Monday, 15 August 2016

Bitcoin Exchange Offers $3.5 Million Reward for Information of Stolen Bitcoins


Bitcoin Exchange Offers $3.5 Million Reward for Information of Stolen Bitcoins
Hong Kong-based Bitcoin exchange 'Bitfinex' that lost around $72 Million  worth of its customers’ Bitcoins last week is now offering a reward of $3.5 Million to anyone who can provide information that leads to the recovery of the stolen Bitcoins.

Bitfinex revealed on August 2 that the cryptocurrency exchange had suffered a major security breach, which resulted in the loss of nearly 120,000 BTC.

The hack led to a 36 percent loss for each Bitfinex customer, who will be issued tokens to be redeemed as the company is able to reimburse the losses.


Now, the exchange is willing to offer 5% of the lost funds (nearly 6,000 BTC) as a reward for the recovery of the stolen bitcoins.

The news came after a Reddit user, using alias someguy916, inquired  about a reward Bitfinex would be willing to offer for the stolen bitcoins.

In response to the question, Bitfinex community director Zane Tackett stated that a bounty would be awarded to anyone who has information that would help the exchange recover the funds.

"5% of recovery and for information leading to recovery (but no bounty if no recovery); if multiple persons lead to recovery, share pro rata," Tackett wrote.

Where 5% of the stolen funds is about 6,000 BTC, which is around $3.5 MILLION.


Bitfinex is the third-largest Bitcoin exchange in the world. After the news of the Bitfinex hack had broken on August 2, the price of Bitcoin dropped almost 20%, from $602.78 to $541 per Bitcoin, within the day after the announcement.

As a precaution, Bitfinex has adopted additional security measures for its customers, as the company said in astatement Wednesday:

"We have added additional platform and infrastructure security checks; regenerated all encrypted services, including wallets, security tokens, and passwords; moved funds to multisig cold storage; re-evaluated all third-party integrations; performed a comprehensive system audit in order to identify vulnerabilities; and, rebuilt our entire platform on new infrastructure."

The best way to secure yourself from such hacks is to keep your Bitcoins OFFLINE.

Sunday, 7 August 2016

South Korea Says North Korea Hacked Government E-Mails


Telegram Responds to Report of Massive Hack


Messaging app Telegram has on Tuesday responded to media reports that claimed a hacker attack that originated in Iran was not a "massive" one and only publicly available information was exposed to hackers. The company however, acknowledged that 15 million accounts from Iran were confirmed to be registered with the app as part of the attack.
On Tuesday, Reuters reported that Iranian hackers have compromised more than a dozen accounts on the Telegram and identified the phone numbers of around 15 million Iranian users.
According to the report, cyber researchers have claimed that the hackers belonged to a group called Rocket Kitten, and used Persian-language references in their code and carried out "a common pattern of spearphishing campaigns reflecting the interests and activities of the Iranian security apparatus."
Telegram has claimed that individual accounts were not accessed as part of the attack and said in its blog post, "Such mass checks are no longer possible since we introduced some limitations into our API this year."
However, the company did acknowledge that its messaging app has direct correlation with phone's contacts, and therefore it is potentially possible for "any party" to have checked if a particular phone number was registered in their system. The company pointed out that other platforms like WhatsApp and Facebook Messenger carry the same risk.
In response to allegations that certain accounts were accessed via SMS interception, Telegram has said that it released a warning for its users regarding the same earlier this year and also introduced its 2-Step verification to protect its users from such situations.

