Dec 19

The Interview Is “Desperately Unfunny”, “Will Flop” If Not Cancelled According To Leaked Sony Emails (ZeroHedge, Dec 19, 2014):

The conspiracy theories surrounding the story of The Interview’s cancellation in the aftermath of the North Korean “hacking” just keep getting stranger by the day, (and will, in 6-9, months lead to the blockbuster drama: “How ‘The Interview’ Got Cancelled“)

First, as we previously reported, at the same time as the NYT reported that according to the US the hack “undisputedly” originated in North Korea, Wired magazine released an article explaining why it is impossible to make such a determination (see Someone is Lying). That, however, did not stop the US on its inexplicable witch hunt, and moments ago Reuters reported that according to the US, it was indeed North Korea who was responsible for the hacks (although, the report adds, North Korea may have had a little help from China so nobody really know but whatever).

From Reuters: Continue reading »

Tags: , , ,

Dec 17

H/t reader squodgy:

“If you really believe N.Korea is behind this, I have some of Saddam’s nuclear weapons for sale.

Hackers? How about a pretense for enacting cyber martial law (censorship of alternative media while PNAC engages in the next step of making war vs Russia.)

At the council of the Beast:
“Hey, fellow lizard-people [bankers, khazars, and other parasitic demons of this planet], we seem to be some 18 to 60 trillion dollars in debt. We desperately need a false flag scapegoat to blame for our impending financial collapse, now that BRICS are raining down on us. Let’s set up a global campaign of false flags, including cyberattacks and our pet armies of IS [let’s not degrade the name of the Goddess, please], leading up to our grand finale when we nuke wall street and send a fleet of MiG drones to attack European civilians, then we can implement the endgame of PNAC, because we have already lost to Eurasia economically and must start the main phase of WW-PNAC before BRICS military capability exceeds ours, which will happen very soon at the present rate.”

Author said:
“For example, what happens if the same group […] decides to
hack […] nuclear power plants and force them into critical meltdowns?”

Well, i dunno, why don’t you ask the programmers of STUXNET over at CIA-Mossad? They seem to have experience with such things, having earned the record for the worst friendly-fire incident ever, when their virus leaked from Iran to Japan, causing Fukushima Daiichi’s emergency systems to fail, killing or mutating all life in and on the Pacific?”


The-interview-Sony-hack

- Hackers in charge: Sony hack and theater pullback reveals new era of hackers trouncing multinational corporations (Natural news, Dec 17, 2014):

Note the day of December 16th, 2014. That day will mark a milestone in history because it was the first time a U.S. cinema chain censored the launch of a movie due to threats from hackers.

“Carmike Cinemas has canceled the nationwide Christmas Day release of Sony’s ‘The Interview,’ the first theater chain to do so on the day hackers threatened 9/11-like attacks on theaters that showed the movie,” reported The Wrap today. [1]

Sony pictures has been under siege ever since an elaborate hack stole studio files and emails, some of which have already been released to the great embarrassment of studio executives and Hollywood stars. Natural News hasn’t covered any of this because it all seemed so pointless… until today. Continue reading »

Tags: , , , ,

Dec 14

we-are-anonymous

- Anonymous hacks Swedish govt emails over seizure of Pirate Bay servers (RT, Dec 14, 2014):

Swedish government email accounts have been hacked by the Anonymous hacktivist group, in response to last week’s seizure of The Pirate Bay servers by Swedish police.

The group also claimed to have hacked into the government email accounts of Israel, India, Brazil, Argentina, and Mexico.

The hacktivist group also left a message at the end of the leak: “Warning: Merry Christmas & a Happy New Year to all!! Bye :*” Continue reading »

Tags: , , , , , , ,

Dec 13

- Sony suspends filming after hackers hit payments (The Times, Dec 13, 2014):

The Hollywood studio that made the James Bond and Spider-Man films has abandoned shoots after hackers crippled its computer network, and leaked four films and thousands of documents.

Agencies filming for Sony Pictures have cancelled shoots because the problems have left it unable to process payments, a source told The Times.

The attack by Guardians of Peace, a hacking collective suspected of having links with North Korea, has taken most of Sony Pictures’ computers offline.

Tags: , ,

Oct 05

- JPMorgan hack exposed data of 83 mln, among biggest breaches in history (Reuters, Oct 2, 2014):

Oct 2 (Reuters) – Names, addresses, phone numbers and email addresses of the holders of some 83 million households and small business accounts were exposed when computer systems at JPMorgan Chase & Co were recently compromised by hackers, making it one of the biggest data breaches in history.

The bank revealed the scope of the previously disclosed breach on Thursday, saying that there was no evidence that account numbers, passwords, user IDs, birth dates or Social Security numbers had been stolen.

