You are here: Fairness.com > Resources > Computers & Information Technology > Computer Security (general) > Hacking/ Network Access

Hacking/ Network Access

Search only Hacking/ Network Access, and everything underneath:

Articles and Resources

179 Articles and Resources. Go to:  [Next 50]   [End]

Date Fairness.com Resource Read it at:
Jan 17, 2014 Connected TVs, fridge help launch global cyberattack

QUOTE: a global cyberattack launched from more than 100,000 everyday consumer gadgets such as home-networking routers, televisions and at least one "smart" refrigerator. It's being called possibly the first proven cyberattack to originate from connected appliances -- the so-called "Internet of Things."

CNN (Cable News Network)
Aug 02, 2013 A Cheap Spying Tool With a High Creepy Factor

QUOTE: You could spy on your ex-lover, by placing the sensor boxes near the places the person frequents, or your teenage child, or the residents of a particular neighborhood....“I haven’t done a full deployment of this because the United States government has made a practice of prosecuting security researchers,”...

New York Times
Jul 30, 2013 Now That It’s in the Broadband Game, Google Flip-Flops on Network Neutrality

QUOTE: In a dramatic about-face on a key internet issue yesterday, Google told the FCC that the network neutrality rules Google once championed don’t give citizens the right to run servers on their home broadband connections, and that the Google Fiber network is perfectly within its rights to prohibit customers from attaching the legal devices of their choice to its network....So in Google’s version of net neutrality, the FCC was the right to force Apple to let iPhone users connect to their home servers, but the FCC has no right to force Google to let its broadband subscribers run a home server.

Wired
Jul 30, 2013 Car hacking scientists agree to delay paper that could unlock Porsches University of Birmingham and Dutch university say they will respect injunction from High Court to stop paper that could detail ho

QUOTE: The University of Birmingham says it will defer any publication of an academic paper which reveals secret codes to bypass the security on top-end cars including Porsches and Bentleys following a high court injunction....The Guardian's article has prompted a massive debate about the balancing interests of industry and those of scientists, a debate that has infected all sectors ranging from medicine to car manufacturing.

Guardian Unlimited
Jun 27, 2013 NSA collected US email records in bulk for more than two years under Obama

QUOTE: The Obama administration for more than two years permitted the National Security Agency to continue collecting vast amounts of records detailing the email and internet usage of Americans...under the program, launched in 2001, a federal judge sitting on the secret surveillance panel called the Fisa court would approve a bulk collection order for internet metadata "every 90 days"... The collection of these records began under the Bush administration's wide-ranging warrantless surveillance program, collectively known by the NSA codename Stellar Wind.

Guardian Unlimited
May 31, 2013 Hunch About Bloomberg Brought Rivals Together (Dealbook)

QUOTE: Goldman Sachs and JPMorgan Chase are usually bitter rivals, competing for lucrative banking and trading business. But one day in April, the Wall Street titans found common ground: frustration with the Bloomberg news and financial data empire....they believed that Bloomberg reporters were using the company’s data terminals to monitor Wall Street sources — the executives at the banks that were spending thousands of dollars a year to use the data-rich machines.

New York Times
Mar 28, 2013 Cyberattacks Seem Meant to Destroy, Not Just Disrupt

QUOTE: an intensifying campaign of unusually powerful attacks on American financial institutions that began last September and have taken dozens of them offline intermittently, costing millions of dollars....Corporate leaders have long feared online attacks aimed at financial fraud or economic espionage, but now a new threat has taken hold: attackers, possibly with state backing, who seem bent on destruction.

New York Times
Mar 08, 2013 Skype's Been Hijacked in China, and Microsoft Is O.K. With It

QUOTE: a conflict between Microsoft’s advocacy of privacy rights and its role in surveillance....When Internet users in China try to access Skype.com, they’re diverted to the TOM-Skype site. While the Chinese version bears the blue Skype logo—and provides services for online phone calls and text chats—it’s a modified version of the program found elsewhere in the world. The surveillance feature in TOM-Skype conducts the monitoring directly on a user’s computer...

