Free Republic 4th Quarter Fundraising Target: $85,000 Receipts & Pledges to-date: $66,563
78%  
Woo hoo!! And now less than $18.5k to go!! We can do this. Thank you all very much!!

Keyword: hackers

Brevity: Headers | « Text »
  • Anonymous seizes Ku Klux Klan Twitter account over Ferguson threats

    11/16/2014 10:11:19 PM PST · by 2ndDivisionVet · 16 replies
    ZDNet ^ | November 16, 2014 | Violet Blue for Zero Day
    Two Twitter accounts belonging to American racial segregation org Ku Klux Klan, @KuKluxKlanUSA and @YourKKKCentral, have been seized by Anonymous as part of the hacker-activist entity's new campaign, #OpKKK. At 6:31pm PST Anonymous said it has knocked the website belonging to "Traditionalist American Knights of the Ku Klux Klan" -- the group responsible for the Ferguson threats -- offline....
  • Rep. Wolf: Chinese Hackers ‘Literally Taking Whatever They Want’

    11/16/2014 9:49:33 PM PST · by Olog-hai · 12 replies
    Cybercast News Service ^ | November 14, 2014 - 11:40 AM | Barbara Hollingsworth
    Washington is not doing nearly enough to stop Chinese hackers who reportedly broke into the National Oceanic and Atmospheric Administration’s (NOAA) computer system in September from stealing critical information from U.S. government agencies and American businesses, says Rep. Frank Wolf (R-VA). “They have a more sophisticated spying apparatus than the KGB had,” Wolf told CNSNews.com. “We’re losing jobs, technology, everything is leaving. It’s like they’re coming in and literally taking whatever they want to take. And so sometimes you find out about it and sometimes you don’t, but there needs to be a coordinated effort [to stop them],” Wolf continued....
  • Chinese Espionage, Weapons Shift Asian Power Balance

    11/10/2014 10:09:13 AM PST · by raptor22 · 1 replies
    Investor's Business Daily ^ | November 10, 2014 | Investor's Business Daily
    Military Superiority: China's new Shenyang J-31 stealth fighter could be the equal of our F-22s and F-35s, U.S. pilots say, and is just one of the weapons that may thwart America's "pivot" to the Pacific. The J-31, a fifth-generation stealth fighter, will make its official debut at the Zhuhai International Air Show Nov. 11-16 in southern China's Guangdong province. As one U.S. pilot with F-35 experience told USNI News of the J-31 and other new Chinese fighters: "I think they'll eventually be on par with our fifth-gen jets — as they should be, because industrial espionage is alive and well."...
  • Home Depot blames security breach on Windows, executives given new MacBooks and iPhones

    11/09/2014 11:48:07 PM PST · by Swordmaker · 50 replies
    9 to 5 Mac ^ | November 9, 2014 | By JOE ROSSIGNOL
    Earlier this week, The Wall Street Journal published an in-depth look at The Home Depot’s recent security breach of its payment data systems, in which 56 million credit card accounts and 53 million email addresses of customers were compromised. A root cause of the security breach: a Windows vulnerability in the retailer’s main computer network. “Once inside Home Depot’s systems after gaining credentials from the outside vendor, the hackers were able to jump the barriers between a peripheral third-party vendor system and the company’s more secure main computer network by exploiting a vulnerability in Microsoft Corp.’s Windows operating system,...
  • 2nd Russian Hacker Group Accused of Targeting NATO

    10/28/2014 8:40:43 AM PDT · by WhiskeyX · 2 replies
    The Moscow Times ^ | Oct. 28 2014 14:56 | Matthew Bodner
    A U.S. security firm has claimed that a sophisticated, Russia-based hacker group is spying on NATO and former Soviet member states, most likely on the orders of the Russian government. In a report issued Tuesday, security firm FireEye said the group, which the firm dubbed APT28, has since 2007 conducted “long-standing, focused operations that indicate a government sponsor — specifically, a government based in Moscow.”
  • Chat logs reveal FBI informant Sabu’s role in hacking of Sun newspaper

    10/14/2014 12:29:26 PM PDT · by Rusty0604 · 1 replies
    The Guardian ^ | 10/14/2014 | James Ball
    US agency faces questions after records show Lulzsec leader Hector Monsegur, who was informant at time, helped attack that closed UK sites The FBI is facing questions over its role in a 2011 hacking attack on Rupert Murdoch’s Sun newspaper in the UK after the publication of chat logs showed that a man acting as an agency informant played a substantial role in the operation. chat records show Monsegur encouraging others to break further into News International systems, claiming to have sources at the Sun, and even apparently helping to break staff’s passwords and to source files for stealing. Monsegur...
  • Critical USB hack goes public; how bad is the risk?

