LONDON (AFP)— A group of hackers vowed on Thursday to intensify a “war of data” against Mastercard, Visa and other groups which have cut funding to the WikiLeaks website over its release of US secrets.

The group “Anonymous” has claimed credit for bringing down the websites of the two firms after they suspended payments to WikiLeaks, and for attacking the site of a Swiss bank that closed an account of site founder Julian Assange, who is being held in the UK.

“The campaign is not over. It’s still going strong, more and more people are joining and helping in. Just last night Visa went down for a brief period,” an unofficial spokesman for the group, calling himself “Coldblood”, told BBC Radio.

“I see this as becoming a war but not your conventional war. This is a war of data, we are trying to keep the Internet open and free for everyone, just the way the Internet has been and always was.”

Coldblood, who speaks with a British accent and says he is a software engineer, said Anonymous was “targeting mainly companies which have decided for whatever reason not to deal with WikiLeaks”.

“Some of the main targets involve Amazon, Mastercard, Visa and PayPal.”

He said more people were downloading a so-called “voluntary botnet tool” which allows people to overload the servers of targeted groups.

The same tactic has been employed by unknown opponents of WikiLeaks itself in a bid to drive the website offline.

WikiLeaks supporters reportedly also shut down the website of the government of Sweden overnight, though there was no immediate claim of responsibility from Anonymous.

Assange, a 39-year-old Australian, is being held in a London prison pending a hearing on extradition to Sweden, where he is wanted for questioning over rape and sexual assault allegations.

Explore More

How does the form-based authentication scheme work?

The form-based authentication scheme works in the following manner: * A client generates a request for a protected resource (e.g. a transaction details page). * The Internet Information Server (IIS)

Malaysia mymasjid.net.my’s Web Vulnerability, MySQL Injection

PlanetCreator has reported another critical MySQL Injection (vulnerability) on www.mymasjid.net.my This vulnerability has been alerted to :- Webmaster : [email protected] Applications: ———— PlanetCreator’s_Universal_Advanced_Internet_Securi ty_T00L System Time: ———— (UTC+08:00) Kuala Lumpur,

Unrestricted File Upload @ Web-Based Teaching System Myanmar

Critical Unrestricted File Upload vulnerability found @ Web-Based Teaching System (Myanmar) URL : http://www.wbts.com.mm Malicious Attacker can upload some file to server without permission ! And It has persistent XSS