gdata.io.handleScriptLoaded({"version":"1.0","encoding":"UTF-8","feed":{"xmlns":"http://www.w3.org/2005/Atom","xmlns$openSearch":"http://a9.com/-/spec/opensearchrss/1.0/","xmlns$gd":"http://schemas.google.com/g/2005","xmlns$georss":"http://www.georss.org/georss","xmlns$thr":"http://purl.org/syndication/thread/1.0","xmlns$blogger":"http://schemas.google.com/blogger/2008","id":{"$t":"tag:blogger.com,1999:blog-5403865830110720728"},"updated":{"$t":"2021-07-29T15:11:49.464+05:30"},"category":[{"term":"beautiful"},{"term":"digital eye"},{"term":"hockey"},{"term":"Bihar's Super 30"},{"term":"goggles"},{"term":"productivity"},{"term":"sania mirza"},{"term":"kjo"},{"term":"wikipedia"},{"term":"football"},{"term":"privacy"},{"term":"hrithik roshan"},{"term":"tablet"},{"term":"education"},{"term":"baby"},{"term":"r"},{"term":"speed"},{"term":"beer"},{"term":"katina kaif"},{"term":"mountain peaking"},{"term":"fifth genertion jets"},{"term":"rembering names"},{"term":"2010 CWG"},{"term":"boeing"},{"term":"corruption"},{"term":"kaka"},{"term":"love"},{"term":"harry potter"},{"term":"osama bin laden"},{"term":"piracy"},{"term":"health"},{"term":"mac"},{"term":"bionic arm"},{"term":"letters"},{"term":"space"},{"term":"law"},{"term":"aamir khan"},{"term":"hookah"},{"term":"yottabyte"},{"term":"wikileaks"},{"term":"guardian"},{"term":"amitabh bachchan"},{"term":"immune"},{"term":"museum"},{"term":"Racism"},{"term":"shoe"},{"term":"tv"},{"term":"movies"},{"term":"wanted"},{"term":"airplane"},{"term":"ladies"},{"term":"advanced wepon"},{"term":"holiday"},{"term":"new york"},{"term":"eye"},{"term":"evo"},{"term":"global"},{"term":"sony psp2"},{"term":"freefall"},{"term":"magnets"},{"term":"civilization"},{"term":"edX"},{"term":"fashion"},{"term":"entertainment"},{"term":"mandeville"},{"term":"highway"},{"term":"nuclear"},{"term":"australia"},{"term":"beware"},{"term":"allergy"},{"term":"murder"},{"term":"time"},{"term":"gaffes"},{"term":"nicotine"},{"term":"michael jackson"},{"term":"business"},{"term":"humour"},{"term":"ph.d"},{"term":"iaf"},{"term":"night vision"},{"term":"metro"},{"term":"deaf"},{"term":"idol earners"},{"term":"satellite"},{"term":"chimps"},{"term":"lpd"},{"term":"tallest"},{"term":"stamp"},{"term":"Cat"},{"term":"om"},{"term":"fibre"},{"term":"ebay"},{"term":"foxconn"},{"term":"shoaib malik"},{"term":"farmville"},{"term":"rare"},{"term":"nude"},{"term":"lucky"},{"term":"attractive"},{"term":"death"},{"term":"launch"},{"term":"sun"},{"term":"spice girls"},{"term":"experiment"},{"term":"sweden"},{"term":"highest paid"},{"term":"et"},{"term":"hormone"},{"term":"prince harry"},{"term":"nexus one"},{"term":"antivirus"},{"term":"burger"},{"term":"google tablet"},{"term":"dark night"},{"term":"strawberries"},{"term":"fridge"},{"term":"skype"},{"term":"water"},{"term":"al zawahiri"},{"term":"car"},{"term":"parties"},{"term":"james cameron"},{"term":"htc evo"},{"term":"millionaire"},{"term":"desk"},{"term":"i have luv story"},{"term":"tips"},{"term":"cricket"},{"term":"research"},{"term":"carlisle cullen"},{"term":"shuttle"},{"term":"Typhoid adware"},{"term":"sonam kapoor"},{"term":"google"},{"term":"olympics"},{"term":"clothes"},{"term":"iphone"},{"term":"smallest"},{"term":"diabetes"},{"term":"cleanest countries"},{"term":"tiger woods"},{"term":"nokia"},{"term":"tagore"},{"term":"romance"},{"term":"ipl"},{"term":"top 10"},{"term":"lalit modi"},{"term":"london"},{"term":"sleep"},{"term":"record"},{"term":"history"},{"term":"survey"},{"term":"dreaming"},{"term":"mircrosoft"},{"term":"twitter"},{"term":"aishwarya rai"},{"term":"hotmail"},{"term":"asthama"},{"term":"inventions"},{"term":"extint"},{"term":"face transplant"},{"term":"fishing"},{"term":"measuring units"},{"term":"national"},{"term":"Pepsi"},{"term":"heritage"},{"term":"phantom