Monday, April 29, 2013

Upcoming Games on The Pokemon Franchise; Guest Posted by Ray Sullivan

With the upcoming games in the Pokemon franchise, X and Y, there have been a lot of rumors about game play and new content and also, game freak gave us a couple of teasers and leaks of new Pokemon and even a new eeveelution. We will start of with the facts. Well as a lot of you may have already heard, there's a new eeveelution! its called, sylveon. A lot of people are excited and all but i just don't like it, you can hate me all you want for not liking this thing but i just don't know where they are going to go with this one. I mean they have already used all the main typing and there are thoughts of it being a new type (which we will get into later.) But i think that using a typing that is not going to work. With that in mind, here are some types people are saying it could be starting from most likely to least likely. Now here is that new type theory (details on the type's role will be talked about later in the article.) Fairy, flying, and normal. I know what your saying,"fairy!?" But yes a lot of people think that it will be a new type which they think could be fairy, keep in mind that it is just a rumor. Now onto flying. Another theory that i think is possible is flying. "Why?" Do you ask? Well here's why, those cute little ribbons flowing from her body are said to represent a pilot's scarf and in the release video they are flowing in the wind and to me, that bow on its head does resemble skyla, a gym leader in gen five's bow. And now for the last and least likely typing is normal. Now, to me, normal just does not make sense for this eeveelution, i mean, does any part of this thing look normal to you? And i know that it is pink along with a lot of other normal type Pokemon but it still does not make sense. If it were a normal type than it would probably look like a bigger, fuller version of eevee but hey who know it could be anything knowing game freak. And the second confirmed news is a new mew two looking Pokemon or maybe a new form of mew. A lot of people are calling it 'mewthree' or 'newmew'. But to me i looks like they but mew two's tail on its head and added a spoiler to it. 'Mewthree' definitely seems to be at the same move pool as mew two and a lot of 'mewthree' is still a mystery. Things like its name, weather its  new Pokemon or just a new form of mew but so far 'mewthree' looks promising. Now for the rumors. That new type that is said to be fairy could be true because the things people say are going to be done with this new form are huge. One thing they say is that a lot of normal type Pokemon like jiggly puff, clef fairy, and chansey are all said to be moved away from normal and into 'fairy'. I know this sounds kind of ridiculous but, it has a chance of being true. It would make sense for them to have those Pokemon moved into 'fairy' i mean, they are (like sylveon) anything but normal. That's all for now on the subject of X&Y but i will be updating you on all the news of this upcoming game and will have news on many other upcoming games so be sure to check in every week for new posts and game reviews.

Happy adventuring,
          Ray Sullivan

Author: Ray Sullivan
Editor: Bruce Miller

Monday, April 22, 2013

Twitter Malware Spotted!!

Twitter malware is stealing banking credentials. The Malware launches a Man-in the Browser (MitB) Attack through the browser of infected PCs, gaining access to the victim's Twitter account to malicious tweets & sends them through a compromised account of a trusted person or organization being followed.

At this time the attack is targeting the dutch market. The malware is spreading via the online social networking service, used as a financial malware to gain access to user credentials & target their financial transactions.

The attack is carried out by injecting Javascript code into the victim's Twitter account page. The malware collects the user's authentication token, which enables it to make authorized calls to Twitter's APIs, & then posts new, malicious tweets on behalf of the victim.

Free Iron Man 3 Movie Tickets!!

You can get free movie tickets from buying 4 specially marked packages of Red Baron, Tony's & Freschetta Pizza or Pagoda Express Egg-rolls. You can get a certificate for one (1) admission, up to $12.00 value. With the purchase of four (4) specially marked packages. Only unique codes entered online 3/25/13 through 8/31/13 will be eligible.
Enter codes online Here.
See list of participating theaters by entering promo code 39297
Limit two (2) movie certificates/tickets per household. Must be 18 years of age or older. Not Valid on 3-D Showings. Valid in 50 states, D.C. & Puerto Rico. For Iron Man 3 Movie Only!!



Cyber Security Bill Passed!

