics).