Hacking/ Network Access
Articles and Resources
Date Fairness.com Resource Read it at: Jan 17, 2014 Connected TVs, fridge help launch global cyberattack
QUOTE: a global cyberattack launched from more than 100,000 everyday consumer gadgets such as home-networking routers, televisions and at least one "smart" refrigerator. It's being called possibly the first proven cyberattack to originate from connected appliances -- the so-called "Internet of Things."
CNN (Cable News Network) Aug 02, 2013 A Cheap Spying Tool With a High Creepy Factor
QUOTE: You could spy on your ex-lover, by placing the sensor boxes near the places the person frequents, or your teenage child, or the residents of a particular neighborhood....“I haven’t done a full deployment of this because the United States government has made a practice of prosecuting security researchers,”...
New York Times Jul 30, 2013 Now That It’s in the Broadband Game, Google Flip-Flops on Network Neutrality
QUOTE: In a dramatic about-face on a key internet issue yesterday, Google told the FCC that the network neutrality rules Google once championed don’t give citizens the right to run servers on their home broadband connections, and that the Google Fiber network is perfectly within its rights to prohibit customers from attaching the legal devices of their choice to its network....So in Google’s version of net neutrality, the FCC was the right to force Apple to let iPhone users connect to their home servers, but the FCC has no right to force Google to let its broadband subscribers run a home server.
Wired Jul 30, 2013 Car hacking scientists agree to delay paper that could unlock Porsches University of Birmingham and Dutch university say they will respect injunction from High Court to stop paper that could detail ho
QUOTE: The University of Birmingham says it will defer any publication of an academic paper which reveals secret codes to bypass the security on top-end cars including Porsches and Bentleys following a high court injunction....The Guardian's article has prompted a massive debate about the balancing interests of industry and those of scientists, a debate that has infected all sectors ranging from medicine to car manufacturing.
Guardian Unlimited Jun 27, 2013 NSA collected US email records in bulk for more than two years under Obama
QUOTE: The Obama administration for more than two years permitted the National Security Agency to continue collecting vast amounts of records detailing the email and internet usage of Americans...under the program, launched in 2001, a federal judge sitting on the secret surveillance panel called the Fisa court would approve a bulk collection order for internet metadata "every 90 days"... The collection of these records began under the Bush administration's wide-ranging warrantless surveillance program, collectively known by the NSA codename Stellar Wind.
Guardian Unlimited May 31, 2013 Hunch About Bloomberg Brought Rivals Together (Dealbook)
QUOTE: Goldman Sachs and JPMorgan Chase are usually bitter rivals, competing for lucrative banking and trading business. But one day in April, the Wall Street titans found common ground: frustration with the Bloomberg news and financial data empire....they believed that Bloomberg reporters were using the company’s data terminals to monitor Wall Street sources — the executives at the banks that were spending thousands of dollars a year to use the data-rich machines.
New York Times Mar 28, 2013 Cyberattacks Seem Meant to Destroy, Not Just Disrupt
QUOTE: an intensifying campaign of unusually powerful attacks on American financial institutions that began last September and have taken dozens of them offline intermittently, costing millions of dollars....Corporate leaders have long feared online attacks aimed at financial fraud or economic espionage, but now a new threat has taken hold: attackers, possibly with state backing, who seem bent on destruction.
New York Times Mar 08, 2013 Skype's Been Hijacked in China, and Microsoft Is O.K. With It
QUOTE: a conflict between Microsoft’s advocacy of privacy rights and its role in surveillance....When Internet users in China try to access Skype.com, they’re diverted to the TOM-Skype site. While the Chinese version bears the blue Skype logo—and provides services for online phone calls and text chats—it’s a modified version of the program found elsewhere in the world. The surveillance feature in TOM-Skype conducts the monitoring directly on a user’s computer...
BusinessWeek Mar 01, 2013 Will the “Six Strikes” Copyright Alert System Hurt Consumers And Small Businesses?
