A teenager suspected of hacking into the database of a LexisNexis subsidiary is thought to have accessed it using phony accounts set up through police departments in Florida and Texas, according to a search warrant. Authorities have been investigating how hackers obtained Social Security and driver's license numbers belonging to tens of thousands of people. The information came from databases owned by Seisint Inc., a database company bought by LexisNexis Inc. in 2004.
The files compromised include encrypted passwords used by students and employees to access basic services like email. But, those passwords are issued as that individuals social security number... and stays that way unless it is changed.
JCC Information Technology Director, Jim Jones says they recommended people change those passwords... which greatly decreases the chances of their personal info being hacked. But, he also says that the hackers may have been able to access other areas which also lead to a persons social security number.
A teenager has been arrested for allegedly trying to hack into his high school's computer system—the second such incident in a month in the western suburbs, police said today.
Aurora police Thursday charged Matthew Schiro, 18, of Naperville, with computer tampering, a misdemeanor.
Schiro tried to hack into Waubonsie Valley High School computers Tuesday using a password-cracking program he had downloaded from the Internet, police said. He is free while awaiting a June 16 hearing in DuPage County court.
Purdue University is alerting employees that their personal information might have been illegally accessed from the school's computer system.
It was the third time in the past year that Purdue has discovered a computer security breach, school officials said Friday.
Security researchers have discovered a denial of service vulnerability involving Yahoo!'s popular instant messaging client. Hackers can potentially disconnect users from chat sessions by sending malformed packets to Yahoo! Messenger servers. The flaw stems from a glitch in processing routines used to process URL handler links, as explained in a SecuriTeam advisory (containing "proof of concept" demos) here.