Tuesday 27 January 2015

10 Best Hackers The World Has Ever Known




27.1k
Shutterstock


In the world of web where we get the global connectivity, it is far easier to break into someone’s personal zone. By personal, we do not just mean the social media. The world wide web which has become the hub of storing and restoring information, considered to be the safest vault, is a mere toy in the hands of a few computer geniuses. Hackers, Black Hat Hackers, villains, crackers, cyber-criminals, cyber pirates as they are well-known, throw a malicious software or virus at a system to gain the access to the desired information. Piqued by curiosity, they may perhaps break into your system too. Here are top 10 hackers or the whiz kids who put the world in awe with their dexterity.

1. Gary McKinnon

Gary McKinnon must’ve been a curious, restless child, for to gain information on UFOs, he thought it better to get a direct access into the channels of NASA. He infiltrated 97 US military and NASA computers, by installing virus and deleting a few files. All the efforts to satisfy his curiosity, but, alas, curiosity killed the cat. It was soon found that McKinnon was guilty of having hacked the military and NASA websites from his girlfriend’s aunt’s house in London. While entering and deleting the files from these websites wasn’t enough, McKinnon thought of shaming the security forces by putting out a notice on the website that said, “Your security is crap.” Well, looks like McKinnon was something, if he could shut down the US Military’s Washington Network of about 2000 computers for 24 hours, making the hack, the biggest military computer hack of all time!

2. LulzSec

LulzSec or Lulz Security, a high profile, Black Hat hacker group, gained credentials for hacking into Sony, News International, CIA, FBI, Scotland Yard, and several noteworthy accounts. So notorious was the group that when it hacked into News Corporations account, they put across a false report of Rupert Murdoch having passed away. While the group claims to have retired from their vile duties, the motto of the group, “Laughing at your security since 2011!” stays alive. There are assertions of the group having hacked into the websites of the newspapers like The Times and The Sun to post its retirement news. Many, however, claim that this group had taken it upon itself to create awareness about the absence of efficient security against hackers.

3. Adrian Lamo

Adrian Lamo decided to switch careers when he realized the potentials of his skills. He became a news when he hacked into Yahoo!, Microsoft, Google, and The New York Times. This, although culminated into his arrest, it later helped him gain the batch of an American Threat Analyst. A guy who would hack into top-notch accounts sitting in the spacious and comforting cafeterias, libraries, internet cafes, soon turned Wikileaks suspect Bradley Manning over to FBI. While Manning was arrested for leaking several hundred sensitive US government documents, Lamo went hiding or should we presume, undercover?

4. Mathew Bevan and Richard Pryce

Targeting the over-sensitive nerves, what Mathew Bevan along with his alleged partner Richard Pryce did, could have triggered great many issues between USA and North Korea. The duo hacked the US military computers and used it as a means to infiltrate the foreign systems. The crucial contents of Korean Atomic Research Institute were dumped into USAF system. However, the contents were majorly relevant to South Korea and hence, less volatile. But this, nonetheless, could have led to a huge international issue.

5. Jonathan James

The first juvenile to be imprisoned for a cyber-crime at the age of 16, Jonathan James or better known as c0mrade, hacked into Defense Threat Reduction Agency of US department. Further, he installed a sniffer that scrutinized the messages passed on between the DTRA employees. Not only did he keep a check on the messages being passed around, in the process, he collected the passwords and usernames and other such vital details of the employees, and further even stole essential software. All this cost NASA to shut down its system and to pay from its pocket $41,000. c0mrade, however, had a bitter ending as James committed suicide in 2008.

6. Kevin Poulsen

How far would you go to win your dream car or a dream house? How far will you go to win an online contest or a radio show contest? Perhaps, you shall keep trying your luck, unless you are Kevin Poulsen! Poulsen infiltrated a radio shows call-in contest just so he could win a Porsche. Dark Dante, as he was better known, went underground after FBI started pursuing him. He, later, was found guilty of seven counts of mail, wire and computer fraud, money laundering and the likes. What turned out to be rewarding in Dark Dante’s case is – his past crafted his future. Poulsen now serves as a Senior Editor at Wired.

