Tuesday, July 31, 2012

Sedulity Groups | Most of are women in 80,000 complaints of Cyber Crime

As many as 80,000 cyber crime related complaints have been registered with police in Kerala in the last one year, of which 50,000 relate to harassment of women through new hi-tech devices, Home Minister Thiruvanchoor Radhakrishnan said here today. He told reporters here that the number of cyber crimes are on the increase in the state with 80,000 complaints lodged in the last one year, 50,000 relating to women alone. Most victms of these crimes were teenaged girls and women, he said, adding there was a nefarious attempt to trap young girls to indulge in wrongdoing. The increase in number of mobile phones had also led to more number of cyber crimes, he said, adding Kerala now has three lakh mobile phones Crimes were also reported by misusing social networking system and internet, he said. The minister said the government with a view to strength the computer security using best practice, Kerala Police would hold an International Information Security Conference here on August 3 and 4, he said. 'By fostering the collabroation of the public and private sectors, our goal is to conceive new counter measures against cyber security threats and crimes aginst women', he said. On reported presence of Maoist in Kerala forests, he said certain things cannot be disclosed due to security reasons. Necessary steps would be taken by police to prevent activities of such groups, he said. Justifying the ban on the August 15 'freedom parade' of Popular Front of India, he pointed out that the ban had been in force for the past three years and UDF government had only followed the stand taken by the previous LDF government. He said Independence Day celebrations was an official celebration conducted by all state governments. 'Let us celebrate the freedom together', he said, adding the PFI's parade has a sectarian colour to it.

Monday, July 30, 2012

Sedulity Groups | Anonymous Hackers not responsible for attack on Dahabshiil


Anonymous+Hackers+not+responsible+for+attack+on+Dahabshiil
There was an incident that a group claiming to be the cyber hacker or hacktivist group Anonymous has threatened Dahabshiil an international funds transfer company and the leading bank in Somalia, but the international funds transfer company based in the Middle East, says Anonymous was not responsible for the attack on its banking systems.

According to the report, The group alleged it was the hacktivist group Anonymous, and threatened to destroy Dahabshiil within two months if the company did not stop what the group alleged as supporting terrorist organizations and terrorists in Somalia and across the world.

Friday, July 27, 2012

Sedulity Groups | Iranian nuclear program hit by AC/DC virus


Iranian+nuclear+program+hit+by+AC+DC+virus
A scientist working at the Atomic Energy Organisation of Iran said computer systems have been hit by a cyber-attack which forced them to play AC/DC’s Thunderstruck at full volume in the middle of the night.

The attack came to light after a researcher at security firm F-Secure received a string of emails from a Iran's atomic energy organisation."I am writing you to inform you that our nuclear program has once again been compromised and attacked by a new worm with exploits which have shut down our automation network at Natanz and another facility Fordo near Qom."
"It does sound really weird," he said. "If there was an attack, why would the attacker announce themselves by playing 'Thunderstruck?" If true, this attack is the third hacking attempt aimed at Tehran’s controversial nuclear program.

Thursday, July 26, 2012

Sedulity Groups | 8 million passwords dumped from gaming website Gamigo


gamigo-595x341
Four months after the gaming site Gamigo warned users about a hacker intrusion that accessed some portions of its users’ credentials, more than 8 million usernames, emails and and encrypted passwordsfrom the site have been published on the Web, according to the data breach alert service PwnedList.

The list of passwords, which were scrambled using a one-way cryptographic hash algorithm, were published earlier this month to a forum on the password-cracking website Inside Pro. According to forbe,"The list also contained 8.2 million unique e-mail addresses, including 3 million American accounts from the US, 2.4 million accounts from Germany, and 1.3 million accounts from France."

Tuesday, July 24, 2012

Sedulity Groups | Hack a Server (HaS)


Idea_images
Choose a job you love, and you will never have to work a day in your life” said Confucius. These would be the words that describe Marius Corîci the most. In 2003 he started doing business in the plumbing industry and co-founded ITS Group, a franchise for Romstal Company, the biggest plumbing installations retailer from South-Eastern Europe. In 2007 he moved into Artificial Intelligence field and founded Intelligentics, a group for Natural Language Processing. Now, he is very focused on infosec and got involved in all the biggest independent security projects in Romania: S3ntinel,Hack Me If You CanHack a Server and DefCamp.