BusinessWeek
Mar 01, 2013 Will the “Six Strikes” Copyright Alert System Hurt Consumers And Small Businesses?

QUOTE: On Monday, the Copyright Alert System, or “Six Strikes”, went into affect across the five biggest ISPs in the U.S. The system hopes to catch those pirating content over P2P networks, and send them a notice detailing their infringement. The hope is that those who are caught will start using legal alternatives. To better understand the CAS, we have to look at what the Center for Copyright Information is doing with it. First, there are three tiers to the CAS that consumers should be aware of with each tier having two levels within it. The three tiers are as follows – educational alerts, acknowledgement alerts and mitigation measures.

WebProNews
Jun 13, 2012 Owners May Not Be Covered When Hackers Wipe Out A Business Bank Account

QUOTE: Computer security specialists say these crimes, called “corporate account takeovers,” have become increasingly common...most banks do not take responsibility for unauthorized debits from business accounts. Unless the owners have fraud insurance, they must shoulder the losses alone.

New York Times
Mar 28, 2012 News Corp in fresh storm

QUOTE: The emails, said to be from the hard drive of a former head of security at NDS, a former News Corp subsidiary, appear to show that the company paid computer hackers to work with its "operational security" unit....The Australian Financial Review claimed that NDS's activities in Australia in 1999 caused millions of dollars of damage to Mr Murdoch's rivals in the country's nascent pay-TV market. The business models of Austar, Optus and Foxtel were all damaged by a wave of high-tech piracy at that time.

CNN (Cable News Network)
Mar 15, 2012 For Apple, Pressure Builds Over App Store Fraud

QUOTE: as reflected by hundreds of online complaints saying that Apple’s iTunes Store, and in particular its App Store, which the company portrays as the safest of shopping environments, is not so secure....It’s a change for Apple, which was once criticized for its micromanaging of the App Store. Now the problem is not too much control, but too little.

New York Times
Jan 25, 2012 Build Up Your Phone’s Defenses Against Hackers

QUOTE: Technology experts expect breached, infiltrated or otherwise compromised cellphones to be the scourge of 2012. The smartphone security company Lookout Inc. estimates that more than a million phones worldwide have already been affected.

New York Times
Jan 23, 2012 MegaUpload: The content cartel strikes back

QUOTE: Like SOPA and PIPA, the bust comes with its own collateral damage. Along with those pirated movies and music, the feds took down noninfringing data from thousands of legit MegaUpload users, who are howling in protest and demanding -- futilely, so far -- the return of their stuff.

InfoWorld
Nov 19, 2011 Document Trove Exposes Surveillance Methods (Censorship Inc.)

QUOTE: a retail market for surveillance tools has sprung up from "nearly zero" in 2001 to about $5 billion a year, said Jerry Lucas, president of TeleStrategies Inc., the show's operator. Critics say the market represents a new sort of arms trade supplying Western governments and repressive nations alike. "The Arab Spring countries all had more sophisticated surveillance capabilities than I would have guessed..."

Wall Street Journal, The (WSJ)
Aug 31, 2011 Hackers may have stolen more than 200 SSL certificates: Source say DigiNotar breach generated fraudulent certs for Mozilla, Yahoo and Tor, not just Google

QUOTE: Hackers may have obtained more than 200 digital certificates from a Dutch company after breaking into its network, including ones for Mozilla, Yahoo and the Tor project....Security researchers now wonder what else DigiNotar hasn't told users.

Computerworld
Aug 19, 2011 Your Voice Mail May Be Even Less Secure Than You Thought

QUOTE: AT&T, Sprint and T-Mobile do not require cellphone customers to use a password on their voice mail boxes, and plenty of people never bother to set one up. But if you don’t, people using a service colloquially known as caller ID spoofing could disguise their phone as yours and get access to your messages. This is possible because voice mail systems often grant access to callers who appear to be phoning from their own number.

