Warning: trigger_error(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: Table './themoney_2011new/watchdog' is marked as crashed and last (automatic?) repair failed query: INSERT INTO watchdog (uid, type, message, variables, severity, link, location, referer, hostname, timestamp) VALUES (0, 'php', '%message in %file on line %line.', 'a:4:{s:6:\"%error\";s:14:\"strict warning\";s:8:\"%message\";s:62:\"Non-static method view::load() should not be called statically\";s:5:\"%file\";s:63:\"/home/themoney/public_html/sites/all/modules/views/views.module\";s:5:\"%line\";i:906;}', 3, '', 'http://themoneytimes.com/taxonomy/term/40772/all/feed', '', '50.17.114.227', 1454824130) in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: trigger_error(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: Table './themoney_2011new/watchdog' is marked as crashed and last (automatic?) repair failed query: INSERT INTO watchdog (uid, type, message, variables, severity, link, location, referer, hostname, timestamp) VALUES (0, 'php', '%message in %file on line %line.', 'a:4:{s:6:\"%error\";s:14:\"strict warning\";s:8:\"%message\";s:109:\"Declaration of views_handler_argument::init() should be compatible with views_handler::init(&$view, $options)\";s:5:\"%file\";s:86:\"/home/themoney/public_html/sites/all/modules/views/handlers/views_handler_argument.inc\";s:5:\"%line\";i:744;}', 3, '', 'http://themoneytimes.com/taxonomy/term/40772/all/feed', '', '50.17.114.227', 1454824130) in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: trigger_error(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: Table './themoney_2011new/watchdog' is marked as crashed and last (automatic?) repair failed query: INSERT INTO watchdog (uid, type, message, variables, severity, link, location, referer, hostname, timestamp) VALUES (0, 'php', '%message in %file on line %line.', 'a:4:{s:6:\"%error\";s:14:\"strict warning\";s:8:\"%message\";s:134:\"Declaration of views_handler_filter::options_validate() should be compatible with views_handler::options_validate($form, &$form_state)\";s:5:\"%file\";s:84:\"/home/themoney/public_html/sites/all/modules/views/handlers/views_handler_filter.inc\";s:5:\"%line\";i:607;}', 3, '', 'http://themoneytimes.com/taxonomy/term/40772/all/feed', '', '50.17.114.227', 1454824130) in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: trigger_error(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: Table './themoney_2011new/watchdog' is marked as crashed and last (automatic?) repair failed query: INSERT INTO watchdog (uid, type, message, variables, severity, link, location, referer, hostname, timestamp) VALUES (0, 'php', '%message in %file on line %line.', 'a:4:{s:6:\"%error\";s:14:\"strict warning\";s:8:\"%message\";s:130:\"Declaration of views_handler_filter::options_submit() should be compatible with views_handler::options_submit($form, &$form_state)\";s:5:\"%file\";s:84:\"/home/themoney/public_html/sites/all/modules/views/handlers/views_handler_filter.inc\";s:5:\"%line\";i:607;}', 3, '', 'http://themoneytimes.com/taxonomy/term/40772/all/feed', '', '50.17.114.227', 1454824130) in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: trigger_error(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: Table './themoney_2011new/watchdog' is marked as crashed and last (automatic?) repair failed query: INSERT INTO watchdog (uid, type, message, variables, severity, link, location, referer, hostname, timestamp) VALUES (0, 'php', '%message in %file on line %line.', 'a:4:{s:6:\"%error\";s:14:\"strict warning\";s:8:\"%message\";s:148:\"Declaration of views_handler_filter_node_status::operator_form() should be compatible with views_handler_filter::operator_form(&$form, &$form_state)\";s:5:\"%file\";s:100:\"/home/themoney/public_html/sites/all/modules/views/modules/node/views_handler_filter_node_status.inc\";s:5:\"%line\";i:13;}', 3, '', 'http://themoneytimes.com/taxonomy/term/40772/all/feed', '', '50.17.114.227', 1454824130) in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: trigger_error(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: Table './themoney_2011new/watchdog' is marked as crashed and last (automatic?) repair failed query: INSERT INTO watchdog (uid, type, message, variables, severity, link, location, referer, hostname, timestamp) VALUES (0, 'php', '%message in %file on line %line.', 'a:4:{s:6:\"%error\";s:14:\"strict warning\";s:8:\"%message\";s:62:\"Non-static method view::load() should not be called statically\";s:5:\"%file\";s:63:\"/home/themoney/public_html/sites/all/modules/views/views.module\";s:5:\"%line\";i:906;}', 3, '', 'http://themoneytimes.com/taxonomy/term/40772/all/feed', '', '50.17.114.227', 1454824130) in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: trigger_error(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: Table './themoney_2011new/watchdog' is marked as crashed and last (automatic?) repair failed query: INSERT INTO watchdog (uid, type, message, variables, severity, link, location, referer, hostname, timestamp) VALUES (0, 'php', '%message in %file on line %line.', 'a:4:{s:6:\"%error\";s:14:\"strict warning\";s:8:\"%message\";s:130:\"Declaration of views_plugin_row::options_validate() should be compatible with views_plugin::options_validate(&$form, &$form_state)\";s:5:\"%file\";s:79:\"/home/themoney/public_html/sites/all/modules/views/plugins/views_plugin_row.inc\";s:5:\"%line\";i:134;}', 3, '', 'http://themoneytimes.com/taxonomy/term/40772/all/feed', '', '50.17.114.227', 1454824130) in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: trigger_error(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: Table './themoney_2011new/watchdog' is marked as crashed and last (automatic?) repair failed query: INSERT INTO watchdog (uid, type, message, variables, severity, link, location, referer, hostname, timestamp) VALUES (0, 'php', '%message in %file on line %line.', 'a:4:{s:6:\"%error\";s:14:\"strict warning\";s:8:\"%message\";s:126:\"Declaration of views_plugin_row::options_submit() should be compatible with views_plugin::options_submit(&$form, &$form_state)\";s:5:\"%file\";s:79:\"/home/themoney/public_html/sites/all/modules/views/plugins/views_plugin_row.inc\";s:5:\"%line\";i:134;}', 3, '', 'http://themoneytimes.com/taxonomy/term/40772/all/feed', '', '50.17.114.227', 1454824130) in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: trigger_error(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: Table './themoney_2011new/watchdog' is marked as crashed and last (automatic?) repair failed query: INSERT INTO watchdog (uid, type, message, variables, severity, link, location, referer, hostname, timestamp) VALUES (0, 'php', '%message in %file on line %line.', 'a:4:{s:6:\"%error\";s:7:\"warning\";s:8:\"%message\";s:137:\"Cannot modify header information - headers already sent by (output started at /home/themoney/public_html/includes/database.mysql.inc:135)\";s:5:\"%file\";s:46:\"/home/themoney/public_html/includes/common.inc\";s:5:\"%line\";i:153;}', 3, '', 'http://themoneytimes.com/taxonomy/term/40772/all/feed', '', '50.17.114.227', 1454824131) in /home/themoney/public_html/includes/database.mysql.inc on line 135
hacking http://themoneytimes.com/taxonomy/term/40772/all/feed en No award for Facebook software bug? Hacker gets lucky elsewhere http://themoneytimes.com/featured/20130821/no-award-facebook-software-bug-hacker-gets-lucky-elsewhere-id-1701713503.html <div class="field field-type-text field-field-teaser"> <div class="field-items"> <div class="field-item odd"> <p>This is actually unfair, right folks? The hacker who hacked right into Zuckerberg’s profile page on Facebook was disappointed by Facebook recently! The company refused to reward him for reporting the software bug and he got lucky elsewhere.</p> </div> </div> </div> <div class="field field-type-filefield field-field-image"> <div class="field-items"> <div class="field-item odd"> <img src="http://themoneytimes.com/files/imagecache/picturethumb/facebook%20security.jpg" alt="" title="" class="imagecache imagecache-picturethumb imagecache-default imagecache-picturethumb_default" width="180" height="130" /> </div> </div> </div> <p><a href="http://www.themoneytimes.com/featured/20130820/mark-zuckerbergs-facebook-page-hacked-expose-bug-id-1701713502.html"><strong>Facebook’s software Bug</strong></a></p> <p>It’s a shock to know that the Facebook chief is also not safe from the peeing eyes of the hackers! His profile page was hacked and Khalil Shreateh, the Palestinian researcher, showed Mark Zuckerberg's profile page on his laptop in Yatta , at his home on the August 20, 2013. Blasphemy, a software bug pulls Zuckerbrg right into the West Bank city of Hebron? Wake up Facebook!!</p> <p> We have another shocker- Khalil Shreateh is getting donations and offers from famous hackers worldwide after Facebook neglected to reward his “flaw reporting”. After stumbling upon the flaw, Khalil approached Facebook and was turned away by the security team at Facebook. Not the one to give up and to make sure Facebook got to know about the software bug, Khalil posted a message right on to the Chief’s wall.</p> <p>Well, even if Facebook brushed him off and refused to compensate, the guy hasn’t got much to lose, he was noticed by “Beyond Trust” a cyber security firm. The chief technology officer at Beyond Trust, Marc Maiffret, is pleading his fellow hackers to collect a reward of $10,000 reward for Shreateh. So what about Facebook’s much professed “Bug Bounty” program?</p> <p><strong>Beyond Trust gears up</strong></p> <p>Maiffret, has his own history to share as he is a self taught hacker who was a high school dropout. His efforts have paid off and he has managed to raise $ 9000 out of which $ 2000 is from his own pocket. Why did Facebook deny Shreateh, a Palestinian, compensation as a reward , that was expected according to its "Bug Bounty" program? Generally Facebook gets generous by $ 500 at least for people who expose software bugs in its system.</p> <p>It doles out at least $500 to individuals who bring software bugs to the company's attention. Maiffret sympathizes with the efforts of the Palestinian and says "He is sitting there in Palestine doing this research on a five-year-old laptop that looks like it is half broken; it’s something that might help him out in a big way." </p> <p><strong>Zuckerberg's privacy broken</strong></p> <p> The software Shreateh had stumbled across this software flaw on the website of the social networking giant where he highlighted that members could post messages on anyone else’s wall! After his efforts of bringing the bug to the security team for review, and losing the battle, he finally posted on Zuckerberg’s wall "Sorry for breaking your privacy.”</p> <p>A ruffled Facebook rectified the bug, apologized for being "too hasty and dismissive", but it still has to shell out the much desired “Bounty” for the Palestinian. </p> <p>Chief Security Officer Joe Sullivan though was heard commenting "We will not change our practice of refusing to pay rewards to researchers who have tested vulnerabilities against real users," He admitted that the social network has already given out about $1 million under the Bug Bounty program to researchers adhering to the rules. </p> Bug Bounty chief technology officer at Beyond Trust Cyber hackers hacking Internet Khalil Shreateh Laptop Marc Maiffret security team at Facebook software bug Technology the Palestinian researcher Top Story United States Zuckerberg’s profile page on Facebook Wed, 21 Aug 2013 06:41:39 +0000 Minnie Mahendru 1701713503 at http://themoneytimes.com Security demands Windows XP up gradation right away http://themoneytimes.com/featured/20130717/security-demands-windows-xp-gradation-right-away-id-1701713348.html <div class="field field-type-text field-field-teaser"> <div class="field-items"> <div class="field-item odd"> <p>Be careful!! The most popular “Windows XP” lands up under the cyber security scanner! a warning has been issued by the sleuths at the Indian cyber security cell for all those people who use the “Windows XP”. Get it upgraded now, they say!!</p> </div> </div> </div> <div class="field field-type-filefield field-field-image"> <div class="field-items"> <div class="field-item odd"> <img src="http://themoneytimes.com/files/imagecache/picturethumb/windows-xp-support2.jpg" alt="" title="" class="imagecache imagecache-picturethumb imagecache-default imagecache-picturethumb_default" width="180" height="135" /> </div> </div> </div> <p><strong>Alert issued by the Indian cyber security cell</strong></p> <p>An alert has been issued by the Indian cyber-security sleuths for all those who are making use of the popular 'Window XP' operating system for their laptops or computers. To prevent hacking attempts, the sleuths advice immediate up gradation of the software. </p> <p>The decision of the Software giant Microsoft to halt its support services offered to 'Windows XP' OS from April 8th 2014, maybe responsible for this alert. This decision taken by the company will surely affect the users working on the Windows XP operating system say the cyber-space authorities who monitor the Indian internet systems. </p> <p><strong>Advisory note by The Computer Emergency Response Team</strong></p> <p> The Computer Emergency Response Team-India (CeRT-IN) has written in its advisory note that "The end of support of Windows XP Operating System means that Microsoft will not provide security updates, non-security hot fixes, free or paid assisted support and any online technical support for the Windows XP.</p> <p> In the absence of patches and security updates for the Windows XP OS, the computer systems would be at greater risks and could be easily compromised by the hackers.</p> <p>The authorities further claimed "There would also be compliance issues due to un- supported and un-patched components in the IT infrastructure which may result in non-compliance and suspension of certifications by the certifying and auditing organizations. The software vendors and hardware manufacturers will also stop support for Windows XP on their new versions and models.”