Mar 14, 2013 05:58 Moscow Time The administration of U.S. President Barack Obama has announced plans to allow special services access to financial data of all citizens who have accounts in the U.S.. This applies to both Americans and… Read More ›
Cyber Security
Online Records Could Expose Intimate Details and Personality Traits of Millions
Research shows that intimate personal attributes can be predicted with high levels of accuracy from ‘traces’ left by seemingly innocuous digital behaviour, in this case Facebook Likes. Study raises important questions about personalised marketing and online privacy. (Credit: Graphic from… Read More ›
Hackers release financial records for vice president, attorney general, FBI director and others
https://web.archive.org/web/20130312002048/http://exposed.su/ Hackers have published what are alleged to be the personal financial records for several politicians and celebrities, including US Vice President Joe Biden, Attorney General Eric Holder and musicians Jay-Z and Beyoncé. Gossip website TMZ reported on Monday that… Read More ›
Bank whips out palm-recognition kit – and a severed hand won’t work
New payment system to tackle identity fraud By John Leyden Posted in Security, 6th March 2013 09:37 GMT Free whitepaper – A Private Cloud Infrastructure, Simplified Italian banking group UniCredit has developed a commercial biometric payment system based on Fujitsu… Read More ›
Bank of America Alleged Key Word List
Original Article at : http://www.par-anoia.net/releases2013.html#bofa Source from: http://par-anoia.net/assessment/us/bofa/keywords.txt Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous http://www.oem.com.mx http://www.nytimes.com/pages/world/asia/index.html http://www.informador.com.mx http://www.futuregov.asia http://www.cronica.com.mx http://www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo… Read More ›
Bank of America accused of spying on Activist: “Even more amusing is the keyword list that was found, containing trigger words like ‘jihad’ or ‘homosexual’.”
Anonymous leaks ‘Bank of America secrets’ in spy revenge hack Hacktivists enraged by suggestion financial giant snooped on them By John Leyden Posted in Security, 27th February 2013 16:34 GMT Free whitepaper – IDC Report: Lost in the Cloud? Automate… Read More ›
Anonymous group claims Bank of America monitored activists
Feb 28, 2013 13:56 Moscow Time Photo: EPA The famous hacktivist group, Anonymous, has released data that it claims shows how Bank of America employed security firms to monitor hackers and activists. They unveiled some 14 Gigabytes of data, code… Read More ›
APT1, that scary cyber-Cold War gang: Not even China’s best
More B-team than elite team, say security experts By John Leyden Posted in Security, 27th February 2013 13:47 GMT Free whitepaper – IDC Report: Lost in the Cloud? Automate with Cisco Shanghai hackers APT1 – outed this month in a… Read More ›
Symantec discovers 2005 US computer virus attack on Iran nuclear plants
Internet security firm finds early ‘Stuxnet O.5’ version revealing espionage and sabotage virus released under George W Bush Charles Arthur, technology editor guardian.co.uk, Tuesday 26 February 2013 13.19 EST An alleged uranium-enrichment facility near Qom, Iran. Symantec have… Read More ›
Your Medical Records Are Part of a $19 Billion Experiment : Fraudulent billing. Identity theft. Greater expense and inefficiency. Loss of privacy
Posted By ANH-USA On February 26, 2013 @ 2:00 pm Fraudulent billing. Identity theft. Greater expense and inefficiency. Loss of privacy. And campaign donations from the companies benefiting most. Electronic medical records (EMR) came into mainstream consciousness after a hardcore lobbying effort… Read More ›
US Supreme Court throws out challenge to surveillance law
Feb 26, 2013 20:21 Moscow Time Photo: EPA US-based journalists, lawyers and human rights groups cannot challenge a federal law that allows surveillance of some international communications, the Supreme Court ruled on Tuesday in a case touching on government efforts… Read More ›
Security report becomes security risk
Mandiant’s report on Chinese hacking used as bait in spear phishing attacks By Phil Muncaster Posted in Security, 22nd February 2013 03:49 GMT Free whitepaper – A Private Cloud Infrastructure, Simplified A high profile security report released earlier this week… Read More ›
Security group suspects Chinese military is behind hacking attacks : Unit 61398
Reuters – 1 hr 55 mins ago BEIJING (Reuters) – A secretive Chinese military unit is believed to be behind a prolific series of hacking attacks, a U.S. computer security company said, contradicting claims by China’s government that it is not involved… Read More ›
Russian internet laws could make ISPs liable for user’s crimes
Published: 18 February, 2013, 13:10 Edited: 18 February, 2013, 13:15 New amendment that would make internet service providers disclose the identity of users who commit crimes online. If providers refuse they will become suspects in criminal cases instead of… Read More ›
Software that tracks people on social media created by defence firm
Exclusive: Raytheon’s Riot program mines social network data like a ‘Google for spies’, drawing ire from civil rights groups Ryan Gallagher The Guardian, Sunday 10 February 2013 10.20 EST Link to video: How Raytheon software tracks you online A multinational… Read More ›
FAA Releases New Drone List—Is Your Town on the Map?
