Tuesday 31 March 2015

Ross Ulbricht's Lawyers Were Told About Corrupt Investigators, But Barred From Using That During...



from Hacker Samurai http://ift.tt/1Ez5UhW

via IFTTT

The most popular news sites can be used to spy on you, research shows



from Hacker Samurai http://ift.tt/1CJkLo0

via IFTTT

Pentagon Personnel Now Talking on 'NSA-Proof' Smartphones



from Hacker Samurai http://ift.tt/19FWALj

via IFTTT

After Snowden, The NSA Faces Recruitment Challenge



from Hacker Samurai http://ift.tt/1xS6Yvd

via IFTTT

Bank names BigLaw firms threatened by hackers | hacker samurai



from Hacker Samurai http://ift.tt/1Mv4DN7

via IFTTT

Bank names BigLaw firms threatened by hackers

Citigroup has been apologising to law firms after Fried Frank and Covington & Burling were named as being subject to the attentions of hackers – even though there were no breaches of the firms’ networks or client data in the instances cited.


In 2012, the Fried Frank website was subject to a ‘watering hole’ attack – through which malware is placed on the site and can then infect visitors. But Fried Frank information systems head Steve Lewis has said that the practice’s data had ‘never been breached and client information has never been compromised’. The site was hosted by an outisde consultancy and it contained no confidential information, he added.


Malicious actors


Citigroup included the information in a report which has been written up in the media. The report suggests that there is frustration on the part of banks about the reluctance of law firms to be more open on cyber attacks they experience. The report says: ‘Due to the reluctance of most law firms to publicly discuss cyberintrusions and the lack of data breach reporting requirements in general in the legal industry, it is not possible to determine whether cyberattacks against law firms are on the rise.’ But the authors of the report expect law firms to remain as targets. It said they would ‘continue to be targeted by malicious actors looking to steal information on highly sensitive matters such as mergers and acquisitions and patent applications’.


Covington


Covington & Burling was also mentioned for a 2012 incident when the firm’s name was used on fake emails – apparently by a group of Chinese hackers. Two other smaller law firms were also named.


Apology


However, Citigroup appears to regret finalising all the contents of the report. A spokeswoman said: ‘The analysis relied on and cited previously published reports. We have apologized to several of the parties mentioned for not giving them an opportunity to respond prior to its publication in light of the sensitive nature of the events described.’


Source:http://ift.tt/1IevbvC






from hacker samurai http://ift.tt/1Mv4DN7

via IFTTT

Meet the Hackers Making Your Connected Car Safer | hacker samurai



from Hacker Samurai http://ift.tt/1xwl30Y

via IFTTT

Canada, the Five Eyes – and the hackers’ arms race | hacker samurai



from Hacker Samurai http://ift.tt/1OVTd3I

via IFTTT

These BTech students crack the right codes | hacker samurai



from Hacker Samurai http://ift.tt/1Dnbnad

via IFTTT

HACKERS HOLD COMPUTERS AT RANSOM | hacker samurai



from Hacker Samurai http://ift.tt/1NEw5oZ

via IFTTT

10.5 Tips to Protect Your Magento Store from Smart Hacker | hacker samurai



from Hacker Samurai http://ift.tt/1OVvBfH

via IFTTT

10.5 Tips to Protect Your Magento Store from Smart Hacker

You think you’ve nothing to steal? Hackers don’t agree. | hacker samurai



from Hacker Samurai http://ift.tt/1NzUABF

via IFTTT

British Airways Cyberattack: Thousands Of Frequent Flyer Accounts Hacked, Now Locked Down By...



from Hacker Samurai http://ift.tt/1xTjMBw

via IFTTT

Hackers target ‘British Airways’ after ‘GitHub’ in fresh wave of cyber attacks | hacker samurai



from Hacker Samurai http://ift.tt/19xcBUa

via IFTTT

Cyber Attack Countermeasures | hacker samurai



from Hacker Samurai http://ift.tt/1GcbJRy

via IFTTT

Monday 30 March 2015

Digital rights and freedoms: Part 1



from Hacker Samurai http://ift.tt/1MrHRpq

via IFTTT

The Switchboard: Judge sides with NSA in warrantless search case



from Hacker Samurai http://ift.tt/1HYyKcR

via IFTTT

Governor ups license plate data retention to 60 days from seven



from Hacker Samurai http://ift.tt/1ORRP2e

via IFTTT

INEC Website Hacked Into, Defaced | hacker samurai



from Hacker Samurai http://ift.tt/1CqeMmp

via IFTTT

Two New Ways To Remember Your Password | hacker samurai



from Hacker Samurai http://ift.tt/1BXG5kl

via IFTTT

NIGERIA’S ELECTORAL COMMISSION’S WEBSITE HACKED | hacker samurai



from Hacker Samurai http://ift.tt/1bJYZq0

via IFTTT

The Most Powerful Force In The Universe



from Hacker Samurai http://ift.tt/1ONoKF2

via IFTTT

Hackers bring down Indiana state website over religious freedom bill | hacker samurai



from Hacker Samurai http://ift.tt/1abvf55

via IFTTT

On the cutting edge: Hackers experiment with technology during Penn State event

— Hundreds of college hackers descended upon the Penn State campus this weekend, but they weren’t involved in any illegal activities.


Instead, these hackers looked to network, experiment with technology and learn.


“Hacking in this sense is finding a creative solution to a problem,” said Jon Gottfried, of Major League Hacking.


His organization sanctions about 150 events worldwide like the one Saturday and Sunday at Penn State, he said. Called Hackathons, Gottfried described them as “invention marathons” where teams of participants have 24 hours to work on a project that would solve a problem, create something or improve existing products using technology.


The event, held in the IST Building, drew students from as far away as MIT, Rutgers and the University of Pennsylvania. Some select high school students also compete in hacking events, Gottfried said.


The organization works with students at each university to set up events, Gottfried said. Sophomore Albert Guo was one of the organizers of this year’s event and said more than 400 participants took part this year, an increase of about 200 from last year.


Seniors Joshua Lee, Dylan Nguyen and Sujeet Bhandari, computer science students at Penn State, had competed in Hackathons on campus before, and this year, the trio constructed goggles that enabled the wearer to make 3-D drawings with their hands.


Although it looked like something from “Tron” or another science fiction movie, the device could be used in 3-D modeling in a field like engineering, Lee said. Current 3-D modeling programs are complicated to use, Lee said. The goggles could simplify that to the point anyone could use them merely by pointing, he said.


“You need a lot of technical knowledge with the current technology,” Lee said. “This would eliminate that cliff.”


A few tables down from the goggles stood a reading lamp and a coffee maker wired to a computer. Doctoral student Ken Hutchison operated the appliances using commands on the screen.


Sipping a cup of the remotely brewed coffee, Hutchison explained the program to event judges and interested spectators. Unlike most home automation systems, which run using Wi-Fi, the one on display Sunday used radio frequencies. Hutchison said the current systems available commercially use a lot of circuitry, are expensive to buy and install, and require a lot of energy to use. Special appliances equipped with Wi-Fi receivers are also needed, he said.


The radio equipment used by his team can be used with less expensive, standard analog or digital appliances, and the entire cost of the circuitry to install the radio receivers and transmitters is about $17, Hutchison said. By changing the model from Wi-Fi-based to one using radio, or a hybrid of the two, the technology could be made more widely available, he said.


“We want to bring it to more people,” Hutchison said. “Right now, it’s only available to the super wealthy.”


For others, the project was a matter of fun and games. Penn State juniors William Bittner, Paul Jang, Nick Denaro and Drew Lopreiato designed a website where users can log on to play the classic video game Pong. The first-time Hackathon participants then synced the game to a piece of poster board wired with dozens of LED lights. The lights on the board reflected the actions of the players competing on their cellphones.


The site and board took about 17 hours to create, they said, and any old arcade game could be used.


“Any classic kind of game, like Snake, you could do with this kind of resolution,” Denaro said.


Projects are judged at each event and prizes are awarded to winners, Gottfried said, but the primary motivation he has heard from most participants is the chance to work with like-minded people and also network with tech industry representatives. Local startups as well as companies like Microsoft were present this weekend.


Technology companies, like Dell, sponsor the events and provide tools and equipment that might be available in class or for personal use, Gottfried said. That’s something else welcomed by participants. The gear that went into the 3-D drawing goggles was supplied through the event and new to the hackers that used the supplies.


