gdata.io.handleScriptLoaded({"version":"1.0","encoding":"UTF-8","feed":{"xmlns":"http://www.w3.org/2005/Atom","xmlns$openSearch":"http://a9.com/-/spec/opensearchrss/1.0/","xmlns$gd":"http://schemas.google.com/g/2005","xmlns$georss":"http://www.georss.org/georss","xmlns$thr":"http://purl.org/syndication/thread/1.0","xmlns$blogger":"http://schemas.google.com/blogger/2008","id":{"$t":"tag:blogger.com,1999:blog-5403865830110720728"},"updated":{"$t":"2021-07-29T15:11:49.464+05:30"},"category":[{"term":"beautiful"},{"term":"digital eye"},{"term":"hockey"},{"term":"Bihar's Super 30"},{"term":"goggles"},{"term":"productivity"},{"term":"sania mirza"},{"term":"kjo"},{"term":"wikipedia"},{"term":"football"},{"term":"privacy"},{"term":"hrithik roshan"},{"term":"tablet"},{"term":"education"},{"term":"baby"},{"term":"r"},{"term":"speed"},{"term":"beer"},{"term":"katina kaif"},{"term":"mountain peaking"},{"term":"fifth genertion jets"},{"term":"rembering names"},{"term":"2010 CWG"},{"term":"boeing"},{"term":"corruption"},{"term":"kaka"},{"term":"love"},{"term":"harry potter"},{"term":"osama bin laden"},{"term":"piracy"},{"term":"health"},{"term":"mac"},{"term":"bionic arm"},{"term":"letters"},{"term":"space"},{"term":"law"},{"term":"aamir khan"},{"term":"hookah"},{"term":"yottabyte"},{"term":"wikileaks"},{"term":"guardian"},{"term":"amitabh bachchan"},{"term":"immune"},{"term":"museum"},{"term":"Racism"},{"term":"shoe"},{"term":"tv"},{"term":"movies"},{"term":"wanted"},{"term":"airplane"},{"term":"ladies"},{"term":"advanced wepon"},{"term":"holiday"},{"term":"new york"},{"term":"eye"},{"term":"evo"},{"term":"global"},{"term":"sony psp2"},{"term":"freefall"},{"term":"magnets"},{"term":"civilization"},{"term":"edX"},{"term":"fashion"},{"term":"entertainment"},{"term":"mandeville"},{"term":"highway"},{"term":"nuclear"},{"term":"australia"},{"term":"beware"},{"term":"allergy"},{"term":"murder"},{"term":"time"},{"term":"gaffes"},{"term":"nicotine"},{"term":"michael jackson"},{"term":"business"},{"term":"humour"},{"term":"ph.d"},{"term":"iaf"},{"term":"night vision"},{"term":"metro"},{"term":"deaf"},{"term":"idol earners"},{"term":"satellite"},{"term":"chimps"},{"term":"lpd"},{"term":"tallest"},{"term":"stamp"},{"term":"Cat"},{"term":"om"},{"term":"fibre"},{"term":"ebay"},{"term":"foxconn"},{"term":"shoaib malik"},{"term":"farmville"},{"term":"rare"},{"term":"nude"},{"term":"lucky"},{"term":"attractive"},{"term":"death"},{"term":"launch"},{"term":"sun"},{"term":"spice girls"},{"term":"experiment"},{"term":"sweden"},{"term":"highest paid"},{"term":"et"},{"term":"hormone"},{"term":"prince harry"},{"term":"nexus one"},{"term":"antivirus"},{"term":"burger"},{"term":"google tablet"},{"term":"dark night"},{"term":"strawberries"},{"term":"fridge"},{"term":"skype"},{"term":"water"},{"term":"al zawahiri"},{"term":"car"},{"term":"parties"},{"term":"james cameron"},{"term":"htc evo"},{"term":"millionaire"},{"term":"desk"},{"term":"i have luv story"},{"term":"tips"},{"term":"cricket"},{"term":"research"},{"term":"carlisle cullen"},{"term":"shuttle"},{"term":"Typhoid adware"},{"term":"sonam kapoor"},{"term":"google"},{"term":"olympics"},{"term":"clothes"},{"term":"iphone"},{"term":"smallest"},{"term":"diabetes"},{"term":"cleanest countries"},{"term":"tiger woods"},{"term":"nokia"},{"term":"tagore"},{"term":"romance"},{"term":"ipl"},{"term":"top 10"},{"term":"lalit modi"},{"term":"london"},{"term":"sleep"},{"term":"record"},{"term":"history"},{"term":"survey"},{"term":"dreaming"},{"term":"mircrosoft"},{"term":"twitter"},{"term":"aishwarya rai"},{"term":"hotmail"},{"term":"asthama"},{"term":"inventions"},{"term":"extint"},{"term":"face transplant"},{"term":"fishing"},{"term":"measuring units"},{"term":"national"},{"term":"Pepsi"},{"term":"heritage"},{"term":"phantom ray"},{"term":"frustation"},{"term":"magician"},{"term":"sony"},{"term":"messenger"},{"term":"indian