Keyword: hacking

Brevity: Headers | « Text »
  • Chinese Warn Google May Get Punished For Making Country Look Bad

    06/06/2011 6:21:32 AM PDT · by TigerLikesRooster · 23 replies
    Search Engine Land ^ | 06/06/11 | Greg Sterling
    Chinese Warn Google May Get Punished For Making Country Look Bad Jun 6, 2011 at 8:31am ET by Greg Sterling China is being very defensive. Google’s recent exposure of more attempted Gmail hacking, targeting US government officials and Chinese human-rights activists, has made the Chinese government embarrassed and angry. Suspected state-sponsored Gmail hacking is what initially caused Google to discontinue cooperating with China’s internet censorship policies. Chinese: Google Is a “Political Tool” Last week’s hacking incident and Google’s statements that indirectly point to the government as the source have the Chinese seeing red, so to speak. Claiming that China is...
  • The Way to Fight China's Hacking

    06/04/2011 2:29:22 AM PDT · by Rudder · 6 replies
    WSJ ^ | 6/03/11 | HOLMAN W. JENKINS, JR
    Google wouldn't be human if it weren't relieved that the latest Chinese hacking incident targeted not a hole in Google's defenses but a gullibility of its customers. The proper term is "spear phishing" for the use of email cons to scam a specific, chosen individual into revealing his or her password, allowing unauthorized access to inboxes and online accounts. In a blog post this week, Google announced that the latest attacks seem to come from Jinan, China. The targets were the Gmail accounts of "senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military...
  • Anthony Weiner: I’m done providing non-answers to you all (New Media Strategy: Silence)

    06/02/2011 1:23:13 PM PDT · by SeekAndFind · 46 replies · 1+ views
    Hotair ^ | 06/02/2011 | Ed Morrissey
    After spending the last two days generating more questions than answers, Rep. Anthony Weiner (D-NY) held a press conference this morning to announce that he had nothing more to say. Saying that the “prank has apparently been successful,” Weiner told the media that he had “answered questions extensively … that anyone wanted to put” and that he would have no more to say on the matter of a salacious picture sent out on his Twitter feed: CLICK ABOVE LINK FOR THE VIDEO Funny, most of the media is under the impression that Weiner hasn’t really answered two questions in particular:...
  • Anthony Weiner won't deny lewd photo is him

    06/01/2011 1:42:15 PM PDT · by SeekAndFind · 30 replies
    CBS News ^ | 06/01/2011 | Brian Montopoli, Jill Jackson
    In an interview with CBS News Wednesday, New York Democratic Rep. Anthony Weiner repeatedly refused to deny that his crotch is seen in a lewd photograph sent to a college student from his Twitter account. Weiner did say explicitly that he did not send the photo. "I did not, this was a prank, a hoax," he told CBS News' Congressional Correspondent Nancy Cordes. He said his "system was hacked into," noting that "we've retained a firm that is going to take a look at the Internet security that to make sure this does not happen again." Weiner said the firm...
  • Revealed: The glamorous Twitter girls followed by Congressman Weiner as he denies sending...

    06/01/2011 8:12:21 AM PDT · by doug from upland · 56 replies
    daily mail ^ | 6-1-11
    Revealed: The glamorous Twitter girls followed by Congressman Weiner as he denies sending lewd picture By Daily Mail Reporter Sent private messages on Twitter to porn star called 'Miss Ginger Lee' Pursued attractive congress worker two days after 9/11 attacks Sponsored a bill in 2008 to give 1,000 visas to foreign models Refuses to answer questions on crotch shot as he hires a lawyer The New York Congressman under fire for allegedly sending a crotch picture to a female student faced fresh controversy today after it emerged he follows a string of glamorous women on Twitter. Anthony Weiner has almost...
  • Lockheed Martin hit by cyber incident, U.S. says

    05/28/2011 7:00:40 PM PDT · by SeekAndFind · 16 replies
    Reuters ^ | 05/28/2011
    Lockheed Martin Corp, the world's biggest aerospace company and the Pentagon's No. 1 supplier by sales, has been hit by an unspecified cyber incident, the government said on Saturday. The Department of Homeland Security said it and the Defense Department had offered to help gauge the scope of a "cyber incident impacting LMCO," as the maker of fighter jets, ships and other major weapons systems is known. The U.S. government also has offered to help analyze "available data in order to provide recommendations to mitigate further risk," Chris Ortman, a Homeland Security official, said in an e-mailed reply to a...
  • Rebels Hijack Gadhafi's Phone Network