7. Kevin Mitnick

Clad in an Armani suit, when a bespectacled face in his mid-40s smiles at you from the computer screen, you can hardly consider the man a cyber-criminal. Such is the case with Kevin David Mitnick. Once upon a time, the most wanted cyber-criminal of US, now is an affluent entrepreneur. Kevin, who is now a security consultant, was convicted of hacking Nokia, Motorola and Pentagon. He pleaded guilty to seven counts of fraud that included wire fraud, computer fraud and of illegally interception a wire communication. After five years of incarceration that included eight months of solitary confinement, Mitnick now has started afresh. However, his knack with the computers is still reminisced and was even depicted on celluloid in the films Takedown andFreedom Downtown.

8. Anonymous

The concept of being a “digital Robin Hood” was far from being conceived, but in the computer age, it is very likely that someone somewhere has bagged this title. A “hacktivist group” called Anonymous are known with the penname of being the “digital Robin Hood” amongst its supporters. Identified in public by wearing a Guy Fawkes Masks, Anons, as they are widely known, have publicized themselves by attacking the government, religious and corporate websites. The Vatican, the FBI, the CIA, PayPal, Sony, Mastercard, Visa, Chinese, Israeli, Tunisian, and Ugandan governments have been amongst their targets. Although, Anons have been arguing whether to engage in a serious activism or a mere entertainment, many of the group members have clarified their intent which is to attack internet censorship and control.

9. Astra

Astra, a Sanskrit word for weapon was the penname of a hacker who dealt in the weapon stealing and selling. A 58-year-old Greek Mathematician hacked into the systems of France’s Dassault Group, stole vulnerable weapons technology data and sold it to different countries for five long years. While the real identity of the ASTRA remains untraced, officials have said that he had been wanted since 2002. Astra sold the data to approximately 250 people from around the globe, which cost Dassault $360 millions of damage.

10. Albert Gonzalez

How safe is internet banking? When we browse through the profile of this mastermind, we are certain that one ought to use the World Wide Web with immense care. For two long years, Albert Gonzalez, stole from credit cards of the netizens. This was recorded to be the biggest credit card theft in the history of mankind. He resold approximately 170 million credit cards and ATM numbers. He did so by installing a sniffer and sniffing out the computer data from internal corporate networks. When arrested, Gonzalez was sentenced to 20 years in Federal prison.

Thursday 22 January 2015

The website of the Government of Ghana, www.ghana.gov.gh has been hacked.

This was confirmed by a Deputy Minister of Communications, Ato Sarpong, on the Citi Breakfast Show on Wednesday.

According to the Minister, government technicians are devising measures to restore the site.

“To an extent yes. I have made the relevant calls, and we are working on it to restore the site in just a couple of hours,” he said.

He was unable to tell the source of the hack, but assured that it will be investigated and the website will be restored soon.

“I’m unable to say the cause of the hack at this moment, but when you go on the site, you will see that its been hacked. It will take you to a different place.”

In 2012, the Ministry of Justice and Attorney General’s Department’s website – www.Mojag.gov.gh was also hijacked by hackers sympathetic to Argentina, which had its military vessels, the Libertad Frigate “seized” by a Ghanaian court.

Monday 12 January 2015

Microsoft released Fix it tool for the zero-day vulnerability in GDI component in Microsoft Windows and Office


Earlier this week Microsoft released security advisory for a zero-day vulnerability found in GDI component in Microsoft Windows and Office. The flaw allows remote execution of arbitrary code on the target system via a specially crafted TIFF image.
Following the notification the company introduced a Fix it tool, which is a temporary solution that can be used against specific threats until the release an official patch. This one is scheduled for December’s “Patch Tuesday”. However, there is a possibility that Redmond will release “an out-of-cycle security update, depending on customer needs.” The company says the users who are afraid of being vulnerable should install the Fix it as soon as possible.
NakedSecurity notes that vulnerable software includes operating system Microsoft Windows Vista and Microsoft Windows 2008, Office applications Microsoft Office 2003, 2007 and 2010, as well as the Lync messaging client 2010 and 2013 .
Cybercriminals exploit the flaw to carry out targeted attacks, and the main victims are located in Central and East Asia.
“It is worth to note that this heap-spraying in Office via ActiveX objects is a new exploitation trick which we didn’t see before, previously attackers usually chose Flash Player to spray memory in Office. We would believe the new trick was developed under the background that Adobe introduced a click-to-play feature in Flash Player months ago, which basically killed the old one. This is another proof that attacking technique always tries to evolve when old ones don’t work anymore,”stated McAfee experts.

