Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

Tech News


Google Account Recovery Vulnerability

Global Main Authentication and Identification Library (GMAIL) If I told you to think of the most sensitive features (security-wise) in a web application, you would probably say – Login. Well if your definition of \"Login\" does not include password recovery, then it would definitely be the second one. This means, that password recovery is often in the center of attention for attackers – and for security professionals. So let\'s say you are using Paypal, Facebook or Twitter, and you forgot your password (shit happens, right?). They will ask you to put your email in a nice input box, and wait until you get a password recovery link. If you\'re using Gmail (hey, who are you trying to fool? – you are!), it is the tool you recover passwords with, for every other application out there. Did you ever stop and ask what does GMAIL stand for? It’s the Global Main Authentication and Identification Library. Seriously, if someone got access to your Gmail account, he can \"password recover\" his way to any other web/mobile application out there (!). More about this can be viewed on a video by \"security researcher\" Don Friesen http://www.youtube.com/watch?v=2tJ-NSPES9Y. What about the password recovery of your Gmail account? It\'s the password recovery for all the other password recoveries. According to the security jargon, it is a Mega-mega-mega-mega-password-recovery. A lot of nasty hacker\'s out there would love to find some holes in this fortress, that\'s why I decided to take a quick look at it.

Google blasted over YouTube virus links fiasco

Google has been slammed for its handling of its updated YouTube video commenting system, and for giving malicious users free rein to post links to phishing sites and spam. Content creators and one of YouTube\'s co-founders have rejected the changes, which require commenters to use a Google+ account in order to post comments. When Google unveiled the changes last week, the firm said it wanted \"comments you care about to rise to the top\", but so far many of the site\'s most popular videos have been plagued with shortened URLs linking to spam, so-called \"screamers\" - websites which play loud noises to scare users - and phishing sites. Previously, YouTube\'s comments were mostly shown in chrononlogical order rather than through any sort of priory algorithm. Previously, URLs were blocked entirely from comments, but with Google\'s latest change, any links can be posted. Furthermore, an increased character limit meant users were able to post scripts of entire Shakespeare plays without issue. Comments that receive many replies appear to rise to the top of the section, resulting in comments that receive many angry responses from users gaining as much priority as those which promote discussion.

Kaspersky claims Stuxnet infected a Russian nuclear plant

Security Firm Kaspersky has claimed that the infamous Stuxnet computer worm \"badly infected\" the internal network of an unnamed Russian nuclear plant after it caused chaos in Iran\'s nuclear facilities. Speaking at a keynote presentation given at the Canberra Press Club 2013, Kaspersky CEO Eugene Kaspersky said a staffer at the unnamed nuclear plant informed him of the infection. \"[The staffer said] their nuclear plant network which was disconnected from the internet was badly infected by Stuxnet,\" Kaspersky said. \"So unfortunately these people who were responsible for offensive technologies, they recognise cyber weapons as an opportunity.\"

GCHQ spoofed LinkedIn and Slashdot to target network engineers

British intelligence agency Government Communications Headquarters (GCHQ) reportedly used spoofed LinkedIn and Slashdot pages to compromise the computers of network engineers working for global roaming exchange providers based in Europe. Special teams from GCHQ\'s My Network Operations Centre (MyNOC) division identified key employees doing network maintenance and security at the targeted companies and determined which of them were users of LinkedIn or Slashdot.org. The teams then directed the targeted individuals to fake versions of those sites which contained malicious code designed to install malware on their computers, German magazine Der Spiegel reported based on secret GCHQ documents leaked by former U.S. National Security Agency (NSA) contractor Edward Snowden. The technology used for these computer infiltration operations is called \"Quantum Insert\" and according to past media reports it was also used by the NSA. GCHQ used this system to target network engineers from Belgian telecommunications provider Belgacom as part of an operation called \"Socialist,\" as well as the employees of \"international mobile billing clearinghouses\" as part of a separate operation called \"Wylekey,\" Der Spiegel reported. Services provided by these clearinghouse companies are used by mobile operators to streamline the process of roaming administration and billing, giving those companies access to a large quantity of data about mobile connections.

Israeli Road Control System hacked

Israel is considered one of the most advanced country in cyber security, but at the same time is a privileged target for hostile governments intent in sabotage and cyber espionage on his technology. Yesterday, Cybersecurity experts revealed that a major artery in Israel\'s national road network located in the northern the city of Haifa suffered a cyber attack, that caused massive traffic congestion in the City. Isreal military officials are aware of cyber threats that could hit the infrastructure of the country and they afraid the possible effect of a cyber attack on a large scale. Israeli government websites suffer thousands of cyberattacks each day according Ofir Ben Avi, head of the government\'s website division. The Israel Electric Corp. confirmed that its servers register about 6,000 unique computer attacks every second. In June, Prime Minister Benjamin Netanyahu stated that Iran militia, Hezbollah and Hamas have targeted in numerous occasions Israel\'s \"essential systems,\" including its water facilities, electric grid, trains and banks. \"Every sphere of civilian economic life, let\'s not even talk about our security, is a potential or actual cyber attack target,\" said Netanyahu. Israel\'s military chief Lt. Gen. Benny Gantz made a high-profile speech recently outlining that within the greatest threats his country might face in the future there is the computer sabotage as a top concern. A sophisticated cyber attack could be used to shut down a banking system of Israel, the national electric grids or a defense system, this is a nightmare for the Defense.

Its not just you, Google sync servers are down

\"Google sync servers are DOWN, The end of the WORLD is nigh\" Well that\'s it folks the end so long thanks for sticking around and well good bye......