Jeep Hackers Back at Black Hat With New and Scarier Method


A pair of well-known hackers has found another way to take control of a Jeep Cherokee - this time while it's moving at high speed.
Charlie Miller and Chris Valasek grabbed headlines last year by showing how they could kill a Jeep Cherokee's engine while it was traveling down a highway. The news prompted an embarrassing recall of 1.4 million Jeeps and other vehicles by parent company Fiat Chrysler.
In front of a packed lecture hall at the Black Hat hacker conference on Thursday in Las Vegas, the pair demonstrated how they could again take control of the same 2014 Jeep Cherokee they hacked the year before. This time they sent false messages to its internal network, overriding the correct ones.
That allowed them to do new - and scarier - things, such as making the vehicle turn sharply while it was speeding down a country road. They also were able to make the vehicle unintentionally speed up, or remotely slam on its brakes.
"If you can steer a car at any speed, that's pretty dangerous," Miller said, as video showed the Jeep turning so hard and fast it left skid marks. Another turn sent it into a ditch alongside a Midwestern cornfield.
The pair's previous hack only allowed them to do similar things if the Jeep was moving slower than 5 mph, making for a much less dangerous scenario.
This time, it was more about reverse engineering than actual hacking. They d
issected why the vehicle's safety systems prevented remote attempts to yank the car's steering wheel or slam on its brakes if it was moving at more than 5 mph, but not at lower speeds, then looked for a way around that.
Fiat Chrysler said that while the company admired the pair's creativity, Thursday's presentation didn't show any new ways to breach the Jeep remotely. It also argued that the attack couldn't have been carried out remotely because of fixes made after the previous hack, which is something Miller and Valasek dispute.
The automaker added that the methods Miller and Valasek used were costly, time consuming and required extensive technical expertise.
The pair acknowledged that they did put quite a bit of time and effort into their hack and that it's not something the average person needs to worry about falling victim to.
For their part, Miller and Valasek, who now work for the ride-hailing service Uber, said that after four years of hacking cars together, they've decided to move on. They encouraged other hackers to pick up where they left off.
"There's no reason to think that this car company, or just American cars, is the only one that could be hacked," Miller said.

On This Day 25-years Ago, The World's First Website Went Online


first-website-www
On this day 25 years ago, August 6, 1991, the world's first website went live to the public from a lab in the Swiss Alps.

So Happy 25th Birthday, WWW! It's the Silver Jubilee of the world's first website.

The site was created by Sir Tim Berners-Lee, the father of the World Wide Web (WWW), and was dedicated to information on the World Wide Web project.

The world's first website, which ran on a NeXT computer at the European Organization for Nuclear Research (CERN), can still be visited today, more than two decades after its creation.

The first website address ishttp://info.cern.ch/hypertext/WWW/TheProject.html.
"The WorldWideWeb (W3) is a wide-area hypermedia information retrieval initiative aiming to give universal access to a large universe of documents," the world's first public website reads, going on to explain how others can also create their own web pages.
"The project started with the philosophy that much academic information should be freely available to anyone."
Berners-Lee wrote about the HyperText Transfer Protocol (HTTP) that outlined how information or data would travel between computer systems, as well as, HyperText Markup Language (HTML) that was used to create the first web page.

Berners-Lee vision was to create a place where people could share information across the world through a "universal linked information system" – in which a network of documents (web pages) linked to one another could help users navigate to find what exactly they need.
first website
And so is the concept of the World Wide Web.

Berners-Lee initially proposed the idea for a worldwide network of computers sharing information in 1989, while he was working as a computer programmer at the European Organization for Nuclear Research (CERN) in Geneva, Switzerland.


Steve Jobs Helped Tim to Create The Web

first-web-server
The World Wide Web was written on a NeXT computer, made by the company Steve Jobs founded after he was kicked out of Apple back in 1985.
"We bought a cool machine, the NeXT computer," Berners-Lee said two years ago during an interview at Rensselaer Polytechnic Institute. "NeXT was a machine made by Steve Jobs when he was kicked out of Apple [in 1985]... it had a wonderful spirit to it, a really good developer's environment." 
"When you opened it, you got a pre-recorded message from Steve that said, 'Welcome to the NeXT. This is not about personal computing. It's about 'inter-personal' computing.' It was perfect for designing the web."
The website went live to the public on August 6, 1991; that's exactly 25 years back. At the time, Berners-Lee taped a note to the front of his NeXT computer, saying:

"This machine is a Server. DO NOT POWER DOWN."

