Sep 23

US government hack stole fingerprints of 5.6 million federal employees

Tags: , , , ,

Sep 06

Published on Sep 6, 2015


Mozilla yesterday detailed a security attack on its bug tracker and testing tool Bugzilla, as well as the steps it is taking to mitigate a repeat incident. In short, a hacker compromised the service, stole security-sensitive information, and used it to attack Firefox users.

Bugzilla is open-source software that has been adopted by a variety of organizations in addition to Mozilla: WebKit, the Linux kernel, FreeBSD, Gnome, KDE, Apache, Red Hat, Eclipse, and LibreOffice. While Bugzilla is mostly public, access to security-sensitive information is restricted so that only certain privileged users can access it. Following the attack, Mozilla has now beefed up security on those accounts.…

Tags: , , , , ,

Jul 20



Ashley Madison Hacked: America’s 37 Million ‘Cheaters’ About To Be Exposed (ZeroHedge, July 19, 2015):

Two months ago, AdultFriendFinder was hacked, exposing fuck buddy friend-finding federal employees among its 3.5 million user ‘exposure’. Today, as KrebsOnSecurity reports, large caches of data stolen from online cheating site have been posted online by an individual or group that claims to have completely compromised the company’s user databases, financial records and other proprietary information (including profiles with all the customers’ secret sexual fantasies). The hacker group “The Impact Team” manifesto concludes, “too bad for those [37 million] men, they’re cheating dirtbags and deserve no such discretion.”

Ashley Madison Hacked

As KrebsOnSecurity reports, the still-unfolding leak could be quite damaging to some 37 million users of the hookup service, whose slogan is “Life is short. Have an affair.” Continue reading »

Tags: , , , , ,

May 21

Confirmed: Hackers attacked St. Louis Federal Reserve Bank (RT, May 20, 2015):

A cyberattack on the Federal Reserve Bank of St. Louis last month compromised the bank’s domain name and routed web traffic to rouge websites created by the hackers that simulated the original, the bank confirmed this week.

Bank officials said in a statement on Monday that while the hackers didn’t compromise its website, they did manipulate the bank’s routing on April 24.

Tags: , , ,

May 17

GCHQ at Cheltenham, Gloucestershire

UK Government Quietly Rewrites Hacking Laws to Give GCHQ Immunity (Ars Technica, May 17, 2015):

The UK government has quietly passed new legislation that exempts GCHQ, police, and other intelligence officers from prosecution for hacking into computers and mobile phones.

While major or controversial legislative changes usually go through normal parliamentary process (i.e. democratic debate) before being passed into law, in this case an amendment to the Computer Misuse Act was snuck in under the radar as secondary legislation. According to Privacy International, “It appears no regulators, commissioners responsible for overseeing the intelligence agencies, the Information Commissioner’s Office, industry, NGOs or the public were notified or consulted about the proposed legislative changes… There was no public debate.” Continue reading »

Tags: , , , , , , ,

Mar 03

hillary leak teaser – How A Romanian Hacker Exposed Hillary Clinton’s Secret Email Life (ZeroHedge, March 3, 2015):

While the Hillary Clinton email fiasco is sure to be the talk of the town for the next few days, weeks, and months and may have seriously jeopardized the former SecState’s chances at becoming America’s next president, an even more important story is how the revelation that Hillary exclusively used a private, unencrypted and unsupervised email for 4 years of state-level, official business communications, emerged in the first place.

The answer, shockingly, comes courtesy of a Romanian hacker who was known by the handle “Guccifer”, and who is currently serving time in a Bucharest prison for his online attacks against countless public figures including the infamous leaks of George W. Bush personal paintings. Continue reading »

Tags: , , , , , , , ,

Feb 17

1bn online bank heist

Remote ATM control: Kaspersky Lab details $1bn online bank heist (EXCLUSIVE) (RT, Feb 16, 2015):

Internet security company Kaspersky Lab says the banking industry could be experiencing “a new era in cybercrime.” The company has been investigating a $1 billion attack on financial institutions by a sophisticated hacking group.

The IT security firm says the hackers from the Carabanak group used a complex virus system which was later named after them. It is not like the simple Trojan horse malware used to by-pass security systems, but something much more complex and unique, according to documents exclusively seen by RT.

