Items Tagged with "hackers"


21bc599fa4dd7ac5d5367f4398458adc

Target Data Breach: Millions of In-Store Credit Cards Affected

December 19, 2013 Added by:Ken Westin

Multiple news sources are reporting that the Secret Service is investigating a data breach at Target in relation to millions of credit card and debit card numbers used in their stores.

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Iran and India, control and monitoring of networks

January 08, 2013 Added by:Pierluigi Paganini

The news is circulating for days, the Iranian head of the national security forces , Esmail Ahmadi Moghadam, declared that low enforcement of the country is developing a software for "smart control" of social-networking sites, the authorities have understood that the control of the powerful platforms is more important filtering.

Comments  (0)

296634767383f056e82787fcb3b94864

The "January Effect" - An Annual Phenomenon Since 2009

December 16, 2012 Added by:Jeffrey Carr

A phenomenon that I've noticed each year since 2009 - a major breach or act of cyber warfare that kicks off the New Year. It may start in December and then get publicized in January, or happen in January and get publicized a bit later but it has happened four years in a row now so I fully expect it to occur once again...

Comments  (1)

54a9b7b662bfb0f0445d1661d7ed180b

Hackers at the Controls

December 16, 2012 Added by:Jayson Wylie

An FBI report details what could be the hacking elite sect of Anonymous, Antisec, using a backdoor to compromise an air-conditioning control system in New Jersey. This leaves me to the question of how vulnerable the government and private sectors are for these types of compromise...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

How to get into your house through SmartTV

December 14, 2012 Added by:Pierluigi Paganini

Security experts posted a video that demonstrates how it is possible to attack a Samsung Smart TV exploiting a 0-day vulnerability to gain root access on it. The hacker could remotely wipe data from attached storage devices, monitoring and controlling the victim TV...

Comments  (0)

6648b1abd4a9b964566c3690613f20a6

FreeBSD Servers Hacked: Lessons on SSH Public Key Authentication

December 04, 2012 Added by:Mark Baldwin

FreeBSD.org are recommending that anyone who downloaded and installed any of their third-party packages between September 19 2012 and November 11 2012 reinstall their systems. Obviously this could be a big burden for a lot of organizations...

Comments  (4)

0a8cae998f9c51e3b3c0ccbaddf521aa

Wargames on a New Level - Hackfest.CA in Quebec City

December 02, 2012 Added by:Rafal Los

When I was asked to come out to Quebec for a conference called Hackfest.CA, I was interested because this isn't a conference I had heard of, and it wasn't on my radar. Additionally, the name suggests it's geared towards the 'hackers' and quite frankly, I'm fairly out of practice...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Hackers hit International Atomic Energy Agency (IAEA) agency

November 29, 2012 Added by:Pierluigi Paganini

The group of hackers who named itself Parastoo Farsi have exposed contacts for more than 100 nuclear experts and scientists, the word Parastoo is Farsi and refers to a bird species like the swallow and an Iranian girl's name...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Web Browsers, Exploits and H@x0rs… Oh, My!

November 26, 2012 Added by:Tripwire Inc

I might possibly be in the wrong business. Google announced recently that teenage hacker “Pinkie Pie” was awarded $60,000 for finding and reporting a bug in the company’s Chrome web browser. Apparently this is not even the first time he has accomplished this feat...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Credit Card Processors Targeted In Hacker Attacks

November 15, 2012 Added by:Robert Siciliano

A European hacker broke into a U.S. company’s computer network and stole 1,400 credit card numbers, account holders’ names and addresses, and security codes. The hacker, nicknamed Poxxie, sold the stolen credit card data to other cyber criminals through his own website, CVV2s.in, for $3.50 per credit card...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Man-in-the-Middle Redux

November 05, 2012 Added by:Tripwire Inc

This attack used to be fairly innovative. But not so much anymore. Would-be attackers can buy the basic components “off the shelf” using ready-made toolkits like Ettercap, Mallory (I love the creative use of the classic MITM name), and dsniff. If you’d like a better look at how it works, this is a good video...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Cybersecurity Matters in The Election

November 05, 2012 Added by:Robert Siciliano

Whomever is elected president will face an unknown unseen digital enemy unlike any other president has seen in history. Think before you click. Know who’s on the other side of that instant message. What you say or do in cyberspace stays in cyberspace — for many to see, steal and use against you or your government...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Attack by Team GhostShell Against Russian Government

November 05, 2012 Added by:Pierluigi Paganini

Hacktivism represents a serious problem for governments and intelligence agencies. The hack of IT infrastructure and the exposure of confidential information is a serious menace. In the past Anonymous has hit several governments and law enforcement agencies in the UK, US, Japan, and India...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Skimming, Identity Theft and How Online Business Defends Against Cybercrime

October 25, 2012 Added by:Robert Siciliano

Over the past 5 years a scam known as electronic funds transfers at the point of sale (EFTPOS) or skimming has been prevalent. Consumers commonly swipe both credit and debit cards through the in-store machines to pay for goods and services and hackers have been adept at coming up with ways to skim those cards...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Wrong response to zero day attacks exposes serious risks

October 22, 2012 Added by:Pierluigi Paganini

Recent revelations on Flame raise the question on the efficiency of zero day vulnerabilities, software bugs that hackers exploit to avoid security defenses on targeted systems. The real problem when we talk about zero-day is related to the duration of the period in which hackers exploit the vulnerability...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Chinese Hack Energy Company, Attack Pentagon, Try to Steal Stealth Bomber Skin

October 03, 2012 Added by:Dan Dieterle

China is well know for trying to steal military and scientific research, in an attempt to catch up on technology. How successful have they been? Just check out this cockpit comparison between China’s new Chengdu J-20 Stealth Fighter and the US F-22 Raptor...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »