Keyword: hacking

Brevity: Headers | « Text »
  • 5 ways to protect yourself from data breaches

    09/20/2014 5:21:39 AM PDT · by TurboZamboni · 9 replies
    Pioneer Press ^ | 9-20-14 | Joseph Pisani
    NEW YORK (AP) — Data breaches at retailers aren't going away but there are ways consumers can protect themselves from future heists of their payment card information. Home Depot said Thursday that malicious software lurking in its check-out terminals between April and September affected 56 million debit and credit cards that customers swiped at its stores. Target, Michaels and Neiman Marcus have also been attacked by hackers in the past year.
  • Jennifer Lawrence Deserves Justice not Sympathy

    09/13/2014 11:13:57 AM PDT · by SeekAndFind · 53 replies
    Townhall ^ | 09/13/2014 | John Nantz
    Storing indiscreet photos in the “Cloud”is stupid. Jennifer Lawrence and a long list of other Hollywood starlets, models, and personalities must certainly now agree. The dust has settled somewhat surrounding the criminal hacking of Apple’s iCloud and the subsequent theft of nude photos stored there by a naive group of female celebrities. It’s easy to see that a crime has been committed and any rational person must agree that the perpetrator ought to be brought to justice, on this point there really is no debate. However, this incident is pregnant with irony. In monotonous unity and with the tempo of...
  • This Site Says It Will Tell If Your Gmail Password Was Hacked [But is it legit?]

    09/11/2014 9:18:25 AM PDT · by SeekAndFind · 16 replies
    Business Insider ^ | 09/11/2014 | Julie Bort
    As you may have heard, Russian hackers have published the passwords for roughly five million Gmail accounts. This follows the publication of millions of passwords for two of Russia's largest email services, Yandex and Mail.Ru.Chances are, your account is not one of the hacked Gmail accounts, because that figure of five million represents only a fraction of the number of Gmail accounts that are active in the world. For instance, the Gmail app has been downloaded one billion times to Android devices. Even back in 2012, Gmail had 350 million users.But a group of programmers have decided to help you check...
  • US Companies Can't Protect Citizens? Chinese Hackers Steal 4.5 Million Patients Info

    08/20/2014 7:38:03 AM PDT · by SeekAndFind · 6 replies
    Christian Post ^ | 08/20/2014 | BY SAMUEL SMITH
    One of America's largest hospital chains is the latest to fall victim to a group of sophisticated Chinese hackers who compromised 4.5 million patients' data including social security numbers in April and June. The cyber attack is the largest ever reported by a U.S. health care company and should serve as a warning to get more private companies to take their cyber protection more seriously. "Many companies are instituting anti-malware controls to detect malware prior to infection," said Kroll Cyber Investigations Managing Director Timothy P. Ryan in an email interview with The Christian Post. "Other companies are incorporating more robust...
  • Many home routers supplied by ISPs can be compromised en masse, researchers say

    08/11/2014 9:36:34 PM PDT · by Utilizer · 44 replies
    CSO ^ | 10 August, 2014 23:33 | Lucian Constantin (IDG News Service)
    Specialized servers used by many ISPs to manage routers and other gateway devices provisioned to their customers are accessible from the Internet and can easily be taken over by attackers, researchers warn. By gaining access to such servers, hackers or intelligence agencies could potentially compromise millions of routers and implicitly the home networks they serve, said Shahar Tal, a security researcher at Check Point Software Technologies. Tal gave a presentation Saturday at the DefCon security conference in Las Vegas. At the core of the problem is an increasingly used protocol known as TR-069 or CWMP (customer-premises equipment wide area network...
  • How to Use Your Cat to Hack Your Neighbor’s Wi-Fi

    08/10/2014 8:37:05 AM PDT · by Utilizer · 55 replies
    W I R E D ^ | 08.08.14 6:30 am | By Andy Greenberg
    How to Use Your Cat to Hack Your Neighbor’s Wi-Fi It appears that cannot be posted per their copyright complaint. Ignore the clickable link, it only points back to the FR index page... The link has more info... and a few pics. :)
  • Visit the Wrong Website, and the FBI Could End Up in Your Computer