ray"},{"term":"frustation"},{"term":"magician"},{"term":"sony"},{"term":"messenger"},{"term":"indian billionare"},{"term":"ageing"},{"term":"sachin"},{"term":"sports"},{"term":"pacman"},{"term":"ban"},{"term":"geolocation"},{"term":"samba"},{"term":"cyber attacks"},{"term":"world biggest bike balloon"},{"term":"windows 7"},{"term":"tumour"},{"term":"adventure"},{"term":"Oh Eun-sun"},{"term":"ipad"},{"term":"mascots"},{"term":"tea"},{"term":"uav"},{"term":"map"},{"term":"forbes"},{"term":"smokeing"},{"term":"wordpress"},{"term":"Popchips"},{"term":"Avatar 2"},{"term":"Micromax"},{"term":"imran khan"},{"term":"oracle"},{"term":"mobile"},{"term":"new species"},{"term":"html5"},{"term":"cure"},{"term":"helicopter"},{"term":"pirated"},{"term":"fifa"},{"term":"tsunami"},{"term":"concept"},{"term":"twilight"},{"term":"yoga"},{"term":"android"},{"term":"bruce lee"},{"term":"nintendo 3ds"},{"term":"Harely-Davidson"},{"term":"terror"},{"term":"luxury"},{"term":"yahoo"},{"term":"biotech"},{"term":"horse"},{"term":"india"},{"term":"china"},{"term":"acupuncture"},{"term":"science"},{"term":"japan"},{"term":"biomedi"},{"term":"IIT"},{"term":"beatles"},{"term":"bebo"},{"term":"stamina"},{"term":"mind reading"},{"term":"models"},{"term":"electric car"},{"term":"navigator"},{"term":"post man"},{"term":"quantam mechanics"},{"term":"luftansa"},{"term":"bollywood"},{"term":"internet"},{"term":"hairfall"},{"term":"pocket size"},{"term":"facebook"},{"term":"Ashton Kutcher"},{"term":"suicide"},{"term":"microsoft"},{"term":"mit"},{"term":"Europe"},{"term":"obama"},{"term":"world"},{"term":"delhi"},{"term":"blood"},{"term":"ibm"},{"term":"pics"},{"term":"censor"},{"term":"earth"},{"term":"blackberry"},{"term":"samsung"},{"term":"secret"},{"term":"new feature"},{"term":"dell"},{"term":"hillary"},{"term":"spindex"},{"term":"gaming"},{"term":"greyson chance"},{"term":"bing"},{"term":"psx emulator"},{"term":"green tea"},{"term":"mcfree"},{"term":"Disclaimer"},{"term":"super sonic"},{"term":"fit"},{"term":"ipod"},{"term":"aliens"},{"term":"saudi"},{"term":"mircroscope"},{"term":"vespa"},{"term":"reasearch"},{"term":"tricks"},{"term":"happiness"},{"term":"sholay"},{"term":"adopts"},{"term":"gold"},{"term":"srk"},{"term":"madagascar bird"},{"term":"innovation"},{"term":"i-fairy"},{"term":"women"},{"term":"buzz"},{"term":"green"},{"term":"apple"},{"term":"cleanest cities"},{"term":"wimbledon"},{"term":"polls"},{"term":"divorce"},{"term":"athlete"},{"term":"pakistan"},{"term":"linkedin"},{"term":"gadgets"},{"term":"3d"},{"term":"collecta"},{"term":"Naomi Campbell"},{"term":"thriller"},{"term":"monkey"},{"term":"media rights"},{"term":"Harvard"},{"term":"netbook"},{"term":"badmaash company"},{"term":"social network"},{"term":"helped"},{"term":"w3c"},{"term":"pirvacy"},{"term":"stud"},{"term":"interview"},{"term":"flying car"},{"term":"al qaeda"},{"term":"bored"},{"term":"security"},{"term":"bussiness"},{"term":"golf"},{"term":"recycle"},{"term":"how to"},{"term":"vuvuzela"},{"term":"avatar"},{"term":"technology"},{"term":"video"},{"term":"environment"},{"term":"money"},{"term":"ash"},{"term":"music"},{"term":"lottery"},{"term":"policy"},{"term":"problems"},{"term":"dmca"},{"term":"cigarette"},{"term":"picasso"},{"term":"led"},{"term":"copyright infringement"},{"term":"laughter"},{"term":"agni"},{"term":"raavan"},{"term":"missiles"},{"term":"clone"},{"term":"Gisele Bundchen"},{"term":"intenet addiction"},{"term":"susan boyle"},{"term":"akshay kumar"},{"term":"magazine"},{"term":"doodle"},{"term":"game console"},{"term":"gizmodo"},{"term":"diet"},{"term":"tax"},{"term":"fossils"},{"term":"auction"},{"term":"DVD sales"},{"term":"skydriver"},{"term":"transformers 3"},{"term":"robot"},{"term":"first look"},{"term":"floppy"},{"term":"dawood"},{"term":"media"},{"term":"mj"},{"term":"charity"},{"term":"patent"},{"term":"hyped"},{"term":"uk"},{"term":"adobe"},{"term":"smoking"},{"term":"lady