Custom search

Sunday, August 28, 2016

I Have A Dream!!!

August 28, 1963, Martin Luther King calls to end the racism in USA and also leading to civil rights and economical rights in the country. Nearly two hundred fifty thousand civil right supporters witnessed the speech and inspired millions to stand on that dream.

Everyone must have a dream, but it is worth enough to inspire millions. Dr. Martin Luther King did and inspire the millions.

Wednesday, July 27, 2016

What World Needs Now?



Very seriously thinking about today's world and suddenly one question sparked in my mind, "what world needs now?". Ultimate question and the solution will bring up the new world. Many philanthropists, billionaires also searching the answer for the same question as a part their new business openings or giving back to the society.

Bill Gates, my role model, who is taking more care on what he give back to the society. Very active philanthropist with the support of his wife, he made journeys to several underdeveloped countries, especially African countries, in order to eradicate poverty, diseases (which can be eradicated), spending on education.

Another set of billionaires, like Elon Musk, searching for new innovative ideas to make this world a better place like ever before. Cheap Energy and renewable energy is the main concern to save our environment. Our hope lies in them that they can bring up with new ideas and have the ability to invest in those projects. It automatically leads to betterment of human life and answer to our question "what real world needs?".

Key points:
Peace
Clean Environment
Healthy food
Pure drinking water
No poverty
No starving
Renewable energy
Cheap Energy as well as renewable energy

Post made by
newWorld

Tuesday, June 28, 2016

Ransomware not only Encrypts Your Data But Also Speaks to You

A ransomware called Cerber has been floating around for about a week, but we were not able to retrieve a sample until today. Thanks to @BiebsMalwareGuy and @MeegulWorth, samples were found and further analysis of the ransomware could be done.  When infected, a victim's data files will be encrypted using AES encryption and will be told they need to pay a ransom of 1.24 bitcoins or ~500 USD to get their files back. Unfortunately, at this point there is no known way to decrypt a victim's encrypted files for free.


At this time we do not currently know how the Cerber ransomware is being distributed, but according to SenseCy, it is being offered as a service on a closed underground Russian forum. This means that it is probably a new Ransomware as a Service, or RaaS, where affiliates can join in order to distribute the ransomware, while the Cerber developers earn a commission from each ransom payment.

For anyone who is infected with this ransomware or wants to discuss the infection, we have a dedicated support topic here: CERBER Ransomware Support and Help Topic.  http://www.bleepingcomputer.com/forums/t/606583/cerber-ransomware-support-and-help-topic-decrypt-my-files-htmltxtvbs/



Widespread Attack on Office 365 Corporate Users with Zero-day Ransomware Virus- http://www.avanan.com/resources/attack-on-office-365-corporate-users-with-zero-day-ransomware-virus



Sample Analysis:

Friday, June 24, 2016

Godless Malware In Android:




"We came across a family of mobile malware called Godless (detected as ANDROIDOS_GODLESS.HRX) that has a set of rooting exploits in its pockets. By having multiple exploits to use, Godless can target virtually any Android device running on Android 5.1 (Lollipop) or earlier. As of this writing, almost 90% of Android devices run on affected versions."

Godless


Detailed post by Trendmicro:

http://blog.trendmicro.com/trendlabs-security-intelligence/godless-mobile-malware-uses-multiple-exploits-root-devices/



Wednesday, June 22, 2016

Getting best body with balance exercise and diet:

People who want reduce enormous amount of fat, they can take the below ideas and impose that in their day to day activity.

There are few rules need to be understand first. Fat and muscle weigh the same, but looks different. People who wants reduce the fat, they can build lean muscle. Because, muscle burn more calorie than fat.

Do heavy number of reps with lite weight. It gives more effective look without bulking. No need of cardio and other boring stuffs. People can feel the difference in two or three weeks.
Lats pulling, normal dumbbell workout, squats with lite weight will give you best results.

We need understand calorie calculations.
If 3500 calories burned during exercise, it means you used one pound fat for it.
So, 7000 calories mean one kg body fat.

Best way or recommended way to reduce the fat is balance of weight training and dieting.
Target each day with 250 calorie from diet and 250 calorie from weight training. The impact will be the best.
It is recommended to consume more negative calorie foods in your diet and it will act as catalyst in the fat reduction.

Vegetables on the negative calorie food list are: Asparagus, Bean
sprouts, Beets, Broccoli, Cabbage, Carrots, Cauliflower, Celery,
Chicory/Radicchio, Cucumbers, Endives, Green beans, Jicama, Kale, Leeks,
 Lettuce, Radishes, Spinach, Squash


Fruits on the negative calorie food list are: Apples, Blueberries, Cantaloupe, Cranberries,
 Grapefruits, Honeydew, Lemons/Limes, Mangoes, Oranges, Papaya, Peaches,
 Pineapple, Raspberries, Strawberries, Tangerines, Watermelon.


Note: If you want more result. Then, add skipping the rope exercise. It is full body cardio and conditioning. Famous boxers and body builders do skipping the rope for full body conditioning.

Post by
newWorld

Wednesday, June 15, 2016

How long can someone survive without food?


This is very wonderful explanation given by Niroshan. He gave the explanation in Tamil language (one of the Indian language).

Here its rough translation:

How long can someone survive without food?

Its not immediate death for starving. Normally, people can easily live for 2-3 days without any food or water.

