Tag: hacking

  • Hacking experts find new ways to attack Android phones

    Hacking experts find new ways to attack Android phones

    Hacking experts have demonstrated ways to attack Android smartphones using methods they said work on virtually all such devices in use today, despite recent efforts by search engine giant Google to boost protection.

    Google spokeswoman Gina Scigliano declined to comment on the security concerns or the new research.

    Accuvant researcher Charlie Miller demonstrated a method for delivering malicious code to Android phones using a new Android feature known as near field communications. “I can take over your phone,” Miller said.

    Near field communications allow users to share photos with friends, make payments or exchange other data by bringing Android phones within a few centimeters of similarly equipped devices such as another phone or a payment terminal. 

    Miller said he figured out how to create a device the size of a postage stamp that could be stuck in an inconspicuous place such as near a cash register at a restaurant. When an Android user walks by, the phone would get infected, said Miller. 

    He spent five years as a global network exploit analyst at the U.S. National Security Agency, where his tasks included breaking into foreign computer systems. 

    Miller and another hacking expert, Georg Wicherski of CrowdStrike, have also infected an Android phone with a piece of malicious code that Wicherski unveiled in February.

    That piece of software exploits a security flaw in the Android browser that was publicly disclosed by Google’s Chrome browser development team, according to Wicherski.

    Google has fixed the flaw in Chrome, which is frequently updated, so that most users are now protected, he said.

    But Wicherski said Android users are still vulnerable because carriers and device manufacturers have not pushed those fixes or patches out to users.

  • Facebook want your mobile number! – to improve security

    Facebook want your mobile number! – to improve security

    Whoops! Something went wrong!
    Skeptics believe this is just another tactic used by Facebook to gain private details

    In wake of the recent leaking of passwords of LinkedIn and eHarmony accounts, social networking giants Facebook started promoting security tips at the top of each user’s home page, with a link to information about scams, passwords and how to stay safe on the social network.

    Users are urged to give Facebook their mobile phone numbers, which the company says it will use to text them a new password in the event of a data breach. Facebook said the desktop security message, already seen by millions of users in the U.S., will be on all accounts in the next few days. Skeptics are far from pleased with the move, suggesting that the Menlo Park web giant is taking advantage of the recent leaks to prise yet more personal data out of their users under a benevolent guise. Admittedly, it’s unlikely to be something that appeals to the Internet’s more paranoid surfers, assuming they even use Facebook to begin with.

  • Microsoft India Store hacked, Passwords were stored in plain text

    Microsoft India Store hacked, Passwords were stored in plain text

    The Microsoft India Store was hacked in India earlier today and users who visited the site were met with a “Anonymous” like image and the name of the hacker group called Evil Shadow Team, who, in addition to putting a new face on Windows products, revealed that user passwords were saved in plain text.

    The intentions of the group are unknown , but since the attack the site has gone down and is now under tinkering from Microsoft for improved security measures.

  • Nook E Reader/Tablet gets the root treatment, boot loader still locked

    Nook E Reader/Tablet gets the root treatment, boot loader still locked

    The Kindle fire is already been rooted and in an easy process at that. The smart folks at XDA-Developers have found a way to root the Barnes and Noble tablet. The root is permanent and will stay even if you reboot the device. The boot loader still remains locked but the process allows you to side load apps and possibly custom rome and kernels to boost performance.

     

    [xda forums]

  • Exploit found in Siri’s server would allow you to use Siri on all iDevices, if You own a iPhone 4S

    Exploit found in Siri’s server would allow you to use Siri on all iDevices, if You own a iPhone 4S

    A new twist of development has taken place in porting Siri to other Apple devices. A new exploit found would allow users that already own a iPhone 4S to enjoy the exploits of Siri on other iDevices. Sure a unique identifier could be formed but Apple would easily find it and ban it for abuse. 

    The best thing here is that this may actually hold possibility for Siri to be ported over to Android and other platforms. But the situation will always remain same. You will need an identified for the software to work with Apple’s servers. 

    So, its time to really see if the friend with an iPhone 4S is actually a true friend.

    [Applidium]

  • Siri Fully ported and running on iPhone 4 and iPod Touch 4th gen yet with no future

    Siri Fully ported and running on iPhone 4 and iPod Touch 4th gen yet with no future

    Troughton-Smith has been able to successfully port Siri to the iPhone 4 along with a full connection to Apple Servers. The video below not only shows the Siri functionality on an iPhone 4, but is in depth and shows a side-to-side comparison against its newer, faster sibling, the iPhone 4S. The port proves that the software can easily be enabled on the older device and hence points a finger at Apple for not doing so.

