Jump to content

Acidripp

Active Members
  • Posts

    377
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by Acidripp

  1. Romanii cu studii care vroiau sa munceasca ORICUM erau angajati si plecau pe dincolo! Nu despre ei vorbim, vorbim de toti moldovenii care vor pleca la lucru in constructii, de toti oltenii care vor pleca la lucru cu ziua pe unde or apuca (si nu ma intelegeti gresit, eu sunt o combinatie sinistra de oltean cu moldovean) si la toti tiganii care vor pleca la furat. nici parintii n-au vina daca e s-o luam asa, mai mult as da vina pe mass-media, dar totusi... raspunde-mi sincer: Daca ar fi sa luam 100 de romani (a se citi aia care nu-s nici unguri nici tigani) si luam 100 de rromi si am face o statistica (REALA) cati dintre romani crezi ca au: omorat furat batut talharit violat si cati dintre rromi ???? nu este vorba despre cum a fost crescut sau cum ne invata societatea, e vorba despre faptul ca tiganii sunt tigani, cum spui tu ca la romani e vorba de mentalitatea de a asocia tiganii cu tot ce-i mai rau, asa la tigani e mentalitatea cu sa dam in cap si sa furam cat putem
  2. Privind partea buna, eu ma bucur ca toti tiganii si toate scursurile vor pleca dincolo sa isi caute de furat sau de munca cu ziua, de ras suntem oricum in Europa, asa macar scapam de ei din Romania. ...my 2 cents...
  3. De accord cu tine, dar atunci cum ramane cu cei care doresc sa invete si nu isi permit !? Unele lucruri ar trebui sa fie gratuite si aici ma refer in special la educatie, insa fara a ne limita strict la scoala!
  4. It seems as if those business which bowed down in front of NSA are now facing a backlash. That’s what we can see from several tech giants and business institutions who cooperated with the American National Security Agency (NSA) for its spying and surveillance project PRISM. These companies are now loosing billions of dollars and most importantly the trust of their customer for invading privacy. Bloomberg Law - Document - Louisiana Sheriff's Pension & Relief Fund v. International Business Machines Corporation et al, Docket No. 1:13-cv-08818 (S.D.N.Y. Dec 12, 2013), Court Docket One among those company is multinational technology and consulting corporation IBM, which has been sued and facing a massive lawsuit by its own shareholder for its collaboration with the NSA. The shareholder claims that by cooperating with NSA, IBM has abused federal securities laws to hide its looses. BusinessWeek reports that the shareholder filed a complaint on Thursday in a federal district court in Manhattan where the Louisiana Sheriffs’ Pension and Relief Fund claims IBM defrauded investors by allegedly concealing a decline in hardware sales in China following reports in the Guardian about the NSA program: Spying is not good for business. That’s been the message from many U.S. tech companies and industry groups in recent months following revelations last summer that several companies were cooperating with the National Security Agency over its Prism surveillance program. The industry says it stands to lose tens of billions of dollars as customers in other countries turn to homegrown technology instead. Now one such company, IBM (IBM), is facing a lawsuit over its cooperation with the NSA. IBM was sued yesterday by a shareholder claiming it violated federal securities laws in seeking to hide losses that stemmed from disclosures of its relationship with the NSA. In a complaint filed in federal district court in Manhattan on Thursday, the Louisiana Sheriffs’ Pension and Relief Fund claims IBM defrauded investors by allegedly concealing a decline in hardware sales in China following reports in the Guardian about the NSA program. STORY: IBM Faces a Crisis In the Cloud the complaint states. The plaintiff alleges that IBM lobbied in favor of Cispa, a bill that would allow it to share customers’ personal data, including data from customers in China. IBM’s cooperation with the NSA presented a “material risk” to the company’s sales, especially in China for its Systems and Technology hardware division, the pension fund says in the complaint. STORY: U.S. Tech Giants May Pay the Price, as Europe Seethes Over NSA Snooping IBM reported in the Guardian a 22 percent drop in sales in China compared with the previous quarter as a result of disclosures about its relationship with the NSA last summer, the complaint says. The lawsuit—brought as a class action representing all IBM shareholders who purchased common stock from June 25 to Oct. 16 of this year—is seeking compensatory damages for losses sustained as a result of IBM’s alleged wrongdoing, as well as lawyers’ fees and expenses, and other injunctive relief the court deems appropriate. IBM spokesman Doug Shelton wrote in an e-mail: However, IBM is not the first company to face lawsuit. Just a couple of days ago, a British citizen had sued Microsoft for cooperating with the NSA and providing personal details for PRISM project: A UK citizen has sued Microsoft for leaking Prism private data to the NSA – HackRead – Latest Cyber Crime – Information Security – Hacking News SURSE: IBM Shareholder Sues the Company Over NSA Cooperation - Businessweek IBM Sued by Its Own Shareholder for Cooperating with the NSA – HackRead – Latest Cyber Crime – Information Security – Hacking News