billionare"},{"term":"ageing"},{"term":"sachin"},{"term":"sports"},{"term":"pacman"},{"term":"ban"},{"term":"geolocation"},{"term":"samba"},{"term":"cyber attacks"},{"term":"world biggest bike balloon"},{"term":"windows 7"},{"term":"tumour"},{"term":"adventure"},{"term":"Oh Eun-sun"},{"term":"ipad"},{"term":"mascots"},{"term":"tea"},{"term":"uav"},{"term":"map"},{"term":"forbes"},{"term":"smokeing"},{"term":"wordpress"},{"term":"Popchips"},{"term":"Avatar 2"},{"term":"Micromax"},{"term":"imran khan"},{"term":"oracle"},{"term":"mobile"},{"term":"new species"},{"term":"html5"},{"term":"cure"},{"term":"helicopter"},{"term":"pirated"},{"term":"fifa"},{"term":"tsunami"},{"term":"concept"},{"term":"twilight"},{"term":"yoga"},{"term":"android"},{"term":"bruce lee"},{"term":"nintendo 3ds"},{"term":"Harely-Davidson"},{"term":"terror"},{"term":"luxury"},{"term":"yahoo"},{"term":"biotech"},{"term":"horse"},{"term":"india"},{"term":"china"},{"term":"acupuncture"},{"term":"science"},{"term":"japan"},{"term":"biomedi"},{"term":"IIT"},{"term":"beatles"},{"term":"bebo"},{"term":"stamina"},{"term":"mind reading"},{"term":"models"},{"term":"electric car"},{"term":"navigator"},{"term":"post man"},{"term":"quantam mechanics"},{"term":"luftansa"},{"term":"bollywood"},{"term":"internet"},{"term":"hairfall"},{"term":"pocket size"},{"term":"facebook"},{"term":"Ashton Kutcher"},{"term":"suicide"},{"term":"microsoft"},{"term":"mit"},{"term":"Europe"},{"term":"obama"},{"term":"world"},{"term":"delhi"},{"term":"blood"},{"term":"ibm"},{"term":"pics"},{"term":"censor"},{"term":"earth"},{"term":"blackberry"},{"term":"samsung"},{"term":"secret"},{"term":"new feature"},{"term":"dell"},{"term":"hillary"},{"term":"spindex"},{"term":"gaming"},{"term":"greyson chance"},{"term":"bing"},{"term":"psx emulator"},{"term":"green tea"},{"term":"mcfree"},{"term":"Disclaimer"},{"term":"super sonic"},{"term":"fit"},{"term":"ipod"},{"term":"aliens"},{"term":"saudi"},{"term":"mircroscope"},{"term":"vespa"},{"term":"reasearch"},{"term":"tricks"},{"term":"happiness"},{"term":"sholay"},{"term":"adopts"},{"term":"gold"},{"term":"srk"},{"term":"madagascar bird"},{"term":"innovation"},{"term":"i-fairy"},{"term":"women"},{"term":"buzz"},{"term":"green"},{"term":"apple"},{"term":"cleanest cities"},{"term":"wimbledon"},{"term":"polls"},{"term":"divorce"},{"term":"athlete"},{"term":"pakistan"},{"term":"linkedin"},{"term":"gadgets"},{"term":"3d"},{"term":"collecta"},{"term":"Naomi Campbell"},{"term":"thriller"},{"term":"monkey"},{"term":"media rights"},{"term":"Harvard"},{"term":"netbook"},{"term":"badmaash company"},{"term":"social network"},{"term":"helped"},{"term":"w3c"},{"term":"pirvacy"},{"term":"stud"},{"term":"interview"},{"term":"flying car"},{"term":"al qaeda"},{"term":"bored"},{"term":"security"},{"term":"bussiness"},{"term":"golf"},{"term":"recycle"},{"term":"how to"},{"term":"vuvuzela"},{"term":"avatar"},{"term":"technology"},{"term":"video"},{"term":"environment"},{"term":"money"},{"term":"ash"},{"term":"music"},{"term":"lottery"},{"term":"policy"},{"term":"problems"},{"term":"dmca"},{"term":"cigarette"},{"term":"picasso"},{"term":"led"},{"term":"copyright infringement"},{"term":"laughter"},{"term":"agni"},{"term":"raavan"},{"term":"missiles"},{"term":"clone"},{"term":"Gisele Bundchen"},{"term":"intenet addiction"},{"term":"susan boyle"},{"term":"akshay kumar"},{"term":"magazine"},{"term":"doodle"},{"term":"game console"},{"term":"gizmodo"},{"term":"diet"},{"term":"tax"},{"term":"fossils"},{"term":"auction"},{"term":"DVD sales"},{"term":"skydriver"},{"term":"transformers 3"},{"term":"robot"},{"term":"first look"},{"term":"floppy"},{"term":"dawood"},{"term":"media"},{"term":"mj"},{"term":"charity"},{"term":"patent"},{"term":"hyped"},{"term":"uk"},{"term":"adobe"},{"term":"smoking"},{"term":"lady gaga"},{"term":"mafia wars"},{"term":"youtube"},{"term":"solar cell"},{"term":"kites"},{"term":"germany"},{"term":"obesity"},{"term":"sylvester