Tuesday, 31 July 2012

Power failure Across India, Hit by Malware Attack

India’s Northern power grid crashed on Monday morning wreaking havoc at airports, railway and metro stations, hospitals and across traffic congested roads, its worst power outage in a decade.

Indian power infrastructure under attack: India losing out millions in just hours same snag developed within just 24 hours of recovery reports say the system is infected by sophisticated malware.
Malware is spreading; today more than 67 crore people are without power. Cyber analysts suspect "PAK"- CHINA nexus behind this attack.


 Hundreds of millions of people have been left without electricity in northern and eastern India after a massive power breakdown.

There are some analyst saying that it is cyber Attack by a Malware but no Indian Authorities confirmed it yet. Authorities are restoring the service suggest the whole thing is out of their skills, meanwhile mainstream media has been barred from reporting as this could bring disgrace to security services of India.

Since the first power trip up on Monday, there have been discussions within the security establishment about the possibility of entities trying to carry out a sophisticated cyber-attack to cripple the grids.

Officials who carried out an audit of critical information infrastructure admit it is "theoretically possible" to cripple India's power grids through a cyber-attack.


Despite such a possibility, the shutdown did not seem to have led to a crisis management procedure that aimed at ruling out or confirming a cyber-attack.

"Given the fact that our grids are vulnerable to a cyber-attack, those responsible for managing grids should have a proactive policy to rule out cyber-attack as part of their crisis management procedures," a senior official said. "But none of it was visible," he added.

Sources aware of contacts among power ministry, power grid authorities and those in both CERT-IN ( Computer Emergency Response Team-India) and NTRO (National Technical Research Organisation) say there was no proactive effort by those responsible for power grids.

However, both CERT-IN and NTRO are believed to have established their own procedures to ensure the shutdowns were not a cyber-attack, having been brought on by massive over-the-limit withdrawals by states to supply electricity for pumps tapping groundwater in the absence of rainfall during this monsoon.

Officials said the government is now discussing possible ways to speed up the setting up of National Critical Information Infrastructure Protection Centre (NCIPC), which would act as the command and control centre for monitoring the critical information infrastructure of the country. NCIPC was recently approved by the National Security Council headed by the Prime Minster.

Sources said the government is also planning to hold a national consultation of all stakeholders involved in critical information infrastructure.

The government is already setting up dedicated CERT-INs for various critical sectors such as power and civil aviation.

Officials point out to breaches reported from power grids in the US, cyber intrusion into the Iranian nuclear network and other such incidents around the world to warn that India needs to have a more robust crisis management procedure that includes proactive ruling out of cyber-attacks.

16 Arrested for hacking Globe Telecom system


MANILA, Philippines – Sixteen people, including several South Korean nationals, have been arrested by police for allegedly hacking into the Globe Telecom’s system to make unbilled international calls.

Director Samuel Pagdilao, Chief of the Criminal Investigation and Detection Group (CIDG), said in a statement Tuesday that nine Koreans and several Filipino suspects have been apprehended through successive raids in Pasig, Manila, and Mandaluyong cities.


He said they belong to a cybercrime group that has been placed under police surveillance for several weeks.

The Koreans were identified as Eun Young Bae, Kwang Ming Song, 27, Junggyn Yang, 30, Kim Tae Hyung alias Martin Kim, Sehun Park, a certain Choi, Jong-Seok alias Edward Choi, Jung Dongchan alias Kevin Jeong, Jinwan Kim alias Liam Jin.

The other suspects were identified as Marcela Dela Paz, Chachin La Evidia Bornales, Christine Joy Gicale Carondoy alias Joya, 18, Joan Gicale Turno alias Queennie, 19, Jazzy Romero de la Cruz, 20, Jessa Grande Llaguno, 18, and Michelle Cambe Nacional, 26.

The suspects will be charged with violation of Republic Act No. 8484 or “Access Devices Regulation Act of 1998,” Pagdilao said.

Senior Superintendent Gilbert Sosa, CIDG’s Anti-Transnational and Cyber Crime Division (AFCCD) Chief, said that Globe had complained about the alleged hacking being done by the suspects through International Simple Resale (ISR) of international calls.