“It’s the first time we’ve worked with this technology,” Lee said. “It’s exciting to work with new things.”







from hacker samurai http://ift.tt/1ErB4aW

via IFTTT

The NSA had considered ceasing mass surveillance before Snowden



from Hacker Samurai http://ift.tt/1MmIpNx

via IFTTT

SEBASTIAN SHAKESPEARE: Queen calls in cyber expert after hackers target young royals who are...



from Hacker Samurai http://ift.tt/1abhuTH

via IFTTT

SEBASTIAN SHAKESPEARE: Queen calls in cyber expert after hackers target young royals who are told to change email addresses and cut back on social media

The Queen has summoned one of Britain’s leading computer security experts to Buckingham Palace amid fears that the Royal Family could be targeted by foreign spies and hackers.


Sadie Creese, professor of cyber security at Oxford University, held private talks with the Queen last week. She was invited to a palace luncheon, where she was also able to speak to Prince Philip.


‘Her Majesty likes to keep abreast of the latest developments in technology and the problems they can also bring,’ a courtier tells me.


Professor Creese is eminent in her field and was able to share some of her knowledge with the Queen and the Duke of Edinburgh.’


Young royals were reportedly advised earlier this month to change their email addresses and cut back on social media use over fears they could be targeted by hackers.


Prince William later made a top-secret visit to GCHQ, the maximum security ‘listening station’ in Cheltenham, which tracks electronic traffic of terrorists and spy agencies around the world.


‘Most people understand the need to lock their car or front door, but don’t know how to relate that to cyberspace,’ Prof Creese has said. ‘Can your smart car get hacked? What about banking, social networking, TV watching? Are you safe?’


The Queen’s granddaughter Princess Beatrice left her role as a paid intern at Sony Pictures in January after her salary, address and other confidential information were among a vast amount of data stolen by hackers.


The attack is thought to have been carried out by North Korea in revenge for a Sony comedy that imagined the assassination of Kim Jong-un, the country’s leader.


Beatrice, her sister Princess Eugenie and their cousins Princes William and Harry were said to have been told to make urgent changes to their accounts after security officials detected a threat of corporate and government snooping — most probably from Russia.


The order came after GCHQ issued warnings about ‘chatter’ on the airwaves that prompted suspicion the Royal Family has been targeted. The younger royals are seen as particularly vulnerable because of their use of social media.


A Buckingham Palace spokesman confirmed that Prof Creese visited, but added: ‘We don’t make any comment on security for the Royal Family.’


Source: http://ift.tt/19pTs6F






from hacker samurai http://ift.tt/1abhuTH

via IFTTT

Hackers target freedom of information site | hacker samurai



from Hacker Samurai http://ift.tt/1Dl2Oy7

via IFTTT

Hackers target BA air miles | hacker samurai



from Hacker Samurai http://ift.tt/1BWyeUf

via IFTTT

SpartaHack unites student tinkerers | hacker samurai



from Hacker Samurai http://ift.tt/1NugjLx

via IFTTT

Former ‘Neighbors’ Star Caitlin Stacey Fully Naked In New Photos As Fight Against Cyber Hackers...



from Hacker Samurai http://ift.tt/1BWdUCA

via IFTTT

TAMMY BRUCE: Obama/Google connection



from Hacker Samurai http://ift.tt/1aa7fz5

via IFTTT

China Suspected of Cyber-Attacks on Anti-Censorship Website, NY Times, Say Reports



from Hacker Samurai http://ift.tt/1CBCnSy

via IFTTT

U.S. Coding Website GitHub Hit With Cyberattack



from Hacker Samurai http://ift.tt/1a7zbne

via IFTTT

Sunday 29 March 2015

Next Generation of Cyber Crime Prevention Unveiled



from Hacker Samurai http://ift.tt/1En71RU

via IFTTT

Zuckerberg Nemesis Aaron Greenspan Sues Silicon Valley



from Hacker Samurai http://ift.tt/10EmfIe

via IFTTT

Chairman Wheeler Predicts FCC Will Beat Legal Challenge To Net Neutrality



from Hacker Samurai http://ift.tt/1xqOJg7

via IFTTT

The $50 device that symbolizes a shift in North Korea



from Hacker Samurai http://ift.tt/1FP4wrW

via IFTTT

Google 'Second Biggest Donor' to Obama, Has Too Much Power



from Hacker Samurai http://ift.tt/1Nv0O7S

via IFTTT

Shreya Singhal: The student who took on India's internet laws



from Hacker Samurai http://ift.tt/1a7lQve

via IFTTT

Google did not lobby us into submission, US trade watchdog says



from Hacker Samurai http://ift.tt/1E5KI2W

via IFTTT

Saturday 28 March 2015

Anonymous message to the Republic of Ireland - Truth behind IrishWater charges

Don't miss out on the latest Hackers News http://ift.tt/1FuqIFT

from Hacker Samurai http://ift.tt/1EOjrgs

via IFTTT

UK Safari users won the right to sue Google over alleged privacy violations



from Hacker Samurai http://ift.tt/1HXHQDc

via IFTTT

FTC seeks hackers for expanded mobile tech unit, wearables, internet of things | hacker samurai



from Hacker Samurai http://ift.tt/1G32a7f

via IFTTT

Dangerous hackers are seeking information: your love life | hacker samurai



from Hacker Samurai http://ift.tt/1ENjgSt

via IFTTT

State website back online following DDoS attack by hackers | hacker samurai



from Hacker Samurai http://ift.tt/1G2TTQN

via IFTTT

DC Inno Beat 3/27: Slack Hack Follows Raise, Agilex Acquired and #DCTechMadness | hacker samurai



from Hacker Samurai http://ift.tt/1NoOOEZ

via IFTTT

Premera breach: Are hackers targeting more health records as credit card companies improve...



from Hacker Samurai http://ift.tt/1xJ4z68

via IFTTT

How a New Illinois Law Could Protect 12 Million From Identity Theft | hacker samurai



from Hacker Samurai http://ift.tt/1Mgkorh

via IFTTT

hurriyetdailynews:I was hacked, LMAO | hacker samurai



from Hacker Samurai http://ift.tt/1CjvpjK

via IFTTT

Delia Ephron: Hacking into our psyche | hacker samurai



from Hacker Samurai http://ift.tt/1a2zUGd

via IFTTT

Legislation corporations fail to reveal hacking, Citigroup report finds | hacker samurai



from Hacker Samurai http://ift.tt/1No2GiN

via IFTTT

SLACK ANNOUNCED IT GOT HACKED SOMETIME IN FEBRUARY | hacker samurai



from Hacker Samurai http://ift.tt/1BDPrCY

via IFTTT

Shane Harris' (journalist and book author who writes about the NSA and cyber warfare) AMA •...



from Hacker Samurai http://ift.tt/1F34k5o

via IFTTT

Friday 27 March 2015

This Is How NSA Spying Screws US Businesses / Sputnik International



from Hacker Samurai http://ift.tt/1D84KKj

via IFTTT

DHS / ICE and City of London Police Make Piracy Fight Official | TorrentFreak



from Hacker Samurai http://ift.tt/195xINb

via IFTTT

'Leading Edge Consumers' Leaning Towards Connected Cars | SYS-CON MEDIA



from Hacker Samurai http://ift.tt/1BuxINl

via IFTTT

US offers rewards for fugitive Russian hackers | hacker samurai



from Hacker Samurai http://ift.tt/1IF0CQJ

via IFTTT

Citigroup Report Chides Law Firms for Silence on Hackings | hacker samurai



from Hacker Samurai http://ift.tt/1Md1kdy

via IFTTT

Monterey College of Law website hacked by alleged pro-ISIS group | hacker samurai



from Hacker Samurai http://ift.tt/1EJhyBN

via IFTTT

Keeping your information safe from hackers | hacker samurai



from Hacker Samurai http://ift.tt/1HYwheN

via IFTTT

Anthem, Premera Blue Cross data breaches may affect thousands in AZ | hacker samurai



from Hacker Samurai http://ift.tt/19ZrX4H

via IFTTT

Govt wants Open Source Software in all its departments



from Hacker Samurai http://ift.tt/1bAFBf6

via IFTTT

State agency hacked; governor calls for study, changes | hacker samurai



from Hacker Samurai http://ift.tt/1BzAqlH

via IFTTT

Hotel Wi-Fi Routers Can Make Guest Vulnerable To Hackers

Travelers should be careful of connecting to free hotel Wi-Fi spots as a router commonly used in most hotels has a large flaw that allows hackers to compromise connected devices.


The research team from security vendor Cylance found the vulnerability in the InnGate Wi-Fi router in hotels. More than 270 of the ANTLabs-made routers in 29 different countries are affected by the exploit.


Cylance refuses to name the hotels which were using the vulnerable Wi-Fi router, according to Network World.


The research team named as SPEAR (Sophisticated Penetration Exploitation and Research) believes that revealing the affected hotels could result in the abuse of the said exploit.


SPEAR said that all kinds of hotels used the Inngate Wi-Fi router, ranging from cheap ones up to five-star hotels.


Customers were not the only ones at risk of being compromised by hackers. Justine Clarke from SPEAR said that the Wi-Fi router’s vulnerability can lead hackers to restricted hotel networks, where they can gather private information such as guests’ billing information, according to Wired.


Such attacks could also be used to gain access to a guest room with a key lock system. Hackers can enter the compromised hotel Wi-Fi network and gain access to its mainframe to open a door.


One famous example of a compromised hotel network is the high-profile assassination of a Hamas official who stayed in Dubai hotel in 2011. The authorities believe that the assassins were able to reprogram the electronic lock on the official’s hotel room.


“Given the level of access that this vulnerability offers to attackers, there is seemingly no limit to what they could do,” said the SPEAR team.


Source: http://ift.tt/1EbIPlm






from hacker samurai http://ift.tt/1yjk8MB

via IFTTT

Hotel Wi-Fi Routers Can Make Guest Vulnerable To Hackers | hacker samurai



from Hacker Samurai http://ift.tt/1yjk8MB

via IFTTT

Blind Hackers win Lake Tahoe Epic Curling championship | hacker samurai



from Hacker Samurai http://ift.tt/1Ebq01z

via IFTTT

Hackers not involved in new Taiwan Internet safety department: Chief | hacker samurai



from Hacker Samurai http://ift.tt/1EbdD5D

via IFTTT

Hackers not involved in new Taiwan Internet safety department: Chief

TAIPEI, Taiwan – National Security Bureau (NSB) Director-General Lee Shying-jow yesterday said that the bureau is hiring Internet safety experts and not hackers for its soon-to-be established Internet safety department, which is currently designated as the 7th Internet Operations Department.


Lee made the statement while conducting a question-and-answer session during a routine operations report to the Legislative Yuan’s Foreign and National Defence Committee.


During the session, Lee predominantly answered questions from Kuomintang (KMT) Legislator Lin Yu-fang and Democratic Progressive Party Legislator Hsiao Bi-khim, who both formulated their questions around the idea that the employee candidates are regular civilian hackers who are not military personnel.


Lin said that that he was concerned about the detail of the establishment of the department.


The NSB faced 46,000 incidents of Internet attacks last year, Lin said, and that the nation definitely has an idea as to where the said attacks came from.


The KMT lawmaker said that the attacks are why legislators support the establishment of the department, but the lawmakers were also concerned with the listed civilian employees that are to be recruited.


Lin asked Lee to explain the legal status of such individuals: whether they would be full-time of just part-time employees, and what would be their military rank.


Lin also asked if a “Hacker Unit” were to conduct actions that violate the law, what would be the NSB’s response to the crimes?


The legislators also said that the reason such individuals are expert hackers has a lot to do with their creativity, and said such people do not enjoy being confined.


As such, though the Legislative Yuan supports the idea, the NSB must have a detailed plan about the management of such individuals.


In response, Lee said that the NSB will not have hackers but only Internet safety experts.


Lee also said that such individuals would be hired as full-time staff following proper orientation and training, and that a detailed draft of the hiring process is currently being formulated, so that the employment of such individuals would be in accordance with the law.


Lee also said that he has seen two NSB officers conducting Internet safety operations. Although he did not understand the logic or the technical terms the two used, Lee said that he was impressed at how successful the operation was carried out.


What needs to be taught, Lee said, is the method to use such individuals to their full potential, and to the benefit of the nation.


Source: http://ift.tt/1HWF3Kr






from hacker samurai http://ift.tt/1EbdD5D

via IFTTT

Ways to protect private information on social media from hackers | hacker samurai



from Hacker Samurai http://ift.tt/1F0Uktx

via IFTTT

PayPal agrees to pay $7.7 million for alleged sanctions violations



from Hacker Samurai http://ift.tt/1yhiUkV

via IFTTT

Tennessee sues FCC to stop expansion of municipal broadband



from Hacker Samurai http://ift.tt/1N8cJIv

via IFTTT

Thursday 26 March 2015

Edward Snowden on the First Amendment: Livestream in Hawaii



from Hacker Samurai http://ift.tt/1D3EErQ

via IFTTT

Here's Microsoft, Google, and Apple's letter to lawmakers demanding NSA reform



from Hacker Samurai http://ift.tt/1HQ48qe

via IFTTT

Anti-Israeli hackers threaten to mount ‘electronic Holocaust': report | hacker samurai



from Hacker Samurai http://ift.tt/1FN00Ky

via IFTTT

Act on this retired FBI agent’s cybersecurity advice | hacker samurai



from Hacker Samurai http://ift.tt/1Gv2zjq

via IFTTT

Why do Angelina Jolie’s health decisions resonate? | hacker samurai



from Hacker Samurai http://ift.tt/1Bu8EHe

via IFTTT

Visions of a New CISPA | Hacked



from Hacker Samurai http://ift.tt/1GuEwky

via IFTTT

Hackers attempt to shut down TN.gov | hacker samurai



from Hacker Samurai http://ift.tt/1BOw1Kq

via IFTTT

Hackers attempt to shut down TN.gov

NASHVILLE, TN (WSMV) -


An Internet hacker who has already successfully shut down several government websites has now made an attempt on Tennessee.


It’s unclear if it’s a person or group, but whoever is using the Twitter handle Vikingdom2015 has been lurking online and shutting down government websites.


“Usually when they attack a website, they’ll do what’s called a distributed denial of services, which means they’re just bombarding the website with traffic coming from all directions and just overloading it, essentially taking it down,” said Eric Near, with Dynamic Edge IT Consulting.


The hacker took down several government websites in Maine and a news station’s website, presumably for reporting the problem.


The hacker then went online to brag about it, essentially taunting the victims.


“Bragging rights are a big part of it,” Near said. “A lot of it is just getting your name out there and getting publicity. Even if it doesn’t mean anything, it’s just an ego boost.”


The attempt on TN.gov was made early Wednesday morning. Vikingdom2015 tweeted, “RIP Tennessee.” Apparently the state had the necessary tools in place to block the attack.


Tennessee officials turned down an interview, saying they don’t want to encourage a second attempt.


“There are services that that site provides,” Near said. “For example, Tennessee has a number of different sites for the different departments, like registering your license plates online, things like that.”


IT specialists said whether it’s a personal computer or an entire business, people should take preventative measures.


“What we recommend here is just be careful with what’s coming into your email,” Near said. “If you see a specific attachment, don’t open it. It could cause an infection to get to your computer.”


Near said there are many others out there like Vikingdom2015.


“I would recommend checking with your IT department of your IT vendor on what sort of security devices you have in place to make sure this doesn’t happen to you,” he said.


Wednesday afternoon, Twitter shut down the Vikingdom2015 Twitter account.


Source: http://ift.tt/1BtYRRE






from hacker samurai http://ift.tt/1BOw1Kq

via IFTTT

Why DIY car hacking device is not a threat, yet | hacker samurai



from Hacker Samurai http://ift.tt/1GukEhH

via IFTTT

It's Time for Mandatory Voting—And We Have the Technology to Do It



from Hacker Samurai http://ift.tt/19l8hXN

via IFTTT

Local high school’s homepage hacked by a group that supports ISIS | hacker samurai



from Hacker Samurai http://ift.tt/1EYgmNB

via IFTTT

Hackers use Android app for ‘sextortion’ | hacker samurai



from Hacker Samurai http://ift.tt/190yfQt

via IFTTT

GLOUCESTER COUNTY SCHOOL DISTRICT TARGETED BY HACKERS | hacker samurai



from Hacker Samurai http://ift.tt/1E4OBoH

via IFTTT

Official: Hackers breach Fairbanks city website; records OK | hacker samurai



from Hacker Samurai http://ift.tt/1NcLRr1

via IFTTT

Official: Hackers breach Fairbanks city website; records OK



The city of Fairbanks website was targeted by hackers outside Alaska, but no internal information was breached, officials said.