    Smith did use a jailbroken iPhone 4s to port the necessary files to the older iPhone 4 which was also jailbroken. When asked if he would seed Siri as a package on Cydia he replied

    No, I could not be a part of that. I have no doubts that others will package this up and distribute it quasi-illegally, or try and sell it to people. I am only interested in the technology and making it work; proving that it works and works well on the iPhone 4 and other devices.

    So despite the fact it can be done, Smith will not be the one to enable it on your device. Apple has to man up to the truth and enable it for the users, until some Jailbreak dev who is not afraid of Apple Law-Suits does it anyway.

     

  • Cyanogen Mod 7 Comes to Touchpad in Alpha Build

    Cyanogen Mod 7 Comes to Touchpad in Alpha Build

    The folks over at Rootzwiki and the Touchdroid team (whatever is left of it anyway) has finally managed to get CM7 running on the Touchpad, worth noting. The device looks be be running pretty smoothly with most of the aspects working well including Skype calling.

    Note that the build is still alpha and while most things work there is a high chance that things can go wrong. Head over to the link below if you feel like doing it anyway.

     

    [RootzWiki]

  • HTC Confirms devices holding data, promises quick fix

    HTC Confirms devices holding data, promises quick fix

    HTC has confirmed after inspecting the security vulnerability that surfaced over the weekend, that allows any app requesting internet access to take a peek at a user account information, GPS location, system logs, and other potentially private data. They have issued a statement on the same which is below. Check it out.

     

     

    HTC Public Statement

    HTC takes claims related to the security of our products very seriously. In our ongoing investigation into this recent claim, we have concluded that while this HTC software itself does no harm to customers’ data, there is a vulnerability that could potentially be exploited by a malicious third-party application. A third party malware app exploiting this or any other vulnerability would potentially be acting in violation of civil and criminal laws. So far, we have not learned of any customers being affected in this way and would like to prevent it by making sure all customers are aware of this potential vulnerability.

    HTC is working very diligently to quickly release a security update that will resolve the issue on affected devices. Following a short testing period by our carrier partners, the patch will be sent over-the-air to customers, who will be notified to download and install it. We urge all users to install the update promptly. During this time, as always, we strongly urge customers to use caution when downloading, using, installing and updating applications from untrusted sources.

    [Engadget]

  • Team-Touchdroid dual boots Android on TouchPad

    Team-Touchdroid dual boots Android on TouchPad

    While we still un-package our touch pads, Team Touchdroid has managed to dual boot WebOS and Android 2.3 on he Touchpad. Since the Fire sale, touch pads are all over the place and everyones got in on the action. Especially folks trying to boot Cyanogen Mod 7 on the Touchpads. But looks like its going to be stock droid for now.

    For the time being the touchscreen is not working, but expect a quick fix. If you managed to score a Touchpad this might interest you.

     

  • Apple iOS 4.3.4 will Fix the Jailbreak and Security Flaws.

    Apple iOS 4.3.4 will Fix the Jailbreak and Security Flaws.

    [dropcap]T[/dropcap]he PDF exploit that was used in JailreakMe last year which allowed a one tap Jailbreak and a fast unlock for users. Apple had fixed the flaw in its early stages and now its back. Looks like that is the reason for the quick iPad 2 Jailbreak and the new exploit the Jailbreakers have been enjoying. According to the Wall Street Journal, Apple acknowledged the exploit, and is working on an update. The said update will not only fix the JailbreakMe 3.0 exploit but also another exploit that could allow unwanted eyes to your information.

    [Wall Street Journal]

  • After 50 days of Hacking ; LulzSec Retires

    After 50 days of Hacking ; LulzSec Retires

    On Saturday, the hacking group LulzSec, aka the Lulz Boat, said that it was ceasing operations. In what the group said was its final act, LulzSec also released a fresh set of stolen documents and files.

    [quote]For the past 50 days we’ve been disrupting and exposing corporations, governments, often the general population itself, and quite possibly everything in between, just because we could. We hope, wish, even beg, that the movement manifests itself into a revolution that can continue on without us. said the group in a statement[/quote]

    The group made its name after attacking a number of high visability targets recently, including Sony, the CIA’s website, and the U.S. Senate. It’s unclear if the group’s decision was made after its leader and chat logs were exposed, but the group makes a convincing argument that a 50-day hack-fest was planned the entire time.According to security experts, the group was disbanded due to  increasing pressure from the law. Authorities in Britain last week arrested 19-year-old Ryan Cleary, who had been linked to LulzSec.

