Keyword: hackers
-
SNIPPET: "One of the Chinese bloggers that I follow reported that Uyghur separatists have defaced a handful of Chinese .gov.cn sites. The hacker(s) are known as “Spy HackerZ” and their handy work can be found with a simple google search for “spy hackerz” site:gov.cn. There are eight results all from different local government sites. The Spy Hackerz use the defacements as opportunities to voice their opinion about perceived injustices. The sites’ admins have apparently been notified because the defacements are either removed or the sites are presently down. I grabbed this screenshot from the ‘iron circle’ blog:"
-
Last week, Twitter was vexed by a DDoS attack that took it offline for a few hours. In that case, Russian hackers were suspected. This week's DDoS attack, however, may have different origins -- and they could be related to the attacks that took out a few U.S. and South Korean government sites last Fourth of July, according to AVG's chief of research. The latest attack hit the site in waves. "We're currently experiencing another wave of Distributed Denial of Service (DDoS) attacks against our system," Alex Payne, platform lead at Twitter, wrote on the service's Web dev blog on...
-
A TSG investigation unmasks the leader of Pranknet and the miscreants behind a year-long wave of phone call criminality AUGUST 4--At 4:15 AM on a recent Tuesday, on a quiet, darkened street in Windsor, Ontario, a man was wrapping up another long day tormenting and terrorizing strangers on the telephone. Working from a sparsely furnished two-bedroom apartment in a ramshackle building a block from the Detroit River, the man, nicknamed "Dex", heads a network of so-called pranksters who have spent more than a year engaged in an orgy of criminal activity--vandalism, threats, harassment, impersonation, hacking, and other assorted felonies and...
-
http://forums.somethingawful.com/showthread.php?threadid=3179840 As some of you may have noticed, recently the Republican Party has begun cracking down on the "birthers", realizing that openly supporting the most crazy members of your party is, well, problematic for appealing to non-crazy people. This, of course, leads to even more crazy, as they turn on their leaders for hiding the "truth". It's a drat shame to let all this crazy go to waste, when properly cultivated and raised it could be so much more. So welcome to the first FreeRepublic Infiltration Contest! We're going to infiltrate freerepublic as agents provocateur. This can take several forms;...
-
Scofflaws could hack the smart cards that access electronic parking meters in large cities around the United States, researchers are finding. The smart cards pay for parking spots, and their programming could be easily changed to obtain unlimited free parking. It took researcher Joe Grand only three days to design an attack on the smart cards. The researchers examined the meters used in San Francisco, California, but the same and similar electronic meters are being installed in cities around the world. "It wasn't technically complicated and the fact that I can do it in three days means that other people...
-
Terrorists groups could soon use the internet to help set off a devastating nuclear attack, according to new research. The claims come in a study commissioned by the International Commission on Nuclear Non-proliferation and Disarmament (ICNND), which suggests that under the right circumstances, terrorists could break into computer systems and launch an attack on a nuclear state – triggering a catastrophic chain of events that would have a global impact.
-
* Mac expert shows how hackers can steal encrypted data * Demonstrates method at conference for security experts LAS VEGAS, July 29 (Reuters) - A Mac security expert has uncovered a technique that hackers could use to take control of Apple Inc (AAPL.O) computers and steal data that is scrambled to protect it from identity thieves. Prominent Mac researcher Dino Dai Zovi disclosed the software flaw at the Black Hat security conference in Las Vegas, one of the world's top forums for exchanging information on Internet threats. About 4,000 security professionals are in attendance, including some who are really hackers....
-
SNIPPET: "In theory at least, the Wild West days of Internet telecommunications are over. Based upon the inventions articulated in his five-patent suite, inventor Harry Emerson III, has mapped out a union between our secure and venerable telephone system - (Plain Old Telephone Service; a.k.a., POTS) - and the hyper-evolving, media-rich Internet which is so famously not one bit secure. As it evolves, he believes this next generation telecommunications system, dubbed IronPipe™, will have huge implications for national security as well as tremendous new revenue opportunities for the carriers and supply chains which serve them."
-
South Korea's state intelligence organization said Friday it has discovered that a wave of cyber attacks carried out earlier this week into key government and private websites in South Korea and the United States was launched from computers in 16 countries, Yonhap News Agency reported. The National Intelligence Service made the report to a closed-door meeting with members of a parliamentary intelligence committee, Yonhap quoted committee members as saying. North Korea was not among the 16 countries, which include South Korea, the United States, Japan, and Guatemala, Yonhap said. The cyber attacks have been traced to 86 Internet Protocol addresses...
-
The powerful attack that overwhelmed computers at U.S. and South Korean government agencies for days was even broader than initially realized, also targeting the White House, the Pentagon and the New York Stock Exchange. Other targets of the attack included the National Security Agency, Homeland Security Department, State Department, the Nasdaq stock market and The Washington Post, according to an early analysis of the malicious software used in the attacks. Many of the organizations appeared to successfully blunt the sustained computer assaults. The Associated Press obtained the target list from security experts analyzing the attacks. It was not immediately clear...
