Jeff Han demos his breakthrough touchscreen

5년전에 이렇게 시연하다니..지금의 아이패드보다 더 멋지다.
진정한 카피캣은 애플인가? ㅎ

[출처] http://www.ted.com/talks/jeff_han_demos_his_breakthrough_touchscreen.html

Posted by bitfox
l
u토렌트와 비트토렌트 사이트가 해킹당했다. 기사를 보면 어제(화요일) 태평양 표준(11:20)시 1시간 정도(4:20 a.m. ~ 6:10 a.m.) 해킹당하였으며 "Security Shield"란 프로그램을 다운 받으면 바이러스에 감염되었을 수 있다.

uTorrent & BitTorrent Sites Hacked, Spread Security Shield Malware


Attackers hijacked two popular Torrent websites "bittorrent.com and utorrent.com" and tampered with their download mechanisms, causing visitors trying to obtain file-sharing software to instead receive malware. The site reported on its blog that the attack had occurred at around 04:20 Pacific Daylight Time (11:20 GMT) on Tuesday. Initially, the incursion was also thought to have affected the servers of the main BitTorrent site, but further investigation revealed this site had been unaffected by the attack.

Once installed, Security Shield delivers false reports that a computer is infected with multiple pieces of malware and prompts the user for payment before claiming to disinfect the machine. The attack affected only users who downloaded and installed software from bittorrent.com and utorrent.com during the hour-and-fifty-minute window that the sites were compromised. Those who installed software previously are unaffected.

"We have completed preliminary testing of the malware. Upon installation, a program called ‘Security Shield" launches and pops up warnings that a virus has been detected. It then prompts a user for payment to remove the virus. " experts write on the blog.

It is very important to once more note that infected are only users who have downloaded the software between 4:20 a.m. and 6:10 a.m. Pacific time. If you have previously downloaded it - you can rest assured your software is clean.

[출처] http://thehackernews.com/2011/09/utorrent-bittorrent-sites-hacked-spread.html
Posted by bitfox
l
지난 9월 10일.
미국 NBC News 트위터 계정이 해킹되어 9/11 테러에 대한 허위 기사가 나갔었습니다.
스크립키드로 추정되고 있으며 그라운드 제로에 다시 한번 테러가 났다는 브레킹 뉴스를 보내고 있습니다.
흠..장난 치고는 좀 그렇죠;;

관련기사
NBC News Twitter account hacked & post fake news of 9/11


Hackers have broken into the Twitter account of NBC News and posted messages claiming that there has been a terrorist attack at Ground Zero in New York. Coming two days before the tenth anniversary of the 9/11 attacks, the prank by a group calling themselves the 'script kiddies' was greeted with widespread opprobrium from other twitter users."Breaking News! Ground Zero has just been attacked. Flight 5736 has crashed into the site, suspected hijacking. More as the story develops," was the first tweet this afternoon. It was followed by two others, including one that started "This is not a joke." The fourth tweet said "NBCNEWS hacked by The Script Kiddies."
Luke Russert, who covers politics for NBC News, also tweeted: "Please ignore NOT TRUE tweets coming from @NBCNews. We got hacked by tasteless despicable attention seeking criminals." Some experts suspect that script kiddies, who are thought to have hacked a Fox News account two weeks ago, are British although this had not been confirmed.


출처 : http://thehackernews.com/2011/09/nbc-news-twitter-account-hacked-post.html
Posted by bitfox
l
9월 11일 PANDA Security 파키스탄 도메인 계정 해킹되었군요. zohn-h에 올라와 있다는데..
보안 업체들도 수난 시대입니다.

관련기사..........

Panda Security (Pakistan domain) hacked by X-NerD


Panda Security, One of the famous Computer software company website got hacked. Pakistan domain of Panda Security hacked by Pakistani hacker "X-NerD". Hacker is from Pakistan Cyber Army team of hackers. Taunt by hacker on deface page "OoooOOPss...I am ShockeD At YouR SecuritY..S3cuR!tY L3vEL Z3r0...YOu Dont KnoW HOw To SecurRe Your AsS n Pr0vidinG SEcurity to 0therS...Big LauGh...". Yesterday X-Nerd was in news for hacking Hundreds of other domains. Mirror of hack on Zone-H.


