• What It is

    Here You can get some info .

  • What we do

    We will provide some nice information regarding Hacking

  • About Us

    A person like uuuu... :)


  • #OpFacebook : Facebook will be down on November 5 by Anonymous Hackers Attack

    Anonymous has vowed to "destroy" Facebook on Nov. 5. Or more accurately, somebody has set up aTwitter account and  YouTube channel to announce a plan dubbed "Operation Facebook."
    In a YouTube video, the hacking group warns, "Your medium of communication you all so dearly adore will be destroyed." "If you are a willing hacktivist or a guy who just wants to protect the freedom of information then join the cause and kill Facebook for the sake of your own privacy."

    The group said in its message that "Operation Facebook" would be begin November 5. It claimed the social network, based in Palo Alto,Calif., provides information to "government agencies" so they can "spy on people." If Operation Facebook is real, it could mark a new phase for Anonymous, which in recent weeks has joined forces with the remnants of the more tightly knit hacker group LulzSec to target law enforcement agencies in an ongoing operation called Antisec.

    UPDATE : 
    Whereas one of the Anonymous Leader Claim that "Operation Facebook" is Fake. He tweeted as shown below.


    Press Release of Operation Facebook :
    Here's the Anonymous press release and accompanying video message:
    Operation Facebook
    DATE: November 5, 2011.
    TARGET: https://facebook.com
    Press:
    Twitter : https://twitter.com/OP_Facebook
    http://piratepad.net/YCPcpwrl09
    Irc.Anonops.Li #OpFaceBook
    Message:
    Attention citizens of the world,
    We wish to get your attention, hoping you heed the warnings as follows:
    Your medium of communication you all so dearly adore will be destroyed. If you are a willing hacktivist or a guy who just wants to protect the freedom of information then join the cause and kill facebook for the sake of your own privacy.
    Facebook has been selling information to government agencies and giving clandestine access to information security firms so that they can spy on people from all around the world. Some of these so-called whitehat infosec firms are working for authoritarian governments, such as those of Egypt and Syria.
    Everything you do on Facebook stays on Facebook regardless of your "privacy" settings, and deleting your account is impossible, even if you "delete" your account, all your personal info stays on Facebook and can be recovered at any time. Changing the privacy settings to make your Facebook account more "private" is also a delusion. Facebook knows more about you than your family.
    http://www.physorg.com/news170614271.html
    http://itgrunts.com/2010/10/07/facebook-steals-numbers-and-data-from-your-iphone/
    You cannot hide from the reality in which you, the people of the internet, live in. Facebook is the opposite of the Antisec cause. You are not safe from them nor from any government. One day you will look back on this and realise what we have done here is right, you will thank the rulers of the internet, we are not harming you but saving you.
    The riots are underway. It is not a battle over the future of privacy and publicity. It is a battle for choice and informed consent. It's unfolding because people are being raped, tickled, molested, and confused into doing things where they don't understand the consequences. Facebook keeps saying that it gives users choices, but that is completely false. It gives users the illusion of and hides the details away from them "for their own good" while they then make millions off of you. When a service is "free," it really means they're making money off of you and your information.
    Think for a while and prepare for a day that will go down in history. November 5 2011, #opfacebook . Engaged.
    This is our world now. We exist without nationality, without religious bias. We have the right to not be surveilled, not be stalked, and not be used for profit. We have the right to not live as slaves.
    We are anonymous
    We are legion
    We do not forgive
    We do not forget
    Expect us
    [......]




    For the second time this year, Citigroup has suffered a major breach of its credit customers’ personal information; this time the breach involved 92,400 customers at its Japanese unit. Citigroup's Japanese credit card unit said personal information for more than 92,000 of its customers was illegally sold to a third party.

    The information exposed included the names, account numbers addresses, phone numbers birthdates, and sex of 92,408 credit card holders, Citi Cards Japan warned in an advisory (PDF) issued Friday. The personal identification numbers and card security codes were not accessed.

    Citi Cards Japan did not mention how customer information was obtained as the sale of such information is currently under investigation. “While the risk of fraud is minimal due to the absence of security information, CCJ has placed internal fraud alerts and enhanced monitoring on all accounts identified, and no unusual or suspicious credit cards transactions relating to these customers have been detected at this point,” according to Citi Card Japan’s statement.

