Free Republic 3rd Quarter Fundraising Target: $85,000 Receipts & Pledges to-date: $10,500
12%  
Woo hoo!! And the first 12% is in!! Thank you all very much!!

Keyword: hacking

Brevity: Headers | « Text »
  • The US Arrested an Alleged Russian Hacker — And Russia Is Pissed

    07/08/2014 10:08:18 PM PDT · by WhiskeyX · 4 replies
    Vice News ^ | July 8, 2014 | 3:39 pm | Jordan Larson
    In the latest disagreement between Russia and the US, a 30-year-old Russian national has been arrested for allegedly hacking US retailers, gaining access to credit card information, and selling it. Roman Valerevich Seleznev was arrested while vacationing with his family in the Maldives; he was subsequently transported to Guam. In a statement on its website, the Russian Foreign Ministry denounced the arrest, referring to it as a “kidnapping” and “the latest unfriendly move from Washington."
  • Eyes on you: Experts Reveal Police Hacking Methods

    07/04/2014 3:51:32 PM PDT · by nickcarraway · 4 replies
    KWWL ^ | Jun 25, 2014 | Raphael Satter
    Law enforcement agencies across the globe are taking a page out of the hacker's handbook, using targets' own phones and computers to spy on them with methods traditionally associated with cybercriminals, two computer security groups said Tuesday. Drawing on a cache of leaked documents and months of forensic work, two reports about the private Italian firm Hacking Team expose a global network of malicious software implants operated by police and spy agencies in dozens of countries. "This in many ways is the police surveillance of the now and the future," said Morgan Marquis-Boire, a security researcher with Citizen Lab and...
  • How to Hack a Car: Phreaked Out

    06/15/2014 5:39:24 PM PDT · by TurboZamboni · 41 replies
    Motherboard ^ | 5-29-14 | Motherboard
    These days, your car isn't a car - it's a rolling computer platform. You don't drive it as much as you give the computer commands and then let it carry them out. That's why the idea of hackers breaking into car computers is so terrifying. You have to see this video showing the scary reality of car hacking.
  • Hacking case belies profitable US links with China

    Justice Department's indictment last week of five Chinese military officials accused them of trying to pilfer confidential information from American companies. Westinghouse, is building four nuclear reactors in China. Allegheny Technologies, operates a joint venture in Shanghai. Alcoa, is the biggest foreign investor in China's aluminum market. 77 Chinese company stocks now trade on the NYSE. e-commerce giant Alibaba - plans to list its stock in the United States, either on the NYSE or NASDAQ. General Motors sells more cars in China than in the United States.
  • ebay wants users to change passwords due to cyberattack

    05/21/2014 7:19:22 AM PDT · by Rodney Dangerfield · 15 replies
    Streetinsider.com ^ | May, 21st, 2014 | N/A
    eBay Inc. (Nasdaq: EBAY) said beginning later today it will be asking eBay users to change their passwords because of a cyberattack that compromised a database containing encrypted passwords and other non-financial data. After conducting extensive tests on its networks, the company said it has no evidence of the compromise resulting in unauthorized activity for eBay users, and no evidence of any unauthorized access to financial or credit card information, which is stored separately in encrypted formats. However, changing passwords is a best practice and will help enhance security for eBay users.
  • China summons US envoy over cyber-spying charges, vows retaliation

    05/20/2014 1:01:42 PM PDT · by tcrlaf · 16 replies
    RT ^ | 5-20-2014 | RT
    China has dismissed all US accusations of industrial cyber-espionage against five of its military officials and published proof that Washington is actually stealing data from China. Beijing also summoned the US ambassador for an explanation. Beijing reacted to Washington’s recent round of industrial espionage accusations by publishing its latest data on US cyber-attacks against China. China’s National Computer Network Emergency Response Technical Team Coordination Center of China (NCNERTTCC) reported that during just two months, from March 19 to May 18, the US directly controlled 1.18 million host computers in China using 2,077 Trojan horse networks or botnet servers. According to...
  • China Slams 'Absurd' US Hacking Charges