Without oxygen : 5-10 minutes, people can live
Without water: 2-7  days, people can live.

Without any food : 2 months (no disease- can live )


starving lead to 3 stages for living:

Stage 1:  glucose from last food..
25% energy... used by brain...

Stage 2: lipids are broken and a condition characterized by raised levels of ketone bodies in the body, associated with abnormal fat metabolism and diabetes mellitus.
only for brain, heart and important function



Stage 3: brain started consuming less glucose.
if all ketone body empty, then all amino bodies eaten up for energy.


Our body is very amazing, not one back up plan, actually 3 back up plans for starving.

Sunday, June 5, 2016

Hard work never fails:


Failure And Rejection Are Part Of The Success Story:



Just try one more time that only makes the difference being champion and average one.

Born To Inspire:



Rejection is an opportunity to do things better than before. Never lose hope.

Hard work never fails:


Just to inspire people who feels always loser. We are here to inspire you. Don't lose hope, just follow us.                                                                                                                                                            

Wednesday, May 11, 2016

System Information:

This post is about system information. Many have the following questions in their mind:


  • How to open system information? 
  • How to check the hard disk type? 
  • How to find the details about system components?
To open the system information, open run window (start+R) and type msinfo32 (enter).






In the system information, you will find the system summary and followed by 3 things.
-Hardware Resources
-Components
-Software Environment


You can find any system components from here, like devices, display, sounds, hard disk, memory, etc.

Lets come to the important point. How to find the hard disk type?

- Open the components
- Select the tab the storage and then select disk.
It will populate all the details related to disk and you will find media type as SSD or HDD.


The media type is mentioned as fixed hard disk, which is a HDD type. This is how we can find the hard disk type.


Post by 

Saturday, May 7, 2016

Vote Percentage Of Major Parties In Tamil Nadu: (Predication of 2016 Tamil Nadu Assembly Election)

Introduction:

Election fever is at its peak now in Tamil Nadu. There are lots of opinion polls and surveys conducted by many media. We are getting speculations that those opinion polls are paid one.

Well, it may or may not be. In this post, we will see the vote percentage of major parties in Tamil Nadu at the last elections, which will give fair idea about how this election is going to be. Because, elections in Tamil Nadu is purely on arithmetic and anti incumbency factor.

Vote percentage in 2011 TN: 

In 2011 Tamil Nadu assembly election, AiAdmk front sweeped the poll and won 203 seats (and Aiadmk alone won 150 seats).



Party Total Number of Vote Vote %
Aiadmk 14150289 38.40%
DMK 8249991 22.40%
DMDK 2903828 7.90%
INC 3426432 9.30%
PMK 1927783 5.20%




Polled Turn Out
Male Voters 18381236 77.71%
Female Voters 18371744 78.54%
Total Voters 36753114 78.12%


Analysis:
Nearly 78% of votes were polled and it is 50:50 ratio votes of Male:Female. Admk got nearly 1.4 crore votes and its alliance Dmdk got 29 lakh votes. 
Dmk managed to gain 82 lakh votes and its alliance INC got only 34 lakh votes. Dmk had alliance with INC, PMK, and VC. Due to the heavy anti incumbency factor, they failed to won the election.

Vote Percentage in 2014 TN:
In spite of Modi wave in the whole India, this is the only state where BJP got only 1 seat out of 39 seats and its alliance PMK got one more seat. Out of 39 seats, Aiadmk won 37 seats with the vote percentage of 44 (i.e. vote of 1.8 crore).
In that election, DMK suffered heavy loss and unable to win a single seat.

Party Total Number of Vote Vote %
Aiadmk 17983168 44.30%
DMK 10887347 26.80%
NDA (Dmdk,BJP,Mdmk,PMK) 7523829 18.50%
INC 1751123 4.30%







Polled Turn Out
Total Voters 39599601 73.67%
Analysis:
It is believed that two factors influenced the win of Aiadmk. One is Multi-corner contest and other is people welfare schemes by  State Government. Dmk was moved out of INC and stated that they realized bitterness of INC. Dmk with the support of VC and some other minor parties, they faced the election. They able to gain only 27% of vote (by that alliance). INC got only 4.3% votes.
BJP team (Dmdk+Mdmk+PMK) able to gain only 18.5% of vote.


Predication of 2016 Tamil Nadu Assembly Election:

It is very clear from our analysis that Aiadmk is single largest party in the state of Tamil Nadu. And Dmk is the second largest party in the state. We did a prediction analysis with all this data and added current situation of the state (like election manifesto and freebies).

 It is clear that Aiadmk going to get 48% of vote (+ or - 3%). DMK is going to get 23% of vote (+ or - 3%). 

DMK and INC alliance made up a social media negative image via funny memes and reality, they were sharing the table for Srilankan Tamils genocide. Now INC is a weaker party in Tamil Nadu. Half of its party is with GK Vasan (they are in PWF- People welfare front). 

Same equation of 2014 is now rehashed in to new equation. Instead of INC, now BJP is alone. PMK is also standing alone. Instead of NDA (BJP team), we got PWF with Dmdk, Mdmk, VC and communist parties. In 2014, communist parties were faced the election alone, but this time PMK was out and communist parties were in. 

Dmk missed out VC this time and added weak INC in. More or less, it is a same equation like last time. The only unchanged side is Aiadmk. Lets see our prediction is right or wrong on may 19.


