Feed

Steve Huff

Hack Hack Hack Hack It Apart

Team GhostShell Finishes The Year With Megahack on Orgs Including NASA and Pentagon Defense Contractor

Team GhostShell's Project WhiteFox logo.

Team GhostShell published their “last project” Monday, “Project WhiteFox.” The hacking crew again used their signature method of announcing the large-scale hack, hijacking numerous Twitter  profiles to link to their Pastebin page and notify tech blogs and writers who have covered them in the past.

On the page linking to data taken as part of Project WhiteFox, Team GhostShell explained some of their actions over the past year or so. They also revealed that “DeadMellox” was a ploy, writing that he “was a ghost to begin with.” Read More

Hack Hack Hack Hack It Apart

Anonymous Hacks HunterMoore.tv, Posts Everything Online [Updated]

Screengrab of defaced huntermoore.tv.

In response to Revenge Porn King Hunter Moore‘s new HunterMoore.tv, a site that might make it much easier to locate, stalk and even harm anyone whose images are published there, Anonymous recently mounted #OpHuntHunter and #OpAntiBully, efforts to expose everything Mr. Moore hasn’t made public or doesn’t want the public to know.

The operation began in earnest Wednesday with a denial-of-service (DDoS) attack against HunterMoore.tv. Based on a Pastebin post published by Anonymous Thursday, that DDoS was a cover for Anonymous’s real goal, sifting for nasty buried treasures on Mr. Moore’s site: Read More

Planet Google

Google Is Funding Drones That Track Rhino Poachers

google_domination_1

Debate all you want about whether Google has put aside its one-time mantra about not being evil–the search giant wants to save the rhinos. On Tuesday, Google gave the World Wildlife Fund (WWF) $5 million so the organization can use more drones to monitor poachers hunting endangered animals.

Mother Jones reports that the WWF was already using unmanned aerial drones in Nepal, where they act as eyes in the skies for park rangers on the hunt for poachers hiding in remote destinations. Now the WWF’s drone program will expand across the world: Read More

Secrets Secrets Are No Fun

American and British Anti-Terror Efforts Possibly Compromised By ‘Massive’ Data Theft

Spycraft. (tr.robinson/flickr)

An unnamed IT drone working for Switzerland’s NDB spy agency may have endangered counter-terrorism efforts around the world by stealing terabytes of classified data.

Swiss authorities warned the United States and the United Kingdom about the breach after the suspect was arrested last summer. The tech, described by one Reuters source as “very talented,” was behaving suspiciously and authorities say he was disgruntled after feeling his views about operating the agency’s network were ignored. Reuters reports the man then collected massive amounts of data on hard drives and simply carried them out of government facilities. Read More

Hack Hack Hack Hack It Apart

Researchers Find New Mac Keylogging Trojan on Site About Dalai Lama

apple logo

Dockster is a recently discovered Mac-based malware program that functions as a keylogger, among other things. It’s also a trojan, which means it can hide on a host computer quietly recording every keystroke before it contacts a remote server for further instructions. Dockster is considered “low risk,” but it has been found embedded on gyalwarinpoche.com–a site dedicated to the Dalai Lama.

F-Secure confirmed the infection and reported that Tibetan sites appear to be frequent targets for similar exploits: Read More

When Copyright's Wrong

Superstorm Sandy Delays Implementation of Copyright Alert System

Screengrab, Copyrightinformation.org

TorrentFreak reports that the Copyright Alert System, which some big Internet service providers were planning to implement Wednesday, is on hold. The system has been delayed due to adverse conditions following Superstorm Sandy, which threw a hugely destructive wrench into the works for many utilities and ISPs.

The Center for Copyright Information (CCI) is behind the system. CCI’s Executive Director, Jill Lesser, wrote a blog post explaining the delay, which read in part: Read More

Privacy Police

Senate Judiciary Committee Passes ECPA, Which Will Require Warrants For Messages and Emails

Sen. Patrick Leahy (leahy.senate.gov)

On Thursday the Electronic Communications Privacy Act (ECPA), sponsored by Vermont Senator Patrick Leahy, was unanimously passed by the Senate Judiciary Committee. The ECPA has actually been around since 1986; the new version has been updated for the 21st Century. Now law enforcement will be required to have a search warrant if they want a peek at emails, private messages and data that’s been uploaded to the cloud.

As The Next Web reports, the ACLU is pretty happy the new version of the act has come this far: Read More

Hack Hack Hack Hack It Apart

Researchers Say the Cloud Could Aid in Large-Scale Cyber Attacks

Not all clouds are security threats. (flickr.com/kky)

Researchers at North Carolina State University and the University of Oregon have discovered a way to turn cloud computing into hacker heaven.

Disguising data transfers with URL-truncating services like TinyURL or Bit.ly, researchers found that cloud-based processing power intended to shift computing tasks from laptops, tablets and mobile devices could be converted to crack encoded passwords or used for a large scale denial-of-service attack. Read More

Hack Hack Hack Hack It Apart

Hackers Steal and Publish Data Stolen From U.N. Nuclear Watchdog

The International Atomic Energy Agency

The International Atomic Energy Agency (IAEA) reported a striking security breach Tuesday, admitting that hackers had stolen information from one of its servers and published it online.

According to Reuters, a group with “an Iranian-sounding name” published the information and requested a probe into Israel’s nuclear program.  The IAEA is already wary of Iran’s nuclear ambitions.

Reuters reports the theft may not have compromised much in the way of confidential data: Read More