Wednesday, January 7, 2015

WHAT CAN HACK HACKERS

The list of things that can be cracked by hackers. Objects hacker attacks are not only computers and phones, but also the device that is connected directly to the Internet. In this area fall risk devices such as ... TV 


Amazing.  What can hack hackers (8 photos)


Most modern TVs are no longer a simple device that receives the video signal via cable or satellite. Modern TVs can be connected to the Internet, allowing them to gain access to a variety of applications and services. Research conducted by a number of computer security experts have shown that the "smart" TVs are just as vulnerable to hackers, as smart phones and computers. Malicious code can be inserted in them using Skype, as well as through social networking sites such as Twitter and Facebook. After that, a "smart" TV can be used as part of a botnet, or a hacker can use the built-in TV cameras to spy on people. Another company involved in computer security, gave details of how to use some TVs allows hackers to steal confidential user information stored in so-called cookies-files. To obtain this data, the hacker would just be within the radio device. A special exploit also allowed hackers to download the TV your personal files. Printers
Amazing.  What can hack hackers (8 photos)

Many researchers have found ways to hack printers. Using certain vulnerabilities, they were able to introduce malicious code into the printer's firmware, and thus take him under their control.Using exploits became possible because many modern printers today use technology Wi-Fi, so that people can print your documents wirelessly. Researchers believe that gaining control of printers, they are able to perform a variety of actions, until the destruction of the printer. Some printers are equipped with thermal chips, which turn off the printer when overheated. This helps improve the fire safety of these devices. An attacker can repeatedly cause the printer to overheat, as long as it does not burn completely. Other threats are related to the fact that hackers have the ability to steal information that is printed on the printer. Also do not forget that the malicious code in the firmware of the printer is very difficult to remove because the traditional anti-virus software, in this case does not work. Car keys to unlock doors or start the engine, many modern vehicles do not need a physical key. To do all this, the driver enough to have a key e. Car reads the signal from the electronic key, after which it will be possible to open the doors and start the engine. There are many ways in which hackers cheat cars, causing them to "think" that they have a genuine electronic key. One such method is a rough selection of the six-digit code by sorting machine, which is also known as «bruteforce». A more sophisticated approach involves the use of two antennas near a vehicle to enhance the key signal so that the machine has decided that it is the "home" key. Another method involves the use of "clean" key and inexpensive set of equipment to intercept signals from genuine key. The resulting interception data may be used by an attacker to manufacture a duplicate electronic key. ATMs A little known fact about ATMs: about 95% of them are running Windows XP. This alone makes them vulnerable to a wide range of hacker attacks, specifically designed for this operating system, which even today is one of the most popular in the world. But the more serious problem lies in the fact that Microsoft has discontinued support for the system at the beginning of this year. This means that the system will no longer receive security updates, which eliminated the discovered vulnerabilities. As a result, those who still uses this system will eventually become very vulnerable. Nevertheless, a lot of banks around the world continue to use ATMs Windows XP, because the transition to another system requires huge investments in new ATMs, and in the new system. As a result, many ATMs are a tasty morsel for hackers who can steal banking information, and may also engage in cloning credit cards. Refrigerators In 2013, the California-based security company Proofpoint has identified a vulnerability in the global household appliances. The strange thing is that this vulnerability had been exposed to the devices we use every day - refrigerators. At least, most new "smart" refrigerators, allowing their owners to remotely monitor the temperature, keep food in a certain order, and run a variety of useful applications. Smart refrigerators can be broken, because the vast majority of owners leave passwords on these devices as they were in default, or because the safety functions of the refrigerator is not configured properly. The thing is that people simply do not perceive refrigerators as devices that could have been hacked. Meanwhile, hackers have used a refrigerator in their botnets and use them to send spam, what the owners of these devices do not even know, because compromised refrigerators continue to work normally. Automotive brakesin the car for business-critical functions are increasingly used not mechanical and the electrical system. More and more car manufacturers use electric brakes, rather than the traditional.Researchers from the University of California and the University of Washington could use weaknesses in computer systems onboard vehicles to take control of the brakes of these machines. As a result, the researchers were able to use the brakes as they please, they can even selectively apply the brakes on different wheels, and in this way to control the car. The researchers also demonstrated how you can completely disable the brakes, leaving the driver no single way to stop the car. Traffic Experiments conducted by researchers showed that the lights can be hacked remotely. An attacker could change the sensor readings on the road, forcing them to pass on false information. When road sensors reported traffic lights, the road clogged, signal lights automatically adjust its mode so that pass through the intersection as much as possible machines. On road sensors not provided any data encryption, which makes it possible to change any information that comes from these centers for traffic management. Another hack uses a different function of modern traffic lights. This feature allows emergency vehicles and "soon" to pass through the intersection faster than others. Signals of such machines on the road lights to come from special sensors, and these signals are encrypted. However, hackers still can get access to some of the old system, and change the traffic lights as they please. Medical implantsMillions of people around the world depend on medical implants that support their health. With the development of high technology, these devices have become more innovative. For example, the pacemaker can now be controlled with the help of special panels, which make it possible to change the parameters of these devices without surgery. Alarmingly, these implants are very poorly protected. A number of researchers says that the implants have a number of security vulnerabilities because they use radio waves and other wireless signals for communication between remote control, computer and the implant, and hackers may well use this vulnerability to take complete control of an implant. Researchers are able to disable replication pacemakers by radio, and were able to change the regime, according to which the other implant filed insulin into the patient. Both of these cases can cause serious health problems, and even lead to death.Experts continue to insist that it is necessary to take urgent measures to ensure the safety of medical implants.



