Sunday, July 3, 2011

Apply credit card, loans, bad credit, is it safe?


Apply credit card is risky in these days, low interest credit cards shouldnt be given, hackers were always aware of the benefits of the global credit cards suppliers as also the attractive cash back credit cards got into points to be a easy to use cash out service.

Credit card hacking, stealing, selling and frauding is around since ages, as i know its been around since credit cards offers are around. Loans are aspecially developed systems to enslave humans and why shouldnt human missuse this. Someone thought someone got used to it.

As the web presence creditcards.com presents the statistics for the last months most used payments and usements for credit cards.
Credit Card Rate Report

Updated: 06-30-2011
National Average 14.75%
Low Interest 10.73%
Balance Transfer 12.78%
Business 13.07%
Student 13.77%
Cash Back 13.90%
Reward 14.28%
Airline 14.31%
Instant Approval 15.99%
Bad Credit 24.96%

On bottom you can see BAD CREDIT is the main usement of credit cards. These are loans that are payed by fees and are so called throw away credit cards for single use or till the fee amount is reached. These prepayed credit cards opened a new door for cyber crime as they can be used and thrown away as also take place anonymously when only used prepayed. Like Prepayed cell phone cards where used to not get tracked along.
Last day the credit card supplier mastercard.com again got ddosed by the collective anonymouse cause they shut down again the donation account of the wistleblowing platform wikileaks powered by julian assange. In fact the Attack really doesnt damage this huge company - only a few hours customers werent able to get on their page caused by the massive ddos that was running. So long the attacks stopped all the way and the site is accessable again.

Wednesday, June 22, 2011

On line data storage solution dropbox code fails, logins messed!

The on line data storage data backup service DROPBOX got in serious security trouble this week.
on line data storage backup service
Dropbox op posted on their blog that a massive security hole because of trouble with dropbox codes occured - every user of the storage service was able to log in with any password in any account - the security of the storage service totally failed and let every user in and take a look at any data provided on the internet backup service.

For over 4 hours the error was present and the backup service provider claims that around 1% of users logged in in this time to their drop box account. So maybe there happened no violation or abuses.
everythings alright
In fact be care when uploading data any where to the net or any online storage provider! As long they are not encrypted your data can seriusly be harmed or abused!

Thursday, June 9, 2011

Internet phone services skype , sources sold to russia!

The internet phone service skype, which is an voip service, not an business voip at all but a realiable cheap voip service for personal use.
voip service
 In fact phoning from one skype user to another is for free, as most internet phone services out there, best way of usage is via broadband, so call it broadband phone if you like to.

broadband voip services
 The russian new vedomosti and the press agency bloomberg are today talking about an cooperation between microsofts skype and the russian secret service FSB. If its real what they say, microsoft is willing to handle out parts of the source code to FSB, wouldnt be nice in any way... KGB reloaded!
voip kgb
So this VOIP service got compromitted! RIP, the code will be out all over soon i think.

GVU accident , DDOS started site down , a few hours after Kino.to got busted!

GVU webpresence is accidentially not reachable anymore, the reason is it got DDOSD obviously by fans of Kino.to cause the site got down a few hours after the message made it around the globe that 13 people where looked up in jail, including the operator of kino.to
404

The servers seem up now again but the DDOS remained the whole night until 8am in the morning, some statements are also readable around the net saying "We will be back" obviously posted by members of the platform kino.to.
ddos tux

by the way check out g-stream.in you would probably like the site if you where a kino.to fan.

Wednesday, June 8, 2011

Kino.to raid and busted, 13 People arrested!

Kino.to is dead for now! Accident happend lawyer needed!

Kino.to has today been defaced and the page has been replaced by the german criminal police!
More than 250 Police officers 20 Special forces for internet security and information raided the whole company.
Further many streamhosting pages got taken down as well, they didnt get raided by the police train accident, but many providers closed their web presence.