Russian cyber-security company Kaspersky Lab was invited to look into the matter, after an ATM in the Ukrainian capital Kiev started giving out cash randomly without anyone inserting a card or touching any buttons in late 2013. Continue reading »

Tags: , , , ,

Jan 15

Never mind that …

It Wasn’t North Korea Or Russia: Sony Hack ‘Perpetrator’ Said To Be Laid-Off, Disgruntled Employee

… just use the momentum and attack your enemies …

Obama Sanctions North Korea For Sony Hack Which Was Perpetrated By Disgruntled Former Employee


Senator Jay Rockefeller: Internet Is The ‘No.1 National Hazard’ (Video):

‘It really almost makes you ask the question would it have been better if we had never invented the internet.’


Obama proposes cyber law update in wake of Sony hack (RT, Jan 13, 2015):

The White House has unveiled a proposal aimed at strengthening cybersecurity within the US by encouraging sharing between sectors and installing new penalties after a series of high-profile attacks targeted government and private sector networks.

The initiative, announced by US President Barack Obama during a planned visit on Tuesday to the US Department of Homeland Security in Virginia, calls for new legislation to be adopted by Congress in order to enhance the sharing of electronic threat information between the private sector and the government, while also revamping the Computer Fraud and Abuse Act, or CFAA – the 1984 federal law that outlines when and what hacking charges can be brought against suspected cyber criminals. Continue reading »

Tags: , , , , , , , , , , , ,

Jan 12


“They are doing everything in the world to control the internet.”
– Congressman Ron Paul on the Cyber Security Act

Law Professor: Counter Terrorism Czar Told Me There Is Going To Be An i-9/11 And An i-Patriot Act:

“Lawrence Lessig, a respected Law Professor from Stanford University told an audience at this years Fortune’s Brainstorm Tech conference in Half Moon Bay, California, that “There’s going to be an i-9/11 event” which will act as a catalyst for a radical reworking of the law pertaining to the internet.”


Breaking: Jihadist Group Hacks U.S. Central Command and Is Uploading Pentagon War Game Scenarios and Personal Details of Military Members (SHFTplan, Jan 12, 2015):centcom-hack-th

US Central Command (@Centcom), the unified military command responsible for security across the Arabian Peninsula and into the central Asia region, has had their Twitter account compromised. Cyber Jihadist claiming to be linked to ISIS were actively tweeting and uploading hacked war-game scenarios and other details that include phone numbers and email addresses for U.S. military personnel.

According to the hackers, the documents were obtained from a previous hack of Pentagon defense systems, as well as mobile devices owned by individuals working for or in conjunction with the military.

As of this writing, approximately one hour after the hack was first identified on the Centcom Twitter page, the account has been suspended and all linked data, including pictures releases of war game scenario and personal details of personnel are being wiped, presumably by U.S. National Security teams.

Continue reading »

Tags: , , , , , , , , , , , ,

Jan 12


“They are doing everything in the world to control the internet.”
– Congressman Ron Paul on the Cyber Security Act

Law Professor: Counter Terrorism Czar Told Me There Is Going To Be An i-9/11 And An i-Patriot Act:

“Lawrence Lessig, a respected Law Professor from Stanford University told an audience at this years Fortune’s Brainstorm Tech conference in Half Moon Bay, California, that “There’s going to be an i-9/11 event” which will act as a catalyst for a radical reworking of the law pertaining to the internet.”

ISIS Supporters Hack US CentCom’s Twitter, YouTube Account, Threaten US Soldiers, Release “China Scenario” Details (ZeroHedge, Jan 12, 2015):

Update 2: Centcom’s YouTube account has also been hacked…


Update: 40 minutes after the first hacked tweet appeared at 12:29pm Eastern, the Centcom account has been suspended.

centcom suspended_0

Another day, another escalation in the conflict between supporters of the Islamic State and western powers, in this case the Twitter account of the US Central Command (@Centcom), which appears to have been hacked, and where compromising tweets revealing details about military members and potential conflict scenarios involving China and North Korea, are being sent out in real time.

This is the threat that was released via the hacked account moments ago:

Pentagon networks hacked



In the name of Allah, the Most Gracious, the Most Merciful, the CyberCaliphate under the auspices of ISIS continues its CyberJihad. While the US and its satellites kill our brothers in Syria, Iraq and Afghanistan we broke into your networks and personal devices and know everything about you.

You’ll see no mercy infidels. ISIS is already here, we are in your PCs, in each military base. With Allah’s permission we are in CENTCOM now.

We won’t stop! We know everything about you, your wives and children.

U.S. soldiers! We’re watching you!

Here’s a part of confidential data from your mobile devices:

There is no God but Allah and Muhammad is his Prophet! There is no law but Sharia!

A sampling of the hacked tweets:

Perhaps of increased concern: the disclosure of Centcom’s “China scenarios”



* * *

Countdown to Internet kill switch 10…. 9…. 8…. 7….



++ Iraq: al Baghdadi appare in immagini in moschea Mossul ++
A welcome distraction: the Islamist dude with the $6.500 James Bond watch.

Related info:

They Have Butchered Children (Veterans Today)

Israel Acts As ISIS’ Air Force … Repeatedly Bombs Syria

Senior Aide To President Putin: Mossad Training ISIL Terrorists

ISIS, Al-Qaeda Join The M&A Bubble, Agree To Fight ‘Common Foes’ Together In Syria

George Galloway On ISIS (Video )

Israel And Turkey Are Directly Supporting ISIS And Al-Qaeda Terrorists In Syria

The Khorasans: As Fake As the Kardashians

What Iraq Thinks: “It Is Obvious To Everyone That ISIS Is A Creation Of The United States And Israel”

The Fake Beheadings of the Arch-Zionist Crime Syndicate

ISIS EXPOSED 100% AS CIA OPERATION: ‘The Next Osama Bin Laden is Here’ (Video)

Meeting ISIL (Documentary)

ISIL Leader Al-Baghdadi Is Mossad Agent Simon Elliot

McCain and his buddy, ISIS leader Al-Baghdadi:



The U.S. has armed and trained ISIS:

Veterans Today: CIA And US Military Fight Under Al Qaeda Command In Syria (Video)

U.S. Special Forces Train Syrian Rebels In Jordan (Le Figaro)

Americans Are Training Syria Rebels In Jordan: Spiegel (Reuters)

CIA-Armed And Trained Syrian Rebels ‘On Way To Battlefield’

‘Military Intervention In Syria’, US Training ‘Rebels’ Since 2011 And The Complete Grand Plan – The March 2012 Leak


Baghdadi Mossad Trained


… all of them coming directly from from our Al-CIAda unit …


Why Was A Sunday Times Report On US Government Ties To Al-Qaeda Chief Spiked? & Gladio B

Hillary Clinton: ‘We Created Al-Qaeda’ — The Protagonists Of The ‘Global War on Terrorism’ Are The Terrorists (Video)


Just one month after this article has been published in the Guardian Robin Cook DIED:

Former British Foreign Secretary Robin Cook: ‘Al-Qaida, Literally “The Database”, Was Originally The Computer File Of The Thousands Of Mujahideen Who Were Recruited And Trained With Help From The CIA To Defeat The Russians’

Al Qaeda Doesn’t Exist or How The US Created Al Qaeda (Documentary)

BBC: Al-Qaeda Does Not Exist (Documentary)

Retired U.S. General Wesley Clark

… at the Commonwealth Club of California:

U.S. 4 Star General Wesley Clark, Oct 3, 2007: ‘We’re Gonna Attack And Destroy The Governments In 7 Countries In 5 Years’ … ‘Iraq, Syria, Lebanon, Libya, Somalia, Sudan And Iran’ (Video)

… or here in this interview with Democracy Now:

Interview With US General Wesley Clark (Ret.): US Government Planned To ‘Take Out 7 Countries In 5 Years’: ‘Starting With Iraq, Syria, Lebanon, Libya, Somalia, Sudan And Finishing Off Iran’ (Video)


Tags: , , , , , , , , , , ,

Dec 21



The White House claims North Korea is responsible for the Sony hack; As usual no evidence

Tags: , , , , , , , ,

Dec 20

Defiant North Korea Says Can Prove It Is Not Behind Hack “Without Resorting To Torture Like The CIA” (ZeroHedge, Dec 20, 2014):

Just hours after the FBI announced that, with absolute certainty, it had determined that North Korea was behind the Sony hack, a “theory” that has become the butt of global jokes, we learned, in a far less prominent release, that according to an internal inquiry, FBI evidence if “often mishandled.” According to the NYT, “F.B.I. agents in every region of the country have mishandled, mislabeled and lost evidence, according to a highly critical internal investigation that discovered errors with nearly half the pieces of evidence it reviewed.

