Skip to main content

Home/ Fabroa ICS2O/ Group items tagged attacks

Rss Feed Group items tagged

Nicked -

Anonymous Targets Israel by Taking Down Hundreds of Websites and Leaking Emails and Pas... - 0 views

  •  
    Many of us remember the PSN outage of April 2011. Sony blamed 'Anonymous,' a collective hacktivist group formed in 2003 on 4chan, after they found the Anonymous calling card 'We Are Legion' in their system. Anonymous is composed of individuals with the ideals of: 1. Freedom of Information 2. Freedom of Speech 3. Unregulated Internet Anonymous will only attack databases and websites only if provoked, and will not do so for monetary gain. The group has recently engaged in multiple attacks on international government databases. The article, by Casey Chan, is about the Anonymous digital attack on Israel, in retaliation after the Israeli government threatened to shut down Internet access and other telecommunications to the Palestinian people in the Gaza and "Occupied Territories. " The group attacked the Israel Foreign Affairs database and Bank of Jerusalem database, as well as DDos attacks on over 600 sites and theft of over 2000 email addresses and passwords. This attack has generated some controversy. Since the beginning of November, Israel has also received over 150 missile attacks from the Palestinians as well. Anonymous aids the Palestinians by sharing a 'Care Package,' instructions on what to do in the event Israel does sever the Internet connection. Anonymous has become quite influential on the Internet. This illustrates how important the Internet has become. The internet is not only a commodity, but a right to have. It has replaced forms of communication, entertainment, transactions, and more. A group of 'anonymous' users has been formed for the sole purpose of protecting it, with the will and capabilities to punish any party that wishes to disrupt it. As with every conflict, there are sides. Anonymous, in protection of Internet freedoms; and the Israeli government, that has been fighting a war for as long as anyone can remember. Who's side are you on?
Justin Hernandez

Cross-site Scripting Attacks Up 69% - 0 views

  •  
    This articles talks about how a computer security attacking program called Cross-site Scripting (XSS) is being more popular among hackers. As we know, ISC2O which is us, spend our classes on the computers each day. This scripting partially relates to what we do since we have already learned basics of HTML and CSS programming languages. Not to mention, we're leading up to learning about Java Script which is one example of a scripting language such as XSS. There are probably a few of us that have had our own computers attacked(hacked) or put our own secretive information has been put onto the web. Many of us use social networks and sometimes, we display some personal information which can be retrieved by others through using this program. In addition, when we buy different products online, we put out some credit card details that can also be stolen and potentially be used. In addition, the number of cyber attacks can still rise as the holidays come by and eCommerce will increase and can cause more attacks. This relates to Privacy and Security this has to do with social networking as information that's displayed can be stolen and any other personal information can be taken.
marktoniolo

Ukrainian hackers claim takedown of NATO Web sites | Security & Privacy - CNET News - 0 views

  •  
    This week, pro-russian hacking groups have said that they have took down many of NATO's websites. The group that claimed attack was Cyber Berkut a hactivist group. The type of attack was a DDOS attack (distributed-denial of service). The attacks came when Ukraine decided if its Crimea region was to join Russia. The Russian government has also ordered ISP's (internet service providers) to block certain anti-Putin websites. I believe this hacking is just a less violent form of Ukraine vs Russia. I still do not believe why Pro-Russian hackers would interfere with a referendum that would actually co-inside with their very own beliefs.
Lynn Bui

Exclusive: Apple, Macs hit by hackers who targeted Facebook | Reuters - 0 views

  •  
    This article is about how Apple was hacked on Tuesday February the 19th, 2013. Basically, unknown hackers infected some Apple workers computers when they visited a website for software developers This website had been infected with malicious software that was designed to target Mac computers. Some people are saying that the malware could have originated from China, but there is no proof. Some of the malware was distributed through a site aimed at iPhone developers. It might still be infecting visitors who haven't disabled Java in their browser. F-Secure a security firm wrote that the hackers might have been trying to get access to codes for apps on smartphones which would allow them to infect millions of app users. Hackers recently found out a sophisticated way to attack Macs by exploiting a flaw in Adobe Systems Inc's Flash software. What I find very interesting is that the breaches described by Apple mark the highest-profile cyber-attacks to date on businesses running Mac computers. This shows that we should make an effort to protect our information especially since one of the largest technology companies has been breached. With cyber security attacks on the rise, we should all be aware and careful of the sites that we are visiting. Apple workers simply visited a website for software developers and became infected with the virus. The hackers are breaking many laws by hacking Apple, Apple intents to find the hackers with the help of the police.
Nicole Trezzi

Heartbleed: Why the Internet's Gaping Security Hole Is So Scary - 0 views

  •  
    For the longest time we have all felt very safe while on the internet. Even with feeling this security, we should be more cautious with what we put out on the internet because there has been a bug lurking around in the most important security measures for years. Transport Layer Security (TLS) and Secure Sockets Layer (SSL) has been keeping your browing page secure and safe for numerous years and is a huge part of the internet and thankfully it is still working as it should. The problem that we have been experiencing is a software library called OpenSSL has a hole in it that has been there for years called "HeartBleed". OpenSSL allows people to get the protection from TLS/SSL easy and fast and has worked fine just like TLS/SSL but because there has been a minor coding error, malicious people can abuse different versions of OpenSSL and grab information that should originally be secured by TLS/SSL. The main problem that everyone can understand is that all of your personal information is being opened up and placed into the hands of someone who should not have the information. The other problem that this "HeartBleed" has is that the attackers will also get to see how the site that is taking your data indentifies. Not only can they see recent transactions but they can look back at old transactions that have already happened. The worst part about all of this is that none of the attackers leave a trace.Since they leave no trace, it is hard to tell how many websites and people have already been effected by the "HeartBleed". While sites try to fix up the problems it is recommended to change all of your passwords and to keep a close eye on your credit card statement. This bug is a huge problem for our society because absolutely no one is safe because there is no way to know if you've been attacked. The article says that Google, Amazon, and Microsoft hasn't been infected yet so that is at least good. I think that everyone should always be careful with their personal information
Cindy Huang

How Secure Is the Passcode on My Phone? - 0 views

  •  
    Recently, there have been a lot of passcode exploits, especially on the iPhone and Samsun Galaxy. On the iPhone, it can allow the attacker to access their way into the Phone app, letting them place calls, see/edit contacts, and access photos via the "assign new picture" option. On the Samsung Galaxy, the attacker can flash whatever was open before the phone was locked for a second. This is enough time to launch an app, which can be repeatedly downloaded and completely unlock your phone. The article suggests the user of the phone should download the Apple's Find my iPhone app or Prey, which can track the location of your smartphone if it is ever lost or stolen. This, they say is the best protection for your personal information stored on your phone. These passcode exploits can let one worry and doubt how much protection the lock screen actually provides. The truth is they are no more secure than any other password or PIN, which means they can eventually be cracked. However, it is still suggested to always lock your screen, just in case it is robbed by someone who does not know anything about getting around locked screens. Many companies are aware of the issues and is releasing new techniques, like the iOS 6.1.3. Hopefully, with time, these password problems will not be an issue anymore.
jose valenzuela

The Evolution of Anonymous - 0 views

  •  
    This article is about the history of anonymous, and the top ten hacks that made them famous. the group anonymous says that they support the free speech of the internet. Alot of people see anonymous as a group of bad hackers but, they say that they only attack for a reason. Like when they took down the mega upload site anonymous attacked the FBI site to defend the people and to show that there are consequences for taking down a site.
Nicole Trezzi

Apple reportedly working on a device to predict heart attacks | The Verge - 1 views

  •  
    Apple has been successful for many years and have been looking to expand their company into the medical devices and cars categories. With the help of audio engineer Tomlinson Holman, Apple has developed a device that can predict heart attacks by listening to the sound of your blood. Last June the company also announced that they were planning on bringing the iOS into vehicles and earlier this year we got a sneak peak of what these cars might look like. What could leave many people thinking is the thought of this new product making other car models obsolete and if it will take over the world like the iPhones have. The report on these new produces have been very light on detail but we do know that we can look forward to these new devices that can yet again change the world we know of today.
  •  
    what's the connection to careers here?
saintmichaeld

Russia blocks Ukrainian protest websites and social media | The Daily Caller - 0 views

