If 'Operation Blackout' succeeds, I might get a day off work
There are no snow days on the Internet. If you work from home and write online like I do, drudgery never ends. Or does it? This Saturday, Anonymous may change that.
"To protest SOPA, Wallstreet, our irresponsible leaders and the beloved bankers who are starving the world for their own selfish needs out of sheer sadistic fun, on March 31, Anonymous will shut the Internet down", so claims a February 19 Pastebin post.
Are hacktivists more dangerous, or just more determined?
As if Anonymous didn't have enough to boast about. While cybercriminals accounted for the most breaches, "activist groups created their fair share of misery and mayhem last year as well -- and they stole more data than any other group", according to a report Verizon released today in cooperation with Australian, Dutch, English, Irish and US officials. The study attributes 58 percent of data thefts to hacktivists.
"The most significant change we saw in 2011 was the rise of 'hacktivism' against larger organizations worldwide", Verizon reports. "The frequency and regularity of cases tied to activist groups that came through our doors in 2011 exceeded the number worked in all previous years combined".
Anonymous leaks FBI phone call; reminds of the insecurity of conference lines
Hacktivist group Anonymous has released an audio recording of a January 17 conference call which it claims includes members of the Federal Bureau of Investigation and the UK's Scotland Yard discussing their latest anti-hacking efforts. We've embedded the 17-minute long clip above.
The participants in the conference call talk about Anonymous, LulzSec, Antisec, CSL Security and other black hat security groups, the evidence they have against such groups, and their progress in arresting suspects.
Go ahead, use pcAnywhere again -- after you update
A week after telling users to disable its pcAnywhere, Symantec says the remote computing software is now safe to use, with a few caveats. First, the app must be upgraded to version 12.5, and a critical software patch applied to plug the hole.
In a statement posted to its website, Symantec says that it had patched all versions of the software back to 12.0. A patch for 12.0 and 12.1 was released on January 27, following a patch that was released for 12.5 on January 25.
Symantec tells users to stop using pcAnywhere amid security breach
It's not often when a developer tells you outright not to use its software, but that is exactly what Symantec is forced to do in light of the theft of source code. Last month, Hacktavist group Anonymous bragged that it had possession of code that powers several applications, including Norton Antivirus Corporate Edition, Norton Internet Security; Norton SystemWorks and pcAnywhere.
Symantec says the code theft originally occurred in 2006. While at first security experts believed the theft to only be a black eye for the company's reputation, it now appears that the incident is far more serious. Symantec recommends users of pcAnywhere stop using the software immediately until there is a solution to address any security concerns.
Anonymous launches SOPA strike, takes down Justice Dept.
"The Site is under maintenance. Please expect it to be back shortly". That's the message I found at Universal Music moments ago. The US Justice Department site isn't accessible at all. You can thank hacktavist group Anonymous, which claims responsibility for these and other SOPA blackouts today in response to the Feds shutting down Megaupload.
There's a certain irony to this evening's attacks. Yesterday, tens of thousands of sites supported a voluntary blackout protesting two bills snaking through Congress -- Stop Online Piracy (SOPA) and PIPA (PROTECT IP Act). Anonymous' attacks, presumably denial-of-service, blacked out sites that either support the legislation or would be responsible for enforcing it. We've gone from voluntary blackout protests yesterday to involuntary ones today. As I write, Recording Industry Association of America is down, too.
US Chamber of Commerce hack shows need for vigilance
This week’s high-profile hack of the US Chamber of Commerce underscores the inadequacy of today’s security policies and technologies. With the holidays quickly approaching and IT staffs stepping away from offices to spend time with family and friends, we face increased vulnerabilities and security threats. We should be more vigilant than ever, reflecting on national security policies and how we can better protect our sensitive data.
Stories like this continue to point to the fact that we need a broad, across-the-board approach. We need to collaborate and inform when breaches take place. We need diplomatic support to reduce the desire or economic benefit to steal. It is time to have a Y2K approach to cyber protection. That means investment and support from the top down.
United Nations hacked! Passwords posted!