    04/14/2011 10:05:24 AM PDT · by bigbob · 2 replies
    WSJ Online ^ | 4-13-11 | MARGARET COKER and CHARLES LEVINSON
    A team led by a Libyan-American telecom executive has helped rebels hijack Col. Moammar Gadhafi's cellphone network and re-establish their own communications. The new network, first plotted on an airplane napkin and assembled with the help of oil-rich Arab nations, is giving more than two million Libyans their first connections to each other and the outside world after Col. Gadhafi cut off their telephone and Internet service about a month ago. That March cutoff had rebels waving flags to communicate on the battlefield. The new cellphone network, opened on April 2, has become the opposition's main tool for communicating from...
  • Massive Breach at Epsilon Compromises Customer Lists of Major Brands

    04/02/2011 8:46:19 PM PDT · by brytlea · 48 replies
    Security Week ^ | April 2, 2011 | Mike Lennon
    Due to the growing list of brands disclosing that they have been compromised as a result of this breach, I’m going to go ahead and tag this as a massive breach. And I only expect it to get bigger as more announcements come out from Epsilon customers. Last night we reported on a breach at marketing services provider, Epsilon, the world’s largest permission-based email marketing provider. Initially we wrote that the breach had affected Kroger, the nation's largest traditional grocery retailer. There is a list of companies at the link (but I don't know if that is going to be...
  • Conservatives are in crosshairs of today's "hacktivists"

    The Future of Dirty Politics? By Ed Hassell Ever since it passed, the national health care law commonly known as ObamaCare has been entangled in legal battles and heated national debate. As polls have consistently shown, a majority of the public remains opposed to the law and many are worried because they never found out what was even in it. While the law has spurred countless news stories, a recent one you may have missed involved the attorney David Rivkin, who successfully led the multi-state challenge to ObamaCare filed in Florida. A prominent conservative voice, Rivkin has been a staunch...
  • Chinese Hackers Access Korea's Global Hawk Purchase Plans

    03/07/2011 5:36:56 AM PST · by TigerLikesRooster · 2 replies
    Chosun Ilbo ^ | 03/07/11
    Chinese Hackers Access Korea's Global Hawk Purchase Plans Chinese hackers gained access to the government's top-secret plan to buy the U.S.-made Global Hawk reconnaissance drone in June 2010, it emerged Sunday. "We've had a report from a government official that China launched a hacking attack on the Defense Ministry's computer system and accessed confidential information about the ministry's plan" to buy the drone, a spokesman for Democratic Party lawmaker Shin Hak-yong of the National Assembly's Defense Committee said. "The government hasn't raised this issue with China yet and is apparently still mulling how to handle it." Seoul asked Washington to...
  • Someone just hacked my craigslist account

    02/07/2011 8:26:40 PM PST · by MeneMeneTekelUpharsin · 25 replies · 1+ views
    craigslist.org | 07 September 2011
    Someone JUST hacked my craigslist account. I don't have a clue as to how they did it, but they posted four ads in the Westchester, NY area using my craigslist e-mail. Beats my four aces as to how they did it. I've deleted the cell phone ads, changed my password AND changed the receiving e-mail on the account. Does anyone have ANY idea as to how they hacked my craigslist account? Or, has craigslist suffered a major identity theft from its database?
  • On N. Korean heir's birthday, a rude cyber-greeting

    01/08/2011 5:11:43 AM PST · by TigerLikesRooster · 11 replies
    WP ^ | 01/08/11 | Chico Harlan
    On N. Korean heir's birthday, a rude cyber-greeting By Chico Harlan Washington Post Foreign Service Saturday, January 8, 2011; 7:05 AM BEIJING - Apparently breached by hackers, North Korea's official Twitter account on Saturday described leader Kim Jong Il and heir apparent Kim Jong Eun as sworn enemies and called for an uprising to remove them from power. By the time the micro-blogging mischief was over, the North Korean tweets had ranted to its 10,000-plus Twitter followers about profligate nuclear weapons spending and lavish Kim Jong Il drinking parties - hosted "while 3 million people are starving and freezing to...
  • WikiLeakers are America-hating Nihilists

    12/20/2010 11:00:47 AM PST · by Silverfiddle · 2 replies
    Western Hero ^ | 20 December 2010 | Silverfiddle
    The WikiLeakers and the Bathrobe Brigades now launching hack attacks from their parents' basements are not free speech heroes, they are leftwing collectivists lashing out at all they hate:  America, Capitalism, and of course, Sarah Palin. Socialism Advances Behind a Screen of BS The Palin attack is what revealed their true colors. What does she have to do with the free flow of information? How does stealing her and Todd's credit cards advance the cause of an open society? Many of these hackers are society’s losers. They are unsuccessful, so they hate society. They lack the skills and self-discipline...
  • RFID Hacking: Is It A Threat?