    05/20/2014 2:51:42 AM PDT · by Enterprise · 25 replies
    Newser ^ | 5-20-14 | Rob Quinn
    "Eric Holder described the charging of five Chinese military officers with cybercrimes as a "wake-up call" and China is certainly paying attention: Government officials have summoned the US ambassador in Beijing, suspended a cybersecurity agreement made with the US last month, and denounced the charges as an "absurd" move that has "severely damaged mutual trust," reports the BBC, which notes that it is "extremely unlikely" that any of the accused will ever be sent to the US to face charges."
  • GAO: IRS has information security control weaknesses

    04/09/2014 9:18:34 PM PDT · by Up Yours Marxists · 7 replies
    FCW ^ | April 09 2014 22:42 GMT | Mike Cipriano
    The Internal Revenue Service continues to have weaknesses in information security control that the Government Accountability Office fears could affect the confidentiality, integrity and availability of financial and sensitive taxpayer data. An April 8 GAO report found that although the IRS has improved on information security control and internal control over financial reporting, significant risks remain. The agency has failed to consistently install the appropriate patches on all databases and servers to protect against known vulnerabilities, GAO found, and also failed to sufficiently monitor database controls and appropriately restrict access to its mainframe environment. The IRS has also allowed individuals...
  • Targeting Huawei: NSA Spied on Chinese Government and Networking Firm

    03/22/2014 8:12:08 PM PDT · by Star Traveler · 13 replies
    Spiegel Online International ^ | Sunday, March 23, 2014 | Spiegel Staff
    A special unit with the US intelligence agency succeeded in infiltrating Huwaei's network and copied a list of 1,400 customers as well as internal documents providing training to engineers on the use of Huwaei products, among other things. Source Code Breached According to a top secret NSA presentation, NSA workers not only succeeded in accessing the email archive, but also the secret source code of individual Huwaei products. Software source code is the holy grail of computer companies. Because Huawei directed all mail traffic from its employees through a central office in Shenzhen, where the NSA had infiltrated the network,...
  • N.S.A. Breached Chinese Servers Seen as Security Threat

    03/22/2014 7:48:35 PM PDT · by Star Traveler · 36 replies
    The New York Times ^ | Saturday, March 22, 2014 | David E. Sanger & Nicole Perlroth
    WASHINGTON — American officials have long considered Huawei, the Chinese telecommunications giant, a security threat, blocking it from business deals in the United States for fear that the company would create “back doors” in its equipment that could allow the Chinese military or Beijing-backed hackers to steal corporate and government secrets. But even as the United States made a public case about the dangers of buying from Huawei, classified documents show that the National Security Agency was creating its own back doors — directly into Huawei’s networks. The agency pried its way into the servers in Huawei’s sealed headquarters in...
  • Suspected Russian spyware Turla targets Europe, U.S.

    03/07/2014 9:05:54 AM PST · by afraidfortherepublic · 5 replies
    Reuters ^ | 3-7-14 | Peter Apps and Jim Finkle
    A sophisticated piece of spyware has been quietly infecting hundreds of government computers across Europe and the United States in one of the most complex cyber espionage programs uncovered to date. Several security researchers and Western intelligence officers say they believe the malware, widely known as Turla, is the work of the Russian government and linked to the same software used to launch a massive breach on the U.S. military uncovered in 2008. Those assessments were based on analysis of tactics employed by hackers, along with technical indicators and the victims they targeted.
  • Millions and Millions of Stolen Credentials Just Waiting to Be Bought Online

    03/01/2014 3:48:59 AM PST · by afraidfortherepublic · 10 replies
    The Wire ^ | 2-28-14 | Danielle Weiner-Bronner
    Link only. Read article at source.
  • British man charged with hacking Federal Reserve

    02/27/2014 7:46:36 PM PST · by Olog-hai · 8 replies
    Associated Press ^ | Feb 27, 2014 4:17 PM EST | Larry Neumeister
    A British man accused of hacking into U.S. government computer networks was charged in a new indictment unsealed Thursday with infiltrating the Federal Reserve’s computers. Lauri Love, 28, of Stradishall, England, was charged with computer hacking and aggravated identity theft, which carry a potential penalty of up to 12 years in prison. He initially was arrested in Great Britain in October and released on bail after he was charged under a United Kingdom law that permits the arrest of anyone who starts attacks from the U.K. on computers anywhere in the world. …
  • GPS pioneer warns on network’s security

