TweakTown NewsRefine News by Category:
[Updated] Here we go again. Anonymous plan to take Facebook down on January 28 as part of what they are calling Operation Global Blackout Part 2. The voiceover on the video claims responsibility for the recent attacks on CBS, Warner Brothers and the FBI.
In the video, viewers are encouraged to be part of the "first official cyber war and help bring Facebook down". Why is Facebook being targeted? Your guess is as good as mine. Maybe because taking down Facebook would get everybody to stand up and listen.
Anonymous are recruiting people to download their "Low Orbit Ion Cannon" (LOIC), which is an open source network stress testing and denial-of-service attack application. The video goes on to explain how to use the app to attack Facebook but points out that if done randomly, it won't work as Facebook has over 60,000 servers across the world.
Last Friday, a group of purportedly Gazan hackers defaced Israel's Fire and Rescue Services website. They didn't just do any old hack, but added a "death to Israel" message on the website and a tweaked picture of Israel's Deputy Foreign Minister, Danny Ayalon, where they superimposed foot prints over his face.
Ayalon is the public official responsible for a strongly worded statement denouncing hacking, likening it to terrorism and threatening (bad move) that:
Israel has active capabilities for striking at those who are trying to harm it, and no agency or hacker will be immune from retaliatory action.
Now, I'm sure you can imagine that the hackers were not happy with Ayalon's choice of words. The statement was made as a response to a cyber attack against Israel where hackers claimed to have taken 400,000 "Zionist" credit cards, including addresses, names and Israeli ID numbers (like Social Security). It has been reported that at least several thousand of those credit card numbers were verified as legitimate cards.
First up - this does not surprise me. I've thought for a very long time that this happens, as with most things, right under our noses and no one even knows. I'm sure it goes much deeper than this, and we'll never find out just how deep the rabbit hole goes, but on with the news. A group of Indian hackers known as "The Lords of Dharmaraja" had posted documents that were pillaged during the hack of an Indian military network. It was removed, but thanks to Google Cache, you can see an image of it below, and if that's not good enough, click here to read it directly.
Slashdot had reported on it too, and unveils some more info:
The memo suggests that, "in exchange for the Indian market presence" mobile device manufacturers, including RIM, Nokia, and Apple (collectively defined in the document as "RINOA") have agreed to provide backdoor access on their devices. The Indian government then "utilized backdoors provided by RINOA" to intercept internal emails of the U.S.-China Economic and Security Review Commission, a U.S. government body with a mandate to monitor, investigate and report to Congress on 'the national security implications of the bilateral trade and economic relationship' between the U.S. and China.
Anonymous don't rest during the holidays like most people, they've donned their Santa hats and hacked their way into thousands of credit card numbers and other personal information belonging to clients of a U.S.-based security think tank, Stratfor.
One of the hackers said their goal was to take the funds from individuals' accounts to give away as Christmas donations. Anonymous boasted of stealing Stratfor's confidential client list, which includes entities including Apple, the U.S. Air Force, to where Dexter Morgan works, the Miami Police Department. They mined it for more than 4,000 credit card numbers, passwords and home addresses.
Stratfor is an Austin, Texas-based company which provides political, economic and military analysis to help clients reduce risk, according to their YouTube page. They charge subscribers for its reports and analysis, which are delivered through the web, e-mail and videos.
U.S. cyber security analysts and experts are reporting that fewer than 12 different Chinese groups are responsible for most of the China-based cyber attacks that have resulted in critical data being stolen from U.S. companies and government agencies. The analysts spoke to The Associated press where they've said the intrusions have resulted in the loss of billions of dollars of intellectual property and other critical data.
The attacks may have been stealthy, agressive and somewhat ninja, but the distinct signatures the hackers leave behind make it possible for U.S. cyber security investigators to more or less accurately identify which teams were responsible for the attacks. According to the report, the U.S. gives unique names or numbers to the attackers, and at times can tell where the hackers are and even who they may be.
Teampoison are reportedly behind an intrusion into the United Nations, in which they gained access to at least one of the UN's servers, where they stole over 1,000 e-mail addresses, usernames and passwords during the hack.
Teampoison posted their hacked goodies online through Pastebin, along with messages explaining the reasoning behind the attack, where they've said:
A Senate for Global Corruption, the United Nations sits to facilitate the introduction of a New World Order and a One World Government as outlined by Brock Chisolm the former Director of UNWHO.
Airport body scanners that use X-ray technology have been banned across Europe. Officials have said in a press release that the X-ray technology is now deemed off-limits in order to not risk jeopardizing citizens' health and safety.
Tiny bits of radiation emits from X-rays and have long since been connected to cancer in rare instances by physically damaging DNA. In a letter to ProPublica from the FDA, the agency claims that the risk of fatal cancer from scanners is 1 in 400 million.
Another report from ProPublica says that anywhere between six and 100 US airline passengers could develop cancer each year from walking through the machines. The TSA has responded to the EU's decision to ban the X-ray scanners, revealing that 300 dangerous or illegal items have been found on passengers by using the X-ray scanners. One would think that over the entire course of years using the scanners that finding 300 dangerous or illegal items, is worth the better chance of not getting cancer from the scanners?
Intel and MasterCard join forces, want to enhance security and consumer payment experience for online shopping
Intel and MasterCard have just shaken hands on a new deal for a multi-year strategic collaboration to further enhance the security and consumer payment experience for online shopping. The new collaboration is set to combine MasterCard's expertise in payment processing and commerce with Intel's strengths in silicon innovation and chip-based security.
The deal will provide more options for a safer and simpler checkout process for online merchants and consumers using Ultrabook devices and future generations of Intel-based PCs. Intel and MasterCard are working together to optimize a variety of emerging payments technologies which include MasterCard's PayPass and Intel Identity Protection Technology (IPT). IPT can enable consumers to use strong two-factor authentication and hardware-based display protection.
A few days ago I reported about the Steam forums being down for "maintenance", but today Valve have confirmed that a recent Steam hack is the result of this. The recent Steam hack may have compromised users' credit card details and other personal information according to a message sent to Steam users from Valve God, Gabe Newell.
Valve is certain hackers gained access to a database that contained encrypted information, but don't know if they took it or will be able to crack its encryption. The database that was hacked contained information such as user names, hashed and salted passwords, game purchases, e-mail addresses, billing addresses and encrypted credit card information.
Gabe says that Valve don't have evidence that the encrypted credit card numbers or personal info were taken by the intruders, and the company is "still investigating." He adds that there is also no evidence of credit card misuse, but implores Steam users to "watch your credit card activity and statements closely."
The Office of the National Counterintelligence Executive have released a critical report labeling China as the "most active an persistent" country in the world when it comes to cyber-espionage. Oh snapz is what our VGA editor would say, and I would agree with that statement. Russia also slipped into the list, together with China are "the most aggressive collectors" of U.S. trade secrets, overall.
The purpose of the report is to highlight the increasing importance cyber-espionage plays in the undermining of both private and government interests. Robert Bryant, the U.S. Counterintelligence Executive, claims cyber-espionage is a "national, long-term strategic threat to the United States" and that "failure is not an option" when it comes to dealing with those matters. In the report, there is a special focus on the undesirable consequences stolen trade secrets may impart upon the U.S. and partner economies.