  5. Laptops bought on the internet reportedly being intercepted by NSA for installation of spy malware Recent report by Der Spiegel has revealed that TAO, the elite hacking team of NSA, is secretly intercepting laptops and other computer related accessories that are purchased on the internet, as a means of conducting wiretaps as sophisticated as the thrillers of Hollywood show. This report, based on the internal documents of the signals intelligence agency, indicates that NSA is collaborating with the FBI and CIA to routinely intercept shipping deliveries of the electronic goods and diverting the deliveries to their own secret workshops, there bugs are being implanted in the items, by a method known as interdiction, such that malware is being loaded onto the electronics, or malicious hardware is being installed, to in order for the us intelligence agencies to gain remote access. Although the scope of the program, or the target of NSA for using such wiretaps has not been mentioned by the Der Spiegel report, it gives a distinctive look at NSA’s efforts of collaboration with the wider intelligence body, to get access to equipment of communication. One such product that is used for compromising target electronic items, a hardware implant, has the codename ‘Cottonmouth’, which has been available since the year 2009, to provide remote access to the bugged machine. The Cottonmouth and other such inception apparatuses, have been described by Der Spiegel as mail-order spy catalogue, which, according to their report, offers a wormhole to prominent hardware and software by Huawei, Samsung, Maxtor, Western Digital, Seagate, Dell, Juniper Networks, Cisco and other such rated technology developers. American companies comprise a largesection of the target list. The error reports from operating system by Microsoft Windows can be exploited by NSA, by the interception of error reports and determination of the problem in the compromised computer, thereby getting the opportunity to attack it with malware like Trojans, as per the reports. To respond to the report, John Stewart, the senior vice-president of Cisco, wrote, that anything having a potential impact on the integrity of their products or the networks of their customers, was their primary concern. It also mentioned that it has no collaboration with the government in activities that will allow exploitation of their products. Responses to the report have also been received from other US companies. Microsoft called the company an advanced threat of persistent kind, for secretly collecting private data of users, in Yahoo’s and Google’s internal networks. The report of Der Spiegel, giving a broad look at the operations of TAO, highlights how NSA cooperates with other intelligence bodies for conducting raids that make Hollywood action thrillers look like reality. Contrary to the nature of most of the operations of NSA allowing remote access to its targets, TAO’s activities need physical access to the targets, to gain which, NSA is reportedly collaboration with the FBI and CIA in case of sensitive missions. NSA agents, reportedly, have to fly on FBI for the purpose of planting bugs, to help them reach target on time, and disappear without being detected, even if there is just half an hour of work. The report has resulted in the NSA being pressurized by privacy advocates, federal courts, public and the Congress, over the application of spying programs, which allegedly include telephone surveillance of the US citizens in bulk, as they are violative of constitutional rights to privacy and protection against unreasonable searches. These were first revealed by Edward Snowden, whose documents also reported the methods of surveillance operations, like the tapping of phones of foreign leaders. Sursa: Laptops bought on the internet reportedly being intercepted by NSA for installation of spy malware - Hackers News Bulletin
  6. The list of top hackers of the year, 2013, comprises groups sponsored by the state, as well as the members of Anonymous, along with Blackhole cybercrime gang. The current question is about who should make it to the top of the global list of hackers for the year. If the activities of the hackers in the recent past are to be followed, it can be expected that the hackers in 2013 will be prominently visible. In 2011, the hacks of 50 days by LulzSec combined technical acumen with acuity in PR. In the year 2012, their leaders were arrested, along with many of the others who participated in the high-stature Anonymous activities, owing to the collaborated efforts of the FBI and its overseas counterparts. Near the close of 2013, some of the most notorious domestic hackers who had political targets, ended up in jail or were on parole, having served their time after being arrested in Britain. However, it is a challenge to police the hacking activities of countries that are non-allies, since the Department of Justice is unable to arrest or extradite international hackers in certain countries, or even identify the suspects who are operating there. Many campaigns driven by crimeware toolkit, use bots for stealing private financial details which are used to transfer millions of dollars from banks, and these are operated from Russia or satellites of former Soviet, but they