    02/13/2014 5:25:29 PM PST · by CedarDave · 10 replies
    The Financial Times ^ | February 13, 2014 | Sam Jones and Carola Hoyos
    The Global Positioning System helps power everything from in-car satnavs and smart bombs to bank security and flight control, but its founder has warned that it is more vulnerable to sabotage or disruption than ever before – and politicians and security chiefs are ignoring the risk. Impairment of the system by hostile foreign governments, cyber criminals – or even regular citizens – has become “a matter of national security”, according to Colonel Bradford Parkinson, who is hailed as the architect of modern navigation. “If we don’t watch out and we aren’t prepared,” then countries could be denied everything from ‘navigation’...
  • Robertson (D NY-23) Will Not Hire Cyber-Security Firm to Investigate Hacking Claims

    02/08/2014 8:44:44 AM PST · by Behind Liberal Lines · 5 replies
    WETM TV ^ | 02/08/14 | Ben Amey
    A local congressional candidate now says she will not be hiring a cyber-security firm to look into claims that someone hacked her campaign’s website. The situation started in September, 2013, when Democrat Martha Robertson’s campaign sent an e-mail out to supporters claiming “GOP ops” were trying to hack their website. In early October, the Robertson campaign backed off the “GOP ops” claim during an interview with WETM, but presented evidence showing there were multiple “SQL injection” attacks made on the website. And during an interview with the political site Roll Call, Robertson state the campaign was looking into hiring a...
  • NBC: Visitors To Sochi Olympics Can Expect To Be Hacked

    02/04/2014 10:07:42 PM PST · by Lmo56 · 30 replies
    Washington Free Beacon ^ | 2/4/14 | Washington Free Beacon Staff
    Visitors to the Sochi Winter Olympics can expect for their computers and mobile devices to be hacked, NBC’s Richard Engel reported Tuesday evening on NBC Nightly News. Engel conducted multiple experiments with the help of an American based security expert in which the NBC reporter logged onto various public WIFI networks around Moscow. Almost immediately, all of Engel’s devices were exposed to malicious malware. Analysis revealed some of Engel’s devices were transmitting personal data stored on his computer to a server based in Russia. The best way for travelers to avoid these issues, Engel said, is to avoid public WIFI...
  • Kim Kardashian's identity stolen by Lake Mary man in celebrity scheme [Biden, Michelle, Gates]

    02/01/2014 5:51:59 AM PST · by Cincinatus' Wife · 25 replies
    Orlando Sentinel ^ | January 31, 2014 | By Amy Pavuk
    A 19-year-old who lived at home with his mom and worked at a local call center stole the identities of America's rich and famous — including Kim Kardashian and the head of the FBI — and took over their financial accounts..... ...Earlier this week, Flores learned he'll spend the next 3 1/2 years in federal prison for his identity theft scheme..... ....At the time, Flores was already facing criminal charges in state court, where he was accused of taking private information from a coworker's personnel profile and having his colleague's paycheck directly deposited into his own bank account. Flores was...
  • Malformed FileZilla FTP client with login stealer

    01/28/2014 10:08:51 AM PST · by Utilizer · 25 replies
    avast antivirus blog ^ | January 27th, 2014 | Malware Analyst Workforce
    Beware of malformed FileZilla FTP client versions 3.7.3 and 3.5.3. We have noticed an increased presence of these malware versions of famous open source FTP clients. The first suspicious signs are bogus download URLs... Malware installer GUI is almost identical to the official version. The only slight difference is version of NullSoft installer where malware uses 2.46.3-Unicode and the official installer uses v2.45-Unicode. All other elements like texts, buttons, icons and images are the same. The installed malware FTP client looks like the official version and it is fully functional! You can’t find any suspicious behavior, entries in the system...
  • Hacking expert David Kennedy says he cracked HealthCare.gov in 4 minutes

    01/20/2014 10:04:15 AM PST · by ransomnote · 39 replies
    washingtontimes.com ^ | January 19, 2014 | Jessica Chasmar
    The man who appeared before Congress last week to explain the security pitfalls of HealthCare.gov took to Fox News on Sunday to explain just how easy it was to penetrate the website. Hacking expert David Kennedy told Fox’s Chris Wallace that gaining access to 70,000 personal records of Obamacare enrollees via HealthCare.gov took about 4 minutes and required nothing more than a standard browser, the Daily Caller reported. PHOTOS: Eye-popping excuses in American political scandals “And 70,000 was just one of the numbers that I was able to go up to and I stopped after that,” he said. “You know,...
  • Cyber experts uncover 2 million stolen passwords to Web accounts