The U.S. House Of Representatives on Thursday voted to approve the highly controversial cyber security bill (CISPA), which stands for the Cyber Intelligence Sharing & Protection Act. The Bill was presented under the guise National Security, but in reality opens up a loop hole for companies that collect personal information about their users & in some cases want to trade of even sell these to other companies for money or other services.

This was the second time that US House of Representatives passed the CISPA. If we're "Hacked", CISPA allows the government to alert companies. Anonymous Hacking Group is calling upon websites owners to take down their normal pages & replace them with a page that explains the reasons for the change & protest. They're also asking that they help spread the word to their fellow site owners & encourage them to do the same.

Friday, April 19, 2013

Video Games Are The Blame For Gun Violence?!?!

The Congress rarely agree on anything, especially matters related to gun regulation. The heated rhetoric on both sides of the gun debate might give the impression that Democrats and Republicans cannot agree on any measures that would seek to curb gun violence.

 Strangely, however, we find ourselves in a political landscape. Video games. Some context might serve to illustrate how the gun debate has made for such odd bedfellows. The National Rifle Association drew the ire of gun control advocates for its response to the horrific shooting at Sandy Hook Elementary School in Newtown, Connecticut.

Congress Blame the shooting massacres on video games & other things like Violence in Media, Lack Security In Schools & Lack of a Mental illness people in National Database. Well, People with mental illness, they should not have access to "Gun Video Games or Guns".

 Gun violence in America is a sensitive, emotional issue, and it is understandable that Americans demand answers and solutions from their Congress. The NRA and gun control advocates share scarce common ground, and Congress did not pass any legislation that goes beyond expanding background checks because of lack of 60 votes.

The Senate has a serious attempt to ban assault weapons thus far, so legislators have turned their sights on video games.

Thursday, April 18, 2013

Official Outcome




You have to check out this band called "Official Outcome". They are mix Pop/Rock/Country. They sound like: Pink, Taylor Swift, Cold Play, & Ed Sheeran. They are not signed by a record label yet, but considering how good there music is they should on the Top Ten List of bands.

The band consist of Sarajane Sullivan, Julia De Tomaso, & Zac Sperry. Sarajane is the Vocals/Songwriter. Julia is the Vocals, Guitar, Percussion/Songwriter. Zac is the Vocals, Guitar, Percussion/Sound, & Songwriter. There Manager is Sheri Austin.

Official Outcome is a new dynamic musical act that was formed at the end of 2012. They began performing together at  Center Point Community Church in Naples, FL. They are so excited to bring the love of performing to the mainstream music industry.

 They are very Talented Musicians who writes & plays the instruments with vocals. Zac Sperry is the senior member of the band, at 19 years of age. Julia De Tomaso is the youngest member of the band at just 13 years old. Sarajane Sullivan, a seventeen year old high school senior.

Check Out Official Outcome at Reverbnation.
They have many songs, photos, & music videos available.
They also have upcoming shows in Naples, Bradenton, Ft. Myers Florida.





Wednesday, April 17, 2013

Pirate Bay Co-Founder Charged For Hacking & Stealing Money!!

  The Pirate Bay Co-Founder: Gottfrid Svartholm Warg charged with hacking the IBM Mainframe of Logica, a Swedish IT firm that provided tax services to the Swedish government& the IBM mainframe of the Swedish Nordea Bank.

Svartholm has been charged with several hacking related offenses including serious fraud, attempted aggravated fraud, & aiding attempted aggravated fraud. Three other defendants received similar charges.

He was arrested in Cambodia in September 2012 & deported to Sweden where he was arrested for his alleged involvement in the Logica Hack. Svartholm attempted to transfer a total of 5.7 Million Swedish Kronor ($896,976), but only one of the attempts to transfer money from eight Nordea Bank Accounts succeeded. In that case an amount of $4,300 United State Dollars was transferred from a Danish Nordea Bank Account.

A trial is currently scheduled to take place late May.

Chinese Hackers Attack Philippines News Agency Website

Chinese Hackers defaced the website of the government owned by Philippines News Agency (PNA).
Defaced the page of the website was with the Chinese flag & the text: "China Hacker EvilShadow Team, We are evil shadow. We are the team. We have our own dignity China Hacker Lxxker. The Site was back to normal after an hour.

