OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
No End to the Headaches Endpoints Give System Defenders
September 03, 2013
If there's one attack surface that's attracting growing attention from digital marauders, it's a system's endpoints. With the proliferation of BYOD, securing connections can be a defender's nightmare. Endpoints have an allure for attackers because they offer multiple attack vectors, such as social engineering attacks, spearphishing, USB infection, and compromise of WiFi networks and routers.
Syrian Electronic Army Nails NYT
August 28, 2013
The pro-government Syrian Electronic Army on Tuesday hijacked The New York Times' website and briefly took over Twitter's domain name system servers. The SEA's main motive is to gain visibility for its cause, said Jaeson Schultz, a Cisco threat research engineer. "They have claimed on their website that the portrayal of events in Syria ... is inaccurate."
BBM May Leave the Nest
August 28, 2013
BlackBerry is looking to spin off its BlackBerry Messenger service into a separate business to compete with other instant messaging apps. The company announced in May that it would make BBM, once available only on BlackBerry devices, available to devices running on iOS and Android. BlackBerry announced two weeks ago that it was looking into ways of revitalizing the company.
Nokia Threatens to Leave India Over New Taxes
August 27, 2013
Nokia sent a letter to India's commerce ministry threatening to leave the country because of Indian taxes. The letter said that the "political risk" in India was increasing due to tax claims from the government. India's passage in March of a retroactive income tax violates a bilateral treaty between India and Nokia's native Finland, Nokia says.
Chinese Domain Buckles Under One-Two DDoS Punch
August 27, 2013
Chinese websites with the ".cn" domain name extension fell on Sunday to a distributed denial of service, or DDoS, attack, the state-run China Internet Network Information Center reported. Two attacks reportedly were launched -- the first at midnight on Sunday and the second at 4 p.m. CINIC described the second attack as the largest DDoS attack it has faced so far.
Crowds Cough Up More Than $12K for Facebook Hacker
August 22, 2013
The hacker who uncovered a bug on Facebook earlier this week may indeed get a reward for his efforts, but not from the social network itself. After it became clear that Facebook would not pay Khalil Shreateh a bug bounty for his discovery, arguing that he had violated the site's Terms of Service, a crowdfunding effort launched on GoFundMe to raise funds for Shreateh -- an unemployed Palestinian programmer -- independently.
UK Newspaper's Hard Drives Next to Suffer Over NSA Leaks
August 20, 2013
London editor Alan Rusbridger wrote a column Monday detailing how British law enforcement had destroyed hard drives at his newspaper's offices. The destruction was purportedly to prevent additional leaks about the National Security Agency. Prior to destroying the hard drives, Rusbridger writes, an official told him, "You've had your debate. There's no need to write any more."
No Bounty for Zuckerberg Page Hacker, Facebook Says
August 20, 2013
Facebook, which offers a bounty of $500 or more to anyone who discovers a bug in its system, has come under fire for refusing to reward an out-of-work Palestinian programmer who reported a vulnerability that let people post to strangers' accounts without authorization. The programmer, Khalil Shreateh, resorted to hacking Facebook CEO Mark Zuckerberg's page to prove his point.
UK Detains Partner of Leak-Publishing Journalist
August 19, 2013
The partner of Glenn Greenwald, the journalist with The Guardian who has published a slew of articles detailing National Security Agency surveillance programs, was detained for nearly nine hours Sunday at London's Heathrow Airport. Greenwald's partner, David Miranda, was en route from Berlin to his home in Rio de Janeiro when he was stopped by officers at just after 8:00 a.m.
Major US Media Succumb to Unsophisticated Syrian Hack Attacks
August 16, 2013
The Syrian Electronic Army on Thursday claimed credit for hack attacks that took control of portions of a handful of major U.S. news sites via an article-recommendation service they all use. SEA reportedly gained control of them by entering an administration portal for Outbrain and inserting links in some of the recommended articles at the bottom of the Web page, thereby redirecting readers to its own site.
