PROJET AUTOBLOG


The Hacker News

Site original : The Hacker News

⇐ retour index

Mise à jour

Mise à jour de la base de données, veuillez patienter...

Data Backup and Recovery with 'EaseUS Todo Backup Workstation'

mardi 4 mars 2014 à 17:17
Data Backup and Recovery with EaseUS Todo Backup Workstation
Since, we are living in the era where nothing could be possible without the help of the Internet. From every unimportant to every major and important data are stored in our computers and servers, and there is a massive growth in the volume of data all around us.

But, computer drives can fail, and usually they give no advance warning. One minute they're working fine, and the next minute they're toasted. Data loss can be very costly, and due to the increase in cyber threat these days, all computer data is at risk from threats or damage. Even with the most reliable equipment and the most secure operating environment, there is always the possibility of something going wrong.

So, a solution to all problems is to have a backup of entire data stored on your computer, and for that it is important for you to have a right choice. Want to know - How to backup the server/workstation? Well, there are many options, some are reliable and some are not.

Now, at this point, you won’t find a better option than EaseUS Todo Backup Workstation as your commercial backup solution, because it had already been the most comprehensive free backup solution supporting both file and image backup, so it covers all aspects of protecting your sensitive data through backup and recovery means.
Data Backup and Recovery with EaseUS Todo Backup Workstation
The EaseUS Todo Backup Workstation is one of the powerful data backup software, that offers you some more interesting features in comparison to its previous version, that other software usually doesn’t offers.

BACKUP System Drives & Android Devices: It enables you a reliable data backup & recovery solution, to secure specific files, emails, and even complete system/drives and also the new version provides you to backup data, including contacts, messages, call logs, documents, music, photos, and videos in Android devices as well.
Data Backup and Recovery with EaseUS Todo Backup Workstation
It also offers you to create different backup plans by assigning each with a custom name, description and allow you to send it to a specific location on your computer system on an external drive.

Double Layer - Online Backup: We consider cloud-based backup as being the most reliable backup solution these days. You can keep backups of your data on an online storage service for double protection of your data, can set the level of compression for files, can also split files into a number of fragments, can schedule your backups as needed, and it sends email notifications when the task is done. You can limit network speed and even send a backup copy to FTP Server.
Data Backup and Recovery with EaseUS Todo Backup Workstation
The EaseUS Todo Backup provides you an efficient system backup and recovery. It offers you remote control feature for remote backups and recovery sessions and takes a snapshot of the current system for fast system recovery from crashed or failed system.

Encryption: EaseUS Todo Backup Workstation allows you to encrypt data to a maximum strength of 256-bit Advanced encryption standard (AES) with passwords from unauthorized access.
Data Backup and Recovery with EaseUS Todo Backup Workstation
In addition to backup, EaseUS Todo Backup Workstation also offers you an advanced set of tools that you can use to clone disks and partitions, check images, wipe data, create an emergency disk, mount and unmount images as well.

Backups can be a life-saver in these extreme cases and EaseUS Todo Backup Workstation software helps you in recovering system and data from crashes and malware infections, such as Ransomware attack.

EaseUS Todo Backup Workstation lets you save and organize the really important things, it is available for Download from the EaseUS official website and supported on Windows 2000/XP/Vista/7 (x86 and x64) systems.

Firefox to block all plugins by Default in upcoming release, except Whitelist plugins

lundi 3 mars 2014 à 17:20
Mozilla to Block all Plugins by Default in upcoming release, except Whitelist Plugins
The Mozilla Firefox web browser is used by roughly 30% of all Internet users and the company is seriously concerned about the Security of its users for many years.

To Improve the Stability, Security and performance of Firefox web browser, Mozilla announced back in 2013 that it planned to enable ‘Click to Play’ feature in upcoming Firefox versions, which will block most vulnerable plugins like Java by default.

Plugins are a significant source of poor performance, crashes and security vulnerabilities”, Mozilla said.

