Thursday 31 March 2011

Facebook Web Search Box May Be Dangerous


Facebook users be warned: If you see a second search box at the top of your personal page, don’t use it.

“We are not testing the placement of a separate Web search field and have no plans to do so,” a Facebook representative told the blog Search Engine Land. An image of a Facebook page with two search boxes has been making its way around the Internet for the past few days.




In the image, the standard box that lets you search Facebook is visible at the top of the page, but just to the right of it is another search box reading “Search the Web.”

Some tech news sites and blogs speculated that Facebook was testing out its own search engine, perhaps to challenge Google or to partner with a Google competitor such as Blekko or Microsoft’s Bing.

The Facebook representative, however, said it’s likely a hack.

“We believe the second search field or ‘Search the Web’ box appeared on people’s accounts as the result of unknown actions by a third party targeting the browser (potentially a browser plugin or malware) unrelated to Facebook,” he or she told Search Engine Land.

Or, as the TechCrunch blog said, it could just as easily be a Photoshop hoax.


Wednesday 30 March 2011

20 pakistan sites defaced by APH

The Ten Biggest Cyber Security Threats for 2011 !

PandaLabs, the antimalware laboratory of Panda Security, the cloud security company, has forecasted several radical innovations in cyber-crime for 2011. Hacktivism and cyber-war; more profit-oriented malware; social media; social engineering and malicious codes with the ability to adapt to avoid detection will be the main threats in the coming year. There will also be an increase in the threats to Mac users, new efforts to attack 64-bit systems and zero-day exploits.

Following is a summary of what PandaLabs predicts as the ten major security trends of 2011:

1.
Malware creation: In 2010, PandaLabs witnessed significant growth in the amount of malware and discovered at least 20 million new strains, more than in 2009. At present, Panda’s Collective Intelligence database stores a total of more than 60 million classified threats. The actual rate of growth year-on-year however, appears to have peaked. Several years ago it was over 100 percent and in 2010 it was 50 percent.
2.
Cyber war: Stuxnet and the WikiLeaks cables suggesting the involvement of the Chinese government in the cyber-attacks on Google and other targets have marked a turning point in the history of these conflicts. Stuxnet was an attempt to interfere with processes in nuclear plants, specifically, with uranium centrifuge. Attacks such as these, albeit more or less sophisticated, are still ongoing, and will undoubtedly increase in 2011, even though many of them will go unnoticed by the general public.
3.
Cyber-protests: Cyber-protests , or hacktivism, are all the rage and will continue to grow in frequency. This new movement was initiated by the Anonymous group and Operation Payback, targeting organizations trying to close the net on Internet piracy, and later in support of Julian Assange, editor-in-chief of WikiLeaks. Even users with limited technical know-how can join in the distributed denial of service attacks (DDoS) or spam campaigns.
Despite hasty attempts in many countries to pass legislation to counter this type of activity effectively by criminalizing it, PandaLabs believes that in 2011 there will be more cyber-protests, organized by this group or others that will begin to emerge.
4.
Social engineering: Cyber-criminals have found social media sites to be their perfect working environment, as users are even more trusting with these than with other types of tools, such as email.
Throughout 2010, PandaLabs witnessed various attacks that used the two most popular social networks – Facebook and Twitter – as launching pads. In 2011, not only will hackers continue to use these networks, but it is predicted that they will also be used more for distributed attacks.
BlackHat SEO attacks (indexing and positioning of fake websites in search engines) will also be widely employed throughout 2011, as always, taking advantage of hot topics to reach as many users as possible. In addition, a significant amount of malware will be disguised as plug-ins, media players and other similar applications.
5.
Windows 7 influencing malware development: It will take at least two years before there is a proliferation of threats designed specifically for Windows 7. In 2010, PandaLabs began seeing a shift in this direction, and predicts that in 2011, new cases of malware targeting users of this new operating system will continue to emerge.
6.
Mobile phones: In 2011 there will be new attacks on mobile phones, but it will not be on a massive scale. Most of the existing threats target devices with Symbian, an operating system which is now on the wane. Of the emerging systems, PandaLabs predicts that the threats for Android will increase considerably throughout the year, becoming the number one mobile target for cyber-crooks.
7.
Tablets: The dominance of the iPad will start to be challenged by new competitors entering the market. Therefore PandaLabs does not believe that tablet PCs will become a major consideration for the cyber-criminals in 2011.
8.
Mac: Malware for Mac exists, and will continue to exist. And as the market share of Mac users continues to grow, the number of threats will grow. The greatest concern is the number of security holes in the Apple operating system. Developers will need to patch these holes as soon as possible, as hackers are well aware of the possibilities that these vulnerabilities offer for propagating malware.
9.
HTML5: HTML5 is the perfect target for many types of criminals and could eventually replace Flash. It can be run by browsers without any plug-ins, making it even more attractive to find a security hole that can be exploited to attack users regardless of which browser they use. PandaLabs expects to see the first attacks on HTML5 in the coming months.
10.
Highly dynamic and encrypted threats: PandaLabs expects dynamic and encrypted threats to increase in 2011. PandaLabs is receiving more and more encrypted, stealth threats designed to connect to a server and update themselves before security companies can detect them. There are also more threats that target specific users, particularly companies, as information stolen from businesses will fetch a higher price on the black market.

