OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
LinuxInsider.com
Thieves Take $5M Bite Out of Bitcoin Exchange
January 07, 2015
An estimated $5.2 million was stolen over the weekend from Bitstamp, a digital currency exchange. It has suspended services pending an investigation. The company assured its customers that bitcoins held with Bitstamp prior to suspension of services were completely safe and would be honored in full. Bitstamp on Sunday discovered that some of its operational wallets had been compromised.
Fingerprint Theft Just a Shutter Click Away
January 07, 2015
Ever since smartphone makers started incorporating fingerprint scanners as a means of unlocking mobile phones, the Chaos Computer Club has attacked the technology with vigor. Not long after Apple added Touch ID to its iPhones, the German hackers demonstrated how to lift prints from a surface and create a flexible pad containing the print that could be used to break into a phone.
Hackers Give Touch ID the Finger
December 29, 2014
Hacker Jan Krissler, aka "Starbug," this weekend told attendees at the 31st Chaos Computer Club convention that he had replicated the fingerprints of German Defense Minister Ursula von der Leven using a standard photo camera and commercially available software. Krissler used a close-up of a photo of the minister's thumb and other pictures taken at different angles during a press event in October.
Flaws in Ancient Standard Enable Wireless Eavesdropping, Spying
December 23, 2014
Vulnerabilities in Signaling System 7, telephony signaling protocols used by carriers worldwide, allow third parties to listen to people's cellphone calls and intercept text messages despite encryption, The Washington Post reported last week. German cybersecurity researchers Tobias Engel of Sternraute and Karsten Nohl of Security Research Labs separately discovered these vulnerabilities.
The Untold Stories of 2014
December 22, 2014
It is time to look back at 2014, so I'll focus here on a series of stories I thought were interesting but didn't seem to catch much or any real air. Some, like what is really behind Sony's decision to pull The Interview still might take off. Hadoop analytics is one of the most powerful platforms to come to market, and one vendor stands out above all others: Cloudera.
Google Calls In Legal Eagles in MPAA Piracy Skirmish
December 19, 2014
Google has filed a lawsuit against Mississippi Attorney General Jim Hood, the latest salvo in its piracy battle with the Motion Picture Association of America. Hood targeted Google with an "unreasonable, retaliatory and burdensome" subpoena, the complaint says. The referenced subpoena likely is part of a coordinated campaign against Google known as "Project Goliath."
US Mulls Response to Sony Hack
December 19, 2014
Department of Homeland Security Secretary Jeh Johnson on Thursday said the United States "is actively considering a range of options" to take in response to the Sony hack. The hack is "very serious," Johnson said, though he refused to label it as a terrorist attack. There has been widespread suspicion that North Korea engineered the hack. The FBI is investigating.
Terrorist Threats May Blow Up 'The Interview's' Box Office
December 17, 2014
The now-notoriously controversial action comedy The Interview, which was expected to deliver profits of $90-$95 million for Sony, may have become a financial black hole. The movie's Thursday premiere in New York has been cancelled, and several movie theater chains have scrapped plans to screen it, following a hacker message referencing 9/11 and threatening physical attacks on theaters.
Sony Sends News Outlets a Stern but Toothless Warning
December 16, 2014
On behalf of Sony Pictures Entertainment, high-powered attorney David Boies has sent a letter to several news outlets demanding that they refrain from publishing stories based on material hackers recently stole from the company and that they destroy the pilfered data. The letter to the news organizations claims the stolen information is "protected under U.S. and foreign legal doctrines."
Sony May Have Succumbed to DDoS Temptation
December 15, 2014
Sony reportedly has used Amazon Web Services to launch distributed denial of service attacks on sites carrying files stolen from its network. Those attacks apparently involved "hundreds of computers" in Tokyo and Singapore. Amazon reportedly issued a statement denying the claim, but the language it used was vague: "The activity being reported is not currently happening on AWS."
No Respite for Sony
December 12, 2014
Since the hacker group calling itself "Guardians of Peace" announced its attack on Sony Pictures Entertainment late last month, things have gone downhill for the company. After confidential documents were leaked to the Internet over several days, a denouement of sorts was reached last week, when a security company examining the stolen data discovered nearly 50,000 Social Security numbers.
NSA's Auroragold Mining Operation
December 10, 2014
The United States National Security Agency, which is known for monitoring landline, Web and cellphone communications worldwide, reportedly also targets wireless carriers. Documents released by whistle-blower Edward Snowden show the NSA has monitored more than 1,200 email accounts associated with major cellphone network operators worldwide since 2010.