Amazing.  What can hack hackers (8 photos)





Amazing.  What can hack hackers (8 photos)





Amazing.  What can hack hackers (8 photos)





Amazing.  What can hack hackers (8 photos)





Amazing.  What can hack hackers (8 photos)





Amazing.  What can hack hackers (8 photos)

HOW CAN STEAL YOUR DATA FROM AN ATM

Do you often, going to the ATM, think about the fact that your card in a couple of seconds to be stolen, and after a few minutes it will be written off all the money? 
Few people think that these devices using high-tech components, also evolved over time. And because of particular interest is the recently published material, which clearly presents the stages of "modernization" skimmers, up to the latest developments of modern criminal craftsmen.
In essence, skimming is a method of stealing certain information necessary for the transaction from your bank account in order to steal money. To put it simply, an ATM to withdraw money from the account of your bank card fraudsters need to know your PIN-code and read data from the magnetic stripe. And for this purpose, a variety of device structures and operating principles - skimmers. Skimmers are manufactured so as to be as inconspicuous as possible for users of the machine. Often, they imitate the some interface element or appearance. It is very difficult not only detection of skimmers, but also capture the intruders themselves. And for the past 12 years has undergone serious skimmers metamorphosis. At least judging by the samples that were detected during this period. 2002-2007 In December 2002, CBS reported the discovery of previously unseen device that could "store names, account numbers and other identifying information to the magnetic stripe bank cards, with the possibility of downloading to the computer. "The personal computer! At that time, even the lawyers felt that the skimmers were fantastic. When the prosecutor Howard Weiss, specializing in fraud, he became the victim of skimming, he was shocked by the fact that technology has reached such a level. Of course, a complete disregard for the facts did not last long. In 2003, buyers who use ATMs in a New York deli, the day lost a total of about 200 000 $. Subsequently, the network began to walk a warning letter: 2008 This year, the police in Naples (Naples) received a call about a failed attempt to accommodate the skimmer: It's pretty primitive device consisted of a reader, which can be bought quite legally established kartopriёmnika over ATM. And under the plastic visor above the monitor was installed a small camera. 2009 The first generation of skimmers were quite primitive creations. Below is the one of the designs, including a battery, a USB flash drive port and miniUSB. This skimmer discovered one of the readers of the site Consumerist. Vigilant user became suspicious and pulled kartopriёmnik into his hands fell out it. Less than a month later found another skimmer, which did not allow the ATM correctly read cards and included a false mirror, which was built in camera. At that time, scammers key to successful skimming to find a way to get the stolen information from the skimmer: Early models of skimmers sometimes forced ATMs work properly. But soon the attackers have learned to successfully parasitize them. 2010Many years skimmers used cameras to steal PIN-codes. But they were not so easy to seamlessly place at the ATM. The result was a false keyboard, which recorded the sequence of keystrokes:With the development of technology, fraudsters, it becomes easier to create compact device.Developed and cheaper services outsourcing production. The Internet began selling whole sets for skimming, which could be painted on request in the desired color. Prices start at $ 1500. But this is just a set of initial level. Top devices Care $ 7000-8000: Not all sets were so expensive.Many are ready-to-use modules that are installed on ATMs fraudsters, and after a while they collected the data collected. The main drawback of these devices was the need to return them to pick up the information. Below is the skimmer with the wireless connection capable of transmitting information via cell module. Skimmer itself is very compact, transmits the collected data in encrypted form. Advanced skimmers like this did skimmers work less dangerous, reducing the likelihood of being caught red-handed. 