More
▼
Pages
▼
Thursday, 27 September 2012
Windows 8 Release Preview (Highly Compressed)
Windows 8 Release Preview 32Bit and 64Bit with Product Key (Highly Compressed)
Download and follow the following steps:
1. Open file With Winrar, Open folder, And click DVD Folder (wait 30 SEC)
2. While you wait for the DVD in the 'Burn' in a Box. You have to Burn to a Blank DVD.
3. Windows Boot (Setup)
4. Enjoy Windows 8
Product Key: TK8TP-9JN6P-7X7WW-RFFTV-B7QPF
Screen Shoots Windows 8
IDM 6.12 Final Build 21
Description: IDM 6.12 Final Build 21 is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet
Banks Fail To Repel Cyber Threat
Banks Fail To Repel Cyber Threat
Attacks that have tied up bank websites show U.S. financial institutions' vulnerability to electronic terrorism.
A shadowy but well organized hacker group in the Middle East has disrupted the electronic banking operations of America's largest financial institutions in recent days, underscoring U.S. vulnerability to online terrorism.
A group identifying itself as Izz ad-Din al-Qassam Cyber Fighters attacked the websites of Wells Fargo, U.S. Bancorpand Bank of America. The strikes left customers temporarily unable to access their checking accounts, mortgages and other services.
The banks said account and personal information for their tens of millions of online and mobile customers were not compromised. Still, experts said the size and ferociousness of the attacks highlight the broader threat posed by electronic crime and the susceptibility of financial targets.
Of particular concern, experts said, is that the attackers used the Internet to warn the institutions ahead of time — but the banks still couldn't repel the assaults.
"The banks put a lot of effort into cyber security. But they're so desirable as a target, even with all that effort they still have problems," said James Lewis, an expert at the Center for Strategic and International Studies in Washington. "If you can pull together enough resources, you can overwhelm any defense temporarily."
The attacks on banks began last week on the largest institutions in the country: JPMorgan Chase, Citigroup and Bank of America. They spread to Wells Fargo on Tuesday and U.S. Bank on Wednesday. Another attack has been threatened against PNC Financial Services on Thursday.
The U.S. government and banks have been working feverishly to learn more about the attackers. A financial executive not authorized to speak publicly described a "war room" where bankers were coordinating efforts with the Department of Homeland Security
Izz ad-Din al-Qassam is the name of the military wing of Hamas, the political party that governs theGaza Strip. Experts say the attacks appear to have originated from the Middle East, thought it isn't clear who is behind them or the motivation.
However, on Tuesday the group posted a manifesto on the Internet saying attacks would continue until a video insulting the Islamic prophet Muhammad was removed from the Internet. That video, "Innocence of Muslims," has caused violent clashes in the Middle East, and led to the attack of the U.S. embassy in Libya.
Dmitri Alperovitch, a computer security expert investigating the recent attacks, said they are the latest in a series of cyber assaults by the group. The attacks were not only on financial firms, he said, although he declined to identify other industries. Alperovitch said Izz ad-Din al-Qassam has demonstrated "advanced capabilities."
He said it was unlikely that the anti-Islamic video alone had triggered the attacks. He said his firm, CrowdStrike Inc., has linked the group to attacks on other targets since January, long before the trailer for the anti-Islamic film was posted on YouTube.
Wells Fargo, based in San Francisco, had intermittent service interruptions all day Tuesday, distressing many of its 21 million online customers.
Similar problems occurred Wednesday at U.S. Bank. The Minneapolis-based bank said it was experiencing unusually high Web traffic and that the coordinated attacks were "very similar" to those at other major banks. "We are working very closely with federal law enforcement," spokesmanTom Joyce said.
Pittsburgh-based PNC, facing the threatened attack on Thursday, was preparing for the worst. "We've seen the posting" on the Internet, PNC spokesman Fred Solomon said. "We're taking appropriate measures."
Security consultant Alperovitch said the volume of phony demands on bank sites was two to three times heavier than previous records for denial of service attacks, and 10 to 20 times higher than the average such attack. Still, the onslaught so far has had a "very limited impact," resulting in only brief shutdowns of websites.
"The attacks, while very, very large and historic in that sense, are not super sophisticated," he said. Although evidence points to a group "certainly of Middle Eastern origin," his company could not tell whether a state or private group was behind the attacks.
Some speculation centered on whether Iran might be retaliating for economic sanctions placed on the country because of its nuclear program and enforced by U.S. banks.
"I don't believe these were just hackers," Senate Homeland Security Committee Chairman Joe Lieberman (I-Conn.) said last week in an interview on C-SPAN's "Newsmakers" program. "I think this was done by Iran and the Quds Force," a secretive Iran military unit blamed for terrorist activity.
Lieberman was observing Yom Kippur and could not be reached Wednesday. The FBI and Justice Department declined to comment on the origin of the attacks.
Two bankers, who spoke on condition of anonymity, said their banks were also on the alert for cyber thieves who might use the attacks as a diversion.
Google patches 24 Chrome bugs, pays out $29K to bounty hunters
Google patches 24 Chrome bugs, pays out $29K to bounty hunters
Google yesterday patched 24 vulnerabilities in Chrome, and paid out $29,500 in bounties to nine researchers, more than half of that to one of the company's most prolific bug finders.
Chrome 22, which Google started pushing to current users on Tuesday, also debuted improvements in how the browser renders 3-D web apps, including games.
The 24 vulnerabilities include one rated "critical," Google's highest threat ranking, 15 tagged "high," five pegged "medium," and three labeled "low."
