Level Nine Sports, where families ski and ride...
 
The Kernel

 advertise with indeep media

Australia Passes Contentious Data Retention Laws

Posted: March 25th, 2015 | Author: | Filed under: ONLINE SECURITY, Standout, UPDATED! | Tags: , , , , , , , , , , , , , , , , , | Comments Off on Australia Passes Contentious Data Retention Laws

Australia Passes Data Retention Laws

Australia’s Federal Parliament has passed it’s controversial data retention laws, with both major political parties voting in the legislation. The new laws will force telcos to keep records of phone and internet use for two years and allow security agencies access the records.

Telcos already retain the data, however at varying durations in an unregulated environment. Australia’s Attorney-General Senator George Brandis says the legislation – which passed through the senate with 43 votes to 16 – will strike the right balance.

The cost of retaining the information is set to be partly covered by the taxpayer in what the Government described as a “significant” contribution. There are concerns telecommunications companies will pass on the rest of the cost to consumers :: Read the full article »»»»


Tech Giants Scramble to Fix ‘Freak’

Posted: March 9th, 2015 | Author: | Filed under: Hack!, ONLINE SECURITY, Technoid Internet Security | Tags: , , , , | Comments Off on Tech Giants Scramble to Fix ‘