</p> <p>They recommended that up gradation of the Window XP OS used on their systems is a must before April 2014. So people it’s time to search and pick up a safe and secure OS system for your favorite laptops, after all you have to go “anti-hacking”, right?</p> <p>Way back in August 2001, Microsoft had released Windows XP OS .The present version much in use the Windows XP Service Pack 3.The latest OS by Microsoft is the Windows 8.</p> <p>Since then, three successor versions of client based OS namely Windows Vista in November 2006, Windows 7 in July 2009 and Windows 8 in August 2012 were released by Microsoft.</p> Advisory note cyber security Gadgets hacking India Indian cyber security cell IT infrastructure non-security hot fixes The Computer Emergency Response Team Top Story “Windows XP Wed, 17 Jul 2013 08:58:33 +0000 Minnie Mahendru 1701713348 at http://themoneytimes.com Malicious Pakistani Hacker defaces websites of Goa Government http://themoneytimes.com/featured/20130709/malicious-pakistani-hacker-defaces-websites-goa-government-id-1701713316.html <div class="field field-type-text field-field-teaser"> <div class="field-items"> <div class="field-item odd"> <p>Once again we tell you, the internet is not safe from the malicious hackers!! This time it’s a Pakistan based cyber group that has been messy! A hacker from this group has meddled into about 13 Goa Government web sites in the last few days, claims a government official.</p> </div> </div> </div> <div class="field field-type-filefield field-field-image"> <div class="field-items"> <div class="field-item odd"> <img src="http://themoneytimes.com/files/imagecache/picturethumb/hacking_3.jpg" alt="" title="" class="imagecache imagecache-picturethumb imagecache-default imagecache-picturethumb_default" width="180" height="135" /> </div> </div> </div> <p><strong>The Pakistan hacking episode</strong></p> <p>The government spokesman said that several of the Goa Government websites have been defaced by a malicious member belonging to a cyber group based in Pakistan.</p> <p>The official admitted that an id H4x0r HuSsy was used to access the Government website. This has been the second time that the state government websites have been targeted in a span of a few years.</p> <p>The Government spokesperson said "Websites belonging to 13 government departments are down. They had been hacked into and defaced, but we have pulled them completely down now.” </p> <p>Very soon an action will be taken and a complaint will be lodges at the cyber cell of the Goan Police. The main sites that have been targeted are Goa Tourism, Captain of Ports, Fire Services, and NRI Commission of Goa. </p> <p>A little while back in the month of May , the hackers based in Pakistan had hacked defaced Rajasthan Public Service Commission site. The hackers had gone to the news section and it was found out that 2 links of “Pakistan Zindabad” has been posted online. The cyber experts had been summoned and the site had been restored for accessing. These are the same hackers who had fiddled into the State Information and Publicity Department website and splashed the slogans denouncing India and praising Pakistan on India’s homepage.</p> <p><strong> National Cyber Security Policy 2013</strong></p> <p>Surprisingly the Government is readying itself for unveiling the National Cyber Security Policy 2013. This policy reassures Indian users from the Government and business genre, that they can explore a robust and safe cyberspace. </p> <p>Kapil Sibal Minister of Communications and IT had stated his viewpoint about this “...policy is a framework document and it gives you a broad outline of what our vision is...the real task or the challenge is the operationalisation of this policy.” </p> <p>He further stated "...air defence system, power infrastructure, nuclear plants, telecommunications system will all have to be protected to ensure there is no disruption of the kind that will destabilise the economy...instability in cyber space means economic instability no nation can afford economic instability, therefore it is essential not just to have a policy but to operationalise it."</p> <p>The present hacking episode was an irony as the Pakistani hacker managed to deface several Goa Government websites. The CERT-in reports, that till October 2012, more than 14,000 websites have been hacked. </p> Captain of Ports complaint cyber cell Fire Services Goa Government web sites Goa Tourism Goan Police hacking id H4x0r HuSsy India Internet National Cyber Security Policy 2013 NRI Commission of Goa Pakistan based cyber group Rajasthan Public Service Commission site State Information and Publicity Department website Top Story Tue, 09 Jul 2013 08:37:15 +0000 Minnie Mahendru 1701713316 at http://themoneytimes.com Attack sites safer!! Google ropes in legit sites for phishing attacks http://themoneytimes.com/featured/20130626/attack-sites-safer-google-ropes-legit-sites-phishing-attacks-id-1701713263.html <div class="field field-type-text field-field-teaser"> <div class="field-items"> <div class="field-item odd"> <p>Surprise! Surprise! It’s the compromised legit sites that are a greater threat than the sites that are actually dangerous states a Google Transparency report. And we always thought differently!</p> </div> </div> </div> <div class="field field-type-filefield field-field-image"> <div class="field-items"> <div class="field-item odd"> <img src="http://themoneytimes.com/files/imagecache/picturethumb/hacking_2.jpg" alt="" title="" class="imagecache imagecache-picturethumb imagecache-default imagecache-picturethumb_default" width="180" height="135" /> </div> </div> </div> <p><strong>Google transparency report</strong></p> <p>The Google transparency report with the new Safe Browsing section confirms that hacked sites are more dangerous than the attack sites. The map put forth by the Transparency report by Google regarding Safe browsing states that nearly about 2% of the websites hosted by the U.S have malware.</p> <p>Gone is the presumption that the safe websites are safe, they may be distributing malware far more than the sites that are actually treacherous and unsafe. They have been compromised with the malware already unknown to the user says the new Transparency Report from Google .</p> <p><strong>Safe browsing program</strong></p> <p>The Safe Browsing program flags almost 10,000 websites daily, and evaluating this, Google once again repeats itself that the previously hacked sites do pose a threat to others. It has reported that about 40 percent of websites taken as safe are being utilized for phishing attacks and about 60% are already hosting malware unknown to others.</p> <p>In 2009, there were certain attack sites that had been recognized and numbered and the amount of these websites was just counted in hundreds but then they started to grow in number. In 2012 the number was calculated to be about 6000 sites but the June 2013 statistics show that the number has fallen up to 3,891. </p> <p>The Google report recognizes certain sites as compromised sites. These web sites pose more threat as they have been hacked in the past in order to spread malicious content and infect visitors. They are generally accepted as safe and have been declared legitimately secure but that is not so. </p> <p>Google has managed to track down at least 39,247 web sites that have been hacked. Last July showed the website number as almost 60,000 and in June 2009 the number touched almost 76,000. This was recorded during the June 9th week this year.