Need to Reinvent the Internet

internet-tim-berners-lee
When Berners-Lee created the World Wide Web, his idea was simply to create a tool for scientists to find and share information with ease.

The Web has since become the world’s most powerful medium for knowledge, communications, and trade — but that doesn't mean he is happy with all of the consequences.

Last month, Berners-Lee turned 61 and regretted a lot of things about his invention. He has primarily concerned that the Internet has now transformed into the "world's largest surveillance network."
Today, the Web "controls what people see, creates mechanisms for how people interact," New York Times quotedBerners-Lee as saying. "It is been great, but spying, blocking sites, repurposing people's content, taking you to the wrong websites that completely undermines the spirit of helping people create."
This is why the creator of the Internet is figuring out what the next step should be for the World Wide Web.

The Web model relies on central servers and IP addresses, which can easily be tracked or blocked. Therefore, Berners-Lee is looking to decentralize the whole Web, the report said.
"The web is already decentralized," he said. "The problem is the dominance of one search engine, one big social network, one Twitter for microblogging. We do not have a technology problem; we have a social problem."
The idea is simple:

To eliminate middleman completely from all aspects of the Web. Still, all the major players do not agree to this decentralize approach. It's still a question that whether the Internet needs decentralizing

Wednesday, 3 August 2016

Bypassing Firewall

Firewall Piercing (Inside-Out Attacks)
Disclaimer
Wehereby disclaim all responsibility for the following hacks. If it backfires on you in any way whatsoever, that’s the breaks. Not our fault. If you don’t understand the risks inherent in doing this, don’t do it. If you use the hacks and it allow vicious vandals to break into your company’s computers and costs you your job and your company millions of dollars. Don’t come crying to us.
Firewall Piercing (Inside-Out Attacks)
Moral