    01/10/2014 1:15:39 AM PST · by legalservicesbc · 8 replies
    http://www.reuters.com ^ | December 5, 2014 | Robert Galbraith
    <p>Researchers with Trustwave's SpiderLabs said they discovered the credentials while investigating a server in the Netherlands that cyber criminals use to control a massive network of compromised computers known as the "Pony botnet."</p> <p>The company told Reuters on Wednesday that it has reported its findings to the largest of more than 90,000 websites and Internet service providers whose customers' credentials it had found on the server.</p>
  • Target confirms PIN data was stolen in breach

    12/27/2013 10:10:54 AM PST · by John W · 38 replies
    CNN ^ | December 27, 2013 | David Goldman
    Target confirmed Friday that debit card PIN data was stolen in its recent massive breach, reversing its earlier stance that the codes were not part of the hack. However, the retailer believes the PINs remain "safe and secure." In a statement, Target spokeswoman Molly Snyder said the PINs are "strongly encrypted" and were never stored on Target's systems in plain text. In other words, from the moment a customer entered a PIN after swiping a debit card, Target's payment system translated that number into an indecipherable string of code. Target claims that the PINs remained encrypted after they were stolen....
  • Hiding the Hacking at HealthCare.gov [Feds Attacking Target, Ignore Their BIGGER Disaster!]

    12/24/2013 3:31:26 AM PST · by SoFloFreeper · 18 replies
    National Review ^ | 12/23/13 | John Fund
    If your personal info is filched from the site, the government doesn’t have to tell you. Christmas shoppers were stunned to learn last Thursday that computer hackers had made off with the names and other personal info of some 40 million Target customers. Some of the pilfered information is reportedly being sold on the black market, prompting JP Morgan Chase to limit purchases and cash withdrawals on debit cards owned by recent Target shoppers. But at least Target informed its customers of the security breach, as it is required by federal law to do. HealthCare.gov faces no such requirement; it...
  • Hiding the Hacking at HealthCare.gov [will not let you know]

    12/23/2013 4:22:31 AM PST · by Cincinatus' Wife · 41 replies
    National Review ^ | December 23, 2013 | John Fund
    Christmas shoppers were stunned to learn last Thursday that computer hackers had made off with the names and other personal info of some 40 million Target customers. Some of the pilfered information is reportedly being sold on the black market, prompting JP Morgan Chase to limit purchases and cash withdrawals on debit cards owned by recent Target shoppers. But at least Target informed its customers of the security breach, as it is required by federal law to do. HealthCare.gov faces no such requirement; it need never notify customers that their personal information has been hacked or possibly compromised. The Department...
  • Obama Administration Knew of Healthcare.gov Security Risks Before Launch (19 vulnerabilities)

    12/20/2013 6:17:14 AM PST · by Zakeet · 15 replies
    Washington Free Beacon ^ | December 19, 2013 | Elizabeth Harrington
    Documents provided to the House Committee on Government Oversight and Reform reveal that the Obama administration knew of security vulnerabilities within Healthcare.gov prior to Oct. 1, but launched the website anyway. Chairman Darrell Issa (R., Calif.) said Health and Human Services (HHS) officials showed a “disturbing lack of judgment” by going ahead with the site’s launch and putting Americans’ personal information at risk. Results of a security assessment conducted by a contractor on the site, MITRE Corporation, found that 19 security vulnerabilities remained unaddressed on Oct. 1. Eleven of the 19 vulnerabilities “significantly impact the confidentiality, integrity and/or availability of...
  • Leaked Passwords On Display At a German Museum