</p> <p>Google promises to publish the internet security data regarding phishing scams and malware on a regular basis. Maybe now the users can breathe a sigh of relief from the fear of theft of consumer information!! This will help keep an eye open for the viruses that creep into the computers due to internet usage.</p> <p> The malicious software or malware can rob the users of private and sensitive information. Google will keep a track on the search engine crawlers that browse through the phishing sites as they get busy searching the internet.</p> <p>Its no surprise that Google digs out at least 10,000 such web sites daily and plans to display them on a map according to the traced viruses. Niels Provos, an engineer at Google vehemently states "This is about making the internet a safer environment.” </p> Google transparency report hacking internet malicious content malware New safe browsing section phishing attacks safe websites software Wed, 26 Jun 2013 08:28:20 +0000 Minnie Mahendru 1701713263 at http://themoneytimes.com US Government and China back at “hacking” loggerheads http://themoneytimes.com/featured/20130521/us-government-and-china-back-%E2%80%9Chacking%E2%80%9D-loggerheads-id-1701713193.html <div class="field field-type-text field-field-teaser"> <div class="field-items"> <div class="field-item odd"> <p>They took it easy just for three months! They gave the US government sites a three month space and now the Chinese hackers have stepped back with a vengeance!</p> </div> </div> </div> <div class="field field-type-filefield field-field-image"> <div class="field-items"> <div class="field-item odd"> <img src="http://themoneytimes.com/files/imagecache/picturethumb/hacking_1.jpg" alt="" title="" class="imagecache imagecache-picturethumb imagecache-default imagecache-picturethumb_default" width="180" height="101" /> </div> </div> </div> <p><strong>Chinese hackers are back</strong><br /> The Chinese hackers have come equipped with more and are targeting the sites of the US Government, confirm the security firm that has revealed the attacks, and the Government officials. </p> <p>As Kevin Mandia, the chief executive of Mandiant, states "They dialed it back for a little while, though other groups that also wear uniforms didn't even bother to do that. I think you have to view this as the new normal."</p> <p>The attacks were identified from Unit 61398 or the 2nd Bureau of the People's Liberation Army's General Staff Department's 3rd Department. The attack team has tweaked the code and set up new control servers and new commands.</p> <p>Remember, the infiltration of the RSA’s secure Id system at Lockheed Martin’s services and the NYT “hack attacks”? Well the onus goes to the Unit 61398 for this. The Chinese had disappeared from the scene, and cut a “hurt figure”, when the fingers pointed towards them. With the patience running out, a recommendation action against the Chinese hackers is upfront.</p> <p><strong>The US plans action</strong><br /> President Obama's former director of national intelligence, Dennis Blair, has stated affirmatively, "Jawboning alone won't work,Something has to change China's calculus." </p> <p>It is still unclear as to what kind of an action will be taken as the Pentagon feels that a physical response is essential. This is but a far-fetched thought against the Nations encouraging hacking. </p> <p>According to Torsten George, VP at security risk management vendor Agiliance, "It is becoming ever clearer that nation-states are institutionalizing cyber espionage and cyberwarfare."</p> <p>He added, "Government secrets, high-value infrastructure assets, corporate data, IP, customer data are all continually at risk. Incoming threats are not volleys, they are akin to silent AK-47 automatic rifle fire, continuous and destructive."</p> <p>But wasn’t the US going in the same direction, with the Stuxnet attacks? Maybe, but remember economic advantage wasn’t in the mind of US when these acts were committed, its China that faces the brunt of the angry US this time.</p> <p>An official from the US Government fears that, "This is something we are going to have to come back at time and again with the Chinese leadership," Well, China will surely "have to be convinced there is a real cost to this kind of activity." </p> 2nd Bureau of the People's Liberation Army's General Staff Department's 3rd Department China Chinese hackers hacking Mandiant Technology Top Story uniforms Unit 61398 US government Tue, 21 May 2013 09:38:04 +0000 Minnie Mahendru 1701713193 at http://themoneytimes.com Is the “indispensable news source” Twitter destabilizing for users? http://themoneytimes.com/featured/20130429/%E2%80%9Cindispensable-news-source%E2%80%9D-twitter-destabilizing-users-id-1701713155.html <div class="field field-type-filefield field-field-image"> <div class="field-items"> <div class="field-item odd"> <img src="http://themoneytimes.com/files/imagecache/picturethumb/twitt.jpg" alt="" title="" class="imagecache imagecache-picturethumb imagecache-default imagecache-picturethumb_default" width="180" height="180" /> </div> </div> </div> Associated Press account attacks Boston Marathon Bombings CBS 60 minutes cyber attacks cyber crime Google hacking Microsoft National Public Radio Technology Top Story Twitter United States Mon, 29 Apr 2013 08:32:01 +0000 Minnie Mahendru 1701713155 at http://themoneytimes.com Financial bungling biggest motivator for Cybercrime in 2012! http://themoneytimes.com/featured/20130423/financial-bungling-biggest-motivator-cybercrime-2012-id-1701713139.html <div class="field field-type-text field-field-teaser"> <div class="field-items"> <div class="field-item odd"> <p>They just keep coming - no matter how secure you make your website or online store, hackers find a way out to intrude your system and do away with critical information, often leading to huge monetary loss. It has been found that more financial crimes were reported in 2012 than state sponsored hacking incidents.</p> </div> </div> </div> <div class="field field-type-filefield field-field-image"> <div class="field-items"> <div class="field-item odd"> <img src="http://themoneytimes.com/files/imagecache/picturethumb/Hacking%20trends%202012.jpg" alt="Hacking trends 2012" title="Hacking trends 2012" class="imagecache imagecache-picturethumb imagecache-default imagecache-picturethumb_default" width="180" height="180" /> </div> </div> </div> <p>Cyberwar ruled the headlines in the bygone year. National governments engaged in covert cyber wars, while hactivist groups like Anonymous fought it out in open with governments as well as organizations they despised. Even then, financial bungling tipped state funded hacking as the biggest motivator for hacking.