Category Archives: Information Security

LulzSec is disbanding publicity-seeking hacker group that has blazed a path of destruction on the Internet over the last two months says it is dissolving itself.

Lulz Security made its announcement Saturday through its Twitter account. In an unusual strategy for a hacker group, LulzSec has used the account as a publicity platform while remaining anonymous.

The group’s disbandment comes unexpectedly, and could be a sign of nerves in the face of law enforcement investigations. One of the group’s six members was interviewed by The Associated Press on Friday, and gave no indication that its work was ending.

LulzSec claimed hacks on major entertainment companies, FBI partner organizations, the CIA, the U.S. Senate and a pornography website.

Searching talent among hackers Kerala-based IT firm, MobME Wireless, announced an online contest called CodeJAM to find the smartest computer hackers from the state’s colleges, an official said.

The company, incubated at Technopark here, said the contest was a unique way to reward the best programmers and was open to all regardless of their degree or educational merit. The contest will be hosted at

MobME CEO Sanjay Vijayakumar said that Silicon Valley in the US was created because of path-breaking solutions. The smartest of the hackers, coders and geeks who built world-class solutions in the valley were not the highest scoring students.

“With this contest, we want to find this rare breed from Kerala: the talented people who are super passionate about the code that they write and who can make a huge difference by creating path-breaking innovations for us,” said Vijayakumar.

Launching June 16, the online contest will run for a fortnight and a programming puzzle would be hosted in a specially crafted web portal at 11 p.m. for 14 consecutive nights.

Daily winners will be given a cash prize of 1,000 each during this period. On the 15th day, MobME will conduct a live coding contest at their Kochi office and the winner would walk away with a grand prize of 1 lakh.

The contest is open to any student from Kerala’s colleges who have a passion for programming puzzles. Apart from cash prizes, the winners will also be presented offer letters to join MobME.

Students interested to participate in the contest may watch out for the daily question starting June 16 at

MobME Wireless focuses on value-added services for mobile phone users and carrier-grade solutions for mobile network operators. It is the only technology company to have won the Nasscom Innovation Award twice.

Bank of America insider leaked customer data to criminal gang

Bank of America incurred a loss of at least $10 million (£6 million) as one of the insider sold customer data to outsiders.

Though the customers are being notified of the incident, but the bank is reluctant to provide many details of the case. The case is under investigation and the bank says that a former associate provided customer information to outsiders which were then used to commit fraud against the customers.

The scammers had stolen, “names, addresses, Social Security numbers, phone numbers, bank account numbers, driver’s license numbers, birth dates, email addresses, mother’s maiden names, PINs and account balances.” This information were then used for identity theft. The scammers ordered boxes of cheques and got them delivered to a UPS outlet where they picked them up. And also to prevent BofA from warning the victim, the scammers contacted the telephone company of the victims and rerouted the calls to scammer’s mobile phones.

Source : Techworld

Increase in attacks on Social Networking Sites to the Microsoft Security Intelligence Report, volume 10, there is a steady increase in social engineering attacks in 2010. The data was pulled from Microsoft’s customer base as well as partners and Internet Service providers.

Most of the attempts or attacks are made to churn out the name and password of social networking sites which might be used for other financial sites. As per Microsoft the trend of phishing attacks is shifting from financial sites to social networking sites and gaming sites.

Rogue Security Software

Rogue security software or scareware is designed like legitimate software which when installed on a victim’s machine, generates erroneous alerts and tricks the users to buy more softwares or services.

As per a report on rogue security software by Symantec, it said it received reports of 43 million installation attempts. It is told that it is computer security awareness training programs are the best way to defend against these malicious activities. A few web filtering technologies provided by various vendors also help.

Source: TechTarget

India Defends Right to Access Personal Data Indian government said Tuesday that new rules allowing it to access personal information available with Internet companies have inherent checks and balances against misuse.
The rules under section 43A of the Information Technology Act were enacted last month and reflect the government’s perception that security threats to the country can be countered by better access to online information.

The country is, for example, locked in a dispute with Research In Motion, demanding access to e-mails and other communications on RIM’s corporate service, called BlackBerry Enterprise Server.

Privacy groups and lawyers have described the rules as draconian and said they infringe Indians’ fundamental rights. “These are arbitrary powers that are being given to government, without any checks and balances,” said Pavan Dugga, a cyberlaw consultant and advocate in India’s Supreme Court.

The rules place controls on the gathering and use of personal data by Internet companies, including requiring permission from the provider of information for sharing such data. But the rules cite the government as an exception in this regard.

This article first appeared on The PC World

‘Extremely weak’ security in file hosting sites research carried out by the Katholieke Universiteit Leuven in Belgium and France’s Institute Eurecom reveals that the private files stored on cloud sites are extremely vulnerable to attakers. After examining 100 file hosting services, the researchers concluded that the unique URIs(Uniform Resource Identifiers) were too predictable and easy to crack.

The service providers claim that these URIs are secret and cannot be guessed, but the research results prove to be otherwise. The research reveals that the ‘secret’ URIs are generated in a predictable fashion; thereby making it easy for the attackers to guess and get access to the content.

The report did not point out any particular service provider specifically. However, during a month’s testing they could extract more tha 168,000 private files.

Source: PCPRO

Fraud Prevention Trends in 2011 the exponential rise in internet usage online transactions are also increasing; and so is the number of online frauds increasing. Thus the companies not only have to prevent online frauds, but also they have to protect the customer privacy.

According to ThreatMetrix, California based provider of cloud-based fraud prevention solutions, there has been a shift in fraud detection. The shift has been from cookie based identification to utilizing device identification, i.e., detecting returning visitors based on attributes of the device. Also the rules have been improved to use the information to detect spoofed devices and IP addresses as well as sniff out botnets.

Some other trends and predictions in fraud prevention as shared by ThreatMetrix are given as below:

1. Less Reliance on Cookies and Personally Identifiable Information (PII).

As the consumers are becoming more aware of the online frauds these days, they concerned with online privacy. Many of them block or delete cookies themselves or using security software. Hence many fraud prevention solutions are becoming ineffective. Thus there is this shift towards cookieless device identification and device fingerprinting in preventing fraudulent transactions today.


2. New Classes of Devices Become Commodities for Fraudsters.

The users use new devices like Smartphone and tablets in which they can hide their IP address and thus eliminate the possibility of detecting the source of transactions.


3. Use of Fraud Prevention Solutions Across the Entire Value Chain.

Today’s fraudsters are very smart and hence the threat across the entire value chain in e-commerce continues to persist. Thus the use of fraud prevention software has become very important for the online brands.


4. Rise of Online Services and Digital Goods Encouraging Fraud Automation.

The real time online transactions have increased considerably which is now the hot target of online fraud automation and the fraudster can easily automate fraudulent transactions.


“Every business that transacts on the Internet needs better automated fraud prevention that doesn’t rely on cookies or personal identifiable information,” said Faulkner. “2011 is the year that technologies like device fingerprinting and collective fraud intelligence in the cloud become mainstream tools for web security and fraud professionals. When fighting a collective problem you need a collective solution.”