    08/05/2014 10:18:32 PM PDT · by Utilizer · 58 replies
    W I R E D ^ | 08.05.14 6:30 am | Kevin Poulsen
    Apparently, the feebs have been using malware and the TOR network to snoop on quite a bit more information than one might have suspected. Use the following link here for more info:
  • SynoLocker demands 0.6 Bitcoin to decrypt Synology NAS devices

    08/05/2014 10:42:14 AM PDT · by Utilizer · 22 replies
    CSO ^ | on 04 August, 2014 09:53 AUS | Liam Tung (CSO Online (Australia)
    Synology network attached storage (NAS) devices, capable of storing terabytes of data, have been targeted by ransomware that encrypts victims’ files. Owners of Synology's NAS devices might want to unplug their storage boxes now to avoid being affected by ransomware that uses strong encryption to lock files on the brand’s machines and demands US$350 for the decryption key. The new attack on Synology kit comes within a year of Synology NAS devices being struck by fraudulent Bitcoin mining operators, with several owners on Sunday reporting that they had found a message from the “SynoLocker Automated Decryption Service” — when accessing...
  • This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil”

    07/31/2014 10:16:53 AM PDT · by Utilizer · 18 replies
    ars technica ^ | July 31 2014, 6:21am -0700 | Dan Goodin
    This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil” Per FR posting rules, ars technica can not be posted, so a link to the article referring to USB thumbdrives hacking computers is listed instead. Ignore the "source url", it just points back to the FR website. Article here:
  • Pittsburgh FBI cyber expert is ex-discount furniture salesman

    07/13/2014 10:07:18 PM PDT · by Citizen Zed · 13 replies
    trib live ^ | 7-13-2014
    “I was in private industry beforehand. But I've kind of always liked computers,” Mularski said during a recent interview. All 56 FBI field offices have cyber squads. Mularski chose Pittsburgh largely because of family considerations — he grew up in suburban White Oak, the son of a steelworker. “It kind of looked like cyber was the wave of the future,” Mularski said. “The majority of all my computer training was just on-the-job training at the bureau.” It has proved remarkably effective. Even before the Chinese and Russian cases made worldwide headlines, Mularski was making cyber waves. He infiltrated Dark Market...
  • The US Arrested an Alleged Russian Hacker — And Russia Is Pissed

    07/08/2014 10:08:18 PM PDT · by WhiskeyX · 4 replies
    Vice News ^ | July 8, 2014 | 3:39 pm | Jordan Larson
    In the latest disagreement between Russia and the US, a 30-year-old Russian national has been arrested for allegedly hacking US retailers, gaining access to credit card information, and selling it. Roman Valerevich Seleznev was arrested while vacationing with his family in the Maldives; he was subsequently transported to Guam. In a statement on its website, the Russian Foreign Ministry denounced the arrest, referring to it as a “kidnapping” and “the latest unfriendly move from Washington."
  • Eyes on you: Experts Reveal Police Hacking Methods

    07/04/2014 3:51:32 PM PDT · by nickcarraway · 4 replies
    KWWL ^ | Jun 25, 2014 | Raphael Satter
    Law enforcement agencies across the globe are taking a page out of the hacker's handbook, using targets' own phones and computers to spy on them with methods traditionally associated with cybercriminals, two computer security groups said Tuesday. Drawing on a cache of leaked documents and months of forensic work, two reports about the private Italian firm Hacking Team expose a global network of malicious software implants operated by police and spy agencies in dozens of countries. "This in many ways is the police surveillance of the now and the future," said Morgan Marquis-Boire, a security researcher with Citizen Lab and...
  • How to Hack a Car: Phreaked Out

    06/15/2014 5:39:24 PM PDT · by TurboZamboni · 41 replies
    Motherboard ^ | 5-29-14 | Motherboard
    These days, your car isn't a car - it's a rolling computer platform. You don't drive it as much as you give the computer commands and then let it carry them out. That's why the idea of hackers breaking into car computers is so terrifying. You have to see this video showing the scary reality of car hacking.
  • Hacking case belies profitable US links with China

