However, it was an easy problem to solve #rpm –import http://elrepo.org/RPM-GPG-KEY-elrepo.org before downloading the required RPM file: – #rpm -Uvh http://elrepo.org/elrepo-release-6-4.el6.elrepo.noarch.rpm and installing the HFS+ drivers: – # yum install
you can block most of the ads and pop ups from sites by blocking them in local DNS file simply open terminal and edit thisfile $ sudo vi /private/etc/hosts
The problem arises when someone other than me makes a folder in this shared directory. No one but the person who made that folder can write into it, not even
Squid https transparent proxy setup with SSL certificate Let’s understand first how squid proxy works in transparent mode. While setting up squid as a transparent proxy we can forward the
The latest tweet from the hacker shows he compromised the database containing username and password details belong to these websites "The database of #MileyCyrus, #SelenaGomez......etc with 2,5 million users and pass is for sell, anyone interested email me at my mail"
The hacker told E Hacking News that he found multiple vulnerabilities in the Groundctrl website and gained access to the database server.
He also gained access to the CMS panel which manages the celebrities' websites.
|GroundCtrl CMS Panel|
The affected websites include Miley Cyrus official site(mileycyrus.com), Selena Gomez(selenagomez.com), Taylor Swift site(taylorswift.com), Britney Spears site(britneyspears.com).
We are able to confirm that these are official websites of the celebrities, as it is being linked from their twitter account.
According to hackers twitter account(@Eth_Spectrum), he hacked into the above mentioned websites on March 8th. The website was restored after the breach. However, hacker mentioned he once again managed to deface them. ]
Other websites attacked by the hacker are Ground Ctrl(groundctrl.com), mypinkfriday.com, Chelsea Handler site (chelseahandler.com), Aaron Lewis(aaronlewismusic.com/), therealcocojones.com, christinagrimmieofficial.com, Kacey Musgraves(kaceymusgraves.com).
The defacement just reads "Why i hacked this site, you can ask this person email@example.com".
Greg Patterson is the co-founder of the Groundctrl, an organization that build websites for artists. It appears the security breach started from Groundctrl.
Other affected sites:
- Pat Green(patgreen.com),
- Rob Thomas(robthomasmusic.com),
- Rock Mafia(rockmafia.com ),
- ritawilson.com ,
All of the affected websites are currently showing the maintenance error message except groundctrl official website.
Hacker didn't provide much information about the breach, so we are not sure how exactly he hacked into all of these websites, whether he found a zero-day exploit on the cms developed by groundctrl or all of the affected sites managed in a central place.
Church conducts a background check for employees and volunteers where they are asked to give their Social Security numbers, which will be stored in a database.
According to reports, this database has been compromised by attackers which reportedly affects more than 90,000 employees and volunteers.
The Archdiocese has reported the data breach to the FBI and IRS. A cyber forensic team is trying to determine the source of the breach.
Those who think they might have been affected are advised to contact the IRS identity protection specialized unit.
Normally, Tweets from protected accounts can't be seen by public user; One should get approval from the account holder to view the protected tweets.
This bug could allow anyone to view hidden tweets by getting SMS or push notification from the accounts.
The microblogging firm said a member of white hat security community helped them to discover and diagnose the bug. According to its blog post, the bug is there since November 2013.
"As part of the bug fix, we’ve removed all of these unapproved follows, and taken steps to protect against this kind of bug in the future."
The bug affects around 93,788 protected accounts. Twitter has sent mail to all affected users to inform about the bug and apologize.
Justin Bieber official twitter account which has more than 50 million followers has been hijacked by attackers to spread spam links from the account.
The attacker posted a tweet saying "Justin Bieber Cemberut? [Malicious link] " ( Cemberut is Indonesian word, it means 'Sullen').
The shortened link provided in the tweet leads to a .tk domain 'rumahfollowers[.]tk'. At the time of writing, we are not able to access the site. So, we are not able to determine exactly what has been delivered to users.
More than 13k users have favorited the spam tweets and over 7,000 users have re-tweeted them. It means thousands of users might have followed the link and affected by this spam.
It is worth to note that this is not the first time his account being hijacked by attackers. We are not sure how this time the account get compromised by the attacker.
His team managed to recover the account and posted saying " all good now, we handled it".
If your website is running Joomla 3.2.2, you should upgrade your CMS to the latest version.
A new version of Joomla v3.2.3 has been released to address more than 40 bugs and four security vulnerabilities.
One of the patched security flaws is SQL Injection, caused by Inadequate escaping, rated as High severity bug. It affects versions 3.1.0 through 3.2.2.
Other two security bugs are Cross site scripting vulnerabilities, which have been rated as Medium severity bugs.
The last one allows unauthorized logins via GMail authentication, caused by inadequate checking. It affects versions 2.5.8 and earlier 2.5.x and 3.2.2 and earlier 3.x.
It doesn't matter whether you do care about the 40 bugs but you always should consider the security fixes. So, better update your cms immediately before attackers informing you by hacking your site.