Showing posts with label Security News. Show all posts
Showing posts with label Security News. Show all posts

The new version of the Internet Protocol IPv6

Diposkan oleh Unknown on Thursday, June 23, 2011



Expected the online world as a whole will experience some of the global Internet sites to use the new version of the Internet Protocol IPv6, and in light of the entry into force of Internet addresses based on the current version of the Internet Protocol IPv4.

The Giants will be a number of websites in the world, including Google, Yahoo, Facebook and Bing activate the new version of Internet protocol IPv6 and in (the International Day for the new version of the Internet Protocol IPv6) and corresponding to June 8, 2011.

I would like to review with you some of the information highway that achieve the correct understanding of what will happen exactly.

What is the Internet Protocol IP?
Internet Protocol (IP) is the language that computers use to communicate with each other on the Internet, similar in mechanism of action to a large extent, phone numbers, and that makes us reach another phone.

What is the protocol that we use now?
IPv4 is the current version of the Internet Protocol. I have been using most of the titles based on the current version of the Internet Protocol IPv4.

What is the Internet Protocol IPv6?
IPv6 is the new version of the Internet Protocol. According to Google, the new version of the Internet Protocol IPv6 is necessary to preserve the racial integrity and openness, who enjoys the Internet, through empowerment of all devices connected to a network that communicate with each other directly, and will provide IPv6 Internet growth potential.

International Day for the new version of the Internet Protocol IPv6:
Most web sites currently using the current version of the Internet Protocol IPv4, but in the June 8, 2011 (World Day of the new version of the Internet Protocol IPv6), will be big business on the web, including Google, Facebook, Yahoo, and Ping, to enable the new version of the Internet Protocol IPv6 to their principal for 24 hours, in addition to the current version of the Internet Protocol IPv4, and thus should not be worried if we had to IPv6, Vstassir things are fine. Can visit the following website for more information about the International Day for the new version of the Internet Protocol http://worldipv6day.org/

IPv6 and communication problems:
More than 99.9% of users do not have any problems in visiting the sites that enable Internet Protocol IPv6, except that in some rare cases, users have IPv6 as possible but it does not work correctly. This results in delays and connection problems when you visit Google and some of the sites participating in the International Day for the new version of the Internet Protocol IPv6 on June 8, 2011.

And produce communication problems related to IPv6 is usually an error in your gear settings to your home network or errors in operating systems or problems in corporate networks equipped with the Internet. In many cases, these problems can be solved by updating or replacing routers and operating systems by updating, or if the company has equipped with repair of the Internet. In any case, it is possible to address the problem by using the current internet protocol IPv4.

If you encounter any problems in visiting the sites that will enable the new version of the Internet Protocol on the eighth of June for 24 hours, do the following to resolve the problem:- The use of possible locations for the current version of the Internet Protocol IPv4 only, for example: If you want to visit the Google site you use the following address: ipv4.google.com instead of www.google.com.- Update your internet browser.- Use the browser supports the use of the new version of the Internet Protocol such as Google Chrome.

You can test whether the new version of the Internet Protocol is working on their computers through the following link: http://test-ipv6.com
 
IPv6 Essentials                                     IPv6 Security                            Cisco-Linksys WRVS4400N Wireless-N Gigabit Security Router - VPN v2.0           
 
 
 
 
 
More aboutThe new version of the Internet Protocol IPv6

LulzSec: Hack Attacks Will Continue Until Group Caught

Diposkan oleh Unknown on Saturday, June 18, 2011



In a catch-me-if-you-can explanation of why it has targeted the likes of Sony, the U.S. Senate, an FBI affiliate, and online porn sites, the LulzSec hacking group says it plans to keep having fun until it gets caught.

A statement the group has posted says going public with user personal details after a hack attack is better than keeping exploits private. It gives users a chance to change their passwords, the group says.

Such public releases are also arguably good for websites too. After the group published 26,000 emails and passwords stolen from porn sites last week, Facebook automatically locked every account linked to the email addresses, stopping the kind of unauthorized access LulzSec discusses.

