Wednesday, May 30, 2012

Googles SEO Starters Guide Free Download

Many SEO starter guides can be found in many websites. But, some bloggers and webmasters still waiting a SEO starter guide by google. For them, SEO starter guide by Google is the real SEO starter guide. That's not wrong, because Google is the best search engine. So, if Google release the starter guide, sure that's way to increase our blog SERP (Search engine result page) in Google with legal. So, if you want to download SEO starter guide by google, you can download in this link :

Download SEO Starter Guide by Google 

Tuesday, May 29, 2012

Anonymus takedown bharatiya janata party, wants people to protest against "Internet Censorship"

A day after messing with servers maintained by Reliance Communications, Anonymous, an international hacker collective, defaced two websites belonging to BJP on Sunday. Through its Twitter account (@opindia_back) it announced that www.mumbaibjp.org and www.bjpmp.org.in were hacked by the group. After the hacking, the group posted a message to web users, asking them to organize protests against "web censorship" in India on June 9.
Anon+Takedown+BJP+Picture
While the message was displayed on the homepage of www.mumbaibjp.org, on www.bjpmp.org.in it was inserted as a page at www.bjpmp.org.in/ads/anon.html. On Mumbai BJP website the message was accompanied by a catchy tune embedded through a YouTube link.

"Today they took away your right to use a few websites... day after tomorrow they will take away your freedom of speech and no one will be there to speak for you. Speak Now or Never," the message read. The hackers said that people should print out or buy Guy Fawkes Masks and wear them while protesting against web censorship in Bangalore, Mangalore, Kochi, Chennai, Vizag, Delhi, Mumbai and Hyderabad on June 9.

TOI reached out to Anonymous though Twitter, asking why it defaced BJP websites. ""Just needed a website to display our message," said the person managing @opindia_back.
The Ion, who is likely a part of Anonymous and who uses @ProHaxor alias on Twitter, added, "BJP are the opposition they should have stopped this or should have organised a protest they did not do any."
Incidentally, CERT-IN, the nodal agency in India for monitoring security and hacking incidents within the country's cyberspace, said in a report on Sunday that hackers are targeting Indian websites. "It is observed that some hacker groups are launching Distributed Denial of Service (DDoS) attacks on websites of government and private organizations in India," the report said and asked network administrators to keep vigil.


Anonymous started attacking websites belonging to government agencies and companies likeReliance Communications last week after internet service providers blocked several websites in the country on the basis of an order by Madras high court. Anonymous says the blocking of websites is illegal and suppression of freedom of speech. On Friday it held a virtual 'press conference' and released a list of websites that were allegedly blocked on the internet service provided by Reliance Communications even though there was legal requirement for the ISP to do so. The hackers said they stole the list from Reliance' servers. At the same 'press briefing' the group called on Indian people to organize protests against web censorship on June 9.

In the last few months, Anonymous has organized or played a dominant role in real world protests against what it perceives censorship and abuse of power. The most popular of these protests has been Occupy Wall Street in the US. Though there were a number of groups and individuals involved in these protests Anonymous had played a key role in spreading the word.

Source: IndiaTimes.

Saturday, May 26, 2012

How To Delete DNS Changer Virus

 so finnally i got how to delete a dns virus  just follow 


go to cmd and type "ipconfig /all"  and press enter.


Now look for the entry "DNS Servers"
See the ip address in front of this and compare them to the 
table of known rogue DNS servers listed below.




85.255.112.0 through 85.255.127.255 
67.210.0.0 through 67.210.15.255
93.188.160.0 through 93.188.167.255
77.67.83.0 through 77.67.83.255
213.109.64.0 through 213.109.79.255
64.28.176.0 through 64.28.191.255


If your computer is configured to use one or more of the rogue DNS servers listed above, your system may be infected with DNSChanger malware.


You can also visit website www.dns-ok.de to check whether your system is infected or not.


How to remove infection?