New York Times
Aug 02, 2011 Car hacks loom as autos go wireless: Tomorrow's vehicles will communicate wirelessly to reduce accidents, and experts are working to ensure hackers can't abuse the technology

QUOTE: The experts involved believe that 83 percent of unimpaired vehicle-related fatalities (those not connected to drugs, alcohol, and so on) might be avoided by boosting vehicular intelligence. Still, any technology capable of transmitting personal data -- in this case, auto-related information -- and controlling our cars could be abused by hackers.

InfoWorld
Jul 14, 2011 Hacktivism moves from pranks to problems: Far from being 'sophisticated' attacks, LulzSec and Anonymous are run of the mill, say experts.

QUOTE: a spate of cyber unrest that started last year with attacks by the group Anonymous on companies that took a stand against Wikileaks, a group dedicated to outing government secrets. While companies and government agencies had derided the efforts as pranks, the success that hactivists have had in penetrating networks has increasingly caused concern.

InfoWorld
Jul 07, 2011 Murdoch paper suffers new blow in hacking scandal

QUOTE: the latest blow to the British Sunday tabloid [News of the World--Ed.] that has been accused of illegally eavesdropping on the messages of murder and terror victims, celebrities and politicians. Prime Minister David Cameron Wednesday backed calls for an independent inquiry into the scandal

CNN (Cable News Network)
Jul 06, 2011 How Did News of the World Hack Victims' Cell Phones?

QUOTE: The alleged actions of the tabloid's cell phone-hacking employees may beggar belief, Kevin Mahaffey, co-founder and CTO of mobile security firm Lookout, told PC Mag Wednesday. But their techniques for accessing other people's private mail boxes were probably very simple.

PC Magazine
Jun 24, 2011 LulzSec Hackers Make Enemies Online

QUOTE: After six weeks of attacks — and hundreds of sarcastic Twitter posts — a number of people, offended by the exposure of innocent Internet users’ personal information and irritated by the bravado, are working to stop LulzSec by investigating and revealing its members’ identities to the world, and especially to the F.B.I.

New York Times
Jun 06, 2011 Weiner Admits He Sent Lewd Photos; Seeks Not to Resign

QUOTE: Representative Anthony D. Weiner, a rising star in Democratic politics who many believed would be the next mayor of New York City, admitted on Monday to having had inappropriate online exchanges with at least six women, and repeatedly lying....There was a striking absence of public expressions of support from his colleagues, and the House Democratic leader, Representative Nancy Pelosi of California, called for an ethics investigation into his conduct.

New York Times
Jun 02, 2011 E-Mail Fraud Hides Behind Friendly Face

QUOTE: spear phishing, a rapidly proliferating form of fraud that comes with a familiar face: messages that seem to be from co-workers, friends or family members, customized to trick you into letting your guard down online. And it has turned into a major problem...

New York Times
May 31, 2011 Pentagon to Consider Cyberattacks Acts of War

QUOTE: The Pentagon, trying to create a formal strategy to deter cyberattacks on the United States, plans to issue a new strategy soon declaring that a computer attack from a foreign nation can be considered an act of war that may result in a military response.

New York Times
May 31, 2011 Web Hackings Rattle Media Companies

QUOTE: latest examples of what security experts call “reputational attacks” on media companies that publish material that the hackers disagree with. Such companies are particularly vulnerable to such attacks because many of them depend on online advertising and subscription revenue from Web sites that can be upended by the clicks of a hacker’s keyboard — and because unlike other targets, like government entities and defense contractors, they are less likely to have state-of-the-art security to thwart attacks.

New York Times
May 06, 2011 ID Theft Tool That Sony Isn’t Using

QUOTE: A surveillance service is reactive. By the time you get an alert from one, thieves may have already done a lot of damage. A security freeze, also known as a credit freeze, is proactive.

