The Internet is probably the most widely used form of communication
on earth and our dependency on it increases every day. Almost anything
can be conducted on the internet, and with such widespread use, the
number of cyber criminal activities also increases.
Recently, the Federal Bureau of Investigation has succeeded in
disrupting an international cyber crime syndicate; a botnet operation
that had affected two million computers. A botnet is a collection of
infected computers or bots that have been taken over by hackers and are
used to perform malicious tasks or functions. A computer becomes a bot
when it downloads a file (e.g., an email attachment) that has bot
software embedded in it.
Authorities believed that Coreflood infected more than two million
PCs, enslaving them into a botnet that grabbed banking credentials and
other sensitive data. Its masters then used the details to steal funds
via fraudulent banking and wire transactions, the US Department of
Justice said yesterday. The vast majority of the infected machines were
in the US, but the criminal gang was likely based overseas. Security
experts said it was hard to know how much money the gang stole. It could
easily be tens of millions of dollars and could go above $100 million,
said Dave Marcus, McAfee Labs research and communications director.
Security experts are pretty sure the Russians were behind it. A civil
complaint against 13 unnamed foreign nationals was also filed by the US
district attorney in Connecticut. It accused them of wire and bank
fraud. The Justice Department said it had an ongoing criminal
investigation. "Botnets and the cyber criminals who deploy them
jeopardize the economic security of the United States and the
dependability of the nation's information infrastructure," Shawn Henry,
executive assistant director of the FBI's Criminal, Cyber, Response, and
Services Branch, said in a statement.
Coreflood started out as an internet relay chat (IRC) bot used for
attacking other IRC users. Over time however, it evolved into a TCP
proxy as part of an anonymity service, and then later into a
full-fledged info stealer Trojan. The last several years Coreflood has
maintained a low profile while other more prolific botnets came to the
forefront of public attention. However, just recently the group behind
Coreflood escalated their activity until it was brought down by the FBI.
In 208, a ring of cyber bank robbers from southern Russia breached
inside company networks. They infected every PC within reach with a
custom-made data-stealing program using Coreflood. The Coreflood Gang
infected swaths of PCs inside thousands of companies, hospitals,
universities and government agencies, says SecureWorks researcher Joe
Stewart, who has tracked and documented the spread of Coreflood over
that period. Says F-Secure researcher Patrik Runald, "This is very
organized crime. These gangs are hiring people and making tons of
money". The Coreflood Gang is among the most sophisticated. "It's spying
on you, capturing your log-ons, user names, passwords, bank balances,
contents of your e-mail," Stewart says.
US Government programmers shut down the Coreflood botnet on Tuesday.
They also instructed the computers enslaved in the botnet to stop
sending stolen data and to shut down. It was the first time US
authorities had used this method to shut down a botnet, according to
court documents. "The seizure of the Coreflood servers and internet
domain names is expected to prevent criminals from using Coreflood or
computers infected by Coreflood for their nefarious purposes," US
Attorney David Fein said in a statement.
Companies need to secure their network security. IT professionals
need to understand the latest hacking trips and methodologies that are
out there by undergoing technical security training programs.
EC-Councils brand new TakeDownCon is a technical information security
conference series, in addition to learning from some of the best
security experts, TakeDownCon also offers highly sought after technical
training courses, including the Certified Ethical Hacker (CEH) course,
often touted as the worlds most comprehensive ethical hacking training
program.
The CEH Program certifies individuals in the specific network
security discipline of Ethical Hacking from a vendor-neutral
perspective. The Certified Ethical Hacker certification will fortify the
application knowledge of security officers, auditors, security
professionals, site administrators, and anyone who is concerned about
the integrity of the network infrastructure. A Certified Ethical Hacker
is a skilled professional who understands and knows how to look for the
weaknesses and vulnerabilities in target systems and uses the same
knowledge and tools as a malicious hacker.
The Black Hat Hacker - Black Hat and White Hat Hacking. What are Black Hat and White Hat Hacker, Ethical Hackers and Certified Ethical Hackers. HACKERS BLOG
Facebook Fan Likes, I know how to get thousands of them !
Ok, this is a little post aside from the usual hacking Facebook accounts stuffs.
I created a page on Facebook and found it very tiring to get Fan Likes, and likes are what differentiate good pages among crap pages. I set a goal of 5000 Likes and I was just starting on my journey to the 5K !
Good content attracts Likes and not 5K of them, I had to look for another option and that's when I found LikeUp.
I created a page on Facebook and found it very tiring to get Fan Likes, and likes are what differentiate good pages among crap pages. I set a goal of 5000 Likes and I was just starting on my journey to the 5K !
Good content attracts Likes and not 5K of them, I had to look for another option and that's when I found LikeUp.
Get thousands of Fans
on your Facebook page!
Join the largest community for sharing likes. Get new, genuine fans everyday on your Facebook page. Boost your popularity with LikeUb!
Well, i was as sceptic as you but, Until i tried and got 1500 is a week.
SignUp Link:
Hack Proofing your identity - Hacking Ebook
Stealing someone's identity in this digital era is no more a big deal.
Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs.
Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime.
Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online.
Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet.
The author is the CEO of Hackademia, a firm focused on security education.
Happy reading :D
Download Here
Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs.
Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime.
Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online.
Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet.
The author is the CEO of Hackademia, a firm focused on security education.
Happy reading :D
Download Here
Labels:
hack proof,
hacking ebook,
identity theft
Subscribe to:
Posts (Atom)