Police demands their work with:
To raise suspicion development of an criminal organisation to commercial handling of illegal or copyrighted material and in effect getting funds from this system. simply: copyright violation

in long study case, police found that kino.to hosts many streaming hosts by itself to keep the site running so they are directly  responsible for most of the content they hosted!



Layer 8 train accident attorney , technic works human failed!

As for now i bring this back up cause i want to show again human brains are tend to fail machines ever work their process, train accident humans can be train d to override accidents but as here in attorny this failed.
 Poor fail again when humans fail at computing or at operating machines, terribly this happens in the worst case when  humans do big things, flying a jet plane, driving a train, moving a crane - for this case every of this big big machine has its own technical system to help the user out when his brain cant get it anymore. Train accident could probably be stopped by a pedal the driver always has to push to keep the train running or as its on air jet plane the pilot needs to be in contact with an tower or officer to make sure he is a awake and alife.
Accident claim could be a big fail and also in future it could harm innocent people, so in this case get a lawyer probably an accident lawyer to fit and fight your rights.

26 people were killed and approximately 130 more were injured when a Metrolink commuter train crashed head-on into a freight train outside of Los Angeles on September 12, 2008. The crash may have been preventable, as preliminary investigations are revealing that the Metrolink conductor failed to stop at a red signal. Even more devastating is the fact that the conductor’s failure to stop could have been due to him being distractied while text messaging.

Damn  this got me to think, cheers folks and check your insurances ;)

Tuesday, June 7, 2011

Graphic cards gpu technology breaks passwords faster than every cpu!

I got around the progtram IGHASHGPU  and rapidly found that graphic cards gpus shouldnt be underrated these days! 
ighashgpu

An AMD Radeon 5770 can crack an standard password with 5 characters in under one second, a normal cpu with about 3GHz would need to spend about 24 seconds on thsi operation.
Another password with about 6 characters uses an normal CPU about 1 and a half hour, while the GPU of the Radeon 5770 manages to crack this word in ~4 seconds.
With an passwort with 7 chars where one is an space, an normal CPU would need about 75 days for this operation, our GPU fucks the password up in about ~7 hours! 
multiple gpu


So in future if we think of an SLI moded Graphiccard with more power than this mid-range card we used here, passwords could be breaked really fast in no time, what took as about 50 years for now can be done i about 5 weeks or less depending on the GPU powers...


so long here is an crack report of multiple GPUS with IGHASHGPU:
for example, result for HD5770+HD4770+8600GT looks like:

****************************************************************
***      MD4/MD5/SHA1 GPU Password Recovery v0.70.48.4       ***
***    For ATI RV 7X0 cards and nVidia 'CUDA' ones (G80+)    ***
***      (c) 2009-2010 Ivan Golubev, http://golubev.com      ***
***             see "readme.htm" for more details            ***
****************************************************************
*** Any commercial use of this program is strictly forbidden ***
****************************************************************

Found 2 CAL device(s)
Found 1 CUDA device(s)
Starting brute-force attack, Charset Len = 36, Min passlen = 4, 
Max passlen = 7
Charset (unicode -> 0) [abcdefghijklmnopqrstuvwxyz0123456789]
Charset in HEX: 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 
70 71 72 73 74 75 76 77 78 79 7a 30 31 32 33 34 35 36 37 38 39
Starting from [aaaa]
Hash type: MD5, Hash: cbe1d6d5800ec1e03a5f2a64882a0d41
We're running at ATI and NVIDIA GPUs simultaneously.
Device #0: [RV830] 850.00 Mhz 800 SP
Device #1: [RV7x0] 750.00 Mhz 640 SP
Device #2: [GeForce 8600 GT] 1188.00 Mhz 32 SP
Hardware monitoring disabled.
CURPWD: 66owsnc DONE: 51.02% 
ETA: 13s CURSPD: 2756.0M=1646.0M+1017.4M+92.6M
Found password: [roger15], HEX: 72 6f 67 65 72 31 35
Processed 42 228 252 672 passwords in 16s.
Thus, 2 731 452 307 password(s) per second in average. 
Gert some GPUS get yourself an lawyer, an insurance, some passwords and crack the hell out of em! CHEERS
Tramadol
 As my picture above describes, i will get me a bunch of tramadol or zolpidem and chill out till my 12 char pw got cracked =P cheers folks!

