From The Blog

Displaying items by tag: Hacking

broken-lock

And…. There has been another breach of a “cloud” service. Well, sort of. Adobe’s connectusers.com forum was broken into on Monday. The hack was allegedly performed by Egyptian hacker ViruS_HimA. The Forum was shut down on Tuesday night in response to the attack. Although at this time Adobe is still claiming that nothing beyond the customer forum was breached there is always the potential that other services were affected by the attack. The culprit in this case turns out to be bad password protection.

Published in News
Thursday, 25 October 2012 19:56

PIN thievery at Barnes and Noble POS terminals

barnesandnoble

63 largest U.S. Barnes & Noble bookstores are affected by serious safety problems. Criminals compromised Barnes & Noble POS (Point of Sale) devices and took data from credit and debit cards complete with PIN numbers for those debit cards. In each of the affected stores was found one compromised POS device. Barnes and Noble have more than 700 stores across the U.S. and more than 600 stores for students and professors so this problem is very serious.

Published in News
Wednesday, 24 October 2012 21:27

Top 25 worst passwords of 2012 announced

header-code

The company SplashData has released a list of the "most popular" Passwords of 2012, which listed the most commonly cracked passwords by hackers. The list is based on incidents related to hacking users of different web portals and services, including Yahoo, LinkedIn, eHarmony and Last.fm. In all cases, it was an incredibly simple (read stupid) password, which hackers could crack without any effort. The report points out that many users still do not pay too much attention to the security of their online sessions. According to experts, no matter how much effort is invested in the development of secure systems, encryption, cryptography and anti-hacking tools that are becoming increasingly complex, in the end it all falls apart if users supplied their account to hackers "on a platter" with a password that even little kids could reveal.

Published in News
anonymous

The whistle blowing site WikiLeaks has finally stepped over an imaginary line and annoyed Anonymous their one time protector. Although there has been rumblings in the community about the direction that WikiLeaks was heading in the collective was always ready to defend the site and by-proxy its owner Julian Assange. The straw that finally broke the relationship was the creation of a “paywall” that required you to donate or to share content from the site before allowing you to get to the rest of the site. The donations were not just intended to maintain the site either, but to support site owner Julian Assange and his mounting legal bills and living expenses. 

Published in News
news pirate-bay-logo

Gottfrid Svartholm has been detained for a tax hack over at a Swedish IT company Logica. Previous rumors ended up being true in this case and he was indeed accused of taking part in hacking Logica and leaking thousands of tax numbers. He was arrested in the Cambodian capital Phnom Penh. He was taken captive there and was extradited back to Sweden last Monday. According to laws, since his visa was expired, he could have chosen to stay in Cambodia if he wanted or go back, but authorities didn’t give him any choice.

Published in News
news pirate-bay-logo

After Gottfrid Svartholm was arrested last week in the Cambodian capital, Phnom Penh there were many rumors that it was due to his connection with The Pirate Bay. Apparently the arrest has nothing to do with his famous piracy history. He is being held at the interior ministry's counter terrorism department because of hacking a Swedish IT company and leaking thousands of tax records. At first very little was known about his arrest and all we got were speculations from lawyers. Now authorities have confirmed that Svartholm was behind this criminal act. In official statement by a Cambodian spokesman we found out that it has to do with cyber-crime “His arrest was made at the request of the Swedish government for a crime related to information technology,”

Published in News
Code

2012 is most certainly the year of the hack. So far in 2012 we have heard of more large scale security breaches related to allegedly secure companies and banks than in just about any previous year. What make this year very interesting is that it is also the year that many companies are joining the push for the “cloud”. Now the term “cloud computing” has been around for a very long time and derives from the symbol for the internet (which is a cloud if you did not guess) although many view it as a new technology it is not.

Published in News
broken-lock

It seems that while Microsoft was busy trying to turn your desktop into a phone they might have skimped on security a bit. According to some very interesting research Windows 8 has a flaw in it that allows for someone to gain access to the list of user password hints directly from the registry in unencrypted form. The flaw, which was found by the gang over at Spiderlabs is not a massive game changer, but it is troublesome and gives a potential attacker even more information to help him or her gain access to your system.

Published in News
anonymous

WikiLeaks was having a bad time of it about a week ago when the group AntiLeaks popped up on the scene seemingly out of nowhere and started hammering them and their mirrors with a massive DDoS (Distributed Denial of Service) attack. When the news hit that the site was under attack many jumped to the conclusion that it was a state sponsored attack. At least people did until AntiLeaks claimed responsibility through someone that uses the name Diet Pepsi. This led to a merry round of speculation about the group and who they really were. We covered this news from the angle of the technology involved and came up with a good case for the use or Torrent Blocking technology that has popped up on the scene.

Published in News
90

There is one thing about the hacking world that is a constant, everything changes. We have seen anti-anonymous and Anti-Wikileaks groups come and go from individuals like The Jester to others that claim they were once with Anonymous, but now have seen the error of their ways and are working for the good of the world. These groups all have one thing in common; they are rarely effective for long. This is not to say they do not have skill or talent. In some cases they are very talented. However their effects are rarely long term.

Published in News
Page 21 of 28