26 July 2012

Careless and casual, Internet users don’t see abusive content as crime

While many people knowingly commit crime in cyberspace, there are many others who don’t realise that using the Internet to settle scores by sending abusive or obscene or misleading content is a crime for which they can be arrested. Data with the National Crime Records Bureau has revealed sexual harassment is the second biggest cyber crime in Maharashtra, after fraud. Of the 393 cyber crimes registered in the state in 2011, 96 pertained to fraud and 74 to harassment..........
People don’t realise that in the process of creating a fake profile or sending abusive/ obscene content through email ids created in someone else’s name, they are committing a crime under the Information Technology Act..............

Click here to read more ......
Solutions : www.xcyss.in

Cyberbullying: 1 in 2 victims suffer from the distribution of embarrassing photos and videos

Embarrassing personal photos and videos circulating in the Internet: researchers at Bielefeld University have discovered that young people who fall victim to cyberbullying or cyber harassment suffer most when fellow pupils make them objects of ridicule by distributing photographic material. According to an online survey published on Thursday 19 July, about half of the victims feel very stressed or severely stressed by this type of behaviour. 1,881 schoolchildren living in Germany took part in the survey conducted by the Institute for Interdisciplinary Research on Conflict and Violence (IKG) and commented on their experiences with cyberbullying as a victim, offender or witness........ 


Cyberbullying is the term used for attacks by one or more persons through the Internet or by mobile phone - where Facebook or an instant messenger, for instance, are used to denigrate or humiliate someone or harm their social relationships.............. 



Click here to read more ...... 
Solutions : www.xcyss.in

25 July 2012

India tops the list of spam-relaying nations: Sophos


Earlier in April, Trend Micro had released a report stating that about 20 percent of spam originates from India. Now, Sophos has revealed its own report stating that India tops the world list in spam-relaying nations despite only 5.3 percent of the world’s Internet users reportedly living in India.......... 
India tops the list


 
It is believed that a vast majority of spam comes from home computers that have been compromised by hackers and commandeered into a botnet. These remote hackers can send spam from recruited computers and are also capable of potentially stealing information or installing other malicious code........

The report also points out that first-time internet users in growing economies are said to be easy targets. They become an easy target as no appropriate measures are taken to block the malware infections in their PCs that spew spam. With an increase in Internet and PC penetration in India and probably lack of appropriate safety measures, users in developing countries like India become easy targets..........
 

Click here to read more ...... 
Solutions : www.xcyss.in

No fear of law, lure of lavish life drove execs to crime

Easy money, lavish lifestyle and trendy gadgets have lured professionals working in IT companies to the world of cyber crime. The recent credit card fraud cases reported from multinational companies, including WNS, Convergys and American Express, show that making quick bucks prompted the executives to take the illegal route.
Investigations revealed that a majority of the accused had never thought they would get caught........

Click here to read more ...... 
Solutions : www.xcyss.in

23 July 2012

DHS issues warning on widely used industrial control system software

The Homeland Security Department issued July 13 an alert warning of security problems with widely used industrial control system software.
The Tridium Niagara AX Framework software platform integrates systems and devices for online management, according to the alert (.pdf), from the Industrial Control Systems Cyber Emergency Response Team.
More than 300,000 Niagara AX Frameworks are installed worldwide in applications that include energy management, building automation and telecommunications.

Click here to read more ...... 

 Solutions : www.xcyss.in

Telecom firm says "No" to FBI surveillance demands

FILED UNDER: FeaturedLaw & orderMobilePrivacy
Woman using phone in shadows. Image from ShutterstockA minor miracle occurred early last year when the FBI tried to shake down a phone company for customer records during an investigation: the company said no.
According to the Wall Street Journal, the affair has been dragged to court and is tightly cloaked in secrecy.
The phone company's lawyer declined to identify which phone company he's representing, while the telecom employee who received the FBI's national security letter (NSL) demanding customer records has been legally barred from acknowledging either the resulting court case or the letter's existence to just about anyone beyond the company's lawyers.

Click here to read more ...... 

