SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
n|u –The Open Security Community
Trivandrum Chapter
Security Bytes – July 2013
By
Pranav (sh3rl0ck@null.co.in)
1
“Edward Snowden files” has blueprint of NSA
surveillance programs
• Edward Snowden has enough information
to cause more damage to the US
government in a minute alone than anyone
else has ever had in the history of the
United States, but he has insisted that they
not be mage public, including the blue
prints of NSA surveillance program. Glenn
Greenwald, the Guardian Journalist , who
was the first to report this, says Snowden
has an "instruction manual for how the
NSA built"
2
And got nominated for Nobel Prize !!!
• Edward Snowden has helped to make the world a little
better and safer. A Swedish professor of sociology has
nominated NSA whistle-blower Edward Snowden for the
2014 Nobel Price.
• In his letter to the Nobel Committee, Sociology Professor
Stefan Svallfors recommended Snowden, for his "heroic
effort at a great personal cost" shedding light on the
expansive cyber spying conducted by the NSA.
3
New Anonimizing Tool - Tortilla
• Tortilla provides a secure,
anonymous means of routing
TCP and DNS traffic through
Tor regardless of client
software and without the
need for a VPN or secure
tunnel.
4
New Anonimizing Tool - Tortilla
• Redeems the bad aspects of Tor
• No additional hardware or VM to support SOCKS proxy
• Unveiling at ‘Black Hat’ Las Vegas in two weeks
• Releasing as Open Source Tool
5
Signal Booster into Mobile Hacking Machine
• A group of hackers from Security
firm iSEC tapped into Verizon
wireless cell phones using a signal-
boosting devices made by
Samsung to Verizon and cost about
$250.
6
• The network Extender turns into miniature cell phone tower.
• Fits inside a backpack.
• Capable of capturing and intercepting calls, texts and data
• Declined to disclose how they modified the software. 
• Plans to give demos in various hacking cons this year. 
7
Signal Booster into Mobile Hacking Machine
True Caller Hacked by Syrian Electronic Army
• True Caller, a popular app, the
world's largest collaborative
phone directory compromised
by Syrian Electronic Army
hackers.
8
• Was running an outdated Version of WordPress(3.5.1)
• Contains millions of access codes of Facebook, Twitter, Linkedin, Gmail
accounts.
• Hackers downloaded 7 databases of 450GB in size.
• True Caller website still under maintenance.
• Stop Using such Apps which harvest our data and violates our privacy.
9
True Caller Hacked by Syrian Electronic Army
Anonymous hackers expose U.S FEMA contractors
• Anonymous hackers broken into Federal
Emergency Management Agency(FEMA)
servers and leaked the database includes
names, addresses and other information of
FEMA contractors, federal agents and local
authorities.
10
• In their message anonymous said " This is a message to FEMA, to various world
governments and to their complicit corporate lackeys as to the 2.5 regular
people who use the internet and have found that their right to privacy has
been utterly destroyed"
• They stated : “This leak is dedicated to our fallen comrades, allies and those
who fight for the same causes as us. For Jeremy Hammond, for weev, for
Edward Snowden, for everyone who has risked and continues to risk their
freedom for their belief in a world free from constant, invasive surveillance.”
11
Anonymous hackers expose U.S FEMA contractors
Hacking Google Glass with Malicious QR code
• Researchers at mobile security firm Lookout discovered
a security flaw in Google Glass which allowed them to
capture data without user's Knowledge, when the user
merely took a photo that captured a malicious QR code.
• The problem was that Google could be told to execute a
QR code without the user having to give permission.
Because of Glass's limited user interface. Google set up
the device's camera to automatically process any QR
code in a photograph.
12
13
Hacking Google Glass with Malicious QR code
Tango website hacked by Syrian Electronic Army
• Syrian Electronic Army hacked into Tango.me and compromised more than 1.5 TB
Daily backup of the servers.The databases is reportedly contains more than millions
of the Application users phone numbers and contacts and their emails.
• "Sorry @TangoMe, We needed your database too, thank you for it! http://tango.me
#SEA #SyrianElectronicArmy" The tweet posted by Syrian Electronic Army.
• The Hackers breached the Tango.me with same method- The outdated Wordpress
CMS allowed them to gain unauthorized access to the database server.
14
E-Hack 2013
• E-HACK, will be the largest ever workshop
on Information Security on 27-28th July .
• You’ll be on The Indian Book of Records,
The Asian Book of Records and The
Guinness Book of World Records
• Workshop
• Capturing The Flag(CTF)
15
Sources :
• www.thehackernews.com
• www.ehackingnews.com
• www.news.cnet.com/security/
16
17

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
AusCERT - Mikko Hypponen
AusCERT - Mikko HypponenAusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
 
Hacking
HackingHacking
Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Hacking
HackingHacking
Hacking
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber Realism
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 

Ähnlich wie NSA Surveillance Programs Blueprint in Snowden Files

NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017chauhananand17
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital Worldalxdvs
 
Security News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreSecurity News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreInMobi Technology
 
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniquesNSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniquesMichael Holt
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generationTony Lauro
 
Security News Byes- Nov
Security News Byes- NovSecurity News Byes- Nov
Security News Byes- Novprashsiv
 
Syrian Malware
Syrian MalwareSyrian Malware
Syrian MalwareKaspersky
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed webNitish Joshi
 
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Cyphort
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveIvan Sang
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Andrew Hammond
 
Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Apurv Singh Gautam
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet ReportAhmed Mater
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 

Ähnlich wie NSA Surveillance Programs Blueprint in Snowden Files (20)

