Free Republic 1st Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $78,002
88%  
Woo hoo!! And we're now over 88%!! Less than $10k to go!! Let's git 'er done!! Thank you all very much!!

Keyword: hackers

Brevity: Headers | « Text »
  • Lenovo website breached, hacker group Lizard Squad claims responsibility

    02/25/2015 9:28:45 PM PST · by Citizen Zed · 10 replies
    fortune.com / Reuters ^ | 2-25-2015 | Bobby Yip
    Chinese computer and smartphone firm Lenovo Group said its website was hacked on Wednesday, its second security blemish days after the U.S. government advised consumers to remove software called “Superfish” pre-installed on its laptops. Hacking group Lizard Squad claimed credit for the attacks on microblogging service Twitter. Lenovo said attackers breached the domain name system associated with Lenovo and redirected visitors to lenovo.com to another address, while also intercepting internal company emails. Lizard Squad posted an email exchange between Lenovo employees discussing Superfish. The software was at the centre of public uproar in the United States last week when security...
  • HACKED HARDWARE COULD CAUSE THE NEXT BIG SECURITY BREACH

    02/24/2015 5:08:22 AM PST · by Not gonna take it anymore · 4 replies
    Popular Science ^ | February 17, 2015 | By P.W. Singer
    Sinister Circuit Board Peter Shanks via Flickr CC By 2.0 In late summer of 2006, the Japanese division of McDonald’s decided to run a new promotion. When customers ordered a Coca-Cola soft drink, they would receive a cup with a code. If they entered that code on a designated website and were among 10,000 lucky winners, they would receive an MP3 player pre-loaded with 10 songs. Cleverly constructed, the promotion seemed destined for success. Who doesn’t like a Coke and a free MP3 player? But there was one problem the marketers at McDonald’s could not anticipate: In addition to 10...
  • Bank Hackers Steal Millions via Malware

    02/14/2015 3:03:20 PM PST · by dynachrome · 14 replies
    New York Times ^ | 2-14-15 | DAVID E. SANGER and NICOLE PERLROTH
    In a report to be published on Monday, and provided in advance to The New York Times, Kaspersky Lab says that the scope of this attack on more than 100 banks and other financial institutions in 30 nations could make it one of the largest bank thefts ever — and one conducted without the usual signs of robbery. The Moscow-based firm says that because of nondisclosure agreements with the banks that were hit, it cannot name them. Officials at the White House and the F.B.I. have been briefed on the findings, but say that it will take time to confirm...
  • Aliens, Robots, Cheetahs, Oh My! Watch These “Face Hackers” Use Projectors To Modify Their Faces

    01/18/2015 11:14:13 PM PST · by LibWhacker · 2 replies
    TechCrunch ^ | 1/18/15 | Greg Kumparak
    Happy Sunday! Ready to have your mind blown?By mixing ultra-bright projectors and advanced facial tracking with some damned fine visual design, these guys are able to use their faces as a canvas some truly wild work. ==>>>Watch on as they morph from human, to alien, to cheetah, to robot overlord on the fly.<<<==So how does it work? To oversimplify it: an array of cameras tracks the dots on their faces, akin to the way Hollywood motion capture systems work. They then take some truly amazing texture/animation work and digitally morph it around a model of each guy’s face — essentially...
  • Islamic State Hacks CENTCOM Twitter Feed as Obama Talks Cybersecurity

    01/12/2015 10:12:36 AM PST · by maggief · 28 replies
    Free Beacon ^ | January 12, 2015 | Lachlan Markay
    As President Barack Obama addressed the nation regarding national cyber security efforts, hackers claiming to represent the Islamic State (IS) took over the Twitter account of the Pentagon division in charge of the Middle East. Hackers with the Islamic State, also known as ISIS or ISIL, posted links on U.S. Central Command’s official Twitter page to what it claimed was “confidential data from your mobile devices.” “ISIS is already here, we are in your PCs, in each military base. With Allah’s permission we are in CENTCOM now,” said one tweet sent from CENTCOM’s account.
  • (Sharyl) Attkisson sues DoJ for hacking her computers

    01/05/2015 11:38:27 AM PST · by maggief · 43 replies
    Hot Air ^ | January 5, 2015 | Ed Morrissey
    Did the Obama administration put a journalist under surveillance for reporting critically on its activities? Former CBS reporter Sharyl Attkisson says yes — and she wants $35 million in damages from the Department of Justice for it. Attkisson filed a series of legal motions today that claim the DoJ hacked into her computer and attacked her professionally: In a series of legal filings that seek $35 million in damages, Attkisson alleges that three separate computer forensic exams showed that hackers used sophisticated methods to surreptitiously monitor her work between 2011 and 2013. … In the lawsuit and related claims against...
  • North Korea says new U.S. sanctions for Sony hack will only 'harden its will'