gaga"},{"term":"mafia wars"},{"term":"youtube"},{"term":"solar cell"},{"term":"kites"},{"term":"germany"},{"term":"obesity"},{"term":"sylvester stallone"},{"term":"foursquare"},{"term":"arts"},{"term":"steve jobs"},{"term":"architecture"},{"term":"leaked"},{"term":"heart"},{"term":"mountain climbing"},{"term":"rambo"},{"term":"saina nehwal"},{"term":"salman khan"},{"term":"4g"},{"term":"piratebay"},{"term":"international"},{"term":"tools"},{"term":"chicken"},{"term":"Illusionist"},{"term":"darpa"},{"term":"spy"},{"term":"dubai"},{"term":"micheal jackson"},{"term":"rim"},{"term":"cancer"},{"term":"study"},{"term":"hacked"},{"term":"coffee"},{"term":"hollywood"},{"term":"camera"},{"term":"cheese"},{"term":"fastest"},{"term":"beetroot"},{"term":"prodigy"},{"term":"medicine"},{"term":"diana"},{"term":"wacky"},{"term":"artifical life"},{"term":"depression"},{"term":"vacation"},{"term":"bill gates"},{"term":"merchandise"},{"term":"abhishek"},{"term":"awards night"},{"term":"david blaine"},{"term":"crime"},{"term":"Psy"},{"term":"pc"},{"term":"recharge"},{"term":"men"},{"term":"usa"},{"term":"breakfast"},{"term":"russia"},{"term":"genes"},{"term":"browsers"},{"term":"su"},{"term":"village"},{"term":"memory"},{"term":"levitation"},{"term":"temple"},{"term":"commonwealth"},{"term":"wenlock"},{"term":"marriage"},{"term":"husband for sale"},{"term":"megan fox"},{"term":"politics"},{"term":"trivia"},{"term":"south korea"},{"term":"intel"},{"term":"deccan chargers"},{"term":"flu"}],"title":{"type":"text","$t":"Hyped Talk"},"subtitle":{"type":"html","$t":"You will find this news interesting."},"link":[{"rel":"http://schemas.google.com/g/2005#feed","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/-/hacked?alt\u003djson-in-script\u0026max-results\u003d6"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/-/hacked?alt\u003djson-in-script\u0026max-results\u003d6"},{"rel":"alternate","type":"text/html","href":"http://hypedtalk.blogspot.com/search/label/hacked"},{"rel":"hub","href":"http://pubsubhubbub.appspot.com/"},{"rel":"next","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/-/hacked/-/hacked?alt\u003djson-in-script\u0026start-index\u003d7\u0026max-results\u003d6"}],"author":[{"name":{"$t":"Gee TEE"},"uri":{"$t":"https://www.blogger.com/profile/05453399516295661171"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"generator":{"version":"7.00","uri":"https://www.blogger.com","$t":"Blogger"},"openSearch$totalResults":{"$t":"15"},"openSearch$startIndex":{"$t":"1"},"openSearch$itemsPerPage":{"$t":"6"},"entry":[{"id":{"$t":"tag:blogger.com,1999:blog-5403865830110720728.post-2843762058531460401"},"published":{"$t":"2011-04-23T20:43:00.001+05:30"},"updated":{"$t":"2011-04-23T20:44:40.648+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"usa"},{"scheme":"http://www.blogger.com/atom/ns#","term":"international"},{"scheme":"http://www.blogger.com/atom/ns#","term":"crime"},{"scheme":"http://www.blogger.com/atom/ns#","term":"wikileaks"},{"scheme":"http://www.blogger.com/atom/ns#","term":"china"},{"scheme":"http://www.blogger.com/atom/ns#","term":"cyber attacks"},{"scheme":"http://www.blogger.com/atom/ns#","term":"internet"},{"scheme":"http://www.blogger.com/atom/ns#","term":"hacked"}],"title":{"type":"text","$t":"China steal terabytes of sensitive data from US computers."},"content":{"type":"html","$t":"\u003cdiv dir\u003d\"ltr\" style\u003d\"text-align: left;\" trbidi\u003d\"on\"\u003eAccording to secret diplomatic cables made available to Reuters by third party, China had increased its hand in cyber-espionage and said to have gained accessed to sensitive user names and passwords and terabytes of classified documents.\u003cbr /\u003e\u003cbr /\u003eAnd at the moment, many experts believe China may have gained the upper hand.