</p> <p>This has been found by telecom titan Verizon that conducted this intriguing study. The company is set to release its ninth annual survey of investigations dealing with data breach across the globe. As many as 75 percent of total computer security related incidents were aimed at making stealing others’ money.</p> <p><strong>Major Targets - Online stores and Big Organizations</strong></p> <p>E-Commerce sites and organizations with fat pockets were the most preferred targets of hackers. A number of such attacks originated from Eastern Europe, Russia, China, India and rest from other parts of the world. This led to a lot of hue and cry from all over, prompting organizations to take steps to ensure website security.</p> <p>No surprises that financial organizations made up 37 percent of the total number of targets, while retailers formed 24 percent of the same. Around 20 percent of the targets were manufacturing firms, transportation and other service providers.</p> <p><strong>State backed hacking</strong></p> <p>State backed hacking came a distant second at 20 percent of the total incidents. It needs to be noted that several national governments were at loggerheads throughout the year owing to hacking attacks. Cyber attacks on US organizations were traced back to China and Iran. (Read <a href="http://www.themoneytimes.com/node/1701712859"> Chinese hackers wage cyber war against New York Times</a> and <a href="http://www.themoneytimes.com/node/1701712915">Cyber attacks to hit US linked to Chinese Army</a>) </p> <p>Anonymous launched cyber attacks on organizations across US and Israel for a myriad of issues. Read More <a href="http://www.themoneytimes.com/node/1701712613"> Online offensive against Westboro Church</a> and <a href="http://www.themoneytimes.com/node/1701713018">Reuters editor in hacking conspiracy</a>.</p> <p>The study’s sample size comprised of 47,000 security breach incidents and 621 confirmed breaches across 27 countries across the globe. </p> <div class="field field-type-text field-field-imagecaption"> <div class="field-items"> <div class="field-item odd"> <p>Verizon report throws light on interesting hacking trends!</p> </div> </div> </div> computer hacking Cybercrime cybercrime law hacking password hacking Technology Top Story types of cybercrime Verizon Tue, 23 Apr 2013 08:24:51 +0000 Dinesh Dhiman 1701713139 at http://themoneytimes.com Account drains at Chase Bank may not be “Anonymous” http://themoneytimes.com/featured/20130319/account-drains-chase-bank-may-not-be-%E2%80%9Canonymous%E2%80%9D-id-1701713037.html <div class="field field-type-text field-field-teaser"> <div class="field-items"> <div class="field-item odd"> <p>Customers who have money stacked away at the Chase Bank went through a nightmarish experience on Monday night. They must have been stunned when they were greeted by $0 in their accounts. </p> </div> </div> </div> <div class="field field-type-filefield field-field-image"> <div class="field-items"> <div class="field-item odd"> <img src="http://themoneytimes.com/files/imagecache/picturethumb/chasebalances.jpg" alt="" title="" class="imagecache imagecache-picturethumb imagecache-default imagecache-picturethumb_default" width="180" height="167" /> </div> </div> </div> <p>The internal glitch of their accounts showing up “System unavailable” and the zero balance had the people in a tizzy. But what do we hear? The company’s spokesperson has said "It has nothing to do with cyber threats or hacks. It is an internal issue."</p> <p><strong>The Chase Bank story</strong></p> <p>Social networking sites Twitter and Facebook were rife with the frustration laden complaints of the customers. They had been petrified when their mobile devices showed $0 in their account balance or were unable to log into Bank’s website. Anonymous, the hacking collective, jumped in to state that they were responsible for the disappearing balances. </p> <p>The customers had resorted to Twitter to express their apprehensions. They had posted screen shots of the zero amounts in their accounts and the unavailability status of the site when they had accessed them through the mobile devices and Internet. But the banking giant vehemently confirmed that all this was because of an internal glitch instead of a security breach by hackers.</p> <p>A spokesperson from the Chase Bank’s side was heard commenting "We have a technology problem regarding customers' balance information that we are working to resolve. It has nothing cyber threats; it's an internal issue. We are very sorry to our customers for the inconvenience."</p> <p>The spokesman did say that the mortgage and credit card accounts remained unaffected by all this. It is a mystery as to when the issue will be taken care of and how many customers are affected by this.</p> <p><strong> Chase statement</strong></p> <p>A statement issued by Chase stated that it was aware of the customers suspicions of hacking and theft specially “with the zero balances appearing less than a week after a massive distributed-denial-of-service attack” that had compromised Chase’s websites for many hours. The people who had tried to use the tools on the site saw the "temporarily down” message. </p> <p>Hackers have used DDoS attacks on different financial institutions like Bank of America Citigroup, Chase, Wells Fargo, HSBC etc. Is Iran responsible for these attacks? Well, the security researchers and government officials have definitely hinted at this.</p> <p>Now the question arises, what are the institutions going to do as “Anonymous” has threatened to increase its hacking activities in 2013?</p> Bank of America Citigroup Banking chase Chase Bank cyber threats DDoS attacks hacking hacks HSBC internet mobile phones statement system unavailable Wells Fargo Tue, 19 Mar 2013 08:21:26 +0000 Minnie Mahendru 1701713037 at http://themoneytimes.com Field day for Hackers? Vulnerability threatens security of iPhones http://themoneytimes.com/featured/20130228/field-day-hackers-vulnerability-threatens-security-iphones-id-1701712955.html <div class="field field-type-text field-field-teaser"> <div class="field-items"> <div class="field-item odd"> <p>Gone are those days when one felt that the password key meant safety and security for the iPhone 5!! Every other day we get some new information regarding the sharp mindedness of the hackers. This time a new vulnerability has been unearthed in the iPhone lock screen allowing the hackers to gain access to personal information and bypass the password locks of the user. </p> </div> </div> </div> <div class="field field-type-filefield field-field-image"> <div class="field-items"> <div class="field-item odd"> <img src="http://themoneytimes.com/files/imagecache/picturethumb/apple_26.jpg" alt="" title="" class="imagecache imagecache-picturethumb imagecache-default imagecache-picturethumb_default" width="180" height="119" /> </div> </div> </div> <p><strong>The Full Disclosure report</strong></p> <p>You can set the thought aside that your iPhone 5 is invincible, as the Full Disclosure report by the Vulnerability Lab detected a snag in it. This was given in details on the Threatpost blog of Kaspersky Labs that Hackers can misuse the Emergency Call Function to peek into the lock screen of the iPhone. This vulnerability gives the attacker the total access to voicemails, contact lists, personal information and photos of the user.