A report out of German news magazine Der Spiegel reveals yet more details about the NSA’s extensive surveillance techniques, which were laid bare when former NSA contractor Edward Snowden blew the whistle earlier this year. The report offers up details about the ways the NSA’s Tailored Access Operations unit, or TAO, gains access to various computer systems the world over by exploiting weaknesses in software made by companies like Microsoft and Cicso. The TAO unit, says the report, even goes so far as to intercept the delivery of [...]
Computer security company Symanetc believes it has found the hacking group responsible for some of the most well-known cyber-warfare attacks in recent history. According to Reuters, experts at Symantec are calling the group “Hidden Lynx,” and the company believes that this particular group was behind the 2009 Operation Aurora attacks that targeted Google, Yahoo, Adobe and other large tech companies in the U.S.
The Operation Aurora attacks were an attempt [...]
Well, it looks like no one is really immune from being hacked these days. This evening, Microsoft came out and stated that they too, were hacked.
As reported by Facebook and Apple, Microsoft can confirm that we also recently experienced a similar security intrusion.
Consistent with our security response practices, we chose not to make a statement during the initial information gathering process. During our investigation, we found a small number of computers, including some in our Mac business unit, that were infected by [...]
Yesterday, we reported that a site called iPhoneDevSDK was responsible for infecting Apple and Facebook employees computers which led to the companies networks being infiltrated by hackers. Now, iPhoneDevSDK owner Ian Sefferman has shared some information in a blog post about how the Apple and Facebook employees computers were compromised, and what the site is doing to fix the problem and vulnerability.
What we’ve learned is that it appears a single administrator account was compromised. The hackers used this account to modify [...]
Quirky, a site known for developing user generated inventions, appears to have had their Facebook Page hacked this afternoon. The Quirky Facebook Page started to post some quirky (excuse the bad pun) messages around 3PM EST, starting with a simple “HELLO?” as the hacker most likely was testing to see if they had access to the page.
From there, messages ranged from AOL puns, “You have male” to pictures of cats and comments from the page attacking users who commented on the postings. We’ve reached out [...]
It comes up all the time on the web: pick a strong password! But what does that really mean? There are many misconceptions about passwords that can lead to trouble. Insecure passwords are very vulnerable and subject to attack. Before you can understand how to prevent these issues, you must first understand how passwords are used and stored.
When you sign up on any (legit and reputable) website, you are asked to provide a password to accompany your username. What you may not know about this password is that it is not stored on the [...]
YouTube has become a victim of XSS (cross site scripting) attacks. The attacks which started this morning appear to be the work of a group of 4chan users. The origin of the attack seemed to revolve around no other then Justin Bieber (screenshot below), claiming that he died in an accident sometime this morning and to visit CNN for more information. However, it appears that YouTube has been able to successfully stop the scripts from executing now. Instead of seeing a browser dialog box, the scripts are now rendered [...]
Wow. Talk about an exciting July 4th weekend. Two major web services, the App Store and YouTube have been hacked. It appears a rogue developer has gained unauthorized access to a number (currently unknown) of iTunes accounts and has pushed their books into the top 50. Clearly dominating the entire market place. You can see for yourself here (if you hurry), I’ll post a screenshot below. As of right now, there has been no official statement from Apple nor do we know the extremity of the situation. However, we do know that [...]