\u003cbr /\u003e\u003cbr /\u003eAccording to US investigators, China has stolen terabytes of sensitive data - from usernames and passwords for State Department computers to designs for multi-billion dollar weapons systems. And Chinese hackers show no signs of letting up. \"The attacks coming out of China are not only continuing, they are accelerating,\" says Alan Paller, director of research at information-security training group SANS Institute in Washington, DC.\u003cbr /\u003e\u003ca name\u003d'more'\u003e\u003c/a\u003e\u003cbr /\u003eSecret US State Department cables, obtained by WikiLeaks and made available to Reuters by a third party, trace systems breaches - colorfully code-named \"Byzantine Hades\" by US investigators - to the Chinese military. An April 2009 cable even pinpoints the attacks to a specific unit of China's People's Liberation Army.\u003cbr /\u003e\u003cbr /\u003e-Reuters Input\u003cbr /\u003e\u003ci\u003eVia: [\u003ca href\u003d\"http://ibnlive.in.com/news/china-cyberspys-steal-terabytes-of-sensitive-data/149224-2.html\" target\u003d\"_blank\"\u003eIBN-LIVE\u003c/a\u003e]\u003c/i\u003e\u003c/div\u003e"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://hypedtalk.blogspot.com/feeds/2843762058531460401/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.blogger.com/comment.g?blogID\u003d5403865830110720728\u0026postID\u003d2843762058531460401\u0026isPopup\u003dtrue","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/2843762058531460401"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/2843762058531460401"},{"rel":"alternate","type":"text/html","href":"https://hypedtalk.blogspot.com/2011/04/china-steal-terabytes-of-sensitive-data.html","title":"China steal terabytes of sensitive data from US computers."}],"author":[{"name":{"$t":"Gee TEE"},"uri":{"$t":"https://www.blogger.com/profile/05453399516295661171"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-5403865830110720728.post-2289355024677558693"},"published":{"$t":"2011-04-23T19:38:00.000+05:30"},"updated":{"$t":"2011-04-23T19:38:54.676+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"technology"},{"scheme":"http://www.blogger.com/atom/ns#","term":"crime"},{"scheme":"http://www.blogger.com/atom/ns#","term":"internet"},{"scheme":"http://www.blogger.com/atom/ns#","term":"hacked"}],"title":{"type":"text","$t":"Suspected Chinese hackers might hacked in Australian govt officials system which includes PM and MPs"},"content":{"type":"html","$t":"\u003cdiv dir\u003d\"ltr\" style\u003d\"text-align: left;\" trbidi\u003d\"on\"\u003eWith the tip-off from the US Intelligence agency, Australian government came to know about the security breach. The alleged hacker had targeted the system of Autralian Prime Minister Julia Gillard's parliamentary computer and those of at least two senior ministers which includes Foreign Minister Kevin Rudd and Defence Minister Stephen Smith are suspected of being hacked, according to a newspaper report.\u003cbr /\u003e\u003cbr /\u003eIt is reported that several thousand emails may have been accessed from the computers of at least 10 ministers.\u003cbr /\u003e\u003ca name\u003d'more'\u003e\u003c/a\u003e\u003cbr /\u003eThe Australian authorities have refused to confirm or deny on the reports.\u003cbr /\u003e\u003cbr /\u003eReports suggest the hackers may have been trying to access information on Australia's lucrative mining industry.\u003cbr /\u003e\u003cbr /\u003eSydney's Daily Telegraph quoted four unnamed government sources as saying Chinese intelligence agencies were among a number of suspected hackers.