If your system is infected with DNSChanger, download free DNS changer removal tool from Avira



Follow thse additional steps:

  1. Go to Start --> Control Panel -->Network Connections.
  2. Right click your default connection, usually Local Area Connection or Dial-up Connection, if you are using Dial-up, and left click on Properties.
  3. Double-click on the Internet Protocol (TCP/IP) item and select the radio button that says Obtain DNS servers automatically. Click OK twice.
  4. Go to Start --> Run, type CMD and then click OK.
  5. At the Dos Prompt Screen, type in cd\ and then press ENTER.
  6. Now type in ipconfig /flushdns and then press ENTER. (notice the space after ipconfig)
  7. Close the command prompt window.
  8. Reboot your PC and try to open any website.


done



Wednesday, May 23, 2012

NASA SSL Digital Certificate hacked by Iranian Hackers


Iranian hackers 'Cyber Warriors Team' announced in an online post that it compromised an SSL certificate belonging to NASA and subsequently accessed information on thousands of NASA researchers. A space agency representative revealed that they’re currently investigating the incident.


The group said the certificate was compromised by exploiting an existing vulnerability within the portal’s login system, but they didn’t outline the entire attack. Once they had control over the certificate, they claim to have used it to “obtain User information for thousands of NASA researcher With Emails and Accounts of other users [sic].”


“These incidents spanned a wide continuum from individuals testing their skill to break into NASA systems, to well-organized criminal enterprises hacking for profit, to intrusions that may have been sponsored by foreign intelligence services seeking to further their countries’ objectives,” Paul K. Martin wrote.


The attackers had full functional control over these networks. The Cyber Warriors Team (CWT) said in its post that it had written an HTTPS protocol scanner to find weaknesses, and had found an existing vulnerability in the NASA website, which was identified as that of NASA's Solicitation and Proposal Integrated Review and Evaluation System (NSPIRES) site.

Zeus 2.x variant includes ransomware features



Cybercriminals are getting more sophisticated, as reports are coming in that hacker coders have successfully merged a ransom trojan with a Zeus malware successor called Citadel. A notorious malware platform targeting financial information has added a new trick to its portfolio a digital version of hijack and ransom.

F-Secure researchers have recently spotted a new Zeus 2.x variant that includes a ransomware feature. Basically a customised version of Zeus, the malware aims to provide better support for its offshoot of the Zeus code base, whilst at the same time allowing clients to vote on feature requests and code their own modules for the crimeware platform.

Net-security explains the working of this Zeus 2.x variant,that Once this particular piece of malware is executed, it first opens Internet Explorer and points it towards a specific URL : lex.creativesandboxs.com/locker/lock.php. Simultaneously, the users are blocked from doing anything on their computer.

Unlocking can therefore be performed quite easily with a registry editor:

1. boot the system in safe mode
2. add a new key named syscheck under HKEY_CURRENT_USER
3. create a new DWORD value under the syscheck key
4. set the name of the new DWORD value to Checked
5. set the data for the Checked value to 1
6. reboot

Anonymous hacks Bureau of Justice and leaks 1.7GB of data



Anonymous has apparently hacked the United States Bureau of Justice Statistics and posted 1.7GB of data belonging to the agency on The Pirate Bay. This is a Monday Mail Mayhem release. Online statements attributed to Anonymous said they were responsible for the security breach and that the files they obtained include emails.

"Today we are releasing 1.7GB of data that used to belong to the United States Bureau of Justice, until now, said Anonymous in a statement.

The Department of Justice acknowledged that their webservers had indeed been breached, adding that their website as well as justive.gov had remained operational throughout the security breach.

Department of Justice has been attacked multiple times since becoming a target for the hacking group after the shutdown of Megaupload.

" Within the booty you may find lots of shiny things such as internal emails, and the entire database dump. We Lulzed as they took the website down after being owned, clearly showing they were scared of what inevitably happened. "

"The price we pay very often is our own freedom," it continues. "The price that governments pay is the exposure of their corruption and the truth being revealed, for the truth will set us free in the end. So once more we call on you. Hackers, activists, and freedom fighters; join us in our struggle against these corporate hypocrites."
Anonymous hacks Bureau of Justice and leaks 1.7GB of data
Anonymous+hacks+Bureau+of+Justice+and+leaks+1.7GB+of+data

Anonymous has apparently hacked the United States Bureau of Justice Statistics and posted 1.7GB of data belonging to the agency on The Pirate Bay. This is a Monday Mail Mayhem release. Online statements attributed to Anonymous said they were responsible for the security breach and that the files they obtained include emails.

"Today we are releasing 1.7GB of data that used to belong to the United States Bureau of Justice, until now, said Anonymous in a statement.

The Department of Justice acknowledged that their webservers had indeed been breached, adding that their website as well as justive.gov had remained operational throughout the security breach.