have no extradition treaty with the US. It is tough to stop the foreign attackers bearing political grudge against the US. In 2012, some foreign attackers were supported by the Iranian government, as per the allegations of the government officials of the US, launched a series of DDoS (Distributed Denial-or-Service) attacks, called Operation Ababil, against the banks in the US. These attacks rolled into their forth surge in the year 2013. Thus, in the history of online attacks, Operation Ababil became the series that ran the longest. Although the target and the timing of the attack were uncovered in advance, the banks often found it difficult to curb the attacks. In 2013, the officials of the United States have also hiked their indictment for the Chinese hackers sponsored by the state. The US had long suspected China of hacking their government and business organizations. However, evidence was published by a security firm called Mandiant that an elite PLA military hacking group was linked with the pilferage of US businesses’ intellectual property, and secrets of the US military. Hacking is loosely categorized as black, white and grey hats. Black hat hackers are those who hack at others’ expense for personal gain. White hat hackers are ethical hackers who pursue security research on computers. Grey hat hackers lie somewhere in the middle of these two extreme groups. It can well be understood that bank DDoS attacks, Crimeware toolkits, APT attacks by the Chinese and other similar attacks were black hat hack-attacks. However, the number of grey hat hacks increased since the middle of 2013, after contractor of National Security Agency, Edward Snowden, ran away to China to leak secret NSA documents worth $1.7 million. The disclosures in those documents have resulted in uncovering the huge online surveillance operation of the US. It has been learnt that NSA has hacked into thousands of personal computers abroad, and conducted direct hacks into the database of some of the biggest technology developers, or the internet backbone communications, in order to gain access to communications, both domestic and foreign. The big question that looms now is who the bad guys in this scenario are, and who are the good ones. Sursa: 9 of the Most Scandalous Hackers of the year 2013 - Hackers News Bulletin
  7. Hacker threatens to sell data of 3.7 Million Israeli Bank Customers, demands extortion money in Bitcoin Data breaches and security incidents are a constant in the headlines these days. Hackers and cyber criminals are motivated by status or money and finding new innovative and more creative attacks to achieve this. One of them are, Digital Bank robbery - where the thieves didn't need masks and guns to pull off the job, all they need are - Hacking Skills, a computer and the Internet. Another way is Cyber extortion - threat of attack against an enterprise or a bank, coupled with a demand for money to avert or stop the attack. According to Haaretz news, A Hacker - who is the operator of a biggest botnet malware network in the Israel, has threatens 3 major Israeli banks, i.e. Israel Discount Bank, Bank Yahav and the First International Bank of Israel. Banks database, network and websites were not breached in this case, rather the hacker claimed that he holds a huge financial trojan botnet network in Israel that have already infected millions of systems across the nation and collected a massive dump of stolen personal information, passwords, banking information and credit card numbers of 3.7 Million users. The hacker has demanded the payoff in Bitcoin, a untraceable virtual currency, perfect for blackmailers and cyber criminals. Bitcoin is not backed by any central bank or government and can be transferred "peer to peer" between any two people anywhere. Banks declined to comment on the report and immediately reported the threat to the Israel Police. According to the source, some of them do not see the threat as serious. Bank of Israel held a meeting on Tuesday on the issue, we will update you soon about their next step with a new article. Cyber attacks are becoming more and more advanced and sophisticated, more or less any company in the world is on the list of targets to rob. You should keep updating your knowledge about the cyber world to Stay Safe from all threats. Sursa: Hacker threatens to sell data of 3.7 Million Israeli Bank Customers, demands extortion money in Bitcoin
  8. Promises of easy money should be taken with a grain of salt – especially when they come with a request to download a mobile app. Case in point is Bazuc, an application that was available earlier this month in the Google Play Store. It has since been taken down. But at one point, it may have been downloaded as many as 50,000 times, according to Lookout Mobile Security. blogged Marc Rogers, a researcher with Lookout. On the surface, it doesn't sound like a bad deal. Bazuc, Rogers explained, is actually a pair of applications: 'Bazuc Earn Money' and 'Bazuc Free International SMS'. Bazuc Earn Money offers to pay $.001 per message, and tells the user they may earn as much as $30 a month. However to earn that $30, 30,000 messages would have to be sent. he blogged. With Bazuc Free International SMS, when a person tries to send a message to an international