The Feature 'Click to play' blocks the execution of all plugins automatically, though this feature was annoying to the users, so to prevent all plugins from default blocking, Mozilla announced to maintain a whitelist of approved plugins.
"By allowing users to decide which sites need to use plugins, Firefox will help protect them and keep their browser running smoothly." ~Benjamin Smedberg, Engineering Manager.
Plugin authors can apply for inclusion in a whitelist. The developer has to submit their plugins using a template to Bugzilla and the application submitted till 31st March, 2014 will be reviewed by the Mozilla.

The Firefox web browser will only start blocking by default, no sooner than Firefox 30. If accepted, the plugin will be whitelisted for next 4 Firefox releases i.e. 30 weeks (6 weeks in beta version and 24 weeks in the general release channel), with the possibility to apply for a further extension later.

'Adobe Flash' is included in the whitelist by Mozilla, 'security and plugin teams work closely with Adobe to make sure that Firefox users are protected from instability or security issues in the Flash plugin', the company said; However, 'Java' plugin is excluded from the whitelist because of its continues security problems and slow performance.

Most widely used web browser Google Chrome is also working in this direction and last January it has blocked all NPAPI plugins except Silverlight, Unity, Google Earth, and Facebook Video.

Cisco Offers $300,000 Prize For 'Internet of Things' Security Apps

lundi 3 mars 2014 à 15:58
Cisco Offers $300,000 Prize For 'Internet of Things' Security Apps
In the last few years, this emerging domain for the Internet of Things has been attracting the significant interest, and will continue for the years to come. It would be a $20 Trillion Market over the next several years, but Security and privacy are the key issues for such applications, and still face some enormous challenges.

Cisco has announced a global and industry-wide initiative to bring the Security community and Researchers together to contribute in securing the Internet of Things (IoT) and launched a contest called the "Internet of Things Grand Security Challenge", offering prizes of up to $300,000 for winners.

Since Smart devices are growing at an exponential pace with increase in connecting devices embedded in cars, retail systems, refrigerators, televisions and countless other things people use in everyday life and is expected to grow to 50 billion by 2020. So, in an effort to deliver the security solutions necessary to protect the increasing range of connected devices in the Internet of Things, Cisco has challenged security experts around the world.

"We're connecting more of our world every day through smart, IP-enabled devices ranging from home appliances, healthcare devices, and industrial equipment. These new connected devices are offering new ways to share information and are changing the way we live," reads the blog post.

The Contest was announced by the senior vice president of the security group at Cisco, Christopher Young, in his keynote at this week's RSA Conference, said "the idea is 'a contest of experts around the world to submit blueprints' for how security issues created by the Internet of Things could be addressed. It's expected that up to six winning entries would be selected and the prize money awarded at the Internet of Things Forum in the fall."

It's expected that up to six winning entries would be selected and the prize money from $50,000 to $75,000 would be awarded by Cisco to winning contestants at the Internet of Things Forum in the fall.

A Cisco team of security experts will evaluate proposals based on the following criteria:

  • Feasibility, scalability, performance, and ease-of-use
  • Applicability to address multiple IoT verticals (manufacturing, mass transportation, healthcare, oil and gas, smart grid, etc.)
  • Technical maturity/viability of the proposed approach
  • Proposers’ expertise and ability to feasibly create a successful outcome
About a month back, we already posted that how hundreds of thousands of Smart TVs, Refrigerator, and other smart household appliances were compromised by hackers to send out malicious spam emails.

So, in future the "Internet of Things" can become an easy weapon for cyber criminals to launch large scale of cyber attacks and to protect ourselves, we should have a good and effective security solution, in which Cisco is contributing a way.

The winners of the Internet of Things Security Grand Challenge will be named in the northern autumn of 2014, by The Evaluation Panel of Cisco.