Monday, June 6, 2011

Cisco announces filesharing technology will hit upwards till 2015!

Cisco announces filesahring and its traffic will double up till 2015.

Cisco announces a new study in technology around the internet every few years and thsi year the news tell us that file sahring will go straight upwards and double up till 2015.
Sharing grows in an big dimension, long story short this is what Ciscos Visual Networking Index told us.


Constructive Economy tries to set file sharing to an state of an bad view, it tries to promote it as something simple cruel bad, but they fail in any way :) sharing isnt that bad and its the main part of the internet.

In 2015 there should flow about 13.797 Petabyte around the globe for filesharing
and in 2010 it was around 5.000 Petabyte - this upgoing traffic is massive.

Friday, June 3, 2011

Sony got hacked again and again and again...

Yesterday a new sony hack came up, the company got hacked again and around 20.000 free music coupons and user data has been released on the web. Another massive leak and it seems that sony really doesnt care about security nor their users and payers...

_____|\                    
              _.--| LOL |:                    
             <____|.----||                    
                    .---''---,                
   The               ;..__..'    _...         
    Lulz           ,'/  ;|/..--''    \        
     Boat        ,'_/.-/':            :       
            _..-'''/  /  |  \    \   _|/|     
           \      /-./_ \;   \    \,;'   \    
           ,\    / \:  `:\    \   //    `:`.  
         ,'  \  /-._;   | :    : ::    ,.   . 
       ,'     ::   /`-._| |    | || ' :  `.`.)
    _,'       |;._:: |  | |    | `|   :    `' 
  ,'   `.     /   |`-:_ ; |    |  |  : \      
  `--.   )   /|-._:    :          |   \ \     
     /  /   :_|   ;`-._;   __..--';    : :    
    /  (    ;|;-./_  _/.-:'o |   /     ' |    
   /  , \._/_/_./--''/_|:|___|_,'        |    
  :  /   `'-'--'----'---------'          |    
  | :     O ._O   O_. O ._O   O_.      ; ;    
  : `.      //    //    //    //     ,' /     
~~~`.______//____//____//____//_______,'~     
          //    //~   //    //                
   ~~   _//   _//   _// ~ _//     ~           
 ~     / /   / /   / /   / /  ~      ~~       
      ~~~   ~~~   ~~~   ~~~ 
 
The LULZSEC crew has broken into
„Sony Pictures International“ 
„Sony Music Netherland“ 
„Sony Music Belgium“ 
 
 
Actual news about the leak can be found here: 
http://twitter.com/#!/lulzsec
 
LULZSEC announced that the are waiting for some donations 
via bit coins yesterday evenening.
Today at 10:00 am they posted: "We will take a break and 
then the hacks will continue, thnaks for donation"
Really another bad sad day for the sony entertainment 
system and their workers
especially the security advisors ;) 

Mac Defender kills Apples Security!

The well known scareware mac defender that has been around the last few days, was to be killed by Mac OSX Security Update 2011-003 but the scareware developer team killed the security suite within 8 hours! Apples Security suite isn't able to track MAC Defender anymore and the app looks legit again.
A new race has began between Mac OSX Developers and the on the come scareware team. Windows users now can look at apple mac osx with an smile ;) the malware future has begun and there are more to come!

Wednesday, June 1, 2011

Next level Cyberwar is coming up!

Cold war is approaching again,
this time the war starts on another level, on the world wide web overall the planet. Nations begin to recruit and train personal especially for cyber war bzw counter cyber war. I think many big Companys are involved cause the most well trained computer experts on our planet rule the security in such companies. Training new people is definatly impossible if you want em to learn security technics @ computing without relaying knowledge.
So this is the point where the recruiting jumps in.
2 Countries are rapidly starting to recruit computer experts in security especially for cyber fights and domination on the internet.

Today we have KOREA vs BRITAIN


KOREA

BRITAIN

 Im still wondering what this will be in the end but im sure - cyber is on the come - and we are in the middle of it ;) maybe an MITN should be globally done.