The evidence collection and retention system is the backbone of the F.B.I.’s investigative process, and the report said it is beset by problems.

It gets better: according to the report, the F.B.I. was storing more weapons, less money and valuables, and two tons more drugs than its records had indicated. Almost as if the FBI was siphoning off cash, while hoarding guns and blow. Continue reading »

Tags: , , , , , , , ,

Dec 19

–  The Interview Is “Desperately Unfunny”, “Will Flop” If Not Cancelled According To Leaked Sony Emails (ZeroHedge, Dec 19, 2014):

The conspiracy theories surrounding the story of The Interview’s cancellation in the aftermath of the North Korean “hacking” just keep getting stranger by the day, (and will, in 6-9, months lead to the blockbuster drama: “How ‘The Interview’ Got Cancelled“)

First, as we previously reported, at the same time as the NYT reported that according to the US the hack “undisputedly” originated in North Korea, Wired magazine released an article explaining why it is impossible to make such a determination (see Someone is Lying). That, however, did not stop the US on its inexplicable witch hunt, and moments ago Reuters reported that according to the US, it was indeed North Korea who was responsible for the hacks (although, the report adds, North Korea may have had a little help from China so nobody really know but whatever).

From Reuters: Continue reading »

Tags: , , ,

Dec 17

H/t reader squodgy:

“If you really believe N.Korea is behind this, I have some of Saddam’s nuclear weapons for sale.

Hackers? How about a pretense for enacting cyber martial law (censorship of alternative media while PNAC engages in the next step of making war vs Russia.)

At the council of the Beast:
“Hey, fellow lizard-people [bankers, khazars, and other parasitic demons of this planet], we seem to be some 18 to 60 trillion dollars in debt. We desperately need a false flag scapegoat to blame for our impending financial collapse, now that BRICS are raining down on us. Let’s set up a global campaign of false flags, including cyberattacks and our pet armies of IS [let’s not degrade the name of the Goddess, please], leading up to our grand finale when we nuke wall street and send a fleet of MiG drones to attack European civilians, then we can implement the endgame of PNAC, because we have already lost to Eurasia economically and must start the main phase of WW-PNAC before BRICS military capability exceeds ours, which will happen very soon at the present rate.”

Author said:
“For example, what happens if the same group […] decides to
hack […] nuclear power plants and force them into critical meltdowns?”

Well, i dunno, why don’t you ask the programmers of STUXNET over at CIA-Mossad? They seem to have experience with such things, having earned the record for the worst friendly-fire incident ever, when their virus leaked from Iran to Japan, causing Fukushima Daiichi’s emergency systems to fail, killing or mutating all life in and on the Pacific?”


Hackers in charge: Sony hack and theater pullback reveals new era of hackers trouncing multinational corporations (Natural news, Dec 17, 2014):

Note the day of December 16th, 2014. That day will mark a milestone in history because it was the first time a U.S. cinema chain censored the launch of a movie due to threats from hackers.

“Carmike Cinemas has canceled the nationwide Christmas Day release of Sony’s ‘The Interview,’ the first theater chain to do so on the day hackers threatened 9/11-like attacks on theaters that showed the movie,” reported The Wrap today. [1]

Sony pictures has been under siege ever since an elaborate hack stole studio files and emails, some of which have already been released to the great embarrassment of studio executives and Hollywood stars. Natural News hasn’t covered any of this because it all seemed so pointless… until today. Continue reading »

Tags: , , , ,

Dec 14


Anonymous hacks Swedish govt emails over seizure of Pirate Bay servers (RT, Dec 14, 2014):

Swedish government email accounts have been hacked by the Anonymous hacktivist group, in response to last week’s seizure of The Pirate Bay servers by Swedish police.