Marius considers himself a serial entrepreneur and is very passionate about Artificial Intelligence. Never a quitter, always a perfectionist, looking for challenges that will change the world we live in. He believes in people and the power of great teams, and he intends to start blogging in the near future.

Sedulity Groups | Things to know about the real Technical heroes: 'Ethical Hackers'

Now a Days, where Technology is Boosting up; Do you think that “HACKERS” are the people who make illegal activities? It is the perception where, Reality is far away from this statement that Hackers and Crackers are not different from each other in their working strategies. In the real world, Hacker is the one who have great Technical knowledge and expertise. However, the major difference between a “Hacker” or a “Cracker” is 'ETHICS'.

Friday, July 20, 2012

Sedulity Groups | Get yourself protected from the Black Hats

Which of the following is often one of the most overlooked areas of security: operational, technical, Internet, or physical? What is the name for a person who follows an employee through a locked door without own badge or key: tailgater, follower, visitor, or guest? Which application will help identify whether a website is vulnerable to SQL injection attacks: BlackWidow, Metasploit, Scrawlr, or SQL Block? What is the easiest method to get a password: brute-force cracking, guessing, dictionary attack, or hybrid attack?

Thursday, July 19, 2012

Sedulity Groups | No Booting for you ! Good or Bad ? ? ? ?

Lets discuss about live booting/ Live CD. Live cd is a Cd/ Dvd or any other portable media containing bootable Operating system. These media have the unique ability to run operating system without altering the files and operating system installed on the hard disk of the pc.

It generally places it files in the Ram [random access memory ,volatile memory], so when a pc is rebooted all it files are deleted automatically. Now a Days we all know that Bypassing operating system security is not a big deal But big deal is to secure it, One common thing that you can go with, is to apply a BIOS/ Boot password on your system. So, That no one can bypass your Windows Security through live Booting.

Sedulity Groups | Hacker wanted by FBI held in India For Carding Crimes


Nikhil Kolbekar, aka HellsAngel, was arrested on July 11 in Mumbai, India. Eric Bogle, known as Swat Runs Train, and Justin Mills, or xTGxKAKAROT, were taken into custody in Canada, respectively Colorado, US. HellsAngel and Bogle is suspected of selling complete credit card details, including names, addresses, social security numbers, birth dates, and bank account information. He also sold remote desktop protocol (RDP) access data that could be utilized to breach computers in countries such as Turkey, India, Czech Republic, Brazil, Germany, France, Italy, Spain, Sweden, and others.
The suspect, Nikhil Kolbekar, was produced before the Esplanade Court on Thursday and has been remanded in judicial custody. He will be produced before the Patiala House court in Delhi on July 25, with the US pressing for his extradition through the Interpol.

Wednesday, July 18, 2012

Sedulity Groups | Data Security & Types of data

Dear Readers, in this edition I am trying to give precise information about ‘Data Security which is very important to know in this Computer Modernization and I am sure that it will help you all in your relative fields. Every industry has one most important and crucial thing which should never get compromised and that is, DATA. Data Security is one of the biggest challenges for all the Corporate now a days. To explain it further please continue reading the article in this and next edition;

Saturday, July 14, 2012

No Sedulity Groups | No Booting for you ! Windows 8 will able to kill Live CD?

Lets discuss about live booting/ Live CD. Live cd is a Cd/ Dvd or any other portable media containing bootable Operating system. These media have the unique ability to run operating system without altering the files and operating system installed on the hard disk of the pc.

It generally places it files in the Ram [random access memory ,volatile memory], so when a pc is rebooted all it files are deleted automatically. Now a Days we all know that Bypassing operating system security is not a big deal But big deal is to secure it, One common thing that you can go with, is to apply a BIOS/ Boot password on your system. So, That no one can bypass your Windows Security through live Booting.

Friday, July 13, 2012

Sedulity Groups | Yahoo Voice hacked, 400,000 yahoo passwords leaked

Now a days where Most of the organizations are working a lot to provide utmost security to their clients & customers, Hackers know how to bypass that security and hack the information. Recently over 450,000 email addresses and plain-text passwords are Hacked and circulated on the internet, in a document marked "Owned and Exposed". 
Yahoo+Voice+hacked,+400,000+yahoo+passwords+leaked
The affected accounts appeared to belong to a voice-over-Internet-protocol, or VOIP, service called Yahoo Voices, which runs on Yahoo’s instant messenger. The Voices service is powered by Jajah, a VOIP platform that was bought by Telefonica Europe BV in 2010.
The dump, posted on a public website by a hacking collective known as "D33Ds Company", said it penetrated the Yahoo subdomain using what's known as a union-based SQL injection. By injecting powerful database commands into them, attackers can trick back-end servers into dumping huge amounts of sensitive information.


