Saturday, February 26, 2011

BlackHole RAT: Mac OS X backdoor Trojan !

BlackHole’ is the latest remote administration tool (RAT) and is available both in Windows and Mac.

Hacktool such RAT employs client-server program that communicates to its victim’s machine through its trojan server. The server application is installed on the victim while the client application is on the managing side.
The version suggest that ‘BlackHole’ is currently in its early stage. However, the author seems to start showcasing the following functionalities:
  • Remote execution of shell commands.
  • Opens webpage using user’s default browser.
  • Sends a message which is displayed on the victims screen.
  • Creates a text file.
  • It is capable to perform shutdown, restart and sleep operation.
  • It is capable to request for admin privileges.

Here is an excerpt from the default text that is displayed in the full screen window with the reboot button:
"I am a Trojan Horse, so i have infected your Mac Computer. I know, most people think Macs can't be infected, but look, you ARE Infected!
I have full controll over your Computer and i can do everything I want, and you can do nothing to prevent it.
So, Im a very new Virus, under Development, so there will be much more functions when im finished."


Also, it is also capable to block users screen with this message:

Be wary of possible backdoor infection. Report suspicious application, especially if it is communicating to unknown or unfamiliar remote server.
Note: While checking the client-server capability, I just thought that it would be useful to capture a video for reference. (recommended screen 720pHD)
More Info check this video :
http://www.youtube.com/watch?v=ge67SuW1GvU&feature=player_embedded

Geinimi, Sophisticated New Android Trojan Found in Wild

The Threat:
A new Trojan affecting Android devices has recently emerged in China. Dubbed “Geinimi” based on its first known incarnation, this Trojan can compromise a significant amount of personal data on a user’s phone and send it to remote servers. The most sophisticated Android malware we’ve seen to date, Geinimi is also the first Android malware in the wild that displays botnet-like capabilities. Once the malware is installed on a user’s phone, it has the potential to receive commands from a remote server that allow the owner of that server to control the phone.


Geinimi is effectively being “grafted” onto repackaged versions of legitimate applications, primarily games, and distributed in third-party Chinese Android app markets. The affected applications request extensive permissions over and above the set that is requested by their legitimate original versions. Though the intent of this Trojan isn’t entirely clear, the possibilities for intent range from a malicious ad-network to an attempt to create an Android botnet.
Lookout has already delivered an update for its Android users to protect them against known instances of the Trojan. If you are already a Lookout user (free or premium), you are protected and no action is needed.
How it Works:
When a host application containing Geinimi is launched on a user’s phone, the Trojan runs in the background and collects significant information that can compromise a user’s privacy. The specific information it collects includes location coordinates and unique identifiers for the device (IMEI) and SIM card (IMSI). At five minute intervals, Geinimi attempts to connect to a remote server using one of ten embedded domain names. A subset of the domain names includes www.widifu.com, www.udaore.com, www.frijd.com, www.islpast.com and www.piajesj.com. If it connects, Geinimi transmits collected device information to the remote server.

Though we have seen Geinimi communicate with a live server and transmit device data, we have yet to observe a fully operational control server sending commands back to the Trojan. Our analysis of Geinimi’s code is ongoing but we have evidence of the following capabilities:
  • Send location coordinates (fine location)
  • Send device identifiers (IMEI and IMSI)
  • Download and prompt the user to install an app
  • Prompt the user to uninstall an app
  • Enumerate and send a list of installed apps to the server
While Geinimi can remotely initiate an app to be downloaded or uninstalled on a phone, a user still needs to confirm the installation or uninstallation.
Geinimi’s author(s) have raised the sophistication bar significantly over and above previously observed Android malware by employing techniques to obfuscate its activities. In addition to using an off-the-shelf bytecode obfuscator, significant chunks of command-and-control data are encrypted. While the techniques were easily identified and failed to thwart analysis, they did substantially increase the level of effort required to analyze the malware. The Lookout Security team is continuing to analyze capabilities of new and existing Geinimi variants and will provide more information as we uncover it.
Who is affected?
Currently we only have evidence that Geinimi is distributed through third-party Chinese app stores. To download an app from a third-party app store, Android users need to enable the installation of apps from “Unknown sources” (often called “sideloading”). Geinimi could be packaged into applications for Android phones in other geographic regions. We have not seen any applications compromised by the Geinimi Trojan in the official Google Android Market.

There are a number of applications—typically games—we have seen repackaged with the Geinimi Trojan and posted in Chinese app stores, including Monkey Jump 2, Sex Positions, President vs. Aliens, City Defense and Baseball Superstars 2010. It is important to remember that even though there are instances of the games repackaged with the Trojan, the original versions available in the official Google Android Market have not been affected. As the Lookout team finds more variants of the Geinimi Trojan grafted onto legitimate applications, we’ll provide timely updates.
As stated above, Lookout has already delivered an update for its Android users to protect them against known instances of the Trojan.

