HOME/ABOUT  Prayer  SCOTUS  ProLife  BangList  Aliens  StatesRights  ConventionOfStates  WOT  HomosexualAgenda  GlobalWarming  Corruption  Taxes  Congress  Fraud  MediaBias  GovtAbuse  Tyranny  Obama  ObamaCare  Elections  Layoffs  NaturalBornCitizen  FastandFurious  OPSEC  Benghazi  Libya  IRS  Scandals  TalkRadio  TeaParty  FreeperBookClub  HTMLSandbox  FReeperEd  FReepathon  CopyrightList  Copyright/DMCA Notice 

Calling all FReepers: We need to wrap this baby up by the end of the month. If you have not yet made your donation, please do so today. We can do this. Thank you very much!!

Or by mail to: Free Republic, LLC - PO Box 9771 - Fresno, CA 93794
Free Republic 2nd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $76,051
86%  
Woo hoo!! And now less than $12k to go!! We can do this. Thank you all very much!! Let's git 'er done!!

Keyword: hackers

Brevity: Headers | « Text »
  • Adult dating site hack exposes millions of users (Adult Friend Finder)

    05/22/2015 4:07:03 AM PDT · by 2ndDivisionVet · 23 replies
    Belfast's News Channel 4 ^ | May 21, 2015 | Geoff White
    Hackers have struck one of the world's largest internet dating websites, leaking the highly sensitive sexual information of almost four million users onto the web. The stolen data reveals the sexual preferences of users, whether they're gay or straight, and even indicates which ones might be seeking extramarital affairs. In addition, the hackers have revealed email addresses, usernames, dates of birth, postal codes and unique internet addresses of users' computers. Channel 4 News has been investigating the cyber underworld, discovering which websites have been hacked and exposing the trade in personal information of millions of people through so-called "dark web"...
  • Hackers are draining bank accounts via the Starbucks app

    05/14/2015 7:10:28 PM PDT · by Enlightened1 · 30 replies
    CNN ^ | 05/14/15
    Thieves are stealing money from people's credit cards, bank and PayPal accounts -- by first tapping into their Starbucks mobile app. Starbucks (SBUX) on Wednesday acknowledged that criminals have been breaking into individual customer rewards accounts. The Starbucks app lets you pay at checkout with your phone. It can also reload Starbucks gift cards by automatically drawing funds from your bank account, credit card or PayPal. That's how criminals are siphoning money away from victims. They break into a victim's Starbucks account online, add a new gift card, transfer funds over -- and repeat the process every time the original...
  • ISIS Hackers Plan "Message to America" Attack Today (Cyber attack 2PM EST)

    05/11/2015 6:57:53 AM PDT · by maggief · 158 replies
    Vocativ ^ | May 11, 2015 | Gilad Shiloach
    A group of hackers affiliated with ISIS are threatening to carry out a cyber attack—dubbed “Message to America”—against a number of targets 2 p.m. EST today. The targets were not identified on ISIS forums and social channels but the hackers are promising something “surprising” that “will frighten America”.
  • Russia and China Pledge Not to Hack Each Other

    05/10/2015 10:59:47 PM PDT · by Olog-hai · 20 replies
    Wall Street Journal ^ | 8:32 am ET May 8, 2015 | Olga Razumovskaya
    If the U.S. intelligence community believes that Russia poses a greater cyber spying threat than China, what will it make of this? Russia and China signed a cyber-security deal on Friday, which experts say could firm up Russia’s ties with the east and may become a foundation for binding cyber security ties in the future. According to the text of the agreement posted on the Russian government’s website on Wednesday, Russia and China agree to not conduct cyber-attacks against each other, as well as jointly counteract technology that may “destabilize the internal political and socio-economic atmosphere,” ”disturb public order” or...
  • Ex-commander: Nukes on high alert are vulnerable to error

    04/30/2015 11:39:50 PM PDT · by Olog-hai · 20 replies
    Associated Press ^ | Apr. 30, 2015 3:36 AM EDT | Robert Burns
    A former commander of U.S. nuclear forces is leading a call for taking U.S. and Russian nuclear missiles off high alert, arguing that keeping them less ready for prompt launch would reduce the risk of miscalculation in a crisis. It also could keep a possible cyberattack from starting a nuclear war, he said, although neither Washington nor Moscow appears interested in negotiating an agreement to end the practice of keeping nuclear missiles on high alert. Retired Gen. James Cartwright said in an interview that “de-alerting” nuclear arsenals could foil cyber intruders by reducing the chance of firing a weapon in...
  • Pentagon says it evicted Russian Hackers

