Information Security Blog | Cyber Security Blog

Sreejith C

Information Security Blog | Cyber Security Blog
Read More

Facebook co-founder Mark Zuckerberg has been increasingly peaceful to share moments from his family and work life.

But a print he posted on Tuesday, dictated to foster Instagram’s user milestone numbers, might have finished adult divulgence a small some-more about Zuckerberg than he intended: Dude hasn’t mislaid any of his hacker counsel when it comes to safeguarding his privacy.

A couple of eagle-eyed observers forked out that a laptop on Zuckerberg’s table not usually has fasten covering a webcam, though there’s also fasten covering a Apple laptop’s twin microphones. That’s right, even one of a many chosen (and richest) coders on a world still takes easy measures to safeguard that nobody is espionage on him.

This unconsidered exhibit comes only weeks after Zuckerberg’s amicable media accounts were hacked, one of that reportedly had a not-so-complicated cue “dadada.”

And if Zuckerberg’s hacker credentials and purpose as a vital tech personality aren’t adequate to remonstrate we that he isn’t only being paranoid, cruise a fact that progressing this year FBI Director James Comey admitted that he puts fasten over his webcam.

This kind of meditative used to be a domain of swindling theorists and a certain multiply of hacker, though Zuckerberg only took it mainstream. In fact, in a run-up to a second deteriorate of Mr. Robot, a uncover about a hacker conspiracy, USA Networks even went so distant as to send out branded webcam covers (which this publisher happily uses).

No, supervision spies substantially don’t caring what you’re observant or doing in front of your computer.

But if it’s good adequate for a creator of a largest amicable network on a planet, maybe it’s value adhering some fasten on your possess webcam. You won’t demeanor paranoid anymore; instead, we can call yourself a billionaire tech noble in training.

Read More

There could be many reasons for hacking someone's Facebook account and it is not as simple as we speak. One should know the fact that there are no direct softwares that can hack Facebook account simply by entering the victim's user id. But it is possible with some methods those really work, out of which phishing, key logging, packet sniffing are most popular and widely used ones. Today, in this tutorial you are going to learn how to perform packet sniffing attack to hack Facebook account using your Android smartphone.

What exactly is packet sniffing?

Hack facebook using android

Let’s make this simple with an example. Consider two persons A and B using the same public WiFi network. The information sent and received between the device and WiFi hot-spot is done in the form of packets. These packets are not secured and can be access by any other device connected to same network. If Person A is using Facebook, his log-in credentials are sent in the form of packets which Person B can access and read them. In fact, Person B can modify them. Not only log-in credentials, everything you use within your browser can be seen and modified by anyone else as long as you are connected to that network.

So, Why Android Phone?

Earlier, when this process is first developed the only way to do packet sniffing is using PC or laptop running on Windows or Linux operating system. But now it can be done using any Android phone with root access (we shall talk about this later). The main reason for using Android phone is simplicity. It works same as PC, in terms of speed and accuracy. It has same number of tools as PC. And when you are in crowd, you can simply take out your mobile and do some hacking anonymously.

Does the Android Phone require any particular specs?

No particular specifications are needed for your Android device to do this. But your device needs to be rooted. For a brief explanation of what rooting is, read the tutorial on "How to Root Any Android Device".

Read More

This may happen to your Github account too...!!!

Monday, 20 June 2016 05:30

GitHub has revealed a number of users’ accounts have been accessed by an attacker reusing email addresses and passwords obtained from other internet services that have been compromised.

The code-hosting platform, which claims millions of users around the world, revealed a series of “unauthorized attempts” to log-in to many accounts on GitHub.com on Tuesday evening. “This appears to be the result of an attacker using lists of email addresses and passwords from other online services that have been compromised in the past, and trying them on GitHub accounts,” explained Shawn Davenport VP of Security at GitHub, in a blog post.

While Davenport was quick to stress that GitHub itself had not been hacked, he did concede that the attacker was successful in gaining entry to “a number” of GitHub accounts, though didn’t specify how many.

There has been a number of high-profile “hacks” across the tech realm of late, perhaps the most notable one being LinkedIn. The professional social network, which was acquired by Microsoft for $26.2 billion this week, hit the headlines last month after it reset passwords on millions of accounts as new data-leak reports began to surface. The compromised account details reportedly stemmed from a leak dating all the way back to 2012 when 6.5 million passwords were pulled from the social network, with the account credentials put up for sale on the so-called “dark web” four years later. Facebook CEO Mark Zuckerberg’s Twitter and Pinterest accounts were subsequently hacked, an event blamed on the LinkedIn password dump.

GitHub likely doesn’t know the origins of the passwords and email addresses used to compromise the accounts in question on GitHub.com, but it does serve as a stark reminder that reusing the same password across multiple online services is never a good idea.

GitHub says that it will be sending notifications to the individuals affected on how they can reset and restore access to their accounts. Davenport also has a dose of good advice to mete out: “We encourage all users to practice good password hygiene and enable two-factor authentication to protect your account,” he said.

Read More

A judge in Helsinki, Finland has ordered one of the founders of notorious file-sharing site The Pirate Bay to pay $395,000 to several record labels. The Finnish divisions of Sony Music, Universal Music, Warner Music and EMI had sued Peter Sunde, accusing Pirate Bay of illegally sharing the music of 60 of their artists.

Sunde, who left The Pirate Bay in 2009,said on Twitterthat he didn’t even know about the court case. "The record companies know that I have not had any part of TPB for ages, still suing," he wrote. "Bullying is the new black."

Finland’sDigiTodayreports that the labels hold Sunde responsible for the pirated material found on The Pirate Bay, even though he know longer works there, and the judgement includes a million-euro fine if the content is not taken down. He also must pay roughly $62,000 to the International Federation of the Phonographic Industry. (The IFPI did not immediately respond to a request for comment.)

Pirate Bay Co-Founder Creates Art Project to 'Bankrupt' the Record Business

Sunde called it "another frivolous court case" and is floating the idea of crowd funding his legal fees. Asked what would happen if he fails to pay, he said flatly, "I can’t pay. I dunno. I get more debt. And also, I’ll just get more debt. Add debt to debt. Maybe prison, dunno?!"

The Pirate Bay is already being blocked by several ISPs in Finland, including Elisa and TeliaSonera.

Sunde doesn’t hide his disdain for the recording industry, and last December launched a symbolicproject called kopimashinthat continually copies a song, then tallies the damages that arise for each instance of copyright infringement. "The goal of the kopimashin is to make the audio track the most copied in the world and while doing so bankrupting the record industry," he said at the time.