One day after hacktivist collective Anonymous claimed to have stolen 15,000 membership records from the “semi-official” North Korea government outlet uriminzokkiri.com, the country’s official Flickr and Twitter accounts have also been hacked. So far, the @uriminzokkiri account has tweeted five times to signal that several North Korean websites, including ryomyong.com and uriminzokkiri.com” had been hacked. Read More
Andrew Auernheimer, better known by his pseudonym “weev,” was sentenced today to 41 months in prison for exploiting an AT&T security flaw that allowed him to collect and publish the email addresses of 114,000 AT&T iPad owners. He alerted AT&T to the flaw before sending the dataset to Gawker, which published it, leading to an FBI investigation. Read More
Family ties Looks like Kim Dotcom has a pretty good sense of humor about his appearance. The Megaupload founder recently posted a photo on his Instagram of himself posing next to a hippo with the caption “Kim and his Brother ;-).” Zing. Read More
Hackers have defaced the MIT.edu website in response to the death of Internet activist Aaron Swartz, who was being prosecuted with the cooperation of M.I.T for illegally downloading JSTOR files over the university’s network and uploading them for free use by the public. Mr. Swartz hung himself in his Brooklyn apartment 10 days ago, and a memorial was held for him at Cooper Union in New York on Saturday. Read More
Researchers at North Carolina State University and the University of Oregon have discovered a way to turn cloud computing into hacker heaven.
Disguising data transfers with URL-truncating services like TinyURL or Bit.ly, researchers found that cloud-based processing power intended to shift computing tasks from laptops, tablets and mobile devices could be converted to crack encoded passwords or used for a large scale denial-of-service attack. Read More
The word hacker has been everywhere recently, splashed across the front page for weeks as the “Phone Hacking” scandal at News of the World engulfed Rupert Murdoch and his media empire. There is a sensational mystique to the term that makes it irresistible to journalists. But typing the default password “1111” into the voicemail box of a murdered girl is not hacking. Neither is bribing the police for the phone numbers of celebrities and crime victims. Unless we’re ready to call smashing the window on my Honda Civic “car hacking,” nothing in the News. Corp scandal fits the bill.
“If it had been me, I would have broken into the phone company system, so I could have had direct access to the messages of all their customers,” said Kevin Mitnick, who was for several years the most wanted computer criminal in America, after hacking into the voicemail computers at Pacific Bell. “What News Corp. did, guess pin codes, spoofing voicemails, that is amateur script kiddie stuff.” Read More
Few hackers groups in the history of the internet age have claimed responsibility for attacks on so many prominent targets in such a short period of time.
“For the past month and a bit, we’ve been causing mayhem and chaos throughout the internet,” wrote LulzSec today, “attacking several targets including PBS, Sony, Fox, porn websites, FBI, CIA, the U.S. government, Sony some more, online gaming servers (by request of callers, not by our own choice), Sony again, and of course our good friend Sony.” Read More
From the department of hackneyed plot twists comes today’s New York Times story about Goldman fall guy Fabrice Tourre.
Turns out the Grey Lady had long term access to Fab’s emails. Was it through some crack investigative reporting?
Nope, turns out an artist found his laptop in the trash and, after seeing Fab’s name in the paper, started handing the correspondence over to The NYT.
A lot of New York’s heavy Foursquare users pride themselves on their adventurous and wide ranging check ins. But across the pond, the Lincoln Social Computing Research Center has mashed up public data with Foursquare check ins to show U.K. users what just how dangerous their daily lives, as measured by location based activity, really are. Read More