Monday 27 October 2014

NASA Confirms Earth Will Experience 6 Days of Total Darkness in December 2014!

WORLDWIDE - NASA has confirmed that the Earth will experience 6 days of almost complete darkness and will happen from the dates Tuesday the 16 – Monday the 22 in December. The world will remain, during these three days, without sunlight due to a solar storm, which will cause dust and space debris to become plentiful and thus, block 90% sunlight.

This is the head of NASA Charles Bolden who made the announcement and asked everyone to remain calm. This will be the product of a solar storm, the largest in the last 250 years for a period of 216 hours total. Reporters interviewed a few people to hear what they had to say about the situation with Michael Hearns responding “We gonna be purgin my n*gga, six days of darkness means six days of turnin up fam”.

Despite the six days of darkness soon to come, officials say that the earth will not experience any major problems, since six days of darkness is nowhere near enough to cause major damage to anything. “We will solely rely on artificial light

Cross-site Scripting Vulnerability in WordPress Button Generator Plugin

Vector: Remote
Severity: Low
Patch: Unpatched
Impact: Cross-site Scripting (XSS)
Software: WordPress MaxButtons: WordPress Button Generator Plugin 1.x , vulnerable versions: <=1.26.0
A cross-site scripting (XSS) vulnerability has been discovered in WordPress Button Generator Plugin.
Vulnerability is caused by an input validation error in the "id" GET parameter to "wp-admin/admin.php" (when "page" is set to "maxbuttons-controller" and "action" is set to "button"). A remote attacker can send a specially crafted HTTP request to the vulnerable application and execute arbitrary html and scripting code in user`s browser in context of a vulnerable website.
Further exploitation of this vulnerability may result in stealing potentially sensitive to the user information, such as cookies, or disguising the information presented on the website.

Friday 24 October 2014

NASA announced today that its Curiosity Rover has found an unambiguous message from God written on tablets in a Martian cave.
According to an official press release two giant stone slabs the size of small elephants were located deep inside a cavern abutting Aeolis Mons, a large mountain.

Upon one tablet is a copy of the Ten Commandments and the text of John 3:16 written in 12 languages - including English, Spanish, Chinese, Basque and Hebrew. On the other tablet is a simple message in English reading "I am real."

According to top scientists who have studied the discovery extensively, these findings may have definitively established Christianity as the one true religion.

"This is amazing," says Syms Covington, an Australian researcher working for NASA's Mars Exploration Program. "We went into the cave looking for water, and we found proof of God's existence instead.

"I mean how else did those tablets get there? I can tell you one thing: there's not a single atheist inside NASA's control room now. What we saw was jaw-dropping."


Genesis 1:1
NASA's Curiosity rover arrived on Mars in August of last year with a mission to explore the Martian climate and geology for signs for habitability.

Thus far the mission has been a success, with the discovery of an ancient seabed and chemicals needed for life suggesting that Mars was once suitable for life.

However the tablets, both of which are signed "Peace and Love - Yahweh," represent the rover's most significant find to date, and is perhaps the most important scientific event in history.

"When people find out about this, they will demand change in our society," explains a political scientist at Georgetown University. "Democracy will have to give way to theocracy. We're gonna have to build more churches and reintroduce prayer into schools. Abortion is defiantly going to be illegal within a few months."

Despite its potential significance, Covington fears that the Earth-shattering discovery may not make the impact it should.

"Unfortunately, the mainstream media is so anti-Christian, they might not even pick up this story," he explains. "But God is real. We have proof. And everyone deserves to hear the truth."

Microsoft to drop cookies

Microsoft confirmed rumors that it is going to drop cookie files that are basic for global online ad market, told AdAge, citing its own reliable sources within the company.
According to the periodical, instead of cookies Redmond will use similar technology that will store all valuable user data on Redmond’s servers.
Moreover, Microsoft has reportedly started developing the system, which acts like device identifier and stores data that resembles cookie files, with an exception of being within Redmond’s ecosystem. Files have to be connected to Internet Explorer and Bing.
There is, however a possibility that the corporations may pass the data to the third parties.
“Microsoft believes going beyond the cookie is important. Our priority will be to find ways to do this that respect the interests of consumers. We have nothing further to share,” – stated Microsoft’s spokeswoman.
Microsoft isn’t the only company to drop cookies. Thus, the same decision was made by Google and Amazon