-
January 8, 2015
Bitstamp Bitcoin Exchange Hacked, $5 Million Stolen in Hack Attack
Bitstamp Bitcoin Exchange Hacked, $5 Million Stolen in Hack Attack: One of the biggest, reliable and most trusted Bitcoin exchange — Bitstamp — on Monday announced that it has been a target of a hacking attack, which lead to the theft of “less than 19,000 BTC” (worth about $5 million in virtual currency; one BTC […]
-
January 8, 2015
Sowerby school website hacked
Sowerby school website hacked: The website of Sowerby Primary School in Thirsk, North Yorkshire has been hacked. In place of the school site appears a picture of the US and Israeli flag with a cross through. The writing claims the site has been hacked by a X-saad. The school has tweeted this reassurance to parents.
-
January 8, 2015
Gogo In-flight Internet issues Fake SSL Certificates to its own Customers
Gogo In-flight Internet issues Fake SSL Certificates to its own Customers: Gogo — one of the largest providers of in-flight Internet service — has been caught issuing fake SSL certificates, allowing the inflight broadband provider to launch man-in-the-middle (MITM) attacks on its own users, view passwords and other sensitive information. The news came to light […]
-
January 8, 2015
NOAA Employee Charged With Computer Breach Met Senior Chinese Official in Beijing
NOAA Employee Charged With Computer Breach Met Senior Chinese Official in Beijing: A federal weather service employee charged with stealing sensitive infrastructure data from an Army Corps of Engineers database met a Chinese government official in Beijing, according to court documents that reveal the case to be part of an FBI probe of Chinese economic espionage. […]
-
January 8, 2015
Expect more ransomware and ‘extortionware’ in 2015
Expect more ransomware and ‘extortionware’ in 2015: With 2014 rapidly coming to a close, it’s time to look to the future and consider the potential industry challenges we’ll be facing in 2015. While we can expect to see the return of some of the issues we faced in 2014, there are still a number of […]
-
January 8, 2015
U.S. Spies Say They Tracked ‘Sony Hackers’ For Years
U.S. Spies Say They Tracked ‘Sony Hackers’ For Years: American spies have detailed dossiers on the North Koreans who the U.S. says were behind the Sony attack. But the still-secret evidence likely won’t convince skeptics. The FBI and U.S. intelligence agencies for years have been tracking the hackers who they believe to be behind the […]
-
January 7, 2015
Sharyl Attkisson sues administration over computer hacking
Sharyl Attkisson sues administration over computer hacking: Former CBS News correspondent Sharyl Attkisson has sued the Justice Department over the hacking of her computers, officially accusing the Obama administration of illegal surveillance while she was reporting on administration scandals. In a series of legal filings that seek $35 million in damages, Attkisson alleges that three […]
-
January 7, 2015
Chick-fil-A investigates hack into credit card payment data
Chick-fil-A investigates hack into credit card payment data: Chicken sandwich chain Chick-fil-A is investigating a possible data breach at some of its restaurants, the company announced Friday, saying it was working with cybersecurity firms and federal law enforcement to determine whether its payment system was hacked. In a terse statement, the fast food company said […]
-
January 7, 2015
Hacking the Tor Network: Follow Up
Hacking the Tor Network: Follow Up: In a previous post, I presented the main techniques used to hack Tor networks and de-anonymize Tor users. Law enforcement and intelligence agencies consider “de-anonymization” of Tor users a primary goal. Authorities can try to implement techniques to break the encryption used to anonymize the traffic or to exploit […]
-
January 7, 2015
Secure Secure Shell
Secure Secure Shell: You may have heard that the NSA can decrypt SSH at least some of the time. If you have not, then read the latest batch of Snowden documents now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts […]