1. Click Subscription of Mr.Chris Farrell Membership $4.95 7 day Trial For Newbies/Dummies - Not Criminal IM Coach/Mentor.
2. Click DirecTV For US Satellite TV Subscription. Also Dish Network Call Now Toll Free : 877-287-3983 for an Obligation Free Chat.
3. Click 100DayLoans.com for cash advance payday loan 100 days repayment,SUBJEST to your State Laws Also Credit Reports and Scores
4. CLICK Coupon Codes & My Web Hosting Reviews/Recommendation
affiliate_link__affiliate_link__ ______

Wednesday, March 30, 2011

Lone Iranian Hacker Claims Responsibility for SSL Breach

 By Liam Eagle, March 28, 2011

The sign-in page and SSL certificate for Hotmail, one of the services targeted in the attack

(WEB HOST INDUSTRY REVIEW) -- According to several reports published Monday, a lone Iranian hacker has claimed responsibility for the Last week’s SSL certificate hack that targeted several major online communications tools, including Hotmail, Skype, Gmail and others.

The hacker reportedly backed up the claim in a post on the document-sharing site Pastebin that included names, accounts passwords and other details on how he broke into the systems of Comodo reseller InstantSSL.it, and was issued the rogue SSL certs.

Following the attacks last week, there was some speculation that the attacks – which appeared to originate from a server based in Iran – were sponsored by Iran’s government, and politically motivated.
A Guardian article on the hacker’s claim includes a quote from Comodo CEO Melih Abdulhayoglu who, following last week’s incident, issued a statement citing some circumstantial evidence that the attacks were state-backed. "We believe these are politically motivated, state-driven/funded attacks," he said, suggesting that the fake certificates would be used to collect the details of activists using the sorts of tactics used in phishing attacks.
The attacker claiming responsibility for the attacks, however, says this was not the attack’s intent, which was actually retribution for the Stuxnet worm, which was allegedly designed by government-sponsored groups to target nuclear reprocessing facilities in Iran.

The Stuxnet worm, discovered in July of 2010, specifically targeted industrial applications. Its impact in Iran was substantially greater than elsewhere, with 60 percent of infections reportedly occurring there.

Article Source http://www.thewhir.com/web-hosting-news/032811_Lone_Iranian_Hacker_Claims_Responsibility_for_SSL_Breach permits to repubish here
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Click Most Updated Discount Coupon Codes & My Personal Web Hosting Recommendations if you are interested in those.
Stay Tuned!
 <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
   affiliate_link