    At least some of the group’s six members already appear to be continuing their work elsewhere.

     

  • Governments vs Hackers – Cyberwar Continues #AntiSec

    Governments vs Hackers – Cyberwar Continues #AntiSec

    The AntiSec Campaign which started a few days ago as a partnership between hacker groups LulzSec and Anonymous, is a cat and mouse game between the hackers and the governments they target. One member of LulzSec, Ryan Cleary, a 19 year old from Wickford, Essex, UK, is suspected by authorities to be a leader of the group as well as being the brains behind the attacks on the FBI, CIA and Sony sites. He was arrested by British Police yesterday in a “pre-planned intelligence raid”. He has allegedly performed these acts from a computer in his mother’s house.

    In another part of the world, the Brazilian wing of LulzSec seems to be accomplishing their mission(s) quite well. In a tweet from Lulzsec, the group congratulated their Brazilian unit.

    [quote]Our Brazilian unit is making progress. Well done @LulzSecBrazil, brothers![/quote]

    Meanwhile, Anonymous has not been sitting idle. In a video released a few hours ago, the group urged anyone from around the world who believed in freedom of speech and anti-censorship of the Internet to stand up for their rights and join them.

     

    This cyber war seems to be heating up, with the hackers targeting governments around the world. We shall keep you updated on the action as it happens. Stay tuned.

  • Anonymous and LulzSec Announce New Campaign

    Anonymous and LulzSec Announce New Campaign

    The two most famous hacker groups in recent times have united in a campaign which they call AntiSec. The targets include banks, government organizations, and other high profile targets. They are urging hackers from around the world to unite to steal and leak classified documents, e-mails, and other information. [quote]We hear our #Anonymous brothers are making progress with #AntiSec, we also have reports of many rogue hacker groups joining in. :D[/quote]  the group tweeted a few hours ago.

    The campaign seems to have hit its first official target target today. The website of UK based Serious Organised Crime Agency was down today. In another tweet, it appears pastebin, the text sharing site appears to be down. LulzSec suspects the UK Government to have perpetrated an attack against the site as the group uses it to distribute materials. They tweeted:[quote]#DearGovernment did you DDoS @Pastebin b/c of this pastebin.com/9KyA0E5v #AntiSec or is that b/c of us reading it?[/quote] When we visited the website, this is what we found:

     

     

    LulzSec is a group that recently targeted the CIA, the FBI, and Sony among others. The group seems to want to embarrass their targets just for kicks and are speculated to be an offshoot of Anonymous.

    Anonymous is a group that targets governments and organizations for political reasons and mostly in the support of freedom of speech. In the past they have targeted the governments of Iran, Turkey and Egypt. They have also targeted Sony for the company’s legal action against PlayStation 3 hacker George Hotz, and Paypal, MasterCard and VISA after they removed their services from the WikiLeaks website which enabled the site to receive donations.

    Stay tuned for more news on the on-going cyber war.

  • 360,000 Credit Cards Leaked in Recent Hack-Attack to CitiGroup

    360,000 Credit Cards Leaked in Recent Hack-Attack to CitiGroup

    In a recent cyber attack by LulzSec, while earlier Citigroup officials claimed that 200,000 creditcards were compromised. This time around they claim that infact 360,000 credit cards have been compromised and the information has been stolen by LulzSec.

     

     

    [quote]Hackers gained access to a total of “360,083 North America Citi-branded credit cards.Hackers gained access to a total of “360,083 North America Citi-branded credit cards.[/quote]

    The bank also claims that more than 70% of the credit cards have already been replaced, and that the maximum Credit Cards were from California.

    LulzSec the infamous hacking group behind many recent cyber attacks, including various at Sony, Has not yet mentioned any involvement in the case.

  • HTC will not lock Bootloaders on Future Phones

    HTC in a brief message on their Facebook account stated:

    “There has been overwhelmingly customer feedback that people want access to open bootloaders on HTC phones. I want you to know that we’ve listened. Today, I’m confirming we will no longer be locking the bootloaders on our devices. Thanks for your passion, support and patience,” Peter Chou, CEO of HTC

     

    This is great news for especially those who like to play around with different roms and customizations, hopefully the Sensation will belong to this category.

iGyaan Network
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.