stallone"},{"term":"foursquare"},{"term":"arts"},{"term":"steve jobs"},{"term":"architecture"},{"term":"leaked"},{"term":"heart"},{"term":"mountain climbing"},{"term":"rambo"},{"term":"saina nehwal"},{"term":"salman khan"},{"term":"4g"},{"term":"piratebay"},{"term":"international"},{"term":"tools"},{"term":"chicken"},{"term":"Illusionist"},{"term":"darpa"},{"term":"spy"},{"term":"dubai"},{"term":"micheal jackson"},{"term":"rim"},{"term":"cancer"},{"term":"study"},{"term":"hacked"},{"term":"coffee"},{"term":"hollywood"},{"term":"camera"},{"term":"cheese"},{"term":"fastest"},{"term":"beetroot"},{"term":"prodigy"},{"term":"medicine"},{"term":"diana"},{"term":"wacky"},{"term":"artifical life"},{"term":"depression"},{"term":"vacation"},{"term":"bill gates"},{"term":"merchandise"},{"term":"abhishek"},{"term":"awards night"},{"term":"david blaine"},{"term":"crime"},{"term":"Psy"},{"term":"pc"},{"term":"recharge"},{"term":"men"},{"term":"usa"},{"term":"breakfast"},{"term":"russia"},{"term":"genes"},{"term":"browsers"},{"term":"su"},{"term":"village"},{"term":"memory"},{"term":"levitation"},{"term":"temple"},{"term":"commonwealth"},{"term":"wenlock"},{"term":"marriage"},{"term":"husband for sale"},{"term":"megan fox"},{"term":"politics"},{"term":"trivia"},{"term":"south korea"},{"term":"intel"},{"term":"deccan chargers"},{"term":"flu"}],"title":{"type":"text","$t":"Hyped Talk"},"subtitle":{"type":"html","$t":"You will find this news interesting."},"link":[{"rel":"http://schemas.google.com/g/2005#feed","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/-/cyber+attacks?alt\u003djson-in-script\u0026max-results\u003d6"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/-/cyber+attacks?alt\u003djson-in-script\u0026max-results\u003d6"},{"rel":"alternate","type":"text/html","href":"http://hypedtalk.blogspot.com/search/label/cyber%20attacks"},{"rel":"hub","href":"http://pubsubhubbub.appspot.com/"},{"rel":"next","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/-/cyber+attacks/-/cyber+attacks?alt\u003djson-in-script\u0026start-index\u003d7\u0026max-results\u003d6"}],"author":[{"name":{"$t":"Gee TEE"},"uri":{"$t":"https://www.blogger.com/profile/05453399516295661171"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"generator":{"version":"7.00","uri":"https://www.blogger.com","$t":"Blogger"},"openSearch$totalResults":{"$t":"20"},"openSearch$startIndex":{"$t":"1"},"openSearch$itemsPerPage":{"$t":"6"},"entry":[{"id":{"$t":"tag:blogger.com,1999:blog-5403865830110720728.post-3050428483238331084"},"published":{"$t":"2011-06-27T11:22:00.000+05:30"},"updated":{"$t":"2011-06-27T11:22:40.208+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"crime"},{"scheme":"http://www.blogger.com/atom/ns#","term":"cyber attacks"},{"scheme":"http://www.blogger.com/atom/ns#","term":"internet"}],"title":{"type":"text","$t":"Fifty day hacking spree come to an end with a note from its member dissolving LulzSec."},"content":{"type":"html","$t":"\u003cdiv dir\u003d\"ltr\" style\u003d\"text-align: left;\" trbidi\u003d\"on\"\u003e\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: center;\"\u003e\u003ca href\u003d\"http://1.bp.blogspot.com/-YB9XAfADmmk/Tggame69uzI/AAAAAAAAElI/DAYy8q5BxIw/s1600/lulzsec-logo.jpg\" imageanchor\u003d\"1\" style\u003d\"clear: right; float: right; margin-bottom: 1em; margin-left: 1em;\"\u003e\u003cimg border\u003d\"0\" height\u003d\"133\" src\u003d\"http://1.bp.blogspot.com/-YB9XAfADmmk/Tggame69uzI/AAAAAAAAElI/DAYy8q5BxIw/s200/lulzsec-logo.jpg\" width\u003d\"200\" /\u003e\u003c/a\u003e\u003c/div\u003eSo, at last it seem that the hack-flick come to an end with announcement of dismantling. With the announcement comes their the last release, a data dump internal AOL Inc and AT\u0026amp;T documents.\u003cbr /\u003e\u003cbr /\u003eLulzSec, a rouge hacker group attend fame and as well as wrath from fellow hacker groups and as well as from big private and public organisation like Sony Corp, the CIA and a British police unit among other targets, said in a statement that it had accomplished its mission to disrupt corporate and government bodies for entertainment.