background preloader

Cybercriminalité

Facebook Twitter

Adrian Lamo. Lamo first gained media attention for breaking into several high-profile computer networks, including those of The New York Times, Yahoo! , and Microsoft, culminating in his 2003 arrest.[4] In 2010, Lamo reported U.S. soldier PFC Bradley Manning (now known as Chelsea Manning) to federal authorities, claiming that Manning had leaked hundreds of thousands of sensitive U.S. government documents to WikiLeaks. Manning was arrested and incarcerated in the U.S. military justice system and later sentenced to 35 years in confinement.[5][6] Early life and education[edit] In the mid-1990s, Lamo became a volunteer for the gay and lesbian media firm PlanetOut.com.[14][17] In 1998, Lamo was appointed to the Lesbian, Gay, Bisexual, Transgender, Queer and Questioning Youth Task Force by the San Francisco Board of Supervisors.[18][19] During this period, in 2001, he overdosed on prescription amphetamines.[1][20] Activities and legal issues[edit] Security compromise[edit] DNA controversy[edit] See also[edit]

What Does it Cost to Change the World? HackerLeaks. Hackers politely deface security firm website, suggest fixes. A Cayman Islands security firm got a bit of unsolicited web security advice on March 30 from MalSec, a group of "malicious security" hackers who recently broke into a server belonging to the Nigerian Senate.

Hackers politely deface security firm website, suggest fixes

But unlike some of the nastier site defacements done recently by members of Anonymous' #AntiSec collective—including takedowns of two Federal Trade Commission sites—the MalSec hackers left the site itself intact, posting only a replacement home page to advise the company, The Security Centre Ltd., of their vulnerability. Le Pentagone se défend contre les cyberattaques - Aéronautique - Défense - Construction navale. Renforcer la sécurité des réseaux informatiques et développer la dissuasion pour faire face aux cyberattaques.

Le Pentagone se défend contre les cyberattaques - Aéronautique - Défense - Construction navale

Tel est l’objectif du ministère américain de la Défense qui a dévoilé sa stratégie dans le domaine le 14 juillet. Les pirates, ces grands dépressifs ? Selon une étude menée aux Etats Unis par l'université des sciences et des technologies du Missouri, le pirate, celui qui télécharge et qui partage sans scrupules, serait plus à même d'être touché par les symptômes de la dépression.

Les pirates, ces grands dépressifs ?

You will be billed $90,000 for this call: Mikko Hypponen (F-Secure) on Dialers, telephone fraud, mobile malware. Posted by david b. on March 7, 2012 F-Secure’s Chief Research Officer Mikko Hypponen speaks on telephone fraud schemes leading to money theft.

You will be billed $90,000 for this call: Mikko Hypponen (F-Secure) on Dialers, telephone fraud, mobile malware

Hi everybody, my name is Mikko Hypponen, and we’ll be spending the next 30 minutes in this turbo talk, talking about ‘You will be billed 90,000 dollars for this call’ So, let me just outline real quick about the company I represent. Cybercriminalité : Paris, quatrième ville la plus exposée - Informatique - Bureautique. “cybercriminality” on SlideShare. How “The Angel” helped 15,000 people steal broadband. In 2006, a hacker going by the name "DerEngel" ("The Angel") wrote a book for respected tech publishers No Starch Press on Hacking the Cable Modem.

How “The Angel” helped 15,000 people steal broadband

The book came with a warning: "The practice of modifying a cable modem violates service agreements, and hackers risk being banned by service providers for life. FinSpy Software Is Tracking Political Dissidents. What they found was the widespread use of sophisticated, off-the-shelf computer espionage software by governments with questionable records on human rights.

FinSpy Software Is Tracking Political Dissidents

While the software is supposedly sold for use only in criminal investigations, the two came across evidence that it was being used to target political dissidents. The software proved to be the stuff of a spy film: it can grab images of computer screens, record Skype chats, turn on cameras and microphones and log keystrokes. The two men said they discovered mobile versions of the spyware customized for all major mobile phones. La carte d’un monde d’espions. Information Security Company. Android botnets on the rise - case study.

Mobile botnets are malicious infrastructures that are increasing with impressive trend especially the Android botnets, considering the capillary diffusion for the Google mobile OS.

Android botnets on the rise - case study

Android devices are in the hands of more than half mobile users and unfortunately bad habits and lack of awareness of cyber threats are creating the favorable conditions for the diffusion of malicious applications that could infect helpless mobile. Every day I meet dozens of persons that have made a jailbreak on their device, that have installed insecure application downloaded from third-party application stores in most of the cases for trivial reasons. For youngsters security is an unknown word, exactly such as malware despite they know that they desktop PC could be infected. But mobile devices are also in workspace, the promiscuous usage is very common that’s why concepts such as BYOD are becoming very familiar at least between company management.

This Week in Cybercrime: Data Breaches at Yahoo, Formspring and Nvidia. Amazing mind reader reveals his 'gift'. Defcon 18 - Power of the Chinese Security - Anthony Lai Jake Appelbaum Jon Oberheide - Part.mov. DEFCON 20: Owning Bad Guys {And Mafia} With Javascript Botnets. Webcam spying goes mainstream as Miss Teen USA describes hack. Webcam hacking has officially gone mainstream with yesterday's revelation that the new Miss Teen USA, Cassidy Wolf, was the victim of a "sextortion" plot in which someone slipped Remote Administration Tool (RAT) software onto her computer and used it to snap (apparently nude) pictures of Wolf in her room.