    12/15/2013 8:36:11 PM PST · by Utilizer
    slashdot ^ | Saturday December 14, 2013 @12:25PM | Posted by timothy
    Daniel_Stuckey writes "Earlier this year, it was London. Most recently, it was a university in Germany. Wherever it is, [artist Aram] Bartholl is opening up his eight white, plainly printed binders full of the 4.7 million user passwords that were pilfered from the social network and made public by a hacker last year. He brings the books to his exhibits, called 'Forgot Your Password,' where you're free to see if he's got your data—and whether anyone else who wanders through is entirely capable of logging onto your account and making Connections with unsavory people. In fact, Bartholl insists: "These eight...
  • Hacking trial: Police 'told to leave Queen's nuts'

    12/12/2013 9:49:44 AM PST · by NormsRevenge · 35 replies
    BBC News ^ | 12/12/13 | BBC
    The Queen marked the level in bowls of nuts left around Buckingham Palace as she was "irritated" by police officers eating them, the Old Bailey has heard. According to an email sent by Clive Goodman, ex-royal editor at the News of the World, she was "upset" by it. The journalist added that a memo was sent to palace officers, telling them to "keep their sticky fingers out". The phone-hacking jury has also heard one of the defendants, Ian Edmondson, is no longer fit to stand trial. Mr Justice Saunders said that it was "not appropriate to adjourn to wait for...
  • Naked Bruni pics used to hack European diplomats

    12/11/2013 9:59:35 AM PST · by ScaniaBoy · 29 replies
    EUObserver.com ^ | 11 December, 2013 | EUOBSERVER
    China hacked computers in the foreign ministries of Bulgaria, the Czech Republic, Hungary, Latvia and Portugal in summer 2013, The New York Times reports, citing own research and work by IT firm FireEye. It said officials triggered malware by clicking email links to naked pictures of French celebrity Carla Bruni.
  • Security Experts Warn Healthcare.gov Is Vulnerable to Hacking

    12/03/2013 9:18:34 AM PST · by topher · 25 replies
    ABC News ^ | Nov 19, 2013 6:01pm | John Parkinson
    Cyber security experts told Congress today that the Obama administration should take Healthcare.gov offline until privacy vulnerabilities are addressed and detection capabilities are improved. David Kennedy, a so-called “white hat hacker” who tests security flaws by hacking online systems to help identify weaknesses, warned that there are critical flaws and exposures “currently on the website that hackers could use to extract sensitive information.” “The purpose of security isn’t to say, ‘Hey, we’re 100 percent impenetrable all the time,’ but can we detect the hackers in the very early stages of the life cycle of the attack, monitor that, and prevent...
  • NSA infected 50,000 computer networks with malicious software

    11/24/2013 3:08:41 PM PST · by dynachrome · 29 replies
    NRC.nl ^ | 11-23-13 | Floor Boon, Steven Derix and Huib Modderkolk
    The American intelligence service - NSA - infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information. Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this. A management presentation dating from 2012 explains how the NSA collects information worldwide. In addition, the presentation shows that the intelligence service uses ‘Computer Network Exploitation’ (CNE) in more than 50,000 locations. CNE is the secret infiltration of computer systems achieved by installing malware, malicious software. One example of this type of hacking was discovered in September 2013 at the Belgium telecom provider Belgacom....
  • Health insurance credentials fetch high prices in the online black market

    11/21/2013 3:20:43 AM PST · by fso301 · 5 replies
    SC Magazine ^ | July 16, 2003 | Adam Greenberg
    Here's to your health...your health insurance credentials, that is. Information security service provider Dell SecureWorks has uncovered in a new report that buyers are dropping big bucks for health insurance documents that are being hawked on the internet underground with the goal of using them to commit fraud. Dell SecureWorks Counter Threat Unit (CTU) senior security researcher Don Jackson has investigated underground market supply and demand for years, and beginning in May, he sought to update how buyers are spending their money in 2013. Jackson discovered people are laying down top dollar for all-inclusive health insurance dossiers known as “Kitz,”...
  • Woman Signs Up For Obamacare And Has Identity Stolen

    11/20/2013 10:50:42 AM PST · by sevinufnine · 75 replies
    Off the Grid News ^ | November 13, 2013 | Daniel Jennings
    Experts’ warnings of Obamacare website’s complete lack of security apparently have been justified. The website gave at least 3 unknown individuals access to a woman’s Social Security number, address, and other data that could be used for identity theft. Customer service operators at Healthcare.gov’s 1-800 number told Lisa Martinson about the unauthorized access when she called in to change her password. When Martinson asked for her information to be removed from the site she was told it would take 5 days.
  • Dragon Day Movie: Have You Guys Seen This?