 Solutions : www.xcyss.in

20 July 2012

Cybersecurity the Agile Architecture Way


Identity theft, password breaches, viruses and worms, phishing attacks, Stuxnet—the more we rely upon technology in our increasingly connected world, the greater the risk that we’ll be hacked. Even worse, it seems that the rate at which hacking stories come across the wire is actually increasing, in spite of all the hard work at all the various security organizations, both commercial and governmental. The frightening truth is, perhaps the hackers are actually winning.
The root cause of our vulnerability, of course, is the Internet itself. When the essential elements of the Internet first rolled out—TCP/IP, HTTP, and DNS, to name the most flagrant offenders—no one had any idea how important security would become or just how flawed these enabling technologies were when it came to protecting ourselves from increasingly dedicated and persistent malefactors. Today, that horse has long since left the barn. Maybe we can close the door, sure, but it might not matter anymore..........

Click here to read more ...... 
Solutions : www.xcyss.in

Cyber Security Challenge Not Interested In Offensive Skills


Cyber Security Challenge director says the focus is on defence skills, not offensive expertise....


The government-backed Cyber Security Challenge will not be looking for those with cyber attack skills, despite MPs calling on intelligence services to increase their offensive work.......

Offensive capabilities include things like network penetration and malware creation, skills which are in demand from government contractors,  but the Challenge, which was launched two years ago in a bid to fill the growing skills gap in the security industry, will solely look at identifying and nurturing defensive skills.......

Our focus is on ensuring that the talent pool for those employing cyber security experts to defend our systems is well stocked. There is an urgent need to attract more skilled professionals into the cyber security profession. A purely offensive skills set is not something the Challenge was set up to identify..........

The  perspective of Cyber Security Challenge is to find more informed defenders. We focus on the  skills needed to spot vulnerabilities, defend networks, and extract and analyse complex forensics information..........


Click here to read more ...... 
Solutions : www.xcyss.in

Cybersecurity Isn't a Border-Based Threat, it's a Viral Threat


Much like Moore's Law has provided a reliable pattern to chart the steady growth of computing capacity and decline in prices, the same precept could apply to the tools of weaponry in the digital age..........
In a presentation that touched on the evolving nature of cyber threats here at the Brookings Institution, Hammersley contended that the traditional notion of warfare among nation-states is rapidly becoming obsolete as acts of kinetic aggression are being replaced by online crimes and other disruptions that can be perpetrated by individuals or small groups.
Moreover, high-end technologies that originate in government labs or the military eventually become commodities, a process of democratization that figures to significantly broaden access to tools like drones or biological synthesis applications, just as the code to launch a denial of service attack can easily be downloaded online...........

Click here to read more ...... 
Solutions : www.xcyss.in

Virus attacks: Why energy grids are prime targets

The electrical power grid is the backbone on which everything else depends on. A cyber criminal could debilitate a major city by a single targeted attack on the energy grid and compromise anything from the lights and appliances in homes, to heart monitors in hospitals, to air defence systems.

The most prevalent cyber threat reported by the global energy sector is extortion. Criminals gain access to a utility's system, demonstrate that they are capable of doing damage, and demand a ransom. Additional threats include espionage and sabotage all with the goal of financial gain, data theft and shutting down facilities...........


Click here to read more ...... 
Solutions : www.xcyss.in

19 July 2012

Cyber maneuver program to help Army protect networks

The Army has awarded a $3.1 million contract to Raytheon to develop technology that would allow cyber personnel to maintain networks and related assets in a way that would thwart potential attackers in high-threat environments.........
The company's program, known as Morphing Network Assets to Restrict Adversarial Reconnaissance, will enable cyber warriors to modify aspects and configurations of networks, hosts and applications in a way that is undetectable and unpredictable by an adversary but still manageable for network administrators, the news release...............

Click here to read more ...... 
Solutions : www.xcyss.in

18 July 2012

Sajid Khan files complaint against hacker

Aspiring female actors have been allegedly receiving emails from Sajid Khan asking them to send him their nude pictures. 

A lewd joke played by an imposter who obviously hacked into the filmmaker's email account, has failed to impress Sajid.............


Click here to read more ...... 
Solutions : www.xcyss.in

17 July 2012

Cyber-Criminals Craft Malware Kits to Zero in on Java Flaws

The Blackhole exploit kit, a framework that helps attackers infect victims' computers, adds another way to compromise systems through weaknesses in Java..........

Because most PC users and companies can take months to update third-party software, the exploit will like remain effective for some time to come..............

Several characteristics of the Java software platform have made it a favorite of attackers. Java is popular and runs on a large number of operating systems giving attackers a potentially large base of victims. Moreover, the software update mechanism is not automatic by default and frequently leaves older—and vulnerable—versions on many systems...........

