Skip to main content

Hackers

JPMorgan hackers altered, deleted bank records, says report

posted onAugust 29, 2014
by l33tdawg

 The scope of yesterday's computer attack against JPMorgan Chase and at least one other bank appears to be much larger than initially reported.

In addition to possibly affecting seven financial organizations, instead of two as originally reported, some bank records at JPMorgan were altered and possibly deleted, reported CNN, citing unnamed sources. The source of the attacks is not yet known.

Hackers broke into Malaysian Department of Civil Aviation ONE DAY after MH370 incident

posted onAugust 20, 2014
by l33tdawg

The computers of high-ranking officials in agencies involved in the MH370 investigation were hacked and classified information was stolen.

The stolen information was allegedly being sent to a computer in China before CyberSecurity Malaysia – a Ministry of Science, Technology and Innovation agency – had the transmissions blocked and the infected machines shut down.

Hackers break into Nuclear Regulatory Commission computers

posted onAugust 20, 2014
by l33tdawg

Hackers have successfully infiltrated Nuclear Regulatory Commission (NRC) computers twice in the past three years, according to a leaked internal investigation report.

News of the breaches broke via Nextgov, which claims to have learned of the breaches after issuing open records requests to the NRC. At the time of publishing the NRC had not responded to V3's request for comment.

Hacking Traffic Lights is Apparently Really Easy

posted onAugust 20, 2014
by l33tdawg

In the 1969 classic The Italian Job, Michael Caine and crew commit a major gold heist by hacking into the traffic light system of Turin, Italy, to cause a massive traffic jam, giving the robbers a perfectly synced path to escape through the gridlock.

As it turns out, this piece of high-action Hollywood theatrics is not merely screenwriter fantasy. According to cyber security researchers at the University of Michigan, pulling off a caper like that wouldn’t even be difficult today.

Why would Chinese hackers want US hospital patient data?

posted onAugust 19, 2014
by l33tdawg

The theft of personal data on 4.5 million patients of Community Health Systems by hackers in China highlights the increasing degree to which hospitals are becoming lucrative targets for information theft.

Already this year, around 150 incidents of lost or stolen personal data -- either due to hacking or ineptitude -- have been reported by medical establishments to the U.S. Department of Health and Human Services.

Pineapple Hacking Device Resembles a Carbon Monoxide Detector

posted onAugust 12, 2014
by l33tdawg

n the world of security penetration testing, researchers often rely on stealth and deception when testing a target. At the Defcon security conference in Las Vegas, a new level of penetration testing deception was demonstrated Aug. 8 with a WiFi hacking device that could be hidden in what appears to be a standard carbon monoxide detector casing.

Why hackers won't be able to hijack your next flight - the facts

posted onAugust 11, 2014
by l33tdawg

Two seasoned pilots, one of whom is a published hacking expert, have been puncturing some of the myths about aircraft hacking at Defcon 22.

Dr. Phil Polstra, professor of digital forensics at Bloomberg University (and a qualified commercial pilot and flight instructor) and "Captain Polly," professor of aviation at the University of Dubuque, explained that there are some very simple reasons why aircraft can't be digitally hijacked.

Researcher snaps a Zeus hacker's photo through his webcam

posted onAugust 8, 2014
by l33tdawg

Security researcher Raashid Bhatt has detailed how to bust the security protections of the Zeus banking trojan allowing him to take a webcam photo of the scammer.

Bhatt (@raashidbhatt) wrote in a technical blog how he reverse-engineered the malware after a scammer attempted to foist the malware on him through a phishing scam claiming that "a person from your office was found dead outside" directing him to open a malicious attachment to verify the victim's identity.