background preloader

#CYBERNONYMOUS

Facebook Twitter

Alleged LulzSec hacker of Sony Pictures faces trial date in December | Technology. The background from LulzSec's Twitter page. Leaked IRC logs show the group's inner workings. Photograph: AP An alleged member of the clandestine hacking group LulzSec pleaded not guilty on Monday to charges of taking part in an extensive computer breach of the Sony Pictures Entertainment film studio's European systems. Cody Kretsinger, 23, entered not guilty pleas to one count each of conspiracy and unauthorized impairment of a protected computer during a brief hearing in U.S. District Court in Los Angeles. US Magistrate Judge Victor Kenton set a trial date of 13 December for Kretsinger, who spoke only in response to questions from the judge. Kenton also ordered that Kretsinger be represented by a court-appointed public defender. Kretsinger faces a maximum sentence of 15 years in prison if convicted. "From a single injection we accessed EVERYTHING," the hacking group said in a statement at the time.

Anonymous Message to NATO. 'Cyber Challenge' encourages teen hackers to seek security jobs. Kyle Natale, 16, a member of the Xpoliters, the Harford Technical… (Kim Hairston, Baltimore…) October 22, 2011|By Candus Thomson, The Baltimore Sun Like skilled cat burglars, teams of college-age hackers slithered past defenses to probe the soft underbelly of a sophisticated computer system. Their mission: to steal secrets and leave an electronic calling card. As they tapped away on laptops and spoke in low voices, knots of educators, business leaders, parents and government officials hovered nearby, smiling and nodding with approval.

In the eyes of the organizers of the Maryland Cyber Challenge and Conference, today's hacker could be tomorrow's cybersecurity hero. "We need a whole generation of people to help us build out the digital future," said Michael Kaiser, executive director of the National Cyber Security Alliance. "This has been a part of their lives since Day One. " The fun part was the Cyber Challenge, an all-day brain tester for eight high school and eight college teams. The #AntiShock Dictionary. Confessions Of A Tunisian Hacktivist. Editor’s note: Contributor Mouna El Mokhtari is a French journalist and editor in chief of Webdorado. Below is her translation of an exclusive interview she conducted with Tunisian hacktivist K3vin Mitchnik. You can follow her @mooouna Today, Tunisia is holding its first free elections.

K3vin Mitchnik, whose pseudonym is a tribute to the great American hacker turned computer consultant, Kevin Mitnick, is a 25-year-old Tunisian cyber activist who has played a crucial role in the recent Jasmine Revolution in his country, which helped overthrow the previous regime and sparked the Arab Spring across the Middle East.. How did you become a hacker? What attracted you to hacking? And so you went on to create Tunisian Black Hats?

Why did you choose to name yourselves the Tunisian Black Hats ? How do you start a hackers’ group in a country where censorship is so severe? At that time, hackers were scared to attack governmental or presidential websites. Does Anonymous have leaders? Press Release – Who & What Anonymous represents! Donation Campaign Begins for #Freeanons. Anonymous v. Pedophiles. The Tor anonymity network is most commonly used by individuals who want to use the Internet with privacy, including political activists in nations without free speech protections. But it can also be used to serve content, so no one can easily find the Web servers. This is called the "darknet. " And some of those servers provide illegal content, such as child pornography. Anonymous hackers say they have tracked down child-porn servers, hacked into them, and dumped the usernames: Now Scott Terban has posted an article applauding these efforts as a "good start.

" I don't agree--I think masked vigilantes hacking into servers, obtaining weak identification evidence there, and casting lethal accusations about, is nothing good. In fact, OpDarkNet already accused th3j35t3r of being in the pedophile database, and had to retract that accusation as a clear forgery. The Global Cybergame Has Begun. United States Navy Military domain is vulnerable to hackers ~ THN : The Hacker News. United States Navy Military domain is vulnerable to hackers United States Navy Military website is full of vulnerabilities. Sec Indi Security Team Hacker upload a custom message on the server as shown below : Url is hidden for Security Reasons.

Hacker claim to inform the website admins already, but government did not fix it yet so he releasing this in public. Dan Ariely asks, Are we in control of our own decisions? We All Knew It Could Be Done : Exclusive: Computer Virus Hits U.S. Drone Fleet | Danger Room. A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones.

The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military’s most important weapons system. “We keep wiping it off, and it keeps coming back,” says a source familiar with the network infection, one of three that told Danger Room about the virus.

But despite their widespread use, the drone systems are known to have security flaws. Trustnetwork IIC Hosting Via @AnonymouSabu. Pastebin postings of Anonymous OpDarknet. Anonymous Action. Stuxnet: Digital Industrial Sabotage or Cyber-Weapon of Mass Destruction? | Aigeanta.Net. The story of Stuxnet reads like a cross between a work of cyberpunk fiction and an international spy novel. In 2009 the world community was intensely debating the immediacy of Iran’s nuclear weapon program readiness. Meanwhile, a clandestine software project, sponsored by a cyber superpower with vast resources, was engaged in coding the first known malware rootkit to monitor and subvert the programmable logic controllers of an industrial system, allegedly the Iranian Natanz uranium enrichment facility.

Since the outbreak of the worm, security researchers have studied Stuxnet intensely to determine its origin, mechanism, and target. While the suspected aim was to disrupt Iran’s nuclear program, official confirmation only came late last year, as “Iranian President Mahmoud Ahmadinejad said [in November 2010] that malicious computer code launched by “enemies” of the state had sabotaged centrifuges used in Iran’s nuclear-enrichment program.” HideMyAss Anonymous VPN Shops Lulzsec Suspects | eWEEK Europe UK. HideMyAss.com, the anonymous VPN service, has admitted that it handed over the details of one of the alleged Lulzsec hackers who attacked systems belonging to Sony Picture Entertainment.