“ISR is an illegal act in the country because it deprives government of unrealized revenues and to the prejudice of Globe Telecom, where unbilled international calls were being charged and rerouted as mere local calls,” Sosa said.

Authorities confiscated computers, network hubs, GSM Modems, and bundles of unused SIM cards of Globe and Touch Mobile that were used to hack into Globe’s networks.

Two vehicles—a black Hyundai Tucson and silver Toyota Camry have also been confiscated by authorities in the raids.

The separate raids were conducted in Tower A, Renaissance 3000 building, Meralco Avenue, Ortigas, Pasig City, Pearl of the Orient Tower, Roxas Boulevard, Ermita, Manila, North Tower, Lee Garden Condominium, Laurel St. Mandaluyong City, and Royal Plaza, Twin Towers, Malate, Manila

Pagdilao said that “the arrests of Korean and Filipino suspects demonstrate the need for a tougher law to deal with new challenges in the fight against cybercrime.”

Last week, CIDG anti-fraud operatives have arrested Hak Mo Kim in Mandaluyong City for hacking into SMART Communications networks.

European Cyber Security at the Mercy of Chinese Hackers


Europe is “Under the watchful eye of Chinese pirates”, writes Libération,which picks up on a Bloomberg feature report on computer security breaches. The American press agency reveals that a group of Chinese cyberspies – which has been tracked by an American collective (that includes academics, companies that have been targeted by Chinese espionage and computer security experts) – succeeded in infiltrating a large number of institutions and companies last year.


The group  linked to the Chinese military, which has been named “Byzantine Candor” by American secret services, notably managed to infiltrate European institutions, reports the French daily –

    At a critical moment in the euro crisis in July, a group of Chinese spies remotely infiltrated the computers of the European Council, not once but five times. Launching their attacks from China, the hackers stole data including email correspondence with Herman Van Rompuy [...] Along with the European Council, the networks of at least 20 European businesses have fallen victim to Byzantine Candor [...] According to Bloomberg, most of the breached corporate networks were characterised by the fact that they contained information on innovation that could be economically advantageous to Chinese firms.

Libération adds that a decade ago –

    … the usual targets for these kinds of attacks were American arms manufacturers [...] However, no one is safe today.

As a result, the drive to combat cyber-espionage is now a critical priority for Europe: notably in Spain, which, according to El País –

    … is one of the countries that has been worst affected by hacking attacks, with tens of thousands of incidents every year.

The Madrid daily explains that a new national cybersecurity centre of excellence, financed by the European Commission and headquartered at the Autonomous University of Madrid, will be inaugurated in September. In the wake of the establishment of similar centres in Montpellier (France) and Dublin (Ireland), it will be the third of its kind in the EU.

However, the daily regrets that one of the companies tasked with the creation of the centre, CFLabs, is directed by Matías Bevilacqua –

    … an IT expert who was arrested and charged in connection with purchase and sale of confidential data [...] and in particular sensitive information sourced from virtually all of the institutions of the Spanish state.

In conclusion El País wonders about the wisdom of appointing “a hacker to play a key role in such a sensitive project”.

NullCrew Breaches Yale DataBases


A hacker group known as NullCrew claims it obtained the personal information of 1,200 Yale students and staff members from University databases.

University spokeswoman Elizabeth Stauderman ’83 LAW ’04 confirmed that hackers obtained files containing personal information from participants in the Yale Initiative to Strengthen Teaching in Public Schools on July 17, but she said only 450 accounts were affected. NullCrew claims it gained access to social security numbers, names, addresses and phone numbers, though only usernames, passwords and email addresses were published by the collective, which claims its only intention was to prove the security faults in institutional databases.



“In fact, the governmental and educational sites are the least secure in the experience we’ve had with .edu and .gov websites,” the hackers said in a message alongside the published data.

Stauderman said Yale has taken immediate action to secure the breached computer and is in the process of notifying the authorities and the affected participants. She added that the University will offer identity protection services to those affected.

The NullCrew breach was the largest known breach of Yale databases since late 2010, when the names and Social Security numbers of 43,000 people affiliated with the University were hacked and then made searchable online. The University announced that breach 10 months later, in August 2011.