    Justice Department's indictment last week of five Chinese military officials accused them of trying to pilfer confidential information from American companies. Westinghouse, is building four nuclear reactors in China. Allegheny Technologies, operates a joint venture in Shanghai. Alcoa, is the biggest foreign investor in China's aluminum market. 77 Chinese company stocks now trade on the NYSE. e-commerce giant Alibaba - plans to list its stock in the United States, either on the NYSE or NASDAQ. General Motors sells more cars in China than in the United States.
  • ebay wants users to change passwords due to cyberattack

    05/21/2014 7:19:22 AM PDT · by Rodney Dangerfield · 15 replies ^ | May, 21st, 2014 | N/A
    eBay Inc. (Nasdaq: EBAY) said beginning later today it will be asking eBay users to change their passwords because of a cyberattack that compromised a database containing encrypted passwords and other non-financial data. After conducting extensive tests on its networks, the company said it has no evidence of the compromise resulting in unauthorized activity for eBay users, and no evidence of any unauthorized access to financial or credit card information, which is stored separately in encrypted formats. However, changing passwords is a best practice and will help enhance security for eBay users.
  • China summons US envoy over cyber-spying charges, vows retaliation

    05/20/2014 1:01:42 PM PDT · by tcrlaf · 16 replies
    RT ^ | 5-20-2014 | RT
    China has dismissed all US accusations of industrial cyber-espionage against five of its military officials and published proof that Washington is actually stealing data from China. Beijing also summoned the US ambassador for an explanation. Beijing reacted to Washington’s recent round of industrial espionage accusations by publishing its latest data on US cyber-attacks against China. China’s National Computer Network Emergency Response Technical Team Coordination Center of China (NCNERTTCC) reported that during just two months, from March 19 to May 18, the US directly controlled 1.18 million host computers in China using 2,077 Trojan horse networks or botnet servers. According to...
  • China Slams 'Absurd' US Hacking Charges

    05/20/2014 2:51:42 AM PDT · by Enterprise · 25 replies
    Newser ^ | 5-20-14 | Rob Quinn
    "Eric Holder described the charging of five Chinese military officers with cybercrimes as a "wake-up call" and China is certainly paying attention: Government officials have summoned the US ambassador in Beijing, suspended a cybersecurity agreement made with the US last month, and denounced the charges as an "absurd" move that has "severely damaged mutual trust," reports the BBC, which notes that it is "extremely unlikely" that any of the accused will ever be sent to the US to face charges."
  • GAO: IRS has information security control weaknesses

    04/09/2014 9:18:34 PM PDT · by Up Yours Marxists · 7 replies
    FCW ^ | April 09 2014 22:42 GMT | Mike Cipriano
    The Internal Revenue Service continues to have weaknesses in information security control that the Government Accountability Office fears could affect the confidentiality, integrity and availability of financial and sensitive taxpayer data. An April 8 GAO report found that although the IRS has improved on information security control and internal control over financial reporting, significant risks remain. The agency has failed to consistently install the appropriate patches on all databases and servers to protect against known vulnerabilities, GAO found, and also failed to sufficiently monitor database controls and appropriately restrict access to its mainframe environment. The IRS has also allowed individuals...
  • Targeting Huawei: NSA Spied on Chinese Government and Networking Firm

    03/22/2014 8:12:08 PM PDT · by Star Traveler · 13 replies
    Spiegel Online International ^ | Sunday, March 23, 2014 | Spiegel Staff
    A special unit with the US intelligence agency succeeded in infiltrating Huwaei's network and copied a list of 1,400 customers as well as internal documents providing training to engineers on the use of Huwaei products, among other things. Source Code Breached According to a top secret NSA presentation, NSA workers not only succeeded in accessing the email archive, but also the secret source code of individual Huwaei products. Software source code is the holy grail of computer companies. Because Huawei directed all mail traffic from its employees through a central office in Shenzhen, where the NSA had infiltrated the network,...
  • N.S.A. Breached Chinese Servers Seen as Security Threat