number, the app opens the default email, and puts the recipient’s phone number appended with @buzac.com in the 'to' field. Afterwards, the user is invited to type a message into the email. Rogers continued. Lookout investigated the SMS network and found a number of players involved both wittingly and unwittingly – bulk messaging providers, phishers, spammers, banks and smartphone owners. Despite the app author's claim that the app is used to offer free messaging to users, out of 200 messages Lookout analyzed, they only saw human-to-human messages three times. The majority of the messages appear to be machine-to-machine, with 40 percent being service or transaction alerts and 30 percent PIN code and password messages. Eight percent appear to be advertising spam. Rogers wrote. Several messages were identified to have come from well-known American and African banks. While at first glance the messages appear to be phishing messages, Lookout suspects they may be legitimate. The banks it seems signed up with the bulk SMS messaging network to send customer transaction information, Rogers explained. he blogged. he continued. he added.Sursa: Suspicious Mobile App Sends Bulk Messages | SecurityWeek.Com
  9. Based on internal NSA documents, Der Spiegel reveals that the spy agency planted backdoors to access computers, hard drives, routers, and other devices from companies such as Cisco, Dell, Western Digital, Seagate, Maxtor and Samsung. A new report from Der Spiegel, based on internal National Security Agency documents, reveals more details about how the spy agency gains access to computers and other electronic devices to plant backdoors and other spyware. The Office of Tailored Access Operations, or TAO, is described as a "squad of digital plumbers" that deals with hard targets -- systems that are not easy to infiltrate. TAO has reportedly been responsible for accessing the protected networks of heads of state worldwide, works with the CIA and FBI to undertake "sensitive missions," and has penetrated the security of undersea fiber-optic cables. TAO also intercepts deliveries of electronic equipment to plant spyware to gain remote access to the systems once they are delivered and installed. Der Spiegel: Inside TAO -Documents Reveal Top NSA Hacking Unit Der Spiegel: Shopping for Spy Gear - Catalog Advertises NSA Toolbox According to the report, the NSA has planted backdoors to access computers, hard drives, routers, and other devices from companies such as Cisco, Dell, Western Digital, Seagate, Maxtor, Samsung, and Huawei. The report describes a 50-page product catalog of tools and techniques that an NSA division called ANT, which stands for Advanced or Access Network Technology, uses to gain access to devices. This follows a report that the security firm RSA intentionally allowed the NSA to create a backdoor into its encryption tokens. "For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them," the report said. The ANT department prefers targeting the BIOS, code on a chip on the motherboard that runs when the machine starts up. The spyware infiltration is largely invisible to other security programs and can persist if a machine is wiped and a new operating system is installed. With the exception of Dell, the companies cited in the report and contacted by Der Spiegel claimed they had no knowledge of any NSA backdoors into their equipment. In a blog post Sunday, a Cisco spokesperson wrote: The NSA declined to comment on the report but said the TAO was key for national defense. "Tailored Access Operations (TAO) is a unique national asset that is on the front lines of enabling NSA to defend the nation and its allies," the agency said in a statement. "We won't discuss specific allegations regarding TAO's mission, but its work is centered on computer network exploitation in support of foreign intelligence collection." The end does not appear to be in sight for the revelations from the documents obtained by Edward Snowden, according to Glenn Greenwald, the journalist who first collaborated with Snowden to publish the material. In a speech delivered by video to the Chaos Communication Congress (CCC) in Hamburg on Friday, he said, "There are a lot more stories to come, a lot more documents that will be covered. It's important that we understand what it is we're publishing, so what we say about them is accurate." This story has been updated to include Cisco's statement. Sursa: NSA reportedly planted spyware on electronics equipment | Security & Privacy - CNET News
  10. Nu stiam unde sa postez asta, asa ca am postat-o aici Securecenter.ro (despregazduire.ro) este singurul registrar de domenii autorizat oficial de RoTLD sa vanda domenii.ro cu plata anuala si au si cele mai bune preturi pentru plata pe viata (10 ani) asa ca, eu am destul de multe domenii cumparate de la ei. Domeniul c.store.ro este unul din ele, care am decis sa-l las sa expire, toate bune si frumoase, primesc mai multe notificari de la ei si decid sa deschid azi una din ele... surpriza! Pe langa datele de facturare, in mailul trimis de ei imi apare si PAROLA mea in PLAIN TEXT... frumos bai baieti, frumos... acum sa ma astept ca intr-o zi toate cele 12 domenii ale mele sa pointeze catre pornhubcom !? RUSINE! fericit cel ce gaseste SQLi in site-urile lor...