A firewall cannot protect a network against its own internal users, and should not even try to.
Inside-Out attacks try to initiate network connections from the trusted (corporate) to the un-trusted (Internet) network.
Synonym …Inside-Out Network subversion …Inside-Out Attack …Covert Channel Attack
Firewall Piercing (Inside-Out Attacks)
A Covert Channel is a communication channel that allows a process to transfer information in a manner that violates the system’s security policy; without alerting any firewalls and IDS’son the network.
The technique derives its stealthy nature by virtue of the fact that it sends traffic through ports that most firewalls will permit through.
Firewall Piercing (Inside-Out Attacks)
Direct Tunnels (Simple) …ACK tunnel …TCP tunnel (pop, telnet, ssh) …UDP tunnel (syslog, snmp) …ICMP tunnel …IPSEC, PPTP
Firewall Piercing (Inside-Out Attacks)
ProxifiedTunnels (Advance) …Socks SSL tunnel …HTTP/S tunnel (payload of http = tunnel) …HTTP/S proxy CONNECT method tunnel …DNS tunnel …FTP tunnel …Mail tunnel; http://www.detached.net/mailtunnel/ …MSN tunnel; http://gray-world.net/pr_msnshell.shtml
Firewall Piercing (Inside-Out Attacks)
Ethernet Bridging over TCP/UDP (Advance and Bloody) …Layer 3 data (eg. IP, IPX, AppleTalk) can be encapsulated, encrypted and tunneled through Layer 4 protocol (TCP/UDP) …Can run arbitrary any kind of TCP/IP applications behind a restrictive firewall …Original IP address could be changed making it more stealthy …Open VPN; http://openvpn.net/ …Implementation: http://www.ZecureLab.com
Firewall Piercing (Inside-Out Attacks)
Netcat …http://netcat.sourceforge.net …very good for building reverse tunnel (i.e. Information flow through the other ways)
Example of Covert Channel Attacks
DNS Tunnel …domain name lookup is allowed by any internal client
Example of Covert Channel Attacks
SSH Tunnel (Simple) …TCP/IP Gender Changer …Requires SSH port allowed by firewall
Example of Covert Channel Attacks
SSH Tunnel (Advanced) …TCP/IP Gender Changer …SSH over SSL Connect …HTTPS Proxy Connect-Method …Requires HTTPS allowed for any destinations …http://gray-world.net/pr_firepass.shtml …http://bypass.cc Comment …content-Filter does not help (SSL)
Example of Covert Channel Attacks
HTTP/S Tunnel …Using POST requests …Implementing “own”service POST requests …POST data are in binary form Implementations …http://www.nocrew.org/software/httptunnel.html …http://entreelibre.com/cctt/index_en.html
Example of Covert Channel Attacks
ICMP Tunnel …Reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets. Implementations …http://www.cs.uit.no/~daniels/PingTunnel/ …http://www.securiteam.com/tools/5PP0M0K60O.html …http://www.bo2k.com/
Example of Covert Channel Attacks
Ethernet Bridging over TCP/UDP …Reliably tunnel any network protocol (e.g. IP, IPX, AppleTalk) connections to a remote gatewayusing any TCP/UDP packets. …This demonstration concentrates on IP only. …A new identity (IP address) will be assigned. …A new default gateway, DNS entry will be acquired. …Your corporate LANs and the remote LANs arenow unify. Example of Covert Channel Attacks
Ethernet Bridging over TCP/UDP (con’t) …Implications „More stealthy „Hard to trace „Location-tracking „Hide BT Traffic (seed) „Privacy and freedom online „Anonymous Surfing „Identity Protection Example of Covert Channel Attacks
Mitigation …Un-plug your network cables …Firewall: deny “any to any rules” …Content-Filter http traffic: deny unwanted content-type …Firewall: restrict http/s locations …Firewall: restrict ipseclocations …Content-filter: deny anonymizerwebsites
Firewall Piercing (Inside-Out Attacks)
White-listing vs. Black-listing …Listing of the allowed resources = white-listing …Listing of the denied resources = black-listing …White-listing is more secure …Black-listing is easier to handle (convenience)

