Skip to main content

Hackers

Two Middle East hackers qualify for Global CyberLympics Finals

posted onSeptember 19, 2013
by l33tdawg

Two Middle East ethical hackers from Help AG, a regional information security consulting company, have qualified to participate in the World Finals of the Global CyberLympics, an EC-Council Foundation initiative supported by the United Nation’s International Telecommunications Union (ITU).

Chinese hacker group Hidden Lynx, on mission to collect corporate data

posted onSeptember 17, 2013
by l33tdawg

Researchers believe that a group of “hackers for hire” based out of China are linked to numerous high-profile attacks on U.S. companies, including those against Google and security firm Bit9.

On Tuesday, Symantec released findings that a network of sophisticated attackers, dubbed the “Hidden Lynx” group, has been active since at least 2009 and continues to target organizations in the U.S. and in many other countries.

'Don't Travel Abroad' Russia warns Hackers

posted onSeptember 9, 2013
by l33tdawg

The Russian government has warned hackers not to set foot outside its borders, as they risk being kidnapped by US authorities and taken to the US to face legal proceedings.

The Russian Foreign Ministry last week advised citizens, especially those suspected of committing crimes by the United States, not to leave Russia for countries with extradition treaties with the US, Wired reports.

Hacker Admits to Selling Access to US Energy Department Computers

posted onAugust 29, 2013
by l33tdawg

Andrew James Miller, 24, of Pennsylvania, US, has admitted to selling access to the computer systems of various high-profile organizations. Under the plea agreement he has made with authorities, he faces up to 18 months in prison.

According to court documents obtained by Wired, Miller, who used the online moniker “Green,” was part of a hacking group known as the Underground Intelligence Agency.

NYT, Twitter, Huffington Post hacked by pro-Syria group

posted onAugust 28, 2013
by l33tdawg

 The websites of the New York Times, the Huffington Post and Twitter were hacked by a group known as the Syrian Electronic Army which posted messages supporting the embattled Syrian President Bashar al-Assad.
 
"Our website was unavailable to users in the United States for a period of time yesterday. The outage was the result of an external attack on our domain name registrar, and we are at work on fully restoring service," The NYT said in a message posted on its website.
 

Hackers Target Java 6 With Security Exploits

posted onAugust 27, 2013
by l33tdawg

Warning to anyone still using Java 6: Upgrade now to Java 7 to avoid being compromised by active attacks.

That alert came via F-Secure anti-malware analyst Timo Hirvonen, who reported finding an in-the-wild exploit actively targeting an unpatched vulnerability in Java 6 following the recent publication of related proof-of-concept (POC) attack code. The Java runtime environment (JRE) bug (CVE-2013-2463), was publicly revealed when Oracle released Java 7 update 25 in June 2013, which remains the most recent version of Java.

Hacked wireless baby monitor lets pervert spy on and cuss at baby girl

posted onAugust 15, 2013
by l33tdawg

If someone messes with you, that’s one thing, but if someone messes with your kids? Now imagine remote attackers going beyond secretly eyeing the inside of your house via your wireless camera, to spying on and cursing at your child via the wireless baby monitor.Hacked wireless baby monitor lets pervert spy on and cuss at baby Oh it's on then; time to open a can of whoop-ass and bring it to the perverted voyeur.

Letting companies strike back at computer hackers is a bad idea

posted onAugust 9, 2013
by l33tdawg

SECURITY experts like to say that there are now two types of company: those which know they have been hacked and those which have been hacked without realising it. An annual study of 56 large American firms found that they suffered 102 successful cyber-attacks a week between them in 2012, a 42% rise on the year before. Rising numbers of online attacks are stoking a debate about how best to combat cyber-crooks.