  11. la Udemy cursurile misto is pe bani... huoooooo! Knowledge should be FREE!
  12. serios !? la astia in state nu s-a aflat vestea ca le sunt ascultate telefoanele ? alea n-or avea microfon !? just saying...
  13. @Tex de mine vorbeste... Pot sa iti ofer un server dedicat cu 32GB RAM, 2x intel xeon quad-core@2.66Ghz, 2x250Gb HDD (posibilitate RAiD hardware) la fabuloasa suma de 7 euro/GB (33 de adrese IPv4 incluse + 1000 adrese IPv6) adica 224 euro/luna (TVA incl.) sau, daca platesti in avans pe 12 luni, iti las la 6 euro/GB adica 192 euro/luna - respectiv 2304 euro/an P.S.= conexiune 1Gbps, protectie anti-DDoS, uptime garantat 100% - serverele sunt gazduite in propriul datacenter din Timisoara L.E.: daca vrei pretul de 5 euro/GB, ramane sa semnam contract pe minim 24 de luni, cu plata in avans pe primele 12
  14. The surveillance agency says it has spent tens of millions of dollars to remove computers the former NSA contractor had access to, including the cables that connected them to the network. Officials at the National Security Agency are divided over whether to offer an amnesty deal to espionage suspect Edward Snowden, who is said to have cost the agency tens of millions of dollars to ensure his presence was removed from its networks. The former NSA contractor, who has been granted asylum in Russia, is said to have stolen 1.7 million classified documents from government computers before fleeing the US in June. However, law enforcement officials concede they may never know the size of his haul. "They've spent hundreds and hundreds of man-hours trying to reconstruct everything he has gotten, and they still don't know all of what he took," a senior administration official told The New York Times. "I know that seems crazy, but everything with this is crazy." Whether return of that cache is worth a deal with Snowden is a contentious subject within the NSA. Rick Ledgett, who runs the NSA task force assessing the damage on the Snowden leaks, told CBS' news program "60 Minutes" during a segment aired Sunday (see below) that an amnesty deal is "worth having a conversation about. I would need assurances that the remainder of the data could be secured, and my bar for those assurances would be very high. It would be more than just an assertion on his part." (Disclosure: CBS is the parent company of CNET.) Ledgett concedes that opinion is "not unanimous" within the agency. NSA chief Gen. Keith Alexander compares the amnesty suggestion to a hostage-taker asking for amnesty after killing 10 of 50 hostages. "I think people have to be held accountable for their actions," Alexander said. Alexander, who has served as director of the NSA since 2005 and is expected to step down next year, said he offered his resignation as a result of the leak. "I offered to resign," Alexander said. "And they said, 'We don't see a reason that you should resign. We haven't found anybody there doing anything wrong.'" During the task force's damage assessment, the NSA discovered Snowden has some unusual habits, especially when working at home. "He would work on the computer with a hood that covered the computer screen and covered his head and shoulders, so that he could work and his girlfriend couldn't see what he was doing," Ledgett said. One of the task force's fears was that Snowden might have left a bug or virus behind on the NSA's network. So the agency removed all the computers he had access to on the agency's classified and unclassified networks -- including the cables that connected them -- at a cost Ledgett estimated in the tens of millions of dollars. While the NSA has come under considerable scrutiny and criticism in the wake of Snowden's leaks, Alexander said the agency's surveillance activities are necessary to the nation's defense. In addition to tracking terrorist activities, the NSA has a team monitoring the threat of cyberattack on the nation's critical infrastructure, including the financial system. "I believe that a foreign nation could impact and destroy major portions of our financial system," Alexander said. One threat highlighted during the "60 Minutes" visit was dubbed the BIOS Plot, a virus that would attack the firmware that activates the hardware and operating system. Debora Plunkett, who directs cyber defense for the NSA, warns that such an attack would effectively brick computers. "Think about the impact of that across the entire globe," Plunkett said. "It could literally take down the U.S. economy." VIDEO: Inside the NSA - 60 Minutes Videos - CBS News Intr-un alt articol, din 13.12.2013 se spunea asa: Strike a deal with Snowden? NSA leak task force leader says a deal with Edward Snowden is worth discussing, but the general who heads the NSA is against any deal. The NSA officer in charge of assessing the damage done by the Edward Snowden leaks says that, under the right conditions, he would consider a deal with the fugitive in return for the documents he has not leaked yet. But the Army general who heads the NSA says he would not consider any deal for Snowden, who's been charged with espionage for stealing maybe the most potentially damaging trove of national secrets in US history. The NSA granted the rare interviews and allowed "60 Minutes" cameras into the agency' secure Maryland complex to explain what it does and