\u003cbr /\u003e\u003ca name\u003d'more'\u003e\u003c/a\u003e\u003cbr /\u003e\"Our planned 50 day cruise has expired, and we must now sail into the distance, leaving behind - we hope - inspiration, fear, denial, happiness, approval, disapproval, mockery, embarrassment, thoughtfulness, jealousy, hate, even love,\" the group said in their last statement. \u003cbr /\u003e\u003cbr /\u003eAccording to experts, LulzSec, closed their shop due to increase in hunt-down of their members by Govt authorities and fear of rivals, disclosing their location.\u003cbr /\u003e\u003cbr /\u003e- Various Inputs\u003c/div\u003e"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://hypedtalk.blogspot.com/feeds/3050428483238331084/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.blogger.com/comment.g?blogID\u003d5403865830110720728\u0026postID\u003d3050428483238331084\u0026isPopup\u003dtrue","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/3050428483238331084"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/3050428483238331084"},{"rel":"alternate","type":"text/html","href":"https://hypedtalk.blogspot.com/2011/06/fifty-day-hacking-spree-come-to-end.html","title":"Fifty day hacking spree come to an end with a note from its member dissolving LulzSec."}],"author":[{"name":{"$t":"Gee TEE"},"uri":{"$t":"https://www.blogger.com/profile/05453399516295661171"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"http://1.bp.blogspot.com/-YB9XAfADmmk/Tggame69uzI/AAAAAAAAElI/DAYy8q5BxIw/s72-c/lulzsec-logo.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-5403865830110720728.post-2843762058531460401"},"published":{"$t":"2011-04-23T20:43:00.001+05:30"},"updated":{"$t":"2011-04-23T20:44:40.648+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"usa"},{"scheme":"http://www.blogger.com/atom/ns#","term":"international"},{"scheme":"http://www.blogger.com/atom/ns#","term":"crime"},{"scheme":"http://www.blogger.com/atom/ns#","term":"wikileaks"},{"scheme":"http://www.blogger.com/atom/ns#","term":"china"},{"scheme":"http://www.blogger.com/atom/ns#","term":"cyber attacks"},{"scheme":"http://www.blogger.com/atom/ns#","term":"internet"},{"scheme":"http://www.blogger.com/atom/ns#","term":"hacked"}],"title":{"type":"text","$t":"China steal terabytes of sensitive data from US computers."},"content":{"type":"html","$t":"\u003cdiv dir\u003d\"ltr\" style\u003d\"text-align: left;\" trbidi\u003d\"on\"\u003eAccording to secret diplomatic cables made available to Reuters by third party, China had increased its hand in cyber-espionage and said to have gained accessed to sensitive user names and passwords and terabytes of classified documents.\u003cbr /\u003e\u003cbr /\u003eAnd at the moment, many experts believe China may have gained the upper hand.\u003cbr /\u003e\u003cbr /\u003eAccording to US investigators, China has stolen terabytes of sensitive data - from usernames and passwords for State Department computers to designs for multi-billion dollar weapons systems. And Chinese hackers show no signs of letting up. \"The attacks coming out of China are not only continuing, they are accelerating,\" says Alan Paller, director of research at information-security training group SANS Institute in Washington, DC.\u003cbr /\u003e\u003ca name\u003d'more'\u003e\u003c/a\u003e\u003cbr /\u003eSecret US State Department cables, obtained by WikiLeaks and made available to Reuters by a third party, trace systems breaches - colorfully code-named \"Byzantine Hades\" by US investigators - to the Chinese military. An April 2009 cable even pinpoints the attacks to a specific unit of China's People's Liberation Army.