Computer Forensics

Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further reading. It promotes the idea that the competent practice of computer forensics and awareness of applicable laws is essential for today’s networked organizations. 
This subject is important for managers who need to understand how computer forensics fits as a strategic element in overall organizational computer security. Network administrators and other computer security staff need to understand issues associated with computer forensics. Those who work in corporate governance, legal departments, or IT should find an overview of computer forensics in an organizational context useful.  
What is Computer Forensics?
If you manage or administer information systems and networks, you should understand computer forensics. Forensics is the process of using scientific knowledge for collecting, analyzing, and presenting evidence to the courts. (The word forensics means “to bring to the court.” ) Forensics deals primarily with the recovery and analysis of latent evidence. Latent evidence can take many forms, from fingerprints left on a window to DNA evidence recovered from blood stains to the files on a hard drive. 
Because computer forensics is a new discipline, there is little standardization and consistency across the courts and industry. As a result, it is not yet recognized as a formal “scientific” discipline. We define computer forensics as the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law. 
Why is Computer Forensics Important?
Adding the ability to practice sound computer forensics will help you ensure the overall integrity and survivability of your network infrastructure. You can help your organization if you consider computer forensics as a new basic element in what is known as a “defense-in-depth”1 approach to network and computer security. For instance, understanding the legal and technical aspects of computer forensics will help you capture vital information if your network is compromised and will help you prosecute the case if the intruder is caught.                                                            1  “Defense in depth is designed on the principle that multiple layers of different types of protection from different vendors provide substantially better protection” <http://netsecurity.about.com/cs/generalsecurity/a/aa112103.htm>.
Produced 2008 by US-CERT, a government organization. Updated 2008.  2
What happens if you ignore computer forensics or practice it badly? You risk destroying vital evidence or having forensic evidence ruled inadmissible in a court of law. Also, you or your organization may run afoul of new laws that mandate regulatory compliance and assign liability if certain types of data are not adequately protected. Recent legislation makes it possible to hold organizations liable in civil or criminal court if they fail to protect customer data.2
Computer forensics is also important because it can save your organization money.  Many managers are allocating a greater portion of their information technology budgets for computer and network security. International Data Corporation (IDC) reported that the market for intrusion-detection and vulnerability-assessment software will reach 1.45 billion dollars in 2006. In increasing numbers, organizations are deploying network security devices such as intrusion detection systems (IDS), firewalls, proxies, and the like, which all report on the security status of networks.
From a technical standpoint, the main goal of computer forensics is to identify, collect, preserve, and analyze data in a way that preserves the integrity of the evidence collected so it can be used effectively in a legal case.
What are some typical aspects of a computer forensics investigation? First, those who investigate computers have to understand the kind of potential evidence they are looking for in order to structure their search.3 Crimes involving a computer can range across the spectrum of criminal activity, from child pornography to theft of personal data to destruction of intellectual property. Second, the investigator must pick the appropriate tools to use. Files may have been deleted, damaged, or encrypted, and the investigator must be familiar with an array of methods and software to prevent further damage in the recovery process.  
Two basic types of data are collected in computer forensics. Persistent data is the data that is stored on a local hard drive (or another medium) and is preserved when the computer is turned off. Volatile data is any data that is stored in memory, or exists in transit, that will be lost when the computer loses power or is turned off. Volatile data resides in registries, cache, and random access memory (RAM). Since volatile data is ephemeral, it is essential an investigator knows reliable ways to capture it.
System administrators and security personnel must also have a basic understanding of how routine computer and network administrative tasks can affect both the forensic process (the potential admissibility of evidence at court) and the subsequent ability to recover data that may be critical to the identification and analysis of a security incident.
                                                           2 Laws such as the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley, California Act 1798, and others hold businesses liable for breaches in the security or integrity of computer networks. 3 For an overview of the types of crimes that involve a computer and how law enforcement aids investigation, see “How the FBI Investigates Computer Crime” at <http://www.cert.org/tech_tips/FBI_investigates_crime.html >.
Produced 2008 by US-CERT, a government organization. Updated 2008.  3 
Legal Aspects of Computer Forensics
Anyone overseeing network security must be aware of the legal implications of forensic activity. Security professionals need to consider their policy decisions and technical actions in the context of existing laws. For instance, you must have authorization before you monitor and collect information related to a computer intrusion. There are also legal ramifications to using security monitoring tools.
Computer forensics is a relatively new discipline to the courts and many of the existing laws used to prosecute computer-related crimes, legal precedents, and practices related to computer forensics are in a state of flux. New court rulings are issued that affect how computer forensics is applied. The best source of information in this area is the United States Department of Justice’s Cyber Crime web site.4 The site lists recent court cases involving computer forensics and computer crime, and it has guides about how to introduce computer evidence in court and what standards apply. The important point for forensics investigators is that evidence must be collected in a way that is legally admissible in a court case. 
Increasingly, laws are being passed that require organizations to safeguard the privacy of personal data. It is becoming necessary to prove that your organization is complying with computer security best practices. If there is an incident that affects critical data, for instance, the organization that has added a computer forensics capability to its arsenal will be able to show that it followed a sound security policy and potentially avoid lawsuits or regulatory audits. 
There are three areas of law related to computer security that are important to know about. The first is found in the United States Constitution. The Fourth Amendment5 allows for protection against unreasonable search and seizure, and the Fifth Amendment allows for protection against self-incrimination. Although the amendments were written before there were problems caused by people misusing computers, the principles in them apply to how computer forensics is practiced. 
Second, anyone concerned with computer forensics must know how three U.S. Statutory laws6 affect them:  • Wiretap Act (18 U.S.C. 2510-22) • Pen Registers and Trap and Trace Devices Statute (18 U.S.C. 3121-27) • Stored Wired and Electronic Communication Act (18 U.S.C. 2701-120) 
                                                           4 http://www.cybercrime.gov 5 A detailed analysis of issues surrounding the Fourth Amendment can be found on this web site: <http://caselaw.lp.findlaw.com/data/constitution/amendment04/>. 6 The text of these laws can be found at the U.S. Department of Justice web site <http://www.usdoj.gov/criminal/cybercrime/cclaws.html>.
Produced 2008 by US-CERT, a government organization. Updated 2008.  4
Violations of any one of these statutes during the practice of computer forensics could constitute a federal felony punishable by a fine and/or imprisonment. It is always advisable to consult your legal counsel if you are in doubt about the implications of any computer forensics action on behalf of your organization.
Third, the U.S. Federal rules of evidence about hearsay, authentication, reliability, and best evidence must be understood. In the U.S. there are two primary areas of legal governance affecting cyber security actions related to the collection of network data: (1) authority to monitor and collect the data and (2) the admissibility of the collection methods. Of the three areas above, the U.S. Constitution and U.S. Statutory Laws primarily govern the collection process, while the Federal Rules of Evidence deal mostly with admissibility. 

