A Teenage Boy from Melbourne Hacks into Apple’s Mainframe.

A Teenage Boy from Melbourne Hacks into Apple’s Mainframe.

A 16-year-old boy, who aspired to work for the US giant, Apple, hacked into its mainframe system from his suburban home in Melbourne, Australia.


A few internal files were accessed by the boy and according to the hearing of the court in Melbourne the information that was hacked was stored in a folder named, “hacky hack hack”. The boy’s name is behind the curtains yet as he is a juvenile offender.
According to the boy’s lawyer, he hoped to work for Apple one day and had a high regard for the company which is why he hacked into the system on numerous points over the span of a year.

The company regarded the security breach and had informed the FBI, which further forwarded the matter to the Australian Federal Police. An AFP raid was made on the boy’s family, as a result of which, two laptops, a mobile phone and a hard drive were found. Ninety (90) gigabytes of secure files and customer accounts were downloaded by the 16- year- old.

As per what the spokesman of the Apple Company said, the information security personnel had realized the illegal access and had reported the incident to the law enforcement. He also made a statement where he assured the customers that their personal data was still safe with the company. The specific details of the case were not mentioned. The boy was inclined towards bragging about his actions on the instant messaging application, WhatsApp.

The court’s spokesperson said that the 16-year-old boy would be sentenced on 20th September and when asked to comment further, the spokesperson refused. The AFP too rebuffed the request for a statement.

Former Microsoft engineer sent behind bars for money laundering

Raymond Odigie Uadiale, age 41, is great with computers. Good enough to be hired by Microsoft as a network engineer. And good enough, according to the feds, to run a virus scamming ring that froze computers via a fake warning from the Federal Bureau of Investigation, charged people a $200 "fine" to unlock their laptops, and warned users they might be sent to prison if they didn't pay up.

Instead, it's Uadiale who's going to jail. The US Department of Justice (DoJ) announced Tuesday that Uadiale of Maple Valley, Washington, pled guilty to two counts of money laundering after admitting that while he was a Florida International University grad student, he was secretly running a computer "ransomware" scam that used a virus called "Reveton" to lock people's computers and demanded money to unlock them. Uadiale, who also went by the name "Mike Roland," will serve 18 months in prison after laundering nearly $100,000 to a co-conspirator in the United Kingdom identified only by the online handle "K!NG."

Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division, U.S. Attorney Benjamin C. Greenberg for the Southern District of Florida and Special Agent in Charge Matthew J. DeSarno of the FBI Washington Field Office’s Criminal Division, made the announcement.

“By cashing out and then laundering victim payments, Raymond Uadiale played an essential role in an international criminal operation that victimized unsuspecting Americans by infecting their computers with malicious ransomware,” Assistant U.S. Attorney General Brian Benczkowski announced. Uadiale pleaded guilty June 4.

The indictment charged Uadiale with one count of conspiracy to commit money laundering and one count of substantive money laundering. As part of the plea agreement, the government dismissed the substantive count. In addition to his prison sentence, Uadiale was also sentenced to three years of supervised release.

The ransomware in question executes on PCs and encrypts system files. A message is then shown on the home screen which claims that the user has violated federal law and downloaded illegal content.

Mozilla Extirpates 23 Firefox Add-Ons




Yesterday, Mozilla had extirpated 23 Firefox add-ons that pried in on clients and sent their information to remote servers, as affirmed by the Bleeping PC.

The blocked add-ons even incorporate "Web Security," the security-centric add-on with more than 220,000 users, which was found sending users' browsing histories to a server situated in Germany and remained at the centre of a controversy this week.

At the time, Mozilla engineers guaranteed that they would audit the add-on's conduct. Be that as it may, following the underlying report, a few users announced other add-ons displaying identical data collection patterns, some of which sent data to the same server as "Web Security".

"The mentioned add-on has been taken down, together with others after I conducted a thorough audit of [the] add-ons, these add-ons are no longer available at AMO and [have been] disabled in the browsers of users who installed them," says Mozilla Browser Engineer and Add-on reviewer, Rob Wu.