2011 In the end, the producers of ATMs began to do something to counteract skimming. Firstly, began introducing elements of transparent plastic, in particular hemispherical kartopriёmniki. But hackers quickly adapted to this: As you can see, the bases can be noticed only by a small unobtrusive plastic lining. How many of you would have paid attention to it? Soon available 3D-press quality skimmers brought to a new level: Home model of 3D-printers were still little use for these purposes, and parts were ordered on the side of specialized companies. Above is given one of these orders, which the manufacturer refused to comply with caution. 2012 Discovery skimmers became more and more challenging. The following shows an almost perfect device. The only drawback is the small hole on the right, through which a small camera filming keyboard typing PIN-code. In the end skimmers have become so tiny that you can not see them, even if you really try. According to the European Group on ATM security (European ATM Security Team), in July 2012 were found skimmers thickness of a sheet of cardboard. They were placed kartopriёmnika inside and the outside can not see them. Now your cards can scan not only ATMs, but also in mobile terminals. The video shows the device, even printing a bad check: Now any employee can connect with him brought by the device, and at the end of the day to carry out its filled with data from a large number of bank cards. Functionality of these terminals allows even simulate a connection error when the data is read successfully.Complete with them comes and software to decrypt the information from the card, and all data can be downloaded via USB. 2013 Last year, the network of filling stations in Oklahoma Murphy was recorded several cases of skimming when the total was stolen $ 400,000. Fraudsters have used readers in combination with patch keyboards: Interesting in this story is that the skimmers were equipped with Bluetooth-module, and power is obtained directly from the ATMs themselves.In other words, their life was not particularly limited, and direct visit scams to collect data is not required. While one "evolutionary branch" skimmers came to miniaturization, the other followed the path of radical mimicry. The illustration below skimmer is a huge consignment panel display. In the "wild" this pattern was found in Brazil: The device was made ​​of parts to disassemble the laptop. 2014 But this can be attributed more to the curiosity or to the characteristics of the hot Brazilian character. Still compact skimmers are much more likely to go undetected. And just last week was found here is such a skimmer thickness of a credit card: The device requires very little time to setup and teardown in ATM: Fortunately, manufacturers are not sitting idly by, in particular, using the knowledge and experience caught hackers to fight scammers. But they adapt quickly, so that this situation is reminiscent of the struggle of the projectile and armor. And what do we, ordinary users? How to avoid becoming a victim of fraud and save their money?Always. always cover the keyboard while typing PIN-code: in most cases, fraudsters use miniature cameras. And if you use a system Chip-and-pin, the attacker is not so easy to read from her data. And most importantly, if you are anything alarming in the form of ATM, better use another. Try to use only ATMs in banks, it significantly reduces the risk. Oh, and try not to store a lot of money on the "card" account. Source






















































































