    04/24/2015 11:38:40 AM PDT · by Izzy Dunne · 6 replies
    Reuters ^ | 23 Apr 2015 | Phil Stewart
    The United States on Thursday disclosed a cyber intrusion this year by Russian hackers who accessed an unclassified U.S. military network, in a episode Defense Secretary Ash Carter said showed the growing threat and the improving U.S. ability to respond.
  • Voting machine password hacks as easy as 'abcde', details Virginia state report

    04/15/2015 4:42:21 PM PDT · by afraidfortherepublic · 20 replies
    The Guardian ^ | 4-15-15 | Sam Thielman
    AVS WinVote machines used in three presidential elections in state ‘would get an F-minus’ in security, said computer scientist who pushed for decertification Touchscreen voting machines used in numerous elections between 2002 and 2014 used “abcde” and “admin” as passwords and could easily have been hacked from the parking lot outside the polling place, according to a state report. The AVS WinVote machines, used in three presidential elections in Virginia, “would get an F-minus” in security, according to a computer scientist at tech research group SRI International who had pushed for a formal inquiry by the state of Virginia for...
  • Administration Brushes Off Russian Hackers [semi-satire]

    04/13/2015 9:53:29 AM PDT · by John Semmens · 2 replies
    Semi-News/Semi-Satire ^ | 11 April 2015 | John Semmens
    Evidence that Russian computer hackers penetrated security at the White House and State Department was brushed aside by National Security Council spokesman Mark Stroh. “Since the Administration has no hostile designs on Russia we don’t consider their gaining access to confidential correspondence at the State Department or White House a threat to our security,” Stroh maintained. “In a way, this could be a good thing. They will see that we bear them no ill will. That could open up new avenues for better relations between our two countries.” “It would be far more worrisome if our correspondence had been illicitly...
  • Nearly Half Of 'Game of Thrones' Season 5 Has Leaked Online

    04/12/2015 3:39:53 PM PDT · by lulu16 · 33 replies
    Forbes ^ | April 11, 2015 | staff
    Bad news today for HBO, which is attempting to marry the recent debut of their HBO Now streaming service with season 5 of Game of Thrones. As of last night, the first four episodes of the new season, nearly half of the ten total episodes, have been leaked online to various torrent sites. After appearing online yesterday afternoon, the episodes have already been downloaded almost 800,000 times, and that figure will likely blow past a million downloalds by the season 5 premier tonight.
  • Report: Russia behind 2014 attack on White House computer system

    04/08/2015 11:44:34 PM PDT · by Olog-hai · 1 replies
    Fox News ^ | April 07, 2015
    Russian hackers last year were able to breach a White House computer system after a successful cyber-attack on the State Department, a news report said Tuesday. The report by CNN says the hackers were able to get sensitive information, including non-public details about President Obama’s schedule. White House officials responded by saying the attack last year was made public and that no classified information was compromised. And they declined to comment on CNN’s assertion that Russia was the culprit. …
  • Russia’s Invasion of White House Computers: The Story Still Has Not Been Told

    04/08/2015 4:10:21 AM PDT · by afraidfortherepublic · 9 replies
    Powerline ^ | 4-7-15 | John Hinderaker
    CNN has made news with this headline: “How the U.S. thinks Russians hacked the White House.” Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation. While the White House has said the breach only affected an unclassified system, that description belies the seriousness of the intrusion. The hackers had access to sensitive information such as real-time non-public details of the president’s schedule. While such information is not classified, it is still highly sensitive and...
  • BREAKING ON DRUDGE: RUSSIANS HACK WHITE HOUSE; STEAL INFO ON OBAMA SCHED

    04/07/2015 2:23:51 PM PDT · by CivilWarBrewing · 297 replies
    http://www.drudgereport.com/ ^ | April 07, 2015 | DRUDGE
    Russian hackers who got into the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, U.S. officials say.
  • Hacker Group Anonymous Threatens Israel With ‘Electronic Holocaust’

    03/30/2015 12:22:15 PM PDT · by Slings and Arrows · 102 replies
    Newsweek ^ | 3/30/15 | Jack Moore
    Cyber activist group Anonymous has released an internet video which threatens Israel with an “electronic Holocaust” on April 7, in a massive cyber attack planned to fall just over a week before Holocaust Remembrance Day on April 16, known in Israel as Yom HaShoah. The video shows a masked figure in a suit and tie delivering a prepared statement, warning that the group will eradicate Israel from cyberspace “for... crimes in the Palestinian territories”. “We will erase you from cyberspace in our electronic Holocaust,” says the video’s masked figure. "As we did many times, we will take down your servers,...
  • Leaked: Bin Laden not buried at sea, body moved on CIA plane to US...