    10/14/2010 11:32:35 AM PDT · by ShadowAce · 16 replies
    Techware Labs ^ | 13 October 2010 | Chris
    Introduction: How often do you go to the store on a monthly basis? Maybe you go down to the local Starbucks every morning before work. This is prime hunting ground for an attacker to steal all of your credit card information without ever touching you, using equipment they got on ebay for under $20. These are the threats that credit card companies and the thieves don’t want you to know about. RFID hacking has been in the news quite a bit lately. There’s a lot of concern as to what it involves, how easy it is, and what exactly RFID...
  • <b>Where Have All the Hackers Gone?</b>

    10/03/2010 7:30:05 PM PDT · by cycjec · 10 replies
    Stryde Hax ^ | March 2010 | Stryde Hax
    Recently a high school in Pennsylvania shocked the nation when it became the subject of a lawsuit alleging that webcams in school-issued laptop computers were being remotely activated by school staff, used to snap photos of students in their homes. As a computer security professional I dug into the story with the help of my colleagues, and together we found that the networked webcam capability built into these computers by the school district was absolutely real. Our findings were greeted with surprise and dismay; they have caused a nationwide outcry. The truth is, this shouldn't have been a surprise. America...
  • Massive 500-LED Extreme Flashlight ( Homemade with controls)

    09/07/2010 12:00:42 PM PDT · by Ernest_at_the_Beach · 54 replies
    hacknmod.com ^ | March 2010
    The first question some may ask is “Why?”  Those of us who are LED addicts say “Why the hell not?”  This guy literally took 500 bright white LEDs and created his own giant 50W flashlight.  While it may have been just ever so slightly overkill, it’s still an impressive build.  Can you imagine soldering all of those 500 LEDs?! Don’t Miss: DIY Super-Powered Flashlight Beam****************************************************************************Youtube Video of the Construction and Demostration at the website.... *********************************************************************************** As you can tell in the video above, it has an absurd amount of controls for various brightness settings.  Heck, it could even be a...
  • College student found guilty of hacking into Sarah Palin's personal e-mail account

    05/03/2010 11:24:32 AM PDT · by Syncro · 41 replies · 1,928+ views
    metro.co.uk ^ | May 3rd , 2010 | METRO REPORTER
    College student found guilty of hacking into Sarah Palin's personal e-mail account A college student has been found guilty of hacking into former Republican vice-presidential candidate Sarah Palin's personal e-mail and posting some of the contents online. College student David Kernell has been found guilty of hacking into Sarah Palin's e-mail A jury decided 22-year-old David Kernell was guilty of obstruction of justice and unauthorised access of a computer, though he was cleared of a wire fraud charge.In a statement issued on her Facebook page, Palin thanked the jury and prosecutors and explained the case's importance: "Besides the obvious invasion...
  • Jury convicts Palin e-mail intruder on two counts

    04/30/2010 12:21:13 PM PDT · by SmithL · 66 replies · 2,610+ views
    KNOXVILLE — A federal jury this afternoon convicted Sarah Palin e-mail intruder David C. Kernell of felony destruction of records to hamper a federal investigation and misdemeanor unlawfully obtaining information from a protected computer. The jury acquitted Kernell, 22, of wire fraud. It remains deadlocked on felony identity theft. It’s unclear if U.S. District Judge Thomas W. Phillips will order the jurors, in their fourth day of deliberations, to continue.
  • Judge presents 'dynamite charge' to stuck Palin e-mail jurors

    04/30/2010 7:56:15 AM PDT · by SmithL · 110 replies · 2,695+ views
    KNOXVILLE - Jurors in the trial of accused Sarah Palin e-mail intruder David C. Kernell were this morning urged to reach a complete verdict in the case. The jurors began their fourth day of deliberations by hearing a special added instruction from U.S. District Judge Thomas W. Phillips. Called an Allen charge in legal parlance, it is commonly called "a dynamite charge." Phillips told the jurors that as they resume deliberating they should each reconsider their positions, but there was no need to rush to a verdict. The jurors reported shortly before 9 a.m. and then retired to resume deliberations...
  • Defendant in Palin hacking case won't testify

