as
test
Earlier this week, Apple announced the much awaited iOS 4.2 update for the iPad. It brings tons of new features to iPad like Multitasking
Few days ago we reported about a new USB Modchip called PS Jailbreak for PlayStation 3 which enables you to dump games off original discs on the internal or any external drive connected to PS3 How to Downgrade iOS 4.2 to 4.1 / 4.0.2 / 4.0.1 on iPhone 4, 3GS, 3G and iPad
iOS 4.2 was released earlier today. Just like iOS 4.1 and iOS 4.0.2, the new iOS 4.2 at the moment is not jailbreakable. Android 2.2 Froyo for HTC EVO 4G is Now Officially Available for Download
TC has finally rolled out Android 2.2 Froyo for HTC EVO 4G on Sprint. The image is available as direct download from HTC’s website. Here is the official description from Sprint It’s here! Download Internet Explorer 9 Now !
Microsoft has finally taken the wraps off its shiny new web browser: Internet Explorer 9. The beta version of IE 9 is now available for download for users running both 32 and 64-bit versions of Windows 7 and Vista. BlackBerry Torch review
When we began our review of the BlackBerry Torch (aka the Bold 9800), our hearts were all aflutter. The leaked shots we'd been seeing of some kind of Palm Pre-esque RIM slider Epic 4G review
Of the seemingly countless variants of the Galaxy S that Samsung's in the process of deploying around the globe, one stands out in a couple very unique (and important) ways: Sprint's Epic 4G You Can Now Run Windows 7 and Linux on iPhone, iPod touch and iPad, Sort of.
While you won’t be ever able to run a full-blown modern desktop OS like Windows or Linux on your iOS gadget anytime soon, but with virtual-machining software Parallels Desktop for Mac Apple Releases New iPod touch 4G and iPod nano 6G Ads [Video]
Earlier today, Apple overhauled the entire iPod lineup for fall 2010, bringing iPhone 4 Download Limera1n to Jailbreak iOS 4.1 on iPhone 4, 3GS, iPad, iPod touch 4G
Its here folks! and its real!! Geohot is back big time with limera1n jailbreak for all iOS devices including: iPhone 4, iPhone 3GS, iPad, iPod touch 4G / 3G / 2G, untethered running iOS 4.1. PwnageTool 4.1 for Jailbreaking Apple TV 2G, iPhone 4, iPad and iPod touch 4G Now Available for Download
The iPhone Dev Team has finally released PwnageTool 4.1 which is based on recently releasedLimera1n Geohot’s bootrom-based exploit. Shocking! Apple Approves BitTorrent App for iPhone and iPod touch !
After Apple relaxed its App Store restrictions, the first of apps that benefitted from this were Google Voice clients (like GV Connect and GV Mobile+)
Last month, Google announced to withdraw its services from mainland China following a series of sophisticated and coordinated hacking attacks dubbed as Operation Aurora, which targeted human rights activists’ Gmail accounts. These attacks originated from China and hence dismayed the authorities at Google who threatened, saying that it could no longer censor its search results on the Chinese version of Google homepage Google.cn.
The Google China fiasco then took a new turn when Google in a secret counter-offensive encounter managed to hack the Chinese hackers back by breaking into the source computer in Taiwan which was involved in these attacks. Google engineers also found out some evidence which indicated that the attacks were actually originated from mainland China and were possibly orchestrated by the Chinese government.
Now a leading computer forensic firm has provided the closest inside look at the nature of these attacks and attackers that had struck Google and others major US companies. The report though didn’t mention Google by name, or any other company for that matter, but focused mainly on information gathered from several forensic investigations the firm has conducted that are identical to what we know about the Google hack.
Here is a quick breakdown (courtesy Sebastian Anthony of Download Squad) of the report published by Wired on these attacks that employed against targets such as Google, U.S. Oil companies, defense contractors and counter-terrorism departments.
The worst thing and perhaps the most scariest aspect of these attacks is that it’s almost impossible to detect or predict the occurrence of such an attack. Is this the beginning of the cyber war that we all have been fearing for years? In any case, lets hope that we have a proper counter plan against occurence of these attacks in future. [via Wired]
- A new form of attack is being leveraged by hackers, called Advanced Persistent Threats (APT) –think of APT as a ‘ticking bomb’, an apparently-benign piece of software that can be turned on at any time. These APTs can avoid detection and remain dormant for months or years, only turning on when the ‘coast is clear’. In this most recent case, an unpatched zero-day attack on Internet Explorer 6 was the entry point.
- These attacks are theft-oriented — the sole purpose behind these APT attacks are to get at sensitive data: email, Word documents, Powerpoint presentations, spreadsheets, etc. Corporate secrets, counter-intelligence, you name it.
- ‘Spear-phishing’ provides the way in — spear phishing is a ‘targeted’ attack where email, chat or other communication tools are used to trick individuals in a position of power. In this case, a campaign of phishing attacks tailored towards getting a counter-terrorism official’s password was successful. Once you have a way in — malware, via the high-ranking and high-clearance user — it’s much easier to get more data…and so the web of exploited and compromised machines and accounts grows!
- A very clever way of sending the data back home — once the network and users have been compromised and the data harvested, it has to be sent back. In these advanced APT attacks, data is compressed and then slowly leaked out of the home network using false headers and custom protocols sent over obscure or misleading ports (SSL, in this case).
You can follow us on twitter or join our facebook fanpage to keep yourself updated on all the latest from Apple, Google and Microsoft.
(from internet)