Security Hero Rotating Header Image

Hacking

Hacker Gary McKinnon will receive no pity, insists US

Hacker Gary McKinnon will receive no pity, insists US

Gary McKinnon, the Briton accused of hacking Pentagon and Nasa computer networks, faces an increasingly hostile climate on cyber security in the US if his extradition is approved this week.

American officials have made clear that they regard Mr McKinnon, 43, an unemployed computer programmer who has been diagnosed with …

URL: http://www.pogowasright.org/?p=2227

Its summer…Do you know what your kids are doing?, (Fri, May 29th)

Its summer…Do you know what your kids are doing?, (Fri, May 29th)

School is over or about to be over for many kids. With that comes many families whose parents work and kids will be left at home to relax and enjoy their summer vacation. This means alot of free time and an internet out there just waiting to be explored. Everyone is aware of the need to keep your kids safe while on the internet. But in some cases, there is a need to keep the internet and others safe from your kids. Let me explain that last comment. Kids with too much time on their hands get into trouble. You hear about it all the time on the news with kids getting into trouble with things such as vandalism, stealing,etc. What about kids getting into trouble on the internet?
Do a google search on the phrase teenage hacker and see what comes up. Kids are curious and learn fast. The internet can become a playground for them to explore and test out cool new programs and tools they find on the internet or write themselves. Chat rooms are available where kids can learn many things from others and want to try them for themselves. They can also get pulled into the wrong crowd on the internet and get in way over their heads fast. They may not even see anything wrong with it, its just computers after all.
Most of the filtering technology today focuses on web traffic. What are your kids looking at on the web. That is a good thing, but there are many other ports and protocols available and nothing watching them. Would you know if your child was running a botnet? Stealing credit card numbers? Hacking into websites? Its not a game and there are real consequences to it, even sometimes when the intent may have been to do good.Here are some recent examples:
Nineteen-year-old Dmitriy Guzner from New Jersey was part of an underground hacking group named ‘Anonymous’ that targeted the church with several attacks. He could face ten years in prison on computer hacking charges and is due to be sentenced on August 24. http://www.securecomputing.net.au/News/144850,teenage-hacker-pleads-guilty-to-church-of-scientology-cyber-attacks.aspx

Twitter has announced a review into four worm attacks on the site as a teenage hacker admits he could be jailed for his role in the stunt. http://news.sky.com/skynews/Home/Technology/Twitter-Worm-Attack-Biz-Stone-Announces-Review-As-Teenage-Hacker-Michael-Mooney-Speaks-Out/Article/200904215261579
A teenage hacker whose campaign to expose holes in Internet security sparked an FBI investigation was being sentenced in court today. http://www.independent.co.uk/news/business/news/teenage-hacker-to-be-sentenced-for-internet-crusade-676871.html

As parents, we need to also talk to our kids about the other dangers that are on the internet. Dangers such as hacking, virus making, botnet creation, stealing, etc. You may think your child is doing nothing but sitting on a computer playing. But keep in mind that computer on the internet is a portal to a whole nother world.

URL: http://isc.sans.org/diary.php?storyid=6490&rss

Hackers launch phishing attack on Facebook

Hackers launch phishing attack on Facebook

Hackers launched an attack on Facebook’s 200 million users on Thursday, successfully gathering passwords from some of them in the latest campaign to prey on members of the popular social networking site.

Facebook spokesman Barry Schnitt said on Thursday that the site was in the process of cleaning up damage from the attack.

He said that Facebook was blocking compromised accounts.

Source – The Age

Reddit It | Digg This | Add to del.icio.us

URL: http://www.pogowasright.org/article.php?story=20090515061835821

UC Berkeley suffers breach

UC Berkeley suffers breach

Hackers breached a server in the health services center at the University of California, Berkeley, and accessed the personal data of more than 160,000 people, the college announced Friday. The stored database records included Social Security numbers and health insurance and other medical information. The intruders, believed to be based overseas, burrowed their way in through a public website. The breach, which began in October and continued through April, affected former Berkeley students and possibly their spouses or parents if they were linked to insurance coverage. X DK


URL: http://feedproxy.google.com/~r/SCMagazineHome/~3/Pm158p6WZpo/

Hackers seek payment after break-in on state health care site

Hackers seek payment after break-in on state health care site

Security experts remain puzzled how hackers orchestrated their compromise of a Virginia state health care website.