    10/05/2014 8:51:31 PM PDT · by TChad · 16 replies
    The Atlanta Journal-Constitution ^ | 10/4/2014 | Matt Picht
    Because we just don't already have enough tech security problems to worry about, computer science researchers have just published a potentially catastrophic security exploit.
  • Hackers’ Attack Cracked 10 Financial Firms in Major Assault - Drudge 'RUSSIANS HACK JPM'

    10/04/2014 12:00:37 AM PDT · by free_life · 53 replies
    NYTimes ^ | Oct 3, 2014 | MATTHEW GOLDSTEIN, NICOLE PERLROTH and DAVID E. SANGER
    The hackers are thought to be operating from Russia and appear to have at least loose connections with officials of the Russian government, the people briefed on the matter said. Some American officials speculate that the breach was intended to send a message to Wall Street and the United States about the vulnerability of the digital network of one of the world’s most important banking institutions. “It could be in retaliation for the sanctions” placed on Russia, one senior official briefed on the intelligence said. “But it could be mixed motives — to steal if they can, or to sell...
  • The Bash Bug Could be a “Joe Biden-sized” Problem – Part 1

    09/26/2014 12:01:55 PM PDT · by lifeofgrace · 11 replies
    Charting Course ^ | 8/26/14 | Steve Berman
    Unless you’re a real-life version of Sheldon Cooper, a computer security professional, or, like me, work in the online payment industry, you probably don’t keep up with the latest computer vulnerabilities.  A new one that’s hit the web news like a tsunami in the last 72 hours is simply called “the bash bug” (sometimes called “shellshock”).  Everyone from Time, to Vox*, to tech site C|Net has covered this story. I am not going to get technical here.  You can read any of the above-mentioned articles which provide plenty of detail on that.  To summarize the problem:  a 25-year-old program that’s...
  • Second apparent leak of hacked celebrity nude pictures: US media

    09/20/2014 6:19:14 PM PDT · by Perdogg · 28 replies
    More nude celebrity photos, purportedly including reality star Kim Kardashian, circulated social media Saturday, in what appeared to be the second massive hacking-related leak in less than a month, US media reported. The pictures, which also included nude shots of actress Vanessa Hudgens and US soccer star Hope Solo, appeared briefly on 4chan and Reddit, before being removed, celebrity gossip site TMZ reported.
  • This Site Says It Will Tell If Your Gmail Password Was Hacked [But is it legit?]

    09/11/2014 9:18:25 AM PDT · by SeekAndFind · 16 replies
    Business Insider ^ | 09/11/2014 | Julie Bort
    As you may have heard, Russian hackers have published the passwords for roughly five million Gmail accounts. This follows the publication of millions of passwords for two of Russia's largest email services, Yandex and Mail.Ru.Chances are, your account is not one of the hacked Gmail accounts, because that figure of five million represents only a fraction of the number of Gmail accounts that are active in the world. For instance, the Gmail app has been downloaded one billion times to Android devices. Even back in 2012, Gmail had 350 million users.But a group of programmers have decided to help you check...
  • Google Says Not To Worry About 5 Million 'Gmail Passwords' Leaked

    09/11/2014 8:39:02 AM PDT · by Enlightened1 · 8 replies
    Forbes ^ | 09/10/14 | Kashmir Hill
    This week, a list of nearly five million Gmail addresses paired with passwords appeared online, posted in a Russian Bitcoin security forum. Some people who checked the list and found their Gmail addresses there reported that it contained an old password for them, and often a password that they had reused on multiple sites. There’s speculation that the addresses may hay been stolen from other sites where people used their Gmail address as a log-in
  • Home Depot (HD) Hack Could Be Biggest Card Breach Ever

    09/10/2014 6:39:06 AM PDT · by KeyLargo · 31 replies
    ABC News ^ | Sep 9, 2014 | Richard Davies
    By Richard Davies @daviesnow Sep 9, 2014 9:03am Home Depot (HD) Hack Could Be Biggest Card Breach Ever Morning Money Memo: The huge hacking attack against Home Depot’s payment systems could turn out to be the biggest breach of any retailer’s data so far. The company confirmed the data break-in but did not say how many credit and data cards are affected. The total could be as much as 60 million, according to several experts. That would be far more than the total number of cardholders impacted by the breach at Target stores. There is no evidence that any debit...
  • Islamic Hackers Attack Actor Kirk Cameron’s Movie Website