Department of Justice has been attacked multiple times since becoming a target for the hacking group after the shutdown of Megaupload.

" Within the booty you may find lots of shiny things such as internal emails, and the entire database dump. We Lulzed as they took the website down after being owned, clearly showing they were scared of what inevitably happened. "









"

Bogus Facebook apps spreading Android malware





Third-party Android markets have traditionally been the main source of infection since the Android boom, as they are less strict than the genuine Play when it comes to bouncing malware.

Today Gmanetwork reports that, Users of mobile devices running Google's Android OS were warned over the weekend against a new fake app of the social networking giant that may lead to potential Android malware. These duplicated applications have the same behavior as their original counterparts (in terms of functionality), but they perform a http 302 redirect to another link, that’s not Facebook-related, when they detect mobile traffic.

What’s most concerning is that many of the fake app-based malwares in circulation have purported to be legitimate copies of some of the most popular titles around. No sooner were Android users on red alert for a dodgy Angry Birds Space app, were they informed of a phony Instagram app wreaking havoc through some of the unverified mediums.

The fake apps claim to scan a user's Facebook contacts and list all the potential girlfriends or boyfriends among the user's friends. BitDefender said that while cross-site scripting is nothing new, this is one of the few times when a direct correlation between Facebook and promoting Android apps via redirecting mobile traffic has been reported.

This could be the beginning of paid promotions through Facebook, where Android app developers can actually subscribe to have their apps promoted via Facebook by means of illegitimate services.

IBM Research hacked



IBM+Research+domain+hacked+and+defaced

Hacker collective group dubbed Kosova Hacker Security or in other word KHS targeted IT giant & multinational technology and consulting corporation IBM. In this attack KHS successfully hacked into the official site of IBM Researcher (http://researcher.ibm.com).

Hackers claims that, site had a SQL injection & remote code execution vulnerability using which they deface the website. At the time of writing the hacked url not working and Mirror of Hack can be seen here.

Hackers said,"we hack that why we dont like they computers :/ k".

GFI WebMonitor - Web monitoring and Security



With all the threats that Internet access can present to your users and your data, web security software is one of the most valuable investments you can make in your information security. Any solution should offer the following key protections:
1.       Site blocking
2.       Antivirus
3.       Reporting and logging

GFI WebMonitor offers all that and more. GFI WebMonitor Unified Security includes both the web filtering and anti-malware capabilities, and can be installed as a standalone server or as an add-on to ISA or TMG. This web security suite can be installed on its own server or as a plug-in for TMG, and GFI offers a free 30-day-trial so you can evaluate it risk-free.
Installation: The installer for the TMG plug-in is straight-forward only requires a service restart, not a reboot. During the installation, you can choose to enable the optional HTTPS traffic inspection, which functions by dynamically creating certificates and acting as a kind of Man-in-the-Middle to HTTPS sessions. If you have Active Directory you can install the root certificate to the domain, so you can perform HTTPS inspection without having to touch user workstations.

 

If TMG is the default gateway in your office, there nothing else to do to start protecting users. If not, or if you are going to use the standalone version, you can use a Group Policy Object to configure client browsers to use GFI WebMonitor as their web proxy.

GFI WebMonitor installs with antivirus protections enabled, but website filtering disabled. The net result is that you get protection against malware automatically, but don’t block any websites until you opt in for that protection. This keeps the potential for business disruption to a minimum, which is very important when first implementing any web security solution.
Content filtering: Implementing content filtering is straightforward. There are several out-of-the-box categories for websites to block based on topics like adult content, hacking sites, etc. In addition to the category lists, GFI has a database of sites based on reputation which is updated like a/v definitions.

Sites that were safe yesterday but got hacked last night can be blocked today; protecting users from hacks before the hacked site even knows they have a problem. And you can customize your controls exactly the way you want through both white and black lists.
More on antivirus: The antivirus capabilities of GFI WebMonitor includes multiple engines for scanning, as well as the ability to block/permit downloads by file type. If you use one antivirus product on your workstations, using two others in WebMonitor covers all your bases. GFI WebMonitor is able to scan not only regular file downloads, but also the “hidden” file downloads that many websites use to deliver media content or plug-ins.
Bandwidth Policies: A great feature of GFI WebMonitor is Bandwidth Policies. Instead of completely blocking access to streaming media, you can control how much bandwidth streaming consumes.

