Posts

Showing posts from May, 2012

Flexible, Printable & Wearable electronics...!

Image
When most of us think of electronics, we think of the sturdy stability of silicon and plastic. Flexibility is a trait that belongs to the organic world, where materials come in all shapes and stiffness. However, advances in materials science and electrical engineering have paved the way for a new type of electronic device: one that can bend and fold just like a piece of paper. From flexible displays to disposable RFID tags, these new materials have enabled electronics to end up in places they never have before. They could even, thanks to Berkeley electrical engineering and computer science professor Ana Claudia Arias, end up in our own clothing. Professor Arias is a recent addition to the Berkeley engineering community, having begun her career in materials science at the company Plastic Logic, developing materials called organic printed electronics. Just as one might print ink onto paper using a desktop printer, these electronics can be printed onto various flexible substrates, and Pro…

FBI spying on Skype and Wireless Communications

Image
Four years and $54 million later, the Federal Bureau of Investigation is finally ready to launch a surveillance unit capable of spying on Skype conversations and other Internet communications.
The Domestic Communications Assistance Center (DCAC) is a collaborative effort between the FBI, U.S. Marshals Service, and the Drug Enforcement Agency. All three agencies will build customized hardware to enable wiretapping on wireless and Internet conversations per court order requests. “It’s also designed to serve as a kind of surveillance help desk for state, local, and other federal police,” CNETreported. “The center represents the technological component of the bureau’s ‘Going Dark’ Internet wiretapping push, which was allocated $54 million by a Senate committee last month.” The DCAC has been tight-lipped about its purpose. The FBI said in a statement that the organization will “not be responsible for the actual execution of any electronic surveillance court orders and will not have any dir…

Reliance Internet Hacked By Anonymous India

Image
This news might come as a shock to many reliance users. Anonymous India Compromised intranet of Reliance Broadband. It seems that they hacked into the admin panel for the filtering server. when anyone try to open a website, say i opened twitter.com, i will be redirected to the defaced page of Anonymous India.
Below is the message on their defacement page.
Anonymous REVENGE / WE OWN YOU
Told you not to mess with free speech and lesser with Anonymous

Government of India, you know what you did wrong. you caused out twitter account to be blocked now we will show you what anonymous is capable of doing.
———————————————-
We give you 24Hours at maximum to give our twitter account back and apologize
Give @OpIndia_Revenge BACK
———————————————–
IF NOT
We will unleash hell and shiver on you
Greeting government of India, you were bad really bad. One of the worst governments the world has. Yet we tried our best not to go too tough on you, and then you decided to cross over us, bad guys bad idea.
We tried to…

Robots that can Respond to Human Gestures

Image
New intelligent algorithms could help robots to quickly recognize and respond to human gestures. Researchers at A*STAR Institute for Infocomm Research in Singapore have created a computer program which recognizes human gestures quickly and accurately, and requires very little training.Many works of science fiction have imagined robots that could interact directly with people to provide entertainment, services or even health care. Robotics is now at a stage where some of these ideas can be realized, but it remains difficult to make robots easy to operate. One option is to train robots to recognize and respond to human gestures. In practice, however, this is difficult because a simple gesture such as waving a hand may appear very different between different people. Designers must develop intelligent computer algorithms that can be 'trained' to identify general patterns of motion and relate them correctly to individual commands. Now, Rui Yan and co-workers at the A*STAR Institute f…

Break Google Chrome in six steps

Image
Browsers are a really nice target for attackers of all stripes and skill levels. But, unless you're a savant or have just landed here from the future, you may want to take a pass on going after Google Chrome, judging by the insane level of effort and skill that an anonymous security researcher had to deploy in order to compromise Chrome during the company's Pwnium contest in March.


The researcher who received one of two $60,000 rewards handed out by Google for full sandbox escapes and compromises of Chrome during the contest used the alias Pinkie Pie. At the time that his accomplishment was announced during the CanSecWest conference in March, Google officials did not specify exactly how the researcher had been able to break Chrome's many layers of security, but just said that he had used multiple bugs to do it.