[ Get the latest IT news on the Australian government and businesses in Computerworld's Business & Government newsletter ]
Critical bugs are rare in Chrome: Yesterday's, in fact, was not in the browser itself but rather in Windows. In Tuesday's update notification, Google called it a "Windows kernel memory corruption" and attributed the report to a pair of researchers at a Finnish company, Documill, that specializes in creating software for accessing Microsoft Office and Adobe Reader documents through a browser.
For their work, Google awarded the pair $5,000.
The company also paid $15,000 to long-time bug contributor Sergey Glazunov for reporting a pair of critical universal cross site scripting (UXSS) vulnerabilities, one in the browser's frame handling, the other in how it interacts with Google's V8 JavaScript engine.
Glazunov was one of two security researchers who hacked Chrome at Google's inaugural "Pwnium" contest last March. That feat earned him $60,000.
With Tuesday's $15,000 check, Glazunov has taken home nearly $80,000 for his research efforts this year.
So far in 2012, Google has paid over $290,000 in bounties, a number sure to climb. Last month, Google raised the bonuses it pays, saying the change was triggered by a decline in submitted reports.
Several of the researchers who received bounties for the bugs patched in Chrome 22 benefited from the increase, including Glazunov, the two from Documill, and others who received $1,000, the new bonus basement.
Chrome 22 includes few if any visible changes, but yesterday Google touted some behind-the-scenes improvements, notably support for the Pointer Lock JavaScript API, or "Mouse Lock."
The feature should improve play of first-person, 3-D games within Chrome, said Google engineer Vincent Scheib in a Tuesday blog post.
Google also called out some unspecified enhancements to Chrome in preparation for the Oct. 26 launch of Windows 8 by Microsoft.
Although Google announced a Windows 8 version of Chrome -- one that will include not just a desktop browser for that traditional UI, but also one for what was formerly called the "Metro" environment -- in mid-June, it has not shifted the latter from the rough-around-the-edges "Dev" channel since then.
Chrome 22 can be downloaded for Windows, Mac OS X and Linux from Google's website. The browser is updated automatically through its silent service.
China's cyber theft could be more serious than reported: official
China's cyber theft could be more serious than reported: official
Taipei, Sept. 27 (CNA) China's cyber hacking of Taiwanese websites could be more serious than has been officially reported, Taiwan's intelligence chief said Thursday.
Tsai De-sheng, director-general of the National Security Bureau (NSB), confirmed reports during a Legislative Yuan question-and-answer session that China has hacked some 26,000 pieces of information from Taiwan's Internet system over the past seven years.
However, the figure tallies only those cases that have been discovered, Tsai noted, adding that there are doubtless other hacking cases that have gone undetected.
During the interpellation session, opposition Democratic Progressive Party Legislator Tsai Huang-liang asked about the NSB's stance on a proposal to allow Chinese companies to invest in the local telecommunications sector.
In response, the NSB director said that countries all over the world have adopted strict restrictions on Chinese investment in their telecom sectors because China is known to be incredibly aggressive in its cyber hacking
'Anonymous Philippines' on a Hacking Spree
'Anonymous Philippines' on a Hacking Spree
MANILA, Philippines – A hacktivist group struck down several government websites Wednesday night in protest against the recently enacted anti-cybercrime law that imposes penalties on hacking, online libel and similar activities.
The group identified as “Anonymous Philippines” attacked the websites of the Metropolitan Waterworks and Sewerage System (MWSS), Bangko Sentral ng Pilipinas, Department of Health Anti-Smoking, the University of the Philippines'Institute for Development and Econometric Analysis,Philippines’ Anti-Piracy Team (PAPT), the Department of Environmental and Natural Resources Region 3 and theAmerican Chamber of Commerce of the Philippines.
The hackers replaced the websites with a predominantly black interface, an animated logo and a statement against the Cybercrime Prevention Act of 2012. The group calls the new law "the most notorious act ever witnessed in the cyber-history of the Philippines."
Anonymous Philippines, whose Facebook page boasts over 250 fans, also called the new law's provisions on libel "cunningly deceptive" in implying that everyone can be imprisoned even for their licit online activities.
"It can imprison anyone who commits libel either by written messages, comments, blogs or posts in sites such as Facebook, Twitter or any other comment-spaces of other social media in the Internet," the group claimed, tagging themselves with the lines "We are Legion. We do not forgive. We do not forget. Expect us."
As of posting time, some of the hacked websites have not been restored.
Traditionally, .gov domains are considered the most secure online sites.
'Up and restored'
Certain links at the official website of the BSP remain inaccessible to public hours after the portal was defaced by a group condemning the passage of the anti-cybercrime law..
"As of 2 a.m. today, the website of the (BSP) has been up and running, restored and able to serve the public once again," a statement released on Thursday said.
"The BSP's internal Information Technology Group worked on the immediate restoration of our website after ensuring that our security firewall kept our databse protected," it added.
The BSP website was one of the government portals hacked by Anonymous Philippines in its protest against Republic Act No. 10175 or the Cybercrime Prevention Act, which the group sees as a form of online censorship. A group of journalists on Tuesday filed a stay order petition against the law before the Supreme Court.
Recently, the Department of Science and Technology’s Information and Communications Technology Office issued directives to all government system administrators to review their websites’ security to prevent more hacking attacks.
The directive was issued after a series of attacks on government websites at the height of the tense territorial dispute between China and the Philippines over the Panatag Shoal in the West Philippine Sea.