Showing posts with label computer hacking. Show all posts
Showing posts with label computer hacking. Show all posts

Wednesday, January 11, 2017

This Professor Is Teaching The NSA's Best Hackers

Cyber Scoop: Meet the man responsible for teaching some of the NSA’s best young hackers

The National Security Agency is an enormous organization by nearly any corporate standard, with more than 35,000 employees. Former Deputy Director Chris Inglis once joked that the spy agency is “the biggest employer of introverts.” More frequently though, the NSA refers to itself as the largest employer of mathematicians. In recent years, while the U.S. has continuously confronted new threats in cyberspace, the agency has increasingly become a training ground for young, talented, highly educated computer security professionals.

Underlining the NSA’s race to hire the best and brightest is a list of 213 universities that the spy agency has designated as “National Centers of Academic Excellence.”

These schools offer a myriad of computer security training programs, each providing a stepping stone into the secretive agency. In this context, Carnegie Mellon University is to the NSA what the University of Alabama is to the NFL. And Professor David Brumley is CMU’s Nick Saban.

Read more ....

CSN Editor: His Twitter page is interesting (the link is here).

Saturday, May 21, 2011

How To Manipulate Social Movements By Hacking Twitter

Image credit: Leo Espinosa

Are You Following A Bot? -- The Atlantic

How to manipulate social movements by hacking Twitter.

One day last February, a Twitter user in California named Billy received a tweet from @JamesMTitus, identified in his profile as a “24 year old dude” from Christchurch, New Zealand, who had the avatar of a tabby cat. “If you could bring one character to life from your favorite book, who would it be?,” @JamesMTitus asked. Billy tweeted back, “Jesus,” to which @JamesMTitus replied: “honestly? no fracking way. ahahahhaa.” Their exchange continued, and Billy began following @JamesMTitus. It probably never occurred to him that the Kiwi dude with an apparent love of cats was, in fact, a robot.

Read more ....

Friday, February 4, 2011

How Stuxnet Has Given Hackers A Blueprint For Sophisticated New Malware

Epic Fail Malicious programs could blow up factories and sabotage power grids Jamie Sneddon

What Could Possibly Go Wrong: Industrial Cyber-Sabotage -- Popular Science

Stuxnet gives hackers a blueprint for sophisticated new malware.

Computers already do so much of our work that it seems natural to let them take care of our sabotage, too. This might have been the line of thinking that led to Stuxnet, the first known malware worm designed to disrupt industrial processes.

Read more ....

My Comment: I suspect that this is just the start of something bigger .... hence we are now having governments proposing the need for Cyberwar protocals.

Friday, November 5, 2010

How To Use Google For Hacking

From Go Hacking:

Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google.

Read more ....

Tuesday, October 5, 2010

Stuxnet: Fact Vs. Theory

From CNET:

The Stuxnet worm has taken the computer security world by storm, inspiring talk of a top secret, government-sponsored cyberwar, and of a software program laden with obscure biblical references that call to mind not computer code, but "The Da Vinci Code."

Stuxnet, which first made headlines in July, (CNET FAQ here) is believed to be the first known malware that targets the controls at industrial facilities such as power plants. At the time of its discovery, the assumption was that espionage lay behind the effort, but subsequent analysis by Symantec uncovered the ability of the malware to control plant operations outright, as CNET first reported back in mid-August.

Read more ....

Friday, October 1, 2010

How To Cyber Attack A Nuclear Plant

Photo: Going nuclear: The Stuxnet computer worm may have designed to infiltrate an Iranian nuclear facility in Natanz, 180 miles south of Tehran. Credit: Getty Images

A Way To Attack Nuclear Plants -- Technology Review

Industrial computer systems are typically far less secure than they should be, experts say.

For the last few months, a sophisticated computer worm has wriggled its way between some of the most critical control systems in the world.

The timing of the worm's release, combined with several clues buried in its code, has led some experts to speculate that the worm, dubbed Stuxnet, was originally designed to sabotage an Iranian nuclear facility, possibly the enrichment plant in Natanz, roughly 180 miles south of Tehran. This week, officials in Iran confirmed that Stuxnet had been found on systems inside the plant, although they denied that it had caused any harm.