</p> <p><strong> The details of Hacking</strong></p> <p>"The exploit involves manipulating the phone’s screenshot function, its emergency call function and its power button," stated the write up by Threatpost.com. "Users can make an emergency call (911 for example) on the phone and then cancel it while toggling the power on and off to get temporary access to the phone." reported the Threatpost.com.</p> <p><strong>Let’s look into the way the hackers work:</strong></p> <p>In the beginning make a code lock check. If it works adequately, then flick the power button. After this open the option of the emergency call button. After that dial the emergency numbers like 110, 911 or 112. </p> <p>While the call is being processed, cancel the requested number and turn off the mobile by pushing the power switch on the top right hand corner. After that push the top right power button again and switch to the device pin or code lock again. Once again push the power button on the top right hand corner, keeping it pressed for three seconds. </p> <p>In the 3rd second again press the emergency call button. A screen pops up, announcing the commencement of shut down procedure. Here comes the catch - as long as the hacker is holding the power button he can dial any unknown number to call and also get an access to the address book of the mobile. </p> <p>This process even makes the voice mail accessible to the attacker. Any number can be then dialed from the mobile if the top right corner button is pressed while making the call.</p> <p>After this the hacker can get the phone data through the computer, by attaching a USB cord to the smartphone. This vulnerability threatens iPhone 5 devices that run on the iOS 6.1.</p> <p>The Full Disclosure report states "The vulnerability allows the local attacker to bypass the code lock in iTunes and via USB when a black screen bug occurs," The report further writes "Successful exploitation of the vulnerability results in unauthorized device access and information disclosure."</p> <p>Apple remains mum on the issue.</p> Apple Cell Phones contact lists Hackers hacking iOS 6 iPhone lock screen iPhone5 iTunes operating system passwords personal information photos of the user The Full Disclosure report Threatpost blog of Kaspersky Labs Top Story United States via USB voicemails Thu, 28 Feb 2013 07:38:49 +0000 Minnie Mahendru 1701712955 at http://themoneytimes.com Microsoft - the latest tech titan to fall victim to hacking http://themoneytimes.com/featured/20130223/microsoft-latest-tech-titan-fall-victim-hacking-id-1701712935.html <div class="field field-type-text field-field-teaser"> <div class="field-items"> <div class="field-item odd"> <p>Another big-ticket hacking attack has rocked the technological world again. This time it’s Microsoft, which has borne the brunt of the hackers' click. </p> </div> </div> </div> <div class="field field-type-filefield field-field-image"> <div class="field-items"> <div class="field-item odd"> <img src="http://themoneytimes.com/files/imagecache/picturethumb/microsoft_17.jpg" alt="" title="" class="imagecache imagecache-picturethumb imagecache-default imagecache-picturethumb_default" width="180" height="120" /> </div> </div> </div> <p>Microsoft confirms the hacking attack, and has joined the list of famous tech companies, which complained of having their systems barged into by cyber criminals. Getting evidence of hacking in its Mac Software business unit, the Redmond based tech giant assures that there is no proof of the customer data being tampered with.</p> <p><strong>Microsoft hacking</strong></p> <p>Remember, it was just a while ago that Twitter had said that the online Messaging service, of nearly 250,000 Twitter users had become hacking victims.</p> <p>Well, Microsoft confirmed on Friday that the company had seen a hacking attack that was similar to the one faced by Facebook and Twitter, the famous social networking sites. Microsoft has not disclosed any other detailed information on the break-in. A while ago, Facebook had also affirmed that systems of some of its employees were compromised, but had not divulged much details.</p> <p>Microsoft stated that some of its computers in the Mac Software business unit had shown up infected with malware. At the moment the Company is busy investigating the malicious software responsible for this hacking. </p> <p><strong>Other companies under cyber attack</strong></p> <p>In the past companies like Apple, Twitter, Facebook and media houses like The Wall Street Journal, and The New York Times have also faced a similar kind of cyber attack due to a vulnerability in Java. The latest to join the bandwagon is Microsoft.</p> <p> The Company confirmed on Friday on its Security Response Center website that “During our investigation, we found a small number of computers, including some in our Mac business unit, that were infected by malicious software using techniques similar to those documented by other organizations,” The site further affirms “We have no evidence of customer data being affected and our investigation is ongoing,” </p> <p>Trying to reassure its users Microsoft retaliates “This type of cyber attack is no surprise to Microsoft and other companies that must grapple with determined and persistent adversaries.”</p> <p> Twitter, after the cyber attack, had requested its users to alter their passwords but had not commented on the source of the attacks. </p> <p>Apple, The WSJ and The Times have indicated that most such cyber crimes originate from China, a charge the top officials in the country deny vehemently.</p> Apple Computing cyber attack cyber crime cyber thieves Facebook Hackers hacking Macsoftware business unit Microsoft the new york times The Wall Street Journal Top Story Twitter United States Sat, 23 Feb 2013 08:13:23 +0000 Minnie Mahendru 1701712935 at http://themoneytimes.com "We just got sold to McDonalds!" Hackers' tweet on behalf of Burger King http://themoneytimes.com/featured/20130219/we-just-got-sold-mcdonalds-hackers-tweet-behalf-burger-king-id-1701712918.html <div class="field field-type-filefield field-field-image"> <div class="field-items"> <div class="field-item odd"> <img src="http://themoneytimes.com/files/imagecache/picturethumb/download%20%282%29_4.jpg" alt="" title="" class="imagecache imagecache-picturethumb imagecache-default imagecache-picturethumb_default" width="180" height="106" /> </div> </div> </div> Burger King Burger King hacked Burger king twitter account hacked Business cyber security cyber space attackers hacking McDonald's McDonalds Tue, 19 Feb 2013 08:25:04 +0000 Onika Singh 1701712918 at http://themoneytimes.com Google Chairman criticises China for harbouring piracy http://themoneytimes.com/featured/20130203/google-chairman-criticises-china-harbouring-piracy-id-1701712861.html <div class="field field-type-text field-field-teaser"> <div class="field-items"> <div class="field-item odd"> <p>Google's Chairman Eric Schmidt certainly does not have any kind words to say for China in his new book.