    04/26/2010 8:31:26 AM PDT · by libstripper · 38 replies · 1,986+ views
    Associated Press ^ | April 26, 2010 | Associated Press
    KNOXVILLE, Tenn. -- The attorney for a former University of Tennessee student charged with hacking Sarah Palin's e-mail says the defendant will not testify in his federal trial in Knoxville.
  • Hacker busts IE8 on Windows 7 in 2 minutes

    03/26/2010 10:24:27 AM PDT · by ShadowAce · 11 replies · 610+ views
    ComputerWorld ^ | 25 March 2010 | Gregg Keizer
    Two researchers yesterday won $10,000 each at the Pwn2Own hacking contest by bypassing important security measures of Windows 7. Both Peter Vreugdenhil of the Netherlands and a German researcher who would only identify himself by the first name Nils found ways to disable DEP (data execution prevention) and ASLR (address space layout randomization), which are two of Windows 7's most vaunted anti-exploit features. Each contestant faced down the fully-patched 64-bit version of Windows 7 and came out a winner. Vreugdenhil used a two-exploit combination to circumvent first ASLR and then DEP to successfully hack IE8. A half-hour later, Nils bypassed...
  • Iran Hacks Opposition Web Sites, Arrests Cyber Activists

    03/15/2010 12:54:40 AM PDT · by nickcarraway · 317+ views
    PCWorld ^ | March 14, 2010 | Sumner Lemon
    Iran's Islamic Revolutionary Guards Corps hacked into 29 Web sites affiliated with U.S. espionage networks, Iran's semi-official Fars News Agency reported on Sunday. "The hacked websites acted against Iran's national security under the cover of human rights activities," Fars reported. It did not disclose details of the attacks. The 29 Web sites were identified in a statement (in Farsi) released on a Web site operated by the Revolutionary Guards. The Internet has been used by Iranian opposition groups who contested the results of last year's elections there to organize demonstrations and share information about protests and arrests. The Revolutionary Guards...
  • Hacking for Fun and Profit in China’s Underworld

    02/02/2010 1:33:56 AM PST · by Cheap_Hessian · 5 replies · 595+ views
    The New York Times ^ | February 1, 2010 | David Barboza
    CHANGSHA, China — With a few quick keystrokes, a computer hacker who goes by the code name Majia calls up a screen displaying his latest victims. “Here’s a list of the people who’ve been infected with my Trojan horse,” he says, working from a dingy apartment on the outskirts of this city in central China. “They don’t even know what’s happened.” As he explains it, an online “trapdoor” he created just over a week ago has already lured 2,000 people from China and overseas — people who clicked on something they should not have, inadvertently spreading a virus that allows...
  • Experts: US gov't needs to prepare for cyberwar (no more nice guy to Chicom?)

    01/28/2010 10:03:50 AM PST · by TigerLikesRooster · 1 replies · 236+ views
    Network World ^ | 01/27/10 | Grant Gross
    Experts: US gov't needs to prepare for cyberwar Cyberwar is difficult to define, but the U.S. needs a strategy, a group of experts says By Grant Gross, IDG News Service January 27, 2010 04:31 PM ET Sponsored by: The U.S. government needs to figure out how it will respond to acts of cyberwar, as foreign governments increasingly look to gain advantages in cyberspace, a group of cybersecurity experts said Wednesday. One problem, however, is that there wasn't consensus among the panelists on what exactly constitutes an act of war in cyberspace. The U.S. military has used cyberattacks to disrupt enemy...
  • U.S. enables Chinese hacking of Google

    01/26/2010 2:27:09 PM PST · by flamefront · 4 replies · 340+ views
    cnn ^ | 23 Jan 2010 | Bruce Schneier
    U.S. enables Chinese hacking of Google STORY HIGHLIGHTS Google says hackers from China got into its Gmail systemBruce Schneier says hackers exploited feature put into system at behest of U.S. governmentWhen governments get access to private communications, they invite abuse, he saysGovernment surveillance and control of Internet is flourishing, he says : Bruce Schneier is a security technologist and author of "Beyond Fear: Thinking Sensibly About Security in an Uncertain World." Read more of his writing at www.schneier.com. -- Google made headlines when it went public with the fact that Chinese hackers had penetrated some of its services, such...
  • Safety First for IT executives in China (Govt Warns Symantec CTO of 'Evil Maid' Virus)

