2000 ( new ) WebSites HaCkeD By The 077 ( Hamdi HAcKer ) Tunisian HaCker |
http://www.zone-h.com/archive/notifier=The%20077
2000 ( new ) WebSites HaCkeD By The 077 ( Hamdi HAcKer ) Tunisian HaCker |
ComScore has come out with a set of data that will probably surprise you. The company found nearly 1 in 5 smartphone owners access check-in services via their mobile device. Now, lets do a bit of math here. According to an earlier study by Nielsen, US would approximately have 142.8 million total smartphone users by 2011 and 20% of that roughly accounts to about 30 million users. That’s a huge market for companies like Foursquare and Facebook and remember, we haven’t even added users from the rest of the world where growth is faster than that in US.
ComScore’s study found that 16.7 million U.S. mobile subscribers used location-based “check-in” services on their phones in March 2011, representing 7.1 percent of the entire mobile population. 12.7 million check-in users did so on a smartphone, representing 17.6 percent of the smartphone population. The study also found that check-in service users showed a high propensity for mobile media usage, including accessing retail sites and shopping guides, and displayed other characteristics of early adopters, including a stronger likelihood of owning a tablet device and accessing tech news, when compared to the average smartphone user.
“Although still in their relative infancy, location-based mobile check-in services are seeing rather impressive adoption among smartphone users,” said Mark Donovan, comScore senior vice president of mobile. “The ability to interact with consumers on this micro-local level through special offers, deals and other incentives provides brands with the real-time opportunity to engage consumers through their mobile device.”
The age group of 18-34 Year Olds Account for Nearly 60 Percent of Check-In Service Users. The services include Facebook Places, Foursquare and Gowalla which had heavy skews toward 18-24 year olds (26.0 percent) and 25-34 year olds (32.5 percent) in relation to both the total mobile audience and the overall smartphone audience. They were more likely to be full-time students (23.3 percent) when compared with total mobile (14.6 percent) or overall smartphone users (16.5 percent). Nearly half (46.4 percent) of check-in users were employed full time, slightly less than the percentage of smartphone users who were employed full time (53.3 percent). Both check-in service and smartphone users were more likely to be employed full time than overall mobile users (38.9 percent).
The study compared an average smartphone owner with owners who check-in. It found social networking check-in users were more likely to access mobile media across a majority of content categories. More than 95 percent of check-in service users used their mobile browser or applications. Nearly 62 percent accessed news. Check-in user behavior was also consistent with that of traditional early adopters, with 40.3 percent of users accessing tech news and 28.2 percent owning a media tablet, both significantly higher than average. Check-in service users also showed a high propensity for accessing retail-related destinations on their mobile devices. Nearly one-third of users accessed online retail sites on their mobiles, while one-fourth accessed shopping guides. Check-in service users were also more likely to be exposed to mobile advertising, with nearly 40 percent recalling seeing a web or app ad during the month, compared to just 27.5 percent of smartphone users.
Pixable has captured the journey of a Facebook photo right from the moment it is snapped to the point where it is drowned in the flood of facebook updates.
Pixable says, “The online photo chaos continues to grow with the number of Facebook photo uploads increasing every day. Well over six billion photos are uploaded to Facebook every month, and with more camera enabled smartphones out there, you can only imagine where we’re headed.”
It’s easy to search out loud. All you need is Google Chrome 11 or higher and a built-in or attached microphone. Just click the mic in the search bar and start talking.via Google Voice Search
This guy Magician Marco Tempest have recently completed his magic illusion using three Ipod touch devices, it looks that he have broken down the image to be displayed on three screen. Well its just perfectly done mind there is no camera tricks, this all goes fair just watch the video tutorial.
For more information about the creator and his magic tricks you can navigate to Marco Tempest website.
Facebook recently tweaked the algorithm that detects spammy applications. But something hasn’t gone down as expected as several genuine apps have been banned without any intimation to their respective owners.
According to Anthony Franco, co-founder of FriendCameo – a video chat on Facebook with over two million users, all of their users are receiving a 404 error when attempting to visit their application. And they have no way of reaching out to Facebook. On Hacker News he says,”Attempting to appeal to Facebook results in a generic email response instructing us to begin the application anew. Worst of all, deleting our application also deleted the photos our users took. We had a video chat application that allowed users to take pictures together with their friends. Over 1 million photo memories deleted by Facebook.”