Saturday, April 30, 2016

What's her number? (Comedy Short Film)






A Tamil comedy short film about Arjun, who loses the last two digits of a girl's phone number and whether he succeeds in finding it. 

A simple plot yet an interesting short film!!

Title: What's her number?
Story - Screenplay - Direction : Arvind Kumar
Cast: Sidharth Varma | Ambrish Prasad | Aswini K 
Editing: Arjun Manohar
Cinematography- Sooraj S Anand
Associate Director: Srikanth Cheeka
Assistant Directors: Omprakash Ujjwal, Murali
Make-up for the artists: Anantha Chittila
Sound Mixing: Sandy
Script inputs: Ranjith Unnikrishnan
Voice-over: Sheik Mohamed Shakeel and Gayathry Sankaran
Media Partner : Mediaexpress
Location courtesy: La Cucina Restaurant, Kilpauk
Soundtracks: selected from audioblocks.com (with the director's official contract)

Finally, they released the short film on Apr 29th 2016.

Here is the short film:

Wednesday, April 27, 2016

Dark Seoul Implant with zero detection:

Famous Malware researcher Snorre Fagerland tweeted that dark seoul implant having zero detection in Virustotal.

https://twitter.com/SnorreFagerland/status/725211677277310977

Here is the VT link:
https://www.virustotal.com/en/file/061044ffbebeebab449a13ee74799fd9c58b9b383149cbde7a7f6db77c54f72e/analysis/

At this time of writing, 0/56 in VT. i.e. No antivirus vendor flagged this implant.

Monday, April 25, 2016

Mistake is an opportunity!

Mistake is an opportunity!


Every billionaire in this world, admits that mistake is an opportunity to start the things freshly. Let me drag some events from history.

Thomas Alva Edison is one of the greatest scientist and my favorite entrepreneur. Yes, he is an entrepreneur. Whenever his experiment results in failure, he says i found something which was not working. That's the idea. When he fails 1000's of time during the research on electric bulb, he mentioned - I found 1000's of things, not working. He used his mistake as an opportunity.
 He did it! 

I want to give one of personal experience with a company which sells goods in online. I placed my order for iphone 3G in that online shopping site. But, after one week span- they came up and say, sorry due to the some reason the product can't be delivered. I frustrated and scold them.

If they didn't correct the mistake, they will loss the customer and the reputation. So, they ask me to wait for 3-5 days, we will come with solution. Finally, i got the IPhone at the 5th day. I was surprised- it was not Iphone 3G and it was Iphone 3Gs. There was a letter in the mobile box, sorry for inconvenience and we upgraded to 3GS for you, please accept our apology. I was happy.

 That's the way to glow, if you take mistake is an opportunity!
(I say about the iphone event to my friends, and started giving good opinion to others about that online shopping site. )


Regards,
NewWorld

THINK OUTSIDE THE BOX!


Once again, hi to all the future and present billionaires reads this post. In the last post, we talk about how to think like a billionaire. Today, we going to understand about approach called “Think outside the box!” This is a very positive trait of every billionaires world seen.




Let’s move on-
Think you are in a situation to bring up a solution for a problem. You will come with good one, but it doesn’t satisfy the demands. At that point, you feel it is the best solution. But, the truth is the best solution will satisfy the demands.



If you look at a stone as problem, that stone might cover your whole eye sight and vision of the outside world. So, just bring a step back the stone and you will realise the size of the problem is very small! Think outside the box is similar kind of perspective to the problems and solution.





Look at the best example for think outside the box-

3X3 dot puzzle (9 dots)


Problem is- you have to connect all the 9 dots without taking out the pen from the line and only 4 lines allowed to draw.

Many people try out in the same way… and started hitting the walls, it can’t be solved.





Think different… solution is below.


Think like a billionaire!








IF YOU WANT TO SHINE LIKE A SUN,
YOU NEED TO BURN LIKE IT FIRST!!!

 What it means…! If you want to become an billionaire, you first need to think like them!



How to think like a billionaire?
Simple, you need to think about the future and think every moment as opportunity. There is no rule like everyone can’t be a billionaire, but people never tried.
In a TV show, anchor posted a question as follows:
If God comes before you and ask a wish then what will be your wish?
80 percentage of People replied: I will ask him $10k to 50k.
Remaining people said: luxury cars and houses.
If you asked the same question to a billionaire:
They will reply: Give me a thousand wishes. Pretty cool !
And even some asks market predicators of the future or future prices for all the stocks for next 50 years.





Now you might understand my point. Billionaires think differently, and not like ordinary. Suppose if an ordinary person start think like a billionaire… He would ask the price list of stocks for the future and invested successfully- which leads him billionaire status easily!

Billionaires always make themselves in positive approach. They are always looking every moment as opportunity. (Please try to think like them, you will find new ways in the path).

In the coming posts, I will give you the details about the approach called “Think outside the box”.

Post by- Newworld

Who is billionaire?

First of all, we need to understand who is billionaire?!
Because, play the game after you clear with the rules...!

The person who have the wealth or business which values more or equal to 1000 million USD or 1 billion USD or 100 crore American Dollar (Not 1 billion Zimbabwe dollar).



If you read forbes list of billionaires and their wealth... you will get the idea about how their business and how they earned such a name as billionaire!


They don't store their money in locker or save their money in savings account. They are the people who don't allow their money to sleep in the locker and they made it to work for them!