Click here to read more ...... 
Solutions : www.xcyss.in

Cyber-Criminals Craft Malware Kits to Zero in on Java Flaws


The Blackhole exploit kit, a framework that helps attackers infect victims' computers, adds another way to compromise systems through weaknesses in Java..........

Because most PC users and companies can take months to update third-party software, the exploit will like remain effective for some time to come..............

Several characteristics of the Java software platform have made it a favorite of attackers. Java is popular and runs on a large number of operating systems giving attackers a potentially large base of victims. Moreover, the software update mechanism is not automatic by default and frequently leaves older—and vulnerable—versions on many systems...........


Click here to read more ...... 
Solutions : www.xcyss.in

Beware: Frauds take cyber path to crime in state


If you thought cyber crime is only about misuse of personal accounts in social networking sites or posting obscene materials on the virtual world, then think again. Out of the total number of cyber crimes registered in the state, most were found to be related to frauds and illegal gains. Other cases relates to revenge or of personal score settlement, or of pranks and greed too.
Cyber crime has now increased its reach — from mere posting of obscene material and hacking of email accounts it now involves illegal transfer of funds. A total of 67 cases of cyber crimes have been registered in the state in 2011 but only 36 people have been arrested for these crimes so far...........

Click here to read more ......
Solutions : www.xcyss.in

16 July 2012

Militants want Pak, India war: MaliK


Advisor to the Prime Minister on Interior Affairs Rehman Malik has said that Pakistan and India are both victims of cyber crime, adding that extremists from India were involved in five terrorist attacks in India, adding that Pakistan and India should stop blame game against each other.
Terrorists kept using internet and social media for many days during the Mumbai attacks, he added.
Talking to representatives of Pak-India social media Malik said that if the IT specialists of the two countries had carried out their obligations rightly incident like Mumbai attack could had been averted...............

Militants on both sides of the border want to fuel a war between Pakistan and India, he said. However, social media could play its role to help eradicate the atmosphere of hatred and bias between Pakistan and India...........
Malik said that terrorists were using the internet for communication claiming that if Internet Service Providers (ISP) were wiser and had certain tools, the Mumbai attacks would not have taken place.............

Click here to read more ......
Solutions : www.xcyss.in

More than third of cyber attacks are directed towards SMBs: Symantec


The most targeted sector is Defense industry with an average of 7.3 attacks per day.

Small and Medium Businesses are increasingly becoming vulnerable to cyber attacks as 36% of the total targeted attacks are targeted towards organisations with less than 250 employees during the last six months, according to a new report by Symantec..........


Click here to read more ...... 
Solutions : www.xcyss.in

13 July 2012

450,000 passwords compromised as Yahoo Voices hacked


A previously unknown hacker group has posted online the details of 450,000 user accounts and passwords it claims to have taken from a Yahoo server.

The Ars Technica technology news website reported that the group, which calls itself D33DS Company, hacked into an unidentified subdomain of Yahoo's website where they retrieved unencrypted account details.

The affected accounts appeared to belong to a Voice over Internet Protocol (VoIP) service called Yahoo Voices, which runs on Yahoo's instant messenger.............


Click here to read more ...... 
Solutions : www.xcyss.in

Navy plans dedicated cadre of cyber sea warriors

After robust sea, air and underwater combat arms, the Navy now wants a dedicated force for the virtual front as well. The force has begun the process to recruit information technology (IT) engineers and graduates as short-service commissioned officers. 

The Navy's drive to induct IT officers, as part of its main executive branch, comes in the backdrop of cyber warfare emerging as a potentially crippling form of waging covert wars as well as Chinese and Pakistani online espionage agents continuing with their incessant attempts to hack into Indian computer networks............ 

The Navy has  been facing mounting cyber-attacks in recent years.............


Click here to read more ......
Solutions : www.xcyss.in

12 July 2012

Cyber cops busy like never before


The number of cyber crime complaints received by Crime Investigation Department (CID) has been annually registering a sharp rise over the last five years. So far in 2012, 43 cases have already been filed as against the 76 complaints it took up in 2011.

The number of online harassment cases, especially those against the fairer sex, had already surpassed what was recorded in 2011. In 2012, up to June, 19 cases have been registered against 17 in the previous year. Last Saturday, a Delhi IIT student was arrested by CID officials for allegedly harassing a girl by posting objectionable content online............

Of the 43 cases this year, 19 pertain to online harassment, eight to fraud originating out of Nigeria wlong with five cases each of phishing, credit card fraud and obscene content.........


Click here to read more ......
Solutions : www.xcyss.in

11 July 2012

Did Anonymous hack TN police databases?


