Category News

Court Rules Against Workplace Hackers

VS

Thanks to the U.S. district court, your computer equipment can be seized without warning if you proclaim yourself to be a hacker. This court, I am sorry to say, in Bums-ville, Idaho, had recently decided it was okay to confiscate a software developer’s system. Why did they do this? Because his website stated: “We like hacking things and don’t want to stop.” Whose website is it? Well, it belongs to a man named Corey Thuen.

Corey Thuen runs a new start-up named Southfork Security. It is working in the ICS/SCADA security space. They are made up of former security researchers of the Idaho National Laboratory.   Thuen was working for Battelle which is a business of innovation (whatever that means). On their website, they state, “Battelle is solving what matters most for our clients today...

Read More

Adobe Confirms Security Breach

Adobe Hacked

adobeAdobe recently had to reset the passwords of all its customers after a breach in their security. They verified the source code for some of their products had been accessed; but they were not aware of any exploits being used to target their products that might have contributed to the success of the attack.

Adobe also confirmed 2.9 million of its customers may have been affected by the data breach as their financial information may have been compromised. The data consisted of items such as encrypted credit or debit card numbers, expiration dates and “other information relating to customer orders.” At the moment, there is no way to know if that information left their systems. The intruder may have just accessed the information...

Read More
Computer-Password-Security-Hacker

Computer-Password-Security-HackerSpamhaus, a Dutch anti-spam group, was attacked in what was called the “biggest cyber-attack ever.”  One so powerful, it reportedly slowed down sections of the internet in Europe.

A London teen has been arrested by British police (in April) on suspicion of involvement in the attack. The unknown teen was arrested at the same time as the main suspect Sven Olaf Kamphuis.

The unknown teen was found sitting in front of his computer and still logged into various systems and forums.  It was also reported he a had significant amount of money flowing through his bank account.

The attacker used what is known as DDoS attacks.  His motive continues to be a mystery at this time.

The 16-year old is currently out on bail.

DDoS attacks are a distributed denial-of-service attack and it is an attempt to ...

Read More

Is Iran Hacking U.S. Navy Computers?

Iranian Hackers

Is Iran hacking U.S. Navy Computers?  According to a report last Friday, they already have.  “Iran has penetrated an unclassified U.S. Navy network.  We do not believe that they were able to get their hands on any important data, but these serious attacks have shown us a new level of Iranian hacking intelligence, said U.S. officials.  These attacks were perpetrated by one of two groups.  They were either agents working for the Iranian government or they were an outside group that had Iran’s approval.”

The timing of the attacks proved to be interesting.  The attacks were launched right as U.S. and Iranian officials were trying to restart negotiations over Iran’s nuclear weapons program. Iranian President Hasan Rouhani was speaking to U.S...

Read More

TouchID Not As Secure As You Think

iPhone 5s Fingerprint

The new iPhone 5s was released and just a day and a half later, the Chaos Computer Club hackers were able to bypass the fingerprint bio-metric scanner TouchID.
Dan Riccio, Senior Vice President of Apple Hardware Engineering, stated, “you’re fingerprint is one of the best passwords in the world. It’s always with you, and no two are exactly alike.”

Even though that may be true on some levels, watch the following video and see just how easy and quickly the fingerprint security is setup and circumvented.

With the new iOS and hardware, you can use your fingerprint as the password to unlock your phone and it can be setup to enable your phone to authorize purchases through Apple stores for music, movies, TV series, applications, and books...

Read More

NIST, Lap-Dogs Of The NSA?

Encryption

Did the NIST deliberately weaken encryption standards to help the NSA?  They say no!

“We want to assure the IT cybersecurity community that the transparent, public process used to rigorously vet our standards is still in place,” said NIST.

NIST (National Institute of Standards and Technology), denies it has weakened it’s encryption standard in order to please the NSA.  If the suspicion is true, this would no doubt give the NSA an even larger advantage over the general public to protect their secure data and lives.  “NIST would not deliberately weaken a cryptographic standard. We will continue in our mission to work with the cryptographic community to create the strongest possible encryption standards for the U.S. government and industry at large.”

Remember the people Robin HoodEdward...

Read More

The Game Isn’t Over Until It’s Over

Anonymous-Seal Recently, Austin P. Berglas, assistant special agent in charge of the FBI’s cyber division, boasted how the 2012 arrests of LulzSec members had "destroyed" the leadership of Anonymous, rendering it effectively neutralized. In an interview with the Huffington Post, Berglas said "The movement is still there, and they're still yacking on Twitter and posting things, but you don't hear about these guys coming forward with those large breaches. It's just not happening, and that's because of the dismantlement of the largest players."Read More

Off-The-Grid Internet (DIY)

img_0006 (1)

“And never again have to pay for a service that would be dirt cheap IF it weren’t run by a bunch of profiteering gluttons!” Razor & Blade, Hackers 1995

A community in Athens, Greece, has created its own private Internet in order to combat exorbitant rates and unreliable connections. It is constructed of a network of rooftop wireless antennas to create a “mesh.” Named the Athens Wireless Metropolitan Network (AWMN), data travels through the mesh at no less than 14 Mbs a second, and up to 150 Mbs a second, surprisingly, up to 30 times faster than it would if you were using the local telecom-provider. That is awesome in my book!

Started in 2002, the AWMN has over 1,000 members and is growing. “It’s like a whole other web,” AWMN user Joseph Bonicioli explained. “It’s our network, but it’s als...

Read More

That’s it! Game over, man! Game over!

You Cannot Cut Off That Which Does Not Exist

In a recent statement, the FBI claims the infamous hacktivist group known as Anonymous has been neutralized!

We can spy on you, we have the authority!
We will lie to you, entrap and incarcerate you.
We will detain you, we exercise our command!
We have drained you, when you tried to make a stand!

The FBI believes the fingering of core members of “Lulz Security” members, Topiary (Jake Davis), Tflow (Mustafa Al-Bassam), Kayla (Ryan Ackroyd) and ViraL (Ryan Cleary) by Sabu (Hector Xavier Monsegur) has been a “huge deterrent effect.”

“All of these guys were major players in the Anonymous movement, and a lot of people looked to them just because of what they did,” says Austin P. Berglas, the assistant special agent in charge of the bureau’s cyber division in New York.

After “Sabu” turne...

Read More

Journalist Glenn Greenwald Seeks Revenge

Journalist Glenn Greenwald is the man responsible for leaking secrets by former U.S intelligence agency contractor Edward Snowden.

Glenn was recently quoted saying  “I will be far more aggressive in my reporting from now. I am going to publish many more documents. I am going to publish things on England too. I have many documents on England’s spy system. I think they will be sorry for what they did,” Glenn apparently upset over an incident that happened to his partner David Miranda.  David was passing through London’s Heathrow airport on his way back to Brazil when he was detained and questioned for nine hours before being released without being charged for a single crime.

GlennGreenwald

“They wanted to intimidate our journalism, to show that they have power and will not remain passive but will att...

Read More