    02/11/2013 11:24:55 PM PST · by My Favorite Headache · 107 replies
    Wikileaks ^ | 2/12/13
    The body of Al-Qaeda leader Osama Bin Laden was not buried at sea, according to leaked emails of intelligence firm Stratfor, as revealed by WikiLeaks. Stratfor’s vice-president for intelligence, Fred Burton, believes the body was “bound for Dover, [Delaware] on [a] CIA plane” and then “onward to the Armed Forces Institute of Pathology in Bethesda [Maryland],” an email says. The official version is that the body of Al-Qaeda’s top man, who was killed by a US raid in Pakistan on May 2, 2011, was buried at an undisclosed location at sea in a proper Muslim ceremony. "If body dumped at...
  • Judicial Watch Sues for Hillary and Huma’s Egypt Emails

    03/04/2015 5:32:38 PM PST · by bryan999 · 47 replies
    (Washington, DC) – Judicial Watch announced today that it has filed a Freedom of Information Act (FOIA) lawsuit against the State Department seeking any and all communications – including emails – from then-Secretary of State Hillary Clinton and her Chief of Staff Huma Abedin with Nagla Mahmoud, wife of ousted Egyptian president Mohammad Morsi, from January 21, 2009 to January 31, 2013 (Judicial Watch v. U.S. Department of State (No. 1:15-cv-00321)). This latest lawsuit will require the State Department to answer questions about and conduct thorough searches of Hillary Clinton’s newly discovered hidden email accounts. Judicial Watch also has nearly...
  • Three men charged with hacking one BILLION emails in data breach described as one of the largest in

    03/07/2015 12:50:50 PM PST · by Talisker · 6 replies
    Daily Mail/Reuters ^ | 6 March 2015 | REUTERS REPORTER
    Two Vietnamese citizens and a Canadian have been charged over roles in hacking email service providers in the United States in one of the largest reported data breaches in the nation's history, the Department of Justice said on Friday.
  • 'ISIS Hackers' Almost Certainly Not ISIS Hackers

    03/09/2015 8:42:54 PM PDT · by nickcarraway · 2 replies
    NBC News ^ | M. ALEX JOHNSON
    The hacking of dozens of websites worldwide by someone purporting to be connected to the ISIS terror group — including a Montana credit union, an Irish rape crisis center and a local Italian political party — almost certainly has nothing to do with the Islamist militants, law enforcement and security experts said Monday. The FBI and the Royal Canadian Mounted Police said they are investigating the hacks, which placed a picture of the black ISIS flag and the words "hacked by ISIS, we are everywhere" at the top of the targets' homepages and invoked a Flash audio plugin playing a...
  • Reporter Grills State Dept: Why Have Russian Hackers Seen More Emails Than American Public?[Video]

    03/09/2015 6:36:47 PM PDT · by nickcarraway · 18 replies
    Daily Caller ^ | Alex Griswold
    Associated Press reporter Matthew Lee grilled State Department spokeswoman Jen Spaki during Monday’s press briefing, asking why Russian hackers had more access to State Department records than the American public and Congress. Lee began by asking about former Secretary of State Hillary Clinton’s private email security. “On the issue on the security of the actual server, do you have any reason to believe it was compromised at all?” (RELATED: Hacker Claims Hillary Clinton Created MULTIPLE Private Email Accounts) “We don’t have any reason to believe that,” Psaki responded. “Obviously, her email wasn’t hacked, as there were some reports that previously...
  • Hacked Emails Indicate that Hillary Clinton Used a Domain Registered the Day of her Senate hearings

    03/02/2015 7:24:07 PM PST · by kristinn · 26 replies
    The Washington Post ^ | Monday, March 2, 2015 | Philip Bump
    Hacked emails indicate that Hillary Clinton used a domain registered the day of her Senate hearingsSNIPIn March 2013, an adviser to Clinton, Sidney Blumenthal, had his email hacked by "Guccifer" -- the Romanian hacker perhaps best known for revealing George W. Bush's paintings to the world. At the time, Gawker reported that Blumenthal was communicating with an account that appeared to belong to Clinton at the "clintonemail.com" domain. The content of some of those emails was published by RT.com. Examining the registry information for "clintonemail.com" reveals that the domain was first created on January 13, 2009 -- one week before...
  • Matt DeHart's quest for asylum is over: Canada delivers alleged hacker to U.S. agents