    03/22/2014 7:48:35 PM PDT · by Star Traveler · 36 replies
    The New York Times ^ | Saturday, March 22, 2014 | David E. Sanger & Nicole Perlroth
    WASHINGTON — American officials have long considered Huawei, the Chinese telecommunications giant, a security threat, blocking it from business deals in the United States for fear that the company would create “back doors” in its equipment that could allow the Chinese military or Beijing-backed hackers to steal corporate and government secrets. But even as the United States made a public case about the dangers of buying from Huawei, classified documents show that the National Security Agency was creating its own back doors — directly into Huawei’s networks. The agency pried its way into the servers in Huawei’s sealed headquarters in...
  • Suspected Russian spyware Turla targets Europe, U.S.

    03/07/2014 9:05:54 AM PST · by afraidfortherepublic · 5 replies
    Reuters ^ | 3-7-14 | Peter Apps and Jim Finkle
    A sophisticated piece of spyware has been quietly infecting hundreds of government computers across Europe and the United States in one of the most complex cyber espionage programs uncovered to date. Several security researchers and Western intelligence officers say they believe the malware, widely known as Turla, is the work of the Russian government and linked to the same software used to launch a massive breach on the U.S. military uncovered in 2008. Those assessments were based on analysis of tactics employed by hackers, along with technical indicators and the victims they targeted.
  • Millions and Millions of Stolen Credentials Just Waiting to Be Bought Online

    03/01/2014 3:48:59 AM PST · by afraidfortherepublic · 10 replies
    The Wire ^ | 2-28-14 | Danielle Weiner-Bronner
    Link only. Read article at source.
  • British man charged with hacking Federal Reserve

    02/27/2014 7:46:36 PM PST · by Olog-hai · 8 replies
    Associated Press ^ | Feb 27, 2014 4:17 PM EST | Larry Neumeister
    A British man accused of hacking into U.S. government computer networks was charged in a new indictment unsealed Thursday with infiltrating the Federal Reserve’s computers. Lauri Love, 28, of Stradishall, England, was charged with computer hacking and aggravated identity theft, which carry a potential penalty of up to 12 years in prison. He initially was arrested in Great Britain in October and released on bail after he was charged under a United Kingdom law that permits the arrest of anyone who starts attacks from the U.K. on computers anywhere in the world. …
  • GPS pioneer warns on network’s security

    02/13/2014 5:25:29 PM PST · by CedarDave · 10 replies
    The Financial Times ^ | February 13, 2014 | Sam Jones and Carola Hoyos
    The Global Positioning System helps power everything from in-car satnavs and smart bombs to bank security and flight control, but its founder has warned that it is more vulnerable to sabotage or disruption than ever before – and politicians and security chiefs are ignoring the risk. Impairment of the system by hostile foreign governments, cyber criminals – or even regular citizens – has become “a matter of national security”, according to Colonel Bradford Parkinson, who is hailed as the architect of modern navigation. “If we don’t watch out and we aren’t prepared,” then countries could be denied everything from ‘navigation’...
  • Robertson (D NY-23) Will Not Hire Cyber-Security Firm to Investigate Hacking Claims

    02/08/2014 8:44:44 AM PST · by Behind Liberal Lines · 5 replies
    WETM TV ^ | 02/08/14 | Ben Amey
    A local congressional candidate now says she will not be hiring a cyber-security firm to look into claims that someone hacked her campaign’s website. The situation started in September, 2013, when Democrat Martha Robertson’s campaign sent an e-mail out to supporters claiming “GOP ops” were trying to hack their website. In early October, the Robertson campaign backed off the “GOP ops” claim during an interview with WETM, but presented evidence showing there were multiple “SQL injection” attacks made on the website. And during an interview with the political site Roll Call, Robertson state the campaign was looking into hiring a...
  • NBC: Visitors To Sochi Olympics Can Expect To Be Hacked