    01/09/2010 10:59:17 AM PST · by nickcarraway · 4 replies · 640+ views
    CRN ^ | Sep 16, 2009 | Sholto Macpherson
    US Government recommends weighing laptop before and after each visit. Senior executives in US IT companies have been advised by the US Government to follow extremely strict policies for visits to China which extend far beyond standard software protection. The policies encourage them to leave their standard IT equipment at home and to buy separate gear only for use in China. Mark Bregman, chief technology officer at security firm Symantec said he left his MacBook Pro behind in the US and took his MacBook Air whenever he flew to China. Bregman said he only ever used the Air in China...
  • N. Korea hacked secret U.S.-S. Korean war plans after USB flash drive was left in computer

    01/01/2010 2:21:02 AM PST · by nickcarraway · 9 replies · 816+ views
    North Korea was apparently behind a recent hacking attack that netted a secret U.S.-South Korean plan to defend the peninsula should war break out, South Korea's military intelligence agency reported. he suspected hacking occurred late last month when a South Korean military officer failed to remove a USB device when he switched a military computer from a restricted-access intranet to the Internet. The USB device contained a summary of OPLAN 5027, a highly sensitive war plan prepared by the U.S.-South Korean Combined Forces Command in case of an all-out war with the North. The plan calls for the dispatch of...
  • Major International Hacker Pleads Guilty for Massive Attack on U.S. Retail and Banking Networks

    12/30/2009 4:22:04 PM PST · by Cindy · 7 replies · 644+ views
    US DOJ.gov/opa - Press Release ^ | December 29, 2009 | n/a
    Note: The following text is a quote: FOR IMMEDIATE RELEASE Tuesday, December 29, 2009 Major International Hacker Pleads Guilty for Massive Attack on U.S. Retail and Banking Networks WASHINGTON- Albert Gonzalez, 28, of Miami, pleaded guilty today to conspiring to hack into computer networks supporting major American retail and financial organizations, and to steal data relating to tens of millions of credit and debit cards, announced Assistant Attorney General of the Criminal Division Lanny A. Breuer, U.S. Attorney for the District of New Jersey Paul J. Fishman, U.S. Attorney for the District of Massachusetts Carmen Milagros Ortiz and Director of...
  • Good Guys Bring Down the Mega-D Botnet

    12/29/2009 8:58:34 PM PST · by nickcarraway · 12 replies · 830+ views
    PC World ^ | Dec 27, 2009 | Erik Larkin
    Chalk up one for the defenders. Here’s how a trio of security researchers used a three-step attack to defeat a 250,000-pronged botnet.For two years as a researcher with security company FireEye, Atif Mushtaq worked to keep Mega-D bot malware from infecting clients' networks. In the process, he learned how its controllers operated it. Last June, he began publishing his findings online. In November, he suddenly switched from de fense to offense. And Mega-D--a powerful, resilient botnet that had forced 250,000 PCs to do its bidding--went down. Mushtaq and two FireEye colleagues went after Mega-D's command infrastructure. A botnet's first wave...
  • China: Classified Documents on Submarine Leaked... Intel Authorities on Alert (old trick worked)

    12/15/2009 7:17:22 AM PST · by TigerLikesRooster · 32 replies · 1,385+ views
    Yonhap News ^ | 12/15/09 | Kwon Young-suk
    /begin my excerpts China: Classified Documents on Submarine Leaked... Intel Authorities on Alert (regarding) China's newest nuclear-powered submarine development Classified information at China's Weapon's Industry Research Institute leaked by hacking (Beijing=Yonhap News) Kwon Young-suk = Classified information on Chinese navy's submarine was leaked to foreign intelligence, and the Chinese intelligence authorities are on heightened alert. China's Globe Daily reported on Dec. 14 that classified materials were stolen at China Weapon’s Industry Research Institute which does PLAN's submarine projects. The authorities said, "Foreign intelligence stole via Internet hacking all of top secret information and files on materials used for building China's...
  • Speculating about Barbara Boxer

    12/03/2009 3:43:51 AM PST · by Scanian · 11 replies · 705+ views
    The American Thinker Blog ^ | December 02, 2009 | Mark J. Fitzgibbons
    One of the surest signs of whether a government official may have something to hide in Climategate, the ACORN scandal or any other controversy is that their first reaction to the scandal is to target the source exposing the scandal. California Senator Barbara Boxer said at a committee hearing, "You call it 'Climategate'; I call it 'E-mail-theft-gate.'"
  • China attacks "biased" U.S. cyber-spying report

    11/23/2009 7:27:41 AM PST · by TigerLikesRooster · 3 replies · 258+ views
    Reuters ^ | 11/23/09
    China attacks "biased" U.S. cyber-spying report Mon Nov 23, 3:01 am ET BEIJING (Reuters) – China on Monday accused a U.S. congressional advisory panel of bias for a report in which it said the Chinese government appeared increasingly to be piercing U.S. computer networks to gather useful data for its military. The U.S.-China Economic and Security Review Commission said in its 2009 report to Congress released last week that there was growing evidence of Chinese state involvement in such activity. But Chinese Foreign Ministry spokesman Qin Gang said the report was a twisted attack on China. "This report disregards the...
  • HadleyCRU says leaked data is real (Global warming scam exposed!!!!!!!!!!)