That way, users can visit YouTube for a how-to video or a vendor’s website for training content, without consuming so much bandwidth that your corporate website or email system is impacted.
Logging and reporting: GFI WebMonitor also provides rich logging and reporting. You can run queries, generate scheduled or on-demand reports, and choose whether to anonymize usernames or not. This enables you to look at activity without violating user’s privacy, but also investigate completely when the situation calls for it.

01

Overall, GFI WebMonitor is a very strong part of any defense in depth strategy. It is easy to install, easy to configure, and provides great protection for users.




Quebec Liberal Party and Education Ministry websites take down in massive Cyber Attack


Quebec+Liberal+Party+and+Education+Ministry

TwoQuebec Liberal Party and Education Ministry websites take down in massive Cyber Attack

Two provincial government websites as well as Quebec Liberal Party and Education Ministry websites went down early Saturday morning and remained inaccessible for most of the day. No one has claimed responsibility for the downed sites but Twitter was full of rumours on Saturday pointing to Anonymous, the loose group of cyber activists.

 The cyber troubles began just hours after a new law, Bill 78, passed in the National Assembly. It requires any group of 50 or more people holding a demonstration in the province to inform police eight hours in advance of their planned route and other pertinent details such as the start and end times. One of Anonymous’ Twitter accounts tweeted on Friday: “Quebec Considers Draconian Anti-Protest Law ... Expect us.”

Anonymous also threatened the website belonging to the province’s National Assembly. While some reported that the legislature's website had been taken offline, it was functioning as of 9:25 a.m. on Saturday. Referring to the province as “Quebecistan,” the group wrote that “Rule 78 must die.”

A spokesman for the Quebec Liberal Party said the party’s site was hacked.“They are attacks that are pretty common,” said Michel Rochette. “We have been victims of cyber-attacks for the past few weeks.”

Anonymous hater takes credit for Pirate Bay and Wikileaks Ddos Attack



Anonymous+hater+takes+credit+for+Pirate+Bay+Ddos+Attack

WikiLeaks and Swedish BitTorrent file-sharing site Pirate Bay were reportedly battling Distributed Denial-of-Service (DDoS) attacks for several days earlier this week. The user, who goes by the Twitter handle @AnonNyre, has been riling up members of the hacktivist group and supporters of TPB with a series of angry posts on Twitter, to the extent that Anonymous supporters are now demanding to get in contact with him over the social network.

WikiLeaks tweeted the status of its Web site a short while ago: "WikiLeaks has been under sustained DDOS attacks over the last 72 hours. http://www.wikileaks.org is good, http://wikileaks.org is flooded". "We're mirroring the #WikiLeaks website, in case you can't reach it. http://wl.wikileaks-press.org," reads the final.

AnonNyre also later posted on Pastebin, claiming that he works for the FBI and wants to take TPB website down because it is "a press-release website for Anonymous".

UK ISP Virgin Media suffered a DDoS attack on 9 May, a week after complying with a high court order to block users' access to the file-sharing website. The Pirate Bay condemned the action "We do NOT encourage these actions. We believe in the open and free internet, where anyone can express their views. Even if we strongly disagree with them and even if they hate us. So don't fight them using ugly methods. DDoS and blocks are both forms of censorship."

The five ISPs forced by U.K.’s High Court to impose a block on its customers accessing The Pirate Bay have less two weeks to comply with the order, or face charges of being in contempt of court.The block must be imposed within 30 days from the time the court issued its ruling, according to sources.

Anonymous Hackers attacked Indian government over file-sharing ban



anonymous+hacker+indian+sites

Anonymous Hackers has turned its attention to India, taking down the web sites of the Supreme Court, the country’s two major political parties and several government sites in retaliation for a court injunction which led to the blocking of several video sharing and bit torrent sites.


Anonymous tweeted saying that it was now India’s time to bring in a new government.“Namaste #India, your time has come to trash the current government and install a new one. Good luck. | #SaveTPB #Anonymous #Censorship”.

The hacking was reportedly in response to the blocking of torrent site thepiratebay.com and vimeo.com.While the Supreme Court of India website came back online after a little while, the Congress website was still offline at the time of filing of this report.The Department of Telecommunications (DoT) website had also reportedly come under attack.