View EFF’s updated Map of Domestic Drone Authorizations in a larger window. (Clicking this link will serve content from Google.) The Federal Aviation Administration has finally released a new drone authorization list. This list, released in response to EFF’s Freedom… Read More ›
George Bush’s family emails hacked
Investigation launched into how Guccifer posted photos and personal emails of ex-US president George HW Bush online Sam Jones guardian.co.uk, Friday 8 February 2013 07.32 EST George HW Bush: the emails were said to contain details of the state… Read More ›
Fed confirms but downplays Anonymous Superbowl banker hack
Sod that, Beyoncé is a member of the ILLUMINATI By John Leyden Posted in Security, 6th February 2013 16:03 GMT The US Federal Reserve has admitted that its systems were hacked during Sunday’s Superbowl, a breach that led to the leaking… Read More ›
$3 mln to be spent on ‘internet trolls’ as EU looks to 2014 election
Published: 3 February, 2013, 21:10 Edited: 3 February, 2013, 21:10 The EU will spend more than $3 million on ‘troll monitors’ to trawl Eurosceptic debates on the internet ahead of European elections in June 2014, UK media reports. It comes… Read More ›
New York Times claims huge attack by Chinese hackers
Stories about wealth of outgoing premier Wen Jiabao appeared to be catalyst for attack, possibly by military, says paper Jonathan Kaiman in Beijing guardian.co.uk, Thursday 31 January 2013 01.02 EST Chinese hackers, possibly from the country’s military, hacked the New… Read More ›
Hackers on anti-Egypt spree bury Egyptology journal in the sand
Bystanders in online war blasted offline By John Leyden Posted in Security, 23rd January 2013 10:57 GMT Free whitepaper – Enabling Datacenter and Cloud Service Management for Mid-Tier Enterprises Hackers waging war against Egyptian websites have forced the closure of… Read More ›
America archives its billions of tweets
AFP Tuesday, Jan 22, 2013 WASHINGTON – The Library of Congress, repository of the world’s largest collection of books, has set for itself the enormous task of archiving something less weighty and far more ephemeral – Americans’ billions of tweets…. Read More ›
Paging Dr Evil: Philips medical device control kit ‘easily hacked’
Homeland Security ‘taking an interest’ By John Leyden Posted in Security, 18th January 2013 17:03 GMT Free whitepaper – Enabling Datacenter and Cloud Service Management for Mid-Tier Enterprises Researchers have discovered security problems in management systems used to control X-ray… Read More ›
Security audit finds dev OUTSOURCED his JOB to China to goof off at work
Cunning scheme netted him ‘best in company’ awards By Iain Thomson in San Francisco Posted in Business, 16th January 2013 01:29 GMT Free whitepaper – Why RAID is Dead for Big Data Storage A security audit of a US critical… Read More ›
‘Red October’ has been spying on WORLD LEADERS for 5 years – researchers
New flavour of cyberespionage malware uncovered by security bods By John Leyden Posted in Security, 14th January 2013 18:04 GMT Free whitepaper – Shutterfly and Cleversafe Partner Case Study Security watchers have discovered a malware-based cyber-espionage campaign targeting diplomats, governments and… Read More ›
Outdated version of WordPress leads to MasterCard Hack
Author : Mohit Kumar on 1/09/2013 07:29:00 AM . On tip of a readers, yesterday we came across a new MasterCard hack, performed by Syrian Electronic Army. Hackers was able to breach MasterCard Blog (https://insights.mastercard.com) and make a new blog… Read More ›
Under the hood of recent DDoS Attack on U.S. Banks
Author : Wang Wei on 1/10/2013 02:48:00 AM Incapsula security study reveals how a simple neglect in managing the administrative password of a small UK site was quickly exploited by Botnet shepherds operating obscurely out of Turkey to hurl large… Read More ›