    11/20/2009 5:47:57 AM PST · by milwguy · 77 replies · 2,799+ views
    tbr.cc ^ | 11/20/2009 | tbr
    The director of Britain's leading Climate Research Unit, Phil Jones, has told Investigate magazine's TGIF Edition tonight that his organization has been hacked, and the data flying all over the internet appears to be genuine. In an exclusive interview, Jones told TGIF, "It was a hacker. We were aware of this about three or four days ago that someone had hacked into our system and taken and copied loads of data files and emails." "Have you alerted police" "Not yet. We were not aware of what had been taken." Jones says he was first tipped off to the security breach...
  • One Hundred Phishers Charged In Largest Cybercrime Case

    10/07/2009 4:19:37 PM PDT · by JoeProBono · 13 replies · 1,220+ views
    informationweek ^ | October 7, 2009 | Thomas Claburn
    The FBI on Wednesday announced that it had charged 53 defendants, the largest number ever charged in a cybercrime case, following a multinational investigation into a phishing scheme that operated in the United States and Egypt. Thirty-three of the 53 defendants named in the indictment have been arrested, the FBI said, and several others are being sought. The investigation, dubbed "Operation Phish Phry," began in 2007. Authorities in Egypt have charged 47 defendants linked to the phishing operation. Phishing is a form of social engineering that attempts to convince Internet users, via e-mail or other means, to provide online credentials...
  • Former Informer Pleads Guilty Hacker Faces A 25-Year Term In ID-Theft Case

    09/11/2009 9:28:08 PM PDT · by Saije · 2 replies · 341+ views
    Washington Post ^ | 9/12/2009 | Denise Lavoie
    A computer hacker who was once a federal informer and was a driving force behind one of the largest cases of identity theft in U.S. history pleaded guilty Friday in a deal with prosecutors that will send him to prison for up to 25 years. Albert Gonzalez, 28, of Miami, admitted to pulling off some of the most prominent hacking jobs of the decade -- invading the computer systems of such retailers as TJX, BJ's Wholesale Club, OfficeMax, Boston Market, Barnes & Noble and Sports Authority. Federal authorities say tens of millions of credit and debit card numbers were stolen....
  • Hackers Stole IDs for Attacks

    08/17/2009 4:50:45 AM PDT · by justa-hairyape · 2 replies · 545+ views
    Wall Street Journal World ^ | AUGUST 17, 2009 | By SIOBHAN GORMAN
    WASHINGTON -- Russian hackers hijacked American identities and U.S. software tools and used them in an attack on Georgian government Web sites during the war between Russia and Georgia last year, according to new research to be released Monday by a nonprofit U.S. group. In addition to refashioning common Microsoft Corp. software into a cyber-weapon, hackers collaborated on popular U.S.-based social-networking sites, including Twitter and Facebook Inc., to coordinate attacks on Georgian sites, the U.S. Cyber Consequences Unit found. While the cyberattacks on Georgia were examined shortly after the events last year, these U.S. connections weren't previously known. "U.S. corporations...
  • British hacker loses U.S. extradition appeal

    07/31/2009 4:22:41 AM PDT · by james500 · 11 replies · 1,155+ views
    Reuters ^ | 7/31/2009 | Luke Baker
    A Briton wanted in the United States for breaking into NASA and Pentagon networks in "the biggest military hack of all time" lost an appeal against his extradition Friday, making a U.S. trial more likely. Gary McKinnon, 43, has fought a three-year battle to avoid extradition, including going to the European Court of Human Rights, but he appeared to have run out of options as Britain's High Court ruled against his latest appeal Friday. The court rejected arguments by McKinnon's lawyers that extraditing McKinnon, who was recently diagnosed with Asperger's Syndrome, a form of autism, would have disastrous consequences for...
  • Are External USB Drives a Target for Espionage?