Sound like Wannabe Anonymous hackers. Only hour of defacing! Some Anonymous Hackers can deface a website for hours & hours. China Hacker EvilShadow Team, are wannabe hackers. Maybe they are script kiddies, but nothing special... Hackers are hackers they are different in every way. At my level, I am a Social Engineer and a very good one. Happy Hacking.

Wednesday, April 10, 2013

17-Year Old Anonymous Hacker Charged For Unauthorised Access

A 17 year old alleged hacker accused of being associated with Anonymous hacker appeared in Parramatta Children's Court on Friday, over multiple unauthorised access crime on the behalf of hacktivist collective Anonymous.
The Australian Federal Police (AFP) issued a statement over the matter, saying that a search warrant was issued at the youth's home in Glenmore Park, New South Wales, in November last year. The youth has been charged with six counts of unauthorised modification of data to cause impairment, one count of unauthorised access with intent to commit a serious offence, one count of possession of data with intent to commit a computer offence, and 12 counts of unauthorised access to restricted data.
"Australian Federal Police investigates various types of cybercrime and will continue to take a strong stance against these perpetrators" Suspected hacker faces a maximum of 10 years jail time if convicted and will face court again on May 17.
The AFP says the accused was charged with the following:
  1. "Six counts of unauthorised modification of data to cause impairment, which carries a maximum penalty of 10 years imprisonment;
  2. One count of unauthorised access with intent to commit a serious offence, which carries a maximum penalty of 10 years imprisonment;
  3. One count of possession of data with intent to commit a computer offence, which carries a maximum penalty of 3 years imprisonment; and
  4. Twelve counts of unauthorised access to restricted data, which carries a maximum penalty of 2 years imprisonment."
Police said, "protesting through computer intrusions and website defacements is not an appropriate method to raise public awareness about any issue."

Anonymous Hackers Launch Massive Cyber Attack On Israel Cyber World #OpIsrael

A cyber attack campaign, dubbed #OpIsrael by hacking group Anonymous, targeting Israeli websites caused massive disruption to government, academic and private sites Sunday. Israeli media said small business had been targeted. Some homepage messages were replaced with anti-Israel slogans. Anonymous threatened to disrupt and erase Israel from cyberspace in protest over its mistreatment of Palestinians. In response to the eight day assault that killed 133 Palestinians, Anonymous defaced thousands of Israeli sites and provided information for Gazans facing Internet and communications blackouts.
 60 million hacking attempts were reportedly made. Most of the attacks have had little impact, and Israeli experts even say they welcome the attempts as ways of sharpening their defenses. Israel itself is accused of taking part in much more sophisticated cyber attacks against its enemies, particularly Iran.

 The hackers also released a list of email addresses and credit card numbers, reportedly lifted from the online catalog of Israel Military, a privately-owned business that sells military surplus. Some 700 Israeli website suffered repeated DDoS attack, which targeted high-profile government systems such as the Foreign Ministry, the Bank of Jerusalem, the Israeli Defence Ministry, the IDF blog, and the Israeli President's official website.

 Hackers have tried before to topple Israeli sites, with limited success. This is the second cyber attack on Israel allegedly launched by Anonymous.

Three LulzSec Hackers Pleads Guilty To Sony Attacks

Three members of the high profile internet hacktivist group LulzSec have admitted to their parts in a series of cyber attacks against the NHS, Sony and News International. Ryan Ackroyd, Jake Davis and Mustafa Al-Bassam, pleaded guilty to one charge of carrying out an unauthorized act to impair the operation of a computer, contrary to the Criminal Law Act 1977.

 In July 2011 the Sun's website was hacked and users were briefly re-directed to a spoof page that falsely claiming that Rupert Murdoch had died. Davis, from Shetland, and Bassam, a student from Peckham, south London, admitted conspiring to bring down the websites of law enforcement authorities in Britain and the US, including the CIA and the Serious Organized Crime Agency. The group, an offshoot of the Anonymous hacktivists, but Both LulzSec and Anonymous wreaked havoc throughout 2011 and 2012, knocking thousands of websites offline and pilfering data from well-known companies. (SOCA).