Ola leaks personal information of its customer, claims a girl

A girl from Chennai claimed that OlaCabs, famous as Ola, a mobile app for personal transportation in India, had sent personal information of more than 100 customers to her via SMS.

Swapnil Midha posted on Facebook that the Ola, which started as an online cab aggregator in Mumbai, now based out of Bangalore and is among the fastest growing businesses in India, leaked personal details such as mobile numbers, locations of users.

However, the company regarded it as a technical fault and confirmed that it has been fixed now.

“About three weeks ago, I booked an Ola cab for a long distance drive. After the ride I received a few garbled texts from "VM-OLACAB" that I didn't think much of and ignored. These messages were alpha-numeric with hashes and made no sense to me whatsoever. I assumed there was some system error and did not anticipate the sleep deprivation that followed,” she wrote on Facebook.

She added, “My phone beeped throughout the night. 1:06, 2:34, 2:37, 2:38, 4:05, 5:17. I couldn't get my head around why these were coming at these times. I then called their call centre the next day to explain that there was probably some sort of bug and my number had somehow gotten into their highly cryptic message transmission systems, whatever secrets they were trying to transmit.”

Although, the Ola assured her to fix the problem soon, she had been receiving SMS after SMS. She received text between 300 and 400.

“I received no further communication from them, no update, no email, just more garbled messages,” she explained. I reached out to them through every channel possible. I called their call centre at least 5 times, demanded to speak to the senior managers, and had to explain my problem each time in great detail, answering the same annoying questions.”

She said that the company shared personal details of their customers throughout the day and throughout the night.

“What scares me the most, is that THIS should be their number one priority. I questioned their lack of concern for privacy and data protection. I threatened to report them to the authorities and TRAI. Nothing seemed to work which makes you think - do they even care about protecting customer information? If they are sending all this to me, who are they sending MY booking details to? Whose number is receiving all of my data? Which creepy criminal knows my full name, my mobile number, my door number, my account details, when I'm home and when I'm out?” she added.

The girl has raised a serious question which the company concerned need to answer as soon as possible. If this, one of the most trusted companies like the Ola does such careless, what do we expect from others? 

Pokemon Go Maker Niantic CEO's Twitter Account Hacked


In July, the hacking team hit Pokemon Go's login servers with a distributed denial of service (DDoS) attack leaving some players frustrated as they were unable to log in to the game.
The group said it would not stop the attack until representatives from Pokemon Go contacted them.
"No one will be able to play this game till Pokemon Go contact us on our website to teach them how to protect it!" the group wrote in a post on its website.
A DDoS attack works by flooding a server with traffic so that it cannot be accessed by legitimate users.
OurMine has also claimed credit for compromising Twitter chief executive officer (CEO) Jack Dorsey's, Facebook chief Mark Zuckerberg's and Google CEO Sundar Pichai's social media accounts.
The group also hacked the Twitter account of Evan Williams, the microblogging site's co-founder and former CEO.