    01/04/2015 6:17:33 PM PST · by Libloather · 7 replies
    LA Times via MSN ^ | 1/04/15 | Julie Makinen
    BEIJING — North Korea on Sunday denounced new economic sanctions imposed by President Barack Obama in response to a cyberattack on Sony Pictures Entertainment that U.S. officials have blamed on the regime. The country's official news agency quoted an unnamed Foreign Ministry spokesman as saying the new sanctions would only "harden its will and resolution to defend ... the dignity of the nation." The new penalties —which cut off access to the U.S. financial sector for 10 individuals and three government entities identified as key operatives engaged in hostile behavior, including the country's intelligence agency — add to sanctions imposed...
  • The Internet of Things: Can a hacker stop your car or your heart?

    01/03/2015 6:17:28 PM PST · by SeekAndFind · 19 replies
    The Week ^ | 01/03/2015 | By Temitope Oluwafemi, The Conversation US
    The risk is relatively low right now. But we must improve the security of future devices. We're living at the dawn of the age of the Internet of Things. Appliances ranging from light switches and door locks to cars and medical devices now boast internet connectivity. The convenience can't be beat. But what are the security and privacy implications? Is a patient implanted with a remotely controllable pacemaker at risk for security compromise? Vice President Dick Cheney's doctors worried enough about an assassination attempt via implant that they disabled his defibrillator's wireless capability. Should we expect capital crimes via hacked...
  • iCloud accounts at risk after hacker releases tool allowing access to any login

    01/02/2015 8:37:14 PM PST · by Swordmaker · 40 replies
    MacDailyNews ^ | Friday 02 January 2015
    “All iCloud accounts could be vulnerable to hacking by a new tool that claims it can break into any user’s login,” Andrew Griffin reports for The Independent. “The tool claims to use an exploit to get through Apple’s security.” “It uses a ‘dictionary attack’ to get into accounts — a hack that involves automatically trying a number of passwords until the right one is found. Sites usually have locks in place to stop such an attack, by only allowing a certain number of tries of one password, but the tool claims to be able to bypass those,” Griffin reports. “A...
  • The Year of the Breach: 10 Federal Agency Data Breaches in 2014

    01/01/2015 7:02:13 AM PST · by Libloather · 4 replies
    Nextgov ^ | 12/30/14 | Jack Moore, Nextgov Staff
    **SNIP** Over the past few years, the number of security incidents at federal agencies involving the potential exposure of personal information has skyrocketed -- from about 10,400 in 2009 to more than 25,500 in 2013, according to the Government Accountability Office. There’s no data yet this year on the total number of breaches at agencies in 2014. But with the year almost in the rearview mirror, Nextgov takes a look back at the 10 most impactful, high-profile or otherwise eyebrow-raising federal agency breaches. 1. White House Hacked The Obama administration has made cybersecurity a key priority, so it must have...
  • New evidence Sony hack was ‘inside’ job, not North Korea

    12/31/2014 3:22:50 AM PST · by Las Vegas Dave · 25 replies
    nypost.com ^ | 12/30/2014 | Post Staff Report
    US cybersecurity experts say they have solid evidence that a former employee helped hack Sony Pictures Entertainment’s computer system — and that it was not masterminded by North Korean cyberterrorists. One leading cybersecurity firm, Norse Corp., said Monday it has narrowed its list of suspects to a group of six people — including at least one Sony veteran with the necessary technical background to carry out the attack, according to reports. The investigation of the Sony hacking by the private companies stands in stark contrast to the finding of the FBI, which said Dec. 19 its probe traced the hacking...
  • Merry Christmas, from hackers: PlayStation Network and Xbox Live both attacked

    12/25/2014 2:45:44 PM PST · by MeshugeMikey · 11 replies
    bgr.com ^ | December 25, 2014 | Chris Smith
    A hacker group known as “Lizard Squad” has claimed responsibility for attacks targeting both Microsoft’s Xbox Live and Sony’s PlayStation Network (PSN) on Wednesday evening. FROM EARLIER: The iPhone 6 might be low-res, but Apple’s highest-resolution device ever is coming soon Microsoft’s Xbox Live went down for Xbox 360 users in the afternoon of December 24th, with the company’s status page for the service showing that Xbox Live core services were “limited.” The hacker team posted various messages on Twitter, confirming that it took down Xbox Live on Christmas Eve.
  • Facebook blocks Russian page supporting Navalny, Putin's biggest critic

