Search This Blog

Thursday, January 5, 2017

Security Firm LogRhythm Predicts - “The Internet Will SHUTDOWN For 24 Hours In 2017”


The year 2016 wasn’t pretty great if we access the overall cyber security scenario. The hackers have found new ways to deploy mammoth DDoS attacks by creating armies of IoT devices. In October, we witnessed Dyn DDoS attack that took down about half of the global internet.
In 2017, it’ll be kiddish to assume that such attacks will slow down and we’ll be using a safer internet. Various security experts have made all sorts of predictions for the months ahead, and things are looking ugly. One such dire forecast has been made by US security vendor LogRhythm.
Firm’s vice president and chief information security officer James Carder has said that the whole internet will shut down for 24 hours in 2017, and it’ll tank the financial markets.
“In 2017, we’re going to see it hit big sometime, somewhere. If the internet goes down, financial markets will tank,” Carder told Business Insider.
The security expert also mentioned the massive DDoS attacks on Dyn DNS and Brian Krebs. He also predicted that the fake news problem will get worse as the hackers will target media giants like Fox News and CNN.
For those who don’t know, LogRhythm is a company that specializes in security information and event management software.



US-based security firm LogRhythm has predicted that due to a massive DDoS attack, the worldwide internet will shutdown for 24 hours in 2017, resulting in the tanking of financial markets. Company’s vice president and chief information security officer James Carder also predicted that the DDoS attacks that took place in 2016 were a clear indication. He also hinted at the increasing ransomware threats.


Carder has also stressed on the increasing ransomware threat in the upcoming year.
“Attackers will use pre-authenticated tokens to disseminate malware. Because so many Apple devices are interconnected, the malware could very quickly spread,” he added.

Sunday, December 18, 2016

1 Billion User Accounts Hacked, Yahoo Says It’s Confirmed.

Yahoo has disclosed a new data breach on the company’s server which compromised user data of 1 billion user accounts. The attack occurred in August 2013, Yahoo says the hack didn’t involve payment card and bank account details.

Yahoo has disclosed a new data breach which is said to have occurred in August 2013. The company says the attack affected around 1 billion users and it’s separate from the attack reported in September 2016 – affecting around 500 million accounts in 2014.

After analyzing the data given by law enforcement, Yahoo claims account information like names, telephone numbers, date of birth, email addresses, security questions, and hashed passwords were compromised by the attackers. However, it didn’t include data like credit card details and bank account information, as it wasn’t stored on the hacked server.

In the case of the 2014 attack, Yahoo has tied links to some state-sponsored attacker, who gained access to Yahoo’s proprietary source code and created forged cookies to compromise user accounts.
Verizon is already in the process of acquiring Yahoo for $4.8 billion, and the company has negotiation terms in mind due to multiple hacking incidents like this. Yahoo has also been accused of creating email scanning software to scan people’s email on behalf of the US government. It was known that Yahoo’s CEO Merissa Mayer gave a green signal without seeking any advice from the security department.

Yahoo users are getting a email to confirm whether they are been affected by this data breach. The Email format goes this way:

NOTICE OF DATA BREACH


Dear Yahoo User,
We are writing to inform you about a data security issue that may involve your Yahoo account information. We have taken steps to secure your account and are working closely with law enforcement.

What Happened?
Law enforcement provided Yahoo in November 2016 with data files that a third party claimed was Yahoo user data. We analyzed this data with the assistance of outside forensic experts and found that it appears to be Yahoo user data. Based on further analysis of this data by the forensic experts, we believe an unauthorized third party, in August 2013, stole data associated with a broader set of user accounts, including yours. We have not been able to identify the intrusion associated with this theft. We believe this incident is likely distinct from the incident we disclosed on September 22, 2016.

What Information Was Involved?
The stolen user account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (using MD5) and, in some cases, encrypted or unencrypted security questions and answers. Not all of these data elements may have been present for your account. The investigation indicates that the stolen information did not include passwords in clear text, payment card data, or bank account information. Payment card data and bank account information are not stored in the system we believe was affected.