Tuesday, July 10, 2012

Sedulity Groups | Indian Navy Computers hacked by Chinese Hackers


Indian+Navy+Computers+hacked+by+Chinese+Hackers
Chinese hackers allegedly plant bug via flash drives on India navy's computers, which relayed sensitive data to China IP addresses. The sniffing tool was found in the naval computers exactly as INS Arihant, India’s first nuclear missile submarine, was in trials at the targeted facility in Visakhaptnam.

The virus had reportedly created a hidden folder, collected specific files and documents based on certain "key words" it had been programmed to identify. It remained hidden on the pen drives until they were put in computers connected to the internet, after which the bug quietly sent files to the specific IP addresses.

Monday, July 9, 2012

Sedulity Groups | Bulgarian Hackers Group arrested



Bulgarian authorities say that after months of investigation they have busted the “most powerful hacker group” in the country, the Cyber Warrior Invasion. The operation was conducted by Bulgaria’s Sector for Computer Crimes, Intellectual Property and Gambling and the territorial units of the Chief Directorate for Fight with Organized Crime in the municipalities of Pleven, Shumen, Plovdiv, Burgas, Haskovo, Stara Zagora and Kyustendil.

Saturday, July 7, 2012

Sedulity Groups | Hiring a Hacker in your IT team is really secure or not?


Hackers might have shaded pasts, but if hired can bring a lot of IT security expertise in the system. Should you consider hiring one?
In this Open Source Era where everything is easily available online, Internet has given various pros and cons to the IT world. Still company’s think that Hackers are the curse of the Cyber Security professional's existence when they goes unethical, but the truth is, hackers often understand the distinctions of Cyber Security better than an average CTO. So is it really secure to hire a Hacker in your IT team?


Thursday, July 5, 2012

Sedulity Groups | Beware! Katrina, Deepika can lead you to Malware

Beware. Katrina Kaif is beautiful but she is the most dangerous celebrity in the Indian cyber space, followed by Deepika Padukone. That's according to internet security company McAfee's the 'Most Dangerous Indian Celebrity' study.
Commenting on the findings of the report, Venkatasubrahmanyam Krishnapur, senior director, McAfee India, said, "In a celebrity crazy country such as India, cyber criminals find it very lucrative to use the names of popular figures as keywords to lure people to websites with malicious software." "This year's study found movie stars top the ''most dangerous'' list, while sports stars and politicians are among the safest,'' he said.

Wednesday, July 4, 2012

Sedulity Groups | Cyber Security can help corporates to meet their security goals

Anup Girdhar, CEO of Sedulity Groups, says, "Getting networks, Web applicationsServers etc. tested by Cyber Security Professional is the only best utilitarian way for companies to establish the level of security of their networks & systems. With the ever-increasing risk of external attacks to websites, IT outsourcing and the adoption of new technologies including virtualization and cloud computing, organizations have to firstly, identify Cyber Threats and secondly, put control measures in place to defend themselves from all these Cyber Attacks."

Routine IT Audit, is also known as penetration testing, is an essential component for any Corporate to implement the optimum level of security. As computer technology has advanced, organizations have become increasingly dependent on computerized information systems to carry out their operations and to process, maintain, and report essential information. As a consequence, the reliability of computerized data and of the systems that process, maintain and report these data are a major concern to audit. IT Audit helps to examine the adequacy of controls in information systems and related operations to ensure system effectiveness.

Monday, July 2, 2012

Sedulity Groups | Hacker made calls worth ₨ 6,98,324 [ About 7 Lakh ] from public phone


Computer expert Dariusz Ganski, of Sunny Bank, Kingswood, used a router to tap into BT phone boxes and made hours of calls to expensive numbers.

He make calls worth £10,000 of premium-line bills and he has been jailed for 18 months.

Prosecutor David Maunder commented: "Police located the vehicle and they found Mr Ganski with two laptop computers and numerous mobile telephones."