</p> </div> </div> </div> <div class="field field-type-filefield field-field-image"> <div class="field-items"> <div class="field-item odd"> <img src="http://themoneytimes.com/files/imagecache/picturethumb/see-how-your-google-results-measure-up-with-google-grader-video--6b8bbb4b41_1.jpg" alt="Google and China have had a difficult relationship" title="Google and China have had a difficult relationship" class="imagecache imagecache-picturethumb imagecache-default imagecache-picturethumb_default" width="180" height="101" /> </div> </div> </div> <p>In his upcoming book, titled ‘The New Digital Age’, Google Chairman Eric Schmidt has severely criticized China for harboring piracy, and claimed that the country actually encourages the practice for political or economic gains.</p> <p>The book has been scheduled for release this April by Random House. The story was first reported by the Wall Street Journal based on a book review.</p> <p>Schmidt went so far as to say that China has "the most sophisticated and prolific" hackers, and is "the world's most active and enthusiastic filterer of information".</p> <p><strong>Internet censorship in China</strong><br /> China and Google have a long history of a difficult relationship. Beijing has often come under fire by international groups, companies and nations for indulging in cyber espionage, and attempting to control what information users had access to.</p> <p>In the period between 2006 and 2011, a number of cyber attacks were carried out against many international organizations, including the International Olympic Committee, and the UN. It is widely believed that most of these attacks had their origin in China.</p> <p>In 2011, Google accused Chinese hackers of having broken into the email accounts of top US government executives and military officials. In July last year, South Korea alleged that hackers based in China were responsible for compromising the accounts of millions of users on a social network.</p> <p>Many major international news sites have also been attacked by Chinese hackers.</p> <p>Although hacking has been declared illegal in China, the practice is rampant across the nation.</p> <p><strong>U.S. companies at a distinct disadvantage</strong><br /> According to the book, “the disparity between American and Chinese firms and their tactics will put both the government and the companies of the United States at a distinct disadvantage."</p> <p>It went on to say that Washington "will not take the same path of digital corporate espionage, as its laws are much stricter (and better enforced) and because illicit competition violates the American sense of fair play".</p> <div class="field field-type-text field-field-imagecaption"> <div class="field-items"> <div class="field-item odd"> <p>Google and China have had a difficult relationship</p> </div> </div> </div> book Google Google chairman hacking piracy prolific hackers Schmidt security Technology Top Story Sun, 03 Feb 2013 15:52:55 +0000 Yasser Ali 1701712861 at http://themoneytimes.com Is Twitter safe? Hackers gain access to user accounts on Twitter again http://themoneytimes.com/featured/20130202/twitter-safe-hackers-gain-access-user-accounts-twitter-again-id-1701712860.html <div class="field field-type-text field-field-teaser"> <div class="field-items"> <div class="field-item odd"> <p>Insecurities must be plaguing the minds of nearly 250,000 people with user accounts at Twitter Inc., as their accounts may have been hacked. Some anonymous hackers have been busy this week and they are suspected to have gained access to user account names, passwords, and emails of many Twitter users, announced the Twitter representatives.</p> </div> </div> </div> <div class="field field-type-filefield field-field-image"> <div class="field-items"> <div class="field-item odd"> <img src="http://themoneytimes.com/files/imagecache/picturethumb/twitter_18.jpg" alt="" title="" class="imagecache imagecache-picturethumb imagecache-default imagecache-picturethumb_default" width="180" height="135" /> </div> </div> </div> <p><strong> Twitter announcement</strong></p> <p>The microblog confirmed that they have found out the accounts that have been targeted and are in the process of informing the users. The site has already reset the encrypted passwords as a precaution. Some “sophisticated” unauthorized ways, that were being utilized to access detailed information, had been detected by the Twitter authorities leaving them concerned and ready for action. </p> <p>Twitter representatives were said to have claimed that, “This attack was not the work of amateurs, and we do not believe it was an isolated incident”. The blog post further stated that “The attackers were extremely sophisticated, and we believe other companies and organizations have also been recently similarly attacked.”</p> <p>Besides this, Twitter keeps mum on the methodology and origin of the hacking unlike the “cyber attack” revelations of the Wall street Journal and New York times.</p> <p><strong> More about Twitter</strong></p> <p>Twitter is a favorite social networking site of nearly 200 million users who actively use Twitter every month. The Private Company’s representatives admitted that they are working hand in hand with Federal Law Enforcement officials and the Government, in order to trace the User Account Hackers.</p> <p>The Wall Street Journal and the New York Times stated that the attacks originated from China, but contrary to their claims, Twitter does not specifically point its finger to China.</p> <p>Jim Prosser, spokesman for Twitter states that as the investigation is underway it is difficult to hypothesize on the source of the attacks. “There is no evidence right now that would indicate that passwords were compromised,” stated spokesperson Prosser.</p> <p>In 2010, Twitter had committed to a consent decree with the Federal Trade Commission. The decree signed subjected the company to independent privacy reviews for 10 years, because it had been unable to shield the user’s personal information from the hackers.</p> <p>This “hacking” incident is not the first of its kind. Earlier hackers had managed to gain access to some high profile people, having accounts at Twitter. They gained Twitter’s personal user information by managing to accomplish account breaching by plugging into Twitter’s systems. </p> account details consent decree email Federal Trade Commission. Hackers hacking information Technology the new york times The Wall Street Journal Top Story Twitter United States user account Sat, 02 Feb 2013 08:10:32 +0000 Minnie Mahendru 1701712860 at http://themoneytimes.com Google wants you to hack Chrome OS, and get millions in rewards http://themoneytimes.com/featured/20130129/google-wants-you-hack-chrome-os-and-get-millions-rewards-id-1701712848.html <div class="field field-type-text field-field-teaser"> <div class="field-items"> <div class="field-item odd"> <p>Google is giving away cash prizes worth millions for hacking into its Chrome OS.