TRENDING NOW

oculus-twitter-hacked
Twitter account of another high profile has been hacked!

This time, it is Facebook-owned virtual reality company Oculus CEO Brendan Iribe who had his Twitter account hacked Wednesday.

Iribe is the latest in the list of technology chief executives to have had their social media accounts hacked in recent weeks.

Recently, Google's CEO Sundar Pichai, Twitter's ex-CEO Dick Costolo, and Facebook's CEO Mark Zuckerberg, have all fallen victim to similar hacks.

The hacker, who has not been identified yet, changed Iribe's cover photo and replaced his bio to "im not testing ya security im just having a laugh."

The hack became apparent when a tweet from Iribe Twitter account was made saying: "We here @Oculus are very excited to announce our CEO. @Lid ! :)."

This tweet was followed by another saying:
"Imagine creating the coolest s*** to ever be introduced to gaming and technology but using the same pass for 4 years lol... silly mr CEO!"
All the tweets in question have since been removed from Iribe's Twitter feed, and the account has now been restored.

The hacker later told Tech Crunch that he was able to get the hold on Iribe's Twitter account by using his credentials exposed in recent MySpace data breach.

LinkedIn and MySpace Database Uploaded to Torrent for Download


Independent British researcher Thomas White has now made over 360 million passwords from 2013 MySpace data breach available on his website.

Not only this, but White is also offering download links for over 167 Million credentials from 2012 LinkedIn data breach.

Social network for professional LinkedIn was hacked in 2012, but a hacker named Peace made the dataset of over 167 Million emails and passwords, including 117 Million already cracked passwords, available for sale on the underground market.

Myspace, a once-popular social media website, was also hacked in 2013, but the same hacker made the database of more than 360 million users available for sale in an online hacker forum.

Until now, these hundreds of millions of hacked credentials were available only to limited audience, but with this release, anyone can download torrent links offered by White and misuse the credentials to hack more online accounts.

However, White provide this following explanation to justify his move:
"Of course, there is a risk," White told Jeremy Kirk. "People will as a result probably get a few accounts compromised. But once that happens, they will probably reset their passwords now and learn the lesson, rather than learn it in 12 months when they have five more accounts with the same password."

The takeaway:


It is high time you changed your passwords for all social media sites as well as other online sites if you are using the same password.
Today we are share with you Zbigz Premium Account without survey. many people told me that they not able to complete survey for Zbigz Premium Account. So we decide to post this premium account openly without survey. But don’t change the password, you use and help to use others. Now enjoy guys and download unlimited Torrent files with IDM.
)
Last Password Update On :- 2016-07-01

Features of Zbigz Premium Account:-

  1. Download torrent files with Full speed.
  2. Download files without any size limit.
  3. Get maximum speed which your ISP is providing you.
  4. No speed capping.
  5. High speed torrent caching.
  6. No waiting time.

How to use Zbigz Premium Account:-

  1. Open, Zbigz site – www.zbigz.com.
  2. Login, with given account details.
  3. Paste, the torrent link of which you want direct link.
  4. Wait, some minutes or seconds (Depends upon your file size).
  5. Download, file in IDM with full speed.
Note :- Open http://m.zbigz.com/login and save password for quick login.
**** Please Don’t Delete Other’s User Files ****
****** Please don’t try to change passwordYou Use and Help to Use Others *****
Download Zbigz Username and Password without Survey
Updated on 1st July, 2016
No need to complete any survey,
If decrypt key require for binbox, here is -> #BTTyPp9L
we put this premium account password in this small process, cause of less password change issue.  those who able to complete this easy hardly 1 minute process they are also able to use this $9.99 premium account free of cost.

Proof


Last year, Iran blocked Telegram and many other social networks after their founders refused to help Iranian authorities to spy on their citizens.

Now it looks like Iranian government wants tighter controls on all foreign messaging and social media apps operating in the country that will give the authorities a wider ability to monitor and censor its people.