    11/15/2013 9:39:41 AM PST · by Bill Russell · 25 replies
    Dragon Day -- Movie Trailer ^ | October 2013 | Movie Trailer
    Someone may have posted something on this already...Scary concept and has a little too close to real feel... http://www.dragondaymovie.com/?video=video-8-3
  • British man accused of hacking into US government systems

    11/13/2013 5:05:50 PM PST · by Libloather · 8 replies
    BBC ^ | 10/28/13
    **SNIP** According to the US authorities, the arrested man hacked into systems of the US Army, Nasa and the Environmental Protection Agency, among others. **SNIP** The suspected hackers allegedly placed "back doors", or code, to allow them to get back into the systems later to steal confidential information.
  • Phone chargers/USB sticks given to G20 world leaders by Russian hosts were 'trojan horses

    10/29/2013 3:21:49 PM PDT · by afraidfortherepublic · 20 replies
    Daily Mail ^ | 10-29-13 | Hannah Roberts In Rome
    The revelation came after Germany's secret service investigated the devices It warned that they were 'trojan horses' capable of fishing for information Warnings have gone out to every government that received them America’s NSA spy agency has been under fire from around the world for its surveillance activity over the past few months. Now the Russians are facing criticism for some allegedly shady operations, too. It’s claimed that USB drives and phone chargers, given to world leaders at the G20 summit in Russia were 'Trojan horses' capable of sending data back to the Kremlin. David Cameron did not receive one...
  • Was ISRAEL behind the hacking of millions of French phones and NOT the U.S.?

    10/25/2013 12:22:57 PM PDT · by Nachum · 31 replies
    Daily Mail ^ | 10/25/13 | Nabdila Ramdani
    Israel and not America was behind the hacking of millions of French phones, it was claimed today. [Snip] But today’s Le Monde newspaper provides evidence that it was in fact Israeli agents who were listening in. France first suspected the U.S. of hacking into former president Nicolas Sarkozy’s communications network when he was unsuccessfully trying for re-election in 2012. Intelligence officials Bernard Barbier and Patrick Pailloux travelled from Paris to Washington to demand an explanation, but the Americans hinted that the Israelis were to blame. The Americans insisted they have never been behind any hacking in France, and were always
  • John McAfee On Obamacare: “This Is A Hacker’s Wet Dream”

    10/05/2013 11:01:25 AM PDT · by Oldpuppymax · 13 replies
    Coach is Right ^ | 10/5/03 | Michael D. Shaw
    The man whose name is synonymous with computer security shreds Obamacare’s web strategy. The very worst kind of identity theft is medical identity theft, but when you also combine this with all sorts of additional...
  • HACKED DATA BROKERS COULD SPELL TROUBLE FOR OBAMACARE

    09/28/2013 10:50:27 AM PDT · by MeshugeMikey · 14 replies
    nextgov.com ^ | September 28, 2013 | Aliya Sternstein
    A service that sells personal data to identity thieves has been getting its wares from hacked data brokers storing information similar to what Obamacare marketplaces plan to use, setting the scene for fraudsters to collect government subsidies. According to a new investigative report by cybersecurity researcher Brian Krebs, the service, known as SSNDOB, hacked LexisNexis and other large data aggregators that supply ID check information.
  • Shodan: The scariest search engine on the Internet

    08/02/2013 8:07:06 PM PDT · by 2ndDivisionVet · 50 replies
    CNN Money ^ | April 8, 2013 | David Goldman
    "When people don't see stuff on Google, they think no one can find it. That's not true." That's according to John Matherly, creator of Shodan, the scariest search engine on the Internet. Unlike Google, which crawls the Web looking for websites, Shodan navigates the Internet's back channels. It's a kind of "dark" Google, looking for the servers, webcams, printers, routers and all the other stuff that is connected to and makes up the Internet. (Shodan's site was slow to load Monday following the publication of this story.) Shodan runs 24/7 and collects information on about 500 million connected devices and...
  • The world’s Most Dangerous Search Engine