The group also claimed to have hacked into the government email accounts of Israel, India, Brazil, Argentina, and Mexico.

The hacktivist group also left a message at the end of the leak: “Warning: Merry Christmas & a Happy New Year to all!! Bye :*” Continue reading »

Tags: , , , , , , ,

Dec 13

Sony suspends filming after hackers hit payments (The Times, Dec 13, 2014):

The Hollywood studio that made the James Bond and Spider-Man films has abandoned shoots after hackers crippled its computer network, and leaked four films and thousands of documents.

Agencies filming for Sony Pictures have cancelled shoots because the problems have left it unable to process payments, a source told The Times.

The attack by Guardians of Peace, a hacking collective suspected of having links with North Korea, has taken most of Sony Pictures’ computers offline.

Tags: , ,

Oct 05

JPMorgan hack exposed data of 83 mln, among biggest breaches in history (Reuters, Oct 2, 2014):

Oct 2 (Reuters) – Names, addresses, phone numbers and email addresses of the holders of some 83 million households and small business accounts were exposed when computer systems at JPMorgan Chase & Co were recently compromised by hackers, making it one of the biggest data breaches in history.

The bank revealed the scope of the previously disclosed breach on Thursday, saying that there was no evidence that account numbers, passwords, user IDs, birth dates or Social Security numbers had been stolen.

It added that it has not seen “unusual customer fraud” related to the attack which exposed contact information for 76 million households and 7 million small businesses. Continue reading »

Tags: , , ,

Aug 05

Airplanes could be taken over through inflight entertainment systems, hacker claims (RT, Aug 4, 2014):

A security researcher says that ships, aircraft and industrial facilities are all at risk of being compromised — perhaps with catastrophic results — and intends to explain how at a major hacker conference this week.

Ruben Santamarta, a 32-year-old consultant for cyber security firm IOActive, is expected to present a talk titled “SATCOM Terminals: Hacking by Air, Sea and Land” on Thursday at the annual Black Hat conference in Las Vegas, Nevada, and during it he plans to demonstrate how satellite communications systems used by the likes of commercial airliners and oil rigs alike can be infiltrated by malicious actors and altered to let unauthorized attackers take control. Continue reading »

Tags: , , ,

Jun 14

Even Toilets Aren’t Safe as Hackers Target Home Devices (Bloomberg, June 10, 2014):

Come home to a hot iron and smoldering clothes this afternoon? Soon, it may not be a sign of forgetfulness, but rather evidence that you’ve been hacked.

In coming years, your smartphone will be able to lock your house, turn on the air conditioning, check whether the milk is out of date, or even heat up your iron. Great news, except that all that convenience could also let criminals open your doors, spy on your family or drive your connected car to their lair.

“As these technologies become more sophisticated, it opens up a broader spectrum of threats,” said Gunter Ollmann, chief technology officer of IOActive, a tech security firm in Seattle. A world of connected devices makes it possible “for the bad guys to have permanent entry into your household.”

What the industry calls “the Internet of things” has been heralded as the next wave of tech riches. By 2020, some 26 billion such devices may be connected to the Internet, up from 3 billion today, researcher Gartner Inc. (IT) estimates. That’s almost four times the number of smartphones, tablets and PCs that will be in use.

The vision is to connect almost everything — from cars to fridges, lamps, even toilets. Forget to flush? There’s an app for that. Continue reading »

Tags: , ,

May 19

China Responds To “Ridiculous” Hacking Charges, Warns “Will Harm Relations With US”, Demands US “Rectify Mistake” (ZeroHedge, May 19, 2014):

While we wait (in vain) for the US to lob sanctions at China for doing what Russia has done and amass a military presence on its border with Vietnam, here is what China had to say about the earlier announcement by the DOJ charging China with espionage and “penetrating” US companies (if having nothing to add regarding the NSA). From the wires:


And the enigmatic:


Full Statement from China’s Foreign Ministry: Continue reading »

Tags: , , , , , , ,

Apr 28

Hackers find first post-retirement Windows XP-related vulnerability (Computerworld, April 27, 2014):

Internet Explorer 6, 7 and 8 arent being exploited yet, but harbor a critical flaw

Computerworld – Microsoft on Saturday told customers that cyber-criminals are exploiting an unpatched and critical vulnerability in Internet Explorer (IE) using “drive-by” attacks.

“Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11,” the company said in a security advisory.

Continue reading »

Tags: , , , , , ,

Apr 07

#OpIsrael: Anonymous attacks hundreds of Israeli websites (RT, April 6, 2014):

Hundreds of websites of Israeli ministries and organizations came under attack by Anonymous early Monday as part of the hacktivist group’s anti-Israel operation, dubbed #OpIsrael.

“On April 7, 2014, we call upon our brothers and sisters to hack, deface, hijack, database leak, admin takeover, and DNS terminate the Israeli Cyberspace by any means necessary” the group said in a statement.

The move is an act of protest against Israel’s policies, including those against Palestine.

“The further assault on the people of Gaza, who have been flooded by your sewage, terrorized by your military apparatus, and left to die at the border while waiting for medical attention will NOT be tolerated anymore,” the statement read.

“We will not stop until the police state becomes a free state and Palestine is free.” Continue reading »

Tags: , , , , , , , ,

Mar 12

Isn’t It Ironic: Mt.Gox Hacker Demands Ransom From Exchange Users To Not Reveal Their Personal Data (ZeroHedge, March 11, 2014)

The bankruptcy of the once largest Bitcoin exchange may be history, but now the real drama begins.

First, over the weekend, allegations surfaced that not the whole truth may have been revealed during the heartfelt announcement by Mt. Gox CEO, Mark Karpeles, who claimed that $400 million in Bitcoin were stolen by hackers. As Forbes reported, hackers took over the Reddit account and personal blog of Mark Karpeles, to reveal that the exchange he ran had actually kept at least some of the bitcoins that the company had said were stolen from users.

Continue reading »

Tags: , ,

Mar 10


Japanese reports blame collapse of the company on hackers overloading the website

Unlike traditional currencies, which are backed by central banks, Bitcoin is created by complex interactions between a large network of computers across the globe.

Bitcoin exchange MtGox ‘faced 150,000 hack attacks every second’ (Telegraph, March 9, 2014):

Troubled Bitcoin exchange MtGox was reportedly attacked 150,000 times per second by hackers in the days leading up to its collapse last month.

The Tokyo-based exchange, which filed for bankruptcy protection in February, was hit with crippling distributed denial-of-service (DDoS) attacks, according to the Yomiuri Shimbun newspaper.

During DDoS attacks, hackers take control of multiple computers to send a flood of data to the target, causing servers to crash and making websites unavailable.

Lawyers for MtGox said that during the attacks, which lasted for several days, 750,000 Bitcoins belonging to customers were stolen, worth an estimated $575m (£344m).

Continue reading »

Tags: , , , ,

Jan 20

Computer Security Expert Claims he Hacked the ObamaCare Website in 4 Minutes (Liberty Blitzkrieg, Jan 20, 2014):

The hits just keep on coming for ObamaCare. It was less than two weeks ago that I highlighted the potential premium rate death spiral that ObamaCare faces due to the fact that only old and sick people are signing up for the program. Now it seems there are further security related concerns plaguing the site, as cyber-security expert David Kennedy recently claimed that “gaining access to 70,000 personal records of Obamacare enrollees via took about 4 minutes.”

It’s actually hard to be this incompetent if you tried.

More from the Washington Times:

Continue reading »

Tags: , , , , , , , , , ,

Jan 19

Microsoft’s secret battle against the Tor botnet (The Daily Dot, Jan 16, 2014):

In August 2013, 4 million infected computers woke up and waited instructions from their master.

The pathogen was Sefnit, a nasty bit of malware that makes infected computers mine bitcoins. Once the computers woke up, they worked under the command of Ukranian and Israeli hackers named Scorpion and Dekadent. The malware communicated with the two by downloading Tor, the powerful anonymizing software, and talking over encrypted channels. It was the first time a botnet, as a collection of slave computers is called, used Tor in such a potentially powerful way.

