UPDATE: Security researchers are warning about the risk posed by an embarrassing security hole in industrial control software by the firm RuggedCom. A hidden administrative account could give remote attackers easy access to critical equipment that is used to manage a wide range of critical infrastructure, including rail lines, traffic control systems and electrical substations.
Browsing Category: Hacks
[img_assist|nid=11043|title=|desc=|link=popup|align=left|width=96|height=37]In what looks like the IT equivalent of the Deepwater Horizon oil spill disaster, purloined data and documents, including source code belonging to the U.S. software firm VMWare, continue to bubble up from the networks of a variety of compromised Chinese firms, according to “Hardcore Charlie,” an anonymous hacker who has claimed responsibility for the hacks.
Data from the Massachusetts Office of Consumer Affairs & Business Regulation (OCABR) shows that 3.2 million residents – almost half the population of the state- have been the victim of a data breach in the last four years.
Italian security researcher Luigi Auriemma was trying to play a trick on his brother when he accidentally discovered two vulnerabilities in all current versions of Samsung TVs and Blu-Ray systems that could allow an attacker to gain remote access to those devices.
Students at MIT took to the university’s Cecil and Ida Green Building over the weekend to transform the 21-story research building into an oversized, playable game of Tetris. Emulating the classic ’80s video game with the help of a console and 153 color-changing LED lights, students were able to rotate and move colored blocks across the building. Like the original puzzle game, once someone lost, all of the colored blocks fell to the bottom of the building.
BOSTON–Accountability, not superior technology, has kept Apple’s iOS ecosystem free of viruses, even as the competing Android platform strains under the weight of repeated malicious code outbreaks, say researchers Dan Guido of the firm Trail of Bits and Michael Arpaia of iSEC Partners.
In a ruling that could be felt throughout the business world, the U.S. Court of Appeals for the Ninth Circuit in California ruled that a man did not violate the Computer Fraud and Abuse Act (CFAA) after pilfering contacts from the client database of his former employer to help jumpstart his competing business venture.
A 21 year-old Ohio man associated with the Anonymous Internet collective is in detention after boasting on Twitter about his involvement in the hack of the Utah Chiefs of Police Association and the Salt Lake City Police Department.
The head of Google’s Web spam team says that the company has pushed warning messages to some 20,000 Web site owners that their sites may be compromised and are performing “weird” redirections, possibly to malicious Web sites.
A 15-year-old who claimed he was bored when he turned to hacking was arrested for breaking into almost 260 companies during the first three months of this year, according to a ZDNet article published earlier today.Austria’s Federal Criminal Police Office said the teenager, who used the hacker handle ACK!3STX, used tools available on the Internet to scan for vulnerable Web sites and publish stolen data. He then bragged about his exploits on Twitter. Victims included sports companies and adult entertainment sites, among many others.