Level Nine Sports, where families ski and ride...
 
The Kernel

 advertise with indeep media

Telstra Warns Data Storage Plan Will Attract Hackers

Posted: February 6th, 2015 | Author: | Filed under: Hack!, ONLINE SECURITY, Technoid Computer News, Technoid Internet Security | Tags: , , , , , , , , , , , | Comments Off on Telstra Warns Data Storage Plan Will Attract Hackers

Telstra Warns Data Storage Plan Will Attract HackersAustralia’s biggest telco, Telstra, has sounded a warning about the Government’s mandatory metadata retention scheme.

Telstra said an unintended consequence of the plan would be the creation of many highly attractive targets for hackers.

The Federal Government has cited national security as one of the reasons for its plan to force telcos and internet companies to store customer metadata for two years.

A parliamentary committee investigating the bills also heard concerns from Australia’s intelligence agency watchdog that ASIO could keep metadata indefinitely.

Under the metadata retention scheme, Telstra, and all other national telcos and internet companies, would be forced to store customer metadata for two years.

Telstra said the data would be kept in a database, ready to be given to law enforcement on request :: Read the full article »»»»


NSA Wreaks Havoc! Hacking Report Highlights

Posted: November 5th, 2013 | Author: | Filed under: UPDATED! | Tags: , , , , , , , , , , | Comments Off on NSA Wreaks Havoc! Hacking Report Highlights

PRISMIn a pickle once again, the US National Security Agency – NSA – has apparently hacked into communications links used by the planets largest techs, Google and Yahoo. According to documents leaked by former NSA contractor Edward Snowden the tech-behemoths security was breached in transit between data-centres.

It seems the more this pot gets stirred, the more sludge surfaces, weak restrictions on the NSA’s overseas activities are apparently used to exploit major US companies’ data to a much greater extent than previously thought, The Washington Post reported. It however remains unclear how the NSA accessed the links.

Like other major tech-behemoths, Yahoo and Google constantly send data over shared and exclusive international fibre-optic telecommunication lines. The newly disclosed NSA program, operated with the UK’s spy agency GCHQ – Government Communications Headquarters –  jointly amassing 181 MILLION individual records, in just one 30-day splurge, according to the Post.

The head of the NSA, General Keith Alexander, said: “To my knowledge, this never happened.” Wink Wink Nudge Nudge :: Read the full article »»»»


UPDATE! Chinese Military Hack Attacks Might Originate in NORTH KOREAN

Posted: March 21st, 2013 | Author: | Filed under: Hack!, UPDATED! | Tags: , , , , , , , , , | Comments Off on UPDATE! Chinese Military Hack Attacks Might Originate in NORTH KOREAN

CHINA HACKSLast month we reported that security experts from Mandiant believed a Chinese military unit was responsible for multiple hack attacks on US companies. Mandiant released a report that identified ‘Unit 61398’ as the most likely source of attacks on at least US 141 organisations, “across a diverse set of industries beginning as early as 2006”.

“The nature of ‘Unit 61398’s’ work is considered by China to be a state secret; however, we believe it engages in harmful ‘Computer Network Operations’,” Mandiant said in the report. “It is time to acknowledge the threat is originating in China, and we wanted to do our part to arm and prepare security professionals to combat that threat effectively.”

The Mandiant report said that Unit 61398 is located in Shanghai’s Pudong district, China’s financial and banking hub, and staffed by perhaps thousands of people proficient in English as well as computer programming and network operations.

There are now suspicions that the facility might be shared with North Korean backed hackers? An unnamed source from South Korea’s presidential office was quoted by the Yonhap news agency as saying the discovery of the IP address indicated Pyongyang was responsible for the attack on Wednesday. A previous attack on a South Korean newspaper that the government in Seoul traced back to North Korea also used a Chinese IP address :: Read the full article »»»»


APPLE HACKED

Posted: February 20th, 2013 | Author: | Filed under: Cult of Apple, Hack! | Tags: , , , , | Comments Off on APPLE HACKED

APPLE HACKEDThe consumer electronics and technology behemoth that is Apple, has confirmed that it’s the latest victim of a malicious hack attack.

However, the tech-giant says the invaders malware was repelled before any data was able to be plundered. Apple says a “small number” of its computer systems were infected, but they were isolated from it’s main network.

Apple is working with law enforcement to hunt down the hackers, who appear to be tied to a series of recent cyber attacks on US companies.

The malicious software, or malware, took advantage of a vulnerability in a Java program used as a “plug-in” for web-browsing programs :: Read the full article »»»»


Chinese Military Hack Attacks

Posted: February 19th, 2013 | Author: | Filed under: CHINA!, Hack! | Tags: , , , , , | Comments Off on Chinese Military Hack Attacks

CHINA HACKSComputer security experts from Mandiant say they believe a Chinese military unit is responsible for multiple hacking attacks against US companies.

The secretive security company has released a rare report that identifies ‘Unit 61398’ as the most likely source of attacks on at least 141 organisations, “across a diverse set of industries beginning as early as 2006”.

“The nature of ‘Unit 61398’s’ work is considered by China to be a state secret; however, we believe it engages in harmful ‘Computer Network Operations’,” Mandiant said in the report.

“It is time to acknowledge the threat is originating in China, and we wanted to do our part to arm and prepare security professionals to combat that threat effectively.”

The report says Unit 61398 is located in Shanghai’s Pudong district, China’s financial and banking hub, and staffed by perhaps thousands of people proficient in English as well as computer programming and network operations.

The unit had stolen “hundreds of terabytes of data”.

Clients including The New York Times have hired Mandiant to clean up their systems after cyberattacks :: Read the full article »»»»


Facebook Hacked

Posted: February 15th, 2013 | Author: | Filed under: CHINA!, Facebook, Hack! | Tags: , , , , | Comments Off on Facebook Hacked

FACEBOOKFacebook says its computer system has been targeted in a series of attacks by an unidentified hacker group, however, the social media behemoth has stressed they don’t believe there is any evidence that user data has been compromised.

The company says the malware came from the infected website from a mobile developer.

“Last month, Facebook security discovered that our systems had been targeted in a sophisticated attack,” the company said in a blog post.

“The attack occurred when a handful of employees visited a mobile developer website that was compromised. We remediated all infected machines, informed law enforcement, and began a significant investigation that continues to this day.”

The social network, which says it has more than 1 billion active users worldwide, said it was not the sole target. Facebook’s announcement follows recent cyber attacks on other prominent websites :: Read the full article »»»»


Hackers Release Yahoo User Info

Posted: July 13th, 2012 | Author: | Filed under: Hack! | Tags: , , , , | Comments Off on Hackers Release Yahoo User Info

Hackers Release Yahoo User InfoInternet company Yahoo! says it is investigating a breach of its system which may have exposed more than 400,000 user IDs and passwords.

The company says hackers have taken advantage of a security vulnerability in its computer systems and thousands of user names and passwords to access its own site and other companies have been stolen.

A US security firm says the hacking group D33D has claimed to be behind the attack and many of the personal details have been posted online.

Yahoo! says less than five per cent of the account data stolen have valid passwords.

The company has apologised for the breach and says it is fixing the defect, changing the passwords of affected users and notifying companies whose user accounts have been compromised :: Read the full article »»»»