Some members of Anonymous have announced their intention to ‘kill Facebook’ on 5 November.
Taking the monologue-ing Bond villain approach, those planning the attack have released a video explaining their motives as well as revealing the Fireworks Night date.
“Join the cause and kill Facebook for the sake of your own privacy,” the video statement says.
It goes on to claim that, “Facebook has been selling information to government agencies and giving clandestine access to information security firms so that they can spy on people from all around the [...]
Each tool is described by one ore more attributes:
Generally costs money. A free limited/demo/trial version may be available.
Works natively on Linux
Works natively on OpenBSD, FreeBSD, Solaris, and/or other UNIX variants
Works natively on Apple Mac OS X
Works natively on Microsoft Windows
Features a command-line interface
Offers a GUI (point and click) interface
Source code available for inspection.
Please send updates and suggestions (or better tool logos) to Fyodor. If your tool is featured or you think your site visitors might enjoy this list, you are welcome [...]
Hacking collective LulzSec has decided to stop giving online gaming sites a hard time and instead put its efforts into taking down the CIA’s website and the FBI’s phone network.
Yesterday the group managed to DDoS the CIA’s homepage and along with it the FBI’s phone network in Detroit.
As per usual LulzSec kept everyone updated with its hacking shenanigans on Twitter, posting on the site: “Tango down – CIA.Gov- for the lulz.”.
According to reports, it wasn’t just the CIA and the FBI, either – the US Senate’s website was also a target, [...]
And just when you thought it was safe to go back online on Sony, and their online services such as the PlayStation Network, a group called LulzSec today has managed to hack SonyPictures.com, resulting in over 1 million accounts being compromised.
Greetings folks. We’re LulzSec
We recently broke into SonyPictures.com and compromised over 1,000,000 users’ personal information.
As was revealed in PlayStation Network breach last month, SonyPictures.com hack exposed the fact that Sony once again was caught storing sensitive information, such as user account passwords, in plain text format [...]
Even careful PC users can fall prey to the sticky fingers of evil malware. Loading an innocent looking file from a USB stick, clicking the wrong link in search results, cancelling a suspect alert box – all these actions could mark the beginning of a malware infection.
And let’s not be coy – if your internet activities include downloading torrents or using pirated software, you’re even more likely to fall prey to worms, spyware and trojans.
In some ways, discovering that your computer is virally infected is worse than realising that it’s been compromised mechanically. [...]
A scareware programme known as ‘Mac Defender’ is currently causing an increasing number of Mac users woe by demanding payment to remove viruses it claims to have found on their machines.
The programme appears to automatically download to unprotected machines, exploiting the default ‘open files after download’ setting of most web browsers.
Although the user must provide an administrator name and password to install the bogus software, a ‘significant number’ of users seem to have done just that.
The software then autoruns, makes out like its scanning [...]
What this infection does:
Security Shield is a rogue anti-spyware program from the same family as Security Tool. This rogue is installed through other malware and fake online anti-malware scanners. When installed, Security Shield will be configured to start automatically when Windows starts. Once started, it will perform a scan of your computer and state that there are numerous infections present on your computer. If you attempt, though, to remove any of these so-called infections the program will state that you first need to purchase it. In reality, all of the files it states [...]
Stuxnet, the complex computer worm that nearly crippled Iran’s still-functioning nuclear program, didn’t just sprout from the ether. It was created, by Man, and was probably tested in Israel at the massive (and oft-unacknowledged) Dimona nuclear facility.
Previously, Dimona was the center of Israel’s super secret nuclear arms program. Located in the Negev desert, it has never been acknowledged as anything but a—well, anything really, but conventional wisdom says the arms and fuel are there.
Today, however, Dimona is also being labeled as the front in the burgeoning [...]
Normally when you try to download trial version of security products from Symantec site they ask users to enter their debit or credit card number for 30 days trial.
And when any of installed trial product get expired they automatically charge users for next 12 months subscription except user cancel out trial version order within the 30 days of trial period which they may forgot to do.
Now, here we found some direct download links of 90 days trial versions of Norton Antivirus 2011, Norton Internet Security 2011, and Norton 360 v4 instead of 30 days trials which could be downloaded and installed [...]
While we are all waiting for jailbreak tools for iOS 4.1 (based on SHAtter exploit) to release officially, a fake tool is floating around the interwebs under the name of GreenPois0n which is claiming to jailbreak all iOS devices from 4.0.2 and above. The fake tool is actually a very dangerous malware which upon running which steal passwords (though it is not clear if it steals passwords from your iOS device or PC). I repeat: it is not the real GreenPois0n tool which is expected to jailbreak iOS 4.1 on iPhone 4, iPod touch and iPad.
According to the security experts at Kaspersky: