Skip to main content

Home/ IB ITGS/ Group items tagged hacking

Rss Feed Group items tagged

Elvira Russ

PS3: Hacked | DigitalFoundry - 1 views

  •  
    This a detailed description of what George Hotz did to hack the PS3 and what still has to be done. It has quotes from him and discusses the impacts of the hack.
Jeff Ratliff

Criminal hacker 'Iceman' gets 13 years (ComputerWorld) - 0 views

  •  
    A former security researcher turned criminal hacker has been sentenced to 13 years in federal prison for hacking into financial institutions and stealing credit card account numbers. Max Ray Butler, who used the hacker pseudonym Iceman, was sentenced Friday morning in U.S. District Court in Pittsburgh on charges of wire fraud and identity theft. In addition to his 13-year sentence, Butler will face five years of supervised release and must pay US$27.5 million in restitution to his victims, according to Assistant U.S. Attorney Luke Dembosky, who prosecuted the case for the federal government. Dembosky believes the 13 year sentence is the longest-ever handed down for hacking charges.
anonymous

Israeli website was hacked and pictures of wounded Palestinians - 0 views

  • Attackers on the official Kadima website posted images of wounded Palestinians and the aftermath of suicide bombings in Israel.
    • anonymous
       
      Internet system because it involves hacking into a website
  • According to AP news agency, the hacked web page was signed Gaza Hacker Team.
    • anonymous
       
      Secutiry and privacy, this shows that those things were violated.
  • Kadima, a centrist political party that favours a two-state solution to the Middle East conflict, is the largest party in the Israeli parliament. It was unable to form a government, and is currently in opposition.
    • anonymous
       
      Shows policital issues between the two states and how they have technology helps create more effects.
Omkar Naik

Hacking firms one click ahead of law - 0 views

  • For $US100, the website provided Cioni, then living in northern Virginia, with the password to her boyfriend's AOL email account. For another $100, she got her boyfriend's wife's password. And then the password of another girlfriend and the boyfriend's children.
  • Federal US law prohibited hacking into email, but without further illegal activity it was only a misdemeanour, said Orin Kerr, a law professor at George Washington University.
  • All the services advertise that they will email a screenshot of the target's inbox or even send an email from the target's account as proof that they've cracked the password. The customer then sends payment. One service then responds with the script of a scene from a Shakespeare play, with the stolen password hidden in the copy.
laila-hass

Cyber War - 60 Minutes - CBS News - 0 views

  •  
    Great video regarding all security aspects of technology, power grid dangers, hacking into Pentagon, etc
Zaheen Ahmad

Hackers Break Into Police Computer | Australian Federal Police - 1 views

  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • ...15 more annotations...
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
    • Salman Rushdi
       
      Security: Security consultants are involved therefore it is a security issue.
  • accessed both police evidence and intelligence about federal police systems such as its IP addresses.
    • Salman Rushdi
       
      IT SYS APPS: When they have access to police evidenceit includes images and recordings.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • me came undone after the officers forgot to set a password. Last Wednesday, federal po
  • These included shots of files containing fake IDs and stolen credit card numbers, as well as the federal police's server information.
    • Salman Rushdi
       
      Politics: Govt information and files has been hacked. Against the law.
  • We can operate in a covert activity here fairly seamlessly with no harm to our members with continual and actual significant penetration,
  • the administrator of an underground hacking forum, r00t-y0u.org, which had about 5000 members.
  • These dipshits are using an automatic digital forensics and incident response tool,
Chalana Perera

Online Bank Account Hackers - 4 views

  •  
    spear phishing, malware, spyware, online banking, transfer hacking, key stroke logger
  •  
    spear phishing
Jeff Ratliff

Google threatens to leave China (Independent) - 2 views

  •  
    "Last month, Google discovered that it had been the subject of a sophisticated attack on its computer systems, carried out by hackers in search of private data from more than 30 internet companies. Among the targets were the accounts of Chinese human rights activists; experts claimed the hack could be traced to the Chinese government or its proxies. In response, Google announced on Tuesday that it would stop censoring results on Google.cn - the Chinese version of its search engine - or, should Beijing oppose the move, cease operating in China altogether. "
Maliha Rahman