-
The flagship system designed to protect the U.S. government's computer networks from cyberspies is being stymied by technical limitations and privacy concerns, according to current and former national-security officials. The latest complete version of the system, known as Einstein, won't be fully installed for 18 months, according to current and former officials, seven years after it was first rolled out. This system doesn't protect networks from attack. It only raises the alarm after one has happened. A more capable version has sparked privacy alarms, which could delay its rollout. Since the National Security Agency acknowledged eavesdropping on phone and Internet...
-
PORTLAND, Ore. – Hackers defaced the home page of the Oregon University System, posting a caustic message telling President Barack Obama to mind his own business and stop talking about the disputed Iranian election. Attempts to access the university system's Web site were automatically redirected to another page, where readers viewed a message said to be from Iran that asserted there was no cheating in the election. That message was up for 90 minutes before university system technicians intervened Wednesday morning.
-
For 90 minutes this morning, hackers upset with President Obama’s vocal stance on the disputed Iranian election made their voice known. A message telling President Barack Obama to mind his own business and not to comment on Iran’s election was posted. A spokeswoman for the university, Diane Saunders, said hackers allegedly broke through the school’s computer defenses via a third-party software application that had not been properly updated. It afforded the hackers the ability to access the computer and address the president in the unflattering way: “Hey Stupid Fly Catcher Obama!”, according to the AP. Note: The phrase “Stupid Fly...
-
Neda Soltani’s Death Inspires New Site A hastily created Web site called NedaNet has formed in honor of a young woman, Neda Soltani, who was killed during a Tehran protest. The site’s founder, Eric S. Raymond, created the page to serve as a jumping-off point for hackers who want to help Iranian citizens. “Our mission is to help the Iranian people by setting up networks of proxy servers, anonymizers and any other appropriate technologies that can enable them to communicate and organize — a network beyond the censorship or control of the Iranian regime,” the site says. A video widely...
-
A recent computer intrusion that forced the FBI to shut down its computer network and disrupted FBI operations was traced to an e-mail containing malicious code that originated in China, according to FBI officials. The forced shutdown of the network affected one significant FBI operation -- the May 20 arrest of homegrown terrorism suspects in New York, said officials who spoke on condition of anonymity because they were not authorized to discuss the matter. "The Chinese shut down our network," said one FBI official familiar with assessments of the attack.
-
NEWARK, N.J.—An Indictment was unsealed today against three individuals who allegedly hacked into the telephone systems of large corporations and entities in the United States and abroad and sold information about the compromised telephone systems to Pakistani nationals residing in Italy, Acting U.S. Attorney Ralph J. Marra, Jr. announced. In conjunction with the unsealing of the Indictment, Italian law enforcement conducted searches of approximately 10 locations in four regions of Italy and arrested the financiers of the hacking activity. Those financiers allegedly used the information to transmit over 12 million minutes of telephone calls valued at more than $55 million...
-
An action by the US government is causing a flurry of not so complimentary comments across the internet. A group of 17 Uighur detainees who are on the road to release are being given laptops to train them for life outside Guantanamo. Army Lt. Col. Miguel Mendez oversees detainee classes, as well as the multilingual library and, now, the new virtual computer lab. “We’re getting them computer classes to prepare for their return.” Nury Turkel is a Uighur rights activist in Washington, D.C. He felt the computer training would “give hope to the men that their freedom is nearing” after...
-
May 13th, 2009 China's 'secure' OS Kylin - a threat to U.S offensive cyber capabilities? Posted by Dancho Danchev @ 6:23 am Categories: Browsers, Complex Attacks, Governments, Hackers, Kernel-level Exploits... Tags: China, Operating System, Operating Systems, Linux, Software... Picture a cyber warfare arms race where the participating countries have spent years of building offensive cyber warfare capabilities by exploiting the monoculture on one another’s IT infrastructure. Suddenly, one of the countries starts migrating to a hardened operating system of its own, and by integrating it on systems managing the critical infrastructure it successfully undermines the offensive cyber warfare capabilities developed...
-
Cyberwar is now a fact of life in 21st Century wars. Actual and potential enemies of America already know the dimensions of Cyberwar and have moved into full combat. With a real world combat engagement in Georgia and Estonia, the Russians have shown skill. Make no mistake; in certain arenas the Russians are smart and capable, and as the invasion of Georgia shows, ruthless. They have world class scientists and engineers. It is well known they are excellent Cyber Warfighters who have now also apparently harnessed their criminal hackers to augment their worldwide reach. This melding of Russian conventional military...
-
As a cyber space race looms, the military is looking for a few good geeks. High school hackers, crackers and digital deviants: Uncle Sam wants you. As part of a government information security review released as early as Friday, White House interim cybersecurity chief Melissa Hathaway likely will mention a new military-funded program aimed at leveraging an untapped resource: the U.S.' population of geeky high school and college students. The so-called Cyber Challenge, which will be officially announced later this month, will create three new national competitions for high school and college students intended to foster a young generation of...
|
|
|