    02/04/2014 10:07:42 PM PST · by Lmo56 · 30 replies
    Washington Free Beacon ^ | 2/4/14 | Washington Free Beacon Staff
    Visitors to the Sochi Winter Olympics can expect for their computers and mobile devices to be hacked, NBC’s Richard Engel reported Tuesday evening on NBC Nightly News. Engel conducted multiple experiments with the help of an American based security expert in which the NBC reporter logged onto various public WIFI networks around Moscow. Almost immediately, all of Engel’s devices were exposed to malicious malware. Analysis revealed some of Engel’s devices were transmitting personal data stored on his computer to a server based in Russia. The best way for travelers to avoid these issues, Engel said, is to avoid public WIFI...
  • Kim Kardashian's identity stolen by Lake Mary man in celebrity scheme [Biden, Michelle, Gates]

    02/01/2014 5:51:59 AM PST · by Cincinatus' Wife · 25 replies
    Orlando Sentinel ^ | January 31, 2014 | By Amy Pavuk
    A 19-year-old who lived at home with his mom and worked at a local call center stole the identities of America's rich and famous — including Kim Kardashian and the head of the FBI — and took over their financial accounts..... ...Earlier this week, Flores learned he'll spend the next 3 1/2 years in federal prison for his identity theft scheme..... ....At the time, Flores was already facing criminal charges in state court, where he was accused of taking private information from a coworker's personnel profile and having his colleague's paycheck directly deposited into his own bank account. Flores was...
  • Malformed FileZilla FTP client with login stealer

    01/28/2014 10:08:51 AM PST · by Utilizer · 25 replies
    avast antivirus blog ^ | January 27th, 2014 | Malware Analyst Workforce
    Beware of malformed FileZilla FTP client versions 3.7.3 and 3.5.3. We have noticed an increased presence of these malware versions of famous open source FTP clients. The first suspicious signs are bogus download URLs... Malware installer GUI is almost identical to the official version. The only slight difference is version of NullSoft installer where malware uses 2.46.3-Unicode and the official installer uses v2.45-Unicode. All other elements like texts, buttons, icons and images are the same. The installed malware FTP client looks like the official version and it is fully functional! You can’t find any suspicious behavior, entries in the system...
  • Hacking expert David Kennedy says he cracked in 4 minutes

    01/20/2014 10:04:15 AM PST · by ransomnote · 39 replies ^ | January 19, 2014 | Jessica Chasmar
    The man who appeared before Congress last week to explain the security pitfalls of took to Fox News on Sunday to explain just how easy it was to penetrate the website. Hacking expert David Kennedy told Fox’s Chris Wallace that gaining access to 70,000 personal records of Obamacare enrollees via took about 4 minutes and required nothing more than a standard browser, the Daily Caller reported. PHOTOS: Eye-popping excuses in American political scandals “And 70,000 was just one of the numbers that I was able to go up to and I stopped after that,” he said. “You know,...
  • Cyber experts uncover 2 million stolen passwords to Web accounts

    01/10/2014 1:15:39 AM PST · by legalservicesbc · 8 replies ^ | December 5, 2014 | Robert Galbraith
    <p>Researchers with Trustwave's SpiderLabs said they discovered the credentials while investigating a server in the Netherlands that cyber criminals use to control a massive network of compromised computers known as the "Pony botnet."</p> <p>The company told Reuters on Wednesday that it has reported its findings to the largest of more than 90,000 websites and Internet service providers whose customers' credentials it had found on the server.</p>
  • Target confirms PIN data was stolen in breach

    12/27/2013 10:10:54 AM PST · by John W · 38 replies
    CNN ^ | December 27, 2013 | David Goldman
    Target confirmed Friday that debit card PIN data was stolen in its recent massive breach, reversing its earlier stance that the codes were not part of the hack. However, the retailer believes the PINs remain "safe and secure." In a statement, Target spokeswoman Molly Snyder said the PINs are "strongly encrypted" and were never stored on Target's systems in plain text. In other words, from the moment a customer entered a PIN after swiping a debit card, Target's payment system translated that number into an indecipherable string of code. Target claims that the PINs remained encrypted after they were stolen....
  • Hiding the Hacking at [Feds Attacking Target, Ignore Their BIGGER Disaster!]

