Skip to main content

Hackers

How hackers used Google in stealing corporate data

posted onAugust 8, 2014
by l33tdawg

A group of innovative hackers used free services from Google and an Internet infrastructure company to disguise data stolen from corporate and government computers, a security firm reported.

FireEye discovered the campaign, dubbed Poisoned Hurricane, in March while analyzing traffic originating from systems infected with a remote access tool (RAT) the firm called Kaba, a variant of the better known PlugX.

Massive Russian hack has researchers scratching their heads

posted onAugust 7, 2014
by l33tdawg

Don’t worry, you’re not the only one with more questions than answers about the 1.2 billion user credentials amassed by Russian hackers.

Some security researchers on Wednesday said it’s still unclear just how serious the discovery is, and they faulted the company that uncovered the database, Hold Security, for not providing more details about what it discovered.

Russian hackers amass 1.2B stolen Web credentials

posted onAugust 6, 2014
by l33tdawg

Criminals in Russia have amassed a huge database of 1.2 billion stolen user names and passwords and half a billion email addresses, a U.S.-based Internet security company said Wednesday.

The data, believed to be the single biggest horde of stolen Internet identity information ever collected, was garnered from attacks that reached into every corner of the Web and hit around 420,000 sites, said Hold Security.

Hacker Says He Can Break Into Commercial Planes Via WiFi And In-Flight Entertainment Systems

posted onAugust 5, 2014
by l33tdawg

Cyber security researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their WiFi and inflight entertainment systems - a claim that, if confirmed, could prompt a review of aircraft security.

Santamarta, a consultant with cyber security firm IOActive, is scheduled to lay out the technical details of his research at this week's Black Hat hacking conference in Las Vegas, an annual convention where thousands of hackers and security experts meet to discuss emerging cyber threats and improve security measures.

Hackers can tap USB devices in new attacks, researcher warns

posted onAugust 1, 2014
by l33tdawg

USB devices such as keyboards, thumb-drives and mice can be used to hack into personal computers in a potential new class of attacks that evade all known security protections, a top computer researcher has revealed.

Karsten Nohl, chief scientist with Berlin's SR Labs, noted that hackers could load malicious software onto tiny, low-cost computer chips that control functions of USB devices but which have no built-in shields against tampering with their code.

How do hackers breach institutions like Canada's NRC?

posted onJuly 30, 2014
by l33tdawg

Cyberattacks like the one against the National Research Council of Canada are increasing around the world. But by knowing the steps hackers would use for a sophisticated attack, security experts try to gain the upper hand.

"Sometimes in breaches, companies call it a 'highly sophisticated cyberattack' (as the Government of Canada's chief technology officer said in a statement Tuesday) in order to make it seem like they were beaten by the best," Geoffrey Vaughan, a security consultant with Security Compass, told CTV News Channel.

Israel's Iron Dome Blueprints Were 'Stolen by Chinese Hackers'

posted onJuly 29, 2014
by l33tdawg

Blueprints for Israel's sophisticated defence system, Iron Dome, were stolen in cyber-attacks most likely carried out by hackers working for the Chinese military, cyber-security experts have reported.

Over a 22-month period, large quantities of documents and data related to the pioneering anti-missile system were stolen from three leading Israeli defence technology companies, Intelligence firm Cyber Engineering Services Inc. (CyberESI) told journalist Brian Krebs.

StubHub: Hackers Hijacked 1,000 Accounts

posted onJuly 24, 2014
by l33tdawg

The Associated Press reports that hackers were able to access more than 1,000 StubHub accounts. The hackers were then able to use those accounts to buy tickets from the online reseller. The company claims its own security wasn’t actually compromised. Instead, cyber thieves got their hands on user info through other sites before entering using that same account info on StubHub.

British Secret Agents No More Skilled Than An 'Average Hacker'

posted onJuly 16, 2014
by l33tdawg

To any British kid who grew up watching James Bond, it might appear that Her Majesty’s Secret Service is clever enough to defeat any adversary. After the Snowden revelations, many people have changed their mind about whether spies are still the good guys, but it’s almost impossible to shake that English belief that the UK is home to the smartest of all spooks.

Meet ‘Project Zero,’ Google’s Secret Team of Bug-Hunting Hackers

posted onJuly 16, 2014
by l33tdawg

When 17-year-old George Hotz became the world’s first hacker to crack AT&T’s lock on the iPhone in 2007, the companies officially ignored him while scrambling to fix the bugs his work exposed. When he later reverse engineered the Playstation 3, Sony sued him and settled only after he agreed to never hack another Sony product.