In another case, developer of Grand Poker tells that the company spent huge amount of marketing dollars on adverts and product development. Furthermore, many of its paid customers demand for refunds or legal action. Apparantely, the company is feeling the pinch because Grand Poker happens to be the main source of revenue, and it is also funding other projects on facebook. The actions of Facebook might pretty much kill the company.
In yet another case, developer of Photo effect app says that three of their apps were banned even after following the TOS for app developers.
Developers are flooding online forums to vent their ire against lack of customer support on Facebook. Due to the volume of requests Facebook receives on a daily basis, it would probably take days if not months for apps to be reinstated. Upon contacting Facebook team, developers get an automated mail that states,
We’ve checked out the circumstances of your app’s removal, and we found that your app received strong negative feedback from users and their friends. Here are some types of feedback that our systems look for when users interact with apps: removing content generated by your app from the News Feed, labeling content by your app as ‘spam’, uninstalling or blocking your app, and not granting extended permissions requested by your app. These signals denote a poor user experience and amount to a violation of our Facebook Platform Principles, which is why your app was removed. Accordingly, we will not be able to restore your app. However, if you’d like to launch a new version of your app with a new app ID and canvas URL, please first make adjustments to ensure you’re providing a good user experience and meeting our policies.
According to a Facebook engineer who is working on the issue, Facebook has been getting a lot of user feedback recently, spiking significantly over the past week, on the amount of application spam people are seeing in their feeds and on their walls. The company has turned on a new enforcement system yesterday that took user feedback much more heavily into account. This resulted in a number of applications with high negative user feedback being disabled or having certain features disabled. In particular, many applications were disabled which posted to the walls of other users and had very high mark-as-spam numbers. And regarding poor feedback on apps for developers, the company says it is fixing the issue in its new Application Insights that will be launching over the next few weeks. The new dashboard will feature detailed information about both positive and negative engagement of the content your application generates.
Facebook has been under fire for pulling up apps and pages without intimating owners. The fact that the company uses bots to supervise content on the site makes matters worse. Also, the lack of proper customer support seem to the biggest pain in the ass for developers who are left with no option but to wait.
Facebook accounts are becoming favorite targets of hackers. If your account has been hacked, you could be in good company considering Facebook founder Mark Zuckerberg and French President Sarkozy have also been victims. Actually, thousands -- maybe millions -- of Facebook pages have been hacked. The hackers then use the accounts to send out erroneous messages to "friends."
One of your friends seems to have sent you a video or awesome photo or link, and suggests you click on it. The computer screen tells you to log in again to see the video or photo or quiz. But as soon as you sign in, you are giving your information to a hacking site, which now has your screen name and password.You probably would be suspicious of a strange e-mail in your inbox, but when you believe you are getting a link from a friend on a social network, you might not be so cautious.
You have actually been caught by one of the most common forms of hacking called "phishing." Recently estimated 1.5 million Facebook accounts are listed for sale on a website discovered by Verisign's iDefense Labs. The names were sold for as much as $45 for accounts with more than 10 friends. They are considered a way of spreading malware rather than strictly for identity theft.
People who find out that their Facebook accounts have been hacked, should immediately reset their passwords. They should also send Facebook a message, which will allow the company to look into the situation further.
As AT&T tries to swallow up the American wing of the German telekom, many have wondered whether Apple would allow T-Mobile to carry the iPhone. Apple’s answer so far is a no*, but that hasn’t stopped T-Mobile customers from adopting iPhones. In huge numbers.
In a meeting with T-Mobile spokespeople today ahead of the NYC Pepcom event, I received word that there are actively over a million Apple iPhones currently on T-Mobile’s network. When asked for a breakdown, the spokesman said the majority were pre-iPhone 4 but that a significant amount of people had “taken the scissors” to their T-Mobile SIM cards. T-Mobile doesn’t currently offer a Micro-SIM solution for Apple’s iPhone 4 so people who want to use the iPhone 4 must modify their SIMs into MicroSIMs. Those using iPhone 4s also won’t receive T-Mobile’s 3G or 4G data speeds because of the radio differences between the networks.
*Apple started selling unlocked iPhone 4s in the US for the first time earlier this month.
When asked to elaborate further on Micro-SIMs, the spokesman told me they are in the works but there was no time frame for release. Why not wait until the deal with AT&T is over to make MicroSIMs? Perhaps we’ll have a little surprise come September.
