Palash Biswas On Unique Identity No1.mpg

Unique Identity No2

Please send the LINK to your Addresslist and send me every update, event, development,documents and FEEDBACK . just mail to palashbiswaskl@gmail.com

Website templates

Zia clarifies his timing of declaration of independence

What Mujib Said

Jyoti basu is DEAD

Jyoti Basu: The pragmatist

Dr.B.R. Ambedkar

Memories of Another Day

Memories of Another Day
While my Parents Pulin Babu and basanti Devi were living

"The Day India Burned"--A Documentary On Partition Part-1/9

Partition

Partition of India - refugees displaced by the partition

Friday, June 4, 2010

FW: [CCCNews] CCCNews Newsletter - dated 2010 May 31




Date: Mon, 31 May 2010 20:28:33 +0530
From: sysman01@mtnl.net.in
Subject: [CCCNews] CCCNews Newsletter - dated 2010 May 31
To: sysman01@mtnl.net.in

 NEWS LETTER
Centre for Research and Prevention of Computer Crimes, India
Courtesy - Sysman Computers Private Limited, Mumbai (www.sysman.in)

May 31, 2010

Editor - Rakesh Goyal (rakesh@sysman.in)



In today's Edition -                                                                             (This is a news-letter and not a SPAM)
*Direct Circulation - 95,000+

DEFACED : Hacker posts Hitler photo on Uganda govt website
BUSTED : Japanese police bust malware extortionist ring
WARNING : Facebook malware attack on the loose
SUED : Google Maps sued for issuing wrong directions
IT Term of the day
Quote of the day
 

* Direct Circulation in 4 Google groups (control-computer-crimes@googlegroups.com and IT-Sec-NSE@googlegroups.com) and 2 more groups
Approved Organizations can get a two months free fully functional E-Secure-IT subscription, providing focused IT-Security and Industry Business Risk Intelligence Alerts at: http://2mthsfree.e-secure-it.com/
 

 P Please don't print this newsletter unless you really need to. Save Tree. 
SAY NO TO PLASTIC WATER BOTTLES. 



--
You received this message because you are subscribed to the Google Groups "control-computer-crimes" group.
To post to this group, send email to control-computer-crimes@googlegroups.com.
To unsubscribe from this group, send email to control-computer-crimes+unsubscribe@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/control-computer-crimes?hl=en.


--Forwarded Message Attachment--

CCCNews-Newsletter-2010-05-31

IT and Related Security News Update from

Centre for Research and Prevention of Computer Crimes, India

(www.cccnews.in)

Courtesy - Sysman Computers Private Limited, Mumbai (www.sysman.in)

May 31, 2010


Today�s edition ��

 

DEFACED : Hacker posts Hitler photo on Uganda govt website

BUSTED : Japanese police bust malware extortionist ring

WARNING : Facebook malware attack on the loose

SUED : Google Maps sued for issuing wrong directions

IT Term of the day

Quote of the day

 

(Click on heading above to jump to related item. Click on �Top� to be back here)

 

Top


DEFACED : Hacker posts Hitler photo on Uganda govt website

By Risdel Kasasira�

May 31 2010

http://www.monitor.co.ug/News/National/-/688334/929108/-/x0a71s/-/

 

The official website of State House was last evening pulled down after unknown people hacked into it and posted a picture of the Nazi German dictator Adolf Hitler. The image stayed on the site for more than 24 hours having been posted on Saturday until about 4:00pm on Sunday when the site was finally pulled down.

 

The hacker claiming to be called Kaka Argentine posted the photo of Hitler with a Nazi Party symbol on his chest on Saturday. The controversial posts, conspicuous on the home page, were posted below the picture of President Museveni greeting the Masaka Municipality MP, John Kawanga during a meeting at Munyonyo Hotel on May 25.

 

This is not the first time the strangers hijack the government departments� website.

 

Last year, hackers calling themselves �the Ayyildiz team� posted pro- Palestine items on the website of the ministry of defense, accusing Israel of killing innocent Palestinians.

 

The presidential press secretary, Ms Linda Nabusayi, said they had received information that the posts were a result of an internal wrangle within the company that had been outsourced to manage the website.

 

�I have been told that the external service providers have issues within their company and that one workers who has since left could be the one behind this,� she said.

 

ICT Minister Aggrey Awori said State House has been a target of such attacks and blamed the cyber crime on opposition elements both within the country and outside whom he said were in the business of �electronic harassment� against State House and the government.

 

He said a new set of cyber laws that the government is pushing forward will help �track them and put them away�. Ms Nabusayi said State House would terminate the contract of the service provider.

 

Top


BUSTED : Japanese police bust malware extortionist ring

Trent Nouveau

28th May 2010

http://www.tgdaily.com/security-features/49993-japanese-police-bust-malware-extortionist-ring?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+tgdaily_all_sections+%28TG+Daily+-+All+News%29

 

Japanese police have arrested two individuals accused of spreading a nefarious piece of malware that stole personal information and posted it on the Internet.

 

According to Sophos security researcher Graham Cluley, the devious duo contacted compromised victims and offered to remove their personal data from the Internet for a hefty fee.

 

Japanese police bust malware extortionist ring"The malware was reportedly spread via the Winny peer-to-peer file-sharing network posing as an adult-themed Hentai game. Upon installing the program, victims were asked to enter their name, date of birth, contact details and other personal information," said Cluley.