It added that it has not seen “unusual customer fraud” related to the attack which exposed contact information for 76 million households and 7 million small businesses. Continue reading »

Tags: , , ,

Aug 05

- Airplanes could be taken over through inflight entertainment systems, hacker claims (RT, Aug 4, 2014):

A security researcher says that ships, aircraft and industrial facilities are all at risk of being compromised — perhaps with catastrophic results — and intends to explain how at a major hacker conference this week.

Ruben Santamarta, a 32-year-old consultant for cyber security firm IOActive, is expected to present a talk titled “SATCOM Terminals: Hacking by Air, Sea and Land” on Thursday at the annual Black Hat conference in Las Vegas, Nevada, and during it he plans to demonstrate how satellite communications systems used by the likes of commercial airliners and oil rigs alike can be infiltrated by malicious actors and altered to let unauthorized attackers take control. Continue reading »

Tags: , , ,

Jun 14

- Even Toilets Aren’t Safe as Hackers Target Home Devices (Bloomberg, June 10, 2014):

Come home to a hot iron and smoldering clothes this afternoon? Soon, it may not be a sign of forgetfulness, but rather evidence that you’ve been hacked.

In coming years, your smartphone will be able to lock your house, turn on the air conditioning, check whether the milk is out of date, or even heat up your iron. Great news, except that all that convenience could also let criminals open your doors, spy on your family or drive your connected car to their lair.

“As these technologies become more sophisticated, it opens up a broader spectrum of threats,” said Gunter Ollmann, chief technology officer of IOActive, a tech security firm in Seattle. A world of connected devices makes it possible “for the bad guys to have permanent entry into your household.”

What the industry calls “the Internet of things” has been heralded as the next wave of tech riches. By 2020, some 26 billion such devices may be connected to the Internet, up from 3 billion today, researcher Gartner Inc. (IT) estimates. That’s almost four times the number of smartphones, tablets and PCs that will be in use.

The vision is to connect almost everything — from cars to fridges, lamps, even toilets. Forget to flush? There’s an app for that. Continue reading »

Tags: , ,

May 19

- China Responds To “Ridiculous” Hacking Charges, Warns “Will Harm Relations With US”, Demands US “Rectify Mistake” (ZeroHedge, May 19, 2014):

While we wait (in vain) for the US to lob sanctions at China for doing what Russia has done and amass a military presence on its border with Vietnam, here is what China had to say about the earlier announcement by the DOJ charging China with espionage and “penetrating” US companies (if having nothing to add regarding the NSA). From the wires:

  • CHINA FOREIGN MINISTRY SAYS CHARGES HARM RELATIONS WITH U.S.
  • CHINA FOREIGN MINISTRY SAYS CHINA HAS ALREADY PROTESTED TO U.S., URGES U.S. TO IMMEDIATELY RECTIFY MISTAKE
  • CHINA FOREIGN MINISTRY ‘STRONGLY REFUTES’ U.S. CHARGES
  • CHINA FOREIGN MINISTRY SAYS U.S. MADE UP FACTS IN SPYING CASE
  • CHINA FOREIGN MINISTRY URGES U.S. TO `CORRECT ITS MISTAKES’
  • CHINA SAYS U.S. VIOLATES BASIC PRINCIPLES OF INTL RELATIONSHIPS
  • CHINA FOREIGN MINISTRY CALLS CHARGES `BASELESS,’ `RIDICULOUS’
  • CHINA FOREIGN MINISTRY URGES U.S. TO `WITHDRAW CHARGES’

And the enigmatic:

  • CHINA TO MAKE FURTHER RESPONSES ACCORDING TO DEVELOPMENTS

Full Statement from China’s Foreign Ministry: Continue reading »

Tags: , , , , , , ,

Apr 28

- Hackers find first post-retirement Windows XP-related vulnerability (Computerworld, April 27, 2014):

Internet Explorer 6, 7 and 8 arent being exploited yet, but harbor a critical flaw

Computerworld – Microsoft on Saturday told customers that cyber-criminals are exploiting an unpatched and critical vulnerability in Internet Explorer (IE) using “drive-by” attacks.

“Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11,” the company said in a security advisory.

Continue reading »

Tags: , , , , , ,

Apr 07

anonymous-israel-cyber-attack-.si

- #OpIsrael: Anonymous attacks hundreds of Israeli websites (RT, April 6, 2014):

Hundreds of websites of Israeli ministries and organizations came under attack by Anonymous early Monday as part of the hacktivist group’s anti-Israel operation, dubbed #OpIsrael.

“On April 7, 2014, we call upon our brothers and sisters to hack, deface, hijack, database leak, admin takeover, and DNS terminate the Israeli Cyberspace by any means necessary” the group said in a statement.