    03/01/2015 5:03:58 PM PST · by rickmichaels · 5 replies
    National Post ^ | March 1, 2015 | Adrian Humphreys
    Matt DeHart, a former American soldier who sought asylum in Canada claiming torture by U.S. agents probing Anonymous hackers and WikiLeaks, was taken from his Ontario prison cell Sunday morning and delivered to U.S. agents at the border. Mr. DeHart, 30, was allowed to make a quick phone call en route to his parents, who are living in Toronto facing their own removal order, said his father, Paul. “He was peaceful and in good health,” Paul DeHart said in an interview but the family remains deeply worried. “We are concerned about Matt’s safety as he transits,” he said. “We said...
  • Lenovo website breached, hacker group Lizard Squad claims responsibility

    02/25/2015 9:28:45 PM PST · by Citizen Zed · 10 replies
    fortune.com / Reuters ^ | 2-25-2015 | Bobby Yip
    Chinese computer and smartphone firm Lenovo Group said its website was hacked on Wednesday, its second security blemish days after the U.S. government advised consumers to remove software called “Superfish” pre-installed on its laptops. Hacking group Lizard Squad claimed credit for the attacks on microblogging service Twitter. Lenovo said attackers breached the domain name system associated with Lenovo and redirected visitors to lenovo.com to another address, while also intercepting internal company emails. Lizard Squad posted an email exchange between Lenovo employees discussing Superfish. The software was at the centre of public uproar in the United States last week when security...
  • HACKED HARDWARE COULD CAUSE THE NEXT BIG SECURITY BREACH

    02/24/2015 5:08:22 AM PST · by Not gonna take it anymore · 4 replies
    Popular Science ^ | February 17, 2015 | By P.W. Singer
    Sinister Circuit Board Peter Shanks via Flickr CC By 2.0 In late summer of 2006, the Japanese division of McDonald’s decided to run a new promotion. When customers ordered a Coca-Cola soft drink, they would receive a cup with a code. If they entered that code on a designated website and were among 10,000 lucky winners, they would receive an MP3 player pre-loaded with 10 songs. Cleverly constructed, the promotion seemed destined for success. Who doesn’t like a Coke and a free MP3 player? But there was one problem the marketers at McDonald’s could not anticipate: In addition to 10...
  • Bank Hackers Steal Millions via Malware

    02/14/2015 3:03:20 PM PST · by dynachrome · 14 replies
    New York Times ^ | 2-14-15 | DAVID E. SANGER and NICOLE PERLROTH
    In a report to be published on Monday, and provided in advance to The New York Times, Kaspersky Lab says that the scope of this attack on more than 100 banks and other financial institutions in 30 nations could make it one of the largest bank thefts ever — and one conducted without the usual signs of robbery. The Moscow-based firm says that because of nondisclosure agreements with the banks that were hit, it cannot name them. Officials at the White House and the F.B.I. have been briefed on the findings, but say that it will take time to confirm...
  • Aliens, Robots, Cheetahs, Oh My! Watch These “Face Hackers” Use Projectors To Modify Their Faces

    01/18/2015 11:14:13 PM PST · by LibWhacker · 2 replies
    TechCrunch ^ | 1/18/15 | Greg Kumparak
    Happy Sunday! Ready to have your mind blown?By mixing ultra-bright projectors and advanced facial tracking with some damned fine visual design, these guys are able to use their faces as a canvas some truly wild work. ==>>>Watch on as they morph from human, to alien, to cheetah, to robot overlord on the fly.<<<==So how does it work? To oversimplify it: an array of cameras tracks the dots on their faces, akin to the way Hollywood motion capture systems work. They then take some truly amazing texture/animation work and digitally morph it around a model of each guy’s face — essentially...
  • Islamic State Hacks CENTCOM Twitter Feed as Obama Talks Cybersecurity

    01/12/2015 10:12:36 AM PST · by maggief · 28 replies
    Free Beacon ^ | January 12, 2015 | Lachlan Markay
    As President Barack Obama addressed the nation regarding national cyber security efforts, hackers claiming to represent the Islamic State (IS) took over the Twitter account of the Pentagon division in charge of the Middle East. Hackers with the Islamic State, also known as ISIS or ISIL, posted links on U.S. Central Command’s official Twitter page to what it claimed was “confidential data from your mobile devices.” “ISIS is already here, we are in your PCs, in each military base. With Allah’s permission we are in CENTCOM now,” said one tweet sent from CENTCOM’s account.
  • (Sharyl) Attkisson sues DoJ for hacking her computers