What We Are Doing
We are taking action to protect our users:
  • We are requiring potentially affected users to change their passwords.
  • We invalidated unencrypted security questions and answers so that they cannot be used to access an account.
  • We continuously enhance our safeguards and systems that detect and prevent unauthorized access to user accounts.
What You Can Do
We encourage you to follow these security recommendations:
  • Change your passwords and security questions and answers for any other accounts on which you used the same or similar information used for your Yahoo account.
  • Review all of your accounts for suspicious activity.
  • Be cautious of any unsolicited communications that ask for your personal information or refer you to a web page asking for personal information.
  • Avoid clicking on links or downloading attachments from suspicious emails.
Additionally, please consider using Yahoo Account Key, a simple authentication tool that eliminates the need to use a password on Yahoo altogether.

For More Information
For more information about this issue and our security resources, please visit the Yahoo Security Issues FAQs page available at https://yahoo.com/security-update.

Protecting your information is important to us and we work continuously to strengthen our defenses.

Sincerely,

Bob Lord
Chief Information Security Officer
Yahoo

Friday, July 29, 2016

What is a Botnet ? How to Detect and Prevent it ?

We here the name Botnet quite a lot in the cyber world, but what is Botnet ? how can you detect and remove it ? Today we will discuss about this topic.

What is botnet ?

A botnet is a network of computers  that are compromised and are under the control of an attacker. Every individual device in a botnet is called as a bot. A bot is usually formed when a computer is infected with malware. This malware allows the crooks to control the computer remotely without the knowledge of the owner of the computer. The attackers who control these botnets are referred to as “bot masters” or “bot herders” .
Attackers generally use botnets for a lot of purposes, most of them being criminal. The most common applications for botnets include denial-of-service attacks, email spam campaigns, data theft and spreading adware/spyware. A botnet attack starts with a bot recruitment. Bot masters usually recruit these bots by spreading worms, botnet viruses, or other malware. It is also possible to use web browser hacking and infect computers which contain a bot malware. Once a computer is infected with a botnet virus, it will connect to the bot master’s command and control (C&C) server. From there the attacker is capable of communicating and controlling the bot. When the botnet reaches the desired size, the herder can exploit the botnet and carry out attacks (overloading servers, stealing information, sending spam, click fraud, etc).

Botnet Detection and Prevention

Detection  of a botnet can be difficult, because these bots are designed to operate without any knowledge of user. But, there are some common signs using which you can find if a computer is infected with a botnet virus.some of them are:
  • IRC traffic ( bot masters and botnets use IRC for communications)
  • High outgoing SMTP traffic.
  • Unexpected popups .
  • Slow computing with a high CPU usage.
  • Spikes in traffic, especially Port 6667 ( which is used for IRC), Port 25 (which is used for email spamming), and Port 1080 (which is used by proxy servers)
  • Outbound messages that weren’t sent by the user
  • Issues with Internet access
Some methods to prevent Botnets are:
  • Network baselining: The Network performance and activity should be monitored hence irregular network behavior is clear.
  • Software patches: All software in your computer should b kept up-to-date especially the security patches.
  • Vigilance: Users should be trained to protect from activity that puts them at high risk of bot infections or any other malware.
  • Anti-Botnet tools: Anti-botnet tools can be used to get best results.

Botnet Removal

Botnet detection is pretty useless without having botnet removal skills. Once a bot was detected in a computer, it should be removed as soon as possibly using security software with botnet removal functionality.
Hope this article provides basic information like what is botnet and how does it work.

Home Ethical Hacking Tutorials WifiKill – Disabling WiFi for Other Devices WifiKill – Disabling WiFi for Other Devices


What is WifiKill? WifiKill is an android application that helps you to disable other people’s Wi-Fi internet connections on the same network. It is a kind of hacking process in which you are hacking other person’s internet connection and trying to disable it. This app is specifically developed for the Android smartphone users. You can easily become a hacker as WifiKill literally falls in the category of hacking and this application is capable of searching for the user information in the Wi-Fi modem.
WifiKill v2.3.2 is an amazing app through which you can get a wi-fi connection in full speed by using this application. You can easily eliminate unnecessary users who are connected to wi-fi connection on the same network. You can use this app on your android smartphone as it works effectively to disable other’s internet connection.

Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that do not belong to you

Features of WifiKill

  • Show the traffic consumed by the device.
  • Grabs blog traffic and show the sites visited by the grabbed devices.
  • Show the network names of the devices.
  • Reveals the total number of bytes transferred by the ‘snatched device’.
  • Capable of disabling the Internet access of any grabbed device.
  • You can also view what other’s are surfing on internet and even see what they download from internet.
  • It supports Tablets and hence it is both mobile and tablet-friendly!
  • WifiKill supports Android 4.0 and above only.

Requirements of WifiKill

  • It requires Root accessibility.
  • Works for Android 4.0 and above only.

How to use WifiKill

Using WifiKill app, you can easily disable one’s internet connection (Wi-Fi) which is on the same network. The capability of disabling other person’s Wi-Fi network connection is nothing but hacking their device. Here is a step-by-step procedure to hack a Wi-Fi network using WifiKill app on your android device.

Step 1: Initially, download it from the above link.
Step 2: Now, turn ON Wi-Fi on your Android phone and click to open the app.
Step 3: After opening the app, press the play button located on the top and the app will then start searching for the devices which are currently connected to the Wireless Internet network. Click on Grant to allow Superuser permission that is prompted on the screen.
 

WifiKill – Disabling WiFi for Other Devices

What is WifiKill?

WifiKill is an android application that helps you to disable other people’s Wi-Fi internet connections on the same network. It is a kind of hacking process in which you are hacking other person’s internet connection and trying to disable it. This app is specifically developed for the Android smartphone users. You can easily become a hacker as WifiKill literally falls in the category of hacking and this application is capable of searching for the user information in the Wi-Fi modem.
WifiKill v2.3.2 is an amazing app through which you can get a wi-fi connection in full speed by using this application. You can easily eliminate unnecessary users who are connected to wi-fi connection on the same network. You can use this app on your android smartphone as it works effectively to disable other’s internet connection.

Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that do not belong to you

Features of WifiKill

  • Show the traffic consumed by the device.
  • Grabs blog traffic and show the sites visited by the grabbed devices.
  • Show the network names of the devices.
  • Reveals the total number of bytes transferred by the ‘snatched device’.
  • Capable of disabling the Internet access of any grabbed device.
  • You can also view what other’s are surfing on internet and even see what they download from internet.
  • It supports Tablets and hence it is both mobile and tablet-friendly!
  • WifiKill supports Android 4.0 and above only.

Requirements of WifiKill

  • It requires Root accessibility.
  • Works for Android 4.0 and above only.

How to use WifiKill

Using WifiKill app, you can easily disable one’s internet connection (Wi-Fi) which is on the same network. The capability of disabling other person’s Wi-Fi network connection is nothing but hacking their device. Here is a step-by-step procedure to hack a Wi-Fi network using WifiKill app on your android device.

Step 1: Initially, download it from the above link.
Step 2: Now, turn ON Wi-Fi on your Android phone and click to open the app.
Step 3: After opening the app, press the play button located on the top and the app will then start searching for the devices which are currently connected to the Wireless Internet network. Click on Grant to allow Superuser permission that is prompted on the screen.
wi1

Step 4: As soon as the scan for devices is completed, the app will then show all the devices connected to the hotspot. If you enable Show Network Names in the preferences, it will also display the names of all the devices found.

Step 5: Now, Click on one device and slide the grab button .Once grabbed you can see the network usage and websites that are being accessed by it.

Step 6: You can kill one device at a time or else you can also kill all the devices at the same time by grabbing them all and then killing them. You can only kill after you have grabbed a device. Grabbing the device will show you the bandwidth consumption and websites accessed by that particular device. The device will lose the internet connectivity when you Choose to kill it.

 Step 7: When you are done, you can just switch off the kill button so that the devices will regain their Internet connectivity. Also don’t forget to stop the WifiKill by using the same button you used to start it.

Facebook has already open sourced 54 projects in 2016


It’s often said that the 21st century’s companies are being built upon the open source technologies. Facebook isn’t an exception in this regard. Moreover, it’s setting new examples for other companies by giving back to the developer community.We’ve already written a comprehensive article on Facebook’s open source initiative and the long list of projects open sourced by the company.
During its F8 2016 developer conference, open source played a big role. In a recent blog post by the company, Facebook has already open sourced 54 new projects. Out for these, more than a dozen projects are already being followed by more than 500 followers each.
“We build tools that enable engineers to work more easily across platforms, automate testing to catch problems sooner, and help improve the overall performance of our products,” wrote Christine Abernathy, a developer advocate with Facebook’s open source team.