The move is an act of protest against Israel’s policies, including those against Palestine.

“The further assault on the people of Gaza, who have been flooded by your sewage, terrorized by your military apparatus, and left to die at the border while waiting for medical attention will NOT be tolerated anymore,” the statement read.

“We will not stop until the police state becomes a free state and Palestine is free.” Continue reading »

Tags: , , , , , , , ,

Mar 12

- Isn’t It Ironic: Mt.Gox Hacker Demands Ransom From Exchange Users To Not Reveal Their Personal Data (ZeroHedge, March 11, 2014)

The bankruptcy of the once largest Bitcoin exchange may be history, but now the real drama begins.

First, over the weekend, allegations surfaced that not the whole truth may have been revealed during the heartfelt announcement by Mt. Gox CEO, Mark Karpeles, who claimed that $400 million in Bitcoin were stolen by hackers. As Forbes reported, hackers took over the Reddit account and personal blog of Mark Karpeles, to reveal that the exchange he ran had actually kept at least some of the bitcoins that the company had said were stolen from users.

Continue reading »

Tags: , ,

Mar 10

FYI.


Japanese reports blame collapse of the company on hackers overloading the website

bitcoin-111
Unlike traditional currencies, which are backed by central banks, Bitcoin is created by complex interactions between a large network of computers across the globe.

- Bitcoin exchange MtGox ‘faced 150,000 hack attacks every second’ (Telegraph, March 9, 2014):

Troubled Bitcoin exchange MtGox was reportedly attacked 150,000 times per second by hackers in the days leading up to its collapse last month.

The Tokyo-based exchange, which filed for bankruptcy protection in February, was hit with crippling distributed denial-of-service (DDoS) attacks, according to the Yomiuri Shimbun newspaper.

During DDoS attacks, hackers take control of multiple computers to send a flood of data to the target, causing servers to crash and making websites unavailable.

Lawyers for MtGox said that during the attacks, which lasted for several days, 750,000 Bitcoins belonging to customers were stolen, worth an estimated $575m (£344m).

Continue reading »

Tags: , , , ,

Jan 20

- Computer Security Expert Claims he Hacked the ObamaCare Website in 4 Minutes (Liberty Blitzkrieg, Jan 20, 2014):

The hits just keep on coming for ObamaCare. It was less than two weeks ago that I highlighted the potential premium rate death spiral that ObamaCare faces due to the fact that only old and sick people are signing up for the program. Now it seems there are further security related concerns plaguing the site, as cyber-security expert David Kennedy recently claimed that “gaining access to 70,000 personal records of Obamacare enrollees via HealthCare.gov took about 4 minutes.”

It’s actually hard to be this incompetent if you tried.

More from the Washington Times:

Continue reading »

Tags: , , , , , , , , , ,

Jan 19

- Microsoft’s secret battle against the Tor botnet (The Daily Dot, Jan 16, 2014):

In August 2013, 4 million infected computers woke up and waited instructions from their master.

The pathogen was Sefnit, a nasty bit of malware that makes infected computers mine bitcoins. Once the computers woke up, they worked under the command of Ukranian and Israeli hackers named Scorpion and Dekadent. The malware communicated with the two by downloading Tor, the powerful anonymizing software, and talking over encrypted channels. It was the first time a botnet, as a collection of slave computers is called, used Tor in such a potentially powerful way.

By using an unconventional method to exploit Windows, the hackers unwittingly forced Microsoft to show a hand few knew it had: The ability to remotely remove progams en masse from people’s computers, without them even knowing it.

Continue reading »

Tags: , , , , , , , , ,

Dec 31

nsa_seal

- Inside TAO: Documents Reveal Top NSA Hacking Unit (Der Spiegel, Dec 29, 2013):

Part 1: Documents Reveal Top NSA Hacking Unit

The NSA’s TAO hacking unit is considered to be the intelligence agency’s top secret weapon. It maintains its own covert network, infiltrates computers around the world and even intercepts shipping deliveries to plant back doors in electronics ordered by those it is targeting.

In January 2010, numerous homeowners in San Antonio, Texas, stood baffled in front of their closed garage doors. They wanted to drive to work or head off to do their grocery shopping, but their garage door openers had gone dead, leaving them stranded. No matter how many times they pressed the buttons, the doors didn’t budge. The problem primarily affected residents in the western part of the city, around Military Drive and the interstate highway known as Loop 410.