\u003cbr /\u003e\u003cbr /\u003e-Reuters Input\u003cbr /\u003e\u003ci\u003eVia: [\u003ca href\u003d\"http://ibnlive.in.com/news/china-cyberspys-steal-terabytes-of-sensitive-data/149224-2.html\" target\u003d\"_blank\"\u003eIBN-LIVE\u003c/a\u003e]\u003c/i\u003e\u003c/div\u003e"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://hypedtalk.blogspot.com/feeds/2843762058531460401/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.blogger.com/comment.g?blogID\u003d5403865830110720728\u0026postID\u003d2843762058531460401\u0026isPopup\u003dtrue","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/2843762058531460401"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/2843762058531460401"},{"rel":"alternate","type":"text/html","href":"https://hypedtalk.blogspot.com/2011/04/china-steal-terabytes-of-sensitive-data.html","title":"China steal terabytes of sensitive data from US computers."}],"author":[{"name":{"$t":"Gee TEE"},"uri":{"$t":"https://www.blogger.com/profile/05453399516295661171"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-5403865830110720728.post-1810345967253561196"},"published":{"$t":"2010-12-20T19:33:00.000+05:30"},"updated":{"$t":"2010-12-20T19:33:25.886+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"technology"},{"scheme":"http://www.blogger.com/atom/ns#","term":"cyber attacks"},{"scheme":"http://www.blogger.com/atom/ns#","term":"internet"}],"title":{"type":"text","$t":"Major sites like Google, Yahoo!!!, twitter,Linked In..... resets passwords after Gawker accounts got exposed."},"content":{"type":"html","$t":"For our easiness, we have habit of using same user name and password for multiple sites which may include some of the important and critical sites.  \u003cbr /\u003e\u003cbr /\u003eAfter 1.4 million accounts of Gawker's got exposed and is out for public, several unrelated companies had to freeze their accounts and force users to reset passwords.\u003cbr /\u003e\u003ca name\u003d'more'\u003e\u003c/a\u003e\u003cbr /\u003eSince the usernames and passwords obtained there could unlock other valuable accounts like e-mail and Net-banking.\u003cbr /\u003e\u003cbr /\u003eTwitter, Google Inc. and Yahoo Inc., among others, began resetting their passwords en masse, disrupting users as they tried to check their e-mail or post a tweet.\u003cbr /\u003e\u003cbr /\u003e\"It shows one of the fundamental problems with passwords - they get reused and shared across multiple sites,\" said Jeff Burstein, a senior product manager with the Symantec Corp. security firm.\u003cbr /\u003e\u003cbr /\u003eBecause the accounts were freely available, other sites were able to score the data and look for matches with their users.\u003cbr /\u003e\u003cbr /\u003eTwitter acknowledged resetting some passwords for its 175 million users after hackers used the Gawker data to break into Twitter accounts and spamming with it. Yahoo and Google, also reset some passwords. Google described it as a \"small subset\" of its users.Job-networking service LinkedIn also changed a small number of its 85 million users' passwords.\u003cbr /\u003e\u003cbr /\u003eJPMorgan Chase \u0026amp; Co. said it didn't have to change any passwords because the bank has \"multiple layers of security.\"\u003cbr /\u003e\u003cbr /\u003e- AP Inputs"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://hypedtalk.blogspot.com/feeds/1810345967253561196/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.blogger.com/comment.g?blogID\u003d5403865830110720728\u0026postID\u003d1810345967253561196\u0026isPopup\u003dtrue","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/1810345967253561196"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/1810345967253561196"},{"rel":"alternate","type":"text/html","href":"https://hypedtalk.blogspot.com/2010/12/major-sites-like-google-yahoo.html","title":"Major sites like Google, Yahoo!!!, twitter,Linked In..... resets passwords after Gawker accounts got exposed."