The HideMyAss service is based in the UK and provides a free proxy that tell users they can “surf anonymously online, hide your IP address, secure your internet connection, hide your internet history, and protect your online identity.” Last week the alleged Lulzsec hacker known as ‘Recursion’, aka Cody Andrew Kretsinger, 23, of Phoenix, Arizona, was arrested by the FBI. Court Order HideMyAss explained that it had complied with a court order to disclose Kretsinger’s IP address that he had used to log into the HideMyAss service. Kretsinger had allegedly used HideMyAss.com’s web proxy service to disguise his IP (internet protocol) address whilst he was supposedly hacking into Sony Picture Entertainment servers.

And HideMyAss defended its role in handing over the IT address to the FBI in a blog posting. 50 Days of Mayhem: How LulzSec Changed Hacktivism Forever | Damon Poeter. LulzSec didn't invent hacktivism, let alone hacking. But the small crew of publicity-hungry digital pirates may have ushered in a new era for both as they merrily sailed the cyber-seas for 50 days of mayhem that became perhaps the biggest tech story of the first half of 2011. LulzSec now says that it's put the Lulz Boat in permanent dry dock. Taking the group at its word, what did these six individuals (the membership number LulzSec now cops to) accomplish in their brief but explosive time in the spotlight? Brand Name Hacktivism More important than the digital scalps LulzSec took—Sony, PBS, Infragard, the CIA, Arizona's Department of Public Saftey, to name a few—was the group's canny use of social media and clever manipulation of a pliant press that may have redefined hacktivism forever.

At some point, it seems, this group came up with a remarkably effective strategy for branding itself and publicizing its exploits. The final ingredient in the group's success was simple. Anonymous Warns of 'Day of Vengeance' Saturday | Cybercrime & Cybercriminals | Online Attacks & Internet Crime. DIY Wireless Device Hacks & 'Modifies' News, Take On MSM Directly: Anti-Propaganda - NewsTweek. Kilgore Trout Ousts Barret Brown as Leader of Anonymous • Chronicle.SU. By chronicle.SU, on March 9th, 2011 Cuthbert, GA-Early this morning, Kilgore Trout announced that the hacktivist group formerly known as Anonymous is dead. Because of the inevitable progression and definition of ideology that makes up the body politic of the group formerly known as Anonymous, expert analysts believe the rise of a leader became a necessity.

Now known as The Legion, Kilgore Trout has distanced himself and his followers from any actions made by the less mature Anonymous. Anonymous was recently hijacked by the United States Government via AnonNews.org and infiltrators threatened attacks on the captors of Bradley Manning. This tactic allows the government to begin investigation and prosecution of anyone who has ever downloaded the Low Orbit Ion Cannon or participated in any operations claimed by Anonymous. “Anonymous was not originally a true group, but there is now a clear boundary between insiders and outsiders.

Internet activism is best used to promote Internet Freedom. Are the NYPD and FBI Trying to Frame Anonymous, Occupy Wall Street? Operation-Invade-Wall-Street. Jamie Jo Corne, head of Presstorm, speaks - National Anonymous. BlackBerg security hacked - National Anonymous. It never ends. Owned and operated by Joe Black, has been taken down by online activists. The claim for the kill goes to twitter user @abhaxas, who promises a data dump soon.

Mr. Black was responsible for the DDoS of Presstorm.com, a news website that has formally declared itself to be affiliated itself with Anonymous (joined, as much as the term applies) as a direct result of Mr. Black's actions. I'm giving up my life for my country. Mr. The spat between Anonymous, Presstorm, and Joe Black began with a misunderstanding. Mr. UPDATE: I inaccurately reported the presstorm.com had been destroyed. UPDATE: Jamie Jo Corne, head of Presstorm. Are the NYPD and FBI Trying to Frame Anonymous, Occupy Wall Street? Antisec - Boston Police Patrolman's Association hacked and pranked. Tor anonymizing network Compromised by French researchers ~ THN : The Hacker News. Tor anonymizing network Compromised by French researchers French researchers from ESIEA, a French engineering school, have found and exploited some serious vulnerabilities in the TOR network.

They performed an inventory of the network, finding 6,000 machines, many of whose IPs are accessible publicly and directly with the system’s source code. They demonstrated that it is possible to take control of the network and read all the messages that circulate. But there are also hidden nodes, the Tor Bridges, which are provided by the system that in some cases. Researchers have developed a script that, once again, to identify them. They found 181. "We now have a complete picture of the topography of Tor," said Eric Filiol. The specific attack involves creating a virus and using it to infect such vulnerable systems in a laboratory environment, and thus decrypting traffic passing through them again via an unknown, unmentioned mechanism. How hackers get caught. October 24, 2011, 1:45 PM — The latest version of InfoWorld's Stupid Hacker Tricks goes a long way toward explaining why some hackers are caught almost immediately, while others stay out on the dark fringes for years.

It seemed as if the FBI grabbed 35-year-old Christopher Chaney of Jacksonville, Fla. for hacking the phones and emails of Scarlett Johansson and other female A-listers within days of the Johansson revelations. [ Stupid hacker tricks: Exploits gone bad ] Actually the investigation went on for more than a year and Johansson's photos went missing months before the publicity rush resulting from her request that the FBI quit dawdling and do something about the guy who allegedly stole private data and compromising photos from more than 50 famous women. He is charged with having more than 200 compromised card-account numbers in his possession and defrauding victims of more than $100,000. Sounds like a serious work effort, not a student on a lark who would make stupid mistakes.