    09/08/2014 8:01:44 AM PDT · by Blue Turtle · 6 replies
    The website for actor Kirk Cameron’s upcoming movie “Saving Christmas” was infiltrated by Islamic hackers, the film’s production team said. Sony’s Provident Films alerted producers over the weekend that SavingChristmas.com was taken over by a message from Ayyildiz Tim International Force, a hacker group described as anti-Christian, anti-Israel and anti-American. A member of the production team told TheBlaze Sunday that the attack was “fairly sophisticated” but that they were able to quickly remove the group’s message from the website.
  • Amazon's Cloud Is So Pervasive, Even Apple Uses It

    09/02/2014 12:26:51 AM PDT · by Citizen Zed · 16 replies
    read write ^ | 8-26-2014 | DAVID HAMILTON
    Apple's iCloud storage service and other parts of Apple, along with operations at several large banks, run inside A.W.S. (Amazon Web Services), say people familiar with the service who spoke on the condition they not be named so they could sustain relations with the powerful cloud company. But Apple is usually obsessed with micromanaging every aspect of its technology and services. So some of its users might be surprised to learn that they're storing their backups and other personal data not on Apple servers, but on ones rented from Amazon. It's not totally clear that anyone should care about that, but...
  • Apple Just Patched A Security Flaw In iCloud

    09/01/2014 8:12:52 AM PDT · by ConservativeMind · 71 replies
    Business Insider ^ | September 1, 2014 | James Cook
    Engadget reports that Apple has fixed a major bug in its Find My iPhone software that allowed hackers to gain access to iCloud accounts. The fix comes just hours after a hacker leaked hundreds of nude celebrity photos on 4chan in return for Bitcoin donations. Apple's Find My iPhone login page was discovered to have been vulnerable to so-called "brute force" hacks. Hackers are usually locked out of sites if they try to gain access using multiple passwords, but it was discovered that the Find My iPhone API allows users to repeatedly try different passwords. Security researcher Alexey Troshichev revealed...
  • Did iCloud's 'Find My iPhone' function help hacker steal 'nude' photos of Jennifer Lawrence

    09/01/2014 7:43:39 AM PDT · by Mad Dawgg · 45 replies
    DailyMail.com ^ | 1 September 2014 | Paul Chavez and Zoe Szathmary and Sophie Jane Evans
    A flaw in the 'Find My iPhone' function of Apple's iCloud service may have helped a hacker to steal nude photos of Jennifer Lawrence and '100 other celebrities', it today emerged. The hacker claims he or she broke into stars' iCloud accounts, including those of the Hunger Games actress, Kate Upton and Rihanna, before publishing them on 4chan, the image-sharing forum. A list of the alleged victims of the hack - 101 in total - has also been posted online; most of whom have not seen any photographs leaked by the hacker. A spokesman for Oscar winner Lawrence confirmed to...
  • Nude Photos Leak In Massive iCloud Hack (Please delete your iCloud backups for now)

    08/31/2014 5:34:30 PM PDT · by ConservativeMind · 136 replies
    Small Business Yahoo ^ | Sept 1, 2014 | Caroline Moss
    Full Title: Nude Photos Of Jennifer Lawrence, Kate Upton, Ariana Grande Leak In Massive iCloud Hack Jennifer Lawrence, Ariana Grande, and Kate Upton were among a handful of celebrities whose nude photos were leaked late Sunday afternoon following what appears to be a large-scale hack. The photos first appeared on a 4Chan thread (very NSFW). So far, only Lawrence’s publicist Bryna Rifkin has confirmed, in an official statement to Buzzfeed, that the photos were of her client... ...The leaked photos were apparently obtained via a massive hack of Apple’s iCloud. They were then posted on 4chan by users offering more...
  • Urgent: Checking and savings account information stolen from major banks