Once again a malicious application found on Google Play Store

Researchers at Check Point Threat Prevention have detected a malicious application and said to have affected some one million people, which was published twice in the Google Play Store. The malware was packaged within an Android game called “Brain Test”.

According to the researchers, the malware was reported to Google Play twice. Each instance had between 100,000 and 500,000 downloads as per the Google Play statistics. Check Point reached out to Google on September 10, 2015, and the app containing the malware was removed from Google Play on September 15, 2015.

“The malware was first detected on a Nexus 5 smartphone, and although the user attempted to remove the infected app, the malware reappeared on the same device shortly thereafter. Our analysis of the malware shows it uses multiple, advanced techniques to avoid Google Play malware detection and to maintain persistency on target devices, the researchers wrote in a blog post.

Although, the reported the malware to Google, and the company concerned removed the app from the Google Play Store, it manages to bypass malware detection through several sophisticated techniques. It also installs an application similar to itself and so these two monitor the removal of each other and actually protects each other from being removed.


The researchers suggested that in order to prevent yourself from the malware, you must have an up-to-date anti-malware software on your mobile device. It has already infected anyone’s phone, he/she has to re-flash it with an official ROM.

Hilton payment system attacked ..........................

One of the largest US based hotel chain Hilton revealed that hackers had infected some of their point-of-sale computer systems with malware crafted to steal credit card information.
They didn’t disclosed what data was taken, but cautioned everyone who used payment cards at Hilton Worldwide hotels between November 18 and December 5 of last year or April 21 and July 27 of this year to check for any irregular activity from their debit or credit cards.

In an online post Hilton said that the Malware that infected system had a potential to retrieve cardholders' names, account numbers, security codes and expiration dates.

They further wrote that they are investigating the breach with the help of third-party forensics experts, law enforcement and payment card companies.

Starwood hotels, which operate the Sheraton and Westin chains, announced four days before Hilton that hackers had attacked their payment system resulting in leaking of customer credit card data in some of their establishments.

"The malware was designed to collect certain payment card information, including cardholder name, payment card number, security code and expiration date," the group said in a statement.

Starwood and Hilton are not the only one whose payment system has been hacked but last month Trump hotels has face the similar incidence of cyber attack.

"We believe that there may have been unauthorised malware access to some of the computers that host our front desk terminals and payment card terminals in our restaurants, gift shops and other point-of-sale purchase locations at some hotels," Trump Hotel Collection said at a website devoted to details of the incident.

According to Trump hotels, the access could have taken place in between May 19 of last year and June 2 of this year.

Brian Krebs, cyber threat blogger at KrebsonSecurity.com explained the cyber attack on payment systems as "just the latest in a long string of credit card breaches involving hotel brands, restaurants and retail establishments."

Mozilla awarded $2,500 to security researcher

Security Researcher Ashar Javed, recently discovered three bugs with Mozilla add-ons portal and that had been exploited via "Create new collection" feature.

It was discovered that malicious codes could be inserted in collection of  Mozilla Add - ons . These ad - ons are basically used to organize add-ons for business and personal purposes and can be shared on social media as well.

“Given that the Mozilla add-on site has millions of downloads, it is easily possible for the attacker to convince the victim to visit the collection page,” the expert told SecurityWeek.

Users were later exposed with all kinds of virus attack that could be carried via XSS flaws  and most common attack was cookie theft.

Websites are generally vulnerable to  XSS flaw, add-on collections are very useful for Firefox users, so for discovering the issue Mr Javed recieved $2,500 from Mozilla. There were two other bugs discovered about which Mozilla did not reveled any information apart from the location.