Webcam spying goes mainstream as Miss Teen USA describes hack

Meet the men who spy on women through their webcams. "See!

Meet the men who spy on women through their webcams

That shit keeps popping up on my fucking computer! " says a blond woman as she leans back on a couch, bottle-feeding a baby on her lap. The woman is visible from thousands of miles away on a hacker's computer. Misha Glenny: Hire the hackers! La guerre invisible [Docs] - ARTE. Cybercriminalité : "les entreprises doivent prendre conscience des risques"

ENTRETIEN Sony encore ce week-end, Lockheed Martin il y a quelques jours ou encore Bercy…Ils ont tous été victimes de cyber-attaques.

Cybercriminalité : "les entreprises doivent prendre conscience des risques"

L’Usine Nouvelle analyse ce phénomène avec Jean- Paul Pinte, maître de conférences en veille stratégique à l'Université Catholique de Lille, spécialiste en management des risques cybercriminels et terroristes des entreprises. L'Usine Nouvelle - Que pensez-vous des attaques répétées contre le groupe Sony notamment ces dernières semaines ? CyFi Hackeuse de 10 ans. CyFi est une jeune hackeuse de 10 ans. Forte croissance des cyberattaques, dénonce Pékin. La guerre électronique ne fait que commencer - Blogs Intelligence économique.

La stratégie de pointe des guerres numériques a pour objet d’améliorer les perceptions et l’analyse d’évènements en formation. Elle va donner une impulsion particulière au développement d’objets ou d’applications capables de surveillances furtives. Cyber Attacks on Activists Traced to FinFisher Spyware of Gamma. It’s one of the world’s best-known and elusive cyber weapons: FinFisher, a spyware sold by U.K.- based Gamma Group, which can secretly take remote control of a computer, copying files, intercepting Skype calls and logging every keystroke. For the past year, human rights advocates and virus hunters have scrutinized FinFisher, seeking to uncover potential abuses. Assad a une Armée électronique pour guerroyer sur le Web syrien. Depuis près d’un an, dissidents syriens et soutiens du régime de Bachar el-Assad se livrent une lutte sanglante.

Dans les rues syriennes, mais aussi sur Internet. Le cyberbluff a commencé. Le sénateur Jean-Marie Bockel a rendu public le 19 juillet un rapport sur la cyberdéfense. Le volet offensif y occupe une place de choix, en écho aux orientations fixées en 2008. Confessions Of A Teenage Xbox Hacker. For hire: Elite “cyber mercenaries” adept at infecting Windows and Macs. Researchers from Russia-based Kaspersky Lab have uncovered a gang of hackers for hire who specialize in surgical strikes that quickly infiltrate suppliers to Western companies, steal highly sensitive data, and then vanish.

Icefog, as the group of "cyber mercenaries" has been dubbed, is made up of six to 10 members who are able to infect both Windows and Mac computers with advanced malware that's extremely hard to detect, Kaspersky researchers revealed in a report published Wednesday. DEFCON 20: Fuzzing Online Games. Meet Hidden Lynx: The most elite hacker crew you’ve never heard of. A hacking team with unusual skill and persistence has penetrated more than 100 organizations around the world, including US defense contractors, investment banks, and security companies whose sole purpose is to defend against such attacks, according to a detailed report.

One of the best known exploits of the so-called Hidden Lynx group was the devastating compromise of security firm Bit9 in 2012. The Waltham, Massachusetts, company provides an "application whitelisting" service that allows customers to run only a small set of approved software on their PCs and networks. By hacking into the company's servers and stealing the private cryptographic keys Bit9 used to digitally sign legitimate apps, the intruders were able to infect more valuable targets inside military contracting firms who used the service. Until now, little has been known about the group responsible for the Bit9 attack. T E X T F I L E S. Cybercrime abuses Facebook paid advertisements. A reading of an interesting study on the criminal abuse of Facebook’s Paid “Sponsor Ads” system to deliver nefarious websites to the users. In the last weeks I presented on an interesting study of the techniques adopted by the cybercriminals organizations to abuse of the popular social network Facebook.

The researchers Frank Angiolelli, Eric Feinberg, Ian Malloy issued a follow up on the analysis they presented titled “Facebook Paid Advertisements to Defraud“, it is an interesting study that analyze with you in this post. Facebook, and any other social media platforms, offer a multitude of opportunity for cybercrime that could exploit the numerous services they provide, in particular the study evaluate how organized cybercriminals are leveraging Facebook’s Paid “Sponsor Ads” system to deliver nefarious websites to the user of the social network.

La «cyberguerre» n'existe pas. La guerre ne se déroulera bientôt plus au sol, dans les airs ou sur les mers mais dans le cyberespace. Cette prédiction, vous l’avez sans doute entendue à de nombreuses reprises (y compris ici-même) au cours des dernières années, voire décennies, et elle est déjà en quelque sorte réalité: le gouvernement américain dépense 4,3 milliards de dollars (3,2 milliards d’euros) par an en «cyberopérations», et aurait mené 231 opérations «offensives» en 2011. Pourtant, nous ne sommes pas près de connaître une véritable guerre dans le cyberespace selon Thomas Rid, chercheur en War Studies au King’s College de Londres et auteur de Cyber War Will Not Happen. La Bretagne au coeur de la cyberdéfense française. Defcon 18 -My life as a spyware developer - Garry Pejski - Part.mov. Enter at your own risk – Un magazine pour sensibiliser les gens à la sécurité informatique.

Devenir pirate informatique.