Facebook urged to add panic button (BBC news) - 2 views

  •  
    This news item is about how facebook is being accused for not having a panic button to warn facebook about inappropriate behavior and potentially harmful ones. Talks about a teenager 17, Ashleigh Hall lured by a man and murdered by a false identity on Facebook. The man, Chapman, 33 was jailed for at least 35 years for the murder. "The teenager had been raped, suffocated and her body dumped in a field near Sedgefield, County Durham, after agreeing to meet Chapman."
  •  
    This article discusses an issue in which a 17 year old girl was raped and then murdered due to the use of false identity. Due to this issue, facebook has been demanded to provide a "panic button" that would give information to users on how to handle issues like these or others like cyberbullying, hacking, viruses, distressing material and inappropriate sexual behaviour.
Ståle Brokvam

Secrets of the little blue box - 0 views

  •  
    The 1971 article about phone hacking that inspired Steve Jobs.
shazad rouf

Free parking for all? Smart parking meters hacked - CNN.com - 0 views

  • San Francisco launched a $35-million pilot project in 2003 to deploy smart meters around the city in an effort to thwart thieves, including parking control officers who were skimming money from the meters.
    • shazad rouf
       
      social and ethnical issues: security (positive)
Joe Chiverton

Credit and Debit cards stolen worth 130m - 0 views

  • Mr Gonzalez, who had once been an informant for the US Secret Service helping to track hackers, is already in custody on separate charges of hacking into the computer systems of a national restaurant chain and eight major retailers, including TJ Maxx, involving the theft of data related to 40 million credit cards.
    • Joe Chiverton
       
      This is why i put Social issues as security. As he used to work for the government trying to find hackers, therefore knowing how everything works.
Alex David

Hackers hit Twitter and Facebook - 0 views

  • in January this year Twitter announced that 33 accounts had been hacked, including those belonging to US President Barack Obama and singer Britney Spears.
    • Alex David
       
      Social & Ethical issues- security , privacy& anonymity
  • Denial-of-service (DOS) attacks take various forms but often involve a company's servers being flooded with data in an effort to disable them.
    • Alex David
       
      II Systems- Communication Systems
  • Twitter was taken offline for more than two hours whilst Facebook's service was "degraded", according to the firms.
    • Alex David
       
      Areas of impact- "Politics & government" & "Arts, Entertainment & Leisure"
Jeff Ratliff

130 million credit card numbers stolen. - 0 views

  • A cyber crime ring has set a new record for the number of credit cards it hacked and compromised -- 130 million.
  • It's a shared responsibility because the payment system is like a giant refinery, with tubes and pipes and valves everywhere.
    • Jeff Ratliff
       
      IT Systems: Internet
  • Because the same PIN you use to buy gas at a gas station you use to get cash out of a ATM.
Chalana Perera

Exploiting Browser Information & Privacy - 0 views

  • easy it was to exploit security loopholes
    • Chalana Perera
       
      Easy exploitation leads to a lot of negative consequences and areas of impact include all sorts of education online, banking and financial reserves, businesses and mainstream market affairs, governmental and nongovernmental work and damage to personal information and biological/health data. This also harms intellectual property and ideas can be stolen online far easier than usual... reliability & security....
  • redirect traffic
    • Chalana Perera
       
      Redirecting internet connection or regular user traffic could lead to a backlog of information on the web and a loss of personal details and this again as huge areas of impact including security, reliability and extended impact on finances and personal details & anonymity....this also affects systems in the social context with networks being hacked and codes and enscriptions being changed..
  • access and steal any information exchanged
    • Chalana Perera
       
      Stealing information can also connect to software and the usage/creation tools of software and other application....communication systems are also greatly affected such as wire tapping systems
Chalana Perera

Large-scale Credit Card Fraud - 0 views

  • identity theft
    • Chalana Perera
       
      SOCIAL --> Privacy, Control & Security
  • internet and telephone transactions
    • Chalana Perera
       
      concerns/impacts networking systems but also social issues regarding privacy, loss of information and security & anonymity.
  • payment systems of retailers, including the 7-Eleven chain.
  • ...7 more annotations...
  • This is a fairly common way that fraudsters try to gain access to consumers' card details.
  • Once they find a weakness, they insert a specially designed code into the network that allows them to access card details.
  • "a pretty standard way" for fraudsters to try to access personal data.
  • any victim of fraud would "always be refunded in full".
  • corporate victims included Heartland Payment Systems - a card payment processor - convenience store 7-Eleven and Hannaford Brothers, a supermarket chain, t
  • ckers, is already in custody on separate charges of hacking into the computer systems
  • that online, telephone and mail order fraud were on the increase, along with fraud committed abroad
  •  
    Great article Chalana. :)
1 - 20 of 26 Next ›
Showing 20 items per page