Saturday, June 26, 2010

A new Solution for Network Administrators to Prevent Cyber Hacking



Recently a new powerful Platform named Radware has been produced by an expert computer specialist team for the purpose of reducing the terrorism in the cyber space. This platform, assures the complete availability, performance and security of business-critical applications for more than 10,000 enterprises and carriers worldwide. With Radware's comprehensive APSolute suite of application delivery and network security products, companies can drive business productivity, improve profitability, and reduce IT operating and infrastructure costs by making their networks business-smart.
Most of the threats on the websites are Bot commands, DOS attacks , TCP and HTTP Flood attacks. Radware is using several technologies to prevent our websites, our data centers and our servers from being hacked

Source:
http://www.youtube.com/watch?v=QEdV02M0VGE

Friday, June 25, 2010

An International Partnership Against Cyber Terrorism in Malaysia

Malaysian government has made an impact against cyber terror by several means. The government has set up an international center with the name of IMPACT (International Multinational Partnership Against Cyber Terrorism) in the IT industry serving on its advisory board. The budget of this center has approved RM34mil and it is located in Cyberjaya. This non –profit organization is the first international public-private sector which bound to work against cyber terrorism. Two local IT companies – Ascendsys Sdn Bhd, a leading security services company, and GITN Sdn Bhd, a government IT network company that is owned by Telekom Malaysia – will run and coordinate the centre.

For a start, IMPACT would focus its activities in three key areas - security certification, research and development; as well as establishing a global emergency response centre. IMPACT has got off to a good start with some leading names lending their support. America's Symantec Corporation, Japan's Trend Micro, and Russia's KaperskyLlab have already agreed to be key partners and to serve on IMPACT's international advisory board to be established soon.

Source:

http://security.org.my/index.php?/archives/Making-an-IMPACT-on-Cyber-terrorism.html

Thursday, June 24, 2010

Some Hints to Prevent Your Bank Accounts from Being Hacked


These days the hackers are looking for the ways to earn some money as well as destroying and making problem for the websites. One of these way is to penetrate the users bank account and transfer and steal money from their accounts. As we see nowadays most of us are doing our banking activities via internet so in case we won’t be precautious we may lose all our assets. There are some hints which might help us to prevent our bank accounts and credit card from being hacked. Some of them are as follows:

· Try to use OS like Linux instead of windows as this OS is the most vulnerable one.

· Try to use the most secure web browsers and email services.

· It would be necessary to install a firewall and antivirus program on your system.

· Using Wi-Fi connections just in the secure place like your office and your home.

· Encrypting all your valuable information on your hard drives including your bank account passwords.

· Social networking websites such as Twitter and Facebook can be another source of being hacked, so try to be very cautious while surfing these websites.

· Last but not least, try to use strong password by combining alphabets and numeric in your password.

As a conclusion the bank all over the world are trying to make their websites as much secure as they can, but still the carefulness of the costumers is required to decrease such the events.

Source:

http://www.panamalaw.org/prevent_bank_account_hacking-Dec2009.html

Tuesday, June 22, 2010

Hacker Arrested By FBI



A computer hacker who penetrate into the several internet phone service providers in Miami, New Jersey and Spokane arrested by the FBI. the total amount that he has stolen was about 1 million $ and the federal court punished him to be in the prison for over 20 years. the point which is very interesting is that FBI found this victim by means of his MYSPACE account and the photos that he has uploaded there. as the FBI mentioned he has 22 years old and he confessed that he was not alone.

Monday, June 14, 2010

A Scientist Infected By a Computer Virus


Dr Gasson, A computer specialist at University of Reading tested a new threat for human beings recently. As using the micro-chips in different parts of human bodies to improve their health is becoming worldwide this researcher tried to implant one of these chips to his body to see how much vulnerable could it be in case of malfunction of the chip by a computer virus.

Nowadays using these micro computers in medical science makes the scientist to be worry about the threats that these electronic devices might have for human beings. Dr Gasson attached one of these micro-chips to his hand to make a secure connection with his university building and his mobile phone. As he mentioned when this device implanted in his body it became a part of his body and whatever happened to the function of this device will affect him. The results of his experience as the first human being who has infected by a computer virus were presented at the IEEE International Symposium on Technology and Society in Australia in June 2010.
This scientist threatens us about the dangers we might encounter in the near future because of using such the technologies to enhance ourselves.