New York Times
Apr 27, 2011 Holding Companies Accountable for Privacy Breaches

QUOTE: Yet there seems to be no real repercussions for these companies when a person’s information stored online is exposed. “Today the only real hit a company takes when these data breaches happen is to the company’s image.”

New York Times
Apr 26, 2011 Sony Says PlayStation Hacker Got Personal Data

QUOTE: An “unauthorized person” had obtained personal information about account holders, including their names, addresses, e-mail addresses, and PlayStation user names and passwords. Sony warned that other confidential information, including credit card numbers, could have been compromised.

New York Times
Mar 21, 2011 Google says Gmail problems designed by Chinese government

QUOTE: "There is no technical issue on our side. We have checked extensively," said a Google spokesperson. "This is a government blockage carefully designed to look like the problem is with Gmail…” The word "Jasmine" and terms relating to the anti-government protests in the Middle East can no longer be searched for on the country's microblogs. China has also responded by arresting activists, harassing foreign journalists and deploying large police forces to prevent unrest.

InfoWorld
Mar 04, 2011 Hacked e-mails show Web is increasingly useful tool in dirty-tricks campaigns

QUOTE: But many experts say the shadowy political intelligence business has become larger and more sophisticated as corporations, trade groups and political parties increasingly turn to computer sleuths to monitor and, in some cases, harass their detractors. The work almost always goes undetected and has been made easier with the rise of computer networks and social media sites with relatively lax safeguards.

Washington Post
Jan 06, 2011 Hackers find new way to cheat on Wall Street -- to everyone's peril

QUOTE: 'Side-channel' attack on high-frequency trading networks could net a hacker millions of dollars in just seconds -- and leave everyone else that much poorer

InfoWorld
Dec 08, 2010 ‘Operation Payback’ Attacks Fell Visa.com (The Lede)

QUOTE: A group of Internet activists took credit for crashing the Visa.com Web site on Wednesday afternoon, hours after they launched a similar attack on MasterCard. The cyber attacks, by activists who call themselves Anonymous, are aimed at punishing companies that have acted to stop the flow of donations to WikiLeaks in recent days. The group explained that its distributed denial of service attacks — in which they essentially flood Web sites site with traffic to slow them down or knock them offline — were part of a broader effort called Operation Payback, which began as a way of punishing companies that attempted to stop Internet file-sharing and movie downloads.

New York Times
Nov 05, 2010 What happens when Internet Explorer breaks big-time: Much like a bad antivirus signature file, Microsoft's browser is flagging harmless sites and blocking access to them

QUOTE: Much like a bad antivirus signature file, Microsoft's browser is flagging harmless sites and blocking access to them

InfoWorld
Oct 27, 2010 Satisfied with Google's promise to restrain Street View, FTC drops privacy-breach probe

QUOTE: The federal government has ended an inquiry into a privacy breach involving Google's Street View service, satisfied with the company's pledge to stop gathering e-mail, passwords and other information from residential WiFi networks as it rolls through neighborhoods.

Washington Post
Mar 24, 2010 Law Enforcement Appliance Subverts SSL

QUOTE: Normally when a user visits a secure website, such as Bank of America, Gmail, PayPal or eBay, the browser examines the website’s certificate to verify its authenticity. At a recent wiretapping convention however, security researcher Chris Soghoian discovered that a small company was marketing internet spying boxes to the feds designed to intercept those communications, without breaking the encryption, by using forged security certificates, instead of the real ones that websites use to verify secure connections.

Wired
Mar 02, 2010 Fraudsters hone their attacks with spear phishing

QUOTE: The next generation of phishing messages, which is still prevalent today, strongly resembles legitimate messages from our banks, cable companies, online electronic payment services, and credit card companies. Everything in the emails looks legitimate, including the graphics that originate from the real company's Website.