The hacker group replaced the website at http://ift.tt/1CLurvI with a message Tuesday, the Fairbanks Daily News-Miner newspaper (http://is.gd/clgzzt) reported.


City spokeswoman Amber Courtney declined to discuss details of the message or to identify the group. The hackers appear to have been motivated by a desire to show off their hacking abilities, she said.


“They didn’t really seem to have much of a message, if anything,” she said.


The website was down for about four hours before it was brought back online, according to Courtney, who said city internal records were not breached by the hacker group.


“There was no security breach, no breach of any information, no breach in our payment process,” Courtney said.


City technicians have determined how the site was hacked, she said. The City Hall server does not host the affected website.








from hacker samurai http://ift.tt/1NcLRr1

via IFTTT

Calling All Hackers: Harris Teeter Announces Hackathon CLT | hacker samurai



from Hacker Samurai http://ift.tt/1E4qYN8

via IFTTT

'BoS: NSA is monitoring key internet routers - Puzzle Palace Author' - MARC



from Hacker Samurai http://ift.tt/1M2I8z0

via IFTTT

Tech Companies and Privacy Advocates to Congress: End Mass Spying Now



from Hacker Samurai http://ift.tt/1FGf4JW

via IFTTT

Wednesday 25 March 2015

Open borders or fair wages: the left needs to make up its mind | Paul Ormerod



from Hacker Samurai http://ift.tt/1Bej9yr

via IFTTT

Mini Documentary - Million Mask March - Washington DC 2013

News about the War on Hackers http://ift.tt/1FuqIFT

from Hacker Samurai http://ift.tt/1M02mcO

via IFTTT

Hackers target the weakest link in a company: people’ | hacker samurai



from Hacker Samurai http://ift.tt/1HGqxXc

via IFTTT

Will tomorrow’s homes help hackers spy on us? | hacker samurai



from Hacker Samurai http://ift.tt/1E0m0Ry

via IFTTT

Irish government’s Freedom of Information website attacked by hackers | hacker samurai



from Hacker Samurai http://ift.tt/1N8W9s4

via IFTTT

Air Force eyes fake social media drama -- FCW



from Hacker Samurai http://ift.tt/1y7mmhR

via IFTTT

The Weekly Beast: Malcolm Turnbull's got a new app (hint – it's not Tinder)



from Hacker Samurai http://ift.tt/1GhMwFA

via IFTTT

Local airman on hit list for ISIS supporters | hacker samurai



from Hacker Samurai http://ift.tt/1EUbXuM

via IFTTT

Daily reporter gets hacked | hacker samurai



from Hacker Samurai http://ift.tt/1btMzSW

via IFTTT

Korea’s internet addiction crisis is getting worse, as teens spend up to 88 hours a week gaming



from Hacker Samurai http://ift.tt/1DYR9Vs

via IFTTT

Hackers Can Get Into Any Computer through BIOS | hacker samurai



from Hacker Samurai http://ift.tt/1HFHVyJ

via IFTTT

Columbia Business Times:Getting Hacked | hacker samurai



from Hacker Samurai http://ift.tt/1BqOTPU

via IFTTT

City website repaired after hackers attack | hacker samurai



from Hacker Samurai http://ift.tt/19ldMFR

via IFTTT

Mentor CEO says chips can be protected against hackers | hacker samurai



from Hacker Samurai http://ift.tt/1xyEM0n

via IFTTT

Mentor CEO says chips can be protected against hackers

Silicon-based hacking problems are not yet seen as a threat to security on the internet.


But this may be because any breaches of security at the silicon level are not reported.


It could also be because there are easier ways to penetrate computer networks. Most of the security problems which the internet is seeing are because people are hacking intro user level software and apps.


This may be annoying, but it is not seen as a major problem. Hacks can be stopped and blocked relatively easily with software fixes and firewalls.


But Wally Rhines, CEO, Mentor Graphics believes there will be a different scale of problem if systems are hacked at the operating system or silicon level.


“It will be a much bigger problem affecting many more people,” says Rhines.


However, he believes there a number of design options available which chip designers can use to protect ICs from the hackers.


Hacking the silicon could involve unlocking an existing IC or introducing counterfeit chips into the supply chain, but a much bigger problem could be when the hackers have the ability to embed malicious logic elements inside the chip.


“Today design tools verify that a chip does what it is designed to do, in future we will have the tools to verify that a chip does not do what it shouldn’t,” says Rhines.


Unlocking a chip to discover how it operates so it can be tampered with is typically carried out in one of two ways. Either through analysis of the power profile of the device or through an analysis of its electromagnetic footprint.


“Both of these techniques make it possible to identify the activity of the chip and then faults can be injected,” says Rhines.


To tackle this form of silicon hacking you can harden the chip’s intellectual property (IP) and make it less prone to attacks.


Another countermeasure, says Rhines, is to make the chip harder to ‘read’ by spreading the signals around the chip and so make them more difficult to trace by the hacker.


“It is possible to include this in the design simulation and emulation before committing to silicon,” says Rhines.


“This can never be perfect, but if a company can do it better than its competitors then it has differentiation,” says Rhines


There is a growing threat from counterfeit parts entering the supply chain which also raises the threat of tampering. This is made easier because ICs travel widely in their life cycle; from design to fab to the OEM customer.


And the potential for introducing counterfeit parts is made greater because of the excess inventory and re-cycled ICs in the supply chain.


This is being tackled by adding greater traceability in the supply chain. The US authorities have been particularly active in this area with the AS6081 Counterfeit Avoidance Standard to ensure component traceability amongst independent component suppliers and distributors.


Rhines says it is also possible to design locks into the chip to provide better traceability.


Each IC could be given its own unique authentication code, or fingerprint, but this likely to add unacceptable cost to chip.


For example, an on-chip ‘odometer’ could track its movement. Or the chip could have an activation code which can only be unlocked with an encrypted key supplied by the manufacturer.


But even these countermeasures are no guarantee against hacking, says Rhines.


The biggest threat will come from a so-called Trojan attack where rogue hardware IP is introduced into the chip at the design stage.


“I believe a Trojan attack on the silicon will become a big problem,” says Rhines. “The complexity of the supply chain for chip design and production makes it vulnerable.”


The Trojan could be rogue IP designed into the chip, which is triggered by a specific event or time.


Use of third party IP or IP code re-use will make the introduction of Trojan IP easier, says Rhines.


To tackle this deep level of attack, Rhines believes it will become necessary for the chip to protect itself by monitoring its own activity.


“I believe it will become standard in the future to embed a co-processor in an IC design to monitor the activity within the chip,” says Rhines.


Rhines said work in this area has already started in the US and the government is supporting the semiconductor industry in the development of technologies to make silicon more secure.


But this is only in its early stages and government funding of $1m for the initiative looks surprisingly modest.


Rhines says he is starting to see customers asking for some level of silicon authentication, but there can be a cost associated with greater security.


Rhines believes it will take a major silicon security issue to convince companies of the need for greater silicon authentication.


“This is usually needed to trigger a big market reaction,” says Rhines, “but I am seeing a demand for silicon authentication from customers.”


“Until the customers of the chip companies say they will not buy ICs until the suppliers do something little is likely to happen,” says Rhines.


“But I do believe that an on-chip security monitoring requirement will happen at some time,” says Rhines.


Rhines believes the EDA industry must provide the necessary design and verification tools to support the various forms of on-chip authentication and activity monitoring.


This starts with secure software hypervisors. It includes partitioning the processor operation to keep critical software apart from more easily hacked applications software.


At the silicon level formal verification tools will be used to identity Trojan IP and to isolate it.


“I believe this will become an important new area of activity for EDA companies and the necessary research has already started, in companies and universities,” says Rhines.