Hackers Derail Sony's PlayStation Network
December 09, 2014
Still reeling from a cyberintrusion that exposed massive amounts of personnel data from its entertainment division on the Internet, Sony was attacked again over the weekend. This time, hackers disrupted the company's PlayStation Network. However, unlike the foray against Sony Pictures Entertainment, which is still under investigation, the company quickly recovered.
Sony's Cyber-Whodunit Is a Page-Turner
December 05, 2014
Who breached Sony Pictures' network and why continues to be a puzzle a week after news of the hack first emerged. Some speculate it was an inside job. A few have pointed fingers at North Korea, which returned its own one-finger salute in response. Others discount that possibility. In the meantime, the FBI has issued a warning stating destructive malware is on the loose.
Iran Raises Its Cyberfist to the World
December 04, 2014
Iran, which for decades has locked horns with the United States, is emerging as a cyberwarfare power that's threatening the world, Cylance warned in its Operation Cleaver report, released Tuesday. Cylance has been tracking one team of roughly 20 hackers called "Tarh Andishan," which means "thinkers" or "innovators" in Farsi. The group is suspected to be Iranian.
Cybersecurity Threats 2015: More Espionage, More Apple Malware
December 03, 2014
Cyberspies will flourish and hackers will target Apple devices more often in 2015. Until now, Russia, China and the United States have dominated the cyberespionage scene, but their success will start to attract new players to the practice. "We can expect some of the developing economies ... to engage in these activities to protect their growth status," said Websense's Carl Leonard.
Did North Korea Get the Last Laugh Against Sony?
December 02, 2014
Upwards of 1.2 million people reportedly have used pirate sites to download Brad Pitt's unreleased World War II drama Fury. That was one of five films hackers leaked onto the Web following an attack on Sony Pictures' network last week. Sony has called in the FBI and other law enforcement agencies. It's rumored that the hack was launched by North Korea.
Wristband Heads Off Password Headaches
November 25, 2014
Has software glut got you down? Do you reuse passwords because creating unique ones for all your online accounts would cause a memory overload? If so, you may be interested in a bit of jewelry called the "Everykey," by a startup with the same name. Everykey is a wristband that removes the need to remember the countless log-in credentials we use every day.
EFF Spearheads Safer Web Initiative
November 24, 2014
The Electronic Frontier Foundation has announced a nonprofit organization that will aim to secure the entire Web. Let's Encrypt, starting in summer 2015, will offer free server certificates to help websites transition from HTTP to the more secure HTTPS protocol. EFF is partnering with Akamai, Mozilla, Cisco, iDenTrust and University of Michigan researchers.
NotCompatible Mobile Malware Gets Badder
November 21, 2014
A new version of the NotCompatible malware, which first appeared in 2012, is bigger, badder and pretty much indestructible, Lookout Security reported. And it can compromise corporate networks, thanks to the BYOD trend. The malware, called "NotCompatible C," focuses on Android devices. The NotCompatible Trojan is used to spread spam campaigns, among other nefarious activities.
Citadel Trojan Adds Keylogging to Arsenal
November 21, 2014
Cybercriminals are using a new version of the dangerous Citadel Trojan, which has been employed to attack the financial and petrochemical industries, to compromise password and authentication solutions, IBM Trusteer has reported. The new version begins capturing keystrokes, or keylogging, when some processes are running. It was discovered on a server that already had been infected.
Russian Site Exposes Thousands of Private Videocam Streams
November 20, 2014
A Russian website has been posting live video streams from unprotected webcams in homes and businesses around the globe, Britain's Information Commissioner's Office warned on Thursday. The website has gained access to the webcams using the cameras' default login credentials, which are freely available online but often don't get changed by their owners during the set-up process.
China Suspected in Attacks on USPS, NOAA
November 19, 2014
The U.S. Postal Service and National Oceanic and Atmospheric Administration last week confirmed that their computer systems were targeted in months-long cyberattacks that appear to have originated in China. The attack on USPS compromised information of an estimated 800,000 employees. Data at risk includes names, date of birth, Social Security numbers, addresses and dates of employment.
Researchers Shine Spotlight on OS X/iOS Masque Attack
November 12, 2014
Researchers at FireEye on Monday made public the existence of the Masque Attack, which threatens iOS and Mac OS X operating systems. Masque Attack exploits a flaw in Apple's OSes that allows the replacement of one app by another so long as both apps use the same bundle identifier. All apps, except those preinstalled on iOS, such as Mobile Safari, can be replaced.

See More Articles in Hacking Section >>
Facebook Twitter LinkedIn Google+ RSS