Thanks to the inflation. In the past decade, we seen the billionaire list is growing! Half decade before, it was just 600-700 billionaires in our planet!
But now, it was 1K billionaries!
In next post, we will see about some bench mark billionaires!


- Newworld

Monday, April 18, 2016

Anger – wasting of energy

In last article, we saw about channelizing your anger. In this article, we are going see some mythological stuffs related to anger.

Check the following questions:
  • -          Whom we got anger?
  • -          Why we got anger?
  • -          What is the use of showing anger?
  • -          How to control the anger?


To answer all this question, anger management is the only solution.

In Hindu mythology,
There are three areas:
  • -          Kailash area
  • -          Vishnu area
  • -          Heaven (Indhiran area)

In heaven, Indhiran is insecure about his post. He won’t allow saint Viswamitra to surpass the highest meditation level. Here anger is the point to spoil the Viswamitra’s aim and used as weapon by Indhiran.

In kailash area, where no hungry, there is no fight between snake, eagle, rat, bull, peacock and tiger. If one is anger in Kailash, mostly they will be out of kailash. It’s a clear point.


Three things are very important while addressing the anger management:
  1.         . Frequency of anger
  2.        .  Intensity of anger
  3.        .  Duration of anger


-If energy is going up, it is enlightenment.
-If energy is going down, it is expenditure.
-Expenditure is nothing but stress, anxiety and anger. Anger tops the list.
Anger is always an energy wasting method. It is in your head that either you choose enlightenment or expenditure.

Sunday, April 17, 2016

Channelising Your Anger:

Anger is the cause of fall for many. Successful people always know how to channelizing their anger. There is a way to overcome anger instead of showing your anger. If you look in to history, angry king or judge made huge mistakes.

-          King Pandiya (Ruler of Madurai) got angry over the suspected stolen case. The case is about queen’s ornament was missing and innocent Kovalan was mistakenly suspected. The angry king given death sentence to Kovalan. Kovalan’s wife (Kannagi) erupted in anger and fired the whole Madurai City.
-          If King would have channelized his anger, the judgement might be better and history might be changed.

Anger Management:
  • -          Relaxation technique
  • -          Fist closing and opening technique
  • -          Backward counting (9,8,7,6,5,4,3,2,1)
  • -          Deep Breathing
  • -          Imagery ( Thinking about good timings about the person
  • -          Cognitive restructuring   

Why angry is coming?
-complex
-one sided anger
-Breaking of promise by others
-Not understanding others situation
  • Remember, anger is not just psychological factor, it is physiological factor. Eg: Nutrition problem, Hormones imbalance. Matured people shows less anger.

Follow these steps during anger:
-          While anger don’t react
-          Don’t speak and just move away from that place
-          Postponing the anger will dilute your anger
-          Try 24 hour postpone of anger (at least for 15 min)
-          Breaks will helps us to keep you away from anger
-          Open minded can avoid anger

Conclusion:

Discussion is good but arguments are bad. It will leads to anger. Always introspect your anger, you will easily overcome anger. 

Thursday, March 24, 2016

Mars Gravity Map

Mars' gravity, released as in new map by NASA.  This will be helpful for future space programs to Mars. Scientist believed that this new gravity map gives the idea about how the red planet shaped.

Antonio Genova, MIT and NASA Goddard Space Flight Center said,"Gravity maps allow us to see inside a planet, just as a doctor uses an X-ray to see inside a patient."





"Mars has a liquid outer core of molten rock." The researchers determined this by "analyzing tides in the Martian crust and mantle caused by the gravitational pull of the sun and the two moons over Mars."

Important Links Related Tocybe Cyber Security:

For all the folks who have passion on cyber security, I have a good list of interesting links to study and practise cyber security stuffs. In this post, we predominantly focused on web application testing. Please go through these links and give your comments.

The following links for video tutorials:
OWASP Appsec Tutorial Series - https://www.owasp.org/index.php/OWASP_Appsec_Tutorial_Series
SecurityTube - http://www.securitytube.net/
Videos by Imperva - http://www.imperva.com/resources/videos.asp

Deliberately Insecure Web Applications
OWASP Vulnerable Web Applications Directory Project -

https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project#tab=Main

BadStore - http://www.badstore.net/

Damn Vulnerable Web App - http://www.ethicalhack3r.co.uk/damn-vulnerable-web-app/

Moth - http://www.bonsai-sec.com/en/research/moth.php

Mutillidae - http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10


Hacme Series from McAfee:

+ Hacme Travel - http://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx
+ Hacme Bank - http://www.mcafee.com/us/downloads/free-tools/hacme-bank.aspx
+ Hacme Shipping - http://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx
+ Hacme Casino - http://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx
+ Hacme Books - http://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx


Stanford SecuriBench - http://suif.stanford.edu/~livshits/securibench/

Vicnum - http://vicnum.sourceforge.net/ and

http://www.owasp.org/index.php/Category:OWASP_Vicnum_Project

WebGoat - http://www.owasp.org/index.php/Category:OWASP_WebGoat_Project

WebMaven (better known as Buggy Bank) - http://www.mavensecurity.com/WebMaven.php

Security patch update:
https://technet.microsoft.com/en-us/security/bulletin/dn602597.aspx

Monday, December 7, 2015

What is persistent in the context of malware or cyber security? (Hindi)