PRISM Prompts Deeper Probe of US Tech Players
August 16, 2013
China's Ministry of Public Security and a cabinet-level research center are teaming up to probe IBM, Oracle and EMC over security issues. The upcoming investigation could be more than a simple tit-for-tat in the ongoing cybersaga between the U.S. and China. The probe follows Edward Snowden's allegations that the National Security Agency hacked into networks at universities in China and Hong Kong.
Hacker Invades Baby Monitor in Texas Home
August 15, 2013
A hacker was able to gain access to a baby monitor on Saturday night, terrifying a Texas couple as they heard the virtual intruder speak offensively to their sleeping daughter. The parents use an Internet-connected baby monitor that is equipped with a camera to monitor the activity in their 2-year-old daughter's bedroom. Last weekend, the father heard strange noises coming over the device.
Hackers Breach Dalai Lama's Government-in-Exile Website
August 14, 2013
Hackers have hit the website of the Central Tibetan Administration, the Tibetan government-in-exile established by the Dalai Lama in 1959 after he was forced out of Tibet, according to Kaspersky Lab Senior Security Researcher Kurt Baumgartner. They installed some code that redirects visitors from Chinese-language websites to a Java exploit that drops a backdoor into their PCs.
Poor Patch Management Makes CMSes Low-Hanging Fruit for Hackers
August 13, 2013
Content management systems like WordPress and Joombla have become popular targets for hackers in recent times because flaws in those systems can be leveraged for mischief across literally millions of websites. WordPress is running on some 73 million websites and Joomla some 35 million, so if you're a cybercriminal with a fresh vulnerability in your satchel, you can do some serious damage.
Android Flaw Could Empty Bitcoin Wallets
August 12, 2013
Android device owners who use Bitcoins may have their digital currency stolen because of a security flaw in Android, the Bitcoin Foundation has warned. The problem may lie in Android's implementation of the java.security.SecureRandom application programming interface in Java. It was first publicized by Nils Schneider in January. "This is a serious issue," remarked ABI's Michela Menting.
Russian Social Network Tycoon Offers Job to Snowden
August 06, 2013
Hot air, maybe. But it's Edward Snowden, so it's news. Pavel Durov, the 28-year-old Russian CEO of social network site VKontakte, has offered Snowden a job as a security software developer. VKontakte is akin to Facebook and has 100 million active users, mostly from Eastern Europe. Last week, Russia granted Snowden, who had been holed up in a Moscow airport, temporary asylum.
FBI Attack on Child Porn Sites May Have Blown Tor Users' Cover
August 05, 2013
Ireland-based Freedom Hosting, which hosted several servers on the Tor Project's hidden network, has been taken down through a vulnerability in the Firefox browser -- and the FBI is widely suspected of being the attacker. The FBI reportedly is seeking to extradite Freedom Hosting's owner, Eric Eoin Marques, to the United States to face charges of running a huge child porn network.
Bad Apple: China Investigating Alleged Supplier Pollution
August 05, 2013
In what amounts to a serious environmental breach or a continuation of China's anti-Apple PR blitz -- or both -- Chinese regulators are scrutinizing a pair of Apple suppliers in China over pollution allegations. The factories in question, located in Kunshan, an electronics manufacturing hotbed about 40 miles west of Shanghai, are reportedly dumping large amounts of heavy metals into local rivers.
GPS Spoof Nudges Ocean-Faring Yacht Off Course
August 01, 2013
A team of researchers used a custom-built GPS device to send counterfeit signals to a 213-foot yacht, forcing the $80 million vessel off its course without triggering any alarms. The spoofed yacht was part of the experiment, so no harm was inflicted on the vehicle or its passengers. However, the test highlights the need for a broader understanding of navigational attacks, researchers said.
Hackers Demand Ransom for Hijacked Androids
July 30, 2013
Ransomware has made the jump from personal computers to the Android world. Android.FakeAV.C, a new breed of ransomware, has turned up in Asia -- almost half of it in India and Indonesia -- according to an alert by Bitdefender security researcher Liviu Arsene. Mobile ransomware works much like its PC kin. In a PC, a malware program seizes control of a computer and demands a ransom for its release.

See More Articles in Hacking Section >>
Facebook Twitter LinkedIn Google+ RSS