How to Stay Safe:
  • Only download applications from trusted sources, such as reputable application markets. Remember to look at the developer name, reviews, and star ratings.
  • Always check the permissions an app requests. Use common sense to ensure that the permissions an app requests match the features the app provides.
  • Be aware that unusual behavior on your phone could be a sign that your phone is infected. Unusual behaviors include: unknown applications being installed without your knowledge, SMS messages being automatically sent to unknown recipients, or phone calls automatically being placed without you initiating them.
  • Download a mobile security app for your phone that scans every app you download. Lookout users automatically receive protection against this Trojan.
With the discovery of this new malware, it is more important than ever to pay attention to what you’re downloading. Stay alert and ensure that you trust every app you download. Stay tuned for more details on this threat.








Friday, February 25, 2011

Aircel test launch 3G in Kolkata Circle


Hi guys Aircel has launched 3G in kolkata for testing purpose....
They r giving 250MB free usage to every subscriber
to activate this service type
START 3G
and send it to 121. They will give u 250MB free usage and 50 min local Voice call Usage.
and it is valid till 28th Feb.
The speed is amazing, nearly 400kb/s downloading speed (~3.2 mb/s) speed.

Saturday, February 19, 2011

3g technology will increase cyber crime

Cyber Crime has now reached to hacking information from the mobile phones. The 3G technology recently launched by the mobile service providers is in much rage nowadays. The 3G technology allows a user to access internet on a good quality network on the cellphone. As such hackers will now target the 3G users for accessing their personal information and this in turn will result into increased cyber-crime", said Sunny Vaghela, the cyber-crime expert while talking to TOI.

When questioned is there any solution to this new problem, Vaghela mentioned that as of now there exists no solution to prevent hacking from taking place from a mobile phone but he added that certain steps can be taken to minimise the cases of hacking.

"Never reply to the e-mails that offer lottery prize money. Always keep your anti-virus updated and do not download pictures of celebrities from mails sent by anonymous sender. Also avoid downloading songs from Pakistani wesbites. All these steps if taken can help a person in avoiding his personal information getting passed on to the hackers", informed Sunny further.

The cyber-expert further advised that people should avoid using pirated anti-virus softwares that are of no help and can't check a virus inside a computer.

He also advised that person should never disclose banking passwords or PINs on a website as that may get recorded with the wesbite that can be misused later.

Demonstrating, how a person's cellphone can be used to make calls or send messages to some other number without his/her knowledge, Vaghela said that even this is possible nowadays with the help of a selected software tools. "Such calls will originate from the cellphone of a person without his knowledge. Therefore, there are high chances that a cyber criminal can make use of such calls for terrorist activities and cause harm to the integrity of a person", he said further.

He concluded by saying that the threat e-mails originating from computers used by a hacker for some wrongful purpose can also be tracked and traced.

Friday, February 18, 2011

Bypass The Youtube Age Limit

There are some videos on youtube which require you to be a member in order to watch them . What if you wanted to watch them without registering on youtube . Well here’s how to go about it .
For example a video like this :
when u go to this link it would asking you to login and verify your age .
http://www.youtube.com/verify_age?&next_url=/watch%3Fv%3DAh70Y-6LJ40
*** How to watch it without logging in ***
We need to edit the link this way .
>delete :- verify_age?&next_url=/
>Now it looks like
http://www.youtube.com/watch%3Fv%3DAh70Y-6LJ40
> Replace all thing between %3F and %3D with /
>so our link now looks like :-
http://www.youtube.com/watch/v/Ah70Y-6LJ40
> Now use this link in your browser to watch the video
Enjoy !

Indian Hacker shared his video of hacking Microsoft Kinect Xbox to control Tata Sky !

The desire of remote free experience urged Harishankar Narayan a mechanical Engineer to hack into the Microsoft Kinect Xbox and control Tata Sky through Kinetic Movements. In a You Tube video which he has uploaded the man is seen controlling the Tata Sky with the movements of his hands.

The mechanical Engineer said that he wanted a remote free experience which led him to fiddle with the remote of Microsoft’s Kinect Xbox and by trying and retrying he finally hacked into it to recreate his own codes. He says that he wants every appliance in his home to work according to his gestures.



The man built the whole system with keeping in mind the minute details possible like hew had a device called USB UIRP which he connected to his MacMini. The USB acted as a detector of infrared signal and also was a universal remote for all the gadgets. The USB detected the infrared signals for the Tata Sky remote and then from there he set gestures or movemnts to control the Tata Sky.