When asked specifically about the possibility of a T-Mobile USA iPhone, T-Mobile said they have nothing to announce at this time.
The F.B.I. seized Web servers in a raid on a data center early Tuesday, causing several Web sites, including those run by the New York publisher Curbed Network, to go offline.
The raid happened at 1:15 a.m. at a hosting facility in Reston, Va., used by DigitalOne, which is based in Switzerland, the company said. The F.B.I. did not immediately respond to a request for comment on the raid.
In an e-mail to one of its clients on Tuesday afternoon, DigitalOne’s chief executive, Sergej Ostroumow, said: “This problem is caused by the F.B.I., not our company. In the night F.B.I. has taken 3 enclosures with equipment plugged into them, possibly including your server — we cannot check it.”
Mr. Ostroumow said that the F.B.I. was only interested in one of the company’s clients but had taken servers used by “tens of clients.”
He wrote: “After F.B.I.’s unprofessional ‘work’ we can not restart our own servers, that’s why our Web site is offline and support doesn’t work.” The company’s staff had been working to solve the problem for the previous 15 hours, he said.
Mr. Ostroumow said in response to e-mailed questions that it was not clear if the issues would be resolved by Wednesday.
A government official who declined to be named said earlier in the day that the F.B.I. was actively investigating the Lulz Security group and any affiliated hackers. The official said the F.B.I. had teamed up with other agencies in this effort, including the Central Intelligence Agency and cybercrime bureaus in Europe.
Mr. Ostroumow declined to name the client targeted by the F.B.I. and said that he did not know why it had drawn their interest. It was also unclear why the agents took more servers with them than they sought, he said.
The sites of the Curbed Network, including popular blogs covering real estate, restaurants and other topics, were all unavailable Tuesday evening. Lockhart Steele, Curbed’s president, said his team realized that the company’s sites were down at around 3 a.m. and contacted DigitalOne. After initially declining to say what had happened, DigitalOne explained that the F.B.I. had raided the data center, Mr. Steele said.
“Our servers happened to be in with some naughty servers,” he said, adding that his sites were not the target of the raid. Curbed is working to get its sites back online, probably by Wednesday.
The raid also affected a server used by Instapaper, a popular service that saves articles for later reading. Marco Arment, Instapaper’s founder, said he lost contact with a server hosted by DigitalOne early on Tuesday. Instapaper’s Web site is still operating but has slowed somewhat. Mr. Arment said he had not heard from DigitalOne or law enforcement, and had no reason to believe that Instapaper was a target of the raid.
Pinboard, a bookmarking site, was operating on a backup server and some of its features were turned off, a post on its site said.
DigitalOne provided all necessary information to pinpoint the servers for a specific I.P. address, Mr. Ostroumow said. However, the agents took entire server racks, perhaps because they mistakenly thought that “one enclosure is = to one server,” he said in an e-mail.
DigitalOne had no employees on-site when the raid took place. The data center operator, from which DigitalOne leases space, passed along the information about the raid three hours after it started with the name of the agent and a phone number to call.
Before learning of the raid, Mr. Ostroumow, who is in Switzerland with the rest of his team, thought the problem was a technical glitch, he said.
Nick Bilton contributed reporting.
Online users in the country today are more scared of their social networking account being hacked as compared to loss of personal data in the cyber world, a Microsoft India study said.
About 74 per cent of the respondents said they worry about hacking of their social networking account as opposed to loss of personal data, which accounted for just 16 per cent and credit card fraud (five per cent), the study said.
The survey was hosted on Microsoft India’s ‘Windows and Me’ Facebook page and received responses from over thousands of consumers, it said.
About 50 per cent of respondents said they spent close to five hours on the internet daily.
Connecting with people online emerged as the favourite activity, with 40 per cent people saying they spend this time on social networking sites.
Other key activities included research (with 35 per cent) and entertainment (22 per cent).
The study revealed that nearly one—fourth of the participants (over 23 per cent) said they have been victims of cyber attacks.
Of this, 67 per cent people said they had suffered loss of personal data, followed by 19 per cent users witnessing e—mail account hacking.
“The large number of cyber attacks has also led to people becoming more aware about online security threats and thus realising the need for online security and anti—virus solutions,” the study said.
