1
2013
Chinese Hackers get NY Times and Wall Street Journal
Chinese hackers have not been messing around as of late, they have decided to go all out. One day after The New York Times reported that Chinese hackers had infiltrated its computers and stolen passwords for its employees, The Wall Street Journal announced that it too had been hacked. Two of the largest media entities in the US have been attacked, yet our network defense systems have still not been put at the top of […]
31
2013
Twitter turning over personal information
Twitter says it turns over user data to government agencies in the U.S. in 69 percent of the requests made for such information, according to a new transparency report released by the microblogging site. “It’s our continued hope that providing greater insights into this information helps in at least two ways: first, to raise public awareness about these invasive requests; second, to enable policy makers to make more informed decisions,” writes Jeremy Kessel, Twitter’s manager of […]
26
2013
Unlocking Your iPhone Now Illegal
The clock to unlock a new mobile phone is running out. In October 2012, the Library of Congress, who determines exemptions to a strict anti-hacking law called the Digital Millennium Copyright Act (DMCA), decided that unlocking mobile phones would no longer be allowed. But the library provided a 90-day window during which people could still buy a phone and unlock it. That window closes on Jan. 26. Unlocking a phone frees it from restrictions that keep […]
22
2013
Amazon and Your Privacy Don’t Mix
Google has been stealing more and more of your privacy for years, with some simple work arounds, but those were always guesses. Now advertisers have access to not simply what you have looked at, but actually purchased. Google built its $38 billion business selling ads based on how people search and browse the Web. Facebook, too, uses what it knows about its one billion users to sell targeted ads. But when it comes to what many […]
18
2013
Java still not being used by DHS
The Department of Homeland Security says despite some fixes to Java, it continues to recommend users disable the program in their Web browsers, because it remains vulnerable to attacks that could result in identity theft and other cyber crimes. The Computer Emergency Readiness Team, part of the DHS, first took the unusual step last week of issuing an alert, warning users to disable Java, saying the program could be manipulated by criminals to trick users into visiting […]
15
2013
Red October, latest superspy virus
Kaspersky has uncovered a new, far-ranging cyberspying campaign that targets government secrets. The firm has tantalizing named the malicious software behind the attack “Red October,” a nod to the famous Tom Clancy novel. Red October has been attempting to steal critical, secret documents since at least 2007, Kaspersky said in a report posted to its website Monday. It’s designed to defeat a common encryption scheme that’s used by NATO and government agencies, Kaspersky says. It’s also capable […]
4
2013
Cisco Phone Hack
As displayed at the Chaos Communication Conference on December 29th, the most popular Cisco IP phone is vulnerable to an easy hack that allows full control of the phone. This means not only listening to conversations on the phone, but using its mic to listen to what is going on in the room. The hack, demonstrated for NBC News, allows the researchers to turn on a telephone’s microphone and listen in on conversations from anywhere around […]
3
2013
Snapchat and Poke Messages Not So Private
Honestly, I knew little about Snapchat and only recently had begun to research Poke. The idea of message “self destructing” after 10 seconds or so sounded interesting, and as most of you know privacy is kind of a big issue to me (and beginning to be for many on the internet). The only problem is, they may not be so private. First problem I thought of, and at least they had as well, was screen […]
18
2012
Kaspersky freezing computers
So much for Kaspersky being the best computer security out there. I currently use it on all client computers and servers, and it has been great. It uses the least amount of system resources in regards to reliable AV and security out there, but now they have kind of gone down the drain. For the past few years people have had some random freezes, but it was always limited. As of today, I know of […]
17
2012
Westoboro Baptist Church Hacked By Anonymous
As stated before, Anonymous is a hacktivist group that carries out various attacks through DDoS, hacking, website defacement, and various other methods to try and speak out against internet censorship, surveillance, oppressive governments, and other groups/people. A group attached to the online hacktivist group Anonymous claims to have hacked the Web site of the Westboro Baptist Church in response to plans by the controversial church to picket the funerals of those massacred Friday at a […]