\u003cbr /\u003e\u003cbr /\u003e\u003ci\u003eVia: [\u003ca href\u003d\"http://www.bbc.co.uk/news/world-asia-pacific-12891484\" target\u003d\"_blank\"\u003eBBC\u003c/a\u003e]\u003c/i\u003e\u003c/div\u003e"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://hypedtalk.blogspot.com/feeds/2289355024677558693/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.blogger.com/comment.g?blogID\u003d5403865830110720728\u0026postID\u003d2289355024677558693\u0026isPopup\u003dtrue","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/2289355024677558693"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/2289355024677558693"},{"rel":"alternate","type":"text/html","href":"https://hypedtalk.blogspot.com/2011/04/suspected-chinese-hackers-might-hacked.html","title":"Suspected Chinese hackers might hacked in Australian govt officials system which includes PM and MPs"}],"author":[{"name":{"$t":"Gee TEE"},"uri":{"$t":"https://www.blogger.com/profile/05453399516295661171"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-5403865830110720728.post-2045573136623779088"},"published":{"$t":"2011-01-16T18:44:00.001+05:30"},"updated":{"$t":"2011-01-16T18:45:50.525+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"technology"},{"scheme":"http://www.blogger.com/atom/ns#","term":"internet"},{"scheme":"http://www.blogger.com/atom/ns#","term":"hacked"}],"title":{"type":"text","$t":"Don't let your Web Browser save all your passwords."},"content":{"type":"html","$t":"\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: center;\"\u003e\u003ca href\u003d\"http://2.bp.blogspot.com/_6QiA8AKZBbU/TTLvfaVRxoI/AAAAAAAAEO0/3FxCCd5b_c8/s1600/ct_logo2009.png\" imageanchor\u003d\"1\" style\u003d\"clear: right; float: right; margin-bottom: 1em; margin-left: 1em;\"\u003e\u003cimg border\u003d\"0\" src\u003d\"http://2.bp.blogspot.com/_6QiA8AKZBbU/TTLvfaVRxoI/AAAAAAAAEO0/3FxCCd5b_c8/s1600/ct_logo2009.png\" /\u003e\u003c/a\u003e\u003c/div\u003ePasswords stored in your Web Browser are not safe, says c't, a German Computer Magazine. c't warns, by storing, we provide an easy gateway to access our unencrypted passwords to hackers with malwares and spywares. \u003cbr /\u003e\u003cbr /\u003eThe Tech magazine recommends that people who insist on storing passwords on a browser at least use some kind of master password, which means that all stored access data is safely encrypted. At present, which is available only with Firefox and Opera.\u003cbr /\u003e\u003ca name\u003d'more'\u003e\u003c/a\u003e\u003cbr /\u003ec't advises using passwords with at least eight characters and to make each password unique to a particular website.\u003cbr /\u003e\u003cbr /\u003e- IANS Inputs\u003cbr /\u003e\u003ci\u003eVia: [\u003ca href\u003d\"http://ibnlive.in.com/news/dont-save-passwords-on-your-browser/140596-11.html\" target\u003d\"_blank\"\u003eCNN-IBN\u003c/a\u003e]\u003c/i\u003e"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://hypedtalk.blogspot.com/feeds/2045573136623779088/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.blogger.com/comment.g?blogID\u003d5403865830110720728\u0026postID\u003d2045573136623779088\u0026isPopup\u003dtrue","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/2045573136623779088"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/2045573136623779088"},{"rel":"alternate","type":"text/html","href":"https://hypedtalk.blogspot.com/2011/01/dont-let-your-web-browser-save-all-your.html","title":"Don't let your Web Browser save all your passwords."}],"author":[{"name":{"$t":"Gee TEE"},"uri":{"$t":"https://www.blogger.com/profile/05453399516295661171"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"http://2.bp.blogspot.com/_6QiA8AKZBbU/TTLvfaVRxoI/AAAAAAAAEO0/3FxCCd5b_c8/s72-c/ct_logo2009.png","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-5403865830110720728.post-5136480914826576687"},"published":{"$t":"2010-08-06T21:48:00.000+05:30"},"updated":{"$t":"2010-08-06T21:48:48.039+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"technology"},{"scheme":"http://www.blogger.com/atom/ns#","term":"hacked"}],"title":{"type":"text","$t":"BlackBerry network can be hacked, say experts"},"content":{"type":"html","$t":"(\u003cspan\u003e Reuters\u003c/span\u003e )Research in Motion's resistance to giving governments access to its BlackBerry network misses a major point - authorities could probably hack the data on their own if they want it badly enough, security experts say.