URL: http://feedproxy.google.com/~r/SCMagazineHome/~3/9uBy5bmiEok/

Hackers Break Into Pentagon’s Fighter Jet Project

Hackers Break Into Pentagon’s Fighter Jet Project

Hackers broke into U.S. Department of Defense computers and downloaded terabytes of data containing design information about the Joint Strike Fighter, a US$300 billion stealth fighter currently under development, according to The Wall Street Journal.

The stolen files all relate to the design of the Joint Strike Fighter and its electronic systems, the Wall Street Journal reported, saying they could be used to help defend against the jet.

However, the most sensitive files were not compromised since they are stored on computers that are not connected to the Internet, the report said. The reported attack raised more questions than it answered.

URL: http://www.hackinthebox.org/index.php?name=News&file=article&sid=30974

FBI Spyware Has Been Snaring Extortionists, Hackers for Years

Documents: FBI Spyware Has Been Snaring Extortionists, Hackers for Years

A sophisticated FBI-produced spyware program has played a crucial behind-the-scenes role in federal investigations into extortion plots, terrorist threats and hacker attacks in cases stretching back at least seven years, newly declassified documents show.

Source – Threat Level

Reddit It | Digg This | Add to del.icio.us

URL: http://www.pogowasright.org/article.php?story=20090418084343570

News paper article gt who is the greatest Hacker?

News paper article gt who is the greatest Hacker?

Posted by Answer on Apr 06

Hello all – please excuse the off-topic ride.

I need for a NP article a list of top-five actual hackers ( I mean Hacker, not security expert ;)).
A sort of wall of fame, only screen name.
Would one be kind enough to make replie directly to my mailbox, to limit
the list pollution?

Thanks.

URL: http://seclists.org/fulldisclosure/2009/Apr/0047.html

A hacker site signs off

A hacker site signs off

HackersBlog, a Romanian website that gained notoriety for recently exposing SQL injection vulnerabilities in websites of security vendors such as Symantec, Kaspersky Lab, F-Secure and BitDefender, is shutting down. A post on the website said the operation had “gotten to that point where most of the team members had enough … we do have a private life.” The team’s most notable attack targeted Kaspersky and enabled the hackers to view a list of database tables. However, no customer information was exposed in any of the incidents. X CAM

URL: http://feedproxy.google.com/~r/SCMagazineHome/~3/Ytn2NqZ8EJ0/

Sniffing keystrokes with lasers, oscilloscopes

 

 

Researchers have devised two novel ways to eavesdrop on people as they enter passwords, emails, and other sensitive information into computers, even when they’re not connected to the internet or other networks.

Exploiting vibrational patters and electromagnetic pulses that emanate with every character entered, the Italian researchers are able to remotely sniff keystrokes from significant distances. The techniques use inexpensive equipment and can be hard for targets to detect, making them ideal for snooping on unsuspecting people in the office or building next door.

“The data is there,” Andrea Barisani, of security firm Inverse Path, told those attending the CanSecWest security conference in Vancouver, British Columbia. “That’s the important thing you need to know: whenever you type your data goes somewhere else. Not many people think about that.”

URL: http://www.hackinthebox.org/index.php?name=News&file=article&sid=30556

Hacker Disabled Offshore Oil Platforms’ Leak-Detection System

 

 

A Los Angeles federal grand jury indicted a disgruntled tech employee Tuesday on allegations of temporarily disabling a computer system detecting pipeline leaks for three oil derricks off the Southern California coast.

Mario Azar, 28, faces a maximum 10-year term after being accused of purposely impairing a computer system that monitored for leaks on three Pacific Energy Resources platforms offshore of Huntington Beach.

“It was offline. The leak-detection system was rendered inoperable for a period of time,” said Thom Mrozek, a spokesman for Los Angeles federal prosecutors. Azar did not immediately respond to a message seeking comment.

URL: http://www.hackinthebox.org/index.php?name=News&file=article&sid=30546