    08/27/2014 7:30:24 PM PDT · by TurboZamboni · 119 replies
    Kommando.com ^ | 8-27-14 | Kim Kommando
    Word has leaked that JPMorgan Chase and possibly four other banks have been hacked. Details are scarce at this point, but the FBI and other government agencies are involved in the investigation. The hack allegedly took place earlier in August and hackers have siphoned off huge amounts of sensitive data from Chase, including checking and savings account information. Even more concerning, sources say that the attack goes "far beyond the capabilities of ordinary hackers." Given the timing, some security experts are speculating it was the work of high-level Russian hackers. According to an inside source, there has been no increase...
  • US Companies Can't Protect Citizens? Chinese Hackers Steal 4.5 Million Patients Info

    08/20/2014 7:38:03 AM PDT · by SeekAndFind · 6 replies
    Christian Post ^ | 08/20/2014 | BY SAMUEL SMITH
    One of America's largest hospital chains is the latest to fall victim to a group of sophisticated Chinese hackers who compromised 4.5 million patients' data including social security numbers in April and June. The cyber attack is the largest ever reported by a U.S. health care company and should serve as a warning to get more private companies to take their cyber protection more seriously. "Many companies are instituting anti-malware controls to detect malware prior to infection," said Kroll Cyber Investigations Managing Director Timothy P. Ryan in an email interview with The Christian Post. "Other companies are incorporating more robust...
  • Apple begins storing users' personal data on servers in China

    08/16/2014 7:08:33 AM PDT · by Innovative · 60 replies
    Reuters ^ | Aug 16, 2014 | Gerry Shih and Paul Carsten
    Apple Inc (AAPL.O) has begun keeping the personal data of some Chinese users on servers in mainland China, marking the first time the tech giant is storing user data on Chinese soil. The storage of user data in China represents a departure from the policies of some technology companies, notably Google Inc (GOOGL.O), which has long refused to build data centers in China due to censorship and privacy concerns. Apple said the move was part of an effort to improve the speed and reliability of its iCloud service, which lets users store pictures, e-mail and other data. Positioning data centers...
  • Hackers have the names and Social Security numbers of Ferguson police. But should they share them?

    08/14/2014 3:48:25 PM PDT · by 2ndDivisionVet · 38 replies
    The Washington Post's The Intersect ^ | August 14, 2014 | Caitlin Dewey
    A promotional image for Anonymous’s #OpFerguson.David, a.k.a. Pharoah, doesn’t hold a political office or opine for CNN. But this week, the 14-year-old hacker mounted what might have been one of the more personally damaging attacks against Ferguson, Mo.’s embattled police department: the name — and the address, and the Social Security number — of St. Louis County Police Chief Jon Belmar. That’s not all. Pharoah, a self-proclaimed member of the loosely affiliated hacker collective Anonymous, has also obtained the name and Social Security number of a Ferguson police officer he believes was involved in 18-year-old Michael Brown’s fatal shooting last...
  • 1.2 Billion Stolen User Names, Passwords Reportedly Collected By Russian Hackers

    08/06/2014 10:25:50 AM PDT · by Lorianne · 26 replies
    Consumerist ^ | 06 August 2014 | Chris Morran
    Through hacks of hundreds of thousands of websites, a Russian crime ring has reportedly gained access to 1.2 billion user name and password combinations, along with hundreds of millions of e-mail addresses. The NY Times reports on records turned up by Milwaukee-based Hold Security, which claims to have turned up evidence of this massive cache of data, stolen from some 420,000 different websites. “Hackers did not just target U.S. companies, they targeted any website they could get, ranging from Fortune 500 companies to very small websites,” Alex Holden, the founder and chief information security officer of Hold Security, tells the...
  • RUSSIAN FEDERATION:

    08/06/2014 6:02:12 AM PDT · by UMCRevMom@aol.com · 8 replies
    Fox News ^ | August 05, 2014 | James Rogers
    A Russian crime ring has got its hands on more than a billion stolen Internet credentials, according to a New York Times report. Citing records discovered by Hold Security, the New York Times reported on Tuesday that the stolen credentials include 1.2 billion password and username combinations and more than 500 million email addresses. Research specialist Hold Security, which has a strong track record of uncovering data breaches, says that the stolen data was gathered from 420,000 websites. Organizations affected range from household names to small Internet sites, it said. Last October Milwaukee-based Hold Security identified the disclosure of 153...
  • Russian cyber gang steals 1.2 billion usernames and passwords, 500 million email addresses: report