what it says it doesn't do -- spy on Americans, a misconception it says the leaks have created. During the course of the report, the agency also reveals it discovered a secret computer weapon and discusses it for the first time with John Miller for the report, to be broadcast on "60 Minutes" Sunday, December 15 at 7 p.m. ET/PT. Snowden has been given asylum in Russia. The former contractor for the NSA is said to have stolen 1.7 million classified documents. "I wouldn't dispute that [figure]," says Rick Ledgett, the NSA officer who heads the task force investigating the leak and subsequent damage. So far, Snowden has leaked thousands of documents, revealing more embarrassing than damaging information. He has said he would come back if granted amnesty. Miller asks Ledgett if he would make a deal. "My personal view is, yes, it's worth having a conversation about," he says, but only if he were absolutely assured the remaining documents are secured. "My bar for those assurances would be very high," he tells Miller, "..more than just an assertion on his part." It's a view Ledgett says others at the NSA share, but not everyone agrees with, including his boss. "This is analogous to a hostage taker taking 50 people hostage, shooting 10 and then say 'You give me full amnesty and I'll let the other 40 go,'" Gen. Keith Alexander, the Army officer in charge of the NSA. The general believes Snowden should be held accountable and a deal would only set a dangerous precedent for anyone else who would abscond with classified information. Gen. Alexander says that he offered his resignation in the face of this leak, but says his superiors rejected his offer, telling him it could have happened to anyone in the intelligence community. Miller also speaks to NSA Information Assurance Director Debora Plunkett, who reveals the discovery by one of her 3,000 analysts of a secret computer weapon that could destroy any computer it infected. She would not name its origin, but "60 Minutes" has learned it was engineered in China. The NSA allowed Plunkett to talk about it for the first time in detail. She says it was called the Bios Plot, for the foundational component, the Bios, that all computers have that performs basic functions like turning on the operating system and activating the hardware. The attack on the Bios would have been disguised as a request for a software update. If the user clicked on it, the virus would turn their computer into "a brick," says Plunkett. "One of our analysts actually saw that the nation-state had the intention to develop and deliver, to actually use this capability to destroy computers," Plunkett says. If successful, says Plunket, "Think about the impact of that across the entire globe. It could literally take down the U.S. economy," she tells Miller. The NSA quietly worked with computer manufacturers to eliminate this vulnerability. VIDEO: A deal for Snowden? - 60 Minutes Videos - CBS News Sursa ambelor articole: cnet.com
  15. eu am asteptat din Mai pana in Septembrie pentru o despagubire de la ei, dauna totala cica pe o motocicleta cumparata cu acte cu 2000 de euro cu doar 5 zile inainte de accident, am primit 500 euro! asta dupa telefoane la CSA si amenintari cu presa, alea, alea.... deci, cu parere de rau, ti-ai supt-o
  16. rog un admin, daca poate, sa imi editeze titlul multumesc
  17. One of the world’s most prolific cybercriminals was sentenced today to serve 18 years in prison for his role in co-founding the notorious website CarderPlanet. At the time of his arrest, Vega possessed more than half a million stolen credit card numbers. Acting Assistant Attorney General Mythili Raman of the Justice Department’s Criminal Division, U.S. Attorney Loretta E. Lynch of the Eastern District of New York, and Special Agent in Charge Steven G. Hughes of the U.S. Secret Service’s New York Field Office made the announcement after sentencing by Senior U.S. District Judge Allyne R. Ross of the Eastern District of New York. Roman Vega, 49, a Ukrainian national, pleaded guilty in 2009 to conspiracies to commit money laundering and access device fraud. According to court documents, Vega – who at various times was also known as “Boa,” “Roman Stepanenko” and “Randy Riolta” – conspired with others to steal large volumes of credit card information through hacking and other sophisticated means, and then sold that stolen information to others, who ultimately used the information to purchase merchandise and services. Vega founded two different online marketplaces for this stolen credit card information. “Today’s sentence is a significant milestone in our ongoing effort to aggressively target and dismantle global cybercrime organizations that operate from every corner of the world,” said Acting Assistant Attorney General Raman. “Vega helped create one of the largest and most sophisticated credit card fraud sites in the cybercrime underworld – a distinction that has earned him the substantial sentence he received today.” “The defendant and his group of cybercriminals emulated the mafia in organizing their criminal operations,” said U.S. Attorney Lynch. “Now, the defendant shares the same fate as so many mafia bosses – a long term of imprisonment. This investigation has spanned the globe and should send the unmistakable message that