WE are watching you the globe is fully wired, the forces are able to get everywhere, no mountain, no hill, no sea, no river can stop us - the globe is wired.

Go Britain !
Im acting patriotic here, tell me what you think.

Cheers folks

Tuesday, May 31, 2011

Fujitsu Siemens's Erase Disk launched!

The Company Fujitsu Siemens Augsburg has invented an new Addon to all their mobile computer series. An tool called "erase disk" is implemented in bios and uefi.


With this tool its possible to erase your whole disk with 5 different algorythms that will wipe anyhting out of them.
First i thought, umm nothing special, but to do a normal disk erasment you need a proper running OS or an boot disk with the lagorithms on it to delete a disk.
With Fujitsus new tool "erase disk" its possible to erase any disk though in that case if no OS or no proper installed OS is running on the Notebook/Computer
The 4 used algorythms are:
  • Zero Pattern (1 pass) 
  • German BSI/VSITR (7 passes)
  • DoD 5220.22-M ECE (7 passes) 
  • Guttmann (35 passes)
This will depending on disk space take 1 to 10 minutes per Gigabyte for erasment.

With this tool its possible to wipe IDE, SATA including Raid systems but no solid state drives.

Fujitsu has invented an real economy product here, i can remember when a disk of mine was broken i always borke it a lot more to get it wasted unrecoverable and the moved to trash that nobody can find it =P

Cheers folks!

Monday, May 30, 2011

Super Injunction, twitter failed

Twitter just gave away the whole user information of an member that posted news in the UK that shouldnt have shown up.
The UK uses a system or let me call it an "take-down" law that gives the government the right to take down any News they dont want to appear or be spoken out. If the Super Junction is called no one is allowed to talk or write about the happening in free places or newspapers nor on the Internet eg. Twitter.

So now on Twitter always committed and said no our users are safe, today is a bad day for twitter.

Long story short - if you post on twitter you could be charged for any post you ve done, twitter wont keep your account information safe...

Thursday, May 26, 2011

Apple Iphone 4 hardware hacked!

Finally the Iphone 4 hardware got hacked and is now open for everyone.
Apple used an 256-Bit key to encrypt any data stored on the phone, GPS-Data, Usernames and passwords, phonebook entries, messages, etc... and all other related user data that is stored on the phone.

This new revealed hack now allows us to do a Backup of an apple iphone 4 and also decrypt this backup to get the data out of this solid box.

As they claim Russian company ElcomSoft has done this hack first and created an easy to use software for everyone. ElcomSoft


An sheet here shows what is possible with the light and the full edition of this software:

ElcomSoft offer this iOS 4 forensic toolkit to security and law enforcement agencies, but anyone can purchase the software to extract the encrypted data on a device.

Wednesday, May 25, 2011

MeeGo 1.2 Release

The new replacement on mobile phones like the Nokia N900, N8 and N9, MEEGO will establish in future instead of Maemo.

Also this newly improved peace of software will be available on most Netbooks / laptops for use.
To take a look at the Design click the next picture:
Simple to handle OS for netbooks


The MeeGo 1.2 Core OS provides a complete set of enabling technologies for mobile computing.

Some highlights of the MeeGo Core stack include:
  • MeeGo Reference Kernels supporting a variety of Intel Atom and ARMv7 platforms.
  • QML Application Framework and extended Qt-Mobility APIs, including additional location, system, connectivity, and sensor/haptic capabilities for rapid, rich, application development.
  • Enhanced Telephony and Connectivity capabilities, including:
    • GSM, GPRS, and HSPA+ network support
    • SIM Application Toolkit
    • Expanded Bluetooth profiles
    • Expanded VPN and wireless authentication methods
    • USB, WiFi, and BT-PAN data tethering capability
    • Enhance multimedia support, including RTSP streaming with progressive download

This release also includes the following:

Monday, May 23, 2011

Sony got hacked again!

Two weeks after the big Playstation Network hack Sony s Greek music homepage got hacked!