Remaining true to its word though, after a brisk test, Mozilla incapacitated the Web Security add-on in a Firefox instance Bleeping Computer utilized two days ago for tests and made sure that users of any of the restricted add-ons will be displayed a warning in this way:



A bug report incorporates the rundown of each of the 23 add-ons by their IDs, and not by their names, in spite of this fact Bleeping Computer has successfully tracked down the names of some additional items.

Other than Web Security, other restricted add-ons incorporate Browser Security, Browser Privacy, and Browser Safety. These have been sending information to an indistinguishable server as Web Security, situated at 136.243.163.73.

As indicated by a rundown gave to Bleeping Computer by Wu, other banned add-ons include:

YouTube Download & Adblocker Smarttube
Popup-Blocker
Facebook Bookmark Manager
Facebook Video Downloader
YouTube MP3 Converter & Download
Simply Search
Smarttube - Extreme
Self-Destroying Cookies
Popup Blocker Pro
YouTube - Ad block
Auto Destroy Cookies
Amazon Quick Search
YouTube Adblocker
Video Downloader
Google No Track
Quick AMZ

More than 500,000 users had atleast one of these add-ons installed inside their Firefox browser.
In the warning message above, Mozilla diverts users to this page for clarifications,

Sending user data to remote servers unnecessarily, and potential for remote code execution. Suspicious account activity for multiple accounts on AMO.



Deadly threat for Intel devices


The updated Intel -powered smart devices, of late, have started grappling with a Spectre-like fatal flaw forcing the cyber security fraternity to engage in research in search of an effective mechanism to counter the threat causing concern for millions of users.
Identified as 'Foreshadow, it is exploited by the hackers to get access to details of password, encryption apart from other sensitive data stored in the device to be used as situation warrants.

 Cyber security experts engaged in the top firms say till the other day Spectre Meltdown was the most dangerous and deadly for the smart devices.

But by now the most fatal indeed is Forshadow. They say it easily can penetrate into the most sensitive and secured features of an Intel developed device.

 Since the most sensitive feature of an Intel developed device is the Software Guard Extensions (SGX), introduced with Sky Lake processors Forshadow strikes here to compromise the security feature.

 The moment Forshadow starts working, it creates an enclave to execute the crucial process of the system, the feature where sensitive information and data are stored.

When the device is infected, the data protecting mechanism refuses to work properly. SGE falls unused suggesting the deadly infection in the system.

 According to what the researchers claimed to have discovered, the hackers can easily breach SGE with the help of the deadly Foreshadow vulnerability.

 The famed IT manufacturing firm, however, has admitted the Foreshadow vulnerability saying that the hackers can exploit it in three separate conditions or situations which need to be researched further.

The cyber experts engaged there have already released a micro code to affected processors.

 Intel, further has urged its manufacturing fraternity to keep changing microcode based mechanism through BIOS updates.

The computing device manufactures have put in place the feature of security patches to tap the Spectre like vulnerability in the Intel devices.

Google is Tracking Your Location





Google knows where are you! The search engine giant records all your movements even if you have turned off the location tracker.

An Associated Press investigation report found out that the issue could affect more than two billion people who use Google maps or Google search directly or indirectly.

According to the study,  Google maps "stores a snapshot of where you are," an automatic daily weather updates track a location of your Android device, and even a small random search on Google searches gets to know about your exact latitude and longitude.

even random Google searches that you make will hand over information to the tech giant.
The study has been verified by the Computer science researchers at Princeton University after AP's requests.

However, in response to the allegations, Google has issued a description of tools and suggestions on how to turn off the location tracker and delete the location history.

Google says: “You can turn off Location History at any time. With Location History off, the places you go are no longer stored.”

Google's "Web and App Activity," which is turned on by default, let the company track your location.

To turn it off, you have to simply go to Activity Controls. Turn off both Web & App Activity and Location History.

For Android device follow these steps:
1) Go to settings.
Next click on Google, and then Google Account
There you will find a tab "data & personalisation"  inside it "web & app Activity"
Turn off "Web & App Activity"

For iPhones, iPads, and computers:
Sign into your Google account, click on the activity controls page.
There you will find "the web & app Activity" tab
Turn off the "Web and App Activity"