Tuesday, January 6, 2015

THE MOST DANGEROUS COMPUTER VIRUSES

In our time we have day-to-day living, fully connected to the Internet through our laptops and smartphones, because of what becomes an object to steal data from computer hackers and fraudsters.As more and more trade, business is carried out in the online world, we become more and more vulnerable to attack by malicious users who want to steal any valuable information.
The most dangerous computer viruses
The vast majority of us live in blissful ignorance, not knowing how the processors in our phones or embedded operating system, not to mention how to properly set up and defend themselves from attack those who really know how it all works.
99% of people do not understand how their web browsers, not to mention the complex malicious programs, called viruses. Strange emails with attached worm will always open ignorant users, and viruses will always find its way into the system.
Sometimes viruses simply slow down your computer or smartphone, while others may register your keystrokes and get access to all the passwords and everything you type and sometimes, they can be much, much more devastating.
These viruses fall into the second category: malicious software programmed to destroy themselves and reproduce quickly and efficiently over the internet, prompting owners spend millions, sometimes billions of dollars to restore and systems.
Today, we will lead a speech about the 10 most dangerous computer viruses in history:
10. Conficker
virus Conficker computer worm was, affected operating systems Microsoft. The virus appeared in 2008, and it is extremely difficult to detect. Conficker can spread by e-mail, external hard drives, or even a smartphone. Once infected, the worm connects the computer into a botnet - a network of "zombie" computers that can be controlled by the creator of the worm. This network botnet can be used for DoS-attacks, or to gather important financial information.
The most dangerous computer viruses
9. Storm Worm
Storm Worm was a virus, which functioned as Conficker. It infects computers and turns them into zombies to participate in the botnet. Began its spread in 2006 via e-mail. The virus quickly spread across the Internet, bringing the world it has infected about 10 million PCs.
The most dangerous computer viruses
8. CIH
Sometimes the creators of computer viruses pursue "good" Celi when creating viruses. And in the case of Chen Ing-Hau from Taiwan, who in 1998 created the virus CIH (also known as "Chernobyl"), to demonstrate how vulnerable computers Tatung University. However, the virus quickly spread rapidly beyond the university around the world. CIH was devastating virus that rewrote the BIOS, make them completely useless and computers were not even boot. The virus caused damage to users of around 250 million. Dollars.
The most dangerous computer viruses
Melissa 7.
In 1999, a virus called Melissa spread through e-mail in the same way as the CIH. The virus caused damage of $ 300 - 600 million. Dollars and forced the FBI to conduct the biggest at that time Internet search. In the end, the author Melissa was found, they turned out to be David L. Smith, who spent 20 months in federal prison and pay a fine of only $ 5,000.
The most dangerous computer viruses
6. SQL Slammer
SQL Slammer (also known as "Sapphire") was a worm that spread so quickly and efficiently that it is effectively slowed down the speed of the Internet around the world. 75,000 were infected hosts within 10 minutes after the start of the virus in January 2003, mainly in South Korea, but by the end of the day it was all over the world. The virus has caused delays in the work of ATMs and other necessary services. The tiny size of the program (376 bytes) allowed the virus to be sent in one package, which allowed him to quickly spread from one computer to another in a matter of milliseconds. The virus caused damage in the amount of 950 million. To 1.2 billion. Dollars.
The most dangerous computer viruses
5. Code Red
In 2001, there was a virus that was developed by unidentified Chinese sources. The worm spreads not by e-mail and through web browsers. Infected hosts transmit the virus through the sites, replacing the site in plain text, which simply flashed "hacked by Chinese!". Virus knocked 400,000 servers worldwide, including the web server of the White House, and brought damages amounting to $ 2.6 billion. Dollars.
The most dangerous computer viruses
4. Sobig F
Virus Sobig F was the sixth variation of the worm Sobig, which spreads via email in August 2003. Once the file is opened in an email, Sobig F sending copies of itself to all the contacts from the contact list of the computer. The virus has become the most rapidly spread the virus in history (at the time), within 24 hours of infecting one million PC and causing damage in the amount of 3 - 4 billion. Dollars.
The most dangerous computer viruses
3. ILOVEYOU
ILOVEYOU virus was distributed via e-mail, and comes with application specific theme «ILOVEYOU». The letter was attached file called "a love letter-to-You.TXT.vbs». Unfortunately this letter opened many, many people. At that time - in 2000, awareness of computer viruses were quite low, and many people wanted to know out of curiosity, who was secretly in love with them. Virus originated in the Philippines, and caused damage in the amount of 5.5 billion. Dollars.
The most dangerous computer viruses
2. Mydoom
Mydoom is the fastest computer worm to spread in history. To this day no one knows who created it.Text file in the source code, said: "Andy; I'm just doing my job, nothing personal, sorry. " In late January 2004, within 24 hours from the time of its launch, the virus has infected millions of computers around the world, distributed by e-mail. Mydoom created a massive botnet, then perform DDoS attacks on Internet giants such as Microsoft and Google, causing malfunction of the latter. Mydoom has caused an unprecedented amount of damage all over the world, and according to experts caused damage of around 38 billion. Dollars.
The most dangerous computer viruses
1. Stuxnet
Stuxnet is undoubtedly virus number 1 on this list, but in fact it is not even remotely resembles any other virus that was previously on the Internet. Stuxnet was not built to collect credit card information, account passwords. Stuxnet was a joint US-Israeli cyber-weapon, intended to harm Iran's nuclear power plant and the destruction or slowing any progress related to the development of Iranian nuclear weapons. Iranians discovered Stuxnet worm in their control system of nuclear plant in 2010. Stuxnet worked gradually and imperceptibly, increasing the speed of rotation of the nuclear centrifuges, which supported the plant, slowly destroying them. Virus has wiped out about 1/5 of centrifuges at the Natanz nuclear facility.
As infecting computers at Natanz, Stuxnet virus has spread all over the Internet and has built itself in computers around the world. Stuxnet source code can be downloaded and modified by its creators and can be used to attack almost any system that works using industrial programmable logic controllers - for example, reservoirs, power plants and other nuclear power plants. Stuxnet cyberattack opened a Pandora's box of basic utilities.
The most dangerous computer viruses