    12/24/2013 3:31:26 AM PST · by SoFloFreeper · 18 replies
    National Review ^ | 12/23/13 | John Fund
    If your personal info is filched from the site, the government doesn’t have to tell you. Christmas shoppers were stunned to learn last Thursday that computer hackers had made off with the names and other personal info of some 40 million Target customers. Some of the pilfered information is reportedly being sold on the black market, prompting JP Morgan Chase to limit purchases and cash withdrawals on debit cards owned by recent Target shoppers. But at least Target informed its customers of the security breach, as it is required by federal law to do. faces no such requirement; it...
  • Hiding the Hacking at [will not let you know]

    12/23/2013 4:22:31 AM PST · by Cincinatus' Wife · 41 replies
    National Review ^ | December 23, 2013 | John Fund
    Christmas shoppers were stunned to learn last Thursday that computer hackers had made off with the names and other personal info of some 40 million Target customers. Some of the pilfered information is reportedly being sold on the black market, prompting JP Morgan Chase to limit purchases and cash withdrawals on debit cards owned by recent Target shoppers. But at least Target informed its customers of the security breach, as it is required by federal law to do. faces no such requirement; it need never notify customers that their personal information has been hacked or possibly compromised. The Department...
  • Obama Administration Knew of Security Risks Before Launch (19 vulnerabilities)

    12/20/2013 6:17:14 AM PST · by Zakeet · 15 replies
    Washington Free Beacon ^ | December 19, 2013 | Elizabeth Harrington
    Documents provided to the House Committee on Government Oversight and Reform reveal that the Obama administration knew of security vulnerabilities within prior to Oct. 1, but launched the website anyway. Chairman Darrell Issa (R., Calif.) said Health and Human Services (HHS) officials showed a “disturbing lack of judgment” by going ahead with the site’s launch and putting Americans’ personal information at risk. Results of a security assessment conducted by a contractor on the site, MITRE Corporation, found that 19 security vulnerabilities remained unaddressed on Oct. 1. Eleven of the 19 vulnerabilities “significantly impact the confidentiality, integrity and/or availability of...
  • Leaked Passwords On Display At a German Museum

    12/15/2013 8:36:11 PM PST · by Utilizer
    slashdot ^ | Saturday December 14, 2013 @12:25PM | Posted by timothy
    Daniel_Stuckey writes "Earlier this year, it was London. Most recently, it was a university in Germany. Wherever it is, [artist Aram] Bartholl is opening up his eight white, plainly printed binders full of the 4.7 million user passwords that were pilfered from the social network and made public by a hacker last year. He brings the books to his exhibits, called 'Forgot Your Password,' where you're free to see if he's got your data—and whether anyone else who wanders through is entirely capable of logging onto your account and making Connections with unsavory people. In fact, Bartholl insists: "These eight...
  • Hacking trial: Police 'told to leave Queen's nuts'

    12/12/2013 9:49:44 AM PST · by NormsRevenge · 35 replies
    BBC News ^ | 12/12/13 | BBC
    The Queen marked the level in bowls of nuts left around Buckingham Palace as she was "irritated" by police officers eating them, the Old Bailey has heard. According to an email sent by Clive Goodman, ex-royal editor at the News of the World, she was "upset" by it. The journalist added that a memo was sent to palace officers, telling them to "keep their sticky fingers out". The phone-hacking jury has also heard one of the defendants, Ian Edmondson, is no longer fit to stand trial. Mr Justice Saunders said that it was "not appropriate to adjourn to wait for...
  • Naked Bruni pics used to hack European diplomats

    12/11/2013 9:59:35 AM PST · by ScaniaBoy · 29 replies ^ | 11 December, 2013 | EUOBSERVER
    China hacked computers in the foreign ministries of Bulgaria, the Czech Republic, Hungary, Latvia and Portugal in summer 2013, The New York Times reports, citing own research and work by IT firm FireEye. It said officials triggered malware by clicking email links to naked pictures of French celebrity Carla Bruni.
  • Security Experts Warn Is Vulnerable to Hacking