First it was a high-profile hack attack last Christmas against Stratfor, a Texas-based security firm; next they brought down the website of a much larger prey — the U.S. Central Intelligence Agency.
While these sophisticated cyber intrusions carried out by Anonymous, the angry rebel “hacktivist” group speaking for the disenchanted American left, may have seemed faraway, they have apparently now struck much closer to home — the confidential databases of the Tamil Nadu police...........
If the database exposed is in fact confirmed to belong to the Tamil Nadu police, the incident may well be an embarrassment of epic proportions for the State government in terms of lax cyber security standards....

Click here to read more ...... 
Solutions : www.xcyss.in

10 July 2012

Hackers who cracked CERN's computer system train Indian officials

Two cyber security experts, who claimed to have cracked the security code of IT systems involved in the discovery of 'God Particle', today conducted training sessions for Indian government officials.

"The projections show there is going to be lot of manufacturing in the India. Lot of software will be involved in it. We are here to create awareness among people on probable vulnerabilities in the cyber system," ethical hacker Chris Russo told PTI..............

Next era of wars is not going to be of bomb, gun and shells. It will be led by cyber warfare where most attack will be on nation's secret data. The idea to conduct such program evolved after seeing increase in cyberattack on India...............


Click here to read more ...... 
Solutions : www.xcyss.in

Malicious software shuts down computers worldwide

Malware is the cause for many people’s frustration Monday as they found they were without the Internet. The malware affected computer users worldwide. This is a hassle for those who depend on the technology for so much. The Charlotte FBI estimated those without internet access was about 85,000...........


Click here to read more ...... 
Solutions : www.xcyss.in

09 July 2012

Delhi registered 1850% rise in cyber crime cases

Statistics prove that the Capital is on the receiving end of a bitter onslaught in cyber space as the Delhi Police, in particular, and the security establishment, in general, struggle to confront the challenge. While the police face a debilitating manpower crunch in its cyber cells, other security agencies still prefer to view cyber attacks from an obsolete perspective.
In a day and age where American government-sponsored hackers are targeting Iran's nuclear programme and terror outfits such as the Indian Mujahideen (IM) are conducting recruitment drives over the internet, our security agencies still take weeks to trace creators of fake profiles on Facebook...........

Click here to read more ......
Solutions : www.xcyss.in

Hyderabad: IIT-Delhi student posts obscene pictures of IIT-Kanpur girl


A 22-year-old B Tech student, Surender from the Indian Institute of Technology (IIT)-Delhi was arrested in Hyderabad by the cyber crime wing of the CID for allegedly posting obscene photographs of a girl from IIT-Kanpur on a public blog............
Surender came into contact with the girl when she approached him for guidance for IIT Joint Entrance Examinations (JEE). According to police, Surender got attracted towards the girl and tried to take undue advantage of their closeness. When she resisted his advances, he started harassing her through phone calls, SMSs and emails............
In order to harass her and her family members, he created a fake profile in the name the girl's sister on a public blog and chatted with people asking them to call her by giving the number of the girl's mother.......


Click here to read more ...... 
Solutions : www.xcyss.in

06 July 2012

Virus could black out nearly 2.5 lakh computers


About a quarter-million computer users around the world are at risk of losing Internet access on Monday because of malicious software at the heart of a hacking scam that US authorities shut down last November.
Some blogs and news reports hyped the risk of an outage, warning of a potential "blackout" and describing the Alureon malware as the "Internet Doomsday" virus...........

As of this week, about 245,000 computers worldwide were still infected by Alureon and its brethren, according to security firm Deteque. That included 45,355 computers in the United States.

The viruses were designed to redirect Internet traffic through rogue DNS servers controlled by criminals.........


Click here to read more ......
Solutions : www.xcyss.in

Cheats cash in on e-trade boom


A 39-year-old businessman regularly buys and sells shares online. But on returning from his brief visit to Thailand, Sunil Agarwal was horrified to find he came back and to his horror found that his demat account hacked and all his shares sold............
Of late, an t a time when an increasing number of net savvy shopaholics of the city are choosing to buy goods at the click of a mouse than off the shelves, making the game all the more easier for the fraudsters. The cyber frauds have left city police on tenterhooks and they have fallen back on a team of internet to decode the intricate cases..............

Click here to read more ...... 
Solutions : www.xcyss.in

If Hackers Didn't Exist, Governments Would Have to Invent Them


The hackers who dominate news coverage and popular culture -- malicious, adolescent techno-wizards, willing and able to do great harm to innocent civilians and society at large -- don't exist........