  •  
    The title explains. It's Russia instigating the attack like always! This time on Ukraine. So, instead of letting Russians freely figuring out the state of affairs of their own country and Ukraine by the internet -a widely used resource-, they decide to censor matters related to it. Particularly, Ukranian protest group websites. It's currently unknown why Russia is organizing this attack on Ukraine. Land? (greedy bastards) Rebuilding the USSR? Who knows. I wouldn't call this a crisis just yet, as the USA hasn't made any major moves except a warning to Russia to respect Ukraine's sovereignty. I am totally against internet censorship in all respects, to be honest, so to me Russia is acting ridiculous. A person's right to information is pretty much broken, and that is where the line is drawn for me. Although, I am sure Putin thinks hardly of his citizen's well being, so this is not surprising for Russia.
Farid Manafov

Researchers Release Attack Tool That Cripples Secure Websites | Threat Level | Wired.com - 0 views

  •  
    Researchers have released an attack tool that tests their websites to when they connect through secure connections, not so secure now huh? They call it "The Hacker Choice"
Daniel Le

"Ransomware" Worm Now Spreading On Skype [Update: Skype Advises Users Upgrade Their Sof... - 1 views

  •  
    With the popularity of social media growing rapidly everyday, so are the number of ways people are trying to steal your information. One such case is the Dorkbot or Ransomware worm that has previously attacked Facebook and Twitter has now began spreading through Skype. Criminals using Dorkbot infect it into computers through sending innocent-looking links to victims. Once a victim clicks the link, the worm blocks all files on the victim's computer from use  and uses these files as ransom for a set amount of money. Should the victim refuse to pay the ransom, all the files will be deleted.  This article shows that as easy as it is for our computer to collect data, it can just as easily have this data stolen, all it takes is a single opened link. It is always stressed to never open links that seem suspicious, yet many people will open links without any regard for their data. I think it's very low how online criminals will stop at nothing to find sneaky ways to steal other people's information and their money. Are they so lazy to make money on their own that they will just leach off of people who worked hard to make money to support themselves? People who don't take precautions while browsing the Internet are just as at fault as the criminals who plague the web. Since people are caring less about the safety of their data as the number of cyber criminals increases, it will be inevitable that web browsers will have to increase security or the government will have to make an effort to track down cyber criminals and set laws to punish cyber criminals more harshly.
Spider Man

CISPA is back. - 0 views

  •  
    CISPA (cyber intelligence sharing and protection act) is back into congress and threatens to internet privacy if passed. The bill allows the government, private security agencies, and private companies to access about a "cyber threat". These cyber threats are defined by any attack on government systems and networks, and the "Theft or misappropriation of private or government information, intellectual property, or personally identifiable information." This can mean things such as music, programs, games, etc. With this bill, the government and companies can anonymously take your information without any legal consequences. Your information can then be shared or sold. This is a direct violation of the 4th amendment, as it is similar to a search without a warrant. In summary, this bill grants the government and companies access to your information without any cost or legal risk.
Daniel Carriere

Silent Circle: Mike Janke's iPhone app makes encryption easy, governments nervous. - Sl... - 0 views

  •  
    New "surveillance--proof" app, Silent Circle has been released providing an easy way for people to text and call people without anyone else ever knowing what has been said, including ISPs and governments. This app makes sure no one can eave drop on your personal business by using what's called encryption. Encryption is the process of changing data into a secret code, the secret code can then only be read by the device you are trying to communicate with. The encryption codes are randomly generated each time the app is used so it is almost impossible to crack the code. This app is can be used on iOS and is currently in development for other devices and platforms as well. Some feel that free communication should be a right, but governments must be feeling a little bit nervous about this app. I chose the tag "privacy and security" because this article is about how Silent Circle has given people an easy way to speak in a secure and private environment without any intervention from anyone else other than the communicators. In my opinion I feel that free communication is important, but people will abuse this through using this app to possibly deal drugs, plan terrorist attacks, or other illegal activities. Who knows, maybe even the government controls this network to monitor people who use it, but that is just a theory.
Dragos Penelea

