The news that the attack on Google in 2009 also compromised a database holding warrants for lawful intercept surveillance on users has raised fears about the security of national security data on private networks. Cyberspionage operations pose a serious threat to national security, and these attacks are increasing. Dennis Fisher spoke with Anup Ghosh of Invincea about the nature of the threat and what can be done to address it.
Browsing Category: Hacks
Investigative reporters for the Scripps news service have been threatened with legal action after informing a telecommunications company that confidential data on tens of thousands of applicants was available on the Internet.
The United States intelligence community and its counterparts in law enforcement are quite secretive about their surveillance methods and the targets of those operations. Few people are privy to information about ongoing surveillance, but now it turns out that the Chinese government may have a better handle on who some of those targets are than the average U.S. citizen or politician does.
Eight members of a New York cybercrime cell have been indicted in a carefully coordinated heist that drained $45 million from thousands of ATMs in less than 24 hours.
The satirical Onion news website wrote a legitimate post-mortem describing how it was compromised by the Syrian Electronic Army.
The attack that employed compromised Apache Web server binaries is turning out to be more complex than originally thought, as researchers now have found that the attackers also are using Trojaned Nginx and Lighttpd binaries as part of the campaign.
In its annual report to Congress detailing the capabilities of and threats from China, Pentagon officials spend dozens of pages explaining the People’s Liberation Army’s strengths and weaknesses in each area, from nuclear weapons to artillery to information warfare. It reads the way you would expect, written as it is by a committee of military officials.
Calls for Twitter to implement two-factor authentication would not have prevented the hijacking of the Associated Press account last week, experts said. Meanwhile, a new tool for detecting compromised social network accounts called COMPA, could provide a measure of early detection.
A company known for burying bad information to improve its customers’ online images let everyone know this week its network was hacked. Reputation.com sent e-mails to thousands of customers in more than 100 countries to let them know of the attack.
On Friday, Jay Freeman announced on Twitter that he exploited a known vulnerability and subsequently achieved root access to his developer-model of Google Glass – Google’s highly anticipated, wearable, head-mounted computer.