    07/26/2009 1:46:23 PM PDT · by poiuqwer · 64 replies · 1,420+ views
    7/26/2009 | poiuqwer
    I suspect that China might be stealing our confidential data that is stored (or backed up) on external USB hard disks, such as those 1 TB commodities sold as Costco for $100. Early this year, I bought two 1 TB external USB drives to backup my computer. These drives cost a little over $100 with a five-year warranty. I figured, for redundancy, I’d copy my main C-drive data files to both drives, just in case one dies. Sure enough, six months later, I get the Windows XP error message “USB Device Not Recognized: one of the USB devices attached to...
  • Houston Computer Administrator Sentenced to 2 Years in Prison (Deleted Organ Donor Records)

    07/15/2009 2:56:17 PM PDT · by Larry381 · 3 replies · 340+ views
    Department of Justice ^ | July 15, 2009 | United States Attorney's Office Southern District of Texas
    The former director of information technology for a non-profit organ and tissue donation center was sentenced today to two years in prison for hacking into her former employer’s computer network, announced Assistant Attorney General Lanny A. Breuer of the Criminal Division and U.S. Attorney for the Southern District of Texas Tim Johnson. Danielle Duann, 51, of Houston, pleaded guilty on April 30, 2009, to a one-count criminal indictment charging her with unauthorized computer access. Duann was sentenced today by U.S. District Judge David Hittner in the Southern District of Texas. In addition to the two-year prison term, Judge Hittner sentenced...
  • More Web attacks hit, North Korea suspected

    07/09/2009 9:06:34 AM PDT · by BJClinton · 15 replies · 869+ views
    Reuters via Yahoo! News ^ | 07/09/2009 | Jack Kim
    A fresh wave of cyber attacks that slowed U.S. and South Korean websites this week hit more targets on Thursday, a Web security firm said, while the South's spy agency has said the hacking may be linked to North Korea. The impact of the attacks, aimed so far at dozens of sites including the White House and the South's presidential office, was seen as negligible, experts said, but served as a reminder that Pyongyang has been planning for cyber warfare.
  • Arlington (TX) Security Guard Arrested on Federal Charges for Hacking into Hospital's Computer

    07/01/2009 1:45:43 PM PDT · by Larry381 · 6 replies · 628+ views
    Department of Justice ^ | June 30, 2009 | United States Attorney's Office Northern District of Texas
    DALLAS—A man from Arlington, Texas, who worked as a contract security guard at the Carrell Clinic on North Central Expressway in Dallas, has been arrested on felony charges outlined in a criminal complaint, announced Acting U.S. Attorney James T. Jacks of the Northern District of Texas. Late Friday evening, agents with the FBI arrested Jesse William McGraw, a/k/a "GhostExodus," "PhantomExodizzmo," "Howard Daniel Bertin," "Howard William McGraw," and "Howard Rogers," age 25. McGraw appeared yesterday afternoon before U.S. Magistrate Judge Wm. F. Sanderson, Jr., for his initial appearance. He was detained until his probable cause and detention hearing set for Wednesday,...
  • Cash machines hacked to spew out card details

    06/18/2009 3:37:32 PM PDT · by metmom · 4 replies · 409+ views
    NewScientist ^ | June 17, 2009 | by Paul Marks
    "SKULDUGGERY," says Andrew Henwood, "is a very good word to describe what this extremely advanced, cleverly written malware gets up to. We've never seen anything like it." What he has discovered is a devious piece of criminal coding that has been quietly at work in a clutch of cash machines at banks in Russia and Ukraine. It allows a gang member to walk up to an ATM, insert a "trigger" card, and use the machine's receipt printer to produce a list of all the debit card numbers used that day, including their start and expiry dates - and their PINs....
  • Two Missouri Brothers Among Those Indicted in $4 Million Nationwide Spamming Conspiracy

    04/29/2009 7:49:35 PM PDT · by Cindy · 9 replies · 635+ views
    Note: The following text is a quote: Two Missouri Brothers Among Those Indicted in $4 Million Nationwide Spamming Conspiracy Millions of E-Mail Addresses Illegally Harvested from Computers at 2,000 Schools KANSAS CITY, MO—Two Missouri men and their company are among those indicted by a federal grand jury in a nationwide e-mail spamming case that victimized more than 2,000 colleges and universities in a scheme that sold more than $4 million worth of products to students, announced Matt J. Whitworth, Acting United States Attorney for the Western District of Missouri. Amir Ahmad Shah, 28, of St. Louis., his brother, Osmaan Ahmad...
  • Defense Department, Lockheed deny that hackers stole sensitive F-35 data