Monday, 30 July 2012

Cell phone battery catches fire, burns hacker's tail at Defcon

Freak incident leads to cell phone battery lighting a real fire under a man's backside. Hotel room key-card saves him.
LAS VEGAS -- A cell phone battery spontaneously caught fire today, burned through a Defcon attendee's back pants pocket, and fell on the floor, creating burn spots on a carpet and leaving a burn-hole in the attendee's chair.

The man, who asked not to be identified, was not harmed but his trousers were ruined. He told CNET that he was sitting in a session at Defcon around 11:30 a.m. PT when he started to smell something burning and felt some heat underneath him on his seat. He stood up to find that his back left pocket was on fire.

"I smelled the burn, the smoke, and I stood up and could literally see flames," he said. "I tried to tap it out (with a hand) and it fell to the floor. It burned right through the backside."

The battery, which he said goes with a Droid Bionic smartphone that was not in the pocket, was still burning on the ground. He kicked it and it rolled and burned another spot into the carpet. He then left the room to get help as people around him began taking photos.

His derriere probably would have been scorched as well if he hadn't had his plastic hotel room key-card in between him and the battery. "My hotel key saved my butt," he said, laughing.

A woman who was taking video of the event for Defcon was seated on a platform about 20 feet away and had a good view of what happened. "I saw something glowing out of the corner of my eye," she said. "A guy's butt was in flames."

The rest of the session was canceled and the room was evacuated. The man said he had nothing else in his pocket but the battery and the hotel card key, and that he had no idea why the battery would have started to heat up.





CNET did not see the phone and was unable to confirm its make and model.

A Motorola representative provided this statement when asked for comment: "Motorola Mobility's priority is the safety of our customers. All Motorola products are designed, manufactured, and tested to meet or exceed international and local standards for consumer safety and performance. We will will look into this matter immediately."

The cause of the overheating remains a mystery.

Don Bailey, a mobile expert at Capitol Hill Consultants, said batteries can heat up if the metal leads touch something conductive. "Something as simple as steel wool can cause a short between the leads on a cell phone battery," he said.

It could been a bad battery, or the man could have damaged the battery somehow. But if there was no metal in the pocket at the time, it's likely the culprit was some conductive material, such as steel wool from a brush used to clean metal, that had somehow worked its way into the fibers of his pocket, Bailey said. "It's rare for manufactured batteries like these to have that kind of a failure."


8.7 million mobile customers hacked in South Korea


SEOUL — South Korean police have arrested two hackers who stole personal data of 8.7 million customers of the nation’s second-biggest mobile operator, the company said.

KT said the hackers — formally arrested on Sunday — had stolen data such as customers’ names, phone numbers and residential registration numbers for five months since February and sold the information to telemarketing firms.

“The number of affected people account for nearly a half of about 17 million customers of ours,” a KT spokesman told AFP, adding the company had alerted police on July 13 after detecting traces of hacking attacks.


Yonhap news agency, citing police, said the duo — including a former veteran programmer at a local IT company — had earned at least 1 billion won (about $880,000) by selling the stolen data.

Seven other people were also booked for buying the leaked data for telemarketing purposes, Yonhap said.

“We deeply bow our head in apology for having your precious personal information leaked… we’ll try our best to make such things never happen again,” KT said in a statement to customers.

Hacking attacks on major companies aimed to gain access to the personal data of their customers is a frequent occurence in South Korea, one of the world’s most-wired nations.

Seoul authorities said in July last year hackers using an Internet address registered in China had gained access to South Korean major websites including web portal Nate.com and may have stolen the private data of 35 million users.

In November 2011, Seoul’s top games developer Nexon saw personal information of 13 million users of its popular online game MapleStory stolen by hackers.

In March 2010, authorities launched a probe into the security systems of major retailer Shinsegae and 24 other companies after private data on 20 million customers was leaked.

Sunday, 29 July 2012

Alpha Protocol [PC Game]

Alpha Protocol

  • Developer: Obsidian Entertainment
  • Publisher: SEGA
  • Genre: Action RPG
  • Release Date: June 1, 2010 (US)

About Alpha Protocol

Loyalty carries a price and no one knows this more than agent Michael Thorton. A talented young agent cast out by his government, Thorton is the only one with the information needed to stop an impending international catastrophe. To do so means he must cut himself off from the very people he is sworn to protect. As players determine how to accomplish different objectives, the decisions made and actions taken in each mission will ultimately transform the type of secret agent Michael Thorton will become. Every choice the player makes as Michael Thorton will carry consequences for his future and the fate of the world.