The group first signalled its intent to launch #OpIndia in a YouTube message posted over a week ago, which said the following:
We have come to the conclusion that the Indian government has failed. It is time that we all rise and stand against the corrupt government. The Department of Telecommunications has ordered Internet Service Providers to block file-sharing sites in India. We cannot let this happen.

In late March, Chennai-based Copyrightlabs won a restraining order that made Indian ISPs and phone firms stop their customers reaching sites that were illegally sharing copies of Bollywood films called 3 and Dhammu.

Some people can still access Vimeo and The Pirate Bay. It seems that the sites were initially blocked by Reliance, followed by Airtel. The users who faced the blocking got a message saying that this was due to a DOT regulation, but later the message said that it was because of a court order.


The UN is expected to discuss the proposal in the next 72 hours. The proposal would end "equal say" process for internet governance and push the civil society to the fringes.The proposed Committee for Internet Related Polices (CIRP) would be 50-member body funded by the UN. It would meet once a year and would have the power to oversee all internet standards bodies.

To knock out the sites, Anonymous bombarded them with data, a tactic known as a Distributed Denial of Service (DDoS) attack.The tactic had only partial success as most of the sites targeted soon recovered and were only offline intermittently.

Anonymous Tweet: "We are not doing any permanent damage to the websites. We just want file sharing sites to be unblocked."

Monday, May 21, 2012

8 easy ways to get likes on your facebook page

As the internet and Social Media evolve one thing is clear - Facebook is king. Fast approaching 1,000,000,000 members (yes that's ONE BILLION), Facebook is the site where everybody is spending time online!

"Every successful business depends on people - Facebook is where they are spending their time online. Either you will use Facebook and succeed or you will not embrace Facebook and fail."- Sean Malarkey

When you start your marketing, the first thing to do is to open a business page. Make sure that all information you put on your page is genuine and not defamatory. This will make potential customers trust you.




Now, let's see what are the 8 easy and simple ways to boost your Facebook likes.

1. Tell Your Friends to Like You!

Make sure you let your Facebook followers know that your business needs more likes, and that you would appreciate it if they visited your business page. It's an easy way to get started and build an initial following.

2. Interact With Your Customers

This is probably the biggest way to generate likes. It may sound obvious, but when people "like" your business, they genuinely like your business, and like you as well. If they know that the people behind the business are receptive to their wants and needs, customers will like you. Regularly responding to comments on your wall not only will help you gain more likes, but will help you have a better understanding of what your customers' needs are.

3. Use the Like button

The first thing that you can do is use the Facebook "like" button on your blog site. It is very efficient and easy to install as well. I recommend the WP FB Like plugin if you are using WordPress for your blog site.




4. Adding a Facebook Fan Box to Your Website

This is an extremely effective tool. The fan box should be prominently displayed on your site. If someone visits your website and notices that you are on Facebook, the chances of them clicking on your fan box and checking you out are very good. Many people stay logged into Facebook by default so it is a simple point and click that will land them on your fan page. If you don't have a fan box, get one up as soon as possible.


Get Top 10 Site Exposure on 100's of Search Engines

       • No Bidding - No PPC - No Click Fraud
       • Flat Fee Rates Starting at $4 per Month or Less
       • Over 150 Million Searches per Month
       • Six Bonus Giveaways with Your Order



5. Invite Your Friends With Text Messaging

You can send a text message to 32665 (FBOOK) with the words fan yourusername or like yourusername and they will be added to your fan page. This is a great way to add fans when you are hosting a webinar or giving a presentation to a live audience.

6. ASK Questions

Interact with your Facebook fans by asking questions, conducting polls, allowing them to tag photos and have some fun. Ask their opinions about the latest gadgets or what they expect from your blog. This is a great way to "LISTEN" to your followers; you will find out what they think, what they are looking for, and what they need. Then you can respond accordingly.

7. Status Tagging

Status tagging is a great way to recognize someone and to network value. You can share valuable content and provide added publicity for the originator of the material by using the status tagging feature.

Your fans can then check them out and see other valuable content they may provide. The return on this is that your fan page will also gain some visibility from the status tagging. You can tag both a person or a page by typing the @ sign and then the name of the person or page that you wish to tag. A pop-up box will appear with suggestions as you begin to type. You can choose the right one without having to continue typing the full name.

8. Use the Power of Contests

Contests are BIG and everybody loves them! I suggest checking out WildFireApp. There are some rules and regulations on contests via Facebook so make sure you check out the rules before you get started. You can find the rules here.