How to Crack a Wi-Fi Network's WPA Password with Reaver - 1 views

  •  
    This post is on cracking Wi-Fi WPA passwords with "Reaver." Many people know that cracking a WEP password is fairly easy, so they use the more bulletproof WPA security protocol. Reaver is a program that exploits a security hole in wireless routers and can crack most routers' passwords with relative ease. First off, you will need the BackTrack 5 Live DVD. Download the Live DVD from BackTrack's download page and burn it to a DVD. Next, you need a computer with Wi-Fi and a DVD drive. Lastly, you need a nearby WPA-secured Wi-Fi Network. Using four steps you can hack into a WPA Wi-Fi Network. Step 1: Boot into BackTrack, Step 2: Install Reaver, Step 3: Gather the Router's information, and Step 4: Crack the WPA password to the Wi-Fi Network. Now I will explain how you can protect against Reaver attacks. Since the vulnerability lies in the implementation of WPS, your network should be safe if you can simply turn off WPS (or, even better, if your router doesn't support it in the first place), however Reaver may still be able to crack your password, even with WPS manually turned off. You could also set up MAC address filtering on your router (which only allows specifically whitelisted devices to connect to your network), but a sufficiently savvy hacker could detect the MAC address of a whitelisted device and use MAC address spoofing to imitate that computer. The good news is that there is a way to surely protect against Reaver. You can get the open-source router firmware DD-WRT installed on your router. Reaver has been tested on routers with this firmware and it was not able to crack the password. As it turns out, DD-WRT does not support WPS, so there's yet another reason to love the free router-booster.
ecaterina smirnov

South Carolina - State Computer System Is Hacked - NYTimes.com - 0 views

  •  
    This article is about South Carolina which had a hacker break into the state's computer system. It was said that a hacker from another country staged several attacks on the State Department of Revenue since August. This exposed 3.6 million social security numbers and 387,000 credit and debit card numbers and all but 16,000 of the credit card numbers are protected by encryption, but hackers can decrypt them. People that filed tax returns since 1998 are to contact state law enforcement officials to prevent identity theft. They still haven't found the hacker. This article relates to Privacy and Security as well as legal issues because it deals with hacking important information profiles of people such as their credit card numbers and social security numbers. As well as creating a possibility for identity theft.  This could create lots of problems for people and the government because of a hacker. It is times like these where we think how we can tighten security for these things stored on the computer? We also think is it just best to stay away from technology for these matters, because of moments like these where mass information that was stored is now exposed.
codrin gherghel

Look at this SCAM EMAILL!!!!!!! - 0 views

  •  
    Dear, Good day to you and your family today. I am sure this mail would be coming to you as a surprise since we have never met before and you would also be asking why I have decided to chose you amongst the numerous internet users in the world, precisely I cannot say why I have chosen you but do not be worried for I come in peace and something very positive is about to happen to your life right now and to the lives of others through you if only you can carefully read and digest the message below. The internet has made the world global villages where you can reach anybody you have not met before. Before I move further, permit me to give you a little of my biography, I am Mother Mrs. Maria Scoular Norman, 87 Years old woman and the wife of Late Sir Milne Robert who died in a Plane crash on Monday the 7th of September 1998 GMT 14:22 UK while they were flying from New York to Geneva. Please see site below for more information. http://www.cnn.com/WORLD/9809/swissair.victims.list/index.html After the death of my husband I became the Head of his investment and now that I am old and weak I have decided to spend the rest of my life with my family and loved ones whom I never had time for during the course of my business life, but before the death of my husband we had a plan to use the last days of our lives to donate half of what we have worked for to the less privilege and charity homes and the other half for ourselves, family members and close friends, and it is so unfortunate that my husband is not alive today to do this with me and I am very weak and old now, hence I have decided to do this philanthropic work on behalf of my late husband and I. Presently, I have willed out almost half of our assets to several charity homes and to some of the less privilege in different countries. Despite the agreement between my late husband and I to give aid to the deprived, we also agreed to render support to an individual we have not meet before in life due to the fact when
  •  
    continuation........ we were still young in life we receive an anonymous help from an individual we did not know and which we have not being able to know till date, the impact we got from such gesture made us to do same. I am sorry to inform you that you will never have the chance to know me because I have just concluded the assignment which my husband and I have agreed upon before his sudden death and you happened to be the beneficiary of our last WILL, irrespective of your previous financial status, hence I need you to do me a favor by accepting our offer that will cost you nothing. I have presently deposited a Cheque in the sum of 5,800,000.00 British Pound with DHL Express to deliver to you, what you have to do now is to contact the My Attorney as soon as possible so that he can go the delivery company to know when they will deliver your package to you because of the expiring date. For your information, I have paid for the delivering Charge, Insurance Premium and Clearance Certificate Fee of the Cheque showing that it is not a Drug Money or meant to sponsor Terrorist attack in your Country. You have to contact the DHL COURIER SERVICE now for the delivery of your cheque with this information bellow; Contact Person: Mr. Ronald Gates Email: dhlparcelsdelivery@gmail.com Tel: +44 703 199 2133 Again, you are not to pay for the delivering Charge, the Insurance premium and the Clearance Certificate Fee of the Cheque because I have already paid for them, the only money you are expected to pay is 160 Great British Pounds for the security keeping of the cheque so far. I would have paid the fee but the company insisted that I should not because they don't know when you will be contacting them and to avoid demurrage or further cost. You are to reconfirm the below information to them to avoid any mistake on the Delivery. Postal address; Full Names: Direct telephone number; Below is the security keeping code: (FED/0433/SKC) of you draft, you are to also pr
Alyssa Ayade

