Tag: hacking

FreeBSD Hackers Compromise Project Development Servers

FreeBSD Hackers Compromise Project Development Servers

| November 19, 2012 | Reply

Lucian Constantin PCWorld   FreeBSD Hackers have compromised two servers used by the FreeBSD Project to build third-party software packages. Anyone who has installed such packages since September 19 should completely reinstall their machines, the project’s security team warned.     Intrusions on two machines within the FreeBSD.org cluster were detected on November 11, the FreeBSD […]

Read More

What To Do When Your Phone Gets Hacked

What To Do When Your Phone Gets Hacked

| November 19, 2012 | 4 Replies

Elise Ackerman Forbes   What To Do When Your Phone Gets Hacked … My friend Mike’s Android phone had been acting strangely for awhile. In the middle of the night, the phone would come alive. It would meander down various menu paths, send texts that were gibberish and start playing poker. Was it bug in […]

Read More

CIA Mistress’ Email May Have Been Hacked By Anonymous

CIA Mistress’ Email May Have Been Hacked By Anonymous

| November 10, 2012 | Reply

Zeke Miller Buzzfeed   Paula Broadwell’s personal email appears on a list of compromised accounts, hacked by Anonymous, stolen from the commercial intelligence firm Stratfor. A Yahoo email account belonging to former CIA Director David Petraeus’ mistress may have been compromised by the group Anonymous. The personal email account, which other sources confirmed belongs to the […]

Read More

US Fighting Global Cyber Warfare

US Fighting Global Cyber Warfare

| October 28, 2012 | 2 Replies

Michael Kling Money News   The Pentagon is striving to improve the military’s global cyber warfare capabilities — both offensive and defensive abilities — in an effort to prevent an electronic Pearl Harbor. The Army is interested in leading the cyber war effort through its new Army Cyber Command, according to Defense Tech, a military […]

Read More

5 Tips for Protecting Your Identity

5 Tips for Protecting Your Identity

| October 28, 2012 | 3 Replies

  Mark Walker VirtualThreat Guest Writer   Protecting your identity is important. Once your identity is stolen, it can be difficult to restore. After theft, you may find that you have multiple credit cards and loans under your name, property that you do not own or other financial obligations that you simply did not make. […]

Read More

NICT Daedalus Gives Startling Function and Beauty to Cyber Security

NICT Daedalus Gives Startling Function and Beauty to Cyber Security

| October 28, 2012 | Reply

Meg Jones VirtualThreat Guest Writer   NICT Daedalus.  It’s an unfortunate fact that many people fail to realize, but advancements in technology also lead to advancements in criminal activity. Yes, even the technologies that are intended for our safekeeping, security, and protection. In short, the bad guys can nearly always find a way to break […]

Read More

Hacked Android Apps Trick You into Revealing Personal Data

Hacked Android Apps Trick You into Revealing Personal Data

| October 28, 2012 | 3 Replies

  BBC   Millions of people are using hacked Android apps that can be tricked into revealing personal data, research indicates. Scientists tested 13,500 Android apps and found almost 8% failed to protect bank account and social media logins. These apps failed to implement standard scrambling systems, allowing “man-in-the-middle” attacks to reveal data that passes back and […]

Read More

Chinese Hackers Target Sony Playstation 3 Firmware

Chinese Hackers Target Sony Playstation 3 Firmware

| October 28, 2012 | Reply

Ellyne Phneah ZDNet     A Chinese hacking group says it has released a custom Sony PlayStation 3 firmware which can circumvent the firmware on the game console. BlueDiskCFW released the custom firmware CFW which contains the LVO encryption keys to enable users to bypass the current PlayStation Network (PSN) passphrase security protocol, according to The Hacker News […]

Read More

FBI Working 24/7 Tracking Hackers and Cyber Attacks

FBI Working 24/7 Tracking Hackers and Cyber Attacks

| October 28, 2012 | 1 Reply

Emil Protalinski TheNextWeb   The Federal Bureau of Investigation (FBI) is finally stepping up its game when it comes to tracking hackers. Maybe it was Anonymous that did it or maybe it was statements from the US Secretary of Defense two weeks ago, but either way, the FBI is now hunting hackers 24/7. You’re not the only one who was […]

Read More

Top 25 Most Common Passwords List for 2012

Top 25 Most Common Passwords List for 2012

| October 27, 2012 | 6 Replies

Chris Dougherty VirtualThreat Contributing Writer   Have you ever wondered why so many people are easy targets for hackers?  The top reason is due to the use of weak, common passwords. According to SplashData, a California password management company, the word ‘password’ is the #1 most common password on the “Worst Passwords of 2012” list. […]

Read More