when it comes to dismantling global cybercrime organizations, we will not be held back by distance or complexity.” “The Secret Service is pleased to have participated in this multi-agency criminal investigation that lead to the arrest of Roman Vega also known as ‘Boa’,” said Secret Service Special Agent in Charge Hughes. “This case demonstrates by constricting this criminal enterprise, there is no such thing as anonymity in the cyber world. The Secret Service continues to seek new and innovative ways to combat emerging cyber threats. Our success in this case and other similar investigations is a result of our close work with our network law enforcement partners.” In the late 1990s, Vega founded the Boa Factory, one of the earliest websites to provide a forum for sellers of stolen credit card information to meet potential buyers. In the early 2000s, he co-founded and became a high-ranking administrator of a second criminal website, CarderPlanet, which became one of the first and busiest online marketplaces for the sale of stolen financial information, computer hacking services and money laundering. At its height, CarderPlanet had more than 6,000 members and had a hierarchical leadership structure that borrowed its leadership titles from La Cosa Nostra. For example, CarderPlanet was headed by a “Godfather.” Immediately below the Godfather were a number of “Dons,” including the defendant, who used the name “Boa” when serving in this role. Three levels below the Dons was the “Consigliere,” who was an advisor. Vega, using the name “RioRita,” also served as the Consigliere. CarderPlanet became a premier online criminal bazaar in significant part as a result of Vega’s leadership. Most notably, the defendant helped institute a quality control system for sales. If a cyberthief wanted to sell stolen credit card information on CarderPlanet, the information was subjected to a vetting process overseen by a manager to ensure that buyers obtained usable stolen data. In addition, the website used e-currencies, such as WebMoney, to provide the participants with security and a layer of anonymity. Vega and his co-conspirators thus created an efficient and trustworthy online marketplace for the buyers and sellers of stolen financial information not unlike legitimate e-commerce sites. Vega also sold stolen data on the marketplaces he founded and managed. He directed cells of cybercriminals located throughout the globe who hacked into financial institutions to steal credit card and other financial information that would in turn be sold on carding forums, including CarderPlanet. Vega’s criminal career was cut short when he was arrested in Cyprus in February 2003 and extradited to the Northern District of California for prosecution. In November 2007, Vega was transferred to the Eastern District of New York following his indictment on the instant charges, and he pleaded guilty in January 2009. Vega has been incarcerated continuously since 2003. The case was investigated by the U.S. Secret Service, with assistance from the U.S. Postal Inspection Service. The case was prosecuted by Senior Counsel Thomas Dukes of the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorney William P. Campos of the Eastern District of New York. Sursa: USDOJ: Ukrainian National Who Co-founded Cybercrime Marketplace Sentenced to 18 Years in Prison
  18. The company says it has a new system in place to protect Gmail users from security threats in message images Google will now display images by default in Gmail because it says it has developed a system that protects message recipients from potentially dangerous photos and graphics. With the new system, Google will display Gmail message images from its proxy servers, instead of from the servers where the emails originate. In this way, Google transcodes the images so that senders then can't use them to retrieve recipients' IP address and location, nor to set or read browser cookies. "Your messages are more safe and secure, your images are checked for known viruses or malware, and you'll never have to press that pesky 'display images below' link again," wrote John Rae-Grant, a Google product manager, in a blog post. If Gmail suspects a message or sender is malicious, it won't display those images, reverting instead to asking users whether they want to see the images. Users who want to continue authorizing the display of images on a message-by-message basis can do so by checking the "Ask before displaying external images" option in the settings menu. It's also possible for users to configure Gmail to always show or block images in messages originating from specific senders. Google will begin rolling out this feature Thursday on the version of Gmail for desktop browsers. Gmail mobile apps will get it early next year. It remains to be seen whether Gmail critics will object to this new feature over privacy concerns, given that Google will apparently be interacting with message images more than it has in the past, including delivering them from its image proxy servers. Google didn't immediately respond to a request for comment. Sursa: Google will no longer suppress images in Gmail messages | IT News
