Tuesday, 22 September 2015

France rejects Google's appeal against implementing 'right to be forgotten' globally

France’s data protection watchdog, the Commission Nationale de l’Informatique et des Libertés (CNIL), has rejected Google’s appeal against the global enforcement of the ‘right to be forgotten’ rule.

In May this year, the CNIL ordered Google to apply the right to be forgotten rule – which lets people ask search engines to not display certain unflattering links resulting from a search on their name – to its google.com global domain and not just European domains such as google.fr or google.co.uk.

Google filed an informal appeal against the order in July, claiming it would restrict the public’s right to information, was a form of censorship, and was attempting to extend French law outside the country’s borders. The president of the CNIL, Isabelle Falque-Pierrotin, rejected the appeal on Monday, saying that delistings must be applied across all extensions of the search engine and that not doing so would mean the RTBF ruling could be easily circumvented. The CNIL added that it just wanted non-European companies to respect European laws when offering their services in the continent - rejecting Google’s claims it was going beyond its jurisdiction.

"The President of the CNIL rejects Google's informal appeal against the formal notice requesting it to apply delisting on all of the search engine's domain names […] Contrary to what Google has stated, this decision does not show any willingness on the part of the CNIL to apply French law extraterritorially. It simply requests full observance of European legislation by non European players offering their services in Europe," it said in a statement.

Under French law, Google has no legal possibility of appealing the order at this stage. If the company refuses to remove the tens of thousands of delistings from its non-European domains for named searches, then the CNIL will likely look at imposing sanctions - including the possibility of a fine up to 5 percent of its worldwide revenue - against the internet giant.

A Google spokesman said: “We’ve worked hard to implement the ‘right to be forgotten’ ruling thoughtfully and comprehensively in Europe, and we’ll continue to do so. But as a matter of principle, we respectfully disagree with the idea that one national data protection authority can assert global authority to control the content that people can access around the world.”

Security firm is buying iOS 9 exploits for $1 million


Zerodium, a startup that bills themselves as the "premium zero-day vulnerability and exploit acquisition program", are currently running a massive bug bounty program that is offering $1 million to developers who discover critical, exploitable flaws in iOS 9.

The company is willing to pay a total of $3 million for three separate iOS 9 exploits; $1 million to each group of developers. However it's going to take a particularly serious exploit to claim the million dollar bounty, as Zerodium's requirements are lengthy and strict.

The exploit in question must use an unknown flaw and lead to a "remote, privileged, and persistent installation of an arbitrary app", essentially making it an untethered jailbreak of iOS 9. On top of this, the flaw must be exploitable silently, reliably and remotely without any user interaction, with attacks originating through either a web page, SMS or MMS.

The exploit must be delivered exclusively to Zerodium and must work on all iOS 9 devices newer than and including the iPhone 5 and 3rd-gen iPad. The program will run through to October 31st, although if three exploits are discovered before then, the program will end early.

Zerodium doesn't state what the zero-day exploits will be used for, although the company lists its clients as major corporations "in need of advanced zero-day protection" as well as governments "in need of specific and tailored cybersecurity capabilities".

It's most likely that these exploits will be packaged up for groups that require silent backdoor entry into iOS 9 devices, such as governments that want to tap into and spy on an iPhone user. These type exploits that remain unpatched and unknown to the public typically command high prices on the market, which is why Zerodium is offering such a large sum for iOS 9 exploits.

How to Upgrade /Edit Your School Grade Result #FUN



Hello everyone here,  I'm going to show y'all HOW TO UPGRADE/ENHANCE YOUR SCHOOL RESULT BY YOURSEF    

This tutorial will simply guild you on how to ehhance your  result successively in all exams written countries. All you need to do is to Watch and follow the simple steps above #Firebug #hmmmm
Note: Pls Check the article Title .

#MITM ATTACKS!!!!

What is a MITM Attack?

A Man in the Middle Attack (MITM) is a type of network attack in which an attacker assumes the role of the default gateway and captures all the traffic going to and fro. This is a very serious attack and also very easy to perform. MITM attack can be performed in a Local area network such as airport and  coffee shop wifi, college wifi, computer labs and other any kind of LAN. 


What the attack basically means is that a hacker (or anyone for that matter) with the right set of  tools, can intercept all your internet activities and see all your passwords and  all the websites you are browsing. 




How to perform a Man in the Middle attack?



There are many types of Man in the Middle attacks. There are also many ways to perform this attack. There are several tools such as Cain&Abel, Ettercap, Subterfuge, SSLStrip etc which can do a MITM attack.



In Windows, we use a technique called ARP spoofing to achieve MITM scenario. We use a free ready made tool called Cain&Abel for this. First, you need to be in the same network subnet as the victim (same campus, same room, or same wifi).



Download and Install Cain&Abel. Alsodownload and install Wireshark which is also free. We will be using wireshark to capture the packets and analyze them. 
After everything is installed, run Cain from the desktop or menu. 




  • 1. Start Sniffer by clicking button shown in red box. 2. Then go to Sniffer tab.

  • 3. Right click on screen and select “Scan Mac Addresses”. The screen will quickly  be populated with all users in your LAN.
  • 4. Select all the IP addresses and right click. and select "Resolve host name". Now, you can find the IP address of the person you want to attack by viewing the computer names.


  • Now, 
  •  4. click on “ARP” on bottom and then 
  •  5. click on “Plus” icon to add user in victim list. 



 A window called “New ARP Poison Routing ” will pop up.

  • You will see windows divided in two parts. Select the default gateway in left half and select the victim's IP in the right.  Here you see me selecting 10.97.26.1 as the default gateway for the network and the victim's IP address 10.97.26.156




  • Click on start ARP option shown in red box. You will see that CAIN starts poisoning the host. 




This completes our ARP poisoning  Now, all the traffic from the victim will pass through the attacker's PC. The victim may notice his internet speed slowing down. 



Now, we need to capture the traffic by using Wireshark. 



Fire up wireshark and
 1. Click on the adapter button shown below in red. 2. Click 'start' in the adapter where there are packets. 






If you let this run for a while, all the traffic going through the victim's PC will be captured by wireshark. You can then save the packet capture file and analyze it with appropriate filters. By analyzing the packets, you can find juicy information like username and passwords, web urls visited by the victim etc.
Please note that you have to be very careful while performing such an attack. If not done properly, it can even cause denial of service to the entire network.