Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cloud
    • Cybersecurity
    • Networking

    Latest Anonymous Havoc, Resurgent Spam Lead Week’s Security News

    By
    Fahmida Y. Rashid
    -
    August 21, 2011
    Share
    Facebook
    Twitter
    Linkedin

      It’s becoming quite a routine event with the Anonymous hacker’s group welcoming Mondays with a fresh data dump of personal information belonging to innocent people.

      This time, the targeted Website was myBART.org, the trip planning and services portal for the San Francisco region’s Bay Area Rapid Transit. Anonymous supposedly breached the site using a SQL injection attack and stole information to protest the regional transit authority’s decision last week to shut down cellular service on some of its stations.

      The decision was made to prevent protestors from organizing demonstrations at BART stations against two recent fatal shootings by the transit police. Anonymous didn’t stop with just a virtual attack, as it also helped organize a physical demonstration in San Francisco.

      A person claiming to be a member of Anonymous followed up with another attack on the BART Police Officer Association Website and publicized personal information belonging to 102 transit police officers. Interestingly enough, the main Anon Twitter account did not claim responsibility for the hack as an authorized operation.

      If that wasn’t enough Anon activity, some of the attackers went after defense contractor Vanguard Defense Industries to steal thousands of emails and documents. Released under the AntiSec banner, the attackers went after VDI to further their goal of exposing government documents.

      Hackers aren’t really synonymous with the attacks wrought by Anonymous, and eWEEK provided a look at some of the world’s best-known hackers this past week. Complaints about people left off the list were inevitable. Comedy Central host Stephen Colbert interviewed one of the people on the list, Kevin Mitnick, on his Colbert Report show on the Comedy Central cable channel last week.

      During the course of the interview, Colbert wondered aloud whether the United States government shouldn’t be hiring folks like Mitnick as “secret weapons” against enemy nation-states that are attacking American networks. There are plenty of former hackers who have gone on to work for the government (Jeff Moss, Black Hat founder, for one), so perhaps Mitnick might get a phone call soon.

      A pair of recently released reports found that organizations are leaving themselves vulnerable to attack. The report from Qualys found that more than 80 percent of Websites aren’t implementing SSL correctly,0 and a Protegrity report found that recent data breaches at Citigroup, Epsilon and Sony could have been prevented if the companies had implemented basic security measures beforehand.

      Data breaches aren’t always by outsiders, as pharmaceutical company Shionogi well knows. A former Shionogi IT administrator remotely logged into the company’s network from a free WiFi hotspot in a local McDonald’s after being laid off.

      During his intrusion, he deleted the company’s virtual infrastructure, equivalent to 88 physical servers, and brought the company to a standstill as it tried to recover data. Organizations are so worried about external malware and cyber-attacks damaging systems or stealing data that they aren’t paying attention to the kind of power their former and current employees have. Organizations should promptly change all passwords when key IT personnel leave and regularly monitor production databases to make sure all users are current and authorized.

      Malware and spam continued to dominate headlines as security companies warned about an Android Trojan variant that not only records phone calls, but actually answers incoming calls without the user being aware of it.

      The source code for the SpyEye Trojan was also released, in a manner of speaking, as the malware toolkit’s “lock” to restrict how many times people can install the software has been cracked. Now malware developers can skip shelling out $10,000 for the kit and go for the cracked version of the software. Online piracy doesn’t just exist for legitimate software, it seems. The pirates are all too happy to rip off other pirates.

      Security researchers are noticing a massive spam outbreak for the first time since Rustock’s American command-and-control servers were taken offline in March. Spam volumes jumped dramatically the week of Aug. 8 and continued increasing the week of Aug. 15, according to Avi Turiel, director of product marketing at Commtouch.

      While total spam volume jumped last week, researchers at M86 Security noticed a significant increase in malicious spam. The majority of the malicious spam appeared to be coming from the Cutwail botnet, although the Festi and Asprox botnets are among the other contributors.

      Avatar
      Fahmida Y. Rashid

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×