    12/03/2013 9:18:34 AM PST · by topher · 25 replies
    ABC News ^ | Nov 19, 2013 6:01pm | John Parkinson
    Cyber security experts told Congress today that the Obama administration should take offline until privacy vulnerabilities are addressed and detection capabilities are improved. David Kennedy, a so-called “white hat hacker” who tests security flaws by hacking online systems to help identify weaknesses, warned that there are critical flaws and exposures “currently on the website that hackers could use to extract sensitive information.” “The purpose of security isn’t to say, ‘Hey, we’re 100 percent impenetrable all the time,’ but can we detect the hackers in the very early stages of the life cycle of the attack, monitor that, and prevent...
  • NSA infected 50,000 computer networks with malicious software

    11/24/2013 3:08:41 PM PST · by dynachrome · 29 replies ^ | 11-23-13 | Floor Boon, Steven Derix and Huib Modderkolk
    The American intelligence service - NSA - infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information. Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this. A management presentation dating from 2012 explains how the NSA collects information worldwide. In addition, the presentation shows that the intelligence service uses ‘Computer Network Exploitation’ (CNE) in more than 50,000 locations. CNE is the secret infiltration of computer systems achieved by installing malware, malicious software. One example of this type of hacking was discovered in September 2013 at the Belgium telecom provider Belgacom....
  • Health insurance credentials fetch high prices in the online black market

    11/21/2013 3:20:43 AM PST · by fso301 · 5 replies
    SC Magazine ^ | July 16, 2003 | Adam Greenberg
    Here's to your health...your health insurance credentials, that is. Information security service provider Dell SecureWorks has uncovered in a new report that buyers are dropping big bucks for health insurance documents that are being hawked on the internet underground with the goal of using them to commit fraud. Dell SecureWorks Counter Threat Unit (CTU) senior security researcher Don Jackson has investigated underground market supply and demand for years, and beginning in May, he sought to update how buyers are spending their money in 2013. Jackson discovered people are laying down top dollar for all-inclusive health insurance dossiers known as “Kitz,”...
  • Woman Signs Up For Obamacare And Has Identity Stolen

    11/20/2013 10:50:42 AM PST · by sevinufnine · 75 replies
    Off the Grid News ^ | November 13, 2013 | Daniel Jennings
    Experts’ warnings of Obamacare website’s complete lack of security apparently have been justified. The website gave at least 3 unknown individuals access to a woman’s Social Security number, address, and other data that could be used for identity theft. Customer service operators at’s 1-800 number told Lisa Martinson about the unauthorized access when she called in to change her password. When Martinson asked for her information to be removed from the site she was told it would take 5 days.
  • Dragon Day Movie: Have You Guys Seen This?

    11/15/2013 9:39:41 AM PST · by Bill Russell · 25 replies
    Dragon Day -- Movie Trailer ^ | October 2013 | Movie Trailer
    Someone may have posted something on this already...Scary concept and has a little too close to real feel...
  • British man accused of hacking into US government systems

    11/13/2013 5:05:50 PM PST · by Libloather · 8 replies
    BBC ^ | 10/28/13
    **SNIP** According to the US authorities, the arrested man hacked into systems of the US Army, Nasa and the Environmental Protection Agency, among others. **SNIP** The suspected hackers allegedly placed "back doors", or code, to allow them to get back into the systems later to steal confidential information.
  • Phone chargers/USB sticks given to G20 world leaders by Russian hosts were 'trojan horses

    10/29/2013 3:21:49 PM PDT · by afraidfortherepublic · 20 replies
    Daily Mail ^ | 10-29-13 | Hannah Roberts In Rome
    The revelation came after Germany's secret service investigated the devices It warned that they were 'trojan horses' capable of fishing for information Warnings have gone out to every government that received them America’s NSA spy agency has been under fire from around the world for its surveillance activity over the past few months. Now the Russians are facing criticism for some allegedly shady operations, too. It’s claimed that USB drives and phone chargers, given to world leaders at the G20 summit in Russia were 'Trojan horses' capable of sending data back to the Kremlin. David Cameron did not receive one...
  • Was ISRAEL behind the hacking of millions of French phones and NOT the U.S.?