मैलवेयर या साइबर सुरक्षा के संदर्भ में लगातार क्या है?
लगातार - ऑपरेटर्स opportunistically वित्तीय या अन्य लाभ के लिए जानकारी की मांग के बजाय, एक विशेष कार्य को प्राथमिकता देते हैं। यह भेद हमलावरों बाहरी संस्थाओं द्वारा निर्देशित कर रहे हैं कि निकलता है। लक्ष्य-निर्धारण परिभाषित उद्देश्यों को प्राप्त करने के लिए सतत निगरानी और बातचीत के माध्यम से आयोजित किया जाता है यह लगातार हमलों और मैलवेयर अपडेट की बौछार मतलब नहीं है। वास्तव में, एक "कम और धीमी गति से" दृष्टिकोण आमतौर पर अधिक सफल होता है ऑपरेटर अपने लक्ष्य के लिए उपयोग खो देता है तो वे आम तौर पर सफलतापूर्वक, सबसे अधिक बार पहुँच reattempt, और होगा। ऑपरेटर के लक्ष्यों में से एक केवल एक विशेष कार्य निष्पादित करने के लिए उपयोग की जरूरत है जो खतरों के विपरीत लक्ष्य करने के लिए लंबी अवधि के उपयोग, बनाए रखने के लिए है

APT: Carbanak (Hindi)

स्थिति: सक्रिय
प्रकार: पिछले दरवाजे
डिस्कवरी: 2014
लक्षित प्लेटफॉर्म: Windows
पहली ज्ञात नमूना: 2013
लक्ष्य की संख्या: 11-100


विशेष लक्षण:
सबसे पहले एपीटी कभी आपराधिक
Carbanak cybergang दुनिया भर में 100 वित्तीय संस्थाओं से $ 1bn चोरी कर रहा था
भूखंड दुर्भावनापूर्ण उपयोगकर्ताओं बैंकों से सीधे पैसे चोरी, और अंत उपयोगकर्ताओं को निशाना बनाने से बचें जहां cybercriminal गतिविधि के विकास में एक नए चरण की शुरुआत के निशान
सबसे बड़ी रकम बैंकों में हैकिंग और प्रत्येक छापे में दस लाख डॉलर तक चोरी करके पकड़ा गया


शीर्ष 10 देशों:
रूस, अमरीका, जर्मनी, चीन, यूक्रेन, कनाडा, ताइवान, हांगकांग, हांगकांग, ब्रिटेन, स्पेन, नॉर्वे, भारत, फ्रांस, पोलैंड, पाकिस्तान, नेपाल, मोरक्को, चेक गणराज्य, स्विट्जरलैंड, बुल्गारिया, ऑस्ट्रेलिया, आइसलैंड, ब्राजील

लक्ष्य:
वित्तीय संस्थानों

APT - Hellsing (Hindi)

स्थिति: सक्रिय
प्रकार: दूरस्थ प्रशासन उपकरण
डिस्कवरी: गर्मी 2014
लक्षित प्लेटफॉर्म: Windows
पहली ज्ञात नमूना: 2012
लक्ष्य की संख्या: 11-100

शीर्ष लक्षित देशों:
मलेशिया, फिलीपींस, भारत, इंडोनेशिया, संयुक्त राज्य अमेरिका

लक्ष्य:
सरकारी संस्थाओं
राजनयिक संगठनों / दूतावासों

APT: Equation (Hindi)

स्थिति: सक्रिय
प्रकार: परिसर cyberattack मंच
डिस्कवरी: 2014
लक्षित प्लेटफॉर्म: Windows
पहली ज्ञात नमूना: 2002
लक्ष्य की संख्या: 500-1,000

शीर्ष लक्षित देशों:
ईरान, रूस, पाकिस्तान, अफगानिस्तान, भारत, चीन, सीरिया, माली, लेबनान, यमन

विशेष लक्षण:
हार्ड ड्राइव फर्मवेयर को संक्रमित करने की क्षमता
पीड़ितों को संक्रमित करने के लिए "पाबंदी" तकनीक का उपयोग
आपराधिक मैलवेयर के लिए नकल उतार

लक्ष्य:
नैनो
वित्तीय संस्थानों
परमाणु उद्योग
कार्यकर्ता
एकेडेमिया / अनुसंधान
सरकारी संस्थाओं
ऊर्जा, तेल और गैस कंपनियों
सैन्य
टेलीकाम
राजनयिक संगठनों / दूतावासों
व्यापार एवं वाणिज्य
एयरोस्पेस
मास मीडिया और टीवी
उच्च प्रौद्योगिकी कंपनियों
शिक्षा
ढुलाई

APT:Hacking Team RCS (Hindi)