</p> </div> </div> </div> <div class="field field-type-filefield field-field-image"> <div class="field-items"> <div class="field-item odd"> <img src="http://themoneytimes.com/files/imagecache/picturethumb/Google_26.jpg" alt="Successful hackers will be richly rewarded by Google" title="Successful hackers will be richly rewarded by Google" class="imagecache imagecache-picturethumb imagecache-default imagecache-picturethumb_default" width="180" height="105" /> </div> </div> </div> <p>You’d think that no company would want its products to be hacked into, but Google wants you to do exactly that.</p> <p>Google will be conducting a massive hacking contest at a security conference in March this year, and is giving away up to a whopping $3.14 million reward to successful hackers.</p> <p>Called Pwnium 3, the hacking contest will reveal how vulnerable the Chrome OS is to attacks by hackers.</p> <p>Why is Google doing this? Well, when you get to know the many different but difficult ways in which your software can be hacked, it’s easier to patch the deficiencies.</p> <p><strong>Equal to the value of Pi</strong><br /> The exact total amount that Google is giving away is $3.14159 million. If you are wondering if this strange figure means something, it happens to be the first six digits of the value of Pi.</p> <p>In a blog post on the Chromium project's blog, Chris Evans, an engineer with the Chrome security team, said that each hacker who is able to make a successful hack into Chrome OS or the web browser is entitled to get $110,000.</p> <p><strong>Bigger reward if attack persists</strong><br /> If the hacking persists even after a restart of Chrome OS, the hacker would be getting a greater prize of $150,000.</p> <p>"We believe these larger rewards reflect the additional challenge involved with tackling the security defenses of Chrome OS, compared to traditional operating systems," said Evans.</p> <p>A Samsung Series 5 550 Chromebook will be used for the contest. Chromebooks are those sleek and stylish laptops which come pre-loaded with Chrome OS.</p> <p>Designed for the Web, the most important part of the OS is the Chrome web browser.</p> <p>The cash prize Google is offering this year is the biggest that the search giant has ever offered for any hack.</p> <div class="field field-type-text field-field-imagecaption"> <div class="field-items"> <div class="field-item odd"> <p>Successful hackers will be richly rewarded by Google</p> </div> </div> </div> Chrome chrome os contest ethical Google hack Chrome OS Hackers hacking Technology Top Story Tue, 29 Jan 2013 10:07:53 +0000 Yasser Ali 1701712848 at http://themoneytimes.com Oracle releases patch for Java security vulnerability, but concerns remain http://themoneytimes.com/featured/20130117/oracle-releases-patch-java-security-vulnerability-concerns-remain-id-1701712769.ht <div class="field field-type-text field-field-teaser"> <div class="field-items"> <div class="field-item odd"> <p>Oracle has finally put out an update to fix the security vulnerability, but some concerns remain.</p> </div> </div> </div> <div class="field field-type-filefield field-field-image"> <div class="field-items"> <div class="field-item odd"> <img src="http://themoneytimes.com/files/imagecache/picturethumb/12.08.30-Java_1.jpg" alt="All is still not well with Oracle&#039;s Java plugin" title="All is still not well with Oracle&#039;s Java plugin" class="imagecache imagecache-picturethumb imagecache-default imagecache-picturethumb_default" width="180" height="111" /> </div> </div> </div> <p>A few days back, a zero-day vulnerability in Java versions 7 and earlier was found. The security flaw was apparently so serious that the U.S. Department of Homeland Security felt compelled to warn users.</p> <p>It instructed computer users across the globe to disable the Java plugin or have it removed from their computers until Oracle released a fix.</p> <p>On Monday, Oracle announced that it had released an update to plug the security vulnerability.</p> <p><strong>Security fix not a complete solution</strong><br /> Despite the assurance from Oracle, the U.S. Department of Homeland Security still maintains that computer users keep their Java plugins disabled for now.</p> <p>In an updated notice to users, the U.S. Department of Homeland Security said that more security vulnerabilities could be discovered later, so it is wiser to keep the Java plugin disabled.</p> <p>"This and previous Java vulnerabilities have been widely targeted by attackers, and new Java vulnerabilities are likely to be discovered. To defend against this and future Java vulnerabilities, consider disabling Java in Web browsers until adequate updates are available," the updated alert said.</p> <p>Experts believe that the fix released by Oracle may still have problems, and does not really guarantee complete online security.</p> <p><strong>Java among the most widely used programs</strong><br /> Java is among the most widely used Web plugins across the globe. It allows browsers to display some real-time data such as stock prices or weather updates, and enables them to run programs within websites.</p> <p>It is precisely Java’s ubiquity across Internet-connected PCs that makes it exceptionally attractive to hackers.</p> <p>The zero-day vulnerability that had been discovered could allow a hacker to plant unauthorized malware or make other adverse system changes. It could even lead to theft of confidential data such as credit card information.</p> <div class="field field-type-text field-field-imagecaption"> <div class="field-items"> <div class="field-item odd"> <p>All is still not well with Oracle's Java plugin</p> </div> </div> </div> Hackers hacking Java malicious software malware Oracle security vulnerability Technology Top Story Thu, 17 Jan 2013 02:56:26 +0000 Yasser Ali 1701712769 at http://themoneytimes.com
Warning: trigger_error(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /home/themoney/public_html/includes/database.mysql.inc on line 135

Warning: Table './themoney_2011new/watchdog' is marked as crashed and last (automatic?) repair failed query: INSERT INTO watchdog (uid, type, message, variables, severity, link, location, referer, hostname, timestamp) VALUES (0, 'php', '%message in %file on line %line.', 'a:4:{s:6:\"%error\";s:12:\"user warning\";s:8:\"%message\";s:320:\"Table &#039;themoney_2011new.accesslog&#039; doesn&#039;t exist\nquery: INSERT INTO accesslog (title, path, url, hostname, uid, sid, timer, timestamp) values(&#039;&#039;, &#039;taxonomy/term/40772/all/feed&#039;, &#039;&#039;, &#039;50.17.114.227&#039;, 0, &#039;b3842c5662ce0437b4c3f977aea40c50&#039;, 1241, 1454824131)\";s:5:\"%file\";s:63:\"/home/themoney/public_html/modules/statistics/statistics.module\";s:5:\"%line\";i:63;}', 3, '', 'http://themoneytimes.com/taxonomy/term/40772/all/feed', & in /home/themoney/public_html/includes/database.mysql.inc on line 135