The hack started with the detection of the Skeleton detection code of the Microsoft’s Xbox Kinect. After that Harishankar Narayan used the open natural interface developed by the Xbox people and he transferred it to his MacMini. After this he did the last bit of the work and wrote the codes for the gestures that would control the Tata Sky. In an interview he also said that not only the Tata Sky but even Playstation can be controlled through kinectic movements.

Tata Sky is slowly replacing cable companies as it provides good customer services to all and provides a good viewing experience to its customers. It has different plans for its users like childrens pack, adults pack, etc.



For More Info See Thsi Video :http://www.youtube.com/watch?feature=player_embedded&v=Lq1qf_UgkDo


News Source : Google

Wednesday, February 16, 2011

To play any video in a full page of browser you have to read this full post.There are many advantages but he disadvantage is only HD videos or some videos with medium clarity-high clarity play better then normal videos..



Now copy the below link and place in your address bar
http://www.youtube.com/v/rOgqPNE4QDw?version=3

now you have to get the url of the video you want to see in full page and change the above red color code(not the yellow colored) with the code which is not similar to your video URL. For example my video URl is

http://www.youtube.com/watch?v=rOgqPNE4QDw


I have to copy the red color text and place it in the below URL/Address/Location
http://www.youtube.com/v/COPIED-TEXT-HERE?version=3

Sunday, February 13, 2011

India bloggers angry at net ban


Indians with computers in an office
There are 50 million Internet users in India
India's burgeoning blogging community is up in arms against a government directive that they say has led to the blocking of their web logs.

The country's 153 internet service providers (ISP) have blocked 17 websites since last week on federal government orders.

Some of these sites belong to Google's Blogspot, a leading international web log hosting service.

Indian bloggers say that the decision is an attack on freedom of speech.

A number of them have started filing petitions under the country's new landmark freedom of information law which gives citizens the right to access information held by the government.

Bloggers say the ban has meant that people do not even have access to blogs like the one set up to help the relatives of the victims of the recent train bombings in Mumbai (Bombay), www.mumbaihelp.blogspot.com.

Angry

The government is not saying why it has banned each of the sites in its latest notification.

SOME BANNED SITES
www.hinduunity.org
exposingtheleft.blogspot.com
pajamaeditors.blogspot.com
commonfolkcommonsense.blogspot.com
www.hinduhumanrights.org/hindufocus.html
princesskimberley.blogspot.com

This has incensed bloggers in India, which has about 40,000 blog sites, even more.

"We want answers. Has the government goofed? Or is really talking censorship? With all our problems in India I was naive enough to feel that I was always free to express myself," writes blogger Dina Mehta.

Writer Dilip D'Souza, who authors a blog, says there is a "groundswell" of anger over the government decision.

"The government of my country does what governments find so easy: ban, block, censor," he writes.

Blogger Amit Agarwal bemoans on his site that India has "joined the Internet Filtering Club of China, Saudi Arabia, Pakistan and Ethiopia".

Sailesh Bharatwasi
I am very tense and angry. The ban is cutting us off from the people
Sailesh Bharatwasi,
Blogger

"If the access to restricted websites is not restored in a day or two, this issue is sure to gather active momentum in the Western blogosphere."

Technology consultant Abhishek Baxi, who authors a blog, has filed two petitions under the freedom of information laws demanding answers from the government on the reasons behind the move.

"Is there a directive to block entire blog hosting services? Isn't this is a violation of our freedom of speech," he wonders.

But a spokesman for India's Internet Service Providers Association says that not all the ISPs have blocked blog sites.

"I have personally checked through different ISPs and logged on to many blogging sites, apart from the ones which have been specifically banned by the government," says Deepak Maheshwari, secretary of the association.

A government official has also said there has been no blanket ban on blogging hosts like Blogspot.

"The government order has four blogs under blogspot.com. The order didn't ask the whole site to be banned," Gulshan Rai of India's state-run Computer Emergency Response Team told reporters.

This does not placate bloggers like Sailesh Bharatwasi, 23, who says he has not been able to blog due to the ban.

"I am very tense and angry. We write so that people can read us. The ban is cutting us off from the people," he says.

'No purpose'

A federal government notification of July 2003 says it can ban websites in the interest of:

  • sovereignty or integrity of India
  • security of the state
  • friendly relations with foreign states and public order
  • preventing incitement to commissioning of any cognisable offences.

The sites that have been banned include ones with right-wing Hindu links and an anti-Communist one. At least four of them are on the Blogspot hosting service.

This is not the first time that the government has ordered the blocking of websites since its notification three years ago.

Two years ago, the government blocked a site under a popular message group saying it was indulging in "anti-national activity".

Indians working on computers
There is a thriving blogging community in India

"It has happened a few times in the past, particularly blocking of pornographic sites. But this is the single largest lot of sites to be blocked," says Puneet Tiwari, deputy director of the Internet Service Providers Association of India.