 In the first six months of 2016, world’s largest social networking website Facebook has already open sourced 54 projects. These projects include Draft.js, Reason, ReDex, Facebook CTF, Torch etc. More than a dozen of these open source Facebook projects have already become pretty popular in the community.


Major projects that were open sourced by Facebook in 2016:

In her post, Christine outlined some notable examples of recently open sourced projects:
1. Draft.js: It’s a React-based rich text editor that was open sourced at React.js conference. This project aims to make it easier to customize rich text easily into React web apps.
2. ReDex: It’s a bytecode optimizer that was open sourced at F8 2016. It aims to make Android apps smaller. Facebook has reduced the size of its Android app by 20% using ReDex.
3. Memory Bundle: This open source tool for iOS devs include tools named FBRetainCycleDetector, FBMemoryProfiler, and FBAllocationTracker. It’s used to locate and fix instances that are prone to crashes due to memory allocations.

Other important news from Facebook’s open source initiative comes in the form of open source Torch implementation that trains deep neural networks code image recognition.

Recently, Facebook open sourced Facebook CTF–social network’s homegrown platform for hosting Capture the Flag contests to help students learn and fight against insecurities.

Another open source initiative by Facebook was seen in the form of Reason–a new interface for OCaml programming language.

If you wish to learn more about Facebook’s open source initiative, visit GitHub or code.facebook.com.

32-Bit Vs 64-Bit Windows OS: What's The Difference? How To Choose?

A common confusion occurs when we have to choose between a 32-bit Windows and a 64-bit OS because many of us have no idea about what is the difference between them. After reading this article, you get an upper hand while choosing one of them.


Microsoft Windows comes in many variants with barely visible feature differences. A noticeable variation is observed when we have to choose between a 32-bit or a 64-bit version. Lack of knowledge regarding the basic difference between a 32-bit and a 64-bit operation system adds to the puzzlement when it comes to deciding the appropriate version.Microsoft started releasing 64-bit versions shortly after the launch of their well-liked and fantasized Windows XP, which had the longest product lifespan of around 14 years. Time-traveling into the history reveals that the very first implementation of the 64-bit operating system was a Unix-like UNICOS created by the supercomputer-maker Cray Inc. in 1985. The development continued and many operating systems — Mac OS X, Windows, Solaris, and the most recently Google’s Android — were baked into their 64-bit versions.
The operating system variants are designed to utilize a kind of processor architecture and named so accordingly. A 32-bit OS is designed to take advantage of the resources facilitated by a 32-bit processor (like Intel’s x86) and same is the case for a 64-bit OS. So, the topic that should be discussed first is the processor.

A ‘bit’ of knowledge

What does a bit stand for? The smallest piece of data in a computer is known as a bit or binary digit. We know that computer only understands binary language (the 0s and 1s), so, each and every bit can have only one binary value, either 0 or 1. A computer stores data in a collection of such bits known as a byte. 8 bits make up a byte, also called an octet.

Something about the 32-bit vs 64-bit processors

A processor or CPU includes a number of registers and logical circuits. Also called the brain of the computer, people often confuse CPU with the cabinet of a desktop computer. The size of the register is 32-bit in a 32-bit CPU and similar for 64-bit. The number of values that can be stored in its register are 2^32. These values are used to map the address of the memory locations present in the physical memory. So, 2^32 = 4 gigabytes is the amount of memory or RAM a 32-bit processor can access during its operation.
In the case of 64-bit, the register can store 2^64 values that amount to 16EB (exabytes) of RAM. A grand figure when to compared to 4 GB memory that could be accessed by its 32-bit older counterpart.
A 32-bit CPU can process 4 bytes of data in one CPU cycle as 8 bits are equal to 1 byte. So, if the size of the data to be processed is greater than 4 bytes, it would require the CPU to go for another cycle to process the remaining data. In the case of a 64-bit CPU, the whole data, if less than 8 bytes, could be processed in a single go. Even if the data is more than 8 bytes, the 64-bit processor would require less time than the other one. You’ll not be able to notice much difference in normal day usage, except that you are the one who likes to multi-task between heavy applications. A 64-bit processor comes in multi-core options enabling more processing power without increasing the size of the hardware.