    01/05/2015 11:38:27 AM PST · by maggief · 43 replies
    Hot Air ^ | January 5, 2015 | Ed Morrissey
    Did the Obama administration put a journalist under surveillance for reporting critically on its activities? Former CBS reporter Sharyl Attkisson says yes — and she wants $35 million in damages from the Department of Justice for it. Attkisson filed a series of legal motions today that claim the DoJ hacked into her computer and attacked her professionally: In a series of legal filings that seek $35 million in damages, Attkisson alleges that three separate computer forensic exams showed that hackers used sophisticated methods to surreptitiously monitor her work between 2011 and 2013. … In the lawsuit and related claims against...
  • North Korea says new U.S. sanctions for Sony hack will only 'harden its will'

    01/04/2015 6:17:33 PM PST · by Libloather · 7 replies
    LA Times via MSN ^ | 1/04/15 | Julie Makinen
    BEIJING — North Korea on Sunday denounced new economic sanctions imposed by President Barack Obama in response to a cyberattack on Sony Pictures Entertainment that U.S. officials have blamed on the regime. The country's official news agency quoted an unnamed Foreign Ministry spokesman as saying the new sanctions would only "harden its will and resolution to defend ... the dignity of the nation." The new penalties —which cut off access to the U.S. financial sector for 10 individuals and three government entities identified as key operatives engaged in hostile behavior, including the country's intelligence agency — add to sanctions imposed...
  • The Internet of Things: Can a hacker stop your car or your heart?

    01/03/2015 6:17:28 PM PST · by SeekAndFind · 19 replies
    The Week ^ | 01/03/2015 | By Temitope Oluwafemi, The Conversation US
    The risk is relatively low right now. But we must improve the security of future devices. We're living at the dawn of the age of the Internet of Things. Appliances ranging from light switches and door locks to cars and medical devices now boast internet connectivity. The convenience can't be beat. But what are the security and privacy implications? Is a patient implanted with a remotely controllable pacemaker at risk for security compromise? Vice President Dick Cheney's doctors worried enough about an assassination attempt via implant that they disabled his defibrillator's wireless capability. Should we expect capital crimes via hacked...
  • iCloud accounts at risk after hacker releases tool allowing access to any login

    01/02/2015 8:37:14 PM PST · by Swordmaker · 40 replies
    MacDailyNews ^ | Friday 02 January 2015
    “All iCloud accounts could be vulnerable to hacking by a new tool that claims it can break into any user’s login,” Andrew Griffin reports for The Independent. “The tool claims to use an exploit to get through Apple’s security.” “It uses a ‘dictionary attack’ to get into accounts — a hack that involves automatically trying a number of passwords until the right one is found. Sites usually have locks in place to stop such an attack, by only allowing a certain number of tries of one password, but the tool claims to be able to bypass those,” Griffin reports. “A...
  • The Year of the Breach: 10 Federal Agency Data Breaches in 2014

    01/01/2015 7:02:13 AM PST · by Libloather · 4 replies
    Nextgov ^ | 12/30/14 | Jack Moore, Nextgov Staff
    **SNIP** Over the past few years, the number of security incidents at federal agencies involving the potential exposure of personal information has skyrocketed -- from about 10,400 in 2009 to more than 25,500 in 2013, according to the Government Accountability Office. There’s no data yet this year on the total number of breaches at agencies in 2014. But with the year almost in the rearview mirror, Nextgov takes a look back at the 10 most impactful, high-profile or otherwise eyebrow-raising federal agency breaches. 1. White House Hacked The Obama administration has made cybersecurity a key priority, so it must have...
  • New evidence Sony hack was ‘inside’ job, not North Korea

    12/31/2014 3:22:50 AM PST · by Las Vegas Dave · 25 replies
    nypost.com ^ | 12/30/2014 | Post Staff Report
    US cybersecurity experts say they have solid evidence that a former employee helped hack Sony Pictures Entertainment’s computer system — and that it was not masterminded by North Korean cyberterrorists. One leading cybersecurity firm, Norse Corp., said Monday it has narrowed its list of suspects to a group of six people — including at least one Sony veteran with the necessary technical background to carry out the attack, according to reports. The investigation of the Sony hacking by the private companies stands in stark contrast to the finding of the FBI, which said Dec. 19 its probe traced the hacking...
  • Merry Christmas, from hackers: PlayStation Network and Xbox Live both attacked