}],"author":[{"name":{"$t":"Gee TEE"},"uri":{"$t":"https://www.blogger.com/profile/05453399516295661171"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-5403865830110720728.post-5857021963201642272"},"published":{"$t":"2010-12-13T19:50:00.001+05:30"},"updated":{"$t":"2010-12-13T19:57:39.197+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"cyber attacks"},{"scheme":"http://www.blogger.com/atom/ns#","term":"internet"}],"title":{"type":"text","$t":"Spammers feeding on Gawker exposed twitter accounts."},"content":{"type":"html","$t":"A Group of hackers which cracked into Gawker's Media database published the 1.3 million account passwords via file sharing site Bittorrent. \u003cbr /\u003e\u003cbr /\u003eThis attack is said to be carried out by a group \"Gnosis\", allied to 4chan.\u003cbr /\u003e\u003ca name\u003d'more'\u003e\u003c/a\u003e\u003cbr /\u003eAll the million accounts exposed which includes twitter accounts, spammer took advantage of it and started spamming with pharmacy stuff.\u003cbr /\u003e\u003cbr /\u003eA group calling itself \"Gnosis\" released a file sized about 500MB, containing the data taken from Gawker.\u003cbr /\u003e\u003cbr /\u003e- Various Inputs"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://hypedtalk.blogspot.com/feeds/5857021963201642272/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.blogger.com/comment.g?blogID\u003d5403865830110720728\u0026postID\u003d5857021963201642272\u0026isPopup\u003dtrue","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/5857021963201642272"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/5857021963201642272"},{"rel":"alternate","type":"text/html","href":"https://hypedtalk.blogspot.com/2010/12/spammers-feeding-on-gawker-exposed.html","title":"Spammers feeding on Gawker exposed twitter accounts."}],"author":[{"name":{"$t":"Gee TEE"},"uri":{"$t":"https://www.blogger.com/profile/05453399516295661171"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-5403865830110720728.post-8735598552875041135"},"published":{"$t":"2010-12-09T19:14:00.000+05:30"},"updated":{"$t":"2010-12-09T19:14:02.332+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"international"},{"scheme":"http://www.blogger.com/atom/ns#","term":"wikileaks"},{"scheme":"http://www.blogger.com/atom/ns#","term":"cyber attacks"}],"title":{"type":"text","$t":"Group of hackers (Anonymous) describes Julian Assange as a 'free-speech martyr', hacks the sites which turned against Wikileaks."},"content":{"type":"html","$t":"Julian Assange has become a good role model as hacker(ethical), despite pressure and fear of life from one of the powerful nation in the world, regardless fear, published the secret talks the US talks with its non-allies as well as with it close allies, not sparing any one.\u003cbr /\u003e\u003cbr /\u003eHackers, a group from less then 50 grew to strong 4,000 member cyber army and strongly growing, in support of Julian Assange, founder of Wikileaks.\u003cbr /\u003e\u003ca name\u003d'more'\u003e\u003c/a\u003e\u003cbr /\u003eGroup which called itself as itself 'Anonymous' vowed to intensify its 'war of data' against Mastercard, Visa and other groups which have cut funding to the website, the Swedish government website also came under attack.\u003cbr /\u003e\u003cbr /\u003eIn an online chat with AFP, organisers of the group said thousands of volunteers were taking part in their defense of WikiLeaks and its founder Julian Assange, whom they described as a 'free-speech martyr'.\u003cbr /\u003e\u003cbr /\u003e\"We started off with a small amount of users (below 50),\" they said. \"Now, we are at around 4,000.\"\u003cbr /\u003e\u003cbr /\u003e\"We recruit through the Internet, that means, everywhere: imageboards, forums, Facebook, Twitter... you name it, we're using it,\" they said.\u003cbr /\u003e\u003cbr /\u003eThe group first attacked the Paypal, launched their first distributed denial of service, or DDoS, attack on Saturday, taking down PayPal's blog, ThePayPalBlog.com, for at least eight hours.