QUOTE: On Monday, the Copyright Alert System, or “Six Strikes”, went into affect across the five biggest ISPs in the U.S. The system hopes to catch those pirating content over P2P networks, and send them a notice detailing their infringement. The hope is that those who are caught will start using legal alternatives. To better understand the CAS, we have to look at what the Center for Copyright Information is doing with it. First, there are three tiers to the CAS that consumers should be aware of with each tier having two levels within it. The three tiers are as follows – educational alerts, acknowledgement alerts and mitigation measures.
WebProNews Jun 13, 2012 Owners May Not Be Covered When Hackers Wipe Out A Business Bank Account
QUOTE: Computer security specialists say these crimes, called “corporate account takeovers,” have become increasingly common...most banks do not take responsibility for unauthorized debits from business accounts. Unless the owners have fraud insurance, they must shoulder the losses alone.
New York Times Mar 28, 2012 News Corp in fresh storm
QUOTE: The emails, said to be from the hard drive of a former head of security at NDS, a former News Corp subsidiary, appear to show that the company paid computer hackers to work with its "operational security" unit....The Australian Financial Review claimed that NDS's activities in Australia in 1999 caused millions of dollars of damage to Mr Murdoch's rivals in the country's nascent pay-TV market. The business models of Austar, Optus and Foxtel were all damaged by a wave of high-tech piracy at that time.
CNN (Cable News Network) Mar 15, 2012 For Apple, Pressure Builds Over App Store Fraud
QUOTE: as reflected by hundreds of online complaints saying that Apple’s iTunes Store, and in particular its App Store, which the company portrays as the safest of shopping environments, is not so secure....It’s a change for Apple, which was once criticized for its micromanaging of the App Store. Now the problem is not too much control, but too little.
New York Times Jan 25, 2012 Build Up Your Phone’s Defenses Against Hackers
QUOTE: Technology experts expect breached, infiltrated or otherwise compromised cellphones to be the scourge of 2012. The smartphone security company Lookout Inc. estimates that more than a million phones worldwide have already been affected.
New York Times Jan 23, 2012 MegaUpload: The content cartel strikes back
QUOTE: Like SOPA and PIPA, the bust comes with its own collateral damage. Along with those pirated movies and music, the feds took down noninfringing data from thousands of legit MegaUpload users, who are howling in protest and demanding -- futilely, so far -- the return of their stuff.
InfoWorld Nov 19, 2011 Document Trove Exposes Surveillance Methods (Censorship Inc.)
QUOTE: a retail market for surveillance tools has sprung up from "nearly zero" in 2001 to about $5 billion a year, said Jerry Lucas, president of TeleStrategies Inc., the show's operator. Critics say the market represents a new sort of arms trade supplying Western governments and repressive nations alike. "The Arab Spring countries all had more sophisticated surveillance capabilities than I would have guessed..."
Wall Street Journal, The (WSJ) Aug 31, 2011 Hackers may have stolen more than 200 SSL certificates: Source say DigiNotar breach generated fraudulent certs for Mozilla, Yahoo and Tor, not just Google
QUOTE: Hackers may have obtained more than 200 digital certificates from a Dutch company after breaking into its network, including ones for Mozilla, Yahoo and the Tor project....Security researchers now wonder what else DigiNotar hasn't told users.
Computerworld Aug 19, 2011 Your Voice Mail May Be Even Less Secure Than You Thought
QUOTE: AT&T, Sprint and T-Mobile do not require cellphone customers to use a password on their voice mail boxes, and plenty of people never bother to set one up. But if you don’t, people using a service colloquially known as caller ID spoofing could disguise their phone as yours and get access to your messages. This is possible because voice mail systems often grant access to callers who appear to be phoning from their own number.
