Skip to main content

Hackers

Hacker finds flaw in hotel locks, can ruin your vacation with $50 DIY gadget

posted onJuly 25, 2012
by l33tdawg

The next time you stay in a hotel room, run your fingers under the keycard lock outside your door. If you find a DC power port there, take note: With a few hacker tricks and a handful of cheap hardware, that tiny round hole might offer access to your room just as completely as your keycard.

Black Hat draws world hacking gang – and Apple – to Sin City

posted onJuly 25, 2012
by l33tdawg

The 2012 Black Hat conference is kicking off in Las Vegas, and this year's session will see Apple presenting for the first time, as well as a reunion of some of the team behind the first briefings 15 years ago.

Black Hat, and the associated DefCon sessions which follows it, is probably the largest collection of hardcore computer security experts on the planet, and features the latest updates on hacking opportunities and serious vulnerabilities. Nearly 10,000 people are expected to attend and share or use the knowledge gleaned to protect – or crack – systems.

Is Hacking in Self-Defense Legal?

posted onJuly 24, 2012
by l33tdawg

When Robert Clark meets with large corporations and government agencies that have been hacked, many express the same feeling. They want revenge.

But the impulse to strike back is fraught with legal danger, said Clark, operational attorney for the U.S. Army Cyber Command, who plans to deliver that message on Thursday in a speech at the Black Hat security conference in Las Vegas.

Fear of drone GPS hacking raised by Congress as FAA deadline looms

posted onJuly 23, 2012
by l33tdawg

In a House Homeland Security oversight subcommittee hearing late this week, members of Congress raised concerns over the potential security risks posed by jamming and electronic hijacking of unmanned aerial systems, and the potential use of drones by terrorists.

The hearing came as the deadline looms for the FAA to devise regulations and licensing that incorporate unmanned aerial vehicles (UAVs) into the national airspace. And the agency is in the process of approving six test sites for UAV operations to help prepare for the full introduction of UAVs in 2015.

Estonian hacker sentenced for Dave and Buster's card theft

posted onJuly 20, 2012
by l33tdawg

A member of hacking ring that embarked on a daring cyber crime spree from 2005 to 2008 has been sentenced to seven years in prison, federal prosecutors announced Wednesday.

Aleksandr Suvorov, 28, of Estonia admitted in May 2009 that he had helped infiltrate computer networks run by the Dave & Buster's restaurant chain, from which hackers stole roughly 80,000 credit and debit card numbers at 11 locations.

Pentagon to recruit Russian hackers

posted onJuly 19, 2012
by l33tdawg

The U.S. government has a plan to put the skills of the best hackers in the world to work fighting terrorism and designing security systems for government agencies. John Arquilla, an adviser to U.S. President Barack Obama’s and the man who coined the term “cyberwarfare” told the UK’s Guardian newspaper that the U.S. Defense Department plans to hire about 100 hackers, primarily Russians for the initiative.

Hacker claims breach of 50,000 accounts from Wall Street IT recruiting firm

posted onJuly 19, 2012
by l33tdawg

A hacker today claimed to have broken into ITWallStreet.com, a website for IT professionals who are seeking Wall Street jobs or working with Wall Street firms, and exposed highly detailed data belonging to tens of thousands of job applicants.

As many as 12 data files containing detailed information on job applicants were publicly posted today after they had apparently been accessed from an ITWallStreet database by a hacker who's a member of a group called TeamGhostShell.

Hackers Have 20 Percent Of Microsoft Login Credentials

posted onJuly 17, 2012
by l33tdawg

Security experts continue to hammer home the point that reusing login credentials across multiple sites is a bad thing, but now Microsoft gives us an insight into just why it is so bad to reuse passwords.

According to Microsoft Account group manager Eric Doerr, hackers have access to some 20 percent of all Microsoft account system (formerly Windows Live ID) logins, which cover services such as Hotmail, Messenger and SkyDrive. These logins have not been compromised from the Microsoft server, but are instead based on login information leaked from other sites.

Jon Oberheide says latest Android will be "pretty hard" to exploit

posted onJuly 17, 2012
by l33tdawg

In an analysis published Monday, security researcher Jon Oberheide said Android version 4.1, aka Jelly Bean, is the first version of the Google-developed OS to properly implement a protection known as address space layout randomization. ASLR, as it's more often referred to, randomizes the memory locations for the library, stack, heap, and most other OS data structures. As a result, hackers who exploit memory corruption bugs that inevitably crop up in complex pieces of code are unable to know in advance where their malicious payloads will be loaded.