DDoS attacks on the institutions with other unidentified hackers belonging to online groups such as LulzSec, Anonymous and Internet Feds. American prosecutors are pursuing charges against a number of people allegedly connected to the hacking groups, including the Reuters journalist Matthew Keys.

Thursday, April 4, 2013

30 Twitter Tips & Tricks

1. Get Rid Of Useless Re-Tweets. I usually ignore these huge RTs. Sometimes people greet multiple friends at once – OK I understand this – but why do ten people have to re-tweet this?
2.  Don’t Be Pushy. Sometimes people try to promote their product, which is fine by me, but they take wrong approach. I have seen they send their tweets (with the link to their product) to many users at once, usually those who have many followers, with the tweet containing no real information what the link is about.
3.  Be Nice. I think this one is self explanatory. People enjoy pleasant conversations.
4.  Do Not Repeat Yourself. I know you want your blog or product be seen by everyone, but if you repeatedly tweet that link to your followers, they might just ignore or un-follow you.
5.  People have names. It feels good if people actually address you by your real name sometimes and gives you a feeling you interact with a human being.
6.  And They Have Short Memory. Since Twitter lacks threaded conversations, it is sometimes difficult to know what a certain tweet was a response to. Try to include some sort of indication what question you are referring to. I sometimes RT the message in my reply to make it obvious to what I was replying.
7.  Give Credit & Share. If you find something you like, share it and tell where it comes from. If someone tweets something interesting that you want to re-tweet, thank him and mention him in your re-tweet.
8. 20 Twitter Directories to Find More Friends and Followers – Join these and you are bound to get many followers.
9.  How to get the most out of Twitter search – Tips on using Twitter’s powerful search engine.
10.  The Top 7 Photo Sharing Tools for Twitter – Find out where to share photos on Twitter.
11.  How Optimize Your Twitter Bio to Get More Followers – Even the 160 characters short bio is important.
12.  General Twitter tips for starters – A must read for every beginner.
13.  TwitPic - Take advantage of TwitPic to post pictures on your tweets. If you want to post pictures while away from the computer.
14.  WeFollow - Great website that allows you to add yourself to a listing of Twitter users by tags you find interesting.
15.  Tweetbeat - An excellent site that takes the trending topics on Twitter and gives you a clearer explanation of present and past trending topics.
16.  Keep some space available in your tweet in case someone re-tweets your post.
17.  Try making your valuable tweets during the times people will most likely see them.
18.   Do not whine or complain. Everyone will un-follow anyone who constantly whines or complains.
19.  Add hashtags to your tweets. For example, if your tweet is about computers, consider adding #computer in the tweet.
20.  Tweet frequently. No one is going to follow someone they do not know who has not tweeted in months. Try at the very least to tweet a few times a week or daily if you can manage.
21.  Try making all your tweets informative, useful, or funny.
22.  Do not post mundane posts, e.g. eating a bowl of cereal.
23.  Following a few of the masters of Twitter and Social Networking will give you an understanding of how to tweet better, posts to RT, and inspiration for tweets of your own.
24.  Mention your Twitter page as many places as you can, e.g. your business card, e-mail signatures, web page, blog, Facebook, etc.
25.  Create a tweet button or at least your Twitter name on your pages.
26.  Change your profile picture. Use a picture of yourself to make it seem more personalized if this is your personal Twitter account.
27.  Utilize as much of the 160-character limit Twitter BIO space allows. Include keywords your followers or potential followers may be searching for.
28.  Create your own background image. However, do not make the image too much like an ad or sales pitch. The background image must be less than 800k and we recommend a size of 1600x1200 for a large image or smaller.
29. Share Great Content.
30. Have Good Manners.

Donald Trump Is Suing A Brooklyn Man For Cybersquatting!!!

J. Taikwok Yung is 33, lives with his mom in Brooklyn, and bought domain names that criticize billionaire Donald Trump and cybersquatting him. Cybersquatting is a legitimate crime that’s defined by the Anticybersquatting Consumer Protection Act.

 "Cybersquatting (also known as domain squatting), according to the United States federal law known as the Anticybersquatting Consumer Protection Act, is registering, trafficking in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. The cybersquatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price." from Wikipedia.