The difference: 32-bit vs 64-bit Windows OS

The 64-bit operating systems are designed to support more RAM than the 32-bit ones. Heavy applications like image editing software, AutoCAD, and games could have a considerable performance boost after your machine is packed with 16 exabytes of RAM, at least theoretically. The limit of physical memory that can be used, depends on the fact whether your motherboard will accept it or not. Practically, you don’t need hundreds of gigs of RAM for gaming sessions.

The minimum amount of RAM required for a 64-bit OS is 2 GB in comparison to 32-bit Windows which requires 1 GB RAM. It’s somewhat obvious because with large-sized registers more memory will be required. You should pack a memory chip of size 4 GB if you wanna experience the 64-bit Windows in action. The Home edition of Windows 10 can deal with 128 GB while the Pro has some serious limits, up to 2048 GB. You can stuff your machine with as much RAM you like.
Another reason that accounts for its widespread adoption is that it has now become more difficult to map files in the physical in memory. This is because the average size of the files is rocketing by the tick of the clock, usually more than 4 gigabytes.
One thing that you need to keep in mind is that a 32-bit OS works fine with a 64-bit processor but it won’t do any wonders. You’ll have to install a 64-bit OS on your machine to take full advantage of the 64-bit CPU. Also, the drivers and applications used should be designed for 64-bit processors.
Windows 64-bit version offers Kernel Patch Protection which prevents unsupported changes to the kernel of the Windows OS along with Data Execution Prevention at the hardware level. A digital signature for all the drivers is a must in order to prevent installation of modified drivers which may be used to inject malware on the machine.

The lack of software availability is a major downside for the higher bit operating system. Most of the older legacy software and drivers may not run on the 64-bit Windows. Many developers and companies are coming up with newer versions of their software products with improved compatibility. Mozilla released the 64-bit version of their Firefox browser back in December. Its adoption rate has made a considerable jump in the last decade as various manufacturers and the Windows-maker have made continual efforts to ship the 64-bit Windows either pre-installed or along with the 32-bit Windows if bought separately.

On a conclusive note, I would recommend you to go for 64-bit Windows because you need to keep in mind the future scenarios for your machine. As of now, almost every computer comes with a 64-bit processor packed in. If you’re using the older 32-bit operating system, you’re wasting the computing resources you have paid for. As far as the software availability is concerned, it is not a deal-breaker, be assured there will be plenty of them. 
 

Thursday, July 28, 2016

Google Introduces An Android Tips & Tricks Mini Site

Google launches ‘Tips and Tricks’ section for its Android users

Do you use an Android smartphone?
Do you understand the Android Ecosystem very well?
Are you looking to know more and get more out of your Android smartphone?

Don’t worry.
Google has just launched a new Android ‘Tips and Tricks’ mini site that will essentially browse you through some of Android’s features and answer all your questions. In other words, this site contains the tips and tricks on all the basic and most critical functionalities of Android Operating System. The Android-specific tips appear to have been drawn from the larger Google products tips page.
For instance, there are tips on how to customize/personalize your smartphone, how to use voice commands to control your device, and how to locate your lost smartphone. Also, it teaches users about Google Photos and how it allows users access their photos from any device and from anywhere.

All these tips and tricks and much more are classified as different tabs. All you need to do is click the one you want to read and it will pop-up and give you a brief idea on how to use that particular feature. Currently, the tips and tricks are put in the following few categories hoping that these might be updated with a few more in the future:

• Privacy & Security
• Voice (interaction)
• Camera & Photo
• Battery
• Customization
• Apps
• Settings

There are also tips on how to keep your smartphone more secure, and how to stay away from malware that might be disguising itself as an app. One of the main reasons for the Android smartphones to get infected is malware.

All this information is very useful for users who are coming from an iOS ecosystem or any other operating system, or who are new to the Android platform. This page might be the best bet for such users to understand the operating system and get used to it. Also, it could have a tip or two in there that seasoned Android users might find handy as well.
If you wish to know more about the Android features, then you can click this link for details.