Now, Google security researchers have revealed the method and techniques that Pinkie Pie used, and if anything, the whole story is even more impressive than observers…

285 Pakistani Websites Defaced By Indian Hackers

Image
In what has been going on for over 12months strong now yet another 285 Pakistani websites have been breached and left with a new index page.

The attack comes from two Indian hackers using the handles “COde InjectOr And YasH” and the defacements feature a small but firm message to Pakistani hackers who have been attacking Indian based websites.


This Is Not A Dream Or A Lie , This Is The Fuckin’ Reality Kids# St0p Defacing Our Indian D0mains Else You Gonna See This Deface On Every PK Server …!!

At time of publishing all checked sites were still defaced. http://123mobiles.info/ http://accasupport.com/ http://accedeint.com/ http://adamjeekkpipes.com/ http://accountingforum.org/ http://adlink.com.pk/ http://aespak.org/ http://agocltd.com/ http://ajwaamakkah.com/ http://akberia.org/ http://akberiafoundation.org/ http://alawal.com.pk/ http://alhonain.com/ http://alhujat.org/ http://alinatextilesourcing.com/ http://anasimtiaz.com/ http://angelsproducts.com/ http://apnahujra.com/ http://apnakh…

Anonymous Attacks on U.S. Department of Justice

Image
In what was billed as "Monday Mail Mayhem," the hacktivist group Anonymous released a 1.7-GB archive that it's characterizing as "data that used to belong to the United States Bureau of Justice, until now."
"Within the booty you may find lots of shiny things such as internal emails, and the entire database dump," according to a statement released by the group. "We Lulzed as they took the website down after being owned, clearly showing they were scared of what inevitably happened." That statement was included with a BitTorrent file (named 1.7GB_leaked_from_the_Bureau_of_Justice) uploaded Monday to the Pirate Bay by "AnonymousLeaks," although multiple downloaders Tuesday complained that the Torrent download was stuck at the 94%-completion point. Why "dox"--release purloined data from--the Bureau of Justice Statistics? "We are releasing data to spread information, to allow the people to be heard, and to know the corrupt…

NASA hacked by Iranian students

Image
There's still no official response from NASA officials after a group of Iranian student programmers calling themselves Cyber Warriors Team claimed to have swiped records for thousands of NASA researchers by compromising an agency site's SSL certificate.
In a May 16 statement posted on Pastebin, the group claimed (in poorly constructed English) to have exploited a vulnerability in a login system to gain administrative rights. "Our main work and we target Is in use. Our target was not Internet sabotage. Our Target was Do ‘MAN IN THE MIDDLE’ attack (with using Confirmation obtained) and also Clear the track after each connection in the network For Hide and Disclosing my presence in Two-way communication between. But the problem still exists And its use isn't Hard For We (CW.T)." NASA has come under federal scrutiny since admitting earlier this year that it's suffered more than 5,400 cyberattacks between 2010 and 2011. At the time of the disclosure, the agency'…

Anonymous attack on Indian Government Continues

Image
Hacktivist grop Anonymous continued its attacks on the Indian government and creative industries at the weekend by taking out the web sites of the national CERT and the country’s President in retaliation for widespread blocks on video and file sharing sites.
The group’s @opindia_revenge Twitter account documented the latest attacks, which also appeared to take offline the web site of film company and broadcaster Reliance Big Entertainment, and government portal india.gov.in.
All are now back online, having apparently been struck by a DDoS attack on Saturday or Sunday. In a more unusual attack, the group also defaced the web site of an apparently innocent company – ABC Krishi Equipments – which makes agricultural machinery, in an apparent warning to the government.
“Government wouldn't want this to happen on their website ryt? They shud know we are still watching,” the group tweeted.
The attacks were first heralded over a week ago in a YouTube message from the hacktivist group whi…

Smash servers with Hulk: New DDOS Tool

Image
HULK is a web server denial of service tool written for research purposes. It is designed to generate volumes of unique and obfuscated traffic at a webserver, bypassing caching engines and therefore hitting the server's direct resource pool.
For the aspiring attacker or pen tester, there is no shortage of attack tools, scripts, crimeware kits and exploits available online. But, the Internet being what it is, there's always room for one more. Enter HULK, a new DDoS tool that arrives just in time to coincide with the release of some movie involving the actual Hulk and other CGI-ified mediocre-heroes.