    12/21/2014 5:24:38 AM PST · by elhombrelibre · 18 replies
    Washington Post ^ | 20 Dec 14 | Michael Birnbaum
    MOSCOW — In a sign of new limits on Facebook’s ability to serve as a platform for political opposition movements, Russian users appear to have been blocked from accessing a page calling for a protest in support of a prominent dissident. In 2011, Facebook was hailed by opposition movements during the Arab Spring and in Russia as a powerful new tool to spread information beyond the control of repressive governments. That may no longer be the case, at least not in Russia. Russian Internet regulators said Saturday that they had sent Facebook a “demand” that it block access to a...
  • Cyberattack on German Iron Plant Causes ‘Widespread Damage’: Report

    12/20/2014 11:49:41 AM PST · by Ray76 · 16 replies
    WSJ ^ | Dec 18, 2014 | Rachael King
    A German federal agency has acknowledged in a report Wednesday that a cyberattack caused physical damage to an iron plant in the country. It was a rare admission by a government tying a cyber action to actual physical destruction. The attackers gained access to an unnamed plant’s office network through a targeted malicious email and were ultimately able to cross over into the production network. The plant’s control systems were breached which “resulted in an incident where a furnace could not be shut down in the regular way and the furnace was in an undefined condition which resulted in massive...
  • North Korea Says They Want To Help Find The Sony Hackers

    12/20/2014 9:20:05 AM PST · by blam · 38 replies
    BI - Reuters ^ | 12-20-2014 | Hunter Walker
    Hunter Walker December 20, 2014A North Korean official said on Saturday that the secretive regime wants to mount a joint investigation with the United States to identify who was behind the cyber attack against Sony Pictures. An unnamed spokesman of the North Korean foreign ministry was quoted by the country's state news agency, KCNA, describing US claims they were behind the hack as "slander." "As the United States is spreading groundless allegations and slandering us, we propose a joint investigation with it into this incident," the official said, according to Agence France-Presse. After they began publishing leaked Sony movies, internal...
  • Sony ignored security evaluation before GOP [Guardians of Peace] hack, more data coming

    12/20/2014 1:18:13 AM PST · by Spktyr · 43 replies
    Electronista ^ | Sun December 14, 2014 | Electronista Staff
    'Christmas dump' incoming with more 'interesting' Sony Pictures data Months before the hacker intrusion on Sony Pictures' network, analyst firm PricewaterhouseCoopers (PWC) performed an analysis on the company's security, and found it lacking. More than 100 devices were found to be unmonitored by corporate security following an incomplete transition from a private security firm to an in-house team. As a result, any Sony response to network intrusion would be, in the words of the auditors, "slow, fragmented, and incomplete, if it would even happen at all." However, corrective actions proposed by PWC seemingly went undone, which left the doors to...
  • When There Is No Price to be Paid the Hackers Win

    12/19/2014 12:55:45 PM PST · by Ooh-Ah · 8 replies
    Technology and Security New Technologies ^ | Dec 18 2014 | Stephen Bryen
    If there is one salient fact that emerges from the now infamous Sony hack it is that the bad guys won.  The bad guys won because there they paid no price for the damage inflicted.  In the Sony case the hackers are outside and beyond the law, so their backers and sponsors are encouraged to cause even more damage in future. To stop cyber attacks, particularly those sponsored by foreign governments, we need to respond to attacks now. Sony is a movie company, a major cog in the entertainment industry.  Whether Sony rises or falls has little or nothing to...
  • Journalist: First Amendment Rights Mean Not Offending The North Korean Dictator, Okay?

    12/19/2014 11:30:47 AM PST · by 2ndDivisionVet · 18 replies
    Townhall ^ | December 19, 2014 | Katie Pavlich
    Did you know that having First Amendment rights in the United States comes with the responsibility not to offend dictators from North Korea? Had no idea? Me either. Last night on CNN "journalist" Sharon Waxman, who has worked at a number of media outlets including the Washington Post, argued that having First Amendment rights means we shouldn't be making fun of North Korean dictators because they might get upset. She was of course referring to the recent and massive hack on Sony pictures by North Korea as retaliation for "The Interview," a comedy about assassinating Kim Jong-Un. "I also want...
  • George Clooney: No one in Hollywood would sign my letter of support for Sony Pictures

