category
Hacking

Whiter-than-white hats, malware, penalty and repentance*

I was recently contacted by a journalist researching a story about ‘hackers’ quitting the dark side (and virus writing in particular) for the bright(-er) side. He cited this set of examples – 7 Hackers Who Got Legit Jobs From Their Exploits – and also mentioned Mike Ellison (formerly known as Stormbringer and Black Wolf, among

China has “mountains of data” on U.S. cyber attacks, top official claims

A top internet security official in China has said that his organization has “mountains of data” on U.S. cyber attacks against the country. Huang Chengqing, the director of the National Computer Network Emergency Response Technical Team Coordination Center of China (CNCERT), made the comments in the state-run China Daily newspaper, calling for greater cooperation between the two states on hacking.

China accuses U.S. of being “the real hacking empire” after Pentagon report

China has accused the United States of being, “the real hacking empire” after a Pentagon report which said for the first time that cyber attacks on the U.S. were “directly attributable” to Beijing.

Up to 600,000 gamers at risk as emails and other details stolen from online zombie game

Up to 600,000 gamers at risk as emails and other details stolen from online zombie game

Apple ID password and verification two-step plays on

Stepping up protection of the Apple ID falters as password reset bug emerges before two-step verification is fully implemented.

Top celebrities and government officials financial details leaked online

The Associated Press reports that celebrities, including ashton Kutcher and Kim Kardashian, along with top government officials have had private financial information stolen and posted to a rogue website.

Bush family e-mails stolen in online attack

Several email accounts belonging to family members of former President George W. Bush were hacked and the contents made public, exposing private data, correspondence and personal photos, according to The Smoking Gun. The apparent hack affected email threads between several members of the Bush family, including both former U.S. Presidents. According to the report, the

Java vulnerability woes continue as Apple blocks access

The uncertainty around Java shows no sign of abating as Apple blocks all versions of Java on OS 10.6 and above through its anti-malware security applet, XProtect. This follows the blocking in all but name by Mozilla as it moved to end auto-loading of plug ins for the Firefox browser.

FBI snatches Algerian bank hacker in Thailand

Hamza Bendelladj, the Algerian alleged bank hacker responsible for defrauding US banks of millions of dollars has been detained in Thailand, following three years of tracking by the FBI.

“Hollywood hacker” sentenced to 10 years jail time

A hacker who broke into celebrity email accounts and leaked nude pictures of Hollywood actors, including Scarlett Johansson, has been sentenced to 10 years in prison, according to an Associated Press report.

Australian Defence Force Academy attack exposes 20,000 user records

An attack on the Australian Defence Force Academy servers held at the University of New South Wales (UNSW) resulted in the loss of 20,000 user records. According to a report in the Sydney Morning Herald  the hacker, known as Darwinare, managed to break in and steal the records, including passwords and email addresses in a

How’s your cyber security awareness? Or, do we really need security training?

As you may know, October is National Cyber Security Awareness Month in America, which is a good time to ask yourself how aware you are when it comes to threats to your digital devices and personal information.

Blizzard Entertainment hacked this time for real (lessons learned)

In May we read that game maker Blizzard, developer of a series of popular games including World of Warcraft, Diablo III and Starcraft, was hacked, but that turned out to just be individual compromised accounts from some of its users. Now we read, from Blizzard itself rather than a third party, that they have been

Authentication attacks: Apple, Amazon, iCloud, Google, anything with a password

Sharing details of the hack that “wiped his life” has earned Mat Honan a place in the annals of information system security; the specific inter-dependence of flawed authentication systems that cost him so dearly–encompassing Apple, iCloud, Amazon.com, Gmail and more–would probably still exist if Mat had not gone public. Wired has the full story here

Gamigo game site hack lessons learned (and what should you do)

Gamigo learned a few months ago about a breach and alerted its users that they had been attacked. But now, we see an estimated 8+ million records just went public, no small amount for the attackers. What is interesting is that by one account, hash cracking was able to decrypt over 90% of the passwords,

You've Got (Nation State Hacked) Mail

We read in the New York Times that Google is rolling out a service that will attempt to alert users when it thinks their accounts might be subject to hacking by a government, hoping the user will take precautions after getting a notice that says “Warning: We believe state-sponsored attackers may be attempting to compromise

Could hackers break into your Wi-Fi wireless router?

You just got a new wireless router for Christmas, but when you set it up it asks about wireless security. Do you want WEP, WPA, WPA2 or any of the other alphabet soup options they give? While it’s easiest to just pick the default setting, are you setting yourself up for trouble from aspiring hackers?

Stratfor hack – lessons learned

Recently we noted that unencrypted credit card storage was on the rise in 2011, and also highlighted the expense involved to the company in the event of a credit card breach. Now we see personal data – including unencrypted credit card information – being paraded out as a part of the recent Stratfor hack. Also,

Android vulnerability patch time lag causes malware opportunity

One of the blessings of Open Source initiatives is the rapidity with which coders can release quality collaborative code. This is one of the ways the Android managed to claw its way into the smartphone mainstream, after arriving late to the game. But as the app ecosystem matures, vulnerability/patch management becomes more of an issue,

Should you hire a hacker to prevent data breaches?

With all the recent headlines about data breaches, should your organization hire a “thief to catch a thief?” That’s a question Kevin Mitnick, sitting near the top of the hacker hall-of-fame for famous hack sprees in decades past, has been contemplating. He’s not alone – many companies are wondering the same thing. There is a

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

4 articles related to:
Hot Topic
08 Aug 2013
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.