All foreign messaging and social media apps operating in Iran have one year to move 'data and activity' associated with Iranian citizens onto servers in Iran, Reuters reported.

In order to comply with the new regulations, the companies would need to set up data centers in Iran within one year, but apps may lose a larger number of users by moving data onto Iranian servers.

However, transferring data to Iran servers might not be enough, as some of the most popular messaging services like WhatsApp, Apple iMessage, and Telegram are offering end-to-end encryptedcommunication i.e. nobody in between, not even WhatsApp can read the content of your messages.

Just two weeks back Iranian authorities arrested eight women with involvement in online “un-Islamic” modeling photographs without wearing the compulsory headscarf, and their Instagram page has been shut down, along with Facebook pages and business websites.

"Telegram's data centres are to be moved inside the country so they can delete what they want and arrest who they want," @Mehrdxd said in a tweet.




A 26-year-old hacker has been sentenced to 334 years in prison for identity theft as well as mass bank fraud in Turkey, or in simple words, he has been sentenced to life in prison.

Named Onur Kopçak, the hacker was arrested in 2013 for operating a phishing website that impersonated bank site, tricking victims into providing their bank details including credit card information.
Kopçak's website was part of a big credit card fraud scheme in which he and other 11 operators were making use of the illegally obtained bank account details to carry out fraudulent operations.


During his arrest in 2013, Turkish law authorities charged Kopçak with:
  • Identity fraud
  • Website forgery
  • Access device fraud
  • Wire fraud...
...and sentenced him to 199 years 7 months and 10 days in prison, following complaints from 43 bank customers.

However, during the investigation, 11 other bank customers also filed complaints about their payment card fraud, thus triggering a new trial.

Oh, 199 + 135 = 334 years in Prison


During the new trial, which was concluded yesterday (January 10), the Mersin Third Criminal Court of General Jurisdiction further added another 135 years to Kopçak's original sentence of 199 years 7 months and 10 days in prison, Daily Sabah reported.

With a total of 334 years in jail, Kopçak is by far the top in the list of hackers with the biggest prison sentence.

However, Kopçak and his lawyers demanded a 35-year sentence be upheld, pleading to the court for a lower sentencing saying "I am sure you’ll not even remember the color of my skin."

Cyber crime trend has changed in recent years. Last year, Ross Ulbricht – the alleged founder and mastermind of the infamous online black marketplace Silk Road – received life in the prison sentence when found guilty of narcotics conspiracy and money laundering, among other criminal charges.

That's a lot of Login credentials fetch by a single hacker.

The FBI believes a single hacker who goes by the moniker Mr.Grey has stolen login credentials for over 1.2 Billion online accounts – apparently the biggest heist of log-in credentials the FBI has investigated thus far.

Yeah, that's not Fifty, but 1.2 Billion Shades of Grey.

The information came from the court documents the federal agents submitted to support its search warrant request in 2014, Reuters reported.

The cyber security firm 'Hold Security' initially reported the theft of the credentials last year. It found out that Russian hacking group CyberVor has stolen 1.2 Billion login details and an additional 500 Million email accounts.

Botnet Breach


These data were said to have been harvested from over 420,000 websites via botnets looking for SQL injection flaws; the same technique recently used to hack TalkTalk.

Botnets are usually employed to attack an individual target, but in this case, they have been used as a huge scanner to scan websites on the Internet.
"To the best of our knowledge, [CyberVor] mostly focused on stealing credentials, eventually ending up with the largest cache of stolen personal [data], totalling over 1.2 Billion unique sets of emails and passwords," Hold Security said in August last year.

1.2 Billion Shades of Grey


The FBI is linking Mr.Grey to the largest heist after finding his Russian email address in spam-sending tools and posts on a Russian hacking forum offering to get user login credentials of Twitter, Facebook and Russian social network VK during its investigation.

Alex Holden, chief information security officer at Hold Security, believes those posts on online hacking forum prove that the hacker, "mr.grey" or "mistergrey", has access to a large database of stolen online credentials.

