213 Topics
| |
Security stories abound on the Internet, and as we enter a new month an old one has resurfaced. There are legal questions over the Sarah Palin hacking event last year. Graham Cluley has [URL="http://www.sophos.com/blogs/gc/g/2009/07/01/legal-arguments-sarah-palin-email-hack/"]blogged[/URL] about it. For me he's buried the main point right at the end of the story. … | |
Hackers managed to get root access to a large Internet Service Provider, reportedly via a zero day vulnerability over the weekend, and destroy data from 100,000 websites as a result. The UK-based ISP, VAServ, has [URL="http://www.theregister.co.uk/2009/06/08/webhost_attack/"]stated[/URL] that the attackers apparently exploited a vulnerability in virtualisation software called HyperTM in order … | |
Last week, former UK Prime Minister and current Quartet Envoy to the Middle East on behalf of the EU, UN, US and Russia, [URL="http://www.tonyblairoffice.org/"]Tony Blair[/URL] was hacked. Well, the [URL="http://www.facebook.com/pages/The-Tony-Blair-Faith-Foundation/53370916629"]Tony Blair Faith Foundation on Facebook[/URL] was hacked according to reports at any rate. It seems that the site was flooded … | |
According to [URL="http://www.guardian.co.uk/world/2009/apr/21/hackers-us-fighter-jet-strike"]reports[/URL], the Pentagon has been subject to a successful hacking attack with details of the F35 Lightning II, also known as the Joint Strike Fighter and the most expensive jet fighter ever, the target. Apparently, design data including that of the $300 billion jet project electronics system, have … | |
Well that didn't take long. No sooner had Microsoft officially launched [URL="http://www.daniweb.com/blogs/entry2606.html"]Internet Explorer 8[/URL] to the waiting masses and talked up how new security features will ensure hackers will find it more difficult to exploit the new browser that guess what? Yep, a hacker exploits the new browser. During his … | |
Botnets are, without any doubt, a huge and growing problem. The technology news feeds are bursting to the seams with stories about them: how [URL="http://www.daniweb.com/blogs/entry2838.html"]botnets boost click-fraud rates[/URL], how [URL="http://www.daniweb.com/blogs/entry2838.html"]botnets control sex spam zombies[/URL], how the cyber-criminals are [URL="http://www.itwire.com/content/view/23383/1231/"]building the first mobile botnet[/URL] and even how some botnet builders are … | |
It seems that Microsoft thinks security threats are going to multiply as the recession continues to bite. It says [URL="http://news.bbc.co.uk/1/hi/technology/7875904.stm"]here[/URL] that disgruntled and redundant employees will resort to foul means to take contacts to the next job. This sounds kind of familiar to me. Far be it from me to … | |
President Obama - I still like saying that and I'm not even in his continent (OK, a little bias there, you may disagree) - is of course to be applauded for his decision to launch a root and branch investigation into American cyber-security. In fact I'd urge other countries, particularly … | |
Today is [URL="http://www.saferinternet.org"]Safer Internet Day[/URL] 2009, apparently. Every year since 2004, one day in February has been designated as Safer Internet Day in order to promote a safer and more responsible use of online technology and mobile phones. It is aimed primarily at children and young people across the world. … | |
The Mayor of London, the totally eccentric Boris Johnson, has written a column in a national newspaper in which he champions fellow loon [URL="http://www.daniweb.com/blogs/entry2863.html"]Gary McKinnon[/URL], the [URL="http://www.itwire.com/content/view/20017/53/"]NASA UFO hacker[/URL]. Currently busy fighting extradition to the USA on the grounds that, essentially, to do so would not be fair to someone … | |
Under new a new law adopted in the UK, the British police are now permitted to access data stored on home computers without benefit of a search warrant. Worse yet, officers are allowed to hack into computers remotely without notifying its owner. Even though officials say these methods would only … | |
Nobody likes the [URL="http://www.itwire.com/content/view/19936/53/"]iPhone kill switch[/URL] that was recently confirmed by [URL="http://www.itpro.co.uk/blogs/daveyw/2008/08/11/big-brother-apple/"]Big Brother Apple[/URL] as being very much a reality. Apparently it is there for our own good, just in case something nasty gets on to the iPhone by way of a rogue App Store application. Apple can then remotely … | |
According to the [URL="http://www.guardian.co.uk/world/2008/jul/27/internationalcrime.hacking?gusrc=rss&feed=technologyfull"]Observer newspaper this morning[/URL] Gary McKinnon, the British hacker accused of what US prosecutors refer to the biggest military computer hack of all time, has claimed he was threatened with a military tribunal at Guantanamo Bay. His lawyers are using this as part of their defence against … | |
It has emerged that Belgium is the latest country to feel the force of the Chinese cyber-super-power, with [URL="http://english.ohmynews.com/articleview/article_view.asp?at_code=434212"]Belgian ministers claiming[/URL] that state sponsored hackers have been targeting Federal Government computers. The Justice Minister in Belgium, Jo Vandeurzen, has claimed that the spate of hacking attacks also reported to parliament … | |