There's nothing more fulfilling than seeing that the number of likes on your Facebook business page has grown. So what are you waitíng for? Go and build a strategy to boost your likes and watch your business flourish!

About The Author
If you want even more updates on how to market your business online, sign up for Evolve - Your Free Weekly Onlíne Marketing To-Do List to Evolve Your Business and something that you can finish in less than 10 minutes. florentinaistrati.com

Wednesday, May 16, 2012

The Revolution from Cyber Terrorist attack to Indian Cyber Security


The+Revolution+from+Cyber+Terrorist+attack+to+Indian+Cyber+Security


Cyber attack has put our lives in danger every second. The cyber attacks are becoming the root cause of the mishappenings around us every other day. As the next generation wars are increasing depending on robust and secure information systems networks, it is imperative for a country to invest in building a reliable infrastructure.

As the next generation wars are increasing depending on robust and secure information systems networks, it is imperative for a country to invest in building a reliable infrastructure. Increasing attacks on cyberspace in India has brought several professionals and experts from the Industry, in support with the last week, India’s Defense Minister, AK Antony, announced an additional $1.3 Billion will be invested in the project making the grand total to a $3.1 Billion.

It is observed that many Electronic Notification is usually sent before a major terrorist attack, followed by defacement of government web sites such as Mumbai Terrorist attack. India is facing several cyber threats, reports claimed that government servers have been used in hacks against China and Delhi’s airport being being under a cyber attack. These reports are in addition to news of 112 compromised government websites during December 2011 to February 2012.

Another Event, “The Hackers Conference” is being organized at India Habitat Center, New Delhi. It is first ever gathering in India which is going to be attended by several Blackhat Hackers too along with Security Experts hence providing a unique interface and platform for open dialogue between hackers and security experts to bridge the existing gaps in security arena to make Internet safer and more secure.

The Hackers Conference will see a galaxy of renowned speakers presenting 0-Day Vulnerabilities, Exploits and Android/Blackberry/iPhone Hacks. Apart from Speakers presenting on WI-FI and Web Application Security the Special invitees from Government Intelligence Agencies will also speak on National Security Issues emerging from Scada Hacking.

In the Nut Shell, this is an event where we are making a small effort to unite together with the Indian Government to support a cause that will allow us to have a sound and peaceful environment.

Sunday, May 13, 2012

BitCoin hacked, More than 18,000 Bitcoins Stolen


BitCoin+hacked,+More+than+18,000+Bitcoins+Stolen
Bitcoinica, a Bitcoin exchange started by a 17-year old teenager Zhou Tong, has been shut down for security investigations. It’s believed that at least 18,000 BTC ($90,000 or 68,000 EUR) have been stolen.
News of the hack was posted this morning by Bitcoinica's founder, Zhou Tong:
"Today, we have discovered a suspicious Bitcoin transaction that doesn't seem to be initiated by any one of the company owners. Some of them are not online at the moment so this is not conclusive.

Suspicious transaction:

{
"account" : "",
"address" : "182tGyiczhXSSCTciVujNRkkMw1zQxUVhp",
"category" : "send",
"amount" : -18547.66867623,
"fee" : 0.00000000,
"blockhash" : "00000000000003f6bfd3e2fcbf76091853b28be234b5473a67f89b9d5bee019c",
"blockindex" : 1,
"txid" : "7a22917744aa9ed740faf3068a2f895424ed816ed1a04012b47df7a493f056e8",
"time" : 1336738723
},

We have contacted Rackspace to suspend all our servers and lock down our accounts. All your trading and financial data is safe (as far as I know), apart from the Bitcoin loss. Thank you for your patience and understanding while we investigate this issue in detail."

Many criticized the site’s owners for keeping such amounts of currency on hosted systems instead of using offline transactions and disconnecting the wallets from the trading infrastructure, especially after the Linode incident.

Zhou maintains that apart from the Bitcoins, the database was also stolen but the passwords was salted and encrypted using bcrypt. Zhou mentions that the stolen bitcoins are likely to be reimbursed by Bitcoinica in USD. This isn’t the first time Bitcoinica’s been broken into few months ago Bitcoinica’s bitcoin wallet which stored the funds were stolen due to a breach in Bitcoinica’s then webhost Linode.
Recommended Post Slide Out For Blogger