    12/25/2014 2:45:44 PM PST · by MeshugeMikey · 11 replies
    bgr.com ^ | December 25, 2014 | Chris Smith
    A hacker group known as “Lizard Squad” has claimed responsibility for attacks targeting both Microsoft’s Xbox Live and Sony’s PlayStation Network (PSN) on Wednesday evening. FROM EARLIER: The iPhone 6 might be low-res, but Apple’s highest-resolution device ever is coming soon Microsoft’s Xbox Live went down for Xbox 360 users in the afternoon of December 24th, with the company’s status page for the service showing that Xbox Live core services were “limited.” The hacker team posted various messages on Twitter, confirming that it took down Xbox Live on Christmas Eve.
  • Facebook blocks Russian page supporting Navalny, Putin's biggest critic

    12/21/2014 5:24:38 AM PST · by elhombrelibre · 18 replies
    Washington Post ^ | 20 Dec 14 | Michael Birnbaum
    MOSCOW — In a sign of new limits on Facebook’s ability to serve as a platform for political opposition movements, Russian users appear to have been blocked from accessing a page calling for a protest in support of a prominent dissident. In 2011, Facebook was hailed by opposition movements during the Arab Spring and in Russia as a powerful new tool to spread information beyond the control of repressive governments. That may no longer be the case, at least not in Russia. Russian Internet regulators said Saturday that they had sent Facebook a “demand” that it block access to a...
  • Cyberattack on German Iron Plant Causes ‘Widespread Damage’: Report

    12/20/2014 11:49:41 AM PST · by Ray76 · 16 replies
    WSJ ^ | Dec 18, 2014 | Rachael King
    A German federal agency has acknowledged in a report Wednesday that a cyberattack caused physical damage to an iron plant in the country. It was a rare admission by a government tying a cyber action to actual physical destruction. The attackers gained access to an unnamed plant’s office network through a targeted malicious email and were ultimately able to cross over into the production network. The plant’s control systems were breached which “resulted in an incident where a furnace could not be shut down in the regular way and the furnace was in an undefined condition which resulted in massive...
  • North Korea Says They Want To Help Find The Sony Hackers

    12/20/2014 9:20:05 AM PST · by blam · 38 replies
    BI - Reuters ^ | 12-20-2014 | Hunter Walker
    Hunter Walker December 20, 2014A North Korean official said on Saturday that the secretive regime wants to mount a joint investigation with the United States to identify who was behind the cyber attack against Sony Pictures. An unnamed spokesman of the North Korean foreign ministry was quoted by the country's state news agency, KCNA, describing US claims they were behind the hack as "slander." "As the United States is spreading groundless allegations and slandering us, we propose a joint investigation with it into this incident," the official said, according to Agence France-Presse. After they began publishing leaked Sony movies, internal...
  • Sony ignored security evaluation before GOP [Guardians of Peace] hack, more data coming

    12/20/2014 1:18:13 AM PST · by Spktyr · 43 replies
    Electronista ^ | Sun December 14, 2014 | Electronista Staff
    'Christmas dump' incoming with more 'interesting' Sony Pictures data Months before the hacker intrusion on Sony Pictures' network, analyst firm PricewaterhouseCoopers (PWC) performed an analysis on the company's security, and found it lacking. More than 100 devices were found to be unmonitored by corporate security following an incomplete transition from a private security firm to an in-house team. As a result, any Sony response to network intrusion would be, in the words of the auditors, "slow, fragmented, and incomplete, if it would even happen at all." However, corrective actions proposed by PWC seemingly went undone, which left the doors to...
  • When There Is No Price to be Paid the Hackers Win

    12/19/2014 12:55:45 PM PST · by Ooh-Ah · 8 replies
    Technology and Security New Technologies ^ | Dec 18 2014 | Stephen Bryen
    If there is one salient fact that emerges from the now infamous Sony hack it is that the bad guys won.  The bad guys won because there they paid no price for the damage inflicted.  In the Sony case the hackers are outside and beyond the law, so their backers and sponsors are encouraged to cause even more damage in future. To stop cyber attacks, particularly those sponsored by foreign governments, we need to respond to attacks now. Sony is a movie company, a major cog in the entertainment industry.  Whether Sony rises or falls has little or nothing to...
  • Journalist: First Amendment Rights Mean Not Offending The North Korean Dictator, Okay?

