Posts Tagged ‘About’
ZERO DAY – a Film About War with Cybercrime
Last Updated on Thursday, 23 August 2012 10:14 Written by Celframe Security Team Saturday, 10 November 2012 10:30
ZERO DAY is a film about cybercrime, where a journalist Brian Krebs tracks down and takes an interview from a money mule, moves stolen money for the Russian mob. In addition, filmmakers are getting help from the Facebook’s Security Team at Menlo Park California headquarters.
This team is providing an unattended access to various criminal activities like intrusions, hacks and more. We see all the hard work of these charming personalities who solves the crimes of hackers every day. Nevertheless these hard to solve cases may lead anywhere in the world – filmmakers follow every move to catch everything on film.
ZERO DAY is co-financed by BBC Storyville, while the filmmakers are working with reporters like John Markoff (New York Times) and Joe Mell (Reuters). Author Misha Glenny takes part in this film too. 2-spyware team takes part in this project too. The filmmakers are talking with Mark Cuban and Magnolia Pictures, to be able to distribute in US TV and theatres.
2-spyware team invites everyone to support the creation of this film through Kickstarter. By donating money you become an official donor of ZERO DAY. Film is scheduled for release at September, 2013.This entry was posted on Monday, April 30th, 2012 at 8:25 am and is filed under News, What’s new. You can leave a response, or trackback from your own site.
Anon Tweets About Hack, Gets Arrested
Last Updated on Friday, 25 May 2012 04:23 Written by Celframe Security Team Wednesday, 17 October 2012 04:53
A 21 year-old Ohio man associated with the Anonymous Internet collective is in detention after boasting on Twitter about his involvement in the hack of the Utah Chiefs of Police Association and the Salt Lake City Police Department.
John Anthony Borell III was charged with two counts of computer intrusion after he used a computer program to launch a SQL injection attack that comprTomised the websites of the Utah Chiefs of Police and the SLCPD in January, according to a grand jury indictment unsealed on April 4.
Borell might have gotten away with it too, if he hadn’t taken credit for the attack on his Twitter account (handle: @ItsKahuna), posting the admin username and password combination of the Utah Chiefs of Police Association and another message castigating “Whoever removed the Megaupload image from (the Chiefs of Police Association Web site) and replaced it with their nick when I hacked it for a purpose.” Borell followed those with tweets taking credit for hacking the SLCPD website and denigrating the SLCPD. He is also alleged to have published much of the information gleaned in this attack to the text-sharing sites like Pastebin.
Law enforcement gathered the information and connected it to Borell after sending a search warrant to Twitter and receiving an IP audit in return. He was arrested in late March.
Borell’s indictment (which can be read in its entirety here) was unsealed on the same day as CabinCr3w hacker, Higinio Ochoa was arrested for his alleged involvement in a hack of the Texas Department of Public Safety. CabinCr3w is named in the Borell indictment as part of a hacker collective loosely associated with Anonymous, but with a more well-defined membership and a history of hacking law enforcement organizations.
Be aware about vulnerability found on Google Wallet
Last Updated on Monday, 12 March 2012 01:21 Written by Celframe Security Team Sunday, 19 August 2012 12:54
Google Wallet is the credit card payment system that has been recently launched by Google. Based on Near Field Communication (NFC), this system is said to have some serious advantages over physical credit cards we normally use because it allows for its users pay for their purchases only by entering the pin on the phone in the store. This system is available only in the United States now. It can be used only by Samsung Nexus S 4G smartphone users and only on two wireless providers, Sprint and AT&T. However, there is a great possibility of security vulnerabilities too that pose a great risk to Google Wallet users by allowing attackers to gain the access to this system without any user’s permission asked.
Among all the good things that have been mentioned about it on the web, security experts have also noticed some weaknesses. One of them is that Google decided to use only a four digit pin what may seem to be convenient only in the beginning of using this system. The greatest risk of this is that hackers can easily guess these numbers. In addition, researchers from Zvelo blog have also discovered that Google saves the pin in the encrypted form on the smartphone. With a help of the brute forcing software, this vulnerability allows to decrypt the information in no longer than a second after its run. According to the latest news, Google hasn’t fixed this vulnerability found on Google Wallet yet.
So, if you have started to use this system on your smartphone, pay attention to these things in order to keep your pin secure:Lock Screens. Enable this function to increase security on your smartphone.USB Debugging. Disable it to protect your data on mobile device and avoid being accessed without first passing a lock screen.Full Disk Encryption. Enable it in order to prevent USB Debugging from bypassing the lock screen.Avoid rooting your phone. Avoid this on your smartphone to prevent a thief.Update. This will guarantee that your device is filled with the latest official software.
Source: zvelo.comThis entry was posted on Thursday, February 9th, 2012 at 8:27 am and is filed under News, Security. You can leave a response, or trackback from your own site.