Username, maill addys and real names got stolen from all customers that were registred on their site, this could be another big leak in sony s never ending hack story!
Another funny point here, someone has realeased the hole data that got stolen from sony s music page on pastebin.org

All data has been posted, but the hacker deleted the phone number and also the users passwords before posting, seems to be great statement to scare them but not kill them right now!



In fact its not possible to run a website 100% secure so it cant be hacked, but what sony does here is horrible, their security got broken in such simple ways that everyone can just wonder around why havent i tried to =P

Everyone that is registred on sonymusic.gr should change his password right now, dont know what the hacker is planning with the data that got leaked so long...

Friday, May 20, 2011

Sony playstation network hacked again!

Not so much time has passed and the PSN (Sony Playstation Network) got hacked again, only 48 hours after the playstation etwork got relaunched and was up again a new security hole was found and missused.



Maybe the same hackers are involved as on playstation networks first take down.
The new security hole is described as follows:

You can use the forget your password button on the PSN to retrieve a new password, the clue is to get a new passwort you only have to enter 2 criterias, your Name and your date of birth. So long if the crew that hacked it before is after this security hole again they already got all datas from every user of the PSN so they know their name and also their date of birth.



In most parts of the world sony has now taken down the feature to change your users password to get rid of this failure, but it seems they handle this real filthy :) i think if sony gets another hit in its face it has to capitulate!

Though the hackers have not been captured at all, also the FBI is after them - it seems they handle this quite smart :)

Thursday, May 19, 2011

OtherOS++ Boot linux on PS3

 Rebug Team has brought 2 new realeases for the Sony s playstation 3:
Boot OtherOS++ & OtherOS Prep Tool
These are essential for installing an new OS on your playstation 3 

Note: Below are excerpt from rebug.me
Requirements:
  • 16MB NOR PS3 (Model CECHH or Higher)
  • 3.55 OtherOS++ enabled firmware installed
(If you want to use REBUG 3.55.1 grab PS3MFW Builder 0.2 Portable
from here with the tasks pre-selected to add OtherOS++ support)
Features:
  • One Step Prep if installing OtherOS to USB Hard Disk
  • Two Step Prep if installing OtherOS to PS3 Hard Disk
  • Resize vflash to 6 different sizes
  • (Original, 11GB, 22,GB, 43GB, 65GB and 83GB)
  • Create or Delete vflash region 5, 6 and 7 separately
  • Create or Delete ALL vflash regions at once
  • dtbImage.ps3.bin included in pkg (no need to have it ready on USB)
  • Install different dtbImage.ps3.bin from USB
  • Checks that vflash region 7 create matches vflash size
  • Detects and displays current vflash size on start up
  • Auto matches new size to current size on start up
IMPORTANT NOTE: THE BLACK SCREEN IS NORMAL
In most cases when the PS3 auto reboots you will get a black screen telling you to plug in your controller and press the PS button. THIS IS NORMAL. Press the PS button and on the next screen press the PS button again. The PS3 will continue to reboot.


*****************
IF INSTALLING LINUX TO USB HARD DRIVE:
STEP 1: COMPLETE VFLASH AND PETITBOOT INSTALLATION
(PS3 Hard Drive WILL NOT be Formatted)
Run OtherOS Prep Tool
Press START+SELECT.. You’re done!!
(PS3 will beep when it starts and again when it finishes)
(System will auto reboot)
Run Boot OtherOS++ to launch Petitboot

 We are done folks, happy booting, and btw.:

If any body know the series breaking bad would know this already - i wanted to share ;) have fun

Wednesday, May 18, 2011

Austria launches new cyber crime force!

Johanna Mikl-Leitner austrias minister of the interior has launched the new project "fight cybercrime" 

The so called "Cyber-Crime-Competence-Center" consists of 300 new retrained police officers / it-experts.
They 300 users are going to get trained at an Academy launched by the BKA and will be trained specially on a point that makes me curious - ENCRYPTION and ANONYMIZING.