By using an unconventional method to exploit Windows, the hackers unwittingly forced Microsoft to show a hand few knew it had: The ability to remotely remove progams en masse from people’s computers, without them even knowing it.

Continue reading »

Tags: , , , , , , , , ,

Dec 31


Inside TAO: Documents Reveal Top NSA Hacking Unit (Der Spiegel, Dec 29, 2013):

Part 1: Documents Reveal Top NSA Hacking Unit

The NSA’s TAO hacking unit is considered to be the intelligence agency’s top secret weapon. It maintains its own covert network, infiltrates computers around the world and even intercepts shipping deliveries to plant back doors in electronics ordered by those it is targeting.

In January 2010, numerous homeowners in San Antonio, Texas, stood baffled in front of their closed garage doors. They wanted to drive to work or head off to do their grocery shopping, but their garage door openers had gone dead, leaving them stranded. No matter how many times they pressed the buttons, the doors didn’t budge. The problem primarily affected residents in the western part of the city, around Military Drive and the interstate highway known as Loop 410.

Continue reading »

Tags: , , , , , , , , , , , , ,

Dec 11

NSA uses Google cookies to pinpoint targets for hacking (Washington Post, Dec 10, 2013):

A slide from an internal NSA presentation indicating that the agency uses at least one Google cookie as a way to identify targets for exploitation. (Washington Post)

The National Security Agency is secretly piggybacking on the tools that enable Internet advertisers to track consumers, using “cookies” and location data to pinpoint targets for government hacking and to bolster surveillance.

The agency’s internal presentation slides, provided by former NSA contractor Edward Snowden, show that when companies follow consumers on the Internet to better serve them advertising, the technique opens the door for similar tracking by the government. The slides also suggest that the agency is using these tracking techniques to help identify targets for offensive hacking operations.

Continue reading »

Tags: , , , , , , , , , , , , , , ,

Sep 26


LA officials may delay school iPad rollout after students hack them in a week (engadget, Sep 26, 2013):

Just a week after it began the first phase of putting iPads in the hands of all 640,000 students in the region, the Los Angeles school district already has a fight on its hands. In a matter of days, 300 children at Theodore Roosevelt High School managed to work around protective measures placed on the Apple tablets, giving them complete access to features — including Facebook, Twitter and other apps — that should otherwise have been blocked.

Continue reading »

Tags: , , , , , ,

Sep 24

Hackers Breach iPhone 5S Fingerprint Security (ZeroHedge, Sep 23, 2013):

Dubbed as a “game-changer” despite being around on devices for years (Motorola Atrix anyone); a ‘paradigm’ shift in mobile payment security; and a revolution in handheld devices by any and all investors bullish of the stocks; Appl’s fingerprint-scanning TouchID is everything you want it to be – apart from secure. As Der Spiegel reports, the well-respected German hacker group Chaos Computer Club (CCC) has thrown a wrench in the works by bypassing the smartphone’s much-heralded fingerprint scanner just two days after launch. The CCC, as the clip below illustrates, successfully bypassed the biometric security system, called TouchID, using “easy everyday means.” So, the question now is – will the NYPD demand everyone downgrade their phones?

Via Der Spiegel,

It is supposed to represent a major step forward in mobile phone security by replacing the password. But the fingerprint sensor on Apple’s new iPhone 5S has already been compromised just two days after it went on sale. The German hacker organization Chaos Computer Club (CCC) says it has successfully bypassed the biometric security system, called TouchID, using “easy everyday means.”

the CCC said in a blog post, it wanted to demonstrate how fingerprint biometrics is “unsuitable as [an] access control method and should be avoided.”

Such fingerprint technology has been around for a while — it was included as a feature on the Motorola Atrix smartphone, launched in 2011 — but TouchID has been reported as a significant step forward. That assertion is categorically denied by the CCC, with a hacker known as Starbug, who was responsible for bypassing the fingerprint security, saying: “In reality, Apple’s sensor has just a higher resolution compared to the sensors so far. So we only needed to ramp up the resolution of our fake.”

“It is plain stupid to use something that you can’t change and that you leave everywhere every day as a security token,” he said, referring to fingerprints.

Tags: , , , ,