Thursday, January 8, 2009

Hard drive destruction 'crucial'

The only way to stop fraudsters stealing information from old computer hard drives is by destroying them completely, a study has found.

Computing magazine Which? recovered 22,000 "deleted" files from eight computers purchased on eBay.Criminals source old computers from internet auction sites or in rubbish tips, to find users' valuable details.Freely available software can be used to recover files that users think they have permanently deleted. 

More info read:- http://news.bbc.co.uk/1/hi/technology/7816446.stm

Tuesday, December 30, 2008

Pak hacker attacks E Rlys site, threatens cyber war on India.

In the first instance of cyber attack on Indian government websites, the attack on Eastern Railways site on Wednesday popped open vulnerability of government websites in the country. 

SBI shuts website after hackers break in!

The State Bank of India, the country’s largest bank, has had to shut down its corporate website after overseas hackers tried to break in.

While the bank said that transactions took place through www.onlinesbi.com, a senior SBI source said that the transactions were slow as the entire system was under watch.

The country’s largest bank decided to shut down its corporate website www.sbi.co.in on Wednesday evening when hackers blocked some of the pages. The bank also noticed unusually high traffic on its website on Wednesday.

Read More:http://www.business-standard.com/india/storypage.php?autono=344523


Monday, December 29, 2008

Frame Injection in Google!!

A frame injection attack is an attack on Internet Explorer 5, Internet Explorer 6 and Internet Explorer 7 to load arbitrary code in the browser. This attack is caused by Internet Explorer not checking the destination of the resulting frame, therefore allowing arbitrary code such as JavaScript or VBScript. This also happens when code gets injected through frames due to scripts not validating their input. This other type of frame injection affects all browsers and scripts that do not validate untrusted input.

Checkout the below link on which it worked

Saturday, December 27, 2008

The Five Coolest Hacks Of 2008!!!

Have a look at the five of the coolest hacks  covered  at Dark Reading in 2008 -- unusual and sometimes off-the-wall vulnerabilities that were exposed and exploited this past year by researchers who, driven by their curiosity and imagination, had some fun (possibly at your expense), but all for the ultimate purpose of making daily life more secure. So read more about this on below given link  -- and don't stop looking over your shoulder. Cheers!!!

Computer Security's Six Most Important Words Of 2008

Well, if you must know, 2008 was a year of tectonic shifts in IT security. The technologies changed, the economy changed, and the role of security changed. Even the people who make the laws about security changed. You could hardly swing a dead server without hitting some major security-shifting event, and most of those events will continue to have repercussions throughout the new year.

 If you need somebody to spell it out for you, Darkreading can do it!!!. Let's look more closely at the six words and what they meant for security in the past year on below given link.

http://www.darkreading.com/security/management/showArticle.jhtml?articleID=212501928&pgno=2&queryText=&isPrev=

Tuesday, December 23, 2008

2008's biggest tech crime stories!

As the year 2008 draws to a close, here are some of the biggest IT related crimes which i chanced up on in Network World site.