स्थिति: सक्रियप्रकार: पिछले दरवाजे, ट्रोजन, रूटकिटडिस्कवरी: 2011लक्षित प्लेटफार्म: विंडोज, ओएस एक्स, ब्लैकबेरी, विंडोज मोबाइल, एंड्रॉयड, आईओएसपहली ज्ञात नमूना: 2008लक्ष्य की संख्या: 101-500
टॉप लक्षित देशों:रूस, चीन, इटली, वियतनाम, अमेरिका, तुर्की, इराक, मेक्सिको, जर्मनी, भारत
विशेष लक्षण:"व्यापार करने वाली सरकार" स्पाइवेयरएक पर्सनल कंप्यूटर / मोबाइल डिवाइस का उपयोग किया जाता है किसी भी कार्रवाई की निगरानी कर सकते हैं।कंप्यूटर और मोबाइल उपकरणों के लिए मॉड्यूलयूएसबी फ्लैश ड्राइव के माध्यम से स्व-प्रतिकृतिआभासी ड्राइव पर ऑटोरन फ़ोल्डर में खुद को कॉपी करके आभासी VMware मशीनों का संक्रमणआत्म अद्यतन करने की क्षमतानमूने कानूनी अधिकारियों द्वारा हस्ताक्षर किए हैंयूएसबी केबल के माध्यम से स्थानीय संक्रमण मोबाइल उपकरणों सिंक्रनाइज़ करते समयहर ठोस लक्ष्य के लिए विशिष्ट दुर्भावनापूर्ण प्रत्यारोपणआईओएस मोबाइल मॉड्यूल द्वारा समर्थित कम से कम 39 एप्पल उपकरणोंदोनों जेलब्रेक और गैर जेलब्रेक आईफ़ोन संक्रमित हो सकते हैं: एक हमलावर पहले से ही संक्रमित कंप्यूटर के माध्यम से एक दूरस्थ भागने का संचालन कर सकते हैं
लक्ष्य:कार्यकर्तापत्रकारोंराजनेताआपराधिक संदिग्धों

APT: Cloud Atlas (Hindi)

स्थिति: सक्रिय
प्रकार: ट्रोजन
डिस्कवरी: अगस्त 2014
लक्षित प्लेटफार्म: विंडोज, एंड्रॉयड, आईओएस, लिनक्स
पहली ज्ञात नमूना: 2014
लक्ष्य की संख्या: 11-100

टॉप लक्षित देशों:
रूस, कजाखस्तान, बेलारूस, भारत, चेक गणराज्य

विशेष लक्षण:
CloudAtlas RedOctober हमलों की एक पुनर्जन्म का प्रतिनिधित्व करता है
RedOctober के शिकार लोगों में से कुछ भी CloudAtlas द्वारा लक्षित कर रहे हैं
बादल एटलस और RedOctober दोनों मैलवेयर प्रत्यारोपण एक लोडर और, एन्क्रिप्टेड संग्रहीत और एक बाहरी फ़ाइल में संकुचित है कि एक अंतिम पेलोड के साथ एक समान निर्माण पर भरोसा करते हैं।
CloudAtlas प्रत्यारोपण एक बल्कि असामान्य सी और सी तंत्र का उपयोग - सभी मालवेयर नमूनों एक बादल सेवा प्रदाता से खातों के साथ संवाद।
माइक्रोसॉफ्ट ऑफिस सीधे डिस्क पर एक Windows पीई पिछले दरवाजे लिख नहीं है शोषण। इसके बजाय, यह एक एन्क्रिप्टेड विजुअल बेसिक स्क्रिप्ट लिखता है और इसे चलाता है।


लक्ष्य:
राजनयिक संगठनों / दूतावासों
सरकारी संस्थाओं

Tuesday, August 18, 2015

APT: Cloud Atlas

Cloud Atlas

STATUS:Active
TYPE:Trojan
DISCOVERY:August 2014
TARGETED PLATFORMS:Windows, Android, iOS, Linux
FIRST KNOWN SAMPLE:2014
NUMBER OF TARGETS:11-100

TOP TARGETED COUNTRIES:
Russia, Kazakhstan, Belarus, India, The Czech Republic

Special Features:
CloudAtlas represents a rebirth of the RedOctober attacks.
Some of the victims of RedOctober are also targeted by CloudAtlas.
Both Cloud Atlas and RedOctober malware implants rely on a similar construction, with a loader and a final payload that is stored, encrypted and compressed in an external file.
CloudAtlas implants utilize a rather unusual C&C mechanism - all malware samples communicate with accounts from a cloud services provider.
The Microsoft Office exploit doesn’t directly write a Windows PE backdoor on disk. Instead, it writes an encrypted Visual Basic Script and runs it.


TARGETS:
Diplomatic organizations/embassies
Government entities

APT:Hacking Team RCS

Hacking Team RCS

STATUS:Active
TYPE:Backdoor, Trojan, Rootkit
DISCOVERY:2011
TARGETED PLATFORMS:Windows, OS X, BlackBerry, Windows Mobile, Android, iOS
FIRST KNOWN SAMPLE:2008
NUMBER OF TARGETS:101-500

TOP TARGETED COUNTRIES:
Russia, China, Italy, Vietnam, USA, Turkey, Iraq, Mexico, Germany, India

Special Features:
“Business-to-government” spyware
Can monitor any action performed using a personal computer/mobile device.
Modules for computers and mobile devices
Self-replication via USB flash drive
Infection of virtual VMware machines by copying itself into the autorun folder on the virtual drive
Ability to self-update
Samples are signed by legal authorities
local infections via USB cables while synchronizing mobile devices
Specific malicious implant for every concrete target
At least 39 Apple devices supported by the iOS mobile modules
Both jailbroken and non-jailbroken iPhones can be infected: an attacker can conduct a remote jailbreak through already infected computers

TARGETS:
Activists
Journalists
Politicians
Criminal suspects

APT:SabPub

SabPub
STATUS:Inactive since 2012
TYPE:Backdoor
DISCOVERY:April 2012
TARGETED PLATFORMS:OS X
FIRST KNOWN SAMPLE:2012
NUMBER OF TARGETS:11-100