New York Times Aug 02, 2011 Car hacks loom as autos go wireless: Tomorrow's vehicles will communicate wirelessly to reduce accidents, and experts are working to ensure hackers can't abuse the technology
QUOTE: The experts involved believe that 83 percent of unimpaired vehicle-related fatalities (those not connected to drugs, alcohol, and so on) might be avoided by boosting vehicular intelligence. Still, any technology capable of transmitting personal data -- in this case, auto-related information -- and controlling our cars could be abused by hackers.
InfoWorld Jul 14, 2011 Hacktivism moves from pranks to problems: Far from being 'sophisticated' attacks, LulzSec and Anonymous are run of the mill, say experts.
QUOTE: a spate of cyber unrest that started last year with attacks by the group Anonymous on companies that took a stand against Wikileaks, a group dedicated to outing government secrets. While companies and government agencies had derided the efforts as pranks, the success that hactivists have had in penetrating networks has increasingly caused concern.
InfoWorld Jul 07, 2011 Murdoch paper suffers new blow in hacking scandal
QUOTE: the latest blow to the British Sunday tabloid [News of the World--Ed.] that has been accused of illegally eavesdropping on the messages of murder and terror victims, celebrities and politicians. Prime Minister David Cameron Wednesday backed calls for an independent inquiry into the scandal
CNN (Cable News Network) Jul 06, 2011 How Did News of the World Hack Victims' Cell Phones?
QUOTE: The alleged actions of the tabloid's cell phone-hacking employees may beggar belief, Kevin Mahaffey, co-founder and CTO of mobile security firm Lookout, told PC Mag Wednesday. But their techniques for accessing other people's private mail boxes were probably very simple.
PC Magazine Jun 24, 2011 LulzSec Hackers Make Enemies Online
QUOTE: After six weeks of attacks — and hundreds of sarcastic Twitter posts — a number of people, offended by the exposure of innocent Internet users’ personal information and irritated by the bravado, are working to stop LulzSec by investigating and revealing its members’ identities to the world, and especially to the F.B.I.
New York Times Jun 06, 2011 Weiner Admits He Sent Lewd Photos; Seeks Not to Resign
QUOTE: Representative Anthony D. Weiner, a rising star in Democratic politics who many believed would be the next mayor of New York City, admitted on Monday to having had inappropriate online exchanges with at least six women, and repeatedly lying....There was a striking absence of public expressions of support from his colleagues, and the House Democratic leader, Representative Nancy Pelosi of California, called for an ethics investigation into his conduct.
New York Times Jun 02, 2011 E-Mail Fraud Hides Behind Friendly Face
QUOTE: spear phishing, a rapidly proliferating form of fraud that comes with a familiar face: messages that seem to be from co-workers, friends or family members, customized to trick you into letting your guard down online. And it has turned into a major problem...
New York Times May 31, 2011 Pentagon to Consider Cyberattacks Acts of War
QUOTE: The Pentagon, trying to create a formal strategy to deter cyberattacks on the United States, plans to issue a new strategy soon declaring that a computer attack from a foreign nation can be considered an act of war that may result in a military response.
New York Times May 31, 2011 Web Hackings Rattle Media Companies
QUOTE: latest examples of what security experts call “reputational attacks” on media companies that publish material that the hackers disagree with. Such companies are particularly vulnerable to such attacks because many of them depend on online advertising and subscription revenue from Web sites that can be upended by the clicks of a hacker’s keyboard — and because unlike other targets, like government entities and defense contractors, they are less likely to have state-of-the-art security to thwart attacks.
New York Times May 06, 2011 ID Theft Tool That Sony Isn’t Using
QUOTE: A surveillance service is reactive. By the time you get an alert from one, thieves may have already done a lot of damage. A security freeze, also known as a credit freeze, is proactive.
New York Times Apr 27, 2011 Holding Companies Accountable for Privacy Breaches
QUOTE: Yet there seems to be no real repercussions for these companies when a person’s information stored online is exposed. “Today the only real hit a company takes when these data breaches happen is to the company’s image.”