The United Nations finds itself resecuring its network Wednesday following a hack that resulted in the login details of the employees of several divisions being posted to the Internet. Calling itself TeaMp0isoN, the group calls the UN "a Senate for global corruption" and "sits to facilitate the introduction of a New World Order and a One World Government".
TeaMp0isoN hacked accounts belonging to employees of United Nations Development Programme (UNDP), Organisation for Economic Co-operation and Development (OECD), UNICEF, World Health Organization (WHO) among others. Some of the fault for the hack may lie in the users themselves: TeaMp0isoN notes that several of the user IDs contained no password at all.
Sony PSN network breached (again), 93k accounts deactivated
Sony's PlayStation Network is once again the target of hackers as Sony disclosed late Tuesday that it had disabled some 93,000 PSN and Sony Online Entertainment accounts. According to the company these accounts had been "tested" by hackers, although a majority of the login attempts failed.
The data was said to be obtained from "one or more compromised lists from other companies, sites or other sources," although chief information security officer Phillip Reitinger said it was likely that the data did not come from Sony itself.
DigiNotar scandal worsens: 500+ rogue certificates issued, five CAs breached
The hacker who breached the DigiNotar certificate authority has come out, or at least claimed to. He appears to be the same hacker who breached Comodo, another CA, several months ago. (Hat tip to F-Secure.) "COMODOHACKER" seems to have a problem with the Dutch government.
He claims to have gotten past numerous sophisticated protections in DigiNotar's systems, the details of which he will divulge later, and that he retains inside access to four other "high-profile" CAs and can still issue rogue certificates from them. He also claims that the password for the PRODUCTION\Administrator account (the domain administrator of certificate network) is "Pr0d@dm1n".
Anonymous posts cops' personal data, puts their lives in danger
Hackers have again disclosed the personal details of police officers, this time in response to BART's decision to cut off cell phone and Wi-Fi service in its metro stations and tunnels to quell a planned anti-police protest. The decision by hacktivist group Anonymous calls its motives again into question, and could put these police officers at risk.
Data disclosed includes names, home addresses, email addresses and passwords to the site of the BART police union; 102 officers in total had their information disclosed, and the hack has taken the organization's website offline.
LulzSec's 'Topiary' released on bail, banned from Internet
A British judge has released Jake Davis -- more commonly known as "Topiary" -- on bail Monday, however he has been banned from using the Internet as a condition of his release. Davis was apprehended last Wednesday by the Metropolitan Police as part of a larger effort against LulzSec and Anonymous.
Topiary originally served as the mouthpiece for the LulzSec hacktivist group, but following its disbandment continued his work for Anonymous. He famously taunted police following the arrests of more than a dozen suspected members of the hacktivist group by claiming "you cannot arrest an idea."
British police apprehend the public face of Anonymous
As the law enforcement crackdown against hacktivist groups Anonymous and LulzSec continued, British law enforcement on Wednesday announced the apprehension of "Topiary," a 19-year-old man from the Shetland Islands north of Scotland who has served as the spokesperson for the group.
Police were said to still be searching the residence where the individual was apprehended, as well as talking to a 17-year-old in the municipality of Lincolnshire in east central England in connection with the arrested. The person had not been charged or arrested.
Anonymous claims NATO hack, withholds pilfered information
Hackers with the group Anonymous claimed Thursday that they had hacked into the servers of the North Atlantic Treaty Organization (NATO). However, it wouldn't release much of the gigabyte of information it stole because doing so would be "irresponsible," seemingly indicating some of the data may be sensitive to security interests.
"Yes, #NATO was breached. And we have lots of restricted material," the group tweeted over its @AnonymousIRC account. "In the next days, wait for interesting data :)"
Anonymous and LulzSec fire back at FBI in war of words
Anonymous and LulzSec issued a joint statement Wednesday, firing back at FBI director Steve Chabinsky over his comments to NPR that Tuesday's arrests of 14 hackers associated with the groups was meant to send a message that "chaos on the Internet is unacceptable." The response strikes a markedly political tone.
Posted to Pastebin, the statement accuses governments of lying to their citizens and "dismantling their freedom piece by piece," governments conspiring with corporations and wasting taxpayer money, and lobbyists having too much control over day-to-day business "and corrupt them enough so the status quo will never change."
Recent Headlines
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.