Showing posts with label Hack. Show all posts

Monday, 29 December 2014

Politician's Fingerprint 'cloned from photos' by Hacker...

  No comments
15:40

Mr. Krissler provided details of his technique at a convention in Hamburg.
A member of the Chaos Computer Club (CCC) hacker network claims to have cloned a thumbprint of a German politician by using commercial software and images taken at a news conference.

Jan Krissler says he replicated the fingerprint of defence minister Ursula von der Leyen using pictures taken with a "standard photo camera".

Mr Krissler had no physical print from Ms. Von der Leyen.

Fingerprint Biometrics are already considered insecure, experts say.

Mr. Krissler, also known as Starbug, was speaking at a convention for members of the CCC, a 31-year-old network that claims to be "Europe's largest association" of hackers.

'Wear gloves'

He told the audience he had obtained a close-up of a photo of Ms von der Leyen's thumb and had also used other pictures taken at different angles during a press event that the minister had spoken at in October.

Mr. Krissler has suggested that "politicians will presumably wear gloves when talking in public" after hearing about his research.

Fingerprint identification is used as a security measure on both Apple and Samsung devices, and was used to identify voters at polling stations in Brazil's presidential election this year, but it is not considered to be particularly secure, experts say.
German defence minister Ursula von der Leyen's fingerprint was cloned just from photos, the hacker claims.

Living Biometrics

"Biometrics that rely on static information like face recognition or fingerprints - it's not trivial to forge them but most people have accepted that they are not a great form of security because they can be faked," says cybersecurity expert Prof Alan Woodward from Surrey University.

"People are starting to look for things where the biometric is alive - vein recognition in fingers, gait [body motion] analysis - they are also biometrics but they are chosen because the person has to be in possession of them and exhibiting them in real life."

In September this year Barclays bank introduced finger vein recognition for business customers, and the technique is also used at cash machines in Japan and Poland.

Electronics firm Hitachi manufactures a device that reads the unique pattern of veins inside a finger. It only works if the finger is attached to a living person.

Trials in the intensive care unit at Southampton General Hospital in 2013 indicated that vein patterns are not affected by changes to blood pressure.

Read More

Tor Users Were Not At Risk During Attack.

  No comments
13:59


Lizard Squad, a hacker group, has been pretty busy over Christmas. First it knocked down PlayStation Network and Xbox Live, bringing online gaming on PlayStation and Xbox consoles to a standstill, and then set its sights on an anonymity network called Tor. Lizard Squad shifted its focus over the weekend, saying that it would “no longer attack” gaming services, and instead go after Tor with a zero-day exploit. Simply put, a zero-day exploit is one that leverages an unknown vulnerability.

The Tor Project, a non-profit organization, had warned earlier this month about an attack that would try and “incapacitate” the network. That hasn’t happened it seems. In a statement it was confirmed that while attackers tried to become a large fraction of the network by signing up many new relays, the new relay servers only amounted to “less than 1 percent” of the entire capacity of the Tor network during this attack.

Work is now underway to remove these relays from the Tor network before they assume the form of a threat, and based on what The Tor Project has seen so far, it doesn’t expect “any anonymity or performance effects.”

The Tor network is often used by people who want to cover their tracks online, be it journalists in a hostile state, or activists galvanizing people against an oppressive government. It is also used by criminals for obvious reasons, but Lizard Squad went after Tor because “only hackers, miscreants and pedophiles use Tor.”

Read More

PlayStation Network back online, while Lizard hacker group basks in limelight.

  No comments
11:41

After days of disruption Sony’s PlayStation Network is functioning again – but hackers’ appetite for fame may prove their undoing.

The PlayStation Network is back online ... for now. 

The global gaming service used by 110m people was brought down on Christmas Eve, seemingly by a hacking group calling itself Lizard Squad. On Sunday however, Sony assured customers via its PlayStation blog that the system was now functioning. 

The company also admitted for the first time that the disruption was caused by hackers who used a distributed denial of service (DDoS) attack to flood the PlayStation servers with traffic, bringing access to a halt.

A View of Chat with Lizard Squad.
“As you probably know, PlayStation Network and some other gaming services were attacked over the holidays with artificially high levels of traffic designed to disrupt connectivity and online gameplay,” read the post. “This may have prevented your access to the network and its services over the last few days.”

Microsoft’s Xbox Live infrastructure was also attacked, reportedly by the same group, which revelled in its achievement via a series of tweets throughout Christmas day. However, the Xbox online infrastructure was functioning again by Boxing Day.

Formed in mid-2013, Lizard Squad has been stepping up its media profile in the wake of the Christmas attacks. In a series of interviews, two self-declared founding members have claimed that their motivations are amusement, and to highlight the security weaknesses of the systems.

“If I was working [at Microsoft or Sony] and had a big enough budget, I could totally stop these attacks,” “Ryan Cleary” (a pseudonym borrowed from an infamous LulzSec hacker) claimed to tech news site Daily Dot. “I’d buy more bandwidth, some specific equipment, and configure it correctly. It’s just about programming skill. With an attack of this scale, it could go up to the millions. But that’s really no problem for Sony and Microsoft.”

Speaking to Sky News, “Cleary” added, “These companies make tens of millions every month from subscriber fees and that doesn’t even include purchases made by their customers.

Advertisement

“They should have more than enough funding to be able to protect against these attacks.”

Lizard Squad has claimed that its actions against Sony and Microsoft were more sophisticated than standard DDoS attacks, which don’t usually require hackers to gain access to the target’s online infrastructure.

“There’s plenty of people saying we’re not hackers and DDoS isn’t hacking. For attacks of this scale, you can’t really do them without either having access to insane amounts of funding or being able to gain access to the computers via hacking,” “Cleary” said to Daily Dot. “You can’t just do DDoS attacks from your home computer. It doesn’t work.”

The group has even suggested that it has access to undersea cables that facilitate internet connections between the US and Europe.

But its appetite for fame may prove to be Lizard Squad’s undoing, after security journalist Brian Krebs claims to have uncovered the possible true identities of at least two members, both of whom have conducted TV interviews in the wake of the attacks.

“Ryan Cleary”, Krebs claims, is in fact a Finnish teenager. Krebs claims the other founding member is a 22-year-old Briton. Krebs says that he has found one of these men enquiring on the site Hackforums about how to dispose of Mega vouchers; Krebs claims this was a reference to the $300,000 bribe in vouchers the group allegedly received from Kim Dotcom for stopping the attacks. 

“Both of these individuals may in fact be guilty of nothing more than taking credit for other peoples’ crimes,” Krebs writes. “But I hope it’s clear to the media that the Lizard Squad is not some sophisticated hacker group. The Lizard Squad’s monocle-wearing mascot shows them to be little more than a group of fame-seeking kids who desperately aspire to be like LulzSec, a similarly minded gang whose core members are all now in jail. With any luck, these kids will get their wish soon enough.”

Lizard Squad first came to public attention in August, when it claimed responsibility for a previous DDoS attack on the PlayStation Network. It was even implicated in a hoax bomb warning, delivered to an American Airlines flight which had a senior Sony executive onboard. The size and location of the group is unknown, although it claims to be just a handful of programmers. In an interview with YouTube news channel Drama Alert, representatives of the group claimed to be coordinating their attacks via a data centre in Moldova.

Read More

Xbox Live And PSN Are Still Messed Up After Attack By Hackers.

  No comments
00:58

PlayStation Network and Xbox Live are still repeatedly going offline and experiencing problems, so if you're itching to try out a new Christmas gift game, you may have to wait.

Some Xbox One users may currently be experiencing issues signing into Xbox Live. Please see http://t.co/99xfLNN0o8 for more info. AD

- Xbox Support (1-5) (@XboxSupport) December 26, 2014
Our engineers are continuing to work hard to resolve the network issues users have experienced today. Thanks for your continued patience!

- Ask PlayStation (@AskPlayStation) December 26, 2014
An inane hacking group called "Lizard Squad" is taking responsibility for the service problems and insisting that people RT their tweets before they'll fix them. There's no confirmation that this group is definitely responsible, but they've been teasing plans to screw up these networks for weeks. Lizard Squad is already infamous in the gaming world for its history of random attacks. This past August, it gained notoriety attacking Runescape and League of Legends, so this latest attack would be a continuation of its dipshit activities.

There are a number of different Twitter accounts claiming to be this hacker group, and it looks like at least one of them made a deal with Kim DotCom to end the hack, as Mashable pointed out:

Thanks @LizardMafia for stopping attack on XBOX Live & PSN. Let everyone play with their Xmas gifts. Your Mega vouchers have been approved!

- Kim Dotcom (@KimDotcom) December 26, 2014
Yet the 3000 MegaPrivacy vouchers Kim Dotcom tried to use as an olive branch, people are still having a hard time using Xbox Live and PSN, so perhaps the hackers were not satisfied with their bounty. It's whatever the opposite of a Christmas miracle is.

But As of Latest Update Xbox And PS Network Engineers Working very hard to resolve the situation Before New Year...

Read More

Saturday, 27 December 2014

‘The Interview’ makes $1M in theaters, downloaded by 900K torrent users Worldwide...

  No comments
12:11

Did you see The Interview already?
If you weren’t lucky enough to live in a city screening the film, perhaps you were one of the 900,000 torrent users who streamed it?

“It’s unsurprising that ‘The Interview’ was quickly pirated, particularly given worldwide interest in the movie after the devastating hack on SONY PICTURES ENTERTAINMENT INC. and allegations by U.S. government that North Korea was responsible for the attack,” reported Variety.
The mass pirating of the film, which was also streaming for a fee ($5.99 to rent, $14.99 to buy) on YouTube (where it tops the most-popular list), Google Play, Microsoft’s Xbox Video and at SeeTheInterview.com, occurred within 24 hours of release, and about 28 percent of it came from within the United States.
More than 300 independent theaters also screened the film, many sold-out shows, including this rousing review of a one from The Verge attending a screening in Austin, Texas. The film banked $1 million on opening day, and could “make a couple million more over the long holiday weekend,” according to CNN Money.

If you saw it, let us know in the comments. What did you think?
For Reading the Full Review of Movie 'THE INTERVIEW', Click the Link Below :

If you still not saw it Here's Download Link Available for You :
=========================================================================================================================

Read More