Minimum System Requirements

  • OS: Windows XP/Vista/7
  • Processor: Intel Pentium 4 @ 2.0 GHz / AMD Athlon XP 2200+
  • Memory: 1 Gb
  • Hard Drive: 12 Gb free
  • Video Memory: 128 Mb
  • Video Card: nVidia GeForce 6800 / ATI Radeon X1600
  • Sound Card: DirectX Compatible
  • DirectX: 9.0c
  • Keyboard
  • Mouse
  • DVD Rom Drive

Recommended System Requirements

  • OS: Windows XP/Vista/7
  • Processor: Intel Core 2 DUO @ 2.5 GHz / AMD Athlon 64 X2 5400+
  • Memory: 2 Gb
  • Hard Drive: 12 Gb free
  • Video Memory: 512 Mb
  • Video Card: nVidia GeForce 9800 / ATI Radeon HD 2900
  • Sound Card: DirectX Compatible
  • DirectX: 9.0c
  • Keyboard
  • Mouse
  • DVD Rom Drive

Download Alpha Protocol – Direct Links

Part 01 – 700 MB

Part 02 – 700 MB

Part 03 – 700 MB

Part 04 – 700 MB

Part 05 – 700 MB

Part 06 – 700 MB

Part 07 – 700 MB

Part 08 – 700 MB

Part 09 – 700 MB

Part 10 – 700 MB

Part 11 – 700 MB

Part 12 – 700 MB

Part 13 – 700 MB

Part 14 – 700 MB

Part 15 – 402 MB

Crack

www.elj-games.blogspot.com

The Sims 3: Late Night [PC Game]

The Sims 3: Late Night

  • Developer: The Sims Studio
  • Publisher: Electronic Arts
  • Genre: Simulation
  • Release Date: October 26, 2010 (US)

About The Sims 3: Late Night

The Sims players now have a reason to stay out late on the town! The Sims 3 Late Night expansion pack gives players all-access and lets them loose on a vibrant, active downtown scene where they'll rub elbows with celebrities at the hottest parties, hit the local bar after work, tour the scene with their Sims' band, kick back in a plush hot tub, and discover what's lurking as the lights go out and adventure begins after dark.

Players will be able to take their Sims into the bustling urban setting where they'll be able to become a local celebrity, member of a music band, mixologist, director, and more. To gain entrance into the most elite clubs in town, players need to keep their attitude in check otherwise they'll be given the cold shoulder by tough bouncers or find another way onto the list. If chilling is the player's forte, their Sims can lounge at a chic club or dive bar or if they like to live on the edge, they can discover the secret of becoming a vampire. Whether embarking on a new career, painting the town red, or throwing a party on the rooftop of a penthouse, it's always up to the player to tell their unique stories with The Sims 3. What will happen when the lights go out and Sims get all access?

Minimum System Requirements

  • OS: Windows XP/Vista/7
  • Processor: Intel Pentium 4 @ 2.0 GHz / AMD Athlon XP 2000+
  • Memory: 1 Gb
  • Hard Drive: 2.7 Gb free
  • Video Memory: 128 Mb
  • Video Card: nVidia GeForce FX 5900 / ATI Radeon 9500
  • Sound Card: DirectX Compatible
  • DirectX: 9.0c
  • Keyboard
  • Mouse
  • DVD Rom Drive

Recommended System Requirements

  • OS: Windows XP/Vista/7
  • Processor: Intel Core 2 DUO @ 2.5 GHz / AMD Athlon 64 X2 5000+
  • Memory: 2 Gb
  • Hard Drive: 2.7 Gb free
  • Video Memory: 896 Mb
  • Video Card: nVidia GeForce GTX 260 / ATI Radeon HD 4850
  • Sound Card: DirectX Compatible
  • DirectX: 9.0c
  • Keyboard
  • Mouse
  • DVD Rom Drive

Notes: Add-on

Download The Sims 3: Late Night – Direct Links

Part 1 – 700 MB

Part 2 – 700 MB

Part 3 – 700 MB

Part 4 – 382 MB

Crack

www.elj-games.blogspot.com

Star Trek Online [PC Game]