Read more

Tuesday, September 28, 2010

Why The Stuxnet Worm Is Like Nothing Seen Before

Sneaking past security (Image: 2010 IIPA/Getty)

From New Scientist:

Stuxnet is the first worm of its type capable of attacking critical infrastructure like power stations and electricity grids: those in the know have been expecting it for years.

On 26 September, Iran's state news agency reported that computers at its Bushehr nuclear power plant had been infected by Stuxnet.

New Scientist explains the significance of the worm.

Read more

Tuesday, September 7, 2010

The Anatomy Of An E-Mail Hack

Emails can bear malicious links ready to unleash computer-enabled chaos with just a single click. (Getty Images)

From ABC News:

How Do E-Mail Viruses Spread? How Should You Protect Yourself?

Delivery notices from the post office, messages from out-of-touch friends and headlines from seasonal sporting events look innocent enough when they arrive in emailform.

But they all can bear malicious links ready to unleash computer-enabled chaos with just a single click.

Read more ....

Wednesday, September 1, 2010

Can The Pentagon Be Made WikiLeak-Proof?

Darpa’s Star Hacker Looks to WikiLeak-Proof Pentagon -- The Danger Room

Tomorrow’s WikiLeakers may have to be sneakier than just dumping military docs onto a Lady Gaga disc. The futurists at Darpa are working on a project that would make it harder for troops to funnel classified material to WikiLeaks — or to foreign governments. And that means if you work for the military, get ready to have your web, email and other network usage monitored even more than it is now.

Read more ....

My Comment: Call me skeptical, but unless the Pentagon decides to develop and construct their own independent internet .... hackers and groups like Wikileaks will always be a problem.

Tuesday, April 13, 2010

Copyright Violation Alert Ransomware In The Wild

From ZNET:

A currently ongoing ransomware campaign is using a novel approach to extort money from end users whose PCs have been locked down.

By pretending to be the fake ICPP Foundation (, the ransomware locks down the user’s desktop issuing a “Copyright violation: copyrighted content detected” message, which lists torrent files found on the infected PC, and forces the user to pay $400 for the copyright holder’s fine, emphasizing on the fact that “the maximum penalties can be five years in prison and up to $250,000 in fines.

More details on the campaign:

Read more ....

Instead Of "Arms Control", We Have "Cyber Controls"

Photo: Cyber warrior: Vladislav Sherstuyuk, a retired four-star Russian general who leads the Institute of Information Security Issues at Moscow State University, announced a new cyber security research collaboration on Monday. Credit: Veni Markovski

Exposing Hackers As A Deterrent -- Technology Review

Two researchers propose a novel form of "arms control" at a conference in Germany.

Cyber attacks can come from governments, terrorists, thieves, or bored high school students. This makes the cyber security equivalent of "arms control" difficult to achieve. But a pair of researchers yesterday proposed methods of deterrence that they believe could work in cyberspace.

Read more ....

Saturday, March 6, 2010

New Era For Internet Security Amid Increased Attacks

From The BBC:

Internet security techniques must adapt to keep up with the rising tide of net attacks say officials.

The issue is top of the agenda at the world's biggest security conference hosted by vendor RSA.

Recent incidents such as the high-profile attacks on Google in China have highlighted the new challenges.

Read more ....

Massive Spanish Botnet Busted, But Hacker Mastermind Remains Unknown

From Discover Magazine:

Spanish authorities announced this week that they shut down what appears to be the largest botnet ever discovered.

The Mariposa botnet, which first appeared in 2008, was a network of nearly 13 million virus-infected PCs, remotely operated by thieves stealing private information from computers in half the Fortune 1000 companies and 190 countries. Though three men are now in custody, worries over the bot are far from over.

Read more ....

Wednesday, March 3, 2010

Spanish Police Arrest Ringleaders Who Infected 13m PCs With Credit-Card Stealing Virus

The virus was used to steal login credentials and record every key stroke on the 13m infected computers

From The Daily Mail:

Spanish police have arrested three men accused of masterminding one of the biggest computer crimes to date, which created a network of 13million virus-infected computers.