\u003cbr /\u003e\u003cbr /\u003eThey even showed their frustration by taking down the websites of Visa, Mastercard and the Swiss Post Office bank for freezing WikiLeaks accounts. They didn't even spare the website of the Swedish prosecutor's office for pursuing Assange on allegations of sex crimes.\u003cbr /\u003e\u003cbr /\u003eAftonbladet, country's top-selling daily, said the official government website, http://www.regeringen.se/, was offline for a few hours overnight to Thursday, publishing a screen shot which showed the server could not be reached. The site was working normally again later in the day.\u003cbr /\u003e\u003cbr /\u003eThe paper also reported that WikiLeaks supporters had created a website bearing Swedish Justice Minister Beatrice Ask's name which then redirected users to WikiLeaks own site.\u003cbr /\u003e\u003cbr /\u003eOn Wednesday, the group attacked the websites of US conservative standard bearer Sarah Palin and US Senator Joe Lieberman, who called for US companies to withdraw technical support for WikiLeaks.\u003cbr /\u003e\u003cbr /\u003e- Various media inputs"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://hypedtalk.blogspot.com/feeds/8735598552875041135/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.blogger.com/comment.g?blogID\u003d5403865830110720728\u0026postID\u003d8735598552875041135\u0026isPopup\u003dtrue","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/8735598552875041135"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/8735598552875041135"},{"rel":"alternate","type":"text/html","href":"https://hypedtalk.blogspot.com/2010/12/group-of-hackers-anonymous-describes.html","title":"Group of hackers (Anonymous) describes Julian Assange as a 'free-speech martyr', hacks the sites which turned against Wikileaks."}],"author":[{"name":{"$t":"Gee TEE"},"uri":{"$t":"https://www.blogger.com/profile/05453399516295661171"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-5403865830110720728.post-131909363458280099"},"published":{"$t":"2010-12-08T23:37:00.000+05:30"},"updated":{"$t":"2010-12-08T23:37:33.427+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"wikileaks"},{"scheme":"http://www.blogger.com/atom/ns#","term":"cyber attacks"},{"scheme":"http://www.blogger.com/atom/ns#","term":"internet"}],"title":{"type":"text","$t":"Hackers hacks the website of lawyer representing the so called victim of Assange bad behavior."},"content":{"type":"html","$t":"Seem like Wikileaks is not alone in opening the Govts. After surrendering to UK police, Assange application for the bail was rejected by London Court, due to strong opposition. \u003cbr /\u003e\u003cbr /\u003eLooks like one of Assange fan got frustrated and hacked the Internet site and email service of the lawyer representing two Swedish women at the centre of rape and sexual assault allegations against WikiLeaks founder Julian Assange.\u003cbr /\u003e\u003ca name\u003d'more'\u003e\u003c/a\u003e\u003cbr /\u003eIn a statement, lawyer Claes Borgstroem said, \"Our e-mail and website were hacked last night or this morning\".\u003cbr /\u003e\u003cbr /\u003e\"We think it's the same people (who attacked) the prosecutors (website)\", added later.\u003cbr /\u003e\u003cbr /\u003e- AFP inputs"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://hypedtalk.blogspot.com/feeds/131909363458280099/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.blogger.com/comment.g?blogID\u003d5403865830110720728\u0026postID\u003d131909363458280099\u0026isPopup\u003dtrue","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/131909363458280099"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/131909363458280099"},{"rel":"alternate","type":"text/html","href":"https://hypedtalk.blogspot.com/2010/12/hackers-hacks-website-of-lawyer.html","title":"Hackers hacks the website of lawyer representing the so called victim of Assange bad behavior."}],"author":[{"name":{"$t":"Gee TEE"},"uri":{"$t":"https://www.blogger.com/profile/05453399516295661171"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"thr$total":{"$t":"0"}}]}});