Italian Cyber Police Attacked By Anonymous And Lulzsec

It appears that hacker groups Anonymous and Lulzsec have taken a pledge to attack each and every security agency of the world. After FBI and CIA, they have now attacked Italian Cyber Police’s website and published their confidential data on their website.

The Cyber Security Unit admitted that they’ve been attacked but they didn’t comment whether any sensitive data has been stolen. On the other side, hackers claimed that they have had access to very sensitive data and in order to prove this, they published a series of documents as it is a custom of Lulzsec and Anonymous to release all the data they get access to.

The hackers claim that they’ve stolen 8 MB of sensitive data which contains Italian relations with Australia, Belarus, Egypt, Russia and Ukraine.

It should be noted that this attack come immediately after Anonymous and Lulzsec promised to make the security agencies pay back after they raided and arrested several Anonymous members.

Lulzsec announced last month that it would discontinue its hacking activities after an arrest was maid in UK. But it has continued its alliance with Anonymous which is known as AntiSec(Anti Security).

The increased number of cyber attacks by these two groups have put security agencies in turmoil. The total strength of these groups remains unknown. They’ve targeted every big name ranging from Sony, Nintendo, Apple Inc. to the security agencies like CIA and FBI.

When will they stop?

Photo Courtesy of Matt Westervelt
Photo Courtesy of ell brown

Advertisements

Google To Warn Users About Malware Infection

Google is going to start a new service through which it will warn users if their computer has been infected with malware. This service will help users to check whether their web searches have been hijacked to spy on them.

According to an official Google blog post, this malware routes web traffic through a small number of proxies. This malware was detected during the routine maintenance of one of Google’s data centers.

Damian Menscher, a Google security engineer said that,”After collaborating with security engineers at several companies that were sending this modified traffic, we determined that the computers exhibiting this behavior were infected with a particular strain of malicious software, or ‘malware’.”

Though according to Google, they are introducing this feature to help users but we think that it will also let malware authors to replicate and write various fake notifications and that is not a hard task. They can misdirect a user to follow their commands and ultimately the user will find himself amidst malicious code.

The question here arises that how can Goggle possibly tell whether a computer has been infected or not. The answer , according to the Google official blog, is that only those users will be notified who appear to be routed through proxy servers to use Google services.

This step taken by Google is undoubtedly good but still it will be a pretty hard task for users to identify a legitimate notification as we already know that there are tons of infected sites which claim to provide the same notification.

Photo Courtesy of bfishadow
Photo Courtesy of mightykenny