Skip to main content

Home/ Advanced Concepts Team/ Group items matching "hacking" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
LeopoldS

Operation Socialist: How GCHQ Spies Hacked Belgium's Largest Telco - 4 views

  •  
    interesting story with many juicy details on how they proceed ... (similarly interesting nickname for the "operation" chosen by our british friends) "The spies used the IP addresses they had associated with the engineers as search terms to sift through their surveillance troves, and were quickly able to find what they needed to confirm the employees' identities and target them individually with malware. The confirmation came in the form of Google, Yahoo, and LinkedIn "cookies," tiny unique files that are automatically placed on computers to identify and sometimes track people browsing the Internet, often for advertising purposes. GCHQ maintains a huge repository named MUTANT BROTH that stores billions of these intercepted cookies, which it uses to correlate with IP addresses to determine the identity of a person. GCHQ refers to cookies internally as "target detection identifiers." Top-secret GCHQ documents name three male Belgacom engineers who were identified as targets to attack. The Intercept has confirmed the identities of the men, and contacted each of them prior to the publication of this story; all three declined comment and requested that their identities not be disclosed. GCHQ monitored the browsing habits of the engineers, and geared up to enter the most important and sensitive phase of the secret operation. The agency planned to perform a so-called "Quantum Insert" attack, which involves redirecting people targeted for surveillance to a malicious website that infects their computers with malware at a lightning pace. In this case, the documents indicate that GCHQ set up a malicious page that looked like LinkedIn to trick the Belgacom engineers. (The NSA also uses Quantum Inserts to target people, as The Intercept has previously reported.) A GCHQ document reviewing operations conducted between January and March 2011 noted that the hack on Belgacom was successful, and stated that the agency had obtained access to the company's
  •  
    I knew I wasn't using TOR often enough...
  •  
    Cool! It seems that after all it is best to restrict employees' internet access only to work-critical areas... @Paul TOR works on network level, so it would not help here much as cookies (application level) were exploited.
Paul N

Hacking Team Breach Shows a Global Spying Firm Run Amok | WIRED - 1 views

  •  
    Few news events can unleash more schadenfreude within the security community than watching a notorious firm of hackers-for-hire become a hack target themselves. In the case of the freshly disemboweled Italian surveillance firm Hacking Team, the company may also serve as a dark example of a global surveillance industry that often sells to any government willing to pay, with little regard for that regime's human rights record. Scroll down for the commercial. :)) Funny that when I keep complaining about privacy and monitoring, people still point and laugh.
  •  
    And the direct link to the whole stash: https://ht.transparencytoolkit.org/ Their admin kept a plain text file with passwords on his desktop. Maybe they should have hired someone to do an audit :) More importantly, from the files it follows that this company found and exploited yet another vulnerability in Flash. So the current round of plugin/browser updates is thanks to this hack :)
  •  
    The vulnerability only seemed to affect some of the more recent versions. Maybe from time to time we should downgrade flash to avoid them :))
ESA ACT

hacker video - historic - 0 views

  •  
    nice video how hacking started with telephones ...
ESA ACT

RFID credit cards easily hacked with $8 reader - Engadget - 0 views

  •  
    nice laptop btw ...
Aurelie Heritier

How one scientist hacked another scientist's brain - 3 views

  •  
    University of Washington researchers have proved that it's possible to use one's thoughts to remotely control another person's body movements.
Thijs Versloot

Hacking your 3D printer (video) - 0 views

  •  
    Why print stuff if you can turn it into an amazing air hockey table! Note, you will probably keep losing...
LeopoldS

http://www.eecs.umich.edu/~valeria/research/publications/DATE10RSA.pdf - 1 views

  •  
    nice ... hacking a 1024-bit RSA key in 100 hours .... Francesco will like this one
pacome delva

Commercial quantum cryptography system hacked - 0 views

  • quantum cryptography, according to some engineers, is not without its faults. In a preprint submitted late last week to arXiv, Hoi-Kwong Lo and colleagues at the University of Toronto, Canada, claim to have hacked into a commercial quantum cryptography system by exploiting a certain practical “loophole”.
Dario Izzo

Turning Microsoft's $150 Kinect Into a $50,000 Piece of Surgical Equipment | Popular Science - 3 views

  •  
    We must enter thr kinect hacks business!! We will hear a lot about this technology in 2011
LeopoldS

The Next Hacking Frontier: Your Brain? | Wired Science | Wired.com - 0 views

  •  
    here we go with the next frontier for hackers .... we should have added a chapter on it on our BMI book :-)
ESA ACT

Baha Tanju's Page / My Hacks - 0 views

  •  
    this is what we will really need for the aquarium ....
Juxi Leitner

ESA Servers Hacked - 11 views

  •  
    uups :)
  • ...4 more comments...
  •  
    whoops indeed
  •  
    sounds really bad ... how bad is it???
  •  
    Heads will fall in ESRIN... And now I know who crashed my computations on sophia ;-) [Edit] A lesson for everyone: look at the file with email passwords and see how many you are able to guess even though they're supposed to be scrambled by removing a middle part... [Edit] And a hilarious quote from the hacker's "about me": "I had another blog, more exactly www.tinkode.baywords.com but I forgot the password, so now I created this one."
  •  
    got the reply from IT security today: they had dealt with apparently the very same day and all under control :-)
  •  
    Well, I wouldn't expect a reply: "all our past emails have been downloaded and sold to NASA" even if that was the case.
  •  
    Of course Marek is right... What matters is the theatre of security, not security itself. Just like in airports :)
jcunha

Malware that turns PCs into eavesdropping devices demonstrated - 2 views

  •  
    In Israel, a new way to hack by turning speakers into microphones.
Marcus Maertens

Randall Munroe Finally Finishes His 3,099 Panel xkcd Magnum Opus "Time" | Geekosystem - 3 views

  •  
    Randall Munroe is simply the best.
  •  
    Yeah I remember this comic was tough to hack... With Click and Drag it was peanuts to download all the tiles once you figured out the file name pattern, but with this one some strange server-side event thing was used to feed the images at random time intervals... Nice to be able to see it all finally!
Joris _

Kinect Steers Quadrocopter Drone to Search and Destroy | Popular Science - 0 views

Juxi Leitner

Data Nerds Hack NASA - in a Good Way | Wired Science | Wired.com - 0 views

  • The event is just one of dozens this weekend being promoted by the Sunlight Foundation as part of its Great American Hackathon. Each one is being organized by volunteers who want to make government data easier to access and more useful to the public. In Pittsburgh, the hackers will be working on making stimulus spending easier to understand. In Boston, the Massachusetts Department of Transportation data will be the focus.
Luzi Bergamin

Impulse Januar 2010 (WebTV, NZZ Online) - 2 views

  •  
    Quite funny and interesting (even though I'm not known as a fan of those "gurus".) Site is in German, but interview in English.
1 - 20 of 25 Next ›
Showing 20 items per page