Source: http://ift.tt/1EFY0xZ






from hacker samurai http://ift.tt/1xyEM0n

via IFTTT

A $60 GADGET THAT MAKES CAR HACKING FAR EASIER | hacker samurai



from Hacker Samurai http://ift.tt/1NfJotZ

via IFTTT

Tech firms and privacy groups press for curbs on NSA surveillance powers



from Hacker Samurai http://ift.tt/1y4Bg8L

via IFTTT

Tuesday 24 March 2015

How to tell if you’ve been hacked | hacker samurai



from Hacker Samurai http://ift.tt/19Niv4i

via IFTTT

WELCOME TO PRIVACY HELL, ALSO KNOWN AS THE INTERNET OF THINGS | hacker samurai



from Hacker Samurai http://ift.tt/19iJvHK

via IFTTT

Flaw in Cisco VoIP phones allows hackers to intercept conversations | hacker samurai



from Hacker Samurai http://ift.tt/19Nem0m

via IFTTT

Flaw in Cisco VoIP phones allows hackers to intercept conversations

Cisco has issued a security alert warning users of several of its voice over Internet Protocol (VoIP) phones that a flaw in the products could allow hackers to listen in on users’ conversations.


The company said the products at risk are the Cisco Small Business SPA series 300 and series 500 IP phones.


A vulnerability in the machines “could allow an unauthenticated remote attacker to listen to the audio stream” of the phones, according to Cisco. Software updates are not available at this time.


“The vulnerability is due to improper authentication settings in the default configuration,” a warning from the company said. “An attacker could exploit this vulnerability by sending a crafted XML request to the affected device. An exploit could allow the attacker to listen to a remote audio stream of make phone calls remotely.”


Source: http://ift.tt/19NemNF






from hacker samurai http://ift.tt/19Nem0m

via IFTTT

‘ISIS Hackers’ Googled Their Hit List; Troops’ Names Were Already on Public Websites | hacker...



from Hacker Samurai http://ift.tt/1FBAnw4

via IFTTT

Hackers Claim Credit For Taking Down VisitNH.gov | hacker samurai



from Hacker Samurai http://ift.tt/1N5kZcq

via IFTTT

WKYT Investigates: Cyber hackers focusing on taxpayers | hacker samurai



from Hacker Samurai http://ift.tt/1Ox0p6i

via IFTTT

Common Home Computer Accessory Vulnerable to Hackers | hacker samurai



from Hacker Samurai http://ift.tt/1HxvbXk

via IFTTT

N.D. airmen among troops named by alleged Islamic State hackers | hacker samurai



from Hacker Samurai http://ift.tt/18V0jom

via IFTTT

New security measures to keep you safe from hackers | hacker samurai



from Hacker Samurai http://ift.tt/1CmlrPV

via IFTTT

Kreditech Investigates Insider Breach | hacker samurai



from Hacker Samurai http://ift.tt/1ENr4WS

via IFTTT

Chinese anti-censorship group GreatFire is under DDoS attack 2,500 times more than normal levels



from Hacker Samurai http://ift.tt/1DNNj1h

via IFTTT

Documents Reveal Canadian Agency's Cyberwarfare Toolbox



from Hacker Samurai http://ift.tt/1CTkKjl

via IFTTT

Monday 23 March 2015

Discussion of the BadBios (alleged) rootkit • /r/TrueBadBios



from Hacker Samurai http://ift.tt/1EDcZsC

via IFTTT

$1 Billion TSA Behavioral Screening Program Slammed as Ineffective “Junk Science”



from Hacker Samurai http://ift.tt/1xWEJ9e

via IFTTT

Cities Turn to Social Media to Police Restaurants



from Hacker Samurai http://ift.tt/1GKJ9ow

via IFTTT

California's About to Run Out of Water. We Have to Act Now | WIRED



from Hacker Samurai http://ift.tt/1CQ9wMo

via IFTTT

Cutting-edge agency goes old-school -- FCW



from Hacker Samurai http://ift.tt/1LAyB23

via IFTTT

Calling all HACKERS! TECH Demo night at Techstars – March 24th | hacker samurai



from Hacker Samurai http://ift.tt/1DNzD6q

via IFTTT

The Spook of Cambridge: Wills makes secret visit to GCHQ spy base after Royals warned over...



from Hacker Samurai http://ift.tt/1EIAtz4

via IFTTT

PNP website defaced by pro-Palestine hackers | hacker samurai



from Hacker Samurai http://ift.tt/1EIAtyY

via IFTTT

The Edge: Gayle Killilea falls victim to hackers | hacker samurai



from Hacker Samurai http://ift.tt/1DNzCPP

via IFTTT

The Spook of Cambridge: Wills makes secret visit to GCHQ spy base after Royals warned over computer hacking

Prince William has made a top secret visit to Britain’s most secretive building, The Mail on Sunday can reveal.


The Duke of Cambridge made the unannounced ‘private visit’ on Thursday to Government Communications Headquarters (GCHQ) – the maximum security ‘listening station’ which tracks electronic traffic of terrorists and spy agencies around the world.


The Duke’s first ever trip to GCHQ, housed in a doughnut-shaped building in Cheltenham, Gloucestershire, comes after The Mail on Sunday revealed that he and other young Royals were being advised to change their email addresses and cut back on social media activities over fears they could be targeted by foreign spies and hackers.


But questions were asked last night about the Duke’s use of a publicly funded Royal helicopter to make the trip, as it was not an official public engagement and was not announced in the Palace’s Court Circular.


The Duke was flown from London’s Kensington Palace to Gloucestershire airport on the Queen’s helicopter Flight, funded by the taxpayer, and which is supposed to be only used for official engagements by the Royals.


Source: http://ift.tt/1DNzCPX






from hacker samurai http://ift.tt/1EIAtz4

via IFTTT

Etihad Rail UAE: Connected train is approaching – and it cannot be hacked | hacker samurai



from Hacker Samurai http://ift.tt/1Iji9xu

via IFTTT

No website too small for hackers, firm says | hacker samurai



from Hacker Samurai http://ift.tt/1Iji9h7

via IFTTT

ISIS Publishes Online Hit List Of US Service Members | hacker samurai



from Hacker Samurai http://ift.tt/1G3B8wX

via IFTTT

Doctors team up with hackers to improve healthcare in Ontario | hacker samurai



from Hacker Samurai http://ift.tt/1Ijfy6Q

via IFTTT

A wrong move means instant death’: how to power your home with a hacked car battery | hacker samurai



from Hacker Samurai http://ift.tt/1G3B5Bn

via IFTTT

What Are Businesses Doing To Battle Security Breaches by Hackers? | hacker samurai



from Hacker Samurai http://ift.tt/1CPJmcK

via IFTTT

Sunday 22 March 2015

3D-mapping startup wants to help robots get around your house



from Hacker Samurai http://ift.tt/1GJnJIu

via IFTTT

Chairman McCaul Discusses Latest on Terror Threat on ABC’s “This Week"

One Stop for all things Hackers http://ift.tt/1FuqIFT

from Hacker Samurai http://ift.tt/1N47kjN

via IFTTT

Who Needs CSSLP?

Today in Hackers News: http://ift.tt/1FuqIFT

from Hacker Samurai http://ift.tt/1xqKXDw

via IFTTT

How To Avoid That The Snowden Story Becomes Just The Same Old Story



from Hacker Samurai http://ift.tt/1DKnZJF

via IFTTT

European Lawmaker Pushes Europe to Take Stronger Stance on Google



from Hacker Samurai http://ift.tt/1I6k9t2

via IFTTT

(ISC)² Security Congress 2014: Day 1 Highlights

All Things Hackers http://ift.tt/1FuqIFT

from Hacker Samurai http://ift.tt/1C1Kl5Z

via IFTTT

Saturday 21 March 2015

Pao Vs. Kleiner Defense Rests Its Case, Showcasing A Different Side Of The Story



from Hacker Samurai http://ift.tt/1CHSUVu

via IFTTT

The FTC's explosive allegations against Google are enough to make me switch to Yahoo



from Hacker Samurai http://ift.tt/1CDek5X

via IFTTT

Anonymous - Operation Shock Drop #OpFerguson #OpHandsUp #OpCopWatch

Welcome to the world of Hackers: http://ift.tt/1FuqIFT

from Hacker Samurai http://ift.tt/1LG6uOT

via IFTTT

Fran O' Sullivan: China's polite concern about spying puts Key's evasions in perspective -...