    04/23/2009 10:35:55 AM PDT · by chuck_the_tv_out · 4 replies · 381+ views
    Fort Worth Star Telegram ^ | Tue, Apr. 21, 2009 | Staff
    Officials with the Defense Department and Lockheed Martin disputed a report by The Wall Street Journal that computer spies had hacked into government and contractor computer systems and stolen data about the design of the F-35 joint strike fighter program. The newspaper reported Tuesday that several government officials confirmed that intruders had downloaded F-35 data. The hackers could not access the most sensitive design data about the aircraft’s flight controls and electronics, which are stored on computers not connected to the Internet, The Journal reported. In a conference call with Wall Street analysts, Bruce Tanner, Lockheed’s chief financial officer, said...
  • Chinese, Russian hackers probing US power grid

    Chinese and Russian hackers are attempting to seed viruses in the US power grid that could one day plunge major cities into chaos, a report warned Wednesday. The report in the Wall Street Journal quotes intelligence officials saying that cyber-spies last year repeatedly gained access to the system powering everything from financial institutions to sewage systems.
  • Laid Off Employees Turning to Cybercrime

    02/04/2009 6:24:17 PM PST · by DeepThought42 · 16 replies · 646+ views
    ReadWriteWeb ^ | February 1, 2009 | Lidija Davis
    In what appears to be a growing trend, displaced employees are turning to cybercrime using their corporate data access to steal, exploit and damage information networks, and may have cost businesses as much as $1 trillion globally according to a new study from McAfee and Purdue University's Center for Education and Research in Information Assurance and Security Although insiders have always posed a threat to information security, the report warns that the global recession is putting vital information at greater risk than ever before. The report, Unsecured Economies: Protecting Vital Information (free, requires free registration) was released last week at...
  • Hacktivist tool targets Hamas

    01/11/2009 2:32:27 PM PST · by Boogieman · 9 replies · 549+ views
    Register UK ^ | 01/09/2009 | John Leyden
    Hacktivist tool targets Hamas DDoS street protest covers both side of Gaza conflict Israeli cyberactivists are inviting pro-Israeli surfers to install a tool that attacks websites associated with Hamas. This "Patriot" tool effectively turns the computers of sympathisers of the Israeli cause into zombies - albeit willing, complicit ones - in the control of Israeli hackers. The hackers are working under the banner of the Help Israel Win collective, which was formed last month at the start of the conflict in Gaza. "We couldn't join the real combat, so we decided to fight Hamas in the cyber arena," one...
  • Thousands of Israeli web sites under attack

    01/07/2009 2:06:50 PM PST · by mnehring · 4 replies · 496+ views
    In the wake of the escalating conflict between Israel and Hamas, it didn’t take long before pro-Hamas supporters organized themselves and started to defacing thousands of pro-Israeli web sites in order to use them as vehicles for propaganda — Israel is meanwhile hijacking TV signals. For the time being, pro-Israeli sites remain automatically probed for web application vulnerabilities through search engines reconnaissance of the Israeli web space by JURM-TEAM and TEAM-Evil, two groups working together and using identical templates for the defaced sites.Compared to previous hacktivism (politically motivated hacking)  activities on behalf of this group consisting primarily of mass web...
  • Down, but Not Out!

    01/05/2009 5:45:01 PM PST · by chaimke · 142+ views
    Freedom's Cost ^ | 01/5/2009 | Samuel
    This started out as a short answer to a comment on our last post. Originally my comment would have taken up about ten lines but ever since Chaim himself answered Steve and wondered if he was merely a shill for CAIR as did various other who answered ion the same vein, as they waded through the commenter's language and all too obvious prejudices, our blog became unstable. Since Thursday last and until a short while ago, it kept appearing and disappearing from cyberspace. Even as it reappeared we could not get into the admin area to post. Although commenters could...
  • Police set to step up hacking of home PCs[UK-No Warrant]

    01/05/2009 7:33:39 AM PST · by BGHater · 351+ views
    Times Online ^ | 04 Jan 2009 | David Leppard
    THE Home Office has quietly adopted a new plan to allow police across Britain routinely to hack into people’s personal computers without a warrant. The move, which follows a decision by the European Union’s council of ministers in Brussels, has angered civil liberties groups and opposition MPs. They described it as a sinister extension of the surveillance state which drives “a coach and horses” through privacy laws. The hacking is known as “remote searching”. It allows police or MI5 officers who may be hundreds of miles away to examine covertly the hard drive of someone’s PC at his home, office...