    12/19/2014 11:30:47 AM PST · by 2ndDivisionVet · 18 replies
    Townhall ^ | December 19, 2014 | Katie Pavlich
    Did you know that having First Amendment rights in the United States comes with the responsibility not to offend dictators from North Korea? Had no idea? Me either. Last night on CNN "journalist" Sharon Waxman, who has worked at a number of media outlets including the Washington Post, argued that having First Amendment rights means we shouldn't be making fun of North Korean dictators because they might get upset. She was of course referring to the recent and massive hack on Sony pictures by North Korea as retaliation for "The Interview," a comedy about assassinating Kim Jong-Un. "I also want...
  • George Clooney: No one in Hollywood would sign my letter of support for Sony Pictures

    12/19/2014 10:03:47 AM PST · by SeekAndFind · 9 replies
    Hotair ^ | 12/19 | AllahPundit
    I’m glad he spoke up, not only because he’s right, not only because a little public shaming from an A-lister might get others to rethink, but because that tribute to Hollywood’s bravery that he gave a few years ago at the Oscars would have looked even more embarrassing in hindsight if he’d kept quiet about this.Nothing fancy about the logic of his petition: “We know that to give in to these criminals now will open the door for any group that would threaten freedom of expression, privacy and personal liberty. We hope these hackers are brought to justice but...
  • New message from Hackers to Sony: We'll stand down if you never release the movie

    12/19/2014 9:56:56 AM PST · by SeekAndFind · 49 replies
    CNN Money ^ | 12/19/2014 | Brian Stelter
    The hackers behind a devastating cyberattack at Sony Pictures have sent a new message to executives at the company, crediting them for a "very wise" decision to cancel the Christmas day release of "The Interview," a source close to the company told CNN. The email message was received by Sony's top executives on Thursday night and was obtained by CNN. The source said that the company believes the email was from the hackers because it followed a pattern of previous messages, sent to a list of particular executives and formatted in a particular way. A Sony spokesman declined to comment.
  • Obama's Bumbling, Stumbling America Loses its First Cyber War to a Hotel Room Full of Nork Kids

    12/18/2014 3:33:23 AM PST · by Reaganite Republican · 20 replies
    Reaganite Republican ^ | 18 December 2014 | Reaganite Republican
    As Newt Gingrich noted yesterday, the surrender by Sony Pictures to a shadowy group of North Korean hackers has set a chilling precedent... just wait 'til they grab hold of one of our nuclear plants(like the Israelis already did  to Iran)... BIG defeat for the US and Japan here, and a terrifying incident, to be sure (that's why they call it 'terrorism')- so now this little tinpot-nothing-of-a-country has substantial unchecked power/influence right inside the United States of America? Can you imagine Ronald Reagan/Cap Weinberger letting this go down without KJU being made to seriously regret it? Of course, Obama...
  • The US Is Ready To Blame North Korea For The Sony Hack

    12/17/2014 7:19:48 PM PST · by blam · 24 replies
    BI ^ | 12-17-2014 | Matt Johnston
    Matt Johnston December 17, 2014The US government is planning to announce Thursday that North Korea is directly to blame for the devastating and unprecedented attack on Sony, according to multiple reports. Now we wait and see how the US Government may respond to that attack now that they've placed their blame. That threat is likely retaliation for the controversial comedy "The Interview," which depicts the assassination of North Korea's leader, Kim Jong-un. US Investigators have been able to parse through enough evidence now to claim that North Korea is "centrally involved." On Tuesday, an online threat was posted against theaters...
  • Sony hackers threaten 9/11 attack on movie theaters that screen ‘The Interview’

    12/16/2014 11:39:33 AM PST · by servo1969 · 83 replies
    foxnews.com ^ | 12-16-2014 | Variety Staff
    In the most shocking development yet, the Sony attackers have threatened a 9/11-like attack on movie theaters that screen Seth Rogen and James Franco’s North Korean comedy “The Interview.” They also released the promised “Christmas gift” of files. The contents of the files are unknown but it’s called “Michael Lynton,” who is the CEO of Sony Pictures Entertainment. “The world will be full of fear,” the message reads. “Remember the 11th of September 2001. We recommend you to keep yourself distant from the places at that time. (If your house is nearby, you’d better leave.) Whatever comes in the coming...
  • Attack on Movie Theaters That Screen ‘The Interview’

