background preloader

'Anonymous' Legacy: Hacktivists Stole More Data Than Organized Crime In 2011 Breaches Worldwide

'Anonymous' Legacy: Hacktivists Stole More Data Than Organized Crime In 2011 Breaches Worldwide
FIDO Alliance technology will allow enterprises to replace passwords with plug-and-play multifactor authentication. By Phil Dunkelberger President & CEO, Nok Nok Labs, 3/26/2014 1 Comment | Read | Post a Comment News Hackers interrupt and deface sites of black-market forums selling credit card data stolen from Target and other retailers.By Mathew J. Schwartz , 3/18/2014 4 comments | Read | Post a Comment Breaches create outliers. 1 Comment | Read | Post a Comment Commentary Is "browser-ized" security a better defense against hackers than traditional methods? 2 comments | Read | Post a Comment Proponents say the new specifications will pave the way for the replacement of passwords, which are frequently lost, stolen, or hacked.By Tim Wilson Editor in Chief, Dark Reading, 2/18/2014 0 comments | Read | Post a Comment Report suggests malware-laced email attack on Target's HVAC subcontractor leaked access credentials for retailer's network.By Mathew J. 12 comments | Read | Post a Comment More Stories

http://www.darkreading.com/database-security.asp

Hacks of Valor </em>Over the past year, the U.S. government has begun to think of Anonymous, the online network phenomenon, as a threat to national security. According to The Wall Street Journal, Keith Alexander, the general in charge of the U.S. Cyber Command and the director of the National Security Agency, warned earlier this year that “the hacking group Anonymous could have the ability within the next year or two to bring about a limited power outage through a cyberattack.” His disclosure followed the U.S. Department of Homeland Security’s release of several bulletins over the course of 2011 warning about Anonymous. Media coverage has often similarly framed Anonymous as a threat, likening it to a terrorist organization. Blizzard passwords could be theoretically reverse engineered Blizzard Entertainment may not yet be in the clear of its latest breach, with the attackers potentially having enough information to reverse engineer weakly constructed passwords. As Jeremy Spilman pointed out on his blog, the information stolen from Blizzard is likely to be the server-side database used as part of the Secure Remote Password (SRP) protocol. If Blizzard's implementation of SRP is standard, its stolen SRP database contains the username and salts for each account and their hashed password verifiers. In his post, Spilman drew on a previous paper, written by the widely accepted father of SRP, Thomas Wu, who stated that if certain information were known — such as the password verifiers that were stolen from Blizzard — an attacker would be able to perform a dictionary attack. Blizzard has also been criticised by the SANS Institute's Internet Storm Centre for not addressing the issue of resetting security questions.

Experts working to shield cars from computer viruses – National Post National PostExperts working to shield cars from computer virusesNational PostBOSTON — A team of top hackers working for Intel’s security division toil away in a West Coast garage searching for electronic bugs that could make automobiles vulnerable… See on life.nationalpost.com Computer Analysts and Experts – Making the Most of GPS Evidence by Professor David Last www.professordavidlast.co.uk The many companies that sell software for computer forensics have developed products for analysing satellite navigators. Police high tech crime … See on articles.forensicfocus.com Am I Anonymous? Issue Number Two: Crowds and Clouds Learning how Anonymous works means learning to be one. Gabriella Coleman narrates her experience of being in between worlds. A1: everyone trusts you, so you’re doing something rightA1: someone irl did say to me onceA1: ‘oh you’re talking to that biella again’A1: ‘shes SO a fed’ It was December 2010, and my plans were simple: finish my book manuscript on the politics of free and open-source software hacking and spend time with my family on an island off the coast of Washington State.

Google, Salesforce were allegedly offered 'TrapWire' spy tool Now approaching its 10th day of a distributed denial-of-service (DDoS) attack, WikiLeaks has released information about a video-surveillance program that is possibly being used by the US government and large organisations, such as Salesforce and Google. The program, called TrapWire, was developed by US-based Abraxas Corporation, which is alleged to be staffed by many former US Central Intelligence Agency (CIA) agents. TrapWire is meant to identify terrorists who approach a facility multiple times as they conduct their surveillance. According to Abraxas' documentation on TrapWire, it is able to correlate video surveillance with other data, such as watch lists. AMD snubs hackers’ tiny package, will fix raided blog – Register eSecurity PlanetAMD snubs hackers’ tiny package, will fix raided blogRegisterBlack-hat hacking crew r00tbeersec claimed responsibility for the break-in at AMD’s WordPress-driven blog, and followed up the assault with a much bigger raid on Dutch… See on www.theregister.co.uk

Digital Forensics is a Science: Series Introduction: Mobile Device … This is the introduction post for my Fall 2012 Mobile Device Forensics course. This is a brand new course and will be actively developed over the semester. During this course students will learn about cell phone / mobile … See on digitalforensicsisascience.blogspot.fr Anonymous documentary ‘We Are Legion: The Story of the Hacktivists’ premieres at SXSW Mar 12, 2012 Last night, “We Are Legion: The Story of the Hacktivists,” a documentary covering the hacking collective Anonymous, premiered at SXSW. I’ve spent a great deal of my time here at Death and Taxes attempting to examine the symbolic context by which Anonymous operates on political, social and economic levels. While I freely acknowledge that the hacking of credit cards is a criminal act, I am quite convinced that DDoS attacks are a legitimate form of digital protest.

Juniper Networks banking on India rebound India's telecommunications industry has been through tough times with steep competition and regulatory complications and uncertainty, but it will emerge from these challenges to recover and companies such as Juniper Networks is poised to benefit from the upturn. Douglas Murray, senior vice president for Asia-Pacific at Juniper Networks, told ZDNet Asia in a recent interview that 2012 has been a particularly difficult year for India-based telcos because of steep industry competition and policy complications from the revoking of existing 2G spectrum licenses earlier in February. These were key reasons why there was a drop in the networking equipment maker's Asia-Pacific revenue in the second quarter, which slid 12 percent year-on-year. This dragged the wider group revenue down by 4 percent to US$1.07 billion for the three months ended June, Murray stated.

Prosecutors to Disclose Hundreds of New Names of News Corp. Phone Hacking … – Hollywood Reporter Hollywood ReporterProsecutors to Disclose Hundreds of New Names of News Corp. Phone Hacking …Hollywood ReporterLONDON – Prosecutors in the phone hacking scandal that has engulfed Rupert Murdoch’s News Corp. See on www.hollywoodreporter.com eDiscovery Daily Blog: eDiscovery Best Practices: Quality Assurance vs. Quality Control and Why Both Are Important in eDiscovery eDiscovery Best Practices: Quality Assurance vs. See on www.ediscoverydaily.com

Related: