The satirical Onion news website wrote a legitimate post-mortem describing how it was compromised by the Syrian Electronic Army.
Browsing Category: Hacks
The attack that employed compromised Apache Web server binaries is turning out to be more complex than originally thought, as researchers now have found that the attackers also are using Trojaned Nginx and Lighttpd binaries as part of the campaign.
In its annual report to Congress detailing the capabilities of and threats from China, Pentagon officials spend dozens of pages explaining the People’s Liberation Army’s strengths and weaknesses in each area, from nuclear weapons to artillery to information warfare. It reads the way you would expect, written as it is by a committee of military officials.
Calls for Twitter to implement two-factor authentication would not have prevented the hijacking of the Associated Press account last week, experts said. Meanwhile, a new tool for detecting compromised social network accounts called COMPA, could provide a measure of early detection.
A company known for burying bad information to improve its customers’ online images let everyone know this week its network was hacked. Reputation.com sent e-mails to thousands of customers in more than 100 countries to let them know of the attack.
On Friday, Jay Freeman announced on Twitter that he exploited a known vulnerability and subsequently achieved root access to his developer-model of Google Glass – Google’s highly anticipated, wearable, head-mounted computer.
Dennis Fisher talks with Chris Hoff of Juniper Networks about his childhood scaring sheep on a farm in New Zealand, his early days hacking on the first wave of personal computers, his misadventures in a college computer lab and how he ended up as an itinerant security guy.
Two elders of information security came to Source Boston 2013 Wednesday morning to encourage the next generation to grab the torch from them and to urge great caution in diving too deeply into specialization.
The attackers who compromised Web hosting provider Linode used a zero day vulnerability in Adobe ColdFusion and were able to access the company’s database, source code and customers’ credit card numbers and passwords. The company said that the customer credit card numbers were encrypted, as were the passwords, but it forced a system-wide password reset after the attack was discovered.
Months of distributed denial of service attacks against major U.S. banks have evolved in magnitude and ferocity causing service disruptions for online banking customers. They’ve also shown the way for other attackers to adapt and evolve techniques used in those attacks.