Star Trek Online

  • Developer: Cryptic Studios
  • Publisher: Atari
  • Genre: RPG
  • Release Date: February 2, 2010 (US)

About Star Trek Online

Set in the year 2409, Star Trek Online allows players to immerse themselves in the future of the Star Trek universe, exploring strange new worlds, seeking out new life and new civilizations in an ever expanding vast universe. Command a starship as a Federation or a Klingon Captain, outfit it with custom systems and recruit, train and mold a crew into an elite force for exploration and combat. Missions take players into thrilling space battle, planetside for face-to-face combat and even inside starships.

System Requirements

  • OS: Windows XP SP2 / Windows Vista / Windows 7 (32 or 64-bit)
  • CPU: Intel Core 2 Duo 1.8 Ghz or AMD Athlon X2 3800+
  • Memory: 1GB RAM
  • Video: NVIDIA GeForce 7950 / ATI Radeon X1800 / Intel HD Graphics
  • Sound: DirectX 9.0c Compatible Soundcard
  • DirectX: Version 9.0c or Higher
  • HDD: 8GB Free Disk Space
  • Network: Internet Broadband Connection Required
  • Disc: 6X DVD-ROM
  • Keyboard
  • Mouse

Recommended System Configuration

  • OS: Windows XP SP2 / Windows Vista / Windows 7 (32 or 64-bit)
  • CPU: Intel E8400 Core 2 Duo or AMD Athlon X2 5600+
  • Memory: 2GB RAM+
  • Video: NVIDIA GeForce 8800 / ATI Radeon HD 3850+
  • Sound: DirectX 9.0c Compatible Soundcard
  • DirectX: Version 9.0c or Higher
  • HDD: 8GB Free Disk Space
  • Network: Internet Broadband Connection Required
  • Disc: 6X DVD-ROM
  • Keyboard
  • Mouse

Download Star Trek Online – Direct Links

Part 1 – 700 MB

Part 2 – 700 MB

Part 3 – 700 MB

Part 4 – 700 MB

Part 5 – 700 MB

Part 6 – 700 MB

Part 7 – 700 MB

Part 8 – 656 MB

www.elj-games.blogspot.com

Official fb Accounts of Garanti Bankası, Denizbank, Renault Turkey, Ülker, Nokia Turkey, Burger King and Acun.com Hacked

The official Facebook accounts of several companies were hacked on Thursday night by a group of hackers trying to promote the terrorist Kurdistan Workers' Party (PKK).

The pro-PKK hackers changed the Facebook profile pictures of the following companies: Garanti Bankası, Denizbank, Renault Turkey, Ülker, Nokia Turkey, Burger King and Acun.com. They placed the picture of Abdullah Öcalan, the jailed leader of the terrorist PKK organization, on the profiles instead.



The digital marketing agency 41? 29!, which manages the Facebook accounts of these companies, reported on Thursday night that most of the accounts had been restored to their original state.

The head of the agency, Alemşah Öztürk, said on Twitter on Thursday night that they were working to restore the Facebook accounts in cooperation with Facebook, Inc.

The agency also stated on its Facebook account that as soon as it discovered the attack, it notified Facebook, which immediately deactivated the hacked accounts.

Stating that this situation did not constitute a security risk for the followers of the accounts in question, the agency also added that there has been no loss of data from the companies' accounts.


Hacker who swindled $3m held in Dubai hotel

According to media reports, the incident came to light when a UAE trader who lost $3million filed a complaint with Dubai Police. The victim, who had business connections with the said Chinese firm, received an email from the company requesting him to transfer $3million to its account.



He duly transferred the amount because he was used to dealing with huge sums of money with the company. He never confirmed with the officials in China if they received the amount because such transactions were common between them, he told investigating officials.

However, a few days later he learnt that the email he received was not sent by the company.

He immediately filed a complaint and investigations by the anti-crimes department of Dubai Police revealed that the company website had been hacked by the suspect. He not only obtained important data but also used the offical email id to contact its clients and defraud millions.

The suspect was tracked down and arrested from a Dubai hotel. His bank accounts are frozen and he is referred to Public Prosecution.


