Tag: breach

102

Arrests Made in Sony Hacking Fiasco

Spanish authorities have made 3 arrests of people they believe to be linked to the hacking of Sony’s Playstation network. Authorities say the suspects are members of a known hacking group called Anonymous. The group is known for hacking into government networks, systems of large corporations, and even banks.

It is not totally confirmed that the group is fully responsible for the attack that crippled PSN, but authorities have come upon chat logs that indicate a role might have been played. Not only did they find evidence of a PSN attack on the logs, but also evidence of hacks against two Spanish banks, as well as government sites of 7 countries.

Read Article

Comodo Data Breach Gives Web Users A Slap of Reality

As Internet users, we have always been taught to be mindful of the sites we visit, as some of them may very well be designed specifically to lure unsuspecting visitors into a fraudulent trap.  Asides from checking the URL of the site that one is on or logging into, one of the biggest “rules” for web safety is to ensure that you are connecting security to a website.  This can be seen when one visits a page that begins with “https://” instead of the traditional “http://”, and in many cases (depending on browser) sports an animated lock.  What this does is verify that the connection between you and the server is free of eavesdroppers, and that the server that you are connecting to belongs to the company, group, or organization that you intend.

In order to verify the identity of servers for these secure connections, large organizations known as “certificate authorities” (CA’s) sell certificates that the server/site administrator configures on their end to establish their identity during secure data transactions.  However, to ensure that your average shmuck can’t write his or her own certificate, these certificate authorities must validate the certificates as connections occur.  To do this, the vendors of modern web browsers allow the certificate authorities to check the validity of a secure certificate with the authorities server via the browser itself.  In essence, the browser reads the certificate provided by the website and “phones home” to make sure it’s legitimate.

Read Article
>