The perceived threat landscape is a warped one, which directs attention and resources to battling phantoms, rather than toward preventing much more common data-security problems. According to the Privacy Rights Clearinghouse, the loss or improper disposal of paper records, portable devices like laptops or memory sticks, and desktop computers have accounted for more than 1,400 data-breach incidents since 2005 -- almost half of all the incidents reported............

The Wall Street Journal recently reported on a survey which showed that 71 percent of IT managers and executives believe insider threats present the greatest risk to their companies. And the recent high-profile security breach at LinkedIn shows that one of the greatest risks to our personal security is ourselves...

But these more serious threats don't seem to loom as large as hackers in the minds of those who make the laws and regulations that shape the Internet. It is the hacker -- a sort of modern folk devil who personifies our anxieties about technology -- who gets all the attention. The result is a set of increasingly paranoid and restrictive laws and regulations affecting our abilities to communicate freely and privately online, to use and control our own technology, and which puts users at risk for overzealous prosecutions and invasive electronic search and seizure practices...........


Click here to read more ......
Solutions : www.xcyss.in

05 July 2012

Cybercrime hits 1 in 3


Cyber crime affected one-in-three companies in the financial services, the public sector, manufacturing and IT in the past year.
The latest Irish Information Security and Cybercrime survey has found that the cost of each major incident was €41,875 on average and that 42pc of respondents suffered a loss of productivity as a result of cybercrime attacks.
Hacking was the most common method used to break through security for the majority of the companies surveyed.
But just 45pc of respondents indicated that cybercrime was a priority in terms of risk to the organisation........

Click here to read more ......
Solutions : www.xcyss.in

Cyber criminals may use Olympics for phishing

Kaspersky Lab, a developer of content management solutions, has warned end users to be on their guard against cyber criminals using the Olympics to launch phishing scams andDDoS attacks......

End users might find themselves under siege from cyber criminals attempting to cash-in on the event. One of the dangers is people being lured by mistake to an illegitimate site set up by someone who wants to profit from the event by pretending to sell items, like merchandise or tickets, that they are not authorised to............

This could result in people giving up their personal information or surrendering a sum of money and being defrauded by scammers...........


Click here to read more ...... 
Solutions : www.xcyss.in

Tamil Nadu bucks cyber crime trend

The next time you upload any sensitive information in your computer or smart phone, be extra careful. Cyber spooks are on the prowl to outsmart your smart phone and steal your data. And, going by statistics, the number of such crimes have nearly doubled in the country every passing year. Quite on the contrary, the incidence of such online crimes in Tamil Nadu seem to be throwing up a downhill trend............


Click here to read more ...... 
Solutions : www.xcyss.in

04 July 2012

पॉर्न वेबसाइट पर बनाया खौफनाक प्लान, हिल गया था पूरा देश!


मुंबई हमले की साजिश में शामिल जबीउद्दीन अंसारी उर्फ अबू जुंदाल अपने साथियों को पोर्न वेबसाइट्स के जरिए संदेश भेजा करता था। 
 
उनसे बातचीत को सुरक्षा एजेंसियों की पकड़ से दूर रखने के लिए वह ऐसी एहतियात बरतता था। एक पुलिस अधिकारी ने बताया कि जुंदाल औरंगाबाद के एक साइबर कैफे से अपने साथियों से इस तरह की वेबसाइट्स से चैट करता था............ 

अधिकारी के मुताबिक आमतौर पर पुलिस और खुफिया एजेंसियां सोशल साइट्स और जानी मानी चैटिंग साइट्स पर नजर रखती हैं। लेकिन पोर्न वेबसाइट्स निगरानी में कभी-कभार ही आती हैं। ये वेबसाइट्स दावा करती हैं कि उनकी प्रीमियम सर्विस लेकर कोई व्यक्ति लड़कियों से वीडियो, वॉयस कॉलिंग कर चैट कर सकता है............
 
कोई अपना ग्रुप बना सकता है जिसमें अपने दोस्तों को चैट के लिए न्यौता दे सकता है। इसमें ग्राहकों को पूरी गोपनीयता का भी भरोसा दिलाया जाता है। जुंदाल का संदेश, ‘धंधे का उद्घाटन हो गया है, 25 को दावत कर दी है।’ कोड भाषा में यह ईमेल जुंदाल ने 19 फरवरी 2006 को पाकिस्तान में अपने आकाओं को भेजा था। इस दिन अहमदाबाद रेलवे स्टेशन पर कर्नावती एक्सप्रेस में ब्लास्ट हुआ था।............