TOP TARGETED COUNTRIES:
India, USA, Western Europe

SPECIAL FEATURES:
MacOS X backdoor
SabPub targeted Dalai-Lama and Tibetan community

TARGETS:
Activists

APT:Regin

Regin
STATUS:Active
TYPE:Complex cyberattack platform, Trojan, Rootkit
DISCOVERY:spring of 2012
TARGETED PLATFORMS:Windows
FIRST KNOWN SAMPLE:2003
NUMBER OF TARGETS:11-100

Top Targeted countries:
Algeria, Afghanistan, Belgium, Brazil, Fiji, Germany, Iran, India, Indonesia, Kiribati, Malaysia, Pakistan, Syria, Russia

Special Features:
Regin – the first cyber-attack platform known to penetrate and monitor GSM networks in addition to other “standard” spying tasks.
One particular Regin module is capable of monitoring GSM base station controllers, collecting data about GSM cells and the network infrastructure.
The Regin platform uses an incredibly complex communication method between infected networks and command and control servers, allowing remote control and data transmission by stealth.
Specific Regin targets include individuals involved in advanced mathematical/cryptographical research

TARGETS
Telecoms
Government entities
Multi-national political bodies
Financial institutions
Academia/Research
Specific individuals

APT: NetTraveler

NetTraveler
STATUS:Active
TYPE:Cyberespionage toolkit
DISCOVERY:2013
TARGETED PLATFORMS:Windows
FIRST KNOWN SAMPLE:2004
NUMBER OF TARGETS:101-500

Top targeted countries:
Mongolia, India, Russia. In total, infections were identified in 40 countries.

Special Features:
The crew behind NetTraveler specifically targets Tibetan/Uyghur activists.
NetTraveler infects high-profile targets: space exploration, nanotechnology, energy production, nuclear power, lasers, medicine and communications.
More than 22 gigabytes of stolen data is stored on NetTraveler’s C&C servers.
Office and Java exploits were used.


Targets:
Activists
Energy, oil and gas companies
Academia/Research
Private companies
Government entities
Diplomatic organizations/embassies
Military

Wednesday, August 5, 2015

APT: Equation

Equation:
STATUS:Active
TYPE:Complex cyberattack platform
DISCOVERY:2014
TARGETED PLATFORMS:Windows
FIRST KNOWN SAMPLE:2002
NUMBER OF TARGETS:500-1,000

Top Targeted countries:
Iran, Russia, Pakistan, Afghanistan, India, China, Syria, Mali, Lebanon, Yemen

Special Features:
The ability to infect the hard drive firmware
The use of “interdiction” technique to infect victims
Mimicking to criminal malware.

Targets:
Nanotechnology
Financial institutions
Nuclear industry
Activists
Academia/Research
Government entities
Energy, oil and gas companies
Military
Telecoms
Diplomatic organizations/embassies
Trade and commerce
Aerospace
Mass media and TV
High technology companies
Education
Transportation

APT - Hellsing

Hellsing:
STATUS:Active
TYPE:Remote administration tool
DISCOVERY:Summer 2014
TARGETED PLATFORMS:Windows
FIRST KNOWN SAMPLE:2012
NUMBER OF TARGETS:11-100

Top Targeted countries:
Malaysia, Philippines, India, Indonesia, USA

Targets:
Government entities
Diplomatic organizations/embassies

Tuesday, August 4, 2015

APT: Carbanak

Carbanak:
STATUS:Active
TYPE:Backdoor
DISCOVERY:2014
TARGETED PLATFORMS:Windows
FIRST KNOWN SAMPLE:2013
NUMBER OF TARGETS:11-100


Special features:
First ever criminal APT.
Carbanak cybergang was able to steal $1bn from 100 financial institutions worldwide.
The plot marks the beginning of a new stage in the evolution of cybercriminal activity, where malicious users steal money directly from banks, and avoid targeting end users.
The largest sums were grabbed by hacking into banks and stealing up to ten million dollars in each raid.


Top 10 countries:
Russia, USA, Germany, China, Ukraine, Canada, Taiwan, Hong-Kong, United Kingdom, Spain, Norway, India, France, Poland, Pakistan, Nepal, Morocco, The Czech Republic, Switzerland, Bulgaria, Australia, Iceland, Brazil

Targets:
Financial institutions

Monday, August 3, 2015

APT: CosmicDuke

CosmicDuke:
STATUS:Active
TYPE:Backdoor
DISCOVERY:2013
TARGETED PLATFORMS:Windows
FIRST KNOWN SAMPLE:April 2012
NUMBER OF TARGETS:101-500

Special features:
The TinyBaron/CosmicDuke custom backdoor is compiled using a customizable framework called "BotGenStudio", which has sufficient flexibility to enable/disable components when the bot is constructed.
The attackers use strong self-protection to prevent antimalware solutions from analyzing the implant and detecting its malicious functionality via an emulator. It also complicates malware analysis.
CosmicDuke targets individuals involved in the traffic and selling of illegal and controlled substances. These victims have been observed only in Russia.

Top 10 countries affected:
 Georgia, Russia, USA, Great Britain, Kazakhstan, India, Belarus, Cyprus, Ukraine, Lithuania. Others include Azerbaijan, Greece and Ukraine.

Targets:
Diplomatic organizations/embassies
Energy, oil and gas companies
Telecoms
Military
Specific individuals

Monday, June 22, 2015

What is persistent in the context of malware or cyber security?