Source:

http://www.sciencedaily.com/releases/2010/05/100526095830.htm

Thursday, May 27, 2010

How Hacking Of Passwords Is Achieved?


Nowadays we use a lot of electronic tools such as email ,electronic bank account and many more electronic tools that we need password to use them, so we must make sure our password is safe or not?

These days several methods of password hacking is getting popular.
These methods can be categorized into 3 main sections which are as follows:

-the first and probably the most convenient method for hackers is social engineering which will get some personal information from you and will guess your password according to those info.
-the second way is decrypting your encrypted password key which was made by a hash program to achieve your password, this method needs lots of knowledge and a skilled and experienced hacker.
-the third and the last method is by using Brute Force technique which is done by a program , the procedure is very simple ,these programs will try several random keys with different combination to find your password but it would be a bit time-consuming.
My suggestion is to choose longer and less guessable password to make sure your accounts are safe.

http://www.hackingalert.com/hacking-articles/password-hackers.php

Wednesday, May 12, 2010

Iranian Cyber Army Hacked TWITTER for Several Hours

Several months ago a group in Iran which named themselves as “Iranian Cyber Army” shut down twitter for several hours and put an image on the twitter website which shows the flag of Iran and a message which represented that Iranian government has this power to hack very huge social networks such as twitter and USA has no power in comparison to Iran.

Doing this activity on a website like twitter caused lots of problems both for the home and business users which were using this platform to communicate with their friends, families and partners and it also make a fear in the user that their personal information and message is not on a secure place on the web.so what will be the result? The result will be a sharp decrease in the number of users who uses this website and it’ not the thing that the creator of such the website looking for. Although the security team of twitter solved the problem several hours later but the effect will last for several months.

The new threat which might encounter the users in the new future is about FACEBOOK , another huge virtual place for the users from different parts of the world.they can not be sure any more that their personal info will keep secure or not?

source:

http://fvdb.wordpress.com/2009/12/18/twitter-hacked-by-iran-cyber-army/

Wednesday, May 5, 2010

Data Theft via Portable Device














As the new portable devices such as Mobile phones, Flash memories and Mp3 players are getting more and more popular, a new security threat is showing up in the networks where the employees are bringing such the things to their workplace for their personal use.

Recently two computer scientists from University of Strathclyde, in Glasgow published an article in “International Journal of Electronic Security and Digital Forensics” which shows the illegal usage of these new portable devices in the workplace computing systems. These two researchers are introducing two methods in their article to decrease the numbers of data theft and malwares distribution via these devices into the computer networks.

The main problem with these devices is because of their large capacity and web connectivity capabilities which let even the normal users to carry huge amounts of data in a very small portable device and also can transfer them to internet or send them as email with Wi-Fi.Their suggestion to the organizations is that they should ban these portable devices to be brought to the workplace which contains valuable and confidential information by their employees. But as we know there is no possible way to remove the data leakage in the workplace completely.

Source:
http://www.sciencedaily.com/releases/2010/03/100331081133.htm


Saturday, May 1, 2010

CNET News on Identity Theft in Facebook

Social networks like Facebook are getting very popular nowadays and most of the people spend their times to communicate with their friends and family members via this virtual community. A new weblog named FBHive created a discussion board for the users to introduce the security gaps in Facebook. According to the recent news which this weblog alerted the users about that is a new security hole in Facebook which will let the hacker to view the basic information of the users such as Location, Gender, Relationship status and … .

In the first look it doesn’t seem too much critical but it will be a problem when you find out that this basic information can be the password hint for user’s accounts. The same problem was reported by this blog last year which was solved by the Facebook several months ago.
This weblog tries to introduce such the problem to Facebook security team to fill the gaps as soon as possible.

Source:
http://news.cnet.com/8301-13577_3-10270002-36.html


Wednesday, April 28, 2010

Hacking a TV program in Netherland




In this video you will see a well-skilled hacker. As he mention in his video he has hacked a famous live TV program by changing it's subtitles which will confuse the presenter.
you wont believe this?but it is real


Source:
www.youtube.com