  19. A simple e-mail delivered the virus allowing Chinese hackers to access computers during the international summit, says security firm FireEye. Hackers in China took aim at five European ministries in the lead-up to the G20 summit in September, according to a new report. Research by security firm FireEye reveals that Chinese hackers sent e-mails to staff of the foreign ministries with files laced with malware, reported Reuters on Tuesday. When recipients opened those files, malicious code was loaded on to their computers, according to the report. The hackers where then able to move across affected machines and perform recon before the international summit, said FireEye. Just before the two-day G20 summit kicked off in St. Petersburg, Russia, the hackers moved to another server, said FireEye. The security firm lost track of the hackers when they moved servers, but it believes the move allowed the hackers to steal data as the summit was being held, according to the report. FireEye declined to specify the nations of officials who were hacked, but said they were all members of the European Union, reported Reuters. While FireEye said it was confident the hackers where from China, it did not find evidence that linked the hackers to the Chinese government, according to the report. Not surprisingly, the Chinese government has distanced itself from any claim that it might have hacked foreign governments for data. Reports have swirled for years that hackers are thriving in China. In many cases, those groups that have allegedly hacked into sensitive networks appear to have no tie to the Chinese government. Whether that's actually true, however, is unknown. One other interesting note from the Reuters report: FireEye detected no attempts by the hackers to target Americas, deciding instead to attack Europeans. sursa: http://news.cnet.com/8301-1009_3-57615090-83/chinese-hackers-targeted-european-diplomats-at-g20/
  20. Both good bots and bad bots can be found lurking online -- looking to either drive traffic or wreak havoc. With much trepidation, I must report that there is a pretty good chance that half the visitors to this story will not be human. According to a recent study by Incapsula, more than 61 percent of all Web traffic is now generated by bots, a 21 percent increase over 2012. Much of this increase is due to "good bots," certified agents such as search engines and Web performance tools. These friendly bots saw their proportion of traffic increase from 20 percent to 31 percent. Incapsula believes that the growth of good bot traffic comes from increased activity of existing bots, as well as new online services, like search engine optimization. "For instance, we see newly established SEO oriented services that crawl a site at a rate of 30-50 daily visits or more," Incapsula wrote in a blog post. But, along with the good comes the bad. That other 30 percent of bot traffic is from malicious bots, including scrapers, hacking tools, spammers, and impersonators. However, malicious bot traffic hasn't increased much over 2012 and spam bot activity has actually decreased from 2 percent to 0.5 percent. Of the malicious bots, the "other impersonators" category has increased the most -- by 8 percent. According to Incapsula, this group of unclassified bots is in the higher-tier of bot hierarchy -- they have hostile intentions and are most likely why there's been a noted increase in cyberattacks over the last year. "The common denominator for this group is that all of its members are trying to assume someone else's identity," Incapsula wrote. "For example, some of these bots use browser user-agents while others try to pass themselves as search engine bots or agents of other legitimate services. The goal is always the same -- to infiltrate their way through the website's security measures." Here's to hoping the bot visitors that do come to this story are of the benign kind. Sursa: cnet.com // edit: Source: http://news.cnet.com/8301-1009_3-57615501-83/bots-now-running-the-internet-with-61-percent-of-web-traffic/
  21. What kind of data is your cell phone company collecting? Malte Spitz wasn't too worried when he asked his operator in Germany to share information stored about him. Multiple unanswered requests and a lawsuit later, Spitz received 35,830 lines of code -- a detailed, nearly minute-by-minute account of half a year of his life.
  22. Vindem de un an si ceva, acum doar site-ul mai trebuie pus la punct Intrebarea cu protectia DDoS n-am prea inteles-o, dar am sa incerc sa-ti raspund: -protectia nu prea are limita ca si trafic (am luat inclusiv DDoS cu pana la 8Gb/s) -protectia se face activ (filtram pana la 65.000.000 de conexiuni simultane) asta in plus fata de ce ne filtreaza providerul -protectia se face cu drop la conexiune direct din router-ul BGP pe baza de blacklist ip cu ip-urile ce ne-au atacat pana acum si pe baza de restrictie geografica (accesul din tari precum China, Afganistan, toata Africa, Iran, Irak, etc. este restrictionat)
  23. ON: Bine te-am gasit! OFF: Fuuuuugi!!!!!!!
  24. incearca sa intrii cu F8 in safe-mode sa vezi daca mai face, apoi, daca tot continua, incearca sa bootezi un live-cd, daca se intampla la fel, cel mai probabil e chipsetul de la placa de baza, inainte sa o schimbi, incearca sa-i pui un radiator mai mare cu ventilator - preferabil de la o placa video mai veche si nu uita de pasta termica
×
×
  • Create New...