    12/16/2014 11:23:36 AM PST · by bimboeruption · 30 replies
    Variety ^ | 12-16-2014 | Brent Lang
    The Sony hackers have threatened a 9/11-like attack on movie theaters that screen Seth Rogen and James Franco’s North Korean comedy “The Interview,” substantially escalating the stakes surrounding the release of the movie. The attackers also released the promised “Christmas gift” of files. The contents of the files are unknown but it’s called “Michael Lynton,” who is the CEO of Sony Pictures Entertainment. “The world will be full of fear,” the message reads. “Remember the 11th of September 2001. We recommend you to keep yourself distant from the places at that time. (If your house is nearby, you’d better leave.)...
  • In North Korea, hackers are a handpicked, pampered elite

    12/06/2014 1:04:29 PM PST · by 2ndDivisionVet · 13 replies
    Reuters ^ | December 5, 2014 | Ju-min Park and James Pearson
    (VIDEO-AT-LINK) SEOUL-Despite its poverty and isolation, North Korea has poured resources into a sophisticated cyber-warfare cell called Bureau 121, defectors from the secretive state said as Pyongyang came under the microscope for a crippling hack into computers at Sony Pictures Entertainment. A North Korean diplomat has denied Pyongyang was behind the attack that was launched last month but a U.S. national security source said it was a suspect. Defectors from the North have said Bureau 121, staffed by some of the most talented computer experts in the insular state, is part of the General Bureau of Reconnaissance, an elite spy...
  • Fort Lauderdale's website down for hours after threat from Anonymous hackers

    12/02/2014 4:13:30 AM PST · by SoFloFreeper · 4 replies
    Sun Sentinel ^ | 12/1/14 | Larry Barszewski
    ....the hacker group Anonymous made good on a threat to crash the city's website because of recent laws the city has passed regulating homeless behavior. Besides the city's website, fortlauderdale.gov, the police department website, flpd.org, also was affected, as was the city's email system.
  • FBI warns US businesses of 'destructive' malware

    12/01/2014 3:46:00 PM PST · by Dacula · 31 replies
    The FBI warned U.S. businesses that hackers have used malicious software to launch destructive attacks in the United States, following a devastating cyberattack last week at Sony Pictures Entertainment. The five-page, confidential "flash" warning issued to businesses late on Monday provided some technical details about the malicious software that was used in the attack, though it did not name the victim. An FBI spokesman declined comment when asked if the software had been used against the California-based unit of Sony Corp. The Sony attack resulted in five films being leaked online, including the updated version of "Annie." In the attack...
  • Network of Secret Chinese Military Attack US on Daily Basis: Costs trillions of $$, millions of jobs

    11/21/2014 11:25:09 AM PST · by 2ndDivisionVet · 11 replies
    Epoch Times ^ | November 21, 2014 | Joshua Philipp
    An army is attacking the United States. Its war is being waged without bullets or fanfare. Denied by its government, these soldiers operate in shadows and in silence. Yet, glimpses of their operations are seen on a daily basis—hackers and spies attacking and stealing from U.S. businesses and the U.S. government. Until now, a complete view of their operations and of the military department that gives them their orders remained hidden. Yet, China’s spy and cyberoperations all share one thing in common: they’re all orchestrated under the People’s Liberation Army General Staff Department (GSD), the Chinese military’s top-level department dedicated...
  • Anonymous seizes Ku Klux Klan Twitter account over Ferguson threats

    11/16/2014 10:11:19 PM PST · by 2ndDivisionVet · 16 replies
    ZDNet ^ | November 16, 2014 | Violet Blue for Zero Day
    Two Twitter accounts belonging to American racial segregation org Ku Klux Klan, @KuKluxKlanUSA and @YourKKKCentral, have been seized by Anonymous as part of the hacker-activist entity's new campaign, #OpKKK. At 6:31pm PST Anonymous said it has knocked the website belonging to "Traditionalist American Knights of the Ku Klux Klan" -- the group responsible for the Ferguson threats -- offline....
  • Rep. Wolf: Chinese Hackers ‘Literally Taking Whatever They Want’

    11/16/2014 9:49:33 PM PST · by Olog-hai · 12 replies
    Cybercast News Service ^ | November 14, 2014 - 11:40 AM | Barbara Hollingsworth
    Washington is not doing nearly enough to stop Chinese hackers who reportedly broke into the National Oceanic and Atmospheric Administration’s (NOAA) computer system in September from stealing critical information from U.S. government agencies and American businesses, says Rep. Frank Wolf (R-VA). “They have a more sophisticated spying apparatus than the KGB had,” Wolf told CNSNews.com. “We’re losing jobs, technology, everything is leaving. It’s like they’re coming in and literally taking whatever they want to take. And so sometimes you find out about it and sometimes you don’t, but there needs to be a coordinated effort [to stop them],” Wolf continued....