\u003cbr /\u003e\u003cbr /\u003eIndeed, a major attack against BlackBerry users by a telecom in the United Arab Emirates employed that very tactic a year ago, according to RIM. Experts say other malicious programs are likely to be lurking around, readying to be sprung.\u003cbr /\u003e\u003cbr /\u003eIndia, Lebanon, Saudi Arabia and the United Arab Emirates say they need RIM's cooperation so they can decode messages scrambled with BlackBerry's proprietary technology. They have threatened to restrict RIM's operations if the company won't meet their demands, which they say are driven by national security concerns.\u003cbr /\u003e\u003ca name\u003d'more'\u003e\u003c/a\u003e\u003cbr /\u003eBut if RIM doesn't back down, the governments themselves could instead choose to hack into the BlackBerry network.\u003cbr /\u003e\u003cbr /\u003e\"I could design a good hundred ways to gain access,\" said Bruce Schneier, a security expert who is chief security technology officer for BT.\u003cbr /\u003e\u003cbr /\u003eOfficials with Canada's RIM did not respond to a request for comment.\u003cbr /\u003e\u003cbr /\u003eSecurity experts say they'd almost certainly attack at the network's most vulnerable points: the BlackBerry smartphone itself and the BlackBerry server. Those two pieces of equipment sit at either end of the network where they offer would-be hackers access to unscrambled data.\u003cbr /\u003e\u003cbr /\u003eLast year's attack in the UAE is a good example of how a hacker might work. It employed spyware created by SS8, a closely held U.S. security firm, RIM says.\u003cbr /\u003e\u003cbr /\u003eEmirates Telecommunications Corp, the UAE's largest telecoms operator, sent the program to its BlackBerry disguised as a software update. It told its customers that it would enhance the performance of their equipment, but RIM says it was mainly intended to tap into their communications.\u003cbr /\u003e\u003cbr /\u003eThe telecom declined comment at the time.\u003cbr /\u003e\u003cbr /\u003eRIM said it quickly discovered the so-called \"malware\" because of a glitch in its implementation, and told users not to install it on their phones. But hackers might go undetected, experts say.\u003cbr /\u003e\u003cbr /\u003eTo prove the point, a security researcher named Tyler Shields released a spyware program earlier this year for attacking BlackBerries via the handset. It allows hackers to intercept messages that reach the device and use its microphone to tap conversations in the immediate vicinity of the phone.\u003cbr /\u003e\u003cbr /\u003e\"I wanted to demonstrate that BlackBerry handhelds are susceptible to spyware,\" said Shields, who works for the Burlington, Massachusetts-based security firm Veracode Inc.\u003cbr /\u003e\u003cbr /\u003eThe program, dubbed TXSBBSpy, did not include installation software as Shields never intended it to be used. He only wanted to show the BlackBerry was not unhackable.\u003cbr /\u003e\u003cbr /\u003eA successful attack on a Blackberry Enterprise Server could prove even more devastating because each server manages data for hundreds of users.\u003cbr /\u003e\u003cbr /\u003eHackers could write code to take advantage of vulnerabilities in the software that runs those servers, said Chet Wisniewski, senior security adviser at Sophos, anti-virus software maker. Such a program would allow outsiders to view messages from all the users hooked up to the computer via their handsets."