Armed forces are vulnerable to cyber attack, warn MPs ” entire combat units, such as aircraft and warships, could be rendered completely dysfunctional by a cyber attack “
Commons Defence Committee said threat to UK security had ability to evolve at ‘almost unimaginable speed’ Gavin Cordon Wednesday, 9 January 2013 The armed forces are now so dependent on information technology that their ability to operate could be “fatally… Read More ›
US nuke lab drops Chinese networking kit
Report says Los Alamos ditched H3C kit over security concerns By Simon Sharwood, APAC Editor Posted in Security, 8th January 2013 02:31 GMT Free whitepaper – The Definitive Guide to Dispersed Storage The Los Alamos National Laboratory, home of some… Read More ›
Anti-virus products are rubbish, says Imperva
‘Spend not proportional to effectiveness’ By Richard Chirgwin Posted in Security, 1st January 2013 21:15 GMT Free whitepaper – Media and Entertainment Goes Digital A study released in December by US security outfit Imperva has tipped a bucket on the… Read More ›
One in three have online medical record, many without knowledge
More than one in three people have had their medical details uploaded onto a central database accessible by healthcare professionals across the country, many without their knowledge, it has been claimed. Health Secretary Jeremy Hunt is keen to boost the… Read More ›
Chinese Hackers exploiting Internet Explorer Zero Day vulnerability for Cyber Espionage
Author : Mohit Kumar on 12/29/2012 03:37:00 AM Web site for the Council on Foreign Relations was compromised and recently hit by a drive-by attack that was detected earlier this week. Hacker are suspected to be from China… Read More ›
New WordPress vuln emerges
W3 Total Cache has faulty defaults By Richard Chirgwin Posted in Security, 27th December 2012 21:29 GMT Free whitepaper – Why RAID is Dead for Big Data Storage Sorry to spoil the day for any sysadmins that thought today would be… Read More ›
Personalised pricing: driving prices down? Yes, a Price Just for You !
The Office of Fair Trading is probing whether some websites use data to hike prices for individual consumers – legal expert Vanessa Barnett says the opposite is likely to be the case. Personalised pricing is similar to supermarkets’ loyalty schemes,… Read More ›
Stabuniq Trojan rapidly stealing data from US banks
Author : Mohit Kumar on 12/23/2012 04:26:00 AM Trojan.Stabuniq geographic distribution by unique IP address Security researchers from Symantec have identified a new Trojan that appears to be targeting financial institutions. Dubbed Trojan.Stabuniq, the malware has been collecting information from… Read More ›
10,000 Indian government and military emails hacked
State-sponsored snoopers suspected of large scale incursion By Phil Muncaster Posted in Security, 21st December 2012 05:14 GMT Free whitepaper – Why RAID is Dead for Big Data Storage India’s government and military have suffered one of the worst cyber attacks… Read More ›
Google starts watching what you do off the Internet too
Published: 20 December, 2012, 22:24 Edited: 20 December, 2012, 22:24 The most powerful company on the Internet just got a whole lot creepier: a new service from Google merges offline consumer info with online intelligence, allowing advertisers to target… Read More ›
Twitter suspends Anonymous account
Dec 19, 2012 21:10 Moscow Time © Collage “The Voice of Russia” YourAnonNews, a Twitter account used by members of Anonymous to relay messages pertinent to the hacktivist movement, has been suspended. Twitter users aligned with Anonymous and other online… Read More ›
WordPress Pingback Vulnerability Serves DDoS attack feature