InfoWorld
Nov 20, 2009 Hacked E-Mail Is New Fodder for Climate Dispute

QUOTE: Hundreds of private e-mail messages and documents hacked from a computer server at a British university are causing a stir among global warming skeptics, who say they show that climate scientists conspired to overstate the case for a human influence on climate change.

New York Times
Oct 14, 2009 The pocket spy: Will your smartphone rat you out?

QUOTE: According to the UK government's Design and Technology Alliance Against Crime (DTAAC), 80 per cent of us carry information on our handsets that could be used to commit fraud... I thought my Nokia N96 would hold few surprises, though, since I had only been using it for a few weeks when I submitted it to DiskLabs. Yet their analysts proved me wrong.

New Scientist
Oct 02, 2009 Soldiers' Data Still Being Downloaded Overseas, Firm Says: Sensitive Information Found by Using 'Peer to Peer' File-Sharing Software

QUOTE: The personal data of tens of thousands of U.S. soldiers -- including those in the Special Forces -- continue to be downloaded by unauthorized computer users in countries such as China and Pakistan, despite Army assurances that it would try to fix the problem...

Washington Post
Sep 18, 2009 Threat Level Privacy, Crime and Security Online Court: Disloyal Computing Is Not Illegal (Threat Level)

QUOTE: A federal appeals court says employees are not liable for damages under anti-hacking laws for accessing their employers’ computers for disloyal purposes.

Wired
Sep 07, 2009 Password Hackers Are Slippery To Collar

QUOTE: "This is an important point that people haven't grasped," said Peter Eckersley, a staff technologist for the Electronic Frontier Foundation in San Francisco. "We've been using e-mail for years, and it's been insecure all that time.... If you have any hacker who is competent and spends the time and targets you, he's going to get you."

Washington Post
Sep 06, 2009 Gadget Makers Can Find Thief, but Don’t Ask

QUOTE: many tech companies will not disclose information about the new owners of missing devices unless a police officer calls with a search warrant. Even a request to simply shut down service — which would deter thieves by rendering their pilfered gadget useless — is typically refused.

New York Times
Aug 31, 2009 How we’re losing our privacy online

QUOTE: As we slip further into the Internet era, they [computer experts] argue that we are every day surrendering more of the private us to the public domain

Christian Science Monitor
Aug 27, 2009 ACLU chapter flags Facebook app privacy (The Social)

QUOTE: The Northern California chapter of the American Civil Liberties Union has put out a campaign designed to raise awareness of the privacy implications of Facebook's developer platform.

CNET
Aug 25, 2009 Businesses Reluctant to Report Online Banking Fraud (Security Fix)

QUOTE: many victimized companies [of online banking fraud] are reluctant to come forward out of fear of retribution by their bank.

Washington Post
Aug 19, 2009 A Lawsuit Tries to Get at Hackers Through the Banks They Attack

QUOTE: A lawsuit filed on Wednesday against some of the most shadowy Internet criminals... is being used to pry information from a group that is nearly as reclusive as the hackers: banks whose computers have been compromised.

New York Times
Aug 18, 2009 Three Alleged Hackers Indicted in Large Identity-Theft Case

QUOTE: A federal grand jury has indicted three people on charges of hacking into the files of the credit and debit card processing giant Heartland Payment Systems last year in what the Justice Department is calling the largest identity-theft case ever prosecuted.

Washington Post
Aug 13, 2009 Researchers "hack the vote" in real-world e-voting attack

QUOTE: A group of security researchers has published a fascinating study that demonstrates how to hack a Sequoia AVC Advantage voting machine.

Ars Technica
Aug 11, 2009 RealNetworks Loses DVD Copying Decision

QUOTE: A federal judge has ruled in favor of Hollywood and against RealNetworks, declaring that the company's RealDVD program violates the Digital Millennium Copyright Act and the terms of the DVD CSS license.

PC Magazine

179 Articles and Resources. Go to:  [Next 50]   [End]