Topic: SECURITY - on February 29, 2012 at 1:03:00 PM CET
An inside view of LulzSec's hacking rampage
On June 2, hacktivist collective "LulzSec" burst onto the cybersecurity scene with a splashy exploit: It published a trove of data stolen from 1 million user accounts on Sony's website.
LulzSec's website immediately crashed under a massive traffic attack from foes seeking to hack the hackers. Within the hour, LulzSec signed up for a website optimization service called CloudFlare -- and nine minutes later, its site was back online.
That's how CloudFlare, a Silicon Valley startup with a staff of 30, found itself in the middle one of the year's biggest cybersecurity battles.
... Link (0 comments) ... Comment
Topic: SECURITY - on February 29, 2012 at 1:01:00 PM CET
Inside An Anonymous Attack: A Victim’s Insight
Last year, hacker group ‘Anonymous’ attacked Security firm Imperva’s application defense center for 25 days. Yesterday Imperva released a report detailing the anatomy of an Anonymous attack, using data gleaned from their first hand experience. By analyzing traffic logs from the days of their attack, Imperva believes they were able to identify patterns and trends that can help companies understand and prepare for a future attack, if they should become an Anonymous target.
... Link (0 comments) ... Comment
Topic: SECURITY - on February 28, 2012 at 6:10:00 PM CET
RSA: Chaos In the Security World, And the Situation Is Perfect
Right on queue this week, the anarchic hacking collective Anonymous stepped up and grabbed the story line away from the lions of the IT security industry.
With the Conference set to begin, the whistle blowing site Wikileaks released the first of some five million e-mail messages stolen from the security intelligence firm Stratfor. Ever sensitive to the fickle attention of the media, Anonymous inserted itself into the story, claiming responsibility for leaking the data and pointing a finger of blame at Stratfor and its media, private and public sector customers, which Anonymous accuses of spying and other dark offenses.
Coming just a year after a similar hack at HBGary Federal, the leak of the Stratfor e-mails was an unwelcome reminder for the folks here at RSA that, despite some high profile arrests, little real progress has been made in fighting back against Anonymous and other hacktivists groups, or stemming their activities.
... Link (0 comments) ... Comment
Topic: SECURITY - on February 26, 2012 at 11:13:00 AM CET
New Version of Flashback Trojan Targets Mac Users
Two weeks ago, Mac security researchers at Intego discovered a variant of the Flashback Trojan using clever methods to infect systems. On Friday, Intego reported that a new variant of Flashback is targeting passwords and as a byproduct of infection, Flashback is crashing several notable applications.
Flashback was first discovered by Intego in September of 2011. It targets Java vulnerabilities on OS X, two of them to be exact, in order to infect the system. Should Flashback find that Java is fully updated, it will attempt to social engineer the malware’s installation, by presenting an applet with a self-signed certificate. The certificate claims to be signed by Apple, but is clearly marked as invalid. However, users are known to skip such warnings, thus allowing the malware to be installed.
... Link (0 comments) ... Comment
Topic: SECURITY - on February 23, 2012 at 11:59:00 AM CET
Disconnection of Millions of DNSChanger-Infected PCs Delayed
Millions of computers infected with the stealthy and tenacious DNSChanger Trojan may be spared a planned disconnection from the Internet early next month if a New York court approves a new request by the U.S. government. Meanwhile, six men accused of managing and profiting from the huge collection of hacked PCs are expected to soon be extradited from their native Estonia to face charges in the United States.
... Link (0 comments) ... Comment
Topic: SECURITY - on February 23, 2012 at 11:51:00 AM CET
WikiLeaks verbreitet neue Insurance-Datei
Die Whistleblowing-Website WikiLeaks verbreitet seit dem gestrigen Mittwoch eine neue "Insurance"-Datei. Darunter versteht WikiLeaks Dateien noch nicht veröffentlichter Dokumente, die zur Absicherung der Mitarbeiter der Plattform verschlüsselt verbreitet werden. Geschieht WikiLeaks etwas, soll das Passwort veröffentlicht werden.
... Link (0 comments) ... Comment
Topic: SECURITY - on February 23, 2012 at 11:19:00 AM CET
Pakistani newspaper ad seeks bids for a Great Firewall of Pakistan
The ad, clipped from one of the national Pakistani newspapers today (it apparently ran in all of them), seeks bids for a national censoring firewall: "Each box should be able to handle a block list of up to 50 million URLs (concurrent unidirectional filtering capacity) with processing delay of not more than 1 milliseconds.
... Link (0 comments) ... Comment
Topic: SECURITY - on February 20, 2012 at 3:48:00 PM CET
Anti-sharing directive - IPRED
IPRED is a European directive which harmonises civil (and soon, penal) sanctions at the EU level for any kind of “intellectual property” infringement: copyright, patents, trademarks and design, plant breeders rights, etc. It organises the repression against sharers, remixers, developers, hackers and inventors of all kinds.
The EU Commission wants to modify IPRED to “adapt” it to the digital environment. This means expanding the war on sharing on the Internet, in direct continuation of ACTA's goals. IPRED calls for large scale filtering of the Internet to thwart file sharing. Search engines, hosting services, websites and Internet access providers would be forced to control the communications of Internet users.
... Link (0 comments) ... Comment
Topic: SECURITY - on February 20, 2012 at 12:36:00 PM CET
How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did
Every time you go shopping, you share intimate details about your consumption patterns with retailers. And many of those retailers are studying those details to figure out what you like, what you need, and which coupons are most likely to make you happy. Target, for example, has figured out how to data-mine its way into your womb, to figure out whether you have a baby on the way long before you need to start buying diapers.
... Link (0 comments) ... Comment
Topic: SECURITY - on February 20, 2012 at 12:31:00 PM CET
IPRED - IPRED 2 = ACTA 2.0 - Neue Gesetze bedrohen unsere Freiheit
... Link (0 comments) ... Comment
Topic: SECURITY - on February 20, 2012 at 11:06:00 AM CET
SOPA, PIPA, ACTA, HR 1981 Vs Internet Freedom
... Link (0 comments) ... Comment
Topic: SECURITY - on February 20, 2012 at 10:44:00 AM CET
Do You Like Online Privacy? You May Be a Child Pornographer
... Link (0 comments) ... Comment