Wednesday 10 August 2011

Hacker Group Anonymous Vows To Destroy Facebook On November 5

Hacktivist group Anonymous, which has been responsible for cyber-attacks on the Pentagon, News Corp, and others, has vowed to destroy Facebook on November 5th (which should ring a bell).
Citing privacy concerns and the difficulty involved in deleting a Facebook account, Anonymous hopes to "kill Facebook," the "medium of communication [we] all so dearly adore."
After Google removed Anonymous' Gmail and Google+ accounts, Anonymous pledged to create its own social network, called AnonPlus.
The full text of the announcement, made on YouTube and reported by Village Voice, is below:

Operation Facebook

DATE: November 5, 2011.


TARGET: https://facebook.com

Press:
Twitterhttps://twitter.com/OP_Facebook
http://piratepad.net/YCPcpwrl09
Irc.Anonops.Li #OpFaceBook
Message:

Attention citizens of the world,

We wish to get your attention, hoping you heed the warnings as follows:
Your medium of communication you all so dearly adore will be destroyed. If you are a willing hacktivist or a guy who just wants to protect the freedom of information then join the cause and kill facebook for the sake of your own privacy.

Facebook has been selling information to government agencies and giving clandestine access to information security firms so that they can spy on people from all around the world. Some of these so-called whitehat infosec firms are working for authoritarian governments, such as those of Egypt and Syria. 

Everything you do on Facebook stays on Facebook regardless of your "privacy" settings, and deleting your account is impossible, even if you "delete" your account, all your personal info stays on Facebook and can be recovered at any time. Changing the privacy settings to make your Facebook account more "private" is also a delusion. Facebook knows more about you than your family. http://www.physorg.com/news170614271.htmlhttp://itgrunts.com/2010/10/07/facebook-steals-numbers-and-data-from-your-iph...

You cannot hide from the reality in which you, the people of the internet, live in. Facebook is the opposite of the Antisec cause. You are not safe from them nor from any government. One day you will look back on this and realise what we have done here is right, you will thank the rulers of the internet, we are not harming you but saving you.

The riots are underway. It is not a battle over the future of privacy and publicity. It is a battle for choice and informed consent. It's unfolding because people are being raped, tickled, molested, and confused into doing things where they don't understand the consequences. Facebook keeps saying that it gives users choices, but that is completely false. It gives users the illusion of and hides the details away from them "for their own good" while they then make millions off of you. When a service is "free," it really means they're making money off of you and your information.

Think for a while and prepare for a day that will go down in history. November 5 2011, #opfacebook . Engaged.

This is our world now. We exist without nationality, without religious bias. We have the right to not be surveilled, not be stalked, and not be used for profit. We have the right to not live as slaves.

We are anonymous
We are legion
We do not forgive
We do not forget
Expect us

Tuesday 9 August 2011

Mobile Malware: be Prepared against the growing threats

Android users are now 2 1/2 times more likely to encounter malware than a mere six months ago, a report finds.
As the capabilities, programmability, and "attack surface" of mobile devices mirror that of PCs, so too do the threats. A  report from Lookout Mobile Security, a provider of mobile security software Lookout calls "repackaging." Like all Trojans, this technique is particularly effective since most users configure their devices to automatically update installed apps. Although malicious Android apps are the focus of Lookout's report, iOS owners are not exception. Despite the sophistication of existing mobile malware exploits and distribution techniques, the people at Lookout believe this is just the beginning. Specifically, they see mobile malware being used to set up botnets, exploit mobile finance and payment systems, and abuse premium-rate text messages (essentially SMS 900-numbers). So what's a smartphone user to do? A good start is applying some of that home PC knowledge to your mobile device usage. 
MOBILE THREATS
As with PCs, there are a variety of security threats that can affect mobile devices. We split mobile threats into several categories: application-based threats, web-based threats, network-based threats and physical threats.
Application-based Threats
Downloadable applications present many security issues on mobile devices, including both software specifically designed to be malicious as well as software that can be exploited for malicious purposes. MALWARE is software that is designed to engage in malicious behavior on a device. Data commonly targeted by spyware includes phone call history, text messages, location, browser history, contact list, email, and camera pictures. VULNERABLE APPLICATIONS contain software vulnerabilities that can be exploited for malicious purposes.
Web-based Threats
DRIVE-BY-DOWNLOADS automatically begin downloading an application when a user visits a web page. Simply by visiting a web page, an unsuspecting user can trigger a browser exploit that can install malware or perform other actions on a device.
Network Threats
Mobile devices typically support cellular networks as well as local wireless networks.
Physical Threats
LOST OR STOLEN DEVICES are one of the most prevalent mobile threats.
Mobile security issues are present on all major mobile platforms, though threats affect each platform differently. Application-based threats affect both iOS and Android. Currently, malware and spyware have primarily targeted Android devices, though there are commercial spyware applications available for jailbroken iOS devices.


How to Fight Mobile Malware      

            1.Lock your phone
Set a password on your mobile device so that if it is lost or stolen, your data is difficult to access.
2. Use Only Well-Known App Markets
Adjusting your Android device's settings to block app downloads from sources other than the Android Market. Also disable auto update feature from every application.
3. Examine Every App Download
Regardless of whether an app is free or paid, any given download is a potential threat to your phone's security. Take the time to examine each app's market listing carefully before downloading it to your device. Remember to look at the developer name, reviews, and star ratings.
4. Beware Strange Texts and Emails
Just like emails, attackers can use text messages to spread malware, phishing scams and other threats among mobile device users.

5. Use Mobile Security Software
As the threat from mobile malware has grown, so has the number of good security offerings in the marketplace. Use one. There are several comprehensive device security apps in the Android Market that can help detect and protect against mobile malware, and it's increasingly wise to use one.
Read  here  Lookout Mobile Threat Report for August 2011  .