    08/05/2014 10:05:05 PM PDT · by BenLurkin · 10 replies
    nydailynews.com ^ | Tuesday, August 5, 2014, 8:34 PM | BY Sasha Goldstein
    Russian gang of computer hackers has gathered a staggering cache of some 1.2 billion stolen usernames and passwords, exposing vulnerability in some 400,000 websites targeted, according to a report Tuesday. The find by Hold Security, a Milwaukee-based firm, also included some 542 million email addresses culled by the crew of twentysomethings based in a small south central Russian city, the New York Times reported. “Hackers did not just target U.S. companies, they targeted any website they could get, ranging from Fortune 500 companies to very small websites,” Alex Holden, the founder and chief information security officer of Hold Security, told...
  • 'Green Technology' Making Power Grid More Vulnerable to Hackers

    07/02/2014 8:08:07 AM PDT · by rktman · 5 replies
    newsmax.com ^ | 7/2/2014 | unknown
    Making the electricity grid greener is boosting its vulnerability to computer hacking, increasing the risk that spies or criminals can cause blackouts. Adding wind farms, solar panels and smart meters to the power distribution system opens additional portals through which hackers can attack the grid, according to computer security experts advising governments and utilities. Where traditionally the grid took power from a few sources, it’s now absorbing it from thousands.
  • Breach: New Computer Virus Can Cripple Power Plants With the Click of a Mouse

    07/01/2014 4:03:45 PM PDT · by Kartographer · 40 replies
    SHTF Plan ^ | 7/1/14 | Mac Slavo
    Over 1,000 energy firms were infected with a sophisticated cyber weapon that gave hackers access to power plant control systems, it has been revealed. … The software allows operators to monitor energy consumption in real time – and to cripple physical systems such as wind turbines, gas pipelines and power plants at the click of a mouse. … ‘Among the targets of Dragonfly were energy grid operators, major electricity generation firms, petroleum pipeline operators, and energy industry industrial equipment providers,’ Symantec said. … ‘Dragonfly initially targeted defense and aviation companies in the US and Canada before shifting its focus mainly...
  • Bring Your Own Device–But Carefully!

    06/25/2014 8:59:36 AM PDT · by Oldpuppymax · 7 replies
    Coach is Right ^ | 6/25/14 | Michael D. Shaw
    For many people, the 2013 feature Terms And Conditions May Apply was their introduction into just how extensive and invasive data collection has become. It is all “voluntary,” of course, based on their agreement to software/app, website, and search engine terms and conditions. Even worse, is what the consumers of Big Data do with this information. Powerful computers and specialized programs allow virtually endless data dredging, whereby large volumes of information are analyzed seeking any possible relationships between data, occasionally for unethical purposes. Such practices can result in relatively benign consequences, such as seeing ads for various drugs and media...
  • Pro-Assad Syrian Hackers Take-Over Reuters Website, Post Anti-British-Press Message

    06/22/2014 9:31:37 AM PDT · by Reaganite Republican · 5 replies
    Reaganite Republican ^ | 22 June 2014 | Reaganite Republican
    Was just this morning checking the story on the South Korean soldier who went bezerk and shot five of his fellow troops yesterday, and upon arriving at the specific Reuters article page, was promptly diverted to the screen above.  The URL they sent me to was 'http://sea.sy/indexs/', and is obviously aimed at Nmr 10 Downing as well as the UK press in-general. No small task, hacking reuters, tho- rather impressive, and quite coincidentally comes the day after I was reading a piece about the original news report hacker, Chicago's version of Max Headroom. But the thing is, the crime...
  • Breaking news update! Iraqis shut down internet at U.S. Embassy in Baghdad

    06/15/2014 3:51:52 PM PDT · by Star Traveler · 325 replies
    The Examiner ^ | June 14, 2014 | Susy Raybon
    A three word text was released from inside the Embassy about six hours ago: “Too late Alamo.” That message is open to interpretation. Just minutes ago news came from within the United States Embassy in Baghdad that the Iraqis have shut down internet service for those barricaded inside. Limited text messages via private cell phones are still coming through. It is unknown how many of the more than 5,000 U.S. civilians in Baghdad are actually taking refuge inside the embassy compound. NBC war correspondent, Richard Engel reported last night that civilians in and around Baghdad have boarded up residences and...
  • I bet Ed Snowden could find the lost Lerner e-mails!