    02/08/2013 7:39:37 PM PST · by nickcarraway · 6 replies
    San Diego CityBeat ^ | Wednesday, Feb 06, 2013 | Dave Maass
    Aren’t you glad Shodan is in the hands of good guys like John Matherly?Ask John Matherly if he’s a hacker, and he’ll struggle for a moment with the term. On one hand, he’s a hacker, in the sense that he’s an innovative programmer, arms deep in the information-security industry. On the other, he’s hypersensitive to how his baby—a project called Shodan—is portrayed in the press. In the past year, it’s surged in notoriety and not just in technology publications, such as Ars Technica and Wired. Shodan’s been the subject of multiple Washington Post investigative features, profiled on Dutch television and...
  • Federal Agencies Fall Victim to African Fraud Scheme

    07/25/2013 8:37:57 AM PDT · by Red Badger · 10 replies
    www.wftw.com ^ | 07-25-2013 | Staff
    (WASHINGTON) -- Even the U.S. government has to deal with those pesky, Internet-based scams out of Africa. New court documents show that several years ago, the U.S. Department of Defense, the National Institutes of Health and other federal agencies fell victim to an intricate fraud scheme, whereby individuals in Kenya were able to divert payments from those agencies to their own bank accounts. In 2008, a group of unidentified individuals in Kenya somehow accessed the U.S. government’s Central Contractor Registry, a password-protected database that maintains bank account information of government contractors and research institutions doing work for the government, according...
  • DIgital License Plates for California??

    07/18/2013 10:13:42 AM PDT · by MeshugeMikey · 24 replies
    KPIX ^ | July 18 2013
    SAN FRANCISCO (KPIX 5) – California may become the first state to issue digital license plates that can be registered electronically and record tolls. Privacy advocates are concerned the plates could become tracking devices for law enforcement. Instead of a metal license plate, the digital plate would be a computer screen, slightly larger than an iPad. Registering the plates could be done wirelessly.
  • Provably Secure DNS: A Case Study in Reliable Software

    07/02/2013 7:14:11 AM PDT · by OneWingedShark · 16 replies
    http://ironsides.martincarlisle.com ^ | Unknown | Barry Fagin and Martin Carlisle
    Abstract. We describe the use of formal methods in the development of IRONSIDES, an implementation of DNS with superior performance to both BIND and Windows, the two most common DNS servers on the Internet. More importantly, unlike BIND and Windows, IRONSIDES is impervious to all single-packet denial of service attacks and all forms of remote code execution. Introduction DNS is a protocol essential to the proper functioning of the Internet. The two most common implementations of DNS are the free software version BIND and the implementations that come bundled with various versions of Windows. Unfortunately, despite their ubiquity and...
  • Why It's Unlikely Someone Killed Michael Hastings By Hacking His Car

    06/27/2013 1:02:15 AM PDT · by Impala64ssa · 71 replies
    Jalopnik ^ | 6/25/13 | Patrick George
    Following the death of Rolling Stone and BuzzFeed contributor Michael Hastings in a fiery car crash, and the subsequent revelation of a panicked email he sent to his colleagues just before he died, this question has arisen: could someone have hacked his car? That's unlikely, and here's why. P Hastings' 2013 Mercedes C250 coupe crashed into a tree on Highland Ave. in Los Angeles around 4:30 am on June 18. The car burst into flames, and it took the coroner two days to positively ID Hastings' body. P It sounds like perfect fodder for a good conspiracy theory. After all,...
  • Webpages that accessed on my computer are opening up on my cell phone. Strange.

    06/21/2013 3:01:25 PM PDT · by jsanders2001 · 72 replies
    06/21/2013 | Jsanders2001
    Has anybody experienced this lately? I will go to a webpage on my office computer then later during the day that very same page will open up on my cellphone in Safari. Mind you I didn't visit that web page on my cell phone at all and didn't sync it with my computer either. I'm wondering if someone has hacked my work computer, is capturing the webpage addresses then has my cellphone number and access to the account to make it open up on my cellphone remotely. I know how part of that could be done but it would take...
  • Hacked Sharyl Attkisson tells O'Reilly: 'I Think I Know' Who Did It