Click here to read more ...... 
Solutions : www.xcyss.in

International cyber crime agreement a long way off


An international agreement on cyber security is a long way off, according to John Lyons, chief executive of the International Cyber Security Protection Alliance…………...


Speaking at the National Security 2012 Conference held in London, Lyons said there are simply too many barriers in the way, such as nations prioritising their own cyber security and the issue of some nations being more advanced than others…………..

If we accept for a moment that the vast majority of attacks on our government, businesses and citizens are orchestrated and carried out by groups outside our jurisdiction, then presumably you will also accept that working together internationally on the identification, investigation and disruption of cyber attacks must be a key part of defending our national security interests…………..


Click here to read more ...... 
Solutions : www.xcyss.in

New Malware Strain Poses Serious Threat to Facebook and Gmail Users


ThreatMetrix, the fastest-growing provider of integrated cybercrime prevention solutions, announced a new strain of Zeus malware that puts Facebook and Gmail users at high risk for cybercrime. This new variant steals credit card information by posing as the typical login pages for Facebook and Gmail and then asking users to enter credit card credentials.
ThreatMetrix identified this strain as a new variant of the peer-to-peer (P2P) version of the notoriousZeus Trojan. It poses intensified risk for Facebook and Gmail users due to its unusually cunning behavior, catching victims off-guard by waiting to attack until after a website's login page appears to be functioning normally................

Click here to read more ...... 
Solutions : www.xcyss.in

God’s own country tops list on obscene postings on Internet, cyber crimes


Besides being the most literate state in the country, Kerala now also tops the list when it comes to posting obscene articles or photos on the Internet, according to government data. 
 
27 per cent (136) of 496 cases of obscene publication registered in the country last year were from God’s own country. 
 
The data also revealed that people from the state used the internet to indulge in eve- teasing or harassing women with a motive in 85 cases registered, second to Andhra Pradesh, which registered 98 cases. While 13 cases in Kerala related to settling scores, in 32 it was for money................... 
 

Click here to read more ...... 
Solutions : www.xcyss.in

02 July 2012

Govt plans cyber offensive to tackle Chinese hackers


THE NAVY is examining the findings of a board of inquiry that probed lapses in cyber security measures in the eastern command headquarters at Visakhapatnam, leading to possible loss of data to Chinese hackers.

This incident has led to clamour for changing the countrys cyber security policy from passive to active. As of now, only defensive measures have been put in place, but security experts now want to launch an offensive through its own hacking units, a move that is being seriously pursued by the government.

The government is considering counter cyber offensive and the issue came up in the past weeks meeting of the national security council on cyber threats, headed by PM Manmohan Singh.................

Sources said the cause of threat was lapses on part of an unspecified number of officers who did not follow the procedures and used external devices in which bugs were planted by the hackers to extract information...............


Click here to read more ...... 
Solutions : www.xcyss.in

Beware of missed call to check SIM cloning

Next time if you get a missed call starting with +92; #90 or #09, don't show the courtesy of calling back because chances are it would lead to your SIM card being cloned. The telecom service providers are now issuing alerts to subscribers —particularly about the series mentioned above as the moment one press the call button after dialing the above number, someone at the other end will get your phone and SIM card cloned............


Click here to read more ...... 
Solutions : www.xcyss.in

Texas students ‘hijack’ drone for $1,000 bet

On a dare, Texas college researchers hacked into and hijacked a drone of the US Homeland Security before the eyes of the officials operating it. Using a technique called 'spoofing' where a signal from hackers imitates the one sent to the drone's on-board GPS, the researchers managed to take control of a small but powerful drone in mid-air . 

And the hijacking was just for a $1,000 wager. But the incident has unnerved Homeland security officials, as the spoofing has made it possible for anyone with a $1,000 and a plan to turn a harmless UAV into a missile and crash it into a building............. 


Click here to read more ...... 
Solutions : www.xcyss.in

Cybercrime moves to the cloud


Researchers say that criminals are moving their malware heavy lifting from end-user PCs to servers in the cloud.
The same flexibility and freedom that companies get from having their software and services hosted in the cloud is enabling cybercriminals to conduct highly automated online banking theft — without doing much of the necessary information processing on their victims' own computers............

Click here to read more ...... 
Solutions : www.xcyss.in