Following the tradition of Hot or Not and other sites that ask the Internet masses to rank and rate various things, a United Kingdom-based hacker and web developer “s0lar” has launched RankMyHack.com. Conceived as the world’s first “elite hacker ranking system,” RankMyHack gives “Ranking Points” to registered users who have submitted proof a Website they […]
McAfee extended its mobile-data-protection software to provide iPhone users with remote tracking, remote wipe and backup capabilities. WaveSecure will be available through the iTunes App Store for $19.95, McAfee said Aug. 15. The application will allow users to back up their contacts, photos and video as well as to restore the data directly from McAfee’s […]
Passengers who ride the San Francisco regional subway system are the latest innocent victims, as hacktivist collective Anonymous stole and released sensitive information belonging to more than 2,000 riders. On Aug. 14, the loose-knit group of hackers breached MyBart.org, the Website commuters use to get information from the Bay Area Rapid Transit system. The names, […]
Kevin Dark Dante Poulsen Kevin Poulsen was known as “Dark Dante” within the hacker community. He was best known for hacking phone systems, particularly at radio stations to win various prizes. His biggest prize was the Porsche 944 S2 from Los Angeles KIIS FM in 1990. He is currently a senior editor at Wired News […]
Android malware has been popping up like clockwork this year, with increasingly sophisticated features and capabilities. The latest Android Trojan variant masquerades as a Google+ application and can record phone calls, answer incoming calls and execute remote commands sent to the handset via SMS (Short Message Service) communications, Mark Balanza, a threats analyst at Trend […]
Cyber-attacks have dominated headlines this summer as government agencies, large organizations and small businesses have been hit by malware, distributed-denial-of-service attacks and network intrusions. On the personal front, individuals’ email and social networking accounts have been hijacked. Most cyber-attackers are motivated by money, whether it’s by looting bank accounts or selling stolen information to other […]
Anonymous kicked off the week with a data dump containing data from 70 United States law enforcement agencies. The almost-10 GB BitTorrent file contained confidential data such as informants tips, sensitive personal information and e-mail. Names, addresses, credit card numbers and Social Security numbers of individual law enforcement officials were also stolen and publicized.Identity Finder […]
Research in Motion fixed a critical flaw in how images are processed on the BlackBerry Enterprise Server, and said the vulnerability ranked at the top of the severity scale in terms of exploitability. The company issued a patch Aug. 11 to address the flaws in the back-end software used by organizations to manage all the […]
Trading on the Hong Kong stock exchange remained suspended for a handful of stocks as a result of a distributed denial-of-service attack on its news Website, the Financial Times reported. The “coordinated and sustained” DDoS attacks continued for a second day on one of the exchange’s Websites which is used to disseminate price-sensitive information, FT […]
Aruba Networks detected and contained more than 8,790 security events over the wireless networks it deployed for the annual Black Hat security conference in Las Vegas, the company said. The attacks included “670 rogues, 191 AP flood attacks, 489 instances of AP spoofing, 579 instances of IP spoofing, 1,659 ‘Hotspotter’ attacks and 1,799 ‘Block ACK’ […]