Tuesday 5 June 2012

NSA intercepting 1.7 billion American electronic communications daily



















































































Since 9/11, the Agency has been able to "spy" on electronic communications without the need for court-approved warrants. The group has a large complex in Utah that cost $2 billion and holds the data. In 2006 the New York Times revealed that the Bush administration was eavesdropping on the electronic communications of Americans without the warrants required by law.

The American Civil Liberties Union has created an infographic for mass distribution that shows some scary figures related to the U.S. National Security Agency.

Four years ago Congress authorized the electronic surveillance of suspected terrorists and foreign agents located outside the United States, with provisions that supporters said would adequately protect the privacy of Americans.

The only positive aspect of the FISA Amendments Act of 2008 was that the Congress imposed a four-year sunset provision on the powers it authorized. That sunset provision is set to expire and (surprise!) the Obama administration - just like it did for the Patriot Act - is demanding it be renewed as it is, without a single change or reform.

VISIT - www.meclosys.com to join ethical hacking and cyber forensic based international courses , cyber crime consultancy , VAPT , E-commerce security

ethical hacking in surat ,ethical hacking course in surat , ethical hacking gujarat, meclosys , certified ethical hacker,hacking institute in surat,hacking institute in gujarat,cyber forensic course gujarat , cyber forensic in surat,cyber law course

UGNazi hackers attack on CloudFlare via a flaw in Google

After the FBI arrested Cosmo, the alleged leader of the UGNazi hacking group, the hackers attacked CloudFlare via a flaw in Google's two-factor authentication system. The CloudFlare hack allowed UGNazi to change the DNS for 4chan, so visitors to the site were redirected to a UGNazis Twitter account.







Hackers were able to infiltrate the personal Gmail account of CloudFlare CEO Matthew Prince. "The attack was the result a compromise of Google's account security procedures that allowed the hacker to eventually access to my CloudFlare.com email addresses, which runs on Google Apps," CloudFare's CEO Matthew Prince shared.

According to the statement on Pastebin, the hackers are not sorry for attacking 4chan. 
4chan.org is the playground that allows pedophiles to share their "collections" and the disgusting bronies to hang out. The site is loosely monitored and child porn threads are allowed to "stay alive" for an exceedingly long amount of time.

Lastly, there was no political motive here, we will not tell lies and pretend that it was all to fight an injustice. This was for the lulz. This was for the fame. This was done because only we have the skill to do it. This was done, so that we can laugh at your butthurt. We did it because we can.

Prince said that no customer credit card details were exposed since those details never pass through its servers but go straight to a billing provider, and that it appears the attacker had not accessed its core database or seen additional client data.However, a claim was made on the Twitter account of UGNazi member Cosmo that UGNazi had "gained full access into Cloudflare's server and obtained the database", in a post flagging that 4Chan was redirected to the UGNazi Twitter account.

VISIT - www.meclosys.com to join ethical hacking and cyber forensic based international courses , cyber crime consultancy , VAPT , E-commerce security

ethical hacking in surat ,ethical hacking course in surat , ethical hacking gujarat, meclosys , certified ethical hacker,hacking institute in surat,hacking institute in gujarat,cyber forensic course gujarat , cyber forensic in surat,cyber law course



Researchers bypass Google Bouncer Android Security

 




Researchers bypass Google Bouncer Android Security Google's Android platform has become the most popular mobile operating system both among consumers and malware writers, and the company earlier this year introduced the Bouncer system to look for malicious apps in the Google Play market. Bouncer, which checks for malicious apps and known malware, is a good first step, but as new work from researchers Jon Oberheide and Charlie Miller shows, it can be bypassed quite easily and in ways that will...

VISIT - www.meclosys.com to join ethical hacking and cyber forensic based international courses , cyber crime consultancy , VAPT , E-commerce security

ethical hacking in surat ,ethical hacking course in surat , ethical hacking gujarat, meclosys , certified ethical hacker,hacking institute in surat,hacking institute in gujarat,cyber forensic course gujarat , cyber forensic in surat,cyber law course