That sounds like they are going to establish a force that will detect people in austria who will use privacy and anonymous services... I dont know what i should think about this, isnt there enough crime out there than should be stopped? instead of some heads working on their privacy :) 


police academy head on!


Have nice day my beloved Followers

Tuesday, May 17, 2011

UPC Austria must block Kino.to

The Internet Service Provider UPC Austria, one of the fastest ISP's in Austria is forced to shut down DNS entries for kino.to so nobody from Austria whos ISP is UPC will be able to "find" stream movies anymore that were linked from Kino.to.


So long if you want ot watch Kino.to movies in the future, you should just look up wikipedia and check out what an Domain Name Service does and what it is - after you checked that just google the following:



After that your are on the safe side!

for everyone else who dont want to use this alternative, try to check out g-stream . in 

KEEP IT GOING FOLKS, have a nice day :)

Monday, May 16, 2011

Bing and Baidu vs Google!

Newest rumours around the chinese press release that there will be an fusion between Microsoft s bing and Goldman Sachs (Asia) L.L.C., Credit Suisse First Boston s baidu!

This would look like this:

The Problem that comes with this new message, google will be cut off the Asian / Chinese market if this fusion will be a good coorporation. The big thing that comes up here, censorship -> google was censored by chinese government a few times in the past, so in future "baiding" will be an strong powerfull ... censored ... Meta Crawler ;)

Have a nice day Folks!

Saturday, May 14, 2011

Prey!

Hello guys, back after the long off-time of Blogger.com.

Today i read about an interesting open source software that could be interesting for everyone.
An interesting scenario took its place in New York/Canada

The SEO-Expert Sean Power was currently in Canada as somebody in Soho turned on his notebook what got stolen a few days ago.
So Sean is a user of the Powerfull Open-Source tool Prey.


Any mobile phone with open-source software running on could get in use of prey.


By the way, Sean got his notebook back, he ordered someone on twitter to get to the place his notebook was last spottet by prey. The police officers of New York dont mentioned to help him, cause he has not reported early enough that it got stolen.

Twitter could be real usefull in the future though as we see in this case  ;)

Main features of pray:

If you want to take a further look or maybe try it - get it here: prey project


Cheers and keep your hardware safe :)

Wednesday, May 11, 2011

Apple is now "the" global prime brand

The last 4 years google was holding the first place on this ranking list, now the last days brandz.com decided to replace google with Apple, and as you can see here on their page were you can browse the top 100global brands and also read their report to it Brandz Top 100 / 2011 (Most valuable global brands)

 Also this video could be interesting - fast view through the Top 100 global brands.






Apple has grown about 84% the last year and so on they managed to get in this high position.
Steve Jobs says in an Interview: "Apple users feel their individuality and express them with apple products, this will continue"

The next upcoming candidate is Facebook they have grewn about 245% and this year is their first time on the Top 100 global brand list, they start there at the 35.th Place.

Have a nice day

Tuesday, May 10, 2011

Nokia announces new QT 5 Framework

Nokia have announced their plans for the year 2012 in desktop developing, they are planning to release the new Qt5 Framework for Linux their objectives for the next Release QT 5 are:

  • Make better use of the GPU, allowing you to create smooth (and accelerated) graphics performance even with limited resources;
  • Making your creation of advanced applications and UIs easier and faster (with QML and Javascript);
  • Make apps connected to the web be as powerful as possible, i.e. to embed and power up web content and services into any Qt app; and
  • Reduce the complexity and amount of code required to maintain and implement a port.

Nokia QT 5 Components for Desktop show off:


 

Youtube sucks so here is a screenshot of the Widgets and applets that will be possible, not so impressive as the video imho.

And thats how it looks on a MAC


If you are interested further continue reading: ROAD TO QT 5 by nokia labs

CHEERS