While the study found that almost 90 per cent Indians have an anti—virus installed on their PC, however, majority of the users (62 per cent) felt their job is done once they install an anti—virus on their PC.
This reflects that the Indian consumers are still are not completely aware of the repercussions of cyber attacks, the study said.
“Consumers are becoming increasingly aware about security threats they are exposed to in the online environment and are looking for security solutions that work in the back—end and let them enjoy their online world without any worries or interruptions,” Microsoft India Director (Windows Client, Consumer and Online Business) Pankaj Ukey said.
US military Creates fake online persons ! |
The notorious LulzSec hacking group has published login passwords for almost 26,000 users of an x-rated porn website.
The hackers compromised the database of the hardcore website (called "Pron"), exposing not only the email addresses and passwords of over 25,000 members but also the credentials of 55 administrators of other adult websites.
Furthermore, LulzSec drew particular attention to various government and military email addresses (.mil and .gov) that appeared to have accounts with the porn website..
To add insult to injury, the LulzSec group called on its many recent Twitter followers to exploit the situation, by logging into Facebook with the email/password combinations and tell the victim's Facebook friends and family about their porn habit.
It should go without saying that logging into someone else's account without their permission is against the law in most countries around the world.
Fortunately, it's reported that Facebook's security team responded quickly to the threat - and reset the passwords for all of the accounts it had which matched the email addresses exposed. Of course, it's still possible that those email address/password combinations are being used on other websites.
If anything should be a reminder to internet users of the importance of using different passwords for different websites, this should be it.
The danger is that once one password has been compromised, it's only a matter of time before the fraudsters will be able to gain access to your other accounts and steal information for financial gain or, in this case, potential embarrassment.
If you believe there might be a chance that your username/password were exposed, or if you're simply in the habit of using the same password for multiple websites - now is the time to change your habits.
Three suspected members of the Anonymous hacking group have been arrested in Spain.
The trio are said to have been involved in co-ordinating the group's activity in that country.
The arrests were made simultaneously in three Spanish cities - Barcelona, Valencia and Almeria.
Anonymous has claimed responsibility for attacks on Sony, Spanish banks and co-ordinated action in defence of whistle-blowing site Wikileaks.
A statement from the Spanish national police force said that a computer seized in the home of one person it arrested was used in the hacks.
The arrests were the culmination of an investigation that began in October 2010.
It involved Spanish cyber police combing through millions of lines of chat logs to identify who was behind the group's activities.
Some of the attacks made by Anonymous members used a web-based tool called Loic to bombard target sites with data. The websites of PayPal, Mastercard and Amazon were all targeted using this tool.
It seems that Loic did a poor job of hiding the identity of the people using it. It is believed that some police forces have already moved against the group based on this information.
Arrests have been made in the US, UK and Holland of Anonymous members, prior to the raids in Spain.
Anonymous grew out of the online picture sharing site 4Chan and describes itself as a group of concerned internet citizens.
As well as attacking sites that it perceives as not supporting Wikileaks. The loosely organised collective has also attacked government sites in Tunisia and Egypt to aid popular protest movements.
It might be surprising to external observers, but security professionals are also secretly getting a kick out of watching these guys go nuts. I wrote my first article on information security around May 2001. It was about the Sadmind worm and it ran on the letters page of the IT section of The Age newspaper in Melbourne."Why we secretly love LulzSec: Elephant in room visible. Cans open. Worms everywhere." (risky.biz)
"Geez," I thought to myself. "If awareness isn't raised about the unsuitability of these computamajiggies for srs bizness, we could encounter some problems down the track."
So for the last ten years I've been working in media, trying to raise awareness of the idea that maybe, just maybe, using insecure computers to hold your secrets, conduct your commerce and run your infrastructure is a shitty idea. No one who mattered listened. Executives think it's FUD. They honestly think that if they keep paying their annual AV subscriptions they'll be shielded by Mr. Norton's magic cloak.
Security types like LulzSec because they're proving what a mess we're in. They're pointing at the elephant in the room and saying "LOOK AT THE GIGANTIC FUCKING ELEPHANT IN THE ROOM ZOMG WHY CAN'T YOU SEE IT??? ITS TRUNK IS IN YR COFFEE FFS!!!"
There is no security, there will be no security. The horse has bolted, and it's not going to be the infrastructure that's going to change, it's going to be us.