    12/19/2014 10:03:47 AM PST · by SeekAndFind · 9 replies
    Hotair ^ | 12/19 | AllahPundit
    I’m glad he spoke up, not only because he’s right, not only because a little public shaming from an A-lister might get others to rethink, but because that tribute to Hollywood’s bravery that he gave a few years ago at the Oscars would have looked even more embarrassing in hindsight if he’d kept quiet about this.Nothing fancy about the logic of his petition: “We know that to give in to these criminals now will open the door for any group that would threaten freedom of expression, privacy and personal liberty. We hope these hackers are brought to justice but...
  • New message from Hackers to Sony: We'll stand down if you never release the movie

    12/19/2014 9:56:56 AM PST · by SeekAndFind · 49 replies
    CNN Money ^ | 12/19/2014 | Brian Stelter
    The hackers behind a devastating cyberattack at Sony Pictures have sent a new message to executives at the company, crediting them for a "very wise" decision to cancel the Christmas day release of "The Interview," a source close to the company told CNN. The email message was received by Sony's top executives on Thursday night and was obtained by CNN. The source said that the company believes the email was from the hackers because it followed a pattern of previous messages, sent to a list of particular executives and formatted in a particular way. A Sony spokesman declined to comment.
  • Obama's Bumbling, Stumbling America Loses its First Cyber War to a Hotel Room Full of Nork Kids

    12/18/2014 3:33:23 AM PST · by Reaganite Republican · 20 replies
    Reaganite Republican ^ | 18 December 2014 | Reaganite Republican
    As Newt Gingrich noted yesterday, the surrender by Sony Pictures to a shadowy group of North Korean hackers has set a chilling precedent... just wait 'til they grab hold of one of our nuclear plants(like the Israelis already did  to Iran)... BIG defeat for the US and Japan here, and a terrifying incident, to be sure (that's why they call it 'terrorism')- so now this little tinpot-nothing-of-a-country has substantial unchecked power/influence right inside the United States of America? Can you imagine Ronald Reagan/Cap Weinberger letting this go down without KJU being made to seriously regret it? Of course, Obama...
  • The US Is Ready To Blame North Korea For The Sony Hack

    12/17/2014 7:19:48 PM PST · by blam · 24 replies
    BI ^ | 12-17-2014 | Matt Johnston
    Matt Johnston December 17, 2014The US government is planning to announce Thursday that North Korea is directly to blame for the devastating and unprecedented attack on Sony, according to multiple reports. Now we wait and see how the US Government may respond to that attack now that they've placed their blame. That threat is likely retaliation for the controversial comedy "The Interview," which depicts the assassination of North Korea's leader, Kim Jong-un. US Investigators have been able to parse through enough evidence now to claim that North Korea is "centrally involved." On Tuesday, an online threat was posted against theaters...
  • Sony hackers threaten 9/11 attack on movie theaters that screen ‘The Interview’

    12/16/2014 11:39:33 AM PST · by servo1969 · 83 replies
    foxnews.com ^ | 12-16-2014 | Variety Staff
    In the most shocking development yet, the Sony attackers have threatened a 9/11-like attack on movie theaters that screen Seth Rogen and James Franco’s North Korean comedy “The Interview.” They also released the promised “Christmas gift” of files. The contents of the files are unknown but it’s called “Michael Lynton,” who is the CEO of Sony Pictures Entertainment. “The world will be full of fear,” the message reads. “Remember the 11th of September 2001. We recommend you to keep yourself distant from the places at that time. (If your house is nearby, you’d better leave.) Whatever comes in the coming...
  • Attack on Movie Theaters That Screen ‘The Interview’

    12/16/2014 11:23:36 AM PST · by bimboeruption · 30 replies
    Variety ^ | 12-16-2014 | Brent Lang
    The Sony hackers have threatened a 9/11-like attack on movie theaters that screen Seth Rogen and James Franco’s North Korean comedy “The Interview,” substantially escalating the stakes surrounding the release of the movie. The attackers also released the promised “Christmas gift” of files. The contents of the files are unknown but it’s called “Michael Lynton,” who is the CEO of Sony Pictures Entertainment. “The world will be full of fear,” the message reads. “Remember the 11th of September 2001. We recommend you to keep yourself distant from the places at that time. (If your house is nearby, you’d better leave.)...
  • In North Korea, hackers are a handpicked, pampered elite