However, it's still unclear if Mr.Grey obtained all the login credentials by himself alone, or if Mr.Grey is just a single hacker or a group of hackers operating under one name.

Unfortunately, not much information is known about Mr.Grey's operations, but we will update soon if the FBI releases any new info.
whatsapp-telegram



It seems like Facebook-owned popular messaging service WhatsApp is blocking links to rival messaging applications – at least Telegram app for now.

Telegram users are noticing that WhatsApp is blocking any links to the privacy-oriented messaging service Telegram.me.

Although users are free to send or receive Telegram links on WhatsApp, the links appear as non-clickable that you cannot copy or forward.

This strange behavior was first noticed this morning by Telegram users over on Reddit.

The URLs – which are generally automatically made clickable – still appeared as plain text messages, but they didn't register as hyperlinks, blocking users from copying or forwarding them to other users or other apps.

In general, this odd behavior is done with malicious URLs such as malware or spam.

The Culprit


However, this strange behavior was not exhibited on every device. Only WhatsApp for Android is currently showing this behavior while Telegram URLs still work fine on the iOS version of WhatsApp.

This issue only began appearing in WhatsApp Version 2.12.327, a silent update pushed earlier this morning.

Telegram has confirmed the situation to The Verge that the Facebook, who owned WhatsApp, is indeed responsible for the issue, as the social network has used this link-blocking trick in the newsfeed and Messenger app before to prevent its users from visiting Torrent websites.
"Typically after a media backlash, FB steps back and blames their intelligent filtering for the problem," said a Telegram spokesperson. "We expect the same to happen this time as well."
However, Facebook and WhatsApp are yet to comment on the issue. The popular messaging app has not even acknowledged that a new update was pushed this morning.

vpn-hacking


A newly discovered flaw affecting all VPN protocols and operating systems has the capability to reveal the real IP-addresses of users' computers, including BitTorrent users, with relative ease.

The vulnerability, dubbed Port Fail by VPN provider Perfect Privacy (PP) who discovered the issue, is a simple port forwarding trick and affects those services that:
  • Allow port forwarding
  • Have no protection against this specific attack
Port Forwarding trick means if an attacker uses the same VPN (Virtual Private Network) as the victim, then the real IP-address of the victim can be exposed by forwarding Internet traffic to a specific port.
"The crucial issue here is that a VPN user connecting to his own VPN server will use his default route with his real IP address, as this is required for the VPN connection to work," Perfect Privacy wrote in a blog post on Thursday.

Port Fail affects all VPN protocols including…
  • OpenVPN
  • IPSec
…as well as applies to all operating systems, posing a huge privacy risk.

How Does 'Port Fail' Work?


A successful IP address leak attack requires an attacker to be on the same VPN network as the victim and to know the victim's VPN exit IP address, which could be discovered by tricking a victim into visiting a website control controlled by the attacker.

For example, an attacker with port forwarding enabled can see the request from the victim's actual IP addresses by tricking the victim into opening an image file.

The same attack is possible for BitTorrent users, but, in this case, there is no need for the attacker to redirect the victim to their page.

In this case, the attacker only with the activated port forwarding for the default BitTorrent port, can expose the real IP-address of a VPN user on the same network.

Also Read: Russian ATM HACKERS STEAL $4 MILLION IN CASH WITH 'REVERSE ATM HACK' TECHNIQUE

Affected VPN Providers


The flaw affected various large VPN providers. Perfect Privacy tested nine VPN providers out of which five were found to be vulnerable to this flaw and were alerted last week.

VPN providers including Private Internet Access (PIA), Ovpn.to and nVPN have fixed the issue before publication.

However, the company warned, "other VPN providers may be vulnerable to this attack as we could not possibly test all."

VPN aims to make you sure that your real identity remains anonymous on the Internet so that nobody could track the origin of your connection back to you, but this newly discovered flaw shows that it's quite easy to bypass this on some VPN providers