LulzSec says its hack attacks will continue until "we're brought to justice, which we might well be."

The group's statement amounts to a manifesto and is surprisingly more erudite than might be expected.

"We're attracted to fast-changing scenarios, we can't stand repetitiveness," the group says. "Nobody is truly causing the Internet to slip one way or the other, it's an inevitable outcome for us humans."

LulzSec members were considered righteous vigilantes by some sectors of the Internet after their repeated attacks against Sony, which were carried out in response to Sony's hounding of PS3 hardware hacker George Hotz. However, support has been waning after the group targeted non-Sony game servers this week. Perhaps surprisingly, in the statement the group attempts to distance itself from these attacks, pointing out they were done "by the request of callers [to its telephone request line], not by our own choice".

And not everything the group has done has appeared malicious. Although it hacked into the British health system computers, it declined to cause damage or publish details, instead warning admins that the system was insecure.

The group denies it's locked in a hacker war with similar group Anonymous. This had been suggested after LulzSec targeted the 4Chan website with a denial of service attack following attempts by 4Chan users to expose members of LulzSec.

The full statement from LulzSec can be found on the PasteBin website.




See more like this:online security,hackers,sony
Source:PCWorld 
More aboutLulzSec: Hack Attacks Will Continue Until Group Caught

World Bank cut connection to IMF after "major" cyberattack

Diposkan oleh Unknown on Sunday, June 12, 2011

Leaderless organisation penetrated by hackers

The International Monetary Fund (IMF) has admitted to being the victim of a cyberattack so serious that its global partner the World Bank temporarily decided to cut all computer links between the two organisations.
The precise nature of the attack and when it happened was not revealed to IMF staff, who were reportedly told of the attack in an email last week, but is believed to have been some months before its now deposed head, Dominique Strauss-Kahn, was accused of the sexual assault on a New York hotel chambermaid.
This much can be gleaned from the coded details revealed in the outline story; this was most likely an utterly standard targeted attack that started with one or more individuals in the organisation receiving an email, apparently from a trusted contact, which asked them to run an attachment.
Once run, the target for any malware executed at that point would, presumably, have been unencrypted confidential documentation, including emails, hosted elsewhere on the network. Exactly how successful the attack was has not, of course, been stated but it was severe enough for one unnamed official to be quoted as describing it “as a very major breach.”
After being discovered, the World Bank, headquartered only yards from the IMF in Washington DC, disconnected itself from the latter to avoid becoming a collateral victim. That suggests the malware had an unsurprising ability to spread.
This style of attack is identical to those sweeping over every organisation in the world of any political or economic significance as evidenced by a clutch of recent high-profile attacks. It is becoming easier to state who has not been attacked than who has, including the UK Government, Google, Sony, defence contractor Lockheed Martin, and most seriously or all, RSA Security.

Source:Techworld


More aboutWorld Bank cut connection to IMF after "major" cyberattack

Hackers Exploit Flash Bug in New Attacks Against Gmail Users

Diposkan oleh Unknown on Monday, June 6, 2011

Adobe today confirmed that the Flash Player bug it patched Sunday is being used to steal login credentials of Google's Gmail users.
The vulnerability was patched yesterday in an "out-of-band," or emergency update. The fix was the second in less than four weeks for Flash, and the fifth this year. A weekend patch is very unusual for Adobe.

"We have reports that this vulnerability is being exploited in the wild in active targeted attacks designed to trick the user into clicking on a malicious link delivered in an email message," said Adobe spokeswoman Wiebke Lips in response to questions today. "The reports we received indicate that the current attacks are targeting Gmail specifically. However, we cannot assume that other Web mail providers may not be targeted as well."