 

"At the same time, information such as browser bookmarks were being stolen from the users' computer. At this point afflicted users probably didn't realise anything untoward has occurred. [They] later they received an email, asking for a fee to be paid to have the information removed."

 

Cluley added that over 5,000 PCs had been targeted by the two extortionists.

 

"Maybe there's a lesson here? If you're Japanese, stop getting your anime and porn kicks from P2P downloads - you don't know what kind of mess you could be getting yourself into.

 

"And always think twice before handing your personal information over to complete strangers via a website or computer program."

 

Top


WARNING : Facebook malware attack on the loose

PETE CASHMORE

Mashable.com

May 31, 2010

http://www.theage.com.au/technology/security/warning-facebook-malware-attack-on-the-loose-20100531-wo5w.html

 

A Facebook phishing attack was on the loose on the weekend � the third widespread attack on the site in the past three weeks. The attack attempts to steal your Facebook login credentials, install malware on your computer, and even get your home address.

Advertisement: Story continues below

 

The attack is spread via a "hilarious video" posted to Facebook walls, reports WebSense � when clicked, a form appears requesting your Facebook login.

 

The attack then returns you to Facebook, installs an app called "Media Player HD", and asks you to download the "FLV player" � doing so installs malware on your machine. It gets worse: Depending on your location, you may also be presented with a contest to win an iPad ... if you just enter your home address.

 

To avoid getting caught, simply remove the "hilarious video" if you find it on your Facebook wall. If you see it elsewhere on Facebook, don't click it ... and of course remember the obvious rule: Don't enter your Facebook login anywhere other than on Facebook.com.

 

If you already fell for the attack, change your Facebook password, uninstall the Facebook app (often called "Media Player HD"), and run a virus/malware scan on your computer.

 

Top


SUED : Google Maps sued for issuing wrong directions

Woman claims it is Google's fault for her being hit by a car on the highway

Rosalie Marshall

V3.co.uk,

30 May 2010

http://www.v3.co.uk/v3/news/2263907/google-maps-sued-issuing-wrong

 

A woman in the US is suing Google because its Maps service gave her the wrong walking directions.

 

Lauren Rosenberg claims the directions caused her to get run over because they led her onto a busy highway.

 

The case, filed in the US District Court�s Central Division in Utah, will decide whether Google can be considered liable for the directions its mapping service gives users. Rosenberg is demanding $100,000 from the company.

 

Rosenberg is also taking legal action against Patrick Harwood, the man who hit her.

 

The walking directions Rosenberg searched for on her Blackberry were from a 96 Daly Street, Park City, Utah to a 1710 Prospector Avenue, Park City, Utah.

 

Google clearly says on the route description that the �walking directions are in beta�.

 

�Use caution � This route may be missing sidewalks or pedestrian paths,� Google warns users.

 

Google added walking directions to its mapping services in July 2008, and also warned users then the product was still in development and should not be trusted fully.

 

But Rosenberg has ignored such information and is pursuing her case. She claims the directions led her into danger because she was instructed to walk along Deer Valley Road, which is another name for a rural highway with no safe pathway for pedestrians.

 

�The Defendant Google expects users of the walking map site to rely on the accuracy of the walking directions given,� said Rosenberg�s complaint filing.

 

�As a direct and proximate cause of Defendant Google�s careless, reckless and negligent providing of unsafe directions, Plaintiff Lauren Rosenberg was led onto a dangerous highway, and was thereby stricken by a motor vehicle, causing her to suffer sever permanent physical, emotional, and mental injuries, including pain and suffering,� it added.

 

Top


New IT Term of the day


storage management


The phrase storage management is a general storage industry term used to describe the tools, processes, and policies used to manage storage networks and storage services such as virtualization, replication, mirroring, security, compression, traffic analysis, and other services. The phrase also encompasses other storage technologies, such as process automation, storage management and real-time infrastructure products, and storage provisioning.

 

In some cases, the phrase storage management may be used in direct reference to Storage Resource Management (SRM).

 

Top


Quote of the day


As long as we hate, there will be people to hate.

George Harrison

Member of The Beatles,

1943-2001

 

Top

 

Note -

  1. As a member of this group, you get useful information to protect yourself and your IT assets and processes from various Computer and Related Crimes.
  2. If you think that your other friends/colleagues/acquaintances/relatives/foes/enemies also needs this information, forward the mail to them and request them to send their e-mail addresses and names to us with subject as "Subscribe".
  3. If you or someone has become victim of Computer Crimes or has any query on prevention, you are welcome to write to us.
  4. If you are not interested in it and would like to unsubscribe - send a reply mail with subject as "Unsubscribe".
  5. Disclaimer - We have taken due care to research and present these news-items to you. Though we've spent a great deal of time researching these matters, some details may be wrong. If you use any of these items, you are using at your risk and cost. You are required to verify and validate before any usage. Most of these need expert help / assistance to use / implement. For any error or loss or liability due to what-so-ever reason, CRPCC and/or Sysman Computers (P) Ltd. and/or any associated person / entity will not be responsible.

 



The dark side of terrorists revealed in MSN Internal Security Get it now.

No comments:

Post a Comment