    12/06/2014 1:04:29 PM PST · by 2ndDivisionVet · 13 replies
    Reuters ^ | December 5, 2014 | Ju-min Park and James Pearson
    (VIDEO-AT-LINK) SEOUL-Despite its poverty and isolation, North Korea has poured resources into a sophisticated cyber-warfare cell called Bureau 121, defectors from the secretive state said as Pyongyang came under the microscope for a crippling hack into computers at Sony Pictures Entertainment. A North Korean diplomat has denied Pyongyang was behind the attack that was launched last month but a U.S. national security source said it was a suspect. Defectors from the North have said Bureau 121, staffed by some of the most talented computer experts in the insular state, is part of the General Bureau of Reconnaissance, an elite spy...
  • Fort Lauderdale's website down for hours after threat from Anonymous hackers

    12/02/2014 4:13:30 AM PST · by SoFloFreeper · 4 replies
    Sun Sentinel ^ | 12/1/14 | Larry Barszewski
    ....the hacker group Anonymous made good on a threat to crash the city's website because of recent laws the city has passed regulating homeless behavior. Besides the city's website, fortlauderdale.gov, the police department website, flpd.org, also was affected, as was the city's email system.
  • FBI warns US businesses of 'destructive' malware

    12/01/2014 3:46:00 PM PST · by Dacula · 31 replies
    The FBI warned U.S. businesses that hackers have used malicious software to launch destructive attacks in the United States, following a devastating cyberattack last week at Sony Pictures Entertainment. The five-page, confidential "flash" warning issued to businesses late on Monday provided some technical details about the malicious software that was used in the attack, though it did not name the victim. An FBI spokesman declined comment when asked if the software had been used against the California-based unit of Sony Corp. The Sony attack resulted in five films being leaked online, including the updated version of "Annie." In the attack...
  • Network of Secret Chinese Military Attack US on Daily Basis: Costs trillions of $$, millions of jobs

    11/21/2014 11:25:09 AM PST · by 2ndDivisionVet · 11 replies
    Epoch Times ^ | November 21, 2014 | Joshua Philipp
    An army is attacking the United States. Its war is being waged without bullets or fanfare. Denied by its government, these soldiers operate in shadows and in silence. Yet, glimpses of their operations are seen on a daily basis—hackers and spies attacking and stealing from U.S. businesses and the U.S. government. Until now, a complete view of their operations and of the military department that gives them their orders remained hidden. Yet, China’s spy and cyberoperations all share one thing in common: they’re all orchestrated under the People’s Liberation Army General Staff Department (GSD), the Chinese military’s top-level department dedicated...
  • Anonymous seizes Ku Klux Klan Twitter account over Ferguson threats

    11/16/2014 10:11:19 PM PST · by 2ndDivisionVet · 16 replies
    ZDNet ^ | November 16, 2014 | Violet Blue for Zero Day
    Two Twitter accounts belonging to American racial segregation org Ku Klux Klan, @KuKluxKlanUSA and @YourKKKCentral, have been seized by Anonymous as part of the hacker-activist entity's new campaign, #OpKKK. At 6:31pm PST Anonymous said it has knocked the website belonging to "Traditionalist American Knights of the Ku Klux Klan" -- the group responsible for the Ferguson threats -- offline....
  • Rep. Wolf: Chinese Hackers ‘Literally Taking Whatever They Want’

    11/16/2014 9:49:33 PM PST · by Olog-hai · 12 replies
    Cybercast News Service ^ | November 14, 2014 - 11:40 AM | Barbara Hollingsworth
    Washington is not doing nearly enough to stop Chinese hackers who reportedly broke into the National Oceanic and Atmospheric Administration’s (NOAA) computer system in September from stealing critical information from U.S. government agencies and American businesses, says Rep. Frank Wolf (R-VA). “They have a more sophisticated spying apparatus than the KGB had,” Wolf told CNSNews.com. “We’re losing jobs, technology, everything is leaving. It’s like they’re coming in and literally taking whatever they want to take. And so sometimes you find out about it and sometimes you don’t, but there needs to be a coordinated effort [to stop them],” Wolf continued....
  • Chinese Espionage, Weapons Shift Asian Power Balance

    11/10/2014 10:09:13 AM PST · by raptor22 · 1 replies
    Investor's Business Daily ^ | November 10, 2014 | Investor's Business Daily
    Military Superiority: China's new Shenyang J-31 stealth fighter could be the equal of our F-22s and F-35s, U.S. pilots say, and is just one of the weapons that may thwart America's "pivot" to the Pacific. The J-31, a fifth-generation stealth fighter, will make its official debut at the Zhuhai International Air Show Nov. 11-16 in southern China's Guangdong province. As one U.S. pilot with F-35 experience told USNI News of the J-31 and other new Chinese fighters: "I think they'll eventually be on par with our fifth-gen jets — as they should be, because industrial espionage is alive and well."...
  • Home Depot blames security breach on Windows, executives given new MacBooks and iPhones

