Posts

Showing posts from 2009

Browers Updated

Update your Google Chrome and FireFox. Security Updates were released.

Possible T-Mobile Hack

Based on information posted to the Full Disclosure mailing list, somone or a group of hackers is attempting to sell information on T-Mobile and its customer base. http://seclists.org/fulldisclosure/2009/Jun/0062.html This has also been picked up and briefly mentioned on SANS http://isc.sans.org/diary.html?storyid=6526 There is also an article over at Liquid Matrix http://www.liquidmatrix.org/blog/2009/06/06/t-mobile-hacked-possible-massive-breach-in-play/ Nothing has been confirmed yet from T-Mobile, based on the Liquid posting. [UPDATE FROM LIQUID MATRIX]:  Today we received an official response from T-Mobile on this story. ( June 8, 2009 ) “The protection of our customers’ information, and the safety and security of our systems, is absolutely paramount at T-Mobile. Regarding the recent claim, we are fully investigating the matter. As is our standard practice, if there is any evidence that customer information has been compromised, we would inform those affected as soon as possible.”

Computers Worldwide Hit By Cyber Hackers

Image
A small group of cyber criminals have succeeded in hacking into almost two million computers around the world - including British Government machines. Hackers were making thousands of pounds a day The global network of 1.9m computers infected with malicious software, or malware, was tracked to a cyber gang of six people based in the  Ukraine . The malware was remotely controlled by the gang, allowing them to read emails, copy files, record keystrokes, send spam and make screenshots, security firm Finjan said. Link to full Article

Report: Hackers Break Into Pentagon's Fighter Jet Project

Link to Article Hackers broke into  U.S. Department of Defense  computers and downloaded terabytes of data containing design information about the  Joint Strike Fighter , a US$300 billion  stealth fighter  currently under development, according to  The Wall Street Journal . The stolen files all relate to the design of the Joint Strike Fighter and its electronic systems, the  Wall Street Journal   reported , saying they could be used to help defend against the jet. However, the most sensitive files were not compromised since they are stored on computers that are not connected to the Internet, the report said. The reported attack raised more questions than it answered. For example, the report did not say how attackers managed to download terabytes of data before being discovered. A single terabyte can take up to several weeks to download over a relatively fast data connection, such as a DSL or  cable modem . The report also  suggested China could be behind  the stolen data, noting that i...