    06/17/2014 12:37:07 PM PDT · by 7thOF7th · 11 replies
    As an IT professional I am calling BS on the claim that Lerner's emails are lost. The BHO regime has choosen to gleem the cube on this one and it is going to bite them in the a$$! I think it is time Ed Snowden is asked to apply his skills and retrieve the files in question. I have no doubt he is the man for the job.
  • Flights Briefly Vanish From Austrian Air Traffic

    Austria's flight safety organization says flight data recently disappeared twice from air controller radar screens in several countries....
  • Feedly And Evernote Go Down As Attackers Demand Ransom

    06/12/2014 3:51:44 AM PDT · by PJ-Comix · 12 replies
    Forbes ^ | June 11, 2014 | Jay MacGregor
    Feedly is currently suffering a DDoS (distributed denial of service) attack, it announced earlier this morning on its blog. You may have noticed that you can’t access the website or load any of your feeds via the app. Feedly explained in a short message two hours ago that the DDoS perpetrator is holding Feedly to ransom and asking for money to stop the attack, Feedly has refused to comply.CEO of Feedly, Edwin Khodabakchian, said in a short statement: “Criminals are attacking feedly with a distributed denial of service attack (DDoS). The attacker is trying to extort us money to make...
  • Can the NSA really listen to your iPhone’s microphone even when it is turned OFF? Possibly (video)

    06/10/2014 10:25:59 PM PDT · by Swordmaker · 66 replies
    UK Daily Mail ^ | 9 June 2014 | By MARK PRIGG
    Can the NSA really listen to your iPhone’s microphone even when it is turned OFF? Experts say it is possible - but reveal the trick to beat it Technique known as an 'implant' (requires physical access—Swordmaker) Allows phone to appear switched off - but still operate some communications The NSA could technically listen in to the microphone of an iPhone even if it switched off, experts have revealed. The claim was first made by Edward Snowden during an interview with Brian Williams of NBC Nightly News. Today, experts confirmed the technique was technically possibly - and revealed a way to...
  • FBI struggles to find pot free hackers

    05/22/2014 12:10:19 AM PDT · by Olog-hai · 3 replies
    Daily Telegraph (UK) ^ | 6:15PM BST 21 May 2014 | Raf Sanchez
    The FBI is struggling to recruit bright young computer programmers because of their fondness for cannabis, according to the bureau’s director. Under current rules, the FBI cannot hire anyone who has smoked marijuana in the last three years—a policy that rules out many of the best recent graduates. “I have to hire a great work force to compete with those cyber criminals and some of those kids want to smoke weed on the way to the interview,” said James Comey, the FBI’s director. …
  • Symantec declares antivirus ‘dead’ as it focuses on damage control

    05/06/2014 11:58:44 PM PDT · by Olog-hai · 23 replies
    Engadget ^ | May 6, 2014 5:45:00 PM ET | John Fingas
    Given how hard antivirus software makers push you to sign up, you'd think that business was booming. Far from it, according to Symantec’s Brian Dye. He tells the Wall Street Journal that antivirus tools like his company’s Norton suite are effectively “dead.” The utilities now catch less than half of all attacks, according to the executive—to him, the focus is on minimizing the damage whenever there’s a successful hack or infection. …
  • Target’s Chairman and CEO out in wake of breach

    05/05/2014 8:43:56 AM PDT · by Olog-hai · 13 replies
    Associated Press ^ | May 5, 2014 10:46 AM EDT | Anne D’Innocenzio
    Target’s massive data breach has now cost the company's CEO his job. Target announced Monday that Chairman, President and CEO Gregg Steinhafel is out nearly five months after the retailer disclosed the breach, which has hurt its reputation among customers and has derailed its business. […] Steinhafel’s tenure has been tested with many challenges, from a weak economy to a proxy fight. The company, known for its cheap chic clothing and home decor, has seen uneven sales since the recession ended and has battled a perception that its prices aren’t as low as its rivals. …
  • Microsoft Security Bulletin Advance Notification for May 1, 2014

    05/01/2014 9:47:15 AM PDT · by VanShuyten · 19 replies
    Microsoft ^ | 5/1/2014 | Microsoft Security Tech Center
    This is an advance notification for one out-of-band security bulletin that Microsoft is intending to release on May 1, 2014. The bulletin addresses the security vulnerability in Internet Explorer described in Microsoft Security Advisory 2963983.
  • Israeli Hackers Strike Back at Anonymous OpIsrael, Expose Participants With Their Own Webcams