Hackers Will Replace Terrorists as Top Threat, Says FBI - 0 views

  •  
    As the title states, hacking will soon be a top threat over terrorists. Hacking is a big deal because the people who do hack are able to take data - especially important data - from their sources and use it for their own benefit. For businesses, this is highly critical because just like that, any ideas you may have stored on computers could be gone and in the hands of others. Also, hacking might not be just for stealing data but also inputting viruses into other computers. In the US, two bills are being set to beef up the security of government networks to be protected from any cyber attacks. 
  •  
    scary, but true
Nicole Trezzi

Why Daylight Saving Time Is Pointless - 0 views

  •  
    Daylight saving time might say that it helps make our lives nicer and help us save energy, but in reality it is completely pointless. Daylight Saving Time was actually first suggested by Benjamin Franklin in 1784 but the idea was shot down by everyone stating that it was pointless. The Germans then used it the First World War to save coal during war time. After that everyone started using it and didn't think to change back. Today, people state that this change of time helps to save energy, promotes a healthy lifestyle, and reduces traffic accidents. First off, Daylight saving time does not in fact save energy. Recent studies show that it might reduce the US electricity usage during March and April, but only by 1%. Secondly, this does not help us to become any healthier. In fact, the clock shifts disrupt our circadian rhythms and actually spike the suicide rates and increases the number of recorded heart attacks. Daylight saving time also does not reduce traffic. Some studies show that the time change makes no difference at all while others suggest that traffic is reduced by 0.7 which is pathetic and makes no difference. I personally do not like Daylight saving time only because I loose an hour of sleep and it screws up my whole schedule because everything is off by one hour. I much prefer the clocks changing an hour behind so I get an extra hour of sleep.
Michael Cambare

Skynet Alert! US Military Drones Infected By Mysterious Virus - 0 views

  •  
    Military drones based in Pakistan have been hacked this week by an unknown source. They have yet to turn on their masters and the hacking has been so far benign. The question is, who is doing the hacking? This outlines the government's susceptibility to computer attack. Their ignorance and dependance on conventional warfare will fire back at them one day.
Elezabeth Lee

Man Assaults Wife for Not "Liking" His Facebook Update - 0 views

  •  
    Kind of funny from this perspective, here's the story: it all went down in Texas. 36-year-old Benito Apolinar posts an update, on Facebook, about the anniversary of his mother's death. Tragic enough for one day, right? Wrong. His wife of 15 years made no comment on the post. So what? Well, he allegedly beat her for it. Facebook, do you see what you do to people? And alcohol, as well?
  •  
    Two days ago it has been reported that a 36 year old Texas man attacked his wife for not 'liking' his status on Facebook. Benito made a status update about the anniversary of his mother's death. Angry that his wife made no response he punched her in the cheek and pulled her hair under the influence of alcohol. He was later arrested and is scheduled to appear in court soon. Just how much is Facebook impacting our lives?!
1 - 20 of 27 Next ›
Showing 20 items per page