This is not the first time that he had received the heavy amount, Google awarded him $3,000 for a reflected XSS in the main search bar of the YouTube Gaming website.

Breaking News-----------------------------

27 million Mate1.com account hacked and sold 

 If you have an account on online dating website Mate1.com then it is very high probability that your account has been hacked.

A hacker has claimed of accessing the account usernames, passwords and email addresses for 27 million people by posting a Hell.

According to the Motherboard Vice, who first reported about the hack said that hacker has hacked over 27 million users account details, and sold them to someone else through a deal brokered on the Hell forum.

The hacker told to Motherboard Vice that he managed to compromise the Mate1.com server, and used command access to look at the MySQL database and then download parts of it.

Further adding he said that the online dating website has lax a security flaw which allow  users to log onto the website  without authenticating  their email-id to complete the sign-up process, which means that  you just have to log onto the website, create your account with an email address that belongs to you or to someone eases.

The hacker reveals that Mate1 does not use any encryption technique to store passwords, so don't worry if you have forgotten your password, it will be sent to the corresponding email in plain text.

It is not clear how much the hacker eventually sold the data for, although he was offering it 

Guardian's Article on Cyber Crime spreads Malware

A cybercrime article from 2011 named as “Cybercrime: is it out of control?"  on the website of Guardian has been found to be serving up the Angler Exploit Kit.

The Angler Exploit Kit is a Web-based utility toolbelt that hackers use to test the defenses of a user's computer.

The problem was discovered by FireEye Labs on December 01 which noticed that this instance of Angler infection this not come from a tainted ad but visiting the Guardian’s article about cybercrime.

Visiting the page would execute an embedded script to redirect the reader's browser to an Angler Exploit Kit landing page.

This particular vulnerability enables a "God Mode" on infected PCs, giving attackers control over every face of the user's machine.

Angler exploit kit also scans for the Flash-based CVE-2015-5122, CVE-2015-5560, and CVE-2015-7645 vulnerabilities which are less powerful intrusions, compared to the Windows OLE one, but dangerous nevertheless.

These vulnerabilities have been fixed by Microsoft and Adobe, and users who keep their systems up to date have nothing to fear while reading the article on Guardian.

Meanwhile, Guardian has assured to fix the contaminated links on its website.

This news came days after Angler was found serving malvertising to visitors of video site DailyMotion.

Indian researchers work on establishing human robot communication

With the increasing use of robots in every sphere of life, it becomes utmost important to establish proper communication between humans and robots.
 A team of researchers of Speech and Audio (SAG) at Indian Institute of Science (IISC), Bengaluru have been working towards enhancing Human and Robot communication to which they call it as ‘HUBOT’. The research aims to obtain better response from robots to given commands. This team is led by Dr. T.V Sreenivas, Professor at the Department of Electronics and Communication Engineering. He leads the research activities of SAG.

There are different kinds of robots with different programmes. While human beings can differentiate between various sounds, it is difficult for robots to do the same. This is a major obstacle in human-robot interactions.

The researchers are actively engaged in enhancing Hubot communication. The techniques used to enable Hubot communication includes voice and word recognition and gross localisation of sound.

The setup required to effectively capture the data needed involves the use of multiple microphones which are used to capture the data from the surrounding environment after which it will be processed in a suitable form to give the required response to the robot.

The team has developed several techniques which work to make Hubot communication more effective. One of these is the Y-Array technique which works in an indoor environment to localise and track moving source. Another technique involves the use of multiple rotating microphones on the robot. This method has given satisfactory results which have further enhanced the efficiency of HUBOT communication.

Digital Signal Processing techniques and properties of speech signals are studied by the SAG in order to overcome the existing difficulties in human-robot voice based interactions. A lot of processing steps are involved to make the robot behave in a certain way in the considered environment and the foremost step is to analyse real life situation or physical problem faced by it after which it will convert problem into mathematical form and written as algorithm.

The team is working on challenges which must be addressed before Hubot can be considered perfect.