    04/10/2014 7:19:42 PM PDT · by Olog-hai · 45 replies
    The Algemeiner ^ | April 10, 2014 6:19 PM | Shiryn Ghermezian
    An Israeli hacker team published on Tuesday images and personal details of members of the Anonymous hacker collective who participated in the OpIsrael attack against Israeli sites earlier this week, Israel’s Channel 2 reported. Israeli Elite Force gained access to the computers of 16 Anonymous members and was able to capture screenshots and photos of the anti-Israel hackers with their own webcams. The Israeli team published the information in a Dropbox document via their Facebook page, saying, “Anonymous, next time do not mess with us.” The file includes the names of the attackers, their countries of origin, and usernames and...
  • The Target Breach & Why You Should Care (Hint: It’s Your Money)[Ever shopped at Target?]

    04/10/2014 2:19:20 AM PDT · by 2ndDivisionVet · 6 replies
    21CT blog ^ | January 29, 2014 | Scott Spinola
    Without personally knowing any cyber criminals (I think using hackers is unfair to… well, hackers), we can probably assume they are not very different from other criminals in that they do what they do for a few basic reasons: •Ego: defacing websites to gain street cred •Ideology: wreaking havoc to make political statements or wage asymmetric warfare •Money: engaging in good old-fashioned criminal capitalism (to the tune of $3 trillion) It’s this third motivation that is in the news the most, and it’s not because these criminals are infiltrating banks and making off with the loot. In fact it’s...
  • U.S. aims to give up control over Internet administration

    03/14/2014 2:45:36 PM PDT · by gooblah · 94 replies
    Washington Post ^ | Friday, March 14, 4:19 PM | By Craig Timberg,
    U.S. officials announced plans Friday to relinquish federal government control over the administration of the Internet, a move likely to please international critics but alarm many business leaders and others who rely on smooth functioning of the Web. Pressure to let go of the final vestiges of U.S. authority over the system of Web addresses and domain names that organize the Internet has been building for more than a decade and was supercharged by the backlash to revelations about National Security Agency surveillance last year.
  • World Cup Security Concerns Grow as Santos Fan is Beaten to Death...

    02/27/2014 12:08:48 AM PST · by Cindy · 11 replies
    DAILY MAIL [UK] ^ | February 25, 2014 | by Mike Dawes
    SNIPPET: "Security concerns ahead of this summer's Brazilian World Cup have increased after a football fan was beaten to death in host city Sao Paulo." SNIPPET: "There are serious concerns about the safety of travelling supporters at this summer's World Cup after more than 30 people were killed in 2013 as a result of football-related violence. One of Brazil’s biggest criminal gangs last year promised a ‘Tournament of Terror’. The threat was issued by Sau Paulo's 'First Capital of the Command', who in 2012 was a group behind the murder of more than a hundred of the city’s police officers."
  • Hacking x-ray machines could get guns through airport security

    02/12/2014 12:07:39 PM PST · by Olog-hai · 15 replies
    Daily Caller ^ | 5:35 PM 02/11/2014 | Giuseppe Macri
    Security researchers have discovered a potentially dangerous flaw in airport x-ray machines that would allow hackers to pass deadly weapons through security. Billy Rios and Terry McCorkle of security firm Qualys discovered that a training function called Threat Image Projection, which superimposes fake images of contraband on the screen to train security personnel, could be manipulated to work in reverse, and project images of weapon-free luggage over top of the real thing. The training software is present in all TSA scanners, and also on machines deployed in government buildings, embassies, courthouses, ports and border crossings. …
  • Olympics-Russian Rodnina blames hacking for Obama Twitter gaffe

    SOCHI, Russia, Feb 10 (Reuters) - Irina Rodnina, the figure skater who lit the Olympic flame at the Sochi Games, blamed hackers on Monday for a tweet about U.S. President Barack Obama that caused a racism row. Some Western media questioned the choice of Russia's triple Olympic champion Rodnina featuring in the climax of the Games opening ceremony on Friday. A tweet on her timeline last year showed a picture of Obama which was photoshopped to add a banana in the foreground. The image angered many including the outgoing U.S. ambassador to Russia, Michael McFaul, who called it "outrageous behaviour"....
  • All American Credit Cards Will Disappear In 2015 And Be Replaced With This New Tech

    02/08/2014 3:14:06 AM PST · by kingattax · 68 replies
    Yahoo Business Insider ^ | 2-7-14 | Jim Edwards
    These credit cards are dinosaurs. Every credit card in the U.S. will be replaced by October 2015 with new cards that contain the chip-and-PIN technology that the rest of the world has had for years, according to the Wall Street Journal. Both Visa and MasterCard are committed to the switch, which will render extinct the plastic in your wallets and purses right now. No more black magnetic stripes; no more signing on the dotted line. Americans who have traveled to Europe in recent years will know that the U.S.'s credit card system is embarrassingly old-fashioned by comparison. It's often difficult...
  • Sochi 2014 Winter Olympics Security Will Be Beefed Up...

