tagged w/ Hacking
The likelihood of a British citizen having their personal home computer hacked by government authorities, secretly and without a warrant, has increased. Even more infuriating, this intrusion may be at the behest of a foreign nation, thanks to a recent plan adopted by the EU.
Since the hacking may proceed if an officer believes there is sufficient reason to believe it would help prevent or detect a serious crime, the obvious question is, who decides what is considered “sufficient reason” and what is to prevent abuse of these over-reaching powers? If there is truly sufficient evidence, why wouldn’t a judge simply grant a warrant? This would at least grant some oversight.The likelihood of a British citizen having their personal home computer hacked by... more
Police look to hack citizens' home PCs
'Very intrusive powers – as intrusive as someone busting down your door'
Posted: January 04, 2009
8:56 pm Eastern
© 2009 WorldNetDaily
Police and state intelligence agencies from several countries may soon be working together to secretly hack into private citizens' personal computers without their knowledge and without a warrant.
According to a London Times report, the police hacking process, called "remote searching," enables law enforcement to gather information from e-mails, instant messages and Web browsers, even while hundreds of miles away.
Furthermore, the Times reports, a new edict by the European Union's council of ministers in Brussels has paved the way for international law enforcement agencies to begin remote searching and sharing the information with each other. According to the Times, the United Kingdom's Home Office, the nation's lead government department for immigration, drugs and counter-terrorism enforcement, has already quietly adopted a plan that would enable French, German and other European Union police forces to request remote searching be done on UK citizens' computers.Police look to hack citizens' home PCs 'Very intrusive powers – as... more
Want to be a hacker but worried about the ethical decisions involved? Don't worry as there's now a whole course aimed at people just like you, the 'ethical hackers course.'
The International Correspondence School is the first of its kind to offer lessons in 'ethical hacking' as a distance learning course, essentially meaning you can learn to hack from laid in bed.
Ethical hacking is regularly used by security companies who are trying to counter computer crime, with focus on "the methods used by criminals, and test computer systems for weaknesses that could leave them open to attack. They often conduct dummy raids and penetration tests to discover the security of a client's system.
Wonder if they'll be any hackers, hacking the course to learn about hacking...Want to be a hacker but worried about the ethical decisions involved? Don't worry... more
In the most recent instalment of the Apple vs. iPhone hackers battle, reports are coming in that Apple's latest OS X update for Leopard is disabling jailbreaking tools for iPhones and iPod touches from within the OS.
"The 10.5.6 update disables the iPhone Dev Team’s Pwnage tool at the system level, actually stopping Macs from recognising the iPhone or iPod touch in its DFU (device firmware update) mode."
Next installment in the battle: hackers write program to disable disabling tools, probably.In the most recent instalment of the Apple vs. iPhone hackers battle, reports are... more
In Brazil logging license are issued through websites. Over 100 logging companies commissioned hackers to break into the government's website to falsify records to allow for more permits to be issued.In Brazil logging license are issued through websites. Over 100 logging companies... more
Researchers have unearthed rootkit-like functionality in an enterprise security product.
Network security software from a Chinese developer includes processes deliberately hidden from a user and, even worse, a hidden directory, Trend Micro reports. Files in the hidden directory could exist below the radar of antivirus scanners, potentially creating a stealthy hiding place for computer viruses that their creators might seek to exploit.
Trend Micro has written to the software developers involved in what looks like a case of misguided software design, rather than anything worse. Pending a fix from software developers, Trend Micro has slapped a "hacking tool" warning on the rootkit-like component of the network security tool (called HKTL-BRUDEVIC).
It doesn't name the developers except to say they are the same firm which bundles rootkit-like software with USB storage devices featuring fingerprint authentication.
Sony got a further black eye from issues with its MicroVault USM-F fingerprint reader software last year, which emerged a little over two years after its thorough mauling for including rootkit functionality on its music CDs. The feature, designed to stop fans ripping music tracks, created a security hole exploited by a number of Trojans.
WTF is Sony turning into you neighborhood hacker? Maybe AT&T should hire them, holy shit :loll: :loll:Researchers have unearthed rootkit-like functionality in an enterprise security... more
Could your computer become a hacker's storage vault for child porn, unbeknownst to you?
Some say it can happen, and has.
One Plainfield man facing child pornography charges thinks it happened to him.
Kevin F. Plachta, 45, of 16125 Vintage Drive in Plainfield, said he may have inadvertently downloaded a computer virus, or was the victim of a hacker, but he didn't knowingly download child porn.
About a year ago, the FBI seized his household computers, saying they had reason to believe there was child porn on one of them, Plachta said.
They took three computers and eventually returned two, he said. The FBI refused to return the third because they said there were questionable images on it, Plachta said.
Plachta was arrested Nov. 14 on two counts of child pornography.
The complaint filed with the Will County State's Attorney's office accuses Plachta of having a photo and a partial video depicting child porn on his computer.
In an interview last week, Plachta maintained his innocence and said he was likely a victim of a virus or a hacker that planted the images on his machine.