from Hacker Samurai http://ift.tt/1HejrZN

via IFTTT

World: Chinese dissidents’ web site hacked | hacker samurai



from Hacker Samurai http://ift.tt/1CGtDem

via IFTTT

Washington, Alaska Lead Probe Into Hacking of Health Insurer | hacker samurai



from Hacker Samurai http://ift.tt/1IafIgP

via IFTTT

How To: Protect Your Smartphone from Hackers and other Threats | hacker samurai



from Hacker Samurai http://ift.tt/1CGtDec

via IFTTT

China discloses cyberwarfare unit, no one surprised | hacker samurai



from Hacker Samurai http://ift.tt/1IafHcL

via IFTTT

Monetizing medical data is becoming the next revenue stream for hackers | hacker samurai



from Hacker Samurai http://ift.tt/1Hfr2L3

via IFTTT

HACKING BIOS CHIPS ISN’T JUST THE NSA’S DOMAIN ANYMORE | hacker samurai



from Hacker Samurai http://ift.tt/1Ohpylc

via IFTTT

Hackers appoint selves on firm board, stun HC | hacker samurai



from Hacker Samurai http://ift.tt/1MTjcXz

via IFTTT

2015 is already the year of the health-care hack — and it’s only going to get worse. | hacker...



from Hacker Samurai http://ift.tt/1HdK2WS

via IFTTT

Hackers Reveal Drastic Plans in Ukraine to Brainwash Donbas ‘Idiots | hacker samurai



from Hacker Samurai http://ift.tt/1HeYeCr

via IFTTT

IBM: Cybersecurity risks abound in BYOD, mobile apps | hacker samurai



from Hacker Samurai http://ift.tt/1HdK4xK

via IFTTT

Friday 20 March 2015

Team Australia, your surveillance is ready | ZDNet



from Hacker Samurai http://ift.tt/1B8TLJp

via IFTTT

FAA Grants Amazon Permission To Test Drone Deliveries



from Hacker Samurai http://ift.tt/1ALjAQy

via IFTTT

State-sponsored hackers target European, Israeli organizations | hacker samurai



from Hacker Samurai http://ift.tt/1xFn19X

via IFTTT

Thanks to Facebook bug, hackers could have your personal pics | hacker samurai



from Hacker Samurai http://ift.tt/1OdwcZM

via IFTTT

Thanks to Facebook bug, hackers could have your personal pics

Facebook users’ personal photos could be in the hands of hackers, a security expert claims.


A bug in Facebook Photo Sync allows third-party apps to access photos originally stored on your smartphone, according to Laxman Muthiyah, a bounty hunter who discovered the bug.


The social network’s photo sync feature, introduced in 2012, will upload all your iOS and Android smartphone snaps to your Facebook account if you’ve opted in.


Ordinarily, those pictures will go to a private album that’s not visible to friends or other users of the social network.


But Muthiyah found a huge vulnerability in the Photo Sync API that grants third-party apps access to those personal pictures.


He discovered that an endpoint granting access to sync requests was vulnerable.


Explaining the bug on his blog, he wrote: “The vulnerable part is, it just checks the owner of the access token and not the application which is making the request.


“So it allows any application with user_photos permission to read your mobile photos.”


A large number of Facebook apps use the user_photos permission to read users’ public photos, he warned, adding: “A malicious app which you are using can read all of your private photos in few seconds.”


Facebook has no patched the bug, rewarding Muthiyah with a $10,000 cheque, but the bug researcher suggested users opt out of Photo Sync just in case.


Muthiyah’s no stranger to Facebook rewards, though, after bagging $12,500 last month when he discovered he could send a “delete” function to a Facebook for Mobile application via an API that gave him the power to delete any photo album on the site.

Source: http://ift.tt/1OdwbFn






from hacker samurai http://ift.tt/1OdwcZM

via IFTTT

Hackers expose private information of 50,000 VNPT clients | hacker samurai



from Hacker Samurai http://ift.tt/1BaJI6E

via IFTTT

Gone in 60 seconds: Chinese hackers shut down Adobe Flash, Internet Explorer … but only for top...



from Hacker Samurai http://ift.tt/1OdsGyD

via IFTTT

HACKADAY PRIZE WORLDWIDE: MAKER’S ASYLUM MEETUP IN MUMBAI | hacker samurai



from Hacker Samurai http://ift.tt/1OdsFur

via IFTTT

Young Hackers Win Big Bucks Crushing Your Web Browsers | hacker samurai



from Hacker Samurai http://ift.tt/1BaJKeL

via IFTTT

That Time Hackers Changed The CIA Website To ‘Central Stupidity Agency’ | hacker samurai



from Hacker Samurai http://ift.tt/1AOR3tc

via IFTTT

Hackers expose private information of 50,000 VNPT clients

VietNamNet Bridge – DIE Group, a group of hackers, has posted personal information about 50,000 clients of VNPT, the largest telecom group in Vietnam, on the internet.


DIE Group said it had sent a warning about vulnerabilities to the website administrator but there has been no reply, while the security hole has not been fixed.


The information has been exposed on mega.co.nz, a site to share files online, according to Tran Quang Chien, the manager of Security Daily.


Though the information about 10,000 clients can be found on only this site, Chien said the figure would actually be 50,000. The information includes customers’ codes, names, addresses, mobile phone numbers, user accounts and passwords.


With the database, anyone could log on to the users’ accounts on VNPT’s website soctrang.vnpt.vn. However, some sources said hackers have erased important details to prevent people from exploiting the data.


SecurityDaily said on March 14 evening that the exposed information was still “alive”, which means that the information was still useful for criminals to penetrate the system through the vulnerabilities.


Analysts commented that the information exposure shows that dangerous security holes exist on VNPT’s website, which allow hackers to control and steal the database.


They said that it is highly possible that the admin account has also been hacked. The hole is likely to be SQL Injection, a dangerous hole which hackers like exploiting.


On March 16, Bui Quoc Viet, the spokesman of VNPT, confirmed that VNPT’s data was hacked and the information about 50,000 clients of VNPT Soc Trang branch was posted on the internet.


Viet said the hackers exploited a software module used to look up customers’ information at VNPT’s Soc Trang branch.


Viet said this is an old server system which is being gradually replaced by VNPT. Prior to that, hackers posted on the internet information about tens of thousands of VNPT’s accounts.


Sensational news appeared in some local newspapers on March 16 morning that SecurityDaily, which gave a warning about the attack, may “have relations” with the hackers.


A local newspaper reported that VNPT’s representative had a meeting with SecurityDaily on March 15 afternoon to discuss the problem.


It also quoted Tran Quang Chien of SecurityDaily as denying the “relations with hackers”. Chien said SecurityDaily had received the image from a member of the group of hackers.


In the latest news, VNPT has said that it had taken necessary measures and settled the problem to ensure safety for the data and 50,000 client accounts.


Source :






from hacker samurai http://ift.tt/1BaJI6E

via IFTTT

Major bug in Ola Cabs app can be exploited to recharge your wallet for free | hacker samurai



from Hacker Samurai http://ift.tt/1AOLTgR

via IFTTT

Debate over: This is the correct way to use toilet paper



from Hacker Samurai http://ift.tt/198ff2b

via IFTTT

Hackers Attack GreatFire.org, a Workaround for Websites Censored in China | hacker samurai



from Hacker Samurai http://ift.tt/1DEHuDi

via IFTTT

Chinese military denies role in reported U.S. hacking | hacker samurai



from Hacker Samurai http://ift.tt/1AOglaO

via IFTTT

Elon Wants to Make Your Tesla Drive Itself. Is That Legal? | WIRED



from Hacker Samurai http://ift.tt/18N1kyC

via IFTTT

Anonymous - YOU CAN'T BREAK MY SOUL

No other source has more on Hackers than http://ift.tt/1FuqIFT

from Hacker Samurai http://ift.tt/1I3VMfw

via IFTTT

Reality check: Apple Watch vs. Pebble Time (vs. no smartwatch at all)



from Hacker Samurai http://ift.tt/1I3wBcV

via IFTTT

Thursday 19 March 2015

(ISC)² Security Congress 2014: Day 2 Highlights

Hackers Samuri has All Things Hackers: http://ift.tt/1FuqIFT

from Hacker Samurai http://ift.tt/1DE9as6

via IFTTT

Inside the U.S. Antitrust Probe of Google



from Hacker Samurai http://ift.tt/1DCUfOC

via IFTTT

McSally Questions Witnesses at Hearing on the Threat of Chemical Terrorism

The Only Blog You Need For Hackers News http://ift.tt/1FuqIFT

from Hacker Samurai http://ift.tt/1H7TApw

via IFTTT

France introduces bill to create NSA-like powers to snoop on metadata



from Hacker Samurai http://ift.tt/1xCAsrl

via IFTTT

Whither the Section 215 Reauthorization Debate?



