This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

The Future security mobile botnets take over ipone just with A SMS


Today at the cybersecurity conference known as Black Hack, researchers Charlie Miller and Collin Mulliner will present an SMS exploit that could take over your iPhone with just one text. Once the phone is compromised, the hacker would have access to all the functions on the phone allowing them to send email, access your contacts, make phone calls, and of course, send text messages that would send the exploit to more devices.

This serious vulnerability (which apparently Apple sat on for over a month) is probably the first time that most people have heard of mobile phones being used to create botnets. However, this isn't the first sighting of a mobile phone hijacking attempt for the purpose of botnet creation - a similar exploit was discovered earlier this month. Does this mean we're on the verge of a new and dangerous trend: the creation of "zombie" phones?

The iPhone SMS Hack

According to Forbes, the SMS exploit being demonstrated at Black Hat today involves sending short, mostly invisible SMS bursts which would allow a potential hacker to entirely take over the phone. The only warning you would have to alert you to the hack would be a text messaging that contained a single square character. If you received something like that, your only recourse would be to turn the phone off immediately.

The researchers said they alerted Apple to this vulnerability over a month ago, but no patch has been released. Apple isn't returning calls requesting a comment, either.

The First Mobile Botnet?

Assuming the iPhone exploit described above was able to make it into the wild, it could effectively compromise all the unprotected iPhones in the world (which, in theory, would be all of them, if no patch is distributed). The hack would essentially turn the phones into "zombies" - a term usually used to refer to PCs compromised by a hack, virus, or trojan horse in order to do the bidding of a hacker. Along with other compromised PCs like them, this group of computers would form a botnet of "zombie" machines.

While botnets are common in the PC world - it's estimated that these machines are used to send anywhere from fifty to eighty percent of spam worldwide - botnets consisting of mobile phones are practically unheard of...or are they?

Earlier this month, Symantec revealed an SMS threat dubbed "Sexy Space" created using malware known as SymbOS.Exy.C, a revision of older variations also used to create similar threats. Using simple social engineering tactics, this hack involves sending SMS spam with names like "Sexy View," "Sexy Girl," and "Sexy Space" to encourage victims to click an included link in the text message.

[Image]

This particular exploit, only found on Symbian-powered devices so far, is smart enough to end certain programs on the hijacked phone that would make it possible to manually end the threat. At first, the hack was only being seen in China, but later an English version was discovered in the Middle East.

What's most frightening about this particular threat is that it's controlled by a central server. That means hackers could control the attacked phones the same way hackers today control zombie PCs. This led the Symantec researchers to wonder if this was, in fact, the first case of a mobile botnet being spotted in the wild.

But My Phone Has Never Been Attacked!

Security researchers have been warning us about the upcoming mobile risks for some time and yet few people have ever actually had their phone compromised by malware, it seems. To date, mobile exploits have been few and far between and have had no major impact on the industry as a whole or on consumer confidence levels regarding these devices. Perhaps lulled into a false sense of security since mobile phones were once much more basic devices without internet access and data plans, most people don't even realize that their phone could be at risk of an attack.

In a paper released this past fall from the Georgia Tech Information Security Center, Tom Cross, a researcher with the IBM Internet Security Systems X-Force team was quoted as saying how surprised he was that there haven't been more attacks to date on smartphone devices like Apple's iPhone. However, he noted that "financial motivation and increased adoption will increase attacks to smartphones in the years to come. As more payment infrastructure gets placed on these devices, they will become a more attractive target."

In other words, mobile phones just aren't worth hacking yet. That will change once more financial transactions take place over phones, agreed Dave Amster, VP of security investigations at Equifax, in that same report. "Consumers are ordering credit reports from their Blackberrys, which puts valuable information at risk," he said.

Still, hacking the mobile platform will remain a challenge. According to Patrick Traynor, a computer science professor at Georgia Tech and member of GTISC, the lifecycle for mobile phones is much shorter than that of PCs. Most people buy a new mobile device every two years - a cycle which allows manufacturers to keep up with security design - and potentially stay ahead of hackers.

But if there's one thing we've all learned over the years, it's that you should never count out the hackers. If there's something to be gained by creating mobile botnets - beyond simply proving that it's possible to do so - then there's no doubt that hackers will attempt to create them.

How to scan a file for virus with out downloding it your computer


This is very help full website for those who wana check the files for virus with out downloading it to your own computer

Now a days most of the hacking tools and also some of the files that our trusted friends sends may contain keyloggers or virus .

NoVirusThanks, a website that offers free service to analyze your file with 22 AntiVirus Engines and will report back the analysis result :

it introduced a new feature to scan the website contain any files with virus or any miscellaneous software or any drive -by-download attacks

it can scan php,.html.,js, sites
the main advantage is it saves your bandwidth and also time but the main drawback is this can scan only files maximum of 20 mb

plzz comment if u know any nice services like this

How to analyze shellcode

Often in some exploit analysis we need to analyze the shellcode,what it does and how.There are many ways you can do it.but the most simple way is to use following link:

http://sandsprite.com/shellcode_2_exe.php

Just copy paste your shellcode and it will give you a exe containing shellcode.then you can simply run it in ollydebugger and step in. sometimes shellcode is encrypted using the XOR but that is very simple to decode.

Hope it helps ..

Google's new operating system to take on Microsoft


Google is developing a new operating system for laptop computers in its boldest challenge yet to Microsoft's control over people's computing experience.

The new operating system will run through Google's nine-month-old Web browser, Chrome, according to a post late Tuesday night on the Mountain View-based company's Web site.

Google plans to introduce the operating system during the second half of 2010.

The new operating system is being designed for "netbooks," a low-cost, less powerful breed of laptops that is becoming increasingly popular among consumers primarily interested in a having a computer to surf the Web.

The Chrome browser could threaten Microsoft's Windows system, which has been running most personal computers for the past two decades.

Batch File Programming E-Book Released Online


I am very happy to inform that the E-book on ‘Batch File Programming‘ authored by me is published on the Internet today. More over i have found 39 Reads with in 15 Minutes from the time of uploading in the popular Document uploading site www.scribd.com.

                                                  This book ‘Batch File Programming’ is written after experimenting and testing all the snippets covered in this book. Batch File Programming is a pretty old one, but i have found lot of books that haven’t covered the dark-side of the batch, which still remains untold. The ultimate goal of this book is to make the readers understand how it works, what are the limitations of the batch, what else is possible with a batch, constructing useful programs with various views, Creating a batch virus by mis-using the commands, creating a batch file to an executable and lot more. 
                     This book is aimed at novice to advanced programmer, No matter if you are new to programming, this would be the right drive to start with, since this book contains real time examples along with screenshots that really helps in a better understanding of the concept.
Batch File Programming
Batch File Programming


Due to more number of readers online for this book, scribd has awarded and added this book to its ‘HOT LIST‘, just within the 3 hours from the time of upload.

Even though I have enclosed the scribd link for reading this book online, i am enclsoing the Table of Contents here in this page for your kind review.



  • Introduction

  • Internal & External Commands

  • Run Line Commands

  • Batch Operators

  • Basic Commands

  • Environment Variables

  • Looping Statements

  • Conditional Statements

  • Commands Associated with files and folders

  • Network Troubleshooting commands

  • Code snippets

  • Virus Programming

  • Converting Batch to Executable’s

Each of the category displayed in the table of contents has its own sub-categories along with lot of batch programs bundled with it.

If you want to read the book online, you can check with this Link

http://www.scribd.com/doc/15565801/Batch-File-Programming

or by Clicking Here