    However, Citigroup disclosed that credit card customers had $2.7 million stolen from their accounts as a result of the June data breach. While victimized customers can get new account numbers and aren't responsible for unauthorized charges, consumers have become increasingly wary of how their information is handled by big companies, especially those that handle their money.
    [......]

    vfirstmarketing.in Hacked By Xahra (Female Hacker) 

    Hacked Site:- 
    http://vfirstmarketing.in/

    Mirror Link:-
    http://zone-h.org/mirror/id/14536395

    Message Spread by Xahra:-

    "Free Kashmir & Palestine! - Palestine + Kashmir = One Struggle. // End the Occupation. . . .

    Everyday 100s of innocent people are abused, raped and even killed in palestine & kashmir by the indian & israli army, a third of the deaths are children, who are the real soldiers? the child holding a stone or the stranger holding a gun? - we dont want war, take back ur men, ur tanks and ur guns and go back to were you came from, all we ask is for freedom, you can kill us but you cant kill us all, we shall not give up, giving up is not a option. Freedom is our goal..."
    [......]



    After Hack of Italy's Police IT network, Anonymous Hackers Just now Release the Database of vitrociset.it via a pastebin link on Twitter. The Leak include the Administrator's Password and 100's of other users Login Details.



    [......]



    Facebook is set to announce today a bug bounty program in which researchers will be paid for reporting security holes on the popular social-networking Web site.
    Compensation, which starts at $500 and has no maximum set, will be paid only to researchers who follow Facebook's Responsible Disclosure Policy and agree not to go public with the vulnerability information until Facebook has fixed the problem.
    Facebook Chief Security Officer Joe Sullivan told that "Typically, it's no longer than a day" to fix a bug,

    Facebook's Whitehat page for security researchers says: 

    "If you give us a reasonable time to respond to your report before making any information public and make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service during your research, we will not bring any lawsuit against you or ask law enforcement to investigate you."

    The compensation program is a good way to provide an incentive and show appreciation to the research community for helping keep Facebook safe for users, according to the company's security team. Up until now, researchers received recognition on the Facebook Whitehat page, maybe some"swag," and--if they were lucky--a job.
    "Some of our best engineers have come to work here after pointing out security bugs on our site," likeRyan McGeehan, manager of Facebook's security response team, said Alex Rice, product security lead at Facebook. (Facebook also recently hired famed iPhone jailbreaker and Sony PlayStation 3 hacker George Hotz, who works on security issues.)
    Meanwhile, Facebook is allowing security researchers a way to create test accounts on Facebook to ensure they don't violate terms of use or impact other Facebook users, Rice and McGeehan said.
    Facebook is following in the steps of Mozilla, which launched its bug bounty program in 2004, and Google, which offers a bug bounty program with payments ranging from $500 to more than $3,000 for finding Web security holes, as well as a program specifically for Chrome bugs.
    Microsoft has offered bounties of $250,000 for information leading to the arrest of virus writers, but does not pay researchers who find bugs in its software. However, other companies do, like TippingPoint's Zero Day Initiative.
    Researchers typically are paid more for finding bugs in desktop software, which can take much longer to fix and to update software on computers than bugs in Web-based software, which can be fixed much more quickly.

    According To FACEBOOK:- 

    Eligibility
    To qualify for a bounty, you must:
    • Adhere to our Responsible Disclosure Policy
      ... give us a reasonable time to respond to your report before making any information public and make a good faith effort to avoid privacy violations, destruction of data and interruption or degradation of our service during your research ...
    • Be the first person to responsibly disclose the bug
    • Report a bug that could compromise the integrity or privacy of Facebook user data, such as: 
      • Cross-Site Scripting (XSS)
      • Cross-Site Request Forgery (CSRF/XSRF)
      • Remote Code Injection
    • Reside in a country not under any current U.S. Sanctions (e.g., North Korea, Libya, Cuba, etc.)
    Our security team will assess each bug to determine if qualifies.

    Rewards
    • A typical bounty is $500 USD
    • We may increase the reward for specific bugs
    • Only 1 bounty per security bug will be awarded
    Exclusions
    The following bugs aren't eligible for a bounty (and we don't recommend testing for these):
    • Security bugs in third-party applications (e.g., http://apps.facebook.com/[app_name])
    • Security bugs in third-party websites that integrate with Facebook
    • Security bugs in Facebook's corporate infrastructure
    • Denial of Service Vulnerabilities
    • Spam or Social Engineering techniques


                                                                                                                                                                         -News Sourec (FACEBOOK & Cnet)
    [......]

    Infinity add