New York Times Apr 26, 2011 Sony Says PlayStation Hacker Got Personal Data
QUOTE: An “unauthorized person” had obtained personal information about account holders, including their names, addresses, e-mail addresses, and PlayStation user names and passwords. Sony warned that other confidential information, including credit card numbers, could have been compromised.
New York Times Mar 21, 2011 Google says Gmail problems designed by Chinese government
QUOTE: "There is no technical issue on our side. We have checked extensively," said a Google spokesperson. "This is a government blockage carefully designed to look like the problem is with Gmail…” The word "Jasmine" and terms relating to the anti-government protests in the Middle East can no longer be searched for on the country's microblogs. China has also responded by arresting activists, harassing foreign journalists and deploying large police forces to prevent unrest.
InfoWorld Mar 04, 2011 Hacked e-mails show Web is increasingly useful tool in dirty-tricks campaigns
QUOTE: But many experts say the shadowy political intelligence business has become larger and more sophisticated as corporations, trade groups and political parties increasingly turn to computer sleuths to monitor and, in some cases, harass their detractors. The work almost always goes undetected and has been made easier with the rise of computer networks and social media sites with relatively lax safeguards.
Washington Post Jan 06, 2011 Hackers find new way to cheat on Wall Street -- to everyone's peril
QUOTE: 'Side-channel' attack on high-frequency trading networks could net a hacker millions of dollars in just seconds -- and leave everyone else that much poorer
InfoWorld Dec 08, 2010 ‘Operation Payback’ Attacks Fell Visa.com (The Lede)
QUOTE: A group of Internet activists took credit for crashing the Visa.com Web site on Wednesday afternoon, hours after they launched a similar attack on MasterCard. The cyber attacks, by activists who call themselves Anonymous, are aimed at punishing companies that have acted to stop the flow of donations to WikiLeaks in recent days. The group explained that its distributed denial of service attacks — in which they essentially flood Web sites site with traffic to slow them down or knock them offline — were part of a broader effort called Operation Payback, which began as a way of punishing companies that attempted to stop Internet file-sharing and movie downloads.
New York Times Nov 05, 2010 What happens when Internet Explorer breaks big-time: Much like a bad antivirus signature file, Microsoft's browser is flagging harmless sites and blocking access to them
QUOTE: Much like a bad antivirus signature file, Microsoft's browser is flagging harmless sites and blocking access to them
InfoWorld Oct 27, 2010 Satisfied with Google's promise to restrain Street View, FTC drops privacy-breach probe
QUOTE: The federal government has ended an inquiry into a privacy breach involving Google's Street View service, satisfied with the company's pledge to stop gathering e-mail, passwords and other information from residential WiFi networks as it rolls through neighborhoods.
Washington Post Mar 24, 2010 Law Enforcement Appliance Subverts SSL
QUOTE: Normally when a user visits a secure website, such as Bank of America, Gmail, PayPal or eBay, the browser examines the website’s certificate to verify its authenticity. At a recent wiretapping convention however, security researcher Chris Soghoian discovered that a small company was marketing internet spying boxes to the feds designed to intercept those communications, without breaking the encryption, by using forged security certificates, instead of the real ones that websites use to verify secure connections.
Wired Mar 02, 2010 Fraudsters hone their attacks with spear phishing
QUOTE: The next generation of phishing messages, which is still prevalent today, strongly resembles legitimate messages from our banks, cable companies, online electronic payment services, and credit card companies. Everything in the emails looks legitimate, including the graphics that originate from the real company's Website.
InfoWorld Nov 20, 2009 Hacked E-Mail Is New Fodder for Climate Dispute
QUOTE: Hundreds of private e-mail messages and documents hacked from a computer server at a British university are causing a stir among global warming skeptics, who say they show that climate scientists conspired to overstate the case for a human influence on climate change.
New York Times Oct 14, 2009 The pocket spy: Will your smartphone rat you out?