According to Adobe's advisory , the Flash vulnerability is a cross-site scripting bug.
Cross-site scripting flaws are often used by identity thieves to hijack usernames and passwords from vulnerable browsers. In this case, browsers themselves are not targeted; rather, attackers are exploiting the Flash Player browser plug-in, which virtually every user has installed.
Adobe said that Google reported the Flash Player flaw to its security team.
Targeted attacks that try to steal account information are commonplace, but they've been prominent in the news since last Wednesday, when Google accused Chinese hackers of targeting senior U.S. government officials and others in a long-running campaign to pilfer Gmail usernames and passwords.
China has denied Google's allegations . The Federal Bureau of Investigation (FBI) is looking into Google's charges.

The attacks aimed at stealing Gmail account information using the Flash Player vulnerability, however, are different than those Google acknowledged last week. Those attacks, which have been active since at least February, did not rely on an exploit, and instead duped victims into entering their username and password on a fake Gmail login screen.

Adobe updated the Windows, Mac OS X and Linux versions of Flash Player Sunday, and said it would follow that with a patch for the Android edition sometime this week.
Google, which bundles Flash Player with Chrome, also updated its browser on Sunday, refreshing all three of its distribution channels -- stable, beta and dev -- to include the patched version of Flash.
Adobe rated the bug as "important," the second-highest ranking in its four-step threat scoring system. In Adobe's scheme, that rating indicates that attackers may be able to access data on the victimized computer, but cannot plant malware on the machine.

Although most Flash vulnerabilities can also be exploited using specially-crafted PDF documents -- Adobe's Reader includes a component named "authplay.dll" that renders Flash content in PDFs -- Adobe said it wasn't sure whether its popular Reader contained the flaw.
"Adobe is still investigating the impact to the Authplay.dll component," the company's advisory stated. "Adobe is not aware of any attacks targeting Adobe Reader or Acrobat in the wild."
 
While Adobe did not say whether Reader -- and the for-a-fee Acrobat -- will be patched, the programs are slated for an update June 14 to fix other flaws the company has previously acknowledged in authplay.dll.

Users running browsers other than Chrome can download the patched version of Flash Player from Adobe's site.

Flash's update mechanism -- added to the Mac edition just last month -- should kick in to offer the patched plug-in.

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is gkeizer@computerworld.com .

Source:PCWorld
More aboutHackers Exploit Flash Bug in New Attacks Against Gmail Users

Google, China Bicker Over Attempted Gmail Hack

Diposkan oleh Unknown on Friday, June 3, 2011

 China says it's not to blame for Google's Gmail spear phishing attacks that targeted the e-mail accounts of top U.S. officials. Google had accused China of being the country of origin for a massive hack campaign aimed at gaining personal Gmail login credentials of hundreds of senior U.S. government officials and officials from other countries, but China says the allegations are "unacceptable."
The scam the alleged Chinese hackers used is known as spear phishing, which tries to trick people into visiting a genuine-looking website in order to get users to type in their login credentials. Google said: "This campaign, which appears to originate from Jinan, China, affected what seem to be the personal Gmail accounts of hundreds of users including, among others, senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military personnel and journalists."
Google disrupted the attack on its users, saying that victims have been notified and their accounts were secured. "It's important to stress that our internal systems have not been affected - these account hijackings were not the result of a security problem with Gmail itself," Google explained. "But we believe that being open about these security issues helps users better protect their information online."

'Ulterior Motives'

Google, China Bicker Over Attempted Gmail HackHowever, Chinese officials are having none of these accusations: "Blaming these misdeeds on China is unacceptable," a Chinese foreign ministry spokesman said, according to the BBC. "Hacking is an international problem and China is also a victim. The claims of so-called support for hacking are completely unfounded and have ulterior motives."
Google's relationship with China has been bumpy for the past two years, to say the least. The search giant took the moral high road in January 2010 when it decided to stop censoring China-based search results after a Gmail attack targeting the accounts of Chinese human rights activists. Recently, Google and China also bumped heads over the company's online Maps product licensing and allegations of deliberately blocking access to Gmail.

Source: PCWorld 
More aboutGoogle, China Bicker Over Attempted Gmail Hack