The virus, named the Mariposa botnet, stole credit card numbers and other personal details from infected machines.

Read more ....

Tuesday, March 2, 2010

Wiseguys Indicted In $25 Million Online Ticket Ring

From Wired News:

A ring of ticket brokers has been indicted in connection to an elaborate hacking scheme that used bots and other fraudulent means to purchase more than 1 million tickets for concerts, sporting events and other events.

The defendants made more than $25 million in profits from the resale of the tickets between 2002 and 2009.

Read more ....

More News On This Ticket Scam

Four Men Indicted In Online Ticket Scam -- PC World
Four men charged in computerized online ticket scam -- CNET
Four Indicted in CAPTCHA Hacks of Ticket Sites -- PC Magazine
4 Californians indicted in alleged ticket reselling scam -- L.A. Times
Couldn’t Get Those Coveted Gaga Tickets? Here’s Why -- Wall Street Journal
Wiseguys net $25m in ticket scalping racket -- Register

Tuesday, February 23, 2010

Hacking Inquiry Puts China’s Elite In New Light

Shanghai Jiaotong University students won a programming competition this month, once again defeating colleges like Stanford. Jillian Murphy

From The New York Times:

SHANGHAI — With its sterling reputation and its scientific bent, Shanghai Jiaotong University has the feel of an Ivy League institution.

The university has alliances with elite American ones like Duke and the University of Michigan. And it is so rich in science and engineering talent that Microsoft and Intel have moved into a research park directly adjacent to the school.

But Jiaotong, whose sprawling campus here has more than 33,000 students, is facing an unpleasant question: is it a base for sophisticated computer hackers?

Read more ....

Monday, February 22, 2010

U.S. Pinpoints Code Writer Behind Google Attack: Report

A bird flies over Google China headquarters building next to a Chinese national flag in Beijing in this January 14, 2010 file photo. Credit: Reuters/Jason Lee

From Reuters:

BEIJING (Reuters) - U.S. government analysts believe a Chinese man with government links wrote the key part of a spyware programme used in hacker attacks on Google last year, the Financial Times reported on Monday.

The man, a security consultant in his 30s, posted sections of the programme to a hacking forum where he described it as something he was "working on," the paper said, quoting an unidentified researcher working for the U.S. government.

Read more ...

Monday, February 1, 2010

Benevolent Hackers Poke Holes In E-Banking

Security could be lacking (Image: Frazer Hudson)

From New Scientist:

ONLINE banking fraud doesn't just affect the naive. Last year, Robert Mueller, a director at the US Federal Bureau of Investigation, admitted he'd come within a mouse-click of being a victim himself. Now the extent of the problem has been brought into sharp relief, with computer scientists warning that banking culture is increasing the likelihood that customers are using vulnerable systems.

Read more ....

Monday, January 18, 2010

China Also Targets India's Computer Networks

China Tried To Hack Our Computers, Says India’s Security Chief M.K. Narayanan -- Times Online

Chinese hackers are believed to have attempted to penetrate India’s most sensitive government office in the latest sign of rising tensions between the two rival Asian powers, The Times has learnt.

M. K. Narayanan, India’s National Security Adviser, said his office and other government departments were targeted on December 15, the same date that US companies reported cyber attacks from China.

Read more ....

My Comment: It seems that China's hackers are targeting everyone .... and I mean everyone.

Wednesday, December 23, 2009

Report: FBI Investigating Citibank Cyberattack

From CNET:

Citigroup denies it, but its Citibank unit was reportedly robbed of tens of millions of dollars, the victim of a cyberattack by members of a Russian criminal gang, says Tuesday's Wall Steet Journal (subscription required).

The attack was discovered this past summer, says the Journal, but investigators for the FBI and National Security Agency believe it could have happened months or a year prior. The two agencies have reportedly shared information with the Department of Homeland Security and Citigroup to defend against the attack. The investigation is supposedly ongoing, with no word on whether or not any of the stolen money has been found.

Read more ....