I am not an easily shockable person. Anyone who knows me, anyone who has seen me, will understand this. Indeed, other than the usual trio of sexual or racial abuse and mindless violence it takes a lot to drop my jaw in shame and despair while browsing the web. However, … | |
[URL="http://www.frsirt.com/english/advisories/2008/0928"]FrSIRT[/URL], the French Security Incident Response Team, has reported that multiple vulnerabilities have been identified in various IP-PBX software applications that can be exploited by attackers to bypass security restrictions and cause denial of service attacks or otherwise compromise vulnerable systems. The software is used by an ever increasing number … | |
[URL="http://po-ru.com/about/"]Paul Battley[/URL] is a software developer from London who can probably lay claim to being the biggest thorn in the side of the BBC right now. No sooner had the mighty British Broadband Corporation [URL="http://news.bbc.co.uk/1/hi/technology/7293988.stm"]announced[/URL] that his hack which allowed people to download iPlayer TV streams meant for an iPhone … | |
Ever wondered just how smart a smartcard is, from the security perspective? Obviously there are problems as detailed in a DaniWeb blog posting last month which described how hackers can [URL="http://www.daniweb.com/blogs/entry2115.html"]exploit hardware RFID weaknesses to access credit card account data[/URL] for example. But now a former member of the team … | |
According to a newly published [URL="http://www.secure-medicine.org/icd-study/icd-study.pdf%20target="]research paper[/URL] from the Harvard Medical School backed Medical Device Security Center, it appears that hackers could use wireless technology to turn off heart pacemakers. As unlikely as it sounds, the boffins reckon that people with an implantable cardiac defibrillator (or pacemaker as they are … | |
The Cult of the Dead Cow, the infamous hacking collective, has released a Google hacking utility called Goolag Scan that brings the ability to search the information engine for web-based data that is normally hidden to anyone wannabe with a web browser and half a brain. It does this by … | |
The [URL="https://www.blackhat.com/"]Black Hat[/URL] security conferences are always good for a crowd pleasing demonstration or two, and security researcher Adam Laurie was happy to oblige at the latest DC based event. In a 'look no hands' fashion, he was able to pull up account data including name, account number and expiration … | |
A CIA analyst speaking at the SANS 2008 SCADA and Process Control Summit in New Orleans has admitted that hackers have not only been able to penetrate the power grids of several countries, but also successfully cut power to several cities, all from the relative safety of the Internet. Central … | |
Everyone was excited about the launch of a new range of iPods, everyone apart from Linux users of course. In its wisdom, [URL="http://www.apple.com"]Apple[/URL] decided to prevent media players other than iTunes from syncing with the MP3 devices, and in so doing locked out Linux users for whom there is no … | |
According to a posting by someone calling themselves Gabriel, published on the Full Disclosure list (warning – [URL="http://seclists.org/fulldisclosure/2007/Jun/0380.html"]this link[/URL] contains the so-called plot spoiler), the ending of the yet to be published Harry Potter and the Deathly Hallows book has been revealed. Not by magic or wizardry, but by good … | |
According to new research from [URL="http://www.centennial-software.com"]Centennial Software[/URL] removable devices are the single biggest threat to company data so far in 2007, yet four out of five businesses are failing to defend themselves. The research resulted from a survey undertaken at this year's Infosecurity Europe, and discovered that just 16 percent … | |
[FONT="][/FONT]A newly published report by [URL="http://www.infosec.co.uk"]Infosecurity Europe[/URL] reveals that out of 300 office workers interviewed at London railway stations and IT professionals at a computer show, an amazing 64 percent were prepared to give their passwords in exchange for a bar of chocolate and a smile. The survey also found … | |
If you're visiting a known site such as Google.com, you're perfectly safe, right? Wrong. New DNS vulnerabilities in Microsoft's Windows 2000 and 2003 severs could potentially allow a DNS server to get hijacked, and redirect a user to a completely different site than they expected to see. The vulnerability exists … | |
Gartner has estimated that phishing attacks cost the US something in the region of $2.8 billion last year, a problem that is growing fast as proved by the statistic showing the average individual loss per attack has risen from $256 in 2005 to a staggering $1244 in 2006. Banks are … | |
When computer systems get "owned", you may think it takes a master-geek with an extensive amount of knowledge to hack into tightly-secured systems. After all, security bugs are quickly found out, and patches can be released within a few days. But when securing a computer system or network, especially the … | |
Recently one of the most talked about things is this Apple Wifi hack that was demonstrated by a group called SecureWorks at one of the largest security conferences, Defcon. [URL="http://www.youtube.com/watch?v=chtQ1bcHLZQ&mode=related&search="]Here is a link[/URL] to the video so you guys can watch the video yourselves. Now Here is a link to … |
The End.