    04/21/2013 4:11:43 PM PDT · by Cindy · 44 replies
    TELEGRAPH.co.uk ^ | 10:10AM BST 16 Apr 2013 | By Telegraph Sport, and agencies
    SNIPPET: "Sochi 2014 Winter Olympics security will be beefed up following Boston Marathon explosions, officials say Russian sports officials said they will beef up security at forthcoming sports events and the Sochi 2014 Winter Olympic Games in the wake of deadly explosions at Boston's marathon that killed three people, and injured over 140 others." "Sochi 2014 Winter Olympics security will be beefed up following Boston Marathon explosions, officials say" SNIPPET: "The World Athletics Championship takes place in Moscow on Aug 10-18, and the event is seen as a dress rehearsal for the 2014 Winter Games in the Black Sea resort...
  • ObamaCare's Potemkin Village Website Written In Belarus?

    02/05/2014 10:12:16 AM PST · by raptor22 · 21 replies
    Incestor's Business Daily ^ | February 5, 2014 | IBD EDITORIALS
    Debacle: U.S. intelligence agencies report that developers linked to the Belarus government helped create the Healthcare.gov website and may have inserted malicious code making it vulnerable to cyberattacks and hacking. The disastrous rollout of Healthcare.gov was bad enough. But as if Americans need another reason to avoid Healthcare.gov, we now hear that the Obama administration, through the Department of Health and Human Services, has indirectly contracted with developers in the worker's paradise of Belarus, a former Soviet republic still closely tied to Russia, to write some of the software code used for the website. The Washington Free Beacon's Bill Gertz...
  • Healthcare.gov Contractor (and Close Russian Ally) Belarus Built Malware RIGHT INTO Obamacare Code

    02/04/2014 3:28:29 AM PST · by Reaganite Republican · 26 replies
    Reaganite Republican ^ | 04 February 2014 | Reaganite Republican
    Remember when John McAfee warned us in November that anybody who signed up to the Obamacare site might have their bank account cleaned-out by hackers? The eccentric genius and former fugitive called the government website 'a hacker's wet dream', adding that there were 'NO safeguards' that would stop someone from starting a fake Obamacare website 'for a couple hundred dollars' that could 'empty your bank account' in hours.  McAfee added unambiguously that 'It's going to happen, and it's going to happen soon... nothing in the Obamacare system safeguards against this.'  And I thought he was just trying to sell...
  • In Target, hackers found a gold mine -- with easy access

    01/19/2014 10:35:43 AM PST · by TurboZamboni · 32 replies
    NYT/Pioneer Press ^ | 1-18-14 | Elizabeth A. Harris, Nicole Perlroth, Nathaniel Popper and Hilary Stout
    It was, in essence, a cybercriminal's dream. For months, an amorphous group of Eastern European hackers had been poking around the networks of major U.S. retailers, searching for loose portals that would take them deep into corporate systems. In early November, before the holiday shopping season began, the hackers found what they had been looking for -- a wide path into Target and beyond. Entering through a digital gateway, the criminals discovered that Target's systems were astonishingly open -- lacking the virtual walls and motion detectors found in secure networks like many banks'. Without those safeguards, the thieves moved swiftly...
  • World’s ATMs still running Windows XP—and wildly out of date

    01/17/2014 9:43:17 PM PST · by Olog-hai · 84 replies
    Fox News ^ | January 17, 2014
    Nearly all of the ATMs in the world are running the Windows XP operating system, introduced by Microsoft 13 years ago—and incredibly out of date, as any tech enthusiast will tell you. On April 8, Microsoft will officially end the tech support for the aging OS, which was replaced by Windows Vista in 2007, Windows 7 in 2009, Windows 8 in 2012 and Windows 8.1 in 2013. […] If an ATM isn’t upgraded, it will continue to function, experts said. Withdrawals, deposits, and other transactions will work as they did before. But the machines will be more vulnerable to cyber...