Persistent – Operators give priority to a specific task, rather than opportunistically seeking information for financial or other gain. This distinction implies that the attackers are guided by external entities. The targeting is conducted through continuous monitoring and interaction in order to achieve the defined objectives. It does not mean a barrage of constant attacks and malware updates. In fact, a "low-and-slow" approach is usually more successful. If the operator loses access to their target they usually will reattempt access, and most often, successfully. One of the operator's goals is to maintain long-term access to the target, in contrast to threats who only need access to execute a specific task.

Tuesday, May 12, 2015

Markandey Katju on Jayalalithaa!

The following comments are made by Mr. Markandey Katju. Please read it and register your views.


"Jayalalitha has been acquited by the Karnataka High Court. I would not like to comment on the verdict as I have not read the judgment. But I would like to say, as I have said earlier also, that she never interfered with my functioning when I was Chief Justice of Madras High Court ( 2004-2005 ) and she was the Chief Minister of Tamilnadu, and she always respected the independence of the judiciary. She never asked me to recommend anyone for Judgeship of the High Court, and she never sought to influence the judiciary in any way.Throughout my stay as Chief Justice of Madras High Court I met her only once, and that was at Raj Bhawan when she came to my oath taking ceremony. Thereafter I never met her while I was Chief Justice, as I had made it a strict rule that I will never go to the house or office of any politician as long as I was the Chief Justice. Ministers of both the D.M.K.( which was in power in the Central Govt. as an ally of the Congress ) and A.D.M.K.( which was in power in the state ) would come to meet me at my residence on 17, Greenways Road, to discuss various issues, but I never went to their houses or offices. I told all of them the same thing : that as Chief Justice I would be totally impartial, and so if the law was in their favour the judgment would go in their favour, but if the law was against them it would go against them. While Jayalalitha respected the independence of the judiciary, I regret to say the same cannot be said about the D.M.K. A Union Minister belonging to that party repeatedly met me with a list of names of lawyers whom he wanted recommended for High Court Judgeship. I enquired about these persons, and found that many of them were not even practising lawyers. No doubt they had been enrolled as lawyers many years ago, but they were never seen in law courts, and were probably full time politicians. Obviously if such persons were appointed as Judges they would not be impartial.When I told that Union Minister that I would not recommend the persons in the list he had given me ( and who were all undeserving persons ) he told me that he had given an assurance to these persons that they would become High Court Judges. I told him that he had no business to give such an assurance. He then said that by refusing to recommend his names I was jeopardising my chances of becoming a Supreme Court Judge. I said that indeed I aspired to be a Supreme Court Judge, but for becoming one I would not do wrong things, come what may. The maximum punishment which could be given me was not to allow me to become a Supreme Court Judge, but I was prepared for that punishment.I have always been of the view that a lawyer who is too close to any political party is not fit to be a Judge as he cannot be impartial. So in the list of 20 persons I recommended ( as there were over 25 vacancies in the High Court at that time ) there was no one close to D.M.K. or A.D.M.K.or any other political party. And I must say to the credit of Jayalalitha that she never objected to the names I recommended, although there was no lawyer belonging to, or close to, the ADMK in my list. She approved all the names I recommended.The DMK was very annoyed that I had not recommended anyone in the list their Minister had given me, and they stalled appointments of the persons I had recommended for over 6 months. They could do that as in the UPA Congress did not have a majority in Parliament, and was dependent on its allies, of which the DMK was a big one, for survival. Ultimately it was only when a PIL was filed and orders issued by the Supreme Court that the appointments could be made.As I said before, apart from our meeting at Raj Bhawan at my oath taking, I never met Jayalaitha during my term as Chief Justice of Madras High Court. It was much later when I came to Chennai for some function ( in 2012 or so, after I had retired from the Supreme Court ) ) that I sought an appointment with her, and met her at her office in the Secretariat. I had gone to meet her to request her to give an allowance to retired High Court Judges of Madras High Court for engaging a servant ( as I had got done for retired Judges of Allahabad High Court ).I arrived punctually on time, and was taken straight to her office. which was perhaps on the second floor. There was no politician apart from herself in the room, but there were about half a dozen senior officers, the Chief Secretary, Home Secretary, etc whom she introduced to me. She then requested me to sit down.I thanked her for giving me an appointment, and then submitted to her the memorandum I had prepared in which was mentioned the request for an allowance to retired High Court Judges. She read it, and said she will certainly consider it ( it was subsequently granted ).I then told her that I respected her because she never interfered with the functioning of the judiciary when I was Chief Justice of Madras High Court, and never asked me to recommend any name for Judgeship.I then told her that Tamilians should learn Hindi, as it was in their interest to do so as they faced great difficulty when they go out of Tamilnadu. She said that there was a reaction in Tamilnadu because some North Indian politicians tried to impose Hindi. I agreed with her that those North Indian politicians were wrong. This is the age of democracy, and nothing should be imposed. However all that is now in the past, and Tamilians should reconsider. I then said that I was told that she knew Hindi. At this she smiled, and started speaking in fluent Hindi, and we spoke in Hindi for the next 5 minutes. I was half inclined to tell her that she looked pretty, but decided that discretion is the better part of valour !"

Wikipedia

Search results

Google Ads

Google Plus:

Ads

Total Pageviews

Translate

Hard work never fails!

Hard work never fails!