from Hacker Samurai http://ift.tt/1MRnvkp

via IFTTT

Glenn Greenwald and Edward Snowden live on Stage at #CGC15



from Hacker Samurai http://ift.tt/1FG39dF

via IFTTT

US Threatened Germany Over Snowden, Vice Chancellor Says - The Intercept



from Hacker Samurai http://ift.tt/1H2B4vj

via IFTTT

UK spies claim broad powers to hack worldwide



from Hacker Samurai http://ift.tt/1FHGsp8

via IFTTT

Xbox under attack as latest title hit by hackers | hacker samurai



from Hacker Samurai http://ift.tt/1x3GEOf

via IFTTT

IT firms set traps for hackers using online model train set | hacker samurai



from Hacker Samurai http://ift.tt/1x3GKoT

via IFTTT

Premera Hackers Make Off With Massive Medical Haul | hacker samurai



from Hacker Samurai http://ift.tt/1x3GEO9

via IFTTT

Xbox under attack as latest title hit by hackers

Highly Skilled Russian Hackers a Threat to Financial System – State Dep’t | hacker samurai



from Hacker Samurai http://ift.tt/195dpPv

via IFTTT

Sacred Heart Health System notifies 14,000 patients of data breach after hacking attack | hacker...



from Hacker Samurai http://ift.tt/1BZlVew

via IFTTT

Outgoing NSA lawyer helped preserve controversial programs



from Hacker Samurai http://ift.tt/1F7Ppti

via IFTTT

Hackers attack US reporters | hacker samurai



from Hacker Samurai http://ift.tt/1MMF1bh

via IFTTT

China Finally Admits It Has an Army of Hackers for Cyberwar | hacker samurai



from Hacker Samurai http://ift.tt/1H25MEO

via IFTTT

OKC City Website Hacked For Second Day In A Row | hacker samurai



from Hacker Samurai http://ift.tt/1x3zGsr

via IFTTT

Why Do Hackers Target Health Insurers? | hacker samurai



from Hacker Samurai http://ift.tt/1954KN1

via IFTTT

ICT Days 2015: call for hackers | hacker samurai



from Hacker Samurai http://ift.tt/19BX8Tx

via IFTTT

Why blocking torrenting sites won’t stop pirates



from Hacker Samurai http://ift.tt/1xA1gbz

via IFTTT

China Boosts Fleet of Electric, Hybrid Vehicles



from Hacker Samurai http://ift.tt/1I0Qod7

via IFTTT

Wednesday 18 March 2015

iPhone encryption 'petrified’ NSA: Greenwald



from Hacker Samurai http://ift.tt/1AZVH6W

via IFTTT

Anonymous - WHAT WE ARE CAPABLE OF

For ALL things Hackers check us out at http://ift.tt/1FuqIFT

from Hacker Samurai http://ift.tt/1BWYHWq

via IFTTT

An Uber Service Is Banned in Germany Again



from Hacker Samurai http://ift.tt/1CsPd5M

via IFTTT

Premera, Anthem data breaches linked by similar hacking tactics | hacker samurai



from Hacker Samurai http://ift.tt/1B0tSeI

via IFTTT

Uber South Korea execs charged with violating law | ZDNet



from Hacker Samurai http://ift.tt/1F16ULU

via IFTTT

Evidence Links N.Korea to Nuclear Hacking Attack | hacker samurai



from Hacker Samurai http://ift.tt/1x14kCG

via IFTTT

Did a Congressman just acknowledge the US took down North Korea’s internet in December? | hacker...



from Hacker Samurai http://ift.tt/1GXDUSd

via IFTTT

US sets new record for denying federal files under Freedom of Information Act



from Hacker Samurai http://ift.tt/1MN2Xtd

via IFTTT

Dental company for low-income Oregonians says hackers got Social Security numbers, other info |...



from Hacker Samurai http://ift.tt/1AZO2Wf

via IFTTT

Is Car Hacking Much Ado About Nothing? | hacker samurai



from Hacker Samurai http://ift.tt/1GXhEYT

via IFTTT

Is Car Hacking Much Ado About Nothing?

First, it was phone tapping, then computer hacking and identity theft. Now, the electronic fear du jour is car hacking. As our cars are powered by ever-increasing numbers of computers and software programs, and as automakers promote connectivity (from traffic-monitoring apps to mobile phone synchronization and collision avoidance systems), alarms have been raised about the possibility of hackers obtaining access to a car’s computers. One particularly bleak scenario involves hackers wreaking havoc on self-driving cars, whose hapless passengers won’t even have time to grab the steering wheel before their four-wheeled mobile devices engage rampage mode.


While nothing like this has happened in real life, researchers (including two individuals funded by DARPA for a 2013 study) have been able to access a vehicle’s computer systems using a laptop and, reportedly, obtain control of the vehicle’s steering, brakes, engine, and other components. While conducted in a controlled environment, these experiments caught the attention of Washington, D.C. and the media. A report released last month by U.S. Senator Ed Markey’s office, “Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk,” mentions those experiments and concludes that no major auto manufacturer is properly prepared to handle the hacking and data privacy risks posed by existing and forthcoming automotive technology. Yet the report also noted that none of the automakers questioned by Markey had received any indications of hacking or attempted hacking in the real world. Is car hacking the next great security threat, or much ado about nothing?


Dallas attorney Marc Stanley takes the position that car hacking is a threat. On March 10, Stanley’s law firm filed a putative class action lawsuit in the U.S. District Court for the Northern District of California against Toyota, Ford, and General Motors, alleging that those automakers’ vehicles are susceptible to hacking, thus breaching the manufacturers’ warranties and various state and federal consumer protection laws. The 343-page complaint requests injunctive relief (in the form of a recall or free replacement program), disgorgement, and other damages. As of this writing, the automakers had not responded to the complaint.


This lawsuit raises interesting questions. Since a real-world car hacking incident has never been reported, are the plaintiffs’ claims ripe? The complaint argues that the alleged ability of hackers to access vehicle computers renders false the manufacturers’ representations of their vehicles’ safety. Further, say the plaintiffs, since Toyota, Ford, and GM have refused to either repair the vehicles or replace them at no cost, the manufacturers have breached both express and implied warranties.


The argument that the vehicles at issue are not safe because they could be hacked is a creative attempt to circumvent the ripeness issue. But it seems likely that ripeness will present a large initial hurdle for the plaintiffs in this case. That a few researchers were able to access a vehicle’s computer system in a controlled setting is not necessarily evidence that the vehicles could be compromised by a malevolent third party, nor that such a hypothetical situation renders the vehicles unsafe to drive.


The plaintiffs have requested their money back from the manufacturers, yet they admit in the complaint that they are still driving their vehicles and make no assertions that the vehicles are otherwise unfit for their intended purpose. At this point in time, the plaintiffs’ allegations appear speculative at best.


This is not to say that automakers should not take the hacking threat seriously. The Markey report raises important questions about consumer safety that automakers would be well advised to attempt to answer. As cars increasingly become mobility devices, in which occupants can surf the Internet, download music and apps, monitor traffic and road conditions and the like, the proliferation of computer systems creates added risks, including hacking. That a vehicle has not been maliciously hacked does not mean that it could not happen or that it would not in the future. Should that happen, immediate media, political, and legal scrutiny will descend on the automaker at issue, who will be asked what it knew, what it should have known, and what safeguards it should have developed. All automakers have a common interest in preventing that day from ever happening.


To what extent will automakers remain responsible for the computer systems in their vehicles? Will those systems someday come with a separate warranty that is longer (or shorter) than existing bumper-to-bumper warranties? Will the consumer become responsible for updating firewalls, virus protection, etc.? If a vehicle is hacked and it is discovered that the owner had not brought the car in for service to have a software update performed, should the owner share the liability? Right now, these questions are being asked in the abstract. Sooner than we think, the answers will have real-world impact.