 Donald Trump is seeking $400,000 in damages from a Brooklyn man, who register four domains trumpindia.com, trumpbeijing.com, trumpmumbai.com and trumpabudhabi.com as domain names of well-known trademarks and then try to sell the names back to the trademark owners, Mr. Trump.

 Donald Trump sues Bill Maher over joke 2012: Should Macy's dump Trump? In 2011, Yung filed a complaint seeking to keep the domain names, citing fair use and First Amendment rights, after actions filed by the Trump Organization demanded he hand the websites over to Trump. He collected nearly 200 domain names, including ones related to Merrill Lynch and Bank of America. Yung maintained that he never contacted the Trump Organization about selling the domain names for profit, he wrote in the complaint.


Anonymous Hackers Breached North Korean Site: Uriminzokkiri !!

Anonymous Hackers Breached North Korean Site: Uriminzokkiri.  

"Enjoy these few records as a proof of our access to your systems (random innocent citizens, collateral damage, because they were stupid enough to choose idiot passwords), we got all over 15k membership records of www.uriminzokkiri.com and many more. First we gonna wipe your data, then we gonna wipe your badass dictatorship "government."


Of the six users, three have Korean names and the other three appear to be Chinese. North Korean government is increasingly becoming a threat to peace and freedom. We demand: - N.K. government to stop making nukes and nuke-threats, uncensored internet access for all the citizens and Kim Jong-un to resign. Four of the six users have Chinese email addresses, there’s a Hotmail address and one South Korean address that apparently belongs to KEPCO KDN, a smart-gird systems provider that’s part of the Korea Electric Power Co.
 
"Don't fear us, we are not terrorist, we are the good guys from the internet. AnonKorea and all the other Anons are here to set you free. We are Anonymous We are Legion We do not forgive We do not forget Expect us!"
Read The Message Below!!
 

Wednesday, April 3, 2013

35 Facebook Tips

1. Don't Post Constantly, Facebook isn't the same as Twitter, where the news feed moves with fast speed. On Facebook, things move slower.

2. Don't Type In ALL CAPS, This is yelling online.
3. Don't Post Food Photos, Don't post a picture of every of single meal you eat. This isn't Twitter.
3. Don't Link-Bait, Putting links to sites, These stuff annoys people.
4. Do Use Correct Spelling, Grammar & Punctuation.
5. Don't Tell Someone Else's Secrets.
6. Don't Use Your Maiden Name, Too many sites still use this as authentication.
7. Don't Talk Politics, It takes the fun away from the sites.
8. Don't Share Pillow Talk, Respect you romantic partner's wishes.
9. Do Ask Permission, Never tag someone without permission; you might get someone in trouble.
10. Don't Post Photos Of Your Credit or Debit Card.
11. Keep Your Phone Number Private.
12. Don't Post Your Kids' Whereabouts.
13. Don't Announce A Negative Job Status, do not announce to the world you just got fired.
14. Don't Post Controversial Content Or Pictures, Avoid showing too much skin (underwear or bikinis) or excessive alcohol or revealing you party habits. Avoid showing pictures of all the items listed above.

15. Don't Post Photos Of Your Home or Tell People On Facebook About Home Address.
16. Don't Tell The World You Won The Lottery Or Found a $20 Dollar Bill.
17. Don't Create Fake Facebook Accounts For Use of Stalking or Hacking.
18. Don't Ever Discuss Or Admit To Any Type Of illegal Activity.
19. Stay Positive, Not Negative.
20. Don't Talk About Sex.
21. Don't Spam Strangers, Don't send friend requests to people you don't know without an explanation of why you want to be friends.

22. Don't Broadcast Your Location.
23. Do Not Announce Family Tragedies Or Death.
24. Don't Post Too Many Baby Photos, No more than 10 a day.
25. Don't List Your Phone Number, Address Or Email, On your account or on your posts. Hackers or scammers can take the information!