Internet professionals and lawyers believe that blocking sites really serves no purpose in a large country like India with an increasingly thriving blogging community.

"The ISPs can block a specific site, but the person who runs it can easily tweak its name a bit and return," says Mr Tiwari.

There are an estimated 50 million internet users in India, according to ISP industry estimates.

Only seven million people subscribe to the internet, of whom 1.5 million receive broadband services.

Sunday, February 6, 2011

Trick To Play hidden Snake Game In Youtube

We all visit youtube and watch videos but how many of us are aware of youtube hidden Snake game.I believe only a few people know about this hidden snake game.You can play this game on youtube while streaming any video.Snake gmae is one of the most interesting and traditional game in the world of gaming.In this tutorial I will show you how you can play this game on youtube.

Lets begin the tutorial on how to play hidden game on youtube:

1.Goto youtube and open any video for streaming

2.When the video is streaming Hold left button of mouse + Left arrow on keyboard + Top arrow on keyboard.

3.Now you will see that the streaming circle starting to move like a snake.



4.You can control the movements of the snake using arrow keys of your keyboard.

5.Try to play this game on youtube with videos having some dark background to increase visibility

Enjoy the game and keep visiting our site for more tips and tricks


Please comment after Reading the post....


Bing search results showing up in Google !


If you try the following query:

http://www.google.com/search?q=site%3A.bing.com%2Fsearch

You get about 20,500 search results from Bing. This would not be such a big problem normally but it seems that Google is incorporating Bing search results and crawling Bing search pages, which seems rather odd for a company that has just

accused its competitor of doing just that (never mind that Bing only used its toolbar as a url discovery device, not to ‘copy search results’ but that sounds a lot better in the press).

On top of that the http://m.bing.com/robots.txt file (which seems to be the source of the results) has this entry in it:

Disallow: /search

Which explicitly disables access to other crawlers on that directory (for all user agents, so that includes the google bot).

I wonder how Google is going to explain the presence of these results away, not only do they do *exactly* that which they accuse the Bing team of, they also blatantly ignore the robots.txt file.

The longer I spend on researching this case the more I think that Google will eventually regret going public with this rather than to talk this over quietly with the Bing team. Even if we forget about the robots.txt file the fact that Google states unequivocally that looking at a competitors search results is somehow wrong, immoral or illegal then they should not be doing that themselves even if they were permitted to do so.

If you live in a glass house you should not throw stones.

Saturday, February 5, 2011

Use Hardware Graphics Accel. inGoogle Chrome

Actually this facility is shifted in version 9 but we are able to do some initial steps in the version 7 and we are able to use some of the functionality in version 7 of the Google Chrome.




For that at the desktop right click on the Google chrome icon and select "properties” and activate the "Link” tab.Click in the "Target” input field and press the "End” key from your keyboard.There you have to add a space and have to type this after the Space " –enable-accelerated-composting”.Confirm this and change with the "Apply” and press "OK”.


The processor of the graphics card supports the rendering of the websites from the next time the browser is started.Depending on the computer configuration.

There will be always a speed advantage while surfing the websites which have complex graphical images.

source -google

Friday, February 4, 2011

Facts : Facebook is more addictive than sex and cigarettes ! :


A small study by a trending company shows that Facebook addiction is one of the fastest growing searches related to addiction. It is more popular than searches for sex or cigarette addiction.


While we already knew that social networks like Facebook produce drugged-up, sex-crazed teenagers, new research shows that Facebook addiction may be soon be more prevalent than offline addictions like sex. The Internet Time Machine, a company that searches for trends across the Web through its extensive cloud computing network, is reporting that Facebook may be more popular than sex.

Addiction to social media, specifically Facebook, is one of the top ranked digital addictions, says the trending company. More people are searching for help with Facebook addiction than sex addiction.

“The rise of social media and the fear/need to be in constant contact with status updates and tweets has created a problem for people with addictive personalities,” says ITM. “The fact that accessing Facebook is so easy no on mobile or tablet devices only feed the addiction. New TV sets are being sold now with Facebook and social media widgets built into the remote control. The need to be updating and “in a loop” is growing ever more important as websites and people flood social media with messages, drowning out personal accounts and peoples interests.”

Unfortunately, still topping the list of addictions is alcohol addiction. Drug addictions like heroin and Oxycotin rank highly as well. Facebook ranked as the 16th highest search trend, ranking above cigarettes, sex, and many other forms of addiction. Worldwide, people have searched for “Internet Facebook addiction” 121.8 million times in recent days.

Do you know anyone who is addicted to the Internet or addicted to a social networking site like Facebook, or is this more of a fad than anything else? And what about the news that Facebook actually kickstarts sex in a relationship? Could Facebook be fueling other forms of addiction?

Source : Google