News Bytes June 2012
News Bytes June 2012News Bytes June 2012
News Bytes June 2012
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
 
Security News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet BangaloreSecurity News Bytes Null Dec Meet Bangalore
Security News Bytes Null Dec Meet Bangalore
 
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniquesNSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generation
 
Security News Byes- Nov
Security News Byes- NovSecurity News Byes- Nov
Security News Byes- Nov
 
Syrian Malware
Syrian MalwareSyrian Malware
Syrian Malware
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
 
Security Bytes - null Trivandrum Meet-august 2013
Security Bytes - null Trivandrum Meet-august 2013Security Bytes - null Trivandrum Meet-august 2013
Security Bytes - null Trivandrum Meet-august 2013
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...
 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto Gold
 
Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)
 
Hackers
HackersHackers
Hackers
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 

Mehr von n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

Mehr von n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Kürzlich hochgeladen

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 

Kürzlich hochgeladen (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

NSA Surveillance Programs Blueprint in Snowden Files

  • 1. n|u –The Open Security Community Trivandrum Chapter Security Bytes – July 2013 By Pranav (sh3rl0ck@null.co.in) 1
  • 2. “Edward Snowden files” has blueprint of NSA surveillance programs • Edward Snowden has enough information to cause more damage to the US government in a minute alone than anyone else has ever had in the history of the United States, but he has insisted that they not be mage public, including the blue prints of NSA surveillance program. Glenn Greenwald, the Guardian Journalist , who was the first to report this, says Snowden has an "instruction manual for how the NSA built" 2
  • 3. And got nominated for Nobel Prize !!! • Edward Snowden has helped to make the world a little better and safer. A Swedish professor of sociology has nominated NSA whistle-blower Edward Snowden for the 2014 Nobel Price. • In his letter to the Nobel Committee, Sociology Professor Stefan Svallfors recommended Snowden, for his "heroic effort at a great personal cost" shedding light on the expansive cyber spying conducted by the NSA. 3
  • 4. New Anonimizing Tool - Tortilla • Tortilla provides a secure, anonymous means of routing TCP and DNS traffic through Tor regardless of client software and without the need for a VPN or secure tunnel. 4
  • 5. New Anonimizing Tool - Tortilla • Redeems the bad aspects of Tor • No additional hardware or VM to support SOCKS proxy • Unveiling at ‘Black Hat’ Las Vegas in two weeks • Releasing as Open Source Tool 5
  • 6. Signal Booster into Mobile Hacking Machine • A group of hackers from Security firm iSEC tapped into Verizon wireless cell phones using a signal- boosting devices made by Samsung to Verizon and cost about $250. 6
  • 7. • The network Extender turns into miniature cell phone tower. • Fits inside a backpack. • Capable of capturing and intercepting calls, texts and data • Declined to disclose how they modified the software.  • Plans to give demos in various hacking cons this year.  7 Signal Booster into Mobile Hacking Machine
  • 8. True Caller Hacked by Syrian Electronic Army • True Caller, a popular app, the world's largest collaborative phone directory compromised by Syrian Electronic Army hackers. 8
  • 9. • Was running an outdated Version of WordPress(3.5.1) • Contains millions of access codes of Facebook, Twitter, Linkedin, Gmail accounts. • Hackers downloaded 7 databases of 450GB in size. • True Caller website still under maintenance. • Stop Using such Apps which harvest our data and violates our privacy. 9 True Caller Hacked by Syrian Electronic Army
  • 10. Anonymous hackers expose U.S FEMA contractors • Anonymous hackers broken into Federal Emergency Management Agency(FEMA) servers and leaked the database includes names, addresses and other information of FEMA contractors, federal agents and local authorities. 10
  • 11. • In their message anonymous said " This is a message to FEMA, to various world governments and to their complicit corporate lackeys as to the 2.5 regular people who use the internet and have found that their right to privacy has been utterly destroyed" • They stated : “This leak is dedicated to our fallen comrades, allies and those who fight for the same causes as us. For Jeremy Hammond, for weev, for Edward Snowden, for everyone who has risked and continues to risk their freedom for their belief in a world free from constant, invasive surveillance.” 11 Anonymous hackers expose U.S FEMA contractors
  • 12. Hacking Google Glass with Malicious QR code • Researchers at mobile security firm Lookout discovered a security flaw in Google Glass which allowed them to capture data without user's Knowledge, when the user merely took a photo that captured a malicious QR code. • The problem was that Google could be told to execute a QR code without the user having to give permission. Because of Glass's limited user interface. Google set up the device's camera to automatically process any QR code in a photograph. 12
  • 13. 13 Hacking Google Glass with Malicious QR code
  • 14. Tango website hacked by Syrian Electronic Army • Syrian Electronic Army hacked into Tango.me and compromised more than 1.5 TB Daily backup of the servers.The databases is reportedly contains more than millions of the Application users phone numbers and contacts and their emails. • "Sorry @TangoMe, We needed your database too, thank you for it! http://tango.me #SEA #SyrianElectronicArmy" The tweet posted by Syrian Electronic Army. • The Hackers breached the Tango.me with same method- The outdated Wordpress CMS allowed them to gain unauthorized access to the database server. 14
  • 15. E-Hack 2013 • E-HACK, will be the largest ever workshop on Information Security on 27-28th July . • You’ll be on The Indian Book of Records, The Asian Book of Records and The Guinness Book of World Records • Workshop • Capturing The Flag(CTF) 15
  • 16. Sources : • www.thehackernews.com • www.ehackingnews.com • www.news.cnet.com/security/ 16
  • 17. 17