Articles Tagged with "Hacks"


From the Web

Even Einstein Can’t Track Google’s “Script Kiddie” Hackers

March 09, 2010 from: AEON Security Blog

News surrounding the attacks at Google and other companies are a dime a dozen and, while we have not seen any evidence publicly disclosed, we too can speculate along with everyone else. My first thoughts surrounding the news of the attack led me to believe that the compromise may have been an inside job.

Comments  (4)


From the Web

China Shut Down Biggest Hacker Training Site

February 09, 2010 from: Saumil's Infosec Blog

What is believed to be the country's biggest hacker training site has been shut down by police in Central China's Hubei province. Three people were also arrested, local media reported yesterday. The three, who ran Black Hawk Safety Net, are suspected of offering others online attacking programs and software, a crime recently added to the Criminal Law. A total of 1.7 million yuan ($249,000) in asse...

Comments  (2)


From the Web

Today’s threat: computer network terrorism

February 08, 2010 from: Saumil's Infosec Blog

“Carry out all my demands or the entire country’s electricity will be cut off.” Is this another line from a suspense film, or is it a palpable threat made possible with a computer keyboard? “Today, there is a growing trend amongst hackers around the world to threaten national infrastructures for ransom,” says Dr. Yaniv Levyatan, an expert in information war at the Uni...

Comments  (1)


From the Web

Defending Against Advanced Persistent Threats

February 08, 2010 from: AEON Security Blog

Google and other major companies and the report is both interesting and questionable. I have no reservations about the levels of expertise coming out of Mandiant or their findings; I do however, have reservations about the explanations and interpretation of what was summarized in the Wired article.

Comments  (0)


From the Web

Security researcher IDs China link in Google hack

January 20, 2010 from: Office of Inadequate Security

The malicious software used to steal information from companies such as Google contains code that links it to China, a security researcher said Tuesday. After examining the back-door Hydraq Trojan used in the hack, SecureWorks researcher Joe Stewart found that it used an unusual algorithm to check for data corruption when it transmits information. The source code for this algorithm, “only se...

Comments  (0)


From the Web

Hacking Takes Lead as Top Cause of Data Breaches

January 09, 2010 from: Office of Inadequate Security

Hacking has topped human error as the top cause of reported data breaches for the first time since such tracking began in 2007, according to the Identity Theft Resource Center’s 2009 Breach Report.In its report, titled “Data Breaches: The Insanity Continues,” the non-profit ITRC found that 19.5 percent of reported breaches were due to hacking, with insider theft as th...

Comments  (0)


From the Web

Pssst… For A Cup of Coffee, I’ll Say Your Cloud Is Secure

January 05, 2010 from: AEON Security Blog

In an article entitled “Cloud computing is a trap, warns GNU founder Richard Stallman” [1] the context couldn’t have been worded better:“It’s stupidity. It’s worse than stupidity: it’s a marketing hype campaign” … “Somebody is saying this is inevitable – and whenever you hear somebody saying that, it’s very likely...

Comments  (0)


From the Web

Cybercrooks stalk small businesses that bank online

January 03, 2010 from: Office of Inadequate Security

A rising swarm of cyber-robberies targeting small firms, local governments, school districts, churches and non-profits has prompted an extraordinary warning. The American Bankers Association and the FBI are advising small and midsize businesses that conduct financial transactions over the Internet to dedicate a separate PC used exclusively for online banking.

Comments  (0)


From the Web

Hacking the US Government Is Cheap – Costwise

December 21, 2009 from: AEON Security Blog

Anyone who follows information security news is probably wondering this week: “What in the hell is up with security in this country”. At least for those of us living in the United States, this should of been the statement of choice.

Comments  (1)


From the Web

Hacker hits NC community college system

December 17, 2009 from: Office of Inadequate Security

Patrons of North Carolina's community colleges may have had their drivers license and Social Security numbers stolen by a hacker.

Comments  (0)


From the Web

Cloud Based Wireless Cracking Services

December 15, 2009 from: AEON Security Blog

Security researchers are leveraging cloud computing to crack WPA wireless passwords at a cost and we’re wondering what other nefarious deeds are being done via cloud computing that we’ve never heard about. To be fair about this, for starters if you take notice of PC World’s title for the article, “New Cloud-based Service Steals Wi-Fi Passwords” it’s completely w...

Comments  (0)


From the Web

Gonzalez to plead guilty in NJ

December 08, 2009 from: Office of Inadequate Security

An admitted computer hacker charged in the nation’s largest-ever data breach has told federal prosecutors in New Jersey that he plans to plead guilty in connection to the alleged theft of more than 130 million credit card numbers.

Comments  (0)


From the Web

Risky business: Remote Desktop opened the door for Aloha hackers

November 25, 2009 from: Office of Inadequate Security

When nine restaurants in Louisiana and Mississippi filed lawsuits against Radiant Systems and its Louisiana distributor, they may have represented only the tip of a substantial iceberg of hacks affecting restaurants that used Radiant Systems’ Aloha POS system.  It seems that the scope of the problem is first coming to the public’s attention approximately one and a half years after...

Comments  (0)


From the Web

Man charged with developing and distributing cable network hacking tools

November 02, 2009 from: Office of Inadequate Security

Charges were unsealed in federal court in Massachusetts against an Oregon man and the company he founded, TCNISO, alleging that they developed and distributed products that allowed users to modify their cable modems and obtain internet access without paying for it.

Comments  (0)


From the Web

Confirmed: Thousands of Hotmail passwords leaked online

October 05, 2009 from: Office of Inadequate Security

An anonymous user posted details of the accounts on October 1 at pastebin.com, a site commonly used by developers to share code snippets. The details have since been removed but Neowin has seen part of the list posted and can confirm the accounts are genuine and most appear to be based in Europe. The list details over 10,000 accounts starting from A through to B, suggesting there could be addition...

Comments  (0)


From the Web

UNC security breach less severe than feared

September 30, 2009 from: Office of Inadequate Security

A hacker who wormed into a UNC Chapel Hill computer server may not have gotten access to as much information as officials originally feared.

Comments  (0)

Page « < 1 - 2 > »