},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://hypedtalk.blogspot.com/feeds/5136480914826576687/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.blogger.com/comment.g?blogID\u003d5403865830110720728\u0026postID\u003d5136480914826576687\u0026isPopup\u003dtrue","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/5136480914826576687"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/5136480914826576687"},{"rel":"alternate","type":"text/html","href":"https://hypedtalk.blogspot.com/2010/08/blackberry-network-can-be-hacked-say.html","title":"BlackBerry network can be hacked, say experts"}],"author":[{"name":{"$t":"Gee TEE"},"uri":{"$t":"https://www.blogger.com/profile/05453399516295661171"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-5403865830110720728.post-5560230108190945317"},"published":{"$t":"2010-08-01T10:05:00.000+05:30"},"updated":{"$t":"2010-08-01T10:05:35.263+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"privacy"},{"scheme":"http://www.blogger.com/atom/ns#","term":"internet"},{"scheme":"http://www.blogger.com/atom/ns#","term":"hacked"},{"scheme":"http://www.blogger.com/atom/ns#","term":"facebook"},{"scheme":"http://www.blogger.com/atom/ns#","term":"social network"}],"title":{"type":"text","$t":"Ron Bowes, the person who posted 100 Million Facebook user Details speaks out."},"content":{"type":"html","$t":"Ron Bowes, a Canadian security consultant, used a piece of code to scan Facebook profiles, collecting data not hidden by users' privacy settings.\u003cbr /\u003e\u003cbr /\u003eMr Bowes told BBC News that he did it as part of his work on a security tool.\u003cbr /\u003e\u003cbr /\u003e\"I'm a developer for the Nmap Security Scanner and one of our recent tools is called Ncrack,\" he said.\u003cbr /\u003e\u003cbr /\u003e\"It is designed to test password policies of organisations by using brute force attacks; in other words, guessing every username and password combination.\"\u003cbr /\u003e\u003cbr /\u003eBy downloading the data from Facebook, and compiling a user's first initial and surname, he was able to make a list of the most common probable usernames to use in the tool.\u003cbr /\u003e\u003ca name\u003d'more'\u003e\u003c/a\u003e\u003cbr /\u003eThe three most common names, he found, were jsmith, ssmith and skhan.\u003cbr /\u003e\u003cbr /\u003eIn theory, researchers could then combine this list with a catalogue of the most commonly used passwords to test the security of sites. Similar techniques could be used by criminals for more nefarious means.\u003cbr /\u003e\u003cbr /\u003eMr Bowes said his original plan was to \"collect a good list of human names that could be used for these tests\".\u003cbr /\u003e\u003cbr /\u003e\"Once I had the data, though, I realised that it could be of interest to the community if I released it, so I did,\" he added.\u003cbr /\u003e\u003cbr /\u003eMr Bowes confirmed that all the data he harvested was already publicly available but acknowledged that if anyone now changed their privacy settings, their information would still be accessible.\u003cbr /\u003e\u003cbr /\u003e\"If 100,000 Facebook users decide that they no longer want to be in Facebook's directory, I would still have their name and URL but it would no longer, technically, be public,\" he said.\u003cbr /\u003e\u003cbr /\u003eMr Bowes said that collecting the data was in no way irresponsible and likened it to a telephone directory.\u003cbr /\u003e\u003cbr /\u003e\"All I've done is compile public information into a nice format for statistical analysis,\" he said\u003cbr /\u003e\u003cbr /\u003eSimon Davies from the watchdog Privacy International told BBC News it was an \"ethical attack\" and that more personal information had not been included in the trawl.