The HULK (HTTP Unbearable Load King) DDoS tool is somewhat different from others of its ilk in that it doesn't simply hammer a server with a massive load of TCP SYN requests or other predictable packets. Instead, HULK generates numerous unique requests designed to prevent server defenses from recognizing a pattern and filtering the attack traffic. The HULK DDoS tool is the work of…

Wikipedia: If you see ads, You are infected

Image
Wikipedia is warning its users that seeing ads on its website usually means your computer is infected with some type of malware. Most of the time, this means a rogue browser add-on or extension.

Wikipedia has issued a warning to its millions of visitors. The headline says it all: “If you’re seeing ads on Wikipedia, your computer is probably infected with malware.” The free encyclopaedia gives three examples of how ads can get onto the site, but only one involves malware. First thing’s first: get yourself a solid antivirus solution like Microsoft Security Essentials or Malwarebytes and start scanning. If your antivirus solution doesn’t find anything, the second way ads get onto Wikipedia is via browser add-ons and extensions. One example is a Google Chrome extension called “I want this.” To remove it, or any other such extension, open the options menu via the wrench icon on the top right, click on Settings, open the Extensions panel, and click the Remove button next to it. The third way…

Apple iCloud new target for Hackers

Image
Some iCloud registrants are beginning to notice spam email in their Sent folders, despite having nothing to do with the unsolicited messages ending up in their friends’ inboxes. They believe they’ve been hacked, and they have taken to Apple Support Communities to seek answers.
AppleInsider points out to a couple of small threads on Apple’s forums where several iCloud subscribers are signaling a potential attack on the company’s servers.
"I never use my @me email for anything, and I guarantee someone didn't break into the account by guessing my password (or brute force methods) — it's a pseudoly randomly generated string of 15 numbers, letters (upper and lower case) and symbols (I worked in IT for many years and am perhaps overly zealous about password security, which makes memorization a real pain)," one person wrote.
“I’m worried that Apple's iCloud servers themselves got hacked, as I see there are a few other people on the forums who are reporting that their acc…

Robotic Arms Controlled by People With Paralysis Using Brain Computer Interface

Image
A new study in Nature reports that two people with tetraplegia were able to reach for and grasp objects in three-dimensional space using robotic arms that they controlled directly with brain activity. They used the BrainGate neural interface system, an investigational device currently being studied under an Investigational Device Exemption. One participant used the system to serve herself coffee for the first time since becoming paralyzed nearly 15 years ago. On April 12, 2011, nearly 15 years after she became paralyzed and unable to speak, a woman controlled a robotic arm by thinking about moving her arm and hand to lift a bottle of coffee to her mouth and take a drink. That achievement is one of the advances in brain-computer interfaces, restorative neurotechnology, and assistive robot technology described in the May 17 edition of the journal Nature by the BrainGate2 collaboration of researchers at the Department of Veterans Affairs, Brown University, Massachusetts General Hospital,…

Wikileaks Under Attack

Image
The Pirate Bay is down. Wikileaks is down. Visa was down. Are all these Distributed Denial of Service (DDoS) attacks a coincidence? Right now it’s not clear, but something is definitely happening.

After covering The Pirate Bay Distributed Denial of Service (DDoS) attack and Anonymous’ denial of responsibility for it, I’ve been checking the torrent site’s Facebook Page every so often. The Pirate Bay said it thought it might know who was behind the attack, so I was curious if they would post it today. They haven’t yet, but they did just post this:
Wikileaks.org is also under attack.This sure is the year of the storm…As predicted here: https://thepiratebay.se/blog/204 I checked, and indeed Wikileaks is down for me. The site’s Twitter account sent this message out five hours ago: “WikiLeaks has been under sustained DDOS attacks over the last 72 hours. http://www.wikileaks.org is good, http://wikileaks.org is flooded.” At the time of writing, Down for everyone or just me confirms it: “It’s n…