출처: http://thehackernews.com/2011/09/panda-security-pakistan-domain-hacked.html
Posted by bitfox
l
이스라엘과 터키간의 사이버 전쟁이 다시 시작되었다. 워낙 역사적으로 앙숙관계이고 이 친구들은 한번 붙으면 피해가 수백만 달러에 이른다고 한다.
요즘 DNS 업체에 공격이 많이 들어오는데.. 그 만큼 보안상 중요한 업체이기 때문이다.
얼마전 국내 G모 DNS 업체가 공격당해 피해 정보는 공개적으로 알려지지 않았으나 외국 보도에 따르면 100,000 건의 도메인과 350,000명의 개인정보가 유출 되었다고 한다.
이 뉴스를 보면 우리나라도 사이버 전에 대한 대비방안을 견고히 구축해야 할 것 같다.


[관련기사]

Israeli-Turkish Cyberwar Begins

Turkish hackers launched a DNS attack on 350 Israeli websites in what experts believe was a test run for attacks on Israeli domains.
Cyberwarfare
Amid the current diplomatic impasse between Ankara and Jerusalem, Turkish hackers hijacked some 350 Israeli websites on Sunday evening, launching a Domain Name System (DNS) attack on dozens of other websites as well.

Israeli IT analysts said Tuesday the DNS hijacking is likely to be, in fact, a "test-run" ahead of a major attack on Israeli domains.

Visitors to some of the sites were diverted to a page declaring it was “World Hackers Day."

At least seven high-profile websites outside Israel were also hijacked, including those of The Telegraph, Acer, National Geographic, UPS and Vodafone.

Hackers calling themselves the "TurkGuvenligi group" claimed they had done the cyber-attack. TurkGuvenligi translates as "Turkish security."
.....

[출처 및 더 보기] http://www.israelnationalnews.com/News/News.aspx/147603

Posted by bitfox
l
1년만에 나의 PC에 먼지를 털어냈다. 키보드와 마우스는 항상 청결(?)을 유지하지만..
본체를 열고 청소한다는게 여간 귀찮은 일이 아니다.

하지만 인터넷에 올라온 사진을 보면.. 여러분도 청소할 수 밖에... >_<;; ㅋ

제목:

Filthy PCs: The X-rated circus of horrors


 


ㅋ 맨 마지막 사진이 압권이다.
청결한 PC를 만듭시다.

[사진 출처] http://www.theregister.co.uk/2010/11/26/ventblockers_2/page11.html
Posted by bitfox
l
EU의 서브 도메인 사이트가 악동 Inj3ct0r 팀에 당했다.

European Union hacked by Inj3ct0r Team


그들은 또한 자신들이 해킹한 폴더 및 파일에 대해 증거 사진으로 대외 사이트에 노출 시켰다.

One of the Sub domain of European Union hacked and Defaced by Exploit writers at Inj3ct0r Team. Hacker deface the web page and wrote "We are against nuclear weapons. We are against violence in Libya. We are against the arrest of policy Tymoshenko's in Ukraine.We are opposed to Russian influence in the territory of Ukraine!Fuck off President Medvedev, Primerministr Putin , and Yanukovich !You are idiots! You are trying to scold the Slavic peoples.You can arrest me, but you do not arrest the idea. I am not alone, we are legion."
Hacker Publish some server files and Details also ,


사악하기 그지 없다 -0-;;

[출처] http://www.thehackernews.com/2011/09/european-union-hacked-by-inj3ct0r-team.htm
Posted by bitfox
l

앞으로 진단해야할 가까운 미래(?)에 진단 대상입니다. My Car~ >ㅁ<;;

--------------------------------------------------------

Forget your car keys? Soon it won’t make a difference, as long as you have your laptop. An interesting viral Web video (see below) making the rounds since the Black Hat cybersecurity conference earlier this month depicts two researchers from iSEC Partners (a San Francisco-based security firm) breaking into a 1998 Subaru Outback via their PC. In less than 60 seconds, they wirelessly find the car’s security system module, bypass it and start the engine remotely.

iSEC researchers Don Bailey and Mat Solnik claim to be able to hack their way into a securely locked car because its alarm relies on a cell phone or satellite network that can receive commands via text messaging. Devices connecting via a cellular or satellite network are assigned the equivalent of a phone number or Web address. If hackers can figure out the number or address for a particular car, they could use a PC to send commands via text messages that instruct the car to disarm, unlock and start.

One of the reasons this text-messaging approach is disconcerting is that text messages aren’t so easy to block, unless you don’t want to receive any texts (either to your car or phone). Google Voice, iBlacklist and a few others (including wireless carriers AT&T and Verizon) do offer some tools for filtering unwanted text messages.