26. Don't Use Hashtags, It looks like spam and it's annoying.
27. Don't Post Boredom Updates.
28. Don't Get Involved In Drama.
29. Think Of A Good Profile Photo.
30. Don't Incessantly Change Your Relationship Status.
31. Allow People To Post To Your Business Page.
32. Adjust Your Privacy Settings To Your Liking.
33. Don't Post Song Lyrics.
34. Practice Online Safety.
35. Let Friends and Family On Facebook Know About Your Major, Not Minor Events in Your Life.

Tuesday, April 2, 2013

Russian Underground Attack Targeting Payment World

A new botnet emerged from underground and is menacing payment world, the cyber threat dubbed vSkimmer come from Russia according revelation of McAfee security firm

The security expert Chintan Shah wrote on a blog post that during monitoring of Russian underground forum found a discussion about a Trojan for sale that can steal credit card information from Windows PC for financial transactions and credit card payments. vSkimmer Botnet agent is able to detect card readers on the victim’s machine and gather all the information from the Windows machines sending it to a remote control server encrypting it.
The malware collects the following information from the infected machine and sends it to the control server:
  • Machine GUID from the Registry
  • Locale info
  • Username
  • Hostname
  • OS version
 The vSkimmer Botnet Malware indicated as the successor of the popular Dexter, a financial malware that targeted Point-of-Sale systems to grab card data as it transmitted during sales flow. Dexter is responsible for the loss of nearly 80,000 credit card records and data breach of payment card data of Subway restaurants in 2012.  vSkimmer appears more sophisticated of Dexter despite it is easier to use, vSkimmer is an advanced tool to steal credit card data from Windows hosts.

 vSkimmer can also grab the Track 2 data stored on the magnetic strip of the credit cards. This track stores all the card information including the card number. To be precise on Track 2 was stored card number, three-digit CVV code, and expiration date are stored, all necessary to qualify card in payment processes.

The vSkimmer is completely undetectable on the compromised host. vSkimmer waits for a named USB device to be attached to the compromised machine and once detected it the malware dumps the collected data to the removable device.
  

Anonymous Hacker Barrett Brown's Mother Faces Prison!!

The mother of alleged Anonymous hacktivist Barrett Brown has pleaded guilty to helping her son hide two laptop computers from federal investigators. Brown's mother, Karen McCutchin, pleaded guilty last week to a charge of obstructing the execution of a search warrant. She faces a maximum sentence of 12 months in prison and a $100,000 fine. Sentencing has not yet been scheduled.

 On March 6, 2012, officers with the Federal Bureau of Investigation raided Brown’s Dallas, Texas apartment in an attempt to execute a search warrant for computers that could contain information involving hacktivist group Anonymous and LulzSec. The feds hadn't found all the computers they were looking for during a search of Brown's apartment that morning and Brown, located at his mother's house, refused to volunteer them. Check This Out: Look At Karen-McCutchin-Plea-Agreement!!

World's Biggest DDoS Attack That Almost Broke The Internet!!

The last week has seen probably the largest distributed denial-of-service (DDoS) attack ever. A massive 300Gbps was thrown against Internet blacklist maintainer Spamhaus' website but the anti-spam organisation , CloudFlare was able to recover from the attack and get its core services back up and running. Spamhaus, a group based in both London and Geneva, is a non-profit organisation that aims to help email providers filter out spam and other unwanted content. Spamhaus is pretty resilient, as its own network is distributed across many countries, but the attack was still enough to knock its site offline on March 18.

Five national cyber-police-forces are investigating the attacks. A group calling itself STOPhaus, an alliance of hactivists and cyber criminals is believed to responsible for bombarding Spamhaus with up to 300Gbps.  The attacks on Spamhaus illustrate a larger problem with the vulnerability of systems fundamental to the architecture of the Internet, the Domain Name Servers (DNS).

It now seems that the attack is being orchestrated by a Dutch hosting company called CyberBunker. As long as it's not child porn and anything related to terrorism, CyberBunker will host it, including sending spam.  Spamhaus blacklisted CyberBunker earlier in the month.

  The DDoS attacks have raised concerns that further escalations of the retaliatory attacks could affect banking and email systems. DDoS attacks are typically carried out to extort money from targeted organisations or as a weapon to disrupt organisations or companies in pursuit of ideological, political or personal interests.