Author : Mohit Kumar on 12/18/2012 06:47:00 AM Accunetix a web application security company reported vulnerabilities found in the WordPress Pingback feature. According to report, Pingback vulnerability exists in the WordPress blogging platform that could leak information and lead to… Read More ›
Stolen NASA laptop contained private info on 10,000+ employees
By Stephen C. Webster Monday, December 17, 2012 15:55 EST A laptop computer stolen from a vehicle of a NASA employee on Halloween contained sensitive, private information on more than 10,000 current and former NASA employees, an internal report… Read More ›
Korean Cyber espionage attack Targets Russia
Ask an expert on cyber espionage and he for sure he will speak of China, the most active and advanced country in this sector, this time a clamorous campaign apparently originated from Korea has been discovered. . Security company FireEye… Read More ›
Internet Explorer flaw allows Hackers to Track your Mouse; “Almost every US-based user of Internet Explorer will have their mouse cursor tracked via this exploit almost every day “
Author : Mohit Kumar on 12/15/2012 05:09:00 AM A vulnerability in different versions of Microsoft‘s widely used browser Internet Explorer can allow hackers to track the movements of your mouse. Microsoft is investigating reports of a mouse-tracking flaw that puts… Read More ›
McAfee warns of Project Blitzkrieg hack attack on US banks
No, not that McAfee, the other McAfee By Iain Thomson in San Francisco Posted in Security, 15th December 2012 00:52 GMT Free whitepaper – Shutterfly and Cleversafe Partner Case Study Security firm McAfee warns that there is a credible threat of… Read More ›
Hacker ruined Australian military security in 3 Minutes
Author : Mohit Kumar on 12/12/2012 06:25:00 AM Some 22,300 purported student and staff records held by the Australian Defence Force Academy were stolen and published online last month. A member of the Anonymous group, known as Darwinaire, is claiming responsibility… Read More ›
MPs: ‘Chilling’ new libel law will CENSOR THE TRUTH online
We’re not trolling, you can silence a site with an email By Kelly Fiveash, Networks Correspondent Posted in Law, 12th December 2012 13:57 GMT Free whitepaper – A Paradigm Shift in Digital Asset Storage A proposed overhaul to the UK’s… Read More ›
Russian space research org targeted by mystery malware attack
Korean message forum becomes cyber-espionage hub By John Leyden Posted in Security, 12th December 2012 10:03 GMT Free whitepaper – A Paradigm Shift in Digital Asset Storage Security researchers have discovered a targeted attack against Russian hi-tech firm that appears to… Read More ›
GhostShell hackers release 1.6 million NASA, FBI, ESA accounts
Hacktivist crew signs off for Christmas By Iain Thomson in San Francisco Posted in Security, 11th December 2012 01:19 GMT Free whitepaper – Enabling Datacenter and Cloud Service Management for Mid-Tier Enterprises The hacking collecting GhostShell has announced it has finished… Read More ›
Saudi Aramco: Foreign hackers tried to cork our gas output
Worm outbreak targeted oil giant’s sensitive machinery By John Leyden Posted in Security, 10th December 2012 14:56 GMT Free whitepaper – A private Cloud-based approach Hackers who used the Shamoon worm to attack oil giant Saudi Aramco were bent on… Read More ›
Hackers Hit Former U.S. Military Chief
Author : Mohit Kumar on 12/07/2012 06:28:00 AM According to reports, the hackers targeted personal computers retired Admiral Mike Mullen, the former chairman of the Joint Chiefs of Staff. The FBI is hunting for foreign hackers. Mullen is currently teaching WWS 318:… Read More ›
Robopocalypse, or killing robots: where humans are the target
Sarah Neary Dec 6, 2012 18:12 Moscow Time © Photo: SXC.hu Run for cover! Robots may become self-governing devices with built-in firearms in massive numbers worldwide. Yet, robots’ picking who to destroy on the battlefield is a recipe for disaster…. Read More ›