The researchers acknowledge that stealing a particular car would be difficult because you would have to know that car’s number or address, neither of which are easy to find. What bothers them more is that wireless-enabled systems are showing up not just in cars but also in Supervisory Control and Data Acquisition  (SCADA) systems that control and secure power plants, water-treatment facilities and other components of the nation’s critical infrastructure, they told CNET.

iSEC isn’t the only research team to have caught on to the dangers of ubiquitous networking. As Scientific American reported in April, researchers from the University of California, San Diego (UCSD), and the University of Washington in Seattle likewise claimed that a hacker could insert malicious software onto a car’s computer system using the vehicle’s Bluetooth and cell phone connections, allowing someone to use a mobile phone to unlock the car’s doors and start its engine remotely. UCSD computer science professor Stefan Savage and Washington assistant computer science and engineering professor Tadayoshi Kohno had also previously demonstrated the ability to use a computer plugged into a car’s On-Board Diagnostic system (OBD–II) port to take control of the electronic control units to (among other things) disable the brakes, selectively brake individual wheels on demand, and stop the engine—all independent of the driver’s actions (pdf). This was not done wirelessly but did highlight vulnerabilities that car-makers might want to investigate as they continue to open up their vehicles to outside communications.

Image courtesy of webphotographeer, via iStockphoto.com

 

[출처]

http://blogs.scientificamerican.com/observations/2011/08/19/hacked-in-60-seconds-thieves-could-steal-cars-via-text-messages/


Posted by bitfox
l
안드로이드 기반에 Dos 공격을 일으키는 툴이 나왔다. 역시 우려했던 바이다. -ㅅ-;
아직까지는 단순한 flood attack이지만 기본이 갖춰졌으니 DDos나 다양한 공격방식이 나오는 건
시간 문제인 것 같다.

AnDOSid the DOS tool for Android


A new product released by SCOTT HERBERT for Android mobile phones,Its AnDOSid - the DOS tool for Android Phones. The rise of groups like Anonymous and LuzSec, as well as constant India / Pakistan cyberwar has raised the issue of cyber-security high(er) in the minds of web owners.

Pentesting tools exist to simulate such attacks and help website security people defend against them, however for the most part they currently only exist for desktop computers. Mobile phones have, over the last few years, grown from simple devices that send and receive calls to mobile computing platforms which can be purchased for less than $100 a device.

AnDOSid fills that gap, allowing security professionals to simulate a DOS attack (An http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones. AnDOSid is actively being developed and I welcome feedback from the security community as to how you would like the application to evolve.


What's in this version:

  • Requires Internet access to send the http post data
  • Requires phone state to access the IMEI (one of the two identifiers sent with each post)


AnDOSid can be downloaded from the Android Market place and costs just £1 or Rs.74.58/-Only.


[출처] http://www.thehackernews.com/2011/08/andosid-dos-tool-for-android.html
[Notice: 악의적인 사용시 사용자 본인에게 책임이 있음을 공지합니다.]
Posted by bitfox
l
프랑스 대표 텔레콤 브랜드 Orange.fr 웹사이트가 익명의 해커로 부터 공격받아 사이트 소스 및 데이터 베이스가 노출되었다. 2010년까지 2억 천만명의 고객을 갖고 있는 세계에서 5번째로 큰 통신 업체이다.

Orange.fr
hacked, Database and site source code leaked


Anonymous Hacker Hack Orange.Fr and upload the database and Site source code backup on file sharing site. Data leaked on twitter. Orange is the brand used by France Télécom for its mobile network operator and Internet service provider subsidiaries. It is the fifth largest telecom operator in the world, with 210 million customers as of 2010. The brand was created in 1994 for Hutchison Telecom's UK mobile phone network, which was acquired by France Télécom in August 2000. In 2006, the company's ISP operations, previously Wanadoo, were also rebranded Orange. Orange is now the unique commercial façade of almost all France Telecom services. Orange France was incorporated in 2005 and has its headquarters in Arcueil, France.

Today UK Police has Charge another alleged Anonymous member in Hacking Cases. A student has been charged with involvement in cyber attacks by the hacking group Anonymous against companies that withdrew online payment services from WikiLeaks.

[출처] http://www.thehackernews.com/2011/08/orangefr-hacked-database-and-site.html
Posted by bitfox
l