NASA’ Computer Have Potentially Catastrophic Security Holes !


NASA’s internal computer network is full of holes and is extremely vulnerable to an external cyberattack, an audit by the Office of the Inspector General has found. Even worse, it appears several of the vulnerabilities have been known for months, yet remained unpatched.

“Six computer servers associated with IT [information technology] assets that control spacecraft and contain critical data had vulnerabilities that would allow a remote attacker to take control of or render them unavailable,” the audit report released today (March 28) by Inspector General Paul K. Martin said.

“The attacker could use the compromised computers to exploit other weaknesses we identified, a situation that could severely degrade or cripple NASA’s operations,” the report continued. “We also found network servers that revealed encryption keys, encrypted passwords, and user account information to potential attackers.”

It is not unusual for previously unknown network security holes to be found in large organizations. In that light, Martin’s audit might have been seen as positive for revealing the vulnerabilities.

But it’s long been known that security on NASA networks is weak. Martin’s office released a previous audit report nearly a year ago, and since then nothing has been done to remedy the situation.

“In a May 2010 audit report, we recommended that NASA immediately establish an IT security oversight program for this key network,” today’s report reads. “However, even though the Agency concurred with the recommendation it remained unimplemented as of February 2011.”

“Until NASA addresses these critical deficiencies and improves its IT security practices,” it goes on to say, “the Agency is vulnerable to computer incidents that could have a severe to catastrophic effect on Agency assets, operations, and personnel.”

A Government Accountability Office report in October 2009 was similarly critical of the agency, finding that “NASA has not yet fully implemented key activities of its information security program to ensure that controls are appropriately designed and operating effectively.”

NASA’s servers have been broken into many times in the past. Martin’s new report mentions two serious breaches in 2009, during one of which intruders stole “22 gigabytes of export-restricted data from a Jet Propulsion Laboratory (JPL) computer system.”

British hacker Gary McKinnon is awaiting extradition to the U.S. for allegedly hacking into NASA’s networks, as well as those of the Department of Defense, in 2001 and 2002.

Martin’s office recommends that NASA “expedite implementation of our May 2010 recommendation to establish an IT security oversight program for NASA’s Agency-wide mission network.”

You can read the full report : http://oig.nasa.gov/audits/reports/FY11/IG-11-017.pdf

Camtasia Studio 7 + Serial Keys


Camtasia Studio 7 + Serial Keys

Hello! i'll Show You How To Get Camtasia Studio 7! The Best Screen & Adiou Capture! Free of Cost


1.Start Off By Downloading Camtasia Studio 7 Here (http://www.techsmith.com/download/camtasia/) & Enter Your Fake Or Real E-Mail, I Used A Fake One.
...
2. When You've Downloaded It, Install & Untick The Box "Run When Installed".

3. Alright, Now Once You've Installed It, Open It & Register With One Of The Following Serial Codes:
--///---
single user licenses:

C2CCW-AMCC2-C7CCC-4KFNG-4R4D5
--==--
Multi users licenses :

NWC2S-AC5WC-F869J-MFX7A-ACBMD

Academic user licenses :

5WCY8-GRFFD-992CK-L4V8H-86CDA

4. Once You've Registered It, Now You Can Record And Put It On Youtube In HD Quality! And The Finished Recording File Is In A Low Size, Like This 5 Minute Recorded Movie:

5. Enjoy Your New Screen & Audio Recorder!
See More