\u003cbr /\u003e\u003cbr /\u003e\"This is a reputational and business issue for Facebook, for now,\" he said\u003cbr /\u003e\u003cbr /\u003e\"They can continue to ride the risk and hope nothing cataclysmic occurs, but I would argue that Facebook has a special responsibility to go beyond doing the bare minimum,\" he added.\u003cbr /\u003e\u003cbr /\u003e- BBC Inputs"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://hypedtalk.blogspot.com/feeds/5560230108190945317/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.blogger.com/comment.g?blogID\u003d5403865830110720728\u0026postID\u003d5560230108190945317\u0026isPopup\u003dtrue","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/5560230108190945317"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/5560230108190945317"},{"rel":"alternate","type":"text/html","href":"https://hypedtalk.blogspot.com/2010/08/ron-bowes-person-who-posted-100-million.html","title":"Ron Bowes, the person who posted 100 Million Facebook user Details speaks out."}],"author":[{"name":{"$t":"Gee TEE"},"uri":{"$t":"https://www.blogger.com/profile/05453399516295661171"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-5403865830110720728.post-6126883617644498964"},"published":{"$t":"2010-07-09T08:00:00.000+05:30"},"updated":{"$t":"2010-07-09T08:00:18.412+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"cyber attacks"},{"scheme":"http://www.blogger.com/atom/ns#","term":"internet"},{"scheme":"http://www.blogger.com/atom/ns#","term":"hacked"}],"title":{"type":"text","$t":"Pirate Bay Hacked by Argentina Hacker."},"content":{"type":"html","$t":"An Argentinian hacker named \u003ca href\u003d\"http://insilence.biz/2010/07/multiple-sql-injections-on-the-pirate-bay/\" target\u003d\"_blank\"\u003eCh Russo\u003c/a\u003e claims that he and two associates have  found several SQL injection vulnerabilities in The Pirate Bay’s  database, which granted him access to all user information, including  usernames and e-mails.\u003cbr /\u003e\u003cbr /\u003eAccording to \u003ca href\u003d\"http://krebsonsecurity.com/2010/07/pirate-bay-hack-exposes-user-booty/#more-3337\" target\u003d\"_blank\"\u003eKrebsOnSecurity\u003c/a\u003e, who spoke with Ch Russo on the  phone, the hackers did not modify the user data or give it away to a  third party. They did, as they say, consider how much this info would be  worth to various anti-piracy outfits such as the RIAA.\u003cbr /\u003e\u003cbr /\u003e“Probably these  groups would be very interested in this information, but we are not to sell it. Instead we wanted to tell people that their  information may not be so well protected,” Ch Russo said.\u003cbr /\u003e\u003ca name\u003d'more'\u003e\u003c/a\u003e\u003cbr /\u003eIt seems  that the vulnerability has been at least partially patched however, as  Russo said the website component that gives access to The Pirate Bay’s  database has been removed. Furthermore, The Pirate Bay site is currently  down, sporting the following message: “Upgrading some stuff, database  is in use for backups, soon back again.. Btw, it’s nice weather outside I  think.”"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://hypedtalk.blogspot.com/feeds/6126883617644498964/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.blogger.com/comment.g?blogID\u003d5403865830110720728\u0026postID\u003d6126883617644498964\u0026isPopup\u003dtrue","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/6126883617644498964"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/5403865830110720728/posts/default/6126883617644498964"},{"rel":"alternate","type":"text/html","href":"https://hypedtalk.blogspot.com/2010/07/pirate-bay-hacked-by-argentina-hacker.html","title":"Pirate Bay Hacked by Argentina Hacker."}],"author":[{"name":{"$t":"Gee TEE"},"uri":{"$t":"https://www.blogger.com/profile/05453399516295661171"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"thr$total":{"$t":"0"}}]}});