    11/09/2014 11:48:07 PM PST · by Swordmaker · 50 replies
    9 to 5 Mac ^ | November 9, 2014 | By JOE ROSSIGNOL
    Earlier this week, The Wall Street Journal published an in-depth look at The Home Depot’s recent security breach of its payment data systems, in which 56 million credit card accounts and 53 million email addresses of customers were compromised. A root cause of the security breach: a Windows vulnerability in the retailer’s main computer network. “Once inside Home Depot’s systems after gaining credentials from the outside vendor, the hackers were able to jump the barriers between a peripheral third-party vendor system and the company’s more secure main computer network by exploiting a vulnerability in Microsoft Corp.’s Windows operating system,...
  • 2nd Russian Hacker Group Accused of Targeting NATO

    10/28/2014 8:40:43 AM PDT · by WhiskeyX · 2 replies
    The Moscow Times ^ | Oct. 28 2014 14:56 | Matthew Bodner
    A U.S. security firm has claimed that a sophisticated, Russia-based hacker group is spying on NATO and former Soviet member states, most likely on the orders of the Russian government. In a report issued Tuesday, security firm FireEye said the group, which the firm dubbed APT28, has since 2007 conducted “long-standing, focused operations that indicate a government sponsor — specifically, a government based in Moscow.”
  • Chat logs reveal FBI informant Sabu’s role in hacking of Sun newspaper

    10/14/2014 12:29:26 PM PDT · by Rusty0604 · 1 replies
    The Guardian ^ | 10/14/2014 | James Ball
    US agency faces questions after records show Lulzsec leader Hector Monsegur, who was informant at time, helped attack that closed UK sites The FBI is facing questions over its role in a 2011 hacking attack on Rupert Murdoch’s Sun newspaper in the UK after the publication of chat logs showed that a man acting as an agency informant played a substantial role in the operation. chat records show Monsegur encouraging others to break further into News International systems, claiming to have sources at the Sun, and even apparently helping to break staff’s passwords and to source files for stealing. Monsegur...
  • Critical USB hack goes public; how bad is the risk?

    10/05/2014 8:51:31 PM PDT · by TChad · 16 replies
    The Atlanta Journal-Constitution ^ | 10/4/2014 | Matt Picht
    Because we just don't already have enough tech security problems to worry about, computer science researchers have just published a potentially catastrophic security exploit.
  • Hackers’ Attack Cracked 10 Financial Firms in Major Assault - Drudge 'RUSSIANS HACK JPM'

    10/04/2014 12:00:37 AM PDT · by free_life · 53 replies
    NYTimes ^ | Oct 3, 2014 | MATTHEW GOLDSTEIN, NICOLE PERLROTH and DAVID E. SANGER
    The hackers are thought to be operating from Russia and appear to have at least loose connections with officials of the Russian government, the people briefed on the matter said. Some American officials speculate that the breach was intended to send a message to Wall Street and the United States about the vulnerability of the digital network of one of the world’s most important banking institutions. “It could be in retaliation for the sanctions” placed on Russia, one senior official briefed on the intelligence said. “But it could be mixed motives — to steal if they can, or to sell...
  • The Bash Bug Could be a “Joe Biden-sized” Problem – Part 1

    09/26/2014 12:01:55 PM PDT · by lifeofgrace · 11 replies
    Charting Course ^ | 8/26/14 | Steve Berman
    Unless you’re a real-life version of Sheldon Cooper, a computer security professional, or, like me, work in the online payment industry, you probably don’t keep up with the latest computer vulnerabilities.  A new one that’s hit the web news like a tsunami in the last 72 hours is simply called “the bash bug” (sometimes called “shellshock”).  Everyone from Time, to Vox*, to tech site C|Net has covered this story. I am not going to get technical here.  You can read any of the above-mentioned articles which provide plenty of detail on that.  To summarize the problem:  a 25-year-old program that’s...
  • Second apparent leak of hacked celebrity nude pictures: US media

    09/20/2014 6:19:14 PM PDT · by Perdogg · 28 replies
    More nude celebrity photos, purportedly including reality star Kim Kardashian, circulated social media Saturday, in what appeared to be the second massive hacking-related leak in less than a month, US media reported. The pictures, which also included nude shots of actress Vanessa Hudgens and US soccer star Hope Solo, appeared briefly on 4chan and Reddit, before being removed, celebrity gossip site TMZ reported.
  • This Site Says It Will Tell If Your Gmail Password Was Hacked [But is it legit?]