    06/18/2013 6:49:21 AM PDT · by SeekAndFind · 53 replies
    Fox News ^ | 06/18/2013
    O'REILLY: "Personal Story" segment tonight. CBS News announced on Friday that Investigative Correspondent Sharyl Attkisson's computer was hacked into late last year. This, combined with the James Rosen situation here at Fox News and the A.P. snooping, causing a lot of concern. With us now on a Factor Cable Exclusive is Ms. Attkisson. So, when did you know that somebody was messing with your computer. SHARYL ATTKISSON, INVESTIGATIVE CORRESPONDENT, CBS NEWS: Well, there were signs probably around 2011 but I don't think I recognized exactly what was going on until perhaps the fall of last year when so many things...
  • Sharyl Attkisson on being hacked: My computers turned themselves on/off in the middle of the night

    06/17/2013 12:55:56 PM PDT · by SeekAndFind · 35 replies
    Hotair ^ | 06/17/2013 | AllahPundit
    Via the Right Scoop, a follow-up to Friday’s post. Forgive me for a possibly stupid question but when she says that her computers were turning on and off, she means they were powering on and then powering down, not that they were merely “waking up” from sleep mode, right? When I tweeted the link to this, a bunch of people tweeted back that a computer might “wake up” automatically due to Windows Update. But Attkisson has had professional computer forensics people investigate, though; obviously she knows the difference by now between a computer updating itself and doing something freaky weird...
  • Snowden: Classified US data shows Hong Kong hacking targets

    06/16/2013 8:14:49 AM PDT · by SeekAndFind · 82 replies
    South China Morning Post ^ | 06/16/2013 | Lana Lam
    Classified US government data shown to the South China Morning Post by whistle-blower Edward Snowden has provided a rare insight into the effectiveness of Washington's top-secret global cyberspying programme. New details about the data can be revealed by the Post after further analysis of information Snowden divulged during an exclusive interview on Wednesday in which the former CIA computer analyst exposed extensive hacking by the US in Hong Kong and the mainland. The FBI said yesterday it had launched a criminal investigation and was taking "all necessary steps" to prosecute Snowden for exposing secret US surveillance programmes. FBI Director Robert...
  • CBS News confirms multiple breaches of Sharyl Attkisson’s computer

    06/14/2013 7:58:50 AM PDT · by sunmars · 112 replies
    CBS News reporter Sharyl Attkisson revealed in May that her computer had been compromised. When asked about the situation, CBS News responded with a statement that it was conducting an investigation. That investigation has reached the following conclusions, according to CBS News spokeswoman Sonya McNair: “A cyber security firm hired by CBS News has determined through forensic analysis that Sharyl Attkisson’s computer was accessed by an unauthorized, external, unknown party on multiple occasions late in 2012. Evidence suggests this party performed all access remotely using Attkisson’s accounts. While no malicious code was found, forensic analysis revealed an intruder had executed...
  • Snowden Threatens to Reveal More 'Explosive' NSA Secrets (About U.S. Hacking of Chinese Computers)

    06/12/2013 1:24:16 PM PDT · by SeekAndFind · 87 replies
    NewsMax ^ | 06/12/2013
    Former U.S. spy Edward Snowden on Wednesday vowed to fight any bid to extradite him from Hong Kong and promised "explosive" new revelations about Washington's surveillance targets, The South China Morning Post reported. Specifically, Snowden reportedly showed the newspaper "unverified documents" describing an extensive U.S. campaign to obtain information from computers in Hong Kong and mainland China. "We hack network backbones, like huge Internet routers, basically, that give us access to the communications of hundreds of thousands of computers without having to hack every single one," he told the newspaper. Officials have confirmed that Snowden may have more secret material....
  • Do Free Stuff and Pleasant Sounding Words Trump all else?

    06/11/2013 1:00:32 PM PDT · by DanMiller · 6 replies
    Dan Miller's Blog ^ | June 11, 2013 | Dan Miller
    Combined with compliant media they seem to.Daniel Duquenal (a pseudonym), my favorite blogger there even before he became the last significant English language blogger in Venezuela, offered some comparisons between the current Venezuelan regime and the regimes in Turkey and Syria. The entire article is interesting and well worth reading. However, I found this paragraph fascinating: Chavez never was a model except for its methods to ensure that gangs of thugs seize and retain power while killing democracy with its own weapons. We did have a Taksim of sorts with Plaza Altamira in 2002-2003 but this is over as the reality...