QUOTE: According to the UK government's Design and Technology Alliance Against Crime (DTAAC), 80 per cent of us carry information on our handsets that could be used to commit fraud... I thought my Nokia N96 would hold few surprises, though, since I had only been using it for a few weeks when I submitted it to DiskLabs. Yet their analysts proved me wrong.
New Scientist Oct 02, 2009 Soldiers' Data Still Being Downloaded Overseas, Firm Says: Sensitive Information Found by Using 'Peer to Peer' File-Sharing Software
QUOTE: The personal data of tens of thousands of U.S. soldiers -- including those in the Special Forces -- continue to be downloaded by unauthorized computer users in countries such as China and Pakistan, despite Army assurances that it would try to fix the problem...
Washington Post Sep 18, 2009 Threat Level Privacy, Crime and Security Online Court: Disloyal Computing Is Not Illegal (Threat Level)
QUOTE: A federal appeals court says employees are not liable for damages under anti-hacking laws for accessing their employers’ computers for disloyal purposes.
Wired Sep 07, 2009 Password Hackers Are Slippery To Collar
QUOTE: "This is an important point that people haven't grasped," said Peter Eckersley, a staff technologist for the Electronic Frontier Foundation in San Francisco. "We've been using e-mail for years, and it's been insecure all that time.... If you have any hacker who is competent and spends the time and targets you, he's going to get you."
Washington Post Sep 06, 2009 Gadget Makers Can Find Thief, but Don’t Ask
QUOTE: many tech companies will not disclose information about the new owners of missing devices unless a police officer calls with a search warrant. Even a request to simply shut down service — which would deter thieves by rendering their pilfered gadget useless — is typically refused.
New York Times Aug 31, 2009 How we’re losing our privacy online
QUOTE: As we slip further into the Internet era, they [computer experts] argue that we are every day surrendering more of the private us to the public domain
Christian Science Monitor Aug 27, 2009 ACLU chapter flags Facebook app privacy (The Social)
QUOTE: The Northern California chapter of the American Civil Liberties Union has put out a campaign designed to raise awareness of the privacy implications of Facebook's developer platform.
CNET Aug 25, 2009 Businesses Reluctant to Report Online Banking Fraud (Security Fix)
QUOTE: many victimized companies [of online banking fraud] are reluctant to come forward out of fear of retribution by their bank.
Washington Post Aug 19, 2009 A Lawsuit Tries to Get at Hackers Through the Banks They Attack
QUOTE: A lawsuit filed on Wednesday against some of the most shadowy Internet criminals... is being used to pry information from a group that is nearly as reclusive as the hackers: banks whose computers have been compromised.
New York Times Aug 18, 2009 Three Alleged Hackers Indicted in Large Identity-Theft Case
QUOTE: A federal grand jury has indicted three people on charges of hacking into the files of the credit and debit card processing giant Heartland Payment Systems last year in what the Justice Department is calling the largest identity-theft case ever prosecuted.
Washington Post Aug 13, 2009 Researchers "hack the vote" in real-world e-voting attack
QUOTE: A group of security researchers has published a fascinating study that demonstrates how to hack a Sequoia AVC Advantage voting machine.
Ars Technica Aug 11, 2009 RealNetworks Loses DVD Copying Decision
QUOTE: A federal judge has ruled in favor of Hollywood and against RealNetworks, declaring that the company's RealDVD program violates the Digital Millennium Copyright Act and the terms of the DVD CSS license.
- Arts & Humanities
- Businesses & Organizations
- Computers & Information Technology
- Family & Friends & Interpersonal
- Government & Politics / History
- Health & Medicine
- Law & Justice
- Media & Journalism
- Personal Finance & Career
- Philosophy & Religion
- Recreation & Entertainment
- Science & Technology
- Social Sciences & Groups
- Arctic / Antarctic / Greenland
- Central America / Caribbean
- Eurasia / Central Asia
- Middle East
- North America
- Oceania / AustralAsia
- South America
- About Fairness.com
- Contact Us
- Conditions of Service
- Fair Use Notice
- Advisory Board
Not a current user? Sign up!