Brothers in Arms: Hell's Highway

Brothers in Arms: Hell's Highway

  • Developer: Gearbox Software
  • Publisher: Ubisoft
  • Genre: Shooter
  • Release Date: October 7, 2008 (US)

About Brothers in Arms: Hell's Highway

Gearbox's third entry in the venerable Brothers In Arms series heads up to the front as with the first of the series for next-generation systems. Delivering on the franchise’s compelling story, unrivaled authenticity and intense squad-based action, Brothers In Arms Hell’s Highway drops you into Operation Market-Garden, the largest airborne operation of World War II. Lead Matt Baker, Joe Hartsock and the rest of the 101st Airborne Division as they fight to open "Hell's Highway" in a daring bid for a quick end to the war. The game , makes use of the new Unreal Engine 3 technology for its delivery of the war experience, with new cutting-edge gameplay features and a completely redesigned online component.

Minimum System Requirements

  • OS: Windows XP/Vista
  • Processor: Pentium D @ 2.6 GHz / Athlon FX-55 Equivalent
  • Memory: 1 Gb
  • Hard Drive: 8 Gb free
  • Video Memory: 128 Mb
  • Sound Card: DirectX Compatible
  • DirectX: 9.0c
  • Keyboard
  • Mouse
  • DVD Rom Drive

Recommended System Requirements

  • OS: Windows Vista
  • Processor: Intel Core 2 DUO @ 2.6 GHz
  • Memory: 2 Gb
  • Hard Drive: 8 Gb free
  • Video Memory: 256 Mb
  • Video Card: nVidia GeForce 7600
  • Sound Card: DirectX Compatible
  • DirectX: 10
  • Keyboard
  • Mouse
  • DVD Rom Drive

Download Brothers in Arms: Hell's Highway – Direct Links

Part 1 – 700 MB

Part 2 – 700 MB

Part 3 – 700 MB

Part 4 – 700 MB

Part 5 – 700 MB

Part 6 – 700 MB

Part 7 – 700 MB

Part 8 – 700 MB

Part 9 – 700 MB

Part 10 – 23 MB

Crack

www.elj-games.blogspot.com

Statement From Jeremy Hammond, Alleged Hacker


I remember maybe a few months before I was locked up I went to a few noise demonstrations a the federal jail MCC Chicago in support of all those locked up there. Prisoners moved in front of the windows, turned the lights on and off, and dropped playing cards through the cracks in the windows. I had no idea I would soon be in that same jail facing multiple trumped up computer hacking “conspiracies.”

Now at New York MCC, the other day I was playing chess when another prisoner excitedly cam e up as was like, “Yo, there are like 50 people outside the window and they are carrying banners with your name!” Sure enough, there you all were with lights, banners, and bucket drums just below our 11th floor window. Though you may not have been able to here us or see us, over one hundred of us in this unit saw you all and wanted to know who those people were, what they were about, rejuvenated knowing people on the outside got there back.

As prisoners in this police state – over 2.5 million of us – we are silenced, marginalized, exploited, forgotten, and dehumanized. First we are judged and sentenced by the “justice” system, then treated as second class citizens by mainstream society. But even the warden of MCC New York has in surprising honesty admitted that “the only difference between us officers here and you prisoners is we just haven’t been caught.”

The call us robbers and fraudsters when the big banks get billion dollar bailouts and kick us out of our homes.

They call us gun runners and drug dealers when pharmaceutical corporations and defense contractors profit from trafficking armaments and drugs on a far greater scale.

They call us “terrorists” when NATO and the US military murder millions of innocents around the world and employ drones and torture tactics.

And they call us cyber criminals when they themselves develop viruses to spy on and wage war against infrastructure and populations in other countries.

Yes, I am one of several dozen around the world accused of Anonymous-affiliated computer hacking charges.

One of many here at MCCC New York facing trumped up “conspiracy” charges based on the cooperation of government informants who will say anything and sell out anyone to save themselves.

And this jail is one of several thousand other jails, prisons, and immigrant detention centers – lockups which one day will be reduced to rubble and grass will grow between the cracks of the concrete.

So don’t let fear of imprisonment deter you from speaking up and fighting back. Silencing our movement is exactly what they hope to accomplish with these targeted, politically motivated prosecutions. They can try to stop a few of us but they can never stop us all.