Russia Today (RT) Hacked, "Russian" replaced with "Nazi" in News Headlines

dimanche 2 mars 2014 à 10:00
Russia Today hacked
'Russia Today', Moscow based Russia's biggest news channel website (RT.com) has been hacked and defaced by an unknown group of hackers. Hackers have replaced “Russia” or “Russians” with “Nazi” or “Nazis” word from the headlines, as shown.


"RT website has been hacked, we are working to resolve the problem,Russia Today tweeted from the official Twitter account.
Modified headline, i.e.i.e. Russian Senators Vote To Use Stabilizing Nazi Forces on Ukrainian territory.
Another modified headline stated: “Up to 143,000 Nazis requested asylum in Russia in two weeks,” 
The changes to the 'Russia Today' website remained in place for nearly 30 minutes and at the time of reporting, the hack was restored. "Hackers deface http://RT.com website, crack admin access, place "Nazi" in every headline. Back to normal now.RT acknowledged the issue.

Recently the Anonymous group has also announced '#OpRussia' in support of the Ukrainian protesters and under banner of #OpRussia, Anonymous hackers are hacking and defacing hundreds of Russian websites today.

The Hackers targeted the website after the Russian parliament approved the use of military force in Ukraine's Crimea. Russia Today is funded and supported by the Government of the Russian Federation and the website could be hacked by some pro-Ukraine group of hackers.

Yahoo vulnerability allows Hacker to delete 1.5 million records from Database

samedi 1 mars 2014 à 12:30
Yahoo Vulnerability allows hacker to delete 1.5 million records from Database
Yahoo! The 4th most visited website on the Internet has been found vulnerable multiple times, and this time a hacker has claimed to spot a critical vulnerability in the Yahoo! sub-domain 'suggestions.yahoo.com', which could allow an attacker to delete the all the posted thread and comments on Yahoo's Suggestion Board website.

Egyptian Cyber Security Analyst, 'Ibrahim Raafat', found and demonstrated 'Insecure Direct Object Reference Vulnerability' in Yahoo's website on his blog.

Exploiting the flaw escalates the user privileges that allow a hacker to delete more than 365,000 posts and 1,155,000 comments from Yahoo! Database. Technical details of the vulnerability are as explained below:

Deleting Comments: While deleting his own comment, Ibrahim noticed the HTTP Header of POST request, i.e.
prop=addressbook&fid=367443&crumb=Q4.PSLBfBe.&cid=1236547890&cmd=delete_comment
Where parameter 'fid' is the topic id and 'cid' is the respective comment ID. While testing, he found changing the fid and cid parameter values allow him to delete other comments from the forum, that are actually posted by another user.

Deleting Posts: Next, he also tested post deletion mechanism and found a similar loophole in that. A normal HTTP Header POST request of deleting a post is:
POST cmd=delete_item&crumb=SbWqLz.LDP0
He found that, appending the fid (topic id) variable to the URL allows him to delete the respective post, that was not posted by himself i.e.
POST cmd=delete_item&crumb=SbWqLz.LDP0&fid=xxxxxxxx
Ibrahim has reported the flaw to Yahoo Security team and also provided a Video Demonstration, as shown below:
A potential attacker with little knowledge of programming could write an automated script to delete all the comments and posts.

The vulnerability hunter claimed that he had received the Bug Bounty for reporting this security flaw to yahoo and which now has been fixed by the company.
Error happened! 0 - count(): Argument #1 ($value) must be of type Countable|array, null given In: /var/www/ecirtam.net/autoblogs/autoblogs/autoblog.php:428 http://www.ecirtam.net/autoblogs/autoblogs/plusgooglecom108722708627977273008_4b868befb999be8d4a12cee6eafcf1d5f929d04b/?1901 #0 /var/www/ecirtam.net/autoblogs/autoblogs/autoblog.php(999): VroumVroum_Blog->update() #1 /var/www/ecirtam.net/autoblogs/autoblogs/plusgooglecom108722708627977273008_4b868befb999be8d4a12cee6eafcf1d5f929d04b/index.php(1): require_once('...') #2 {main}