    10/25/2013 12:22:57 PM PDT · by Nachum · 31 replies
    Daily Mail ^ | 10/25/13 | Nabdila Ramdani
    Israel and not America was behind the hacking of millions of French phones, it was claimed today. [Snip] But today’s Le Monde newspaper provides evidence that it was in fact Israeli agents who were listening in. France first suspected the U.S. of hacking into former president Nicolas Sarkozy’s communications network when he was unsuccessfully trying for re-election in 2012. Intelligence officials Bernard Barbier and Patrick Pailloux travelled from Paris to Washington to demand an explanation, but the Americans hinted that the Israelis were to blame. The Americans insisted they have never been behind any hacking in France, and were always
  • John McAfee On Obamacare: “This Is A Hacker’s Wet Dream”

    10/05/2013 11:01:25 AM PDT · by Oldpuppymax · 13 replies
    Coach is Right ^ | 10/5/03 | Michael D. Shaw
    The man whose name is synonymous with computer security shreds Obamacare’s web strategy. The very worst kind of identity theft is medical identity theft, but when you also combine this with all sorts of additional...

    09/28/2013 10:50:27 AM PDT · by MeshugeMikey · 14 replies ^ | September 28, 2013 | Aliya Sternstein
    A service that sells personal data to identity thieves has been getting its wares from hacked data brokers storing information similar to what Obamacare marketplaces plan to use, setting the scene for fraudsters to collect government subsidies. According to a new investigative report by cybersecurity researcher Brian Krebs, the service, known as SSNDOB, hacked LexisNexis and other large data aggregators that supply ID check information.
  • Shodan: The scariest search engine on the Internet

    08/02/2013 8:07:06 PM PDT · by 2ndDivisionVet · 50 replies
    CNN Money ^ | April 8, 2013 | David Goldman
    "When people don't see stuff on Google, they think no one can find it. That's not true." That's according to John Matherly, creator of Shodan, the scariest search engine on the Internet. Unlike Google, which crawls the Web looking for websites, Shodan navigates the Internet's back channels. It's a kind of "dark" Google, looking for the servers, webcams, printers, routers and all the other stuff that is connected to and makes up the Internet. (Shodan's site was slow to load Monday following the publication of this story.) Shodan runs 24/7 and collects information on about 500 million connected devices and...
  • The world’s Most Dangerous Search Engine

    02/08/2013 7:39:37 PM PST · by nickcarraway · 6 replies
    San Diego CityBeat ^ | Wednesday, Feb 06, 2013 | Dave Maass
    Aren’t you glad Shodan is in the hands of good guys like John Matherly?Ask John Matherly if he’s a hacker, and he’ll struggle for a moment with the term. On one hand, he’s a hacker, in the sense that he’s an innovative programmer, arms deep in the information-security industry. On the other, he’s hypersensitive to how his baby—a project called Shodan—is portrayed in the press. In the past year, it’s surged in notoriety and not just in technology publications, such as Ars Technica and Wired. Shodan’s been the subject of multiple Washington Post investigative features, profiled on Dutch television and...
  • Federal Agencies Fall Victim to African Fraud Scheme

    07/25/2013 8:37:57 AM PDT · by Red Badger · 10 replies ^ | 07-25-2013 | Staff
    (WASHINGTON) -- Even the U.S. government has to deal with those pesky, Internet-based scams out of Africa. New court documents show that several years ago, the U.S. Department of Defense, the National Institutes of Health and other federal agencies fell victim to an intricate fraud scheme, whereby individuals in Kenya were able to divert payments from those agencies to their own bank accounts. In 2008, a group of unidentified individuals in Kenya somehow accessed the U.S. government’s Central Contractor Registry, a password-protected database that maintains bank account information of government contractors and research institutions doing work for the government, according...