More at URLCould your computer become a hacker's storage vault for child porn, unbeknownst... more
The largest U.S. military base in Afghanistan was hit by a computer virus earlier this month that affected nearly three quarters of the computers on the base, U.S. News has learned.
This wasn't the first such cyberattack, and officials said that earlier incarnations of the virus had exported information such as convoy and troop movements here. It was not clear precisely what information, if any, was being pulled from Department of Defense computers by this latest virus, they said.
Officials familiar with the computer attack characterized it as extremely aggressive and said that it originated in China. However, they haven't been able to determine whether the viruses are part of a covert Chinese government effort or the work of private hackers.
U.S. military officials on the base took the step of prohibiting the use of portable flash memory, or "thumb drives," as they learned more about the virus. The move reflects the concern that the portable drives can inadvertently spread viruses through separate computer networks in the field. Late last week, Pentagon officials also banned the use of thumb drives because of concerns that they were spreading a virus through the Department of Defense computer networks.
U.S. military spokesmen at Bagram declined to comment, citing operational security.
But privately, U.S. military officials express grave concerns. The Chinese "learn a lot from these attacks," says one U.S. military intelligence official. "Like how our logistics and other systems work."The largest U.S. military base in Afghanistan was hit by a computer virus earlier this... more
If this is true maybe there should be a new nominee for Time's Person of the Year. It's a story of how a freelance "guy who does code" detected a fatal vulnerability in the world wide web which he could have sold to the Russian mafia or China... and more importantly, it tells what he did about it.If this is true maybe there should be a new nominee for Time's Person of the... more
The electronic attack was so serious that Adm Michael Mullen, the chairman of the joint chiefs of staff, briefed President George W Bush and Robert Gates, the defence secretary.
Defence officials told the Los Angeles Times that the attack struck computers within the US Central Command, which oversees Iraq and Afghanistan, and involved malicious software - known as "malware" - that permeates a network.
"This one was significant, this one got our attention," said an official, speaking anonymously.
Officials did not disclose the extent of the damage and would not elaborate on the reasons for believing the assault originated in Russia.
The Pentagon and other US government departments face repeated cyber attacks, especially from Russia and China, either from individuals or indirectly from those countries' governments.
Within the past 18 months Russia has been accused of orchestrating major electronic attacks on neighbours Estonia and Georgia.The electronic attack was so serious that Adm Michael Mullen, the chairman of the... more
Note: This is an historic document. We are no longer maintaining the content, but it may have value for research purposes. Pages linked to from the document may no longer be available.
This document provides a general overview of attacks in which the primary goal of the attack is to deny the victim(s) access to a particular resource. Included is information that may help you respond to such an attack.
A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service.
To read the article, follow the link above.
Welcome to discussion on this tech juridical issue.Note: This is an historic document. We are no longer maintaining the content, but it... more
The discovery of the assault last week threw into crisis the Washington, D.C. based International Monetary Fund (IMF), which offers emergency financial aid to countries faced with balance-of-payments problems, and provoked a shutdown of IMF computers that lasted for several days.The discovery of the assault last week threw into crisis the Washington, D.C. based... more
The Air Force is fed up with a seemingly endless barrage of attacks on its computer networks from stealthy adversaries whose motives and even locations are unclear. So now the service is looking to restore its advantage on the virtual battlefield by doing nothing less than the rewriting the "laws of cyberspace."
It's more than a little ironic that the U.S. military, which had so much to do with the creation and early development of internet, finds itself at its mercy. But as the American armed forces become increasingly reliant on its communications networks, even small, obscure holes in the defense grid are seen as having catastrophic potential.
Trouble is that even a founding father can't unilaterally change things that the entirety of the internet ecosystem now depends on. "You can control your own networks, rewrite your own laws," says Rick Wesson, CEO of the network security firm Support Intelligence. "You can't rewrite everybody else's."
But the Air Force Research Laboratory's "Integrated Cyber Defense" program, announced earlier this month, is part of a larger military effort to accomplish just that. "The 'laws' of cyberspace can be rewritten, and therefore the domain can be modified at any level to favor defensive forces," announces the project's request for proposals. Some of the rewrites being considered:
- Making hostile traffic inoperable on Air Force networks.
- Locating and identifying once-anonymous hackers.
- Enabling Air Force servers to evade or dodge electronic attacks, somehow.
It's part of a larger Air Force effort to gain the upper hand in network conflict. An upcoming Air Force doctrine calls for the service to have the "freedom to attack" online.
Rest at Link...
The Air Force is fed up with a seemingly endless barrage of attacks on its computer... more
Despite never having played a computer game in their long lives, pensioners Gill and Ken Murdoch were targeted, threatened and fined for illegally downloading Atari's Race07.
Davenport Lyons, the law firm hired by Atari to prosecute file-sharers, handled the case and it is allowed to apply for a court order to get account details from an ISP simply by identifying a suspect IP address.
Is this fair? Surely the ISPs should be working with their consumers not against them.
Despite never having played a computer game in their long lives, pensioners Gill and... more