    09/11/2014 9:18:25 AM PDT · by SeekAndFind · 16 replies
    Business Insider ^ | 09/11/2014 | Julie Bort
    As you may have heard, Russian hackers have published the passwords for roughly five million Gmail accounts. This follows the publication of millions of passwords for two of Russia's largest email services, Yandex and Mail.Ru.Chances are, your account is not one of the hacked Gmail accounts, because that figure of five million represents only a fraction of the number of Gmail accounts that are active in the world. For instance, the Gmail app has been downloaded one billion times to Android devices. Even back in 2012, Gmail had 350 million users.But a group of programmers have decided to help you check...
  • Google Says Not To Worry About 5 Million 'Gmail Passwords' Leaked

    09/11/2014 8:39:02 AM PDT · by Enlightened1 · 8 replies
    Forbes ^ | 09/10/14 | Kashmir Hill
    This week, a list of nearly five million Gmail addresses paired with passwords appeared online, posted in a Russian Bitcoin security forum. Some people who checked the list and found their Gmail addresses there reported that it contained an old password for them, and often a password that they had reused on multiple sites. There’s speculation that the addresses may hay been stolen from other sites where people used their Gmail address as a log-in
  • Home Depot (HD) Hack Could Be Biggest Card Breach Ever

    09/10/2014 6:39:06 AM PDT · by KeyLargo · 31 replies
    ABC News ^ | Sep 9, 2014 | Richard Davies
    By Richard Davies @daviesnow Sep 9, 2014 9:03am Home Depot (HD) Hack Could Be Biggest Card Breach Ever Morning Money Memo: The huge hacking attack against Home Depot’s payment systems could turn out to be the biggest breach of any retailer’s data so far. The company confirmed the data break-in but did not say how many credit and data cards are affected. The total could be as much as 60 million, according to several experts. That would be far more than the total number of cardholders impacted by the breach at Target stores. There is no evidence that any debit...
  • Islamic Hackers Attack Actor Kirk Cameron’s Movie Website

    09/08/2014 8:01:44 AM PDT · by Blue Turtle · 6 replies
    The website for actor Kirk Cameron’s upcoming movie “Saving Christmas” was infiltrated by Islamic hackers, the film’s production team said. Sony’s Provident Films alerted producers over the weekend that SavingChristmas.com was taken over by a message from Ayyildiz Tim International Force, a hacker group described as anti-Christian, anti-Israel and anti-American. A member of the production team told TheBlaze Sunday that the attack was “fairly sophisticated” but that they were able to quickly remove the group’s message from the website.
  • Amazon's Cloud Is So Pervasive, Even Apple Uses It

    09/02/2014 12:26:51 AM PDT · by Citizen Zed · 16 replies
    read write ^ | 8-26-2014 | DAVID HAMILTON
    Apple's iCloud storage service and other parts of Apple, along with operations at several large banks, run inside A.W.S. (Amazon Web Services), say people familiar with the service who spoke on the condition they not be named so they could sustain relations with the powerful cloud company. But Apple is usually obsessed with micromanaging every aspect of its technology and services. So some of its users might be surprised to learn that they're storing their backups and other personal data not on Apple servers, but on ones rented from Amazon. It's not totally clear that anyone should care about that, but...
  • Apple Just Patched A Security Flaw In iCloud

    09/01/2014 8:12:52 AM PDT · by ConservativeMind · 71 replies
    Business Insider ^ | September 1, 2014 | James Cook
    Engadget reports that Apple has fixed a major bug in its Find My iPhone software that allowed hackers to gain access to iCloud accounts. The fix comes just hours after a hacker leaked hundreds of nude celebrity photos on 4chan in return for Bitcoin donations. Apple's Find My iPhone login page was discovered to have been vulnerable to so-called "brute force" hacks. Hackers are usually locked out of sites if they try to gain access using multiple passwords, but it was discovered that the Find My iPhone API allows users to repeatedly try different passwords. Security researcher Alexey Troshichev revealed...
  • Did iCloud's 'Find My iPhone' function help hacker steal 'nude' photos of Jennifer Lawrence

    09/01/2014 7:43:39 AM PDT · by Mad Dawgg · 45 replies
    DailyMail.com ^ | 1 September 2014 | Paul Chavez and Zoe Szathmary and Sophie Jane Evans
    A flaw in the 'Find My iPhone' function of Apple's iCloud service may have helped a hacker to steal nude photos of Jennifer Lawrence and '100 other celebrities', it today emerged. The hacker claims he or she broke into stars' iCloud accounts, including those of the Hunger Games actress, Kate Upton and Rihanna, before publishing them on 4chan, the image-sharing forum. A list of the alleged victims of the hack - 101 in total - has also been posted online; most of whom have not seen any photographs leaked by the hacker. A spokesman for Oscar winner Lawrence confirmed to...
  • Nude Photos Leak In Massive iCloud Hack (Please delete your iCloud backups for now)

    08/31/2014 5:34:30 PM PDT · by ConservativeMind · 136 replies
    Small Business Yahoo ^ | Sept 1, 2014 | Caroline Moss
    Full Title: Nude Photos Of Jennifer Lawrence, Kate Upton, Ariana Grande Leak In Massive iCloud Hack Jennifer Lawrence, Ariana Grande, and Kate Upton were among a handful of celebrities whose nude photos were leaked late Sunday afternoon following what appears to be a large-scale hack. The photos first appeared on a 4Chan thread (very NSFW). So far, only Lawrence’s publicist Bryna Rifkin has confirmed, in an official statement to Buzzfeed, that the photos were of her client... ...The leaked photos were apparently obtained via a massive hack of Apple’s iCloud. They were then posted on 4chan by users offering more...
  • Urgent: Checking and savings account information stolen from major banks

    08/27/2014 7:30:24 PM PDT · by TurboZamboni · 119 replies
    Kommando.com ^ | 8-27-14 | Kim Kommando
    Word has leaked that JPMorgan Chase and possibly four other banks have been hacked. Details are scarce at this point, but the FBI and other government agencies are involved in the investigation. The hack allegedly took place earlier in August and hackers have siphoned off huge amounts of sensitive data from Chase, including checking and savings account information. Even more concerning, sources say that the attack goes "far beyond the capabilities of ordinary hackers." Given the timing, some security experts are speculating it was the work of high-level Russian hackers. According to an inside source, there has been no increase...
  • US Companies Can't Protect Citizens? Chinese Hackers Steal 4.5 Million Patients Info

    08/20/2014 7:38:03 AM PDT · by SeekAndFind · 6 replies
    Christian Post ^ | 08/20/2014 | BY SAMUEL SMITH
    One of America's largest hospital chains is the latest to fall victim to a group of sophisticated Chinese hackers who compromised 4.5 million patients' data including social security numbers in April and June. The cyber attack is the largest ever reported by a U.S. health care company and should serve as a warning to get more private companies to take their cyber protection more seriously. "Many companies are instituting anti-malware controls to detect malware prior to infection," said Kroll Cyber Investigations Managing Director Timothy P. Ryan in an email interview with The Christian Post. "Other companies are incorporating more robust...
  • Apple begins storing users' personal data on servers in China

    08/16/2014 7:08:33 AM PDT · by Innovative · 60 replies
    Reuters ^ | Aug 16, 2014 | Gerry Shih and Paul Carsten
    Apple Inc (AAPL.O) has begun keeping the personal data of some Chinese users on servers in mainland China, marking the first time the tech giant is storing user data on Chinese soil. The storage of user data in China represents a departure from the policies of some technology companies, notably Google Inc (GOOGL.O), which has long refused to build data centers in China due to censorship and privacy concerns. Apple said the move was part of an effort to improve the speed and reliability of its iCloud service, which lets users store pictures, e-mail and other data. Positioning data centers...
  • Hackers have the names and Social Security numbers of Ferguson police. But should they share them?

    08/14/2014 3:48:25 PM PDT · by 2ndDivisionVet · 38 replies
    The Washington Post's The Intersect ^ | August 14, 2014 | Caitlin Dewey
    A promotional image for Anonymous’s #OpFerguson.David, a.k.a. Pharoah, doesn’t hold a political office or opine for CNN. But this week, the 14-year-old hacker mounted what might have been one of the more personally damaging attacks against Ferguson, Mo.’s embattled police department: the name — and the address, and the Social Security number — of St. Louis County Police Chief Jon Belmar. That’s not all. Pharoah, a self-proclaimed member of the loosely affiliated hacker collective Anonymous, has also obtained the name and Social Security number of a Ferguson police officer he believes was involved in 18-year-old Michael Brown’s fatal shooting last...