Continue reading »

Tags: , , , , , , , , , , , , ,

Dec 11

- NSA uses Google cookies to pinpoint targets for hacking (Washington Post, Dec 10, 2013):

A slide from an internal NSA presentation indicating that the agency uses at least one Google cookie as a way to identify targets for exploitation. (Washington Post)

The National Security Agency is secretly piggybacking on the tools that enable Internet advertisers to track consumers, using “cookies” and location data to pinpoint targets for government hacking and to bolster surveillance.

The agency’s internal presentation slides, provided by former NSA contractor Edward Snowden, show that when companies follow consumers on the Internet to better serve them advertising, the technique opens the door for similar tracking by the government. The slides also suggest that the agency is using these tracking techniques to help identify targets for offensive hacking operations.

Continue reading »

Tags: , , , , , , , , , , , , , , ,

Sep 26

:-)

- LA officials may delay school iPad rollout after students hack them in a week (engadget, Sep 26, 2013):

Just a week after it began the first phase of putting iPads in the hands of all 640,000 students in the region, the Los Angeles school district already has a fight on its hands. In a matter of days, 300 children at Theodore Roosevelt High School managed to work around protective measures placed on the Apple tablets, giving them complete access to features — including Facebook, Twitter and other apps — that should otherwise have been blocked.

Continue reading »

Tags: , , , , , ,

Sep 24

- Hackers Breach iPhone 5S Fingerprint Security (ZeroHedge, Sep 23, 2013):

Dubbed as a “game-changer” despite being around on devices for years (Motorola Atrix anyone); a ‘paradigm’ shift in mobile payment security; and a revolution in handheld devices by any and all investors bullish of the stocks; Appl’s fingerprint-scanning TouchID is everything you want it to be – apart from secure. As Der Spiegel reports, the well-respected German hacker group Chaos Computer Club (CCC) has thrown a wrench in the works by bypassing the smartphone’s much-heralded fingerprint scanner just two days after launch. The CCC, as the clip below illustrates, successfully bypassed the biometric security system, called TouchID, using “easy everyday means.” So, the question now is – will the NYPD demand everyone downgrade their phones?

Via Der Spiegel,

It is supposed to represent a major step forward in mobile phone security by replacing the password. But the fingerprint sensor on Apple’s new iPhone 5S has already been compromised just two days after it went on sale. The German hacker organization Chaos Computer Club (CCC) says it has successfully bypassed the biometric security system, called TouchID, using “easy everyday means.”

the CCC said in a blog post, it wanted to demonstrate how fingerprint biometrics is “unsuitable as [an] access control method and should be avoided.”

Such fingerprint technology has been around for a while — it was included as a feature on the Motorola Atrix smartphone, launched in 2011 — but TouchID has been reported as a significant step forward. That assertion is categorically denied by the CCC, with a hacker known as Starbug, who was responsible for bypassing the fingerprint security, saying: “In reality, Apple’s sensor has just a higher resolution compared to the sensors so far. So we only needed to ramp up the resolution of our fake.”

“It is plain stupid to use something that you can’t change and that you leave everywhere every day as a security token,” he said, referring to fingerprints.

Tags: , , , ,

Sep 14

- Hackers For Government Hire: A Growing and Deeply Disturbing Industry (Liberty Blitzkrieg, Sep 14, 2014):

Wikileaks recently continued the release of what they refer to as the “Spy Files.” These files provide a look into some of the companies behind the rapid commercialization of the spy equipment industry, who’s clients include repressive governments and dictatorial regimes around the world. In a press release announcing these files Wikileaks states:

Across the world, mass surveillance contractors are helping intelligence agencies spy on individuals and ‘communities of interest’ on an industrial scale.

The Wikileaks Spy Files reveal the details of which companies are making billions selling sophisticated tracking tools to government buyers, flouting export rules, and turning a blind eye to dictatorial regimes that abuse human rights.

One of the companies highlighted is an Italian based company called Hacking Team, a firm I had never heard of or read about until I came across an article from The Verge yesterday. What I read was pretty terrifying.

The Verge explains that: Continue reading »

Tags: , , , , , ,

Aug 03

General tells Black Hat convention surveillance programmes respect privacy and are vital for national security




- NSA director Keith Alexander defends surveillance tactics in speech to hackers (Guardian, July 31, 2013):

The director of the National Security Agency has tried to dampen the current outcry over US government surveillance programmes by insisting such programmes respect Americans’ privacy. He also said that he is unable to intercept his own daughters’ emails.

General Keith Alexander told a conference of hackers on Wednesday that extensive surveillance had disrupted dozens of terrorist attacks but that technical and policy restrictions protected the privacy of ordinary Americans.

“The assumption is our people are just out there wheeling and dealing. Nothing could be further from the truth. We have tremendous oversight over these programmes. We can audit the actions of our people 100%, and we do that,” he said.
Continue reading »

Tags: , , , , , , , , , , , , ,