One issue raised by the Markey report but not included in Stanley’s class action is that of privacy. Vehicles record copious amounts of data, such as vehicle performance and geographic location. As drivers increasingly use their vehicles as an extension of their mobile devices, the proliferation of data stored in or transmitted through the computer systems will no doubt prove tempting to hackers. Indeed, it seems plausible that, in the future, a hacker might be more likely to attempt to steal your identity through your car’s computer than to try to disable your brakes or steering.


Interestingly, the Markey report expresses more concern with automakers’ use of vehicle data than with hackers. Given Washington’s interest in demonizing manufacturers since the General Motors ignition switch debacle, this is not surprising. Yet, it seems to paint only half the picture—the less concerning, though no doubt more politically convenient, half. Yes, automakers do record and store vehicle data, and may share some of that data with third parties. But Google and Facebook do the same thing, on a mind-boggling scale. To the extent vehicles record and store personal information, should Washington be protecting drivers from the automakers or from hackers? The hacking risk may be speculative at this point, while automakers’ collection of data is actually happening, yet the potential harm from hacking would likely be greater than any harm caused by automakers doing what all the major technology companies do.


In this brave new world of speculative but plausible threats, the best approach may be to stay calm and carry on and not let the premature panic or political pontificating obscure the fact that these issues are real and they do need to be addressed. But vehicles are not, and are not likely to become, mobile time bombs. Anyone interested in improving vehicle safety should start with the American public’s lack of driving skills. We have done an awfully good job of endangering ourselves on the roads already, with or without hackers.


Source: http://ift.tt/1x0E2AG






from hacker samurai http://ift.tt/1GXhEYT

via IFTTT

Keeping your info private from hackers and the government | hacker samurai



from Hacker Samurai http://ift.tt/1Lu9ZI8

via IFTTT

Anonymous hackers list 9,200 ISIS Twitter accounts, enlist other hackers in cyberwar | hacker...



from Hacker Samurai http://ift.tt/18HpoD2

via IFTTT

Secure drone software evades hackers | hacker samurai



from Hacker Samurai http://ift.tt/1FBDjHz

via IFTTT

KELO’s website hacked | hacker samurai



from Hacker Samurai http://ift.tt/1Cv2FI2

via IFTTT

Hackers Hijack Fancybox Plugin to Deface WordPress Sites with ISIS Propaganda | hacker samurai



from Hacker Samurai http://ift.tt/1wZJh3s

via IFTTT

FCC Commish Pai: Broadband Bill Taxes Going Up in Months - Breitbart



from Hacker Samurai http://ift.tt/1HYKVU4

via IFTTT

Tuesday 17 March 2015

Inside New York Times Reporter James Risen's Seven Year Fight Against the Government



from Hacker Samurai http://ift.tt/1BtYvJi

via IFTTT

British spies tell companies to monitor workers online



from Hacker Samurai http://ift.tt/1LpwWw3

via IFTTT

Shh! Obama gets anti-secrecy award | POLITICO 44



from Hacker Samurai http://ift.tt/OEBDXr

via IFTTT

NYPD won’t punish cops for sanitizing Wikipedia police brutality entries



from Hacker Samurai http://ift.tt/1EnhcR3

via IFTTT

Hanging out with hackers at #HackingCBCMTL | hacker samurai



from Hacker Samurai http://ift.tt/1LoZB4s

via IFTTT

IT Firm Baits Hackers With Online Model Train Set | hacker samurai



from Hacker Samurai http://ift.tt/1O31diZ

via IFTTT

Rand Paul woos hackers, entrepreneurs at SXSW | hacker samurai



from Hacker Samurai http://ift.tt/1EtpvgP

via IFTTT

Protecting the Internet of Things | hacker samurai



from Hacker Samurai http://ift.tt/1HXzFaG

via IFTTT

Federal authorities one step closer to busting JPMorgan Chase hackers | hacker samurai



from Hacker Samurai http://ift.tt/18CvNiZ

via IFTTT

Anti-terror censorship: France blocks 5 sites without court order



from Hacker Samurai http://ift.tt/1GWzu1s

via IFTTT

Hackers’ scary new tool changes digital fingerprints | hacker samurai



from Hacker Samurai http://ift.tt/1BQjgUC

via IFTTT

SENIORS’ SAFETY: Hackers tapping into fear, gratitude | hacker samurai



from Hacker Samurai http://ift.tt/18WNFF8

via IFTTT

SENIORS’ SAFETY: Hackers tapping into fear, gratitude

Nationalist Hackers From Turkey Cause Chaos, Deface Dozens of Sites | hacker samurai



from Hacker Samurai http://ift.tt/1Gig5on

via IFTTT

Chard woman’s warning after falling foul of hacking scam | hacker samurai



from Hacker Samurai http://ift.tt/1bdlzab

via IFTTT

Anonymous lists 9,200 Twitter accounts linked to Islamic State after hacktivist collaboration |...



from Hacker Samurai http://ift.tt/1ASyjIh

via IFTTT

Anonymous lists 9,200 Twitter accounts linked to Islamic State after hacktivist collaboration

AppSecTalk: Why is building security into the SDLC important?

Hackers Blog http://ift.tt/1FuqIFT

from Hacker Samurai http://ift.tt/1AS8ok9

via IFTTT

Monday 16 March 2015

OpenSSL mystery patches due for release Thursday



from Hacker Samurai http://ift.tt/1O1sz9d

via IFTTT

My Roommate, the Darknet Drug Lord



from Hacker Samurai http://ift.tt/1FtrSSe

via IFTTT

Snowden Leaks Have Changed How Americans See Their Privacy



from Hacker Samurai http://ift.tt/1FrWRhD

via IFTTT

Germany puts plan to boost sale of electric company cars on ice



from Hacker Samurai http://ift.tt/18z4SVb

via IFTTT

FCC Outlines Plan To Crush Awful State Protectionist Broadband Laws | Techdirt



from Hacker Samurai http://ift.tt/1AvCb2S

via IFTTT

State Department Toughens Up Computer Network Against Cyber Threats | hacker samurai



from Hacker Samurai http://ift.tt/1BMEBy8

via IFTTT

Judge to Government: 'National Security' Isn't a 'Magic Word' That Allows Constitutional Rights...



from Hacker Samurai http://ift.tt/1BJzoFY

via IFTTT

Vietnamese hackers allegedly steal 50,000 accounts from local telecom giant | hacker samurai



from Hacker Samurai http://ift.tt/1EkaxqF

via IFTTT

Hackers fail to silence Indian Cooperative voice | hacker samurai



from Hacker Samurai http://ift.tt/1EkayuX

via IFTTT

Healthcare files valuable to identity thieves | hacker samurai



from Hacker Samurai http://ift.tt/1Eqo42L

via IFTTT

Royal Family Told To Shut Down Social Media Accounts Over Hacking Fears | hacker samurai



from Hacker Samurai http://ift.tt/1NZTD8L

via IFTTT

Senator Hatch: It's Time to Kill Patent Trolls for Good | WIRED



from Hacker Samurai http://ift.tt/18SoD9S

via IFTTT

Authorities Closing In on Hackers Who Stole Data From JPMorgan Chase | hacker samurai



from Hacker Samurai http://ift.tt/1wQf1YR

via IFTTT

Ted Cruz tells NASA chief to focus less on climate change and more on space exploration (+video)



from Hacker Samurai http://ift.tt/19jIK28

via IFTTT

Dear customer, Russian hackers have your data | hacker samurai



from Hacker Samurai http://ift.tt/1LiMxgO

via IFTTT

The Snowdens: new awards for hackers | hacker samurai



from Hacker Samurai http://ift.tt/1bbBHsP

via IFTTT

Will cloud-first finally take off in 2015? -- FCW



from Hacker Samurai http://ift.tt/18jM0JA

via IFTTT

CBC Montreal hackathon ideas in motion | hacker samurai



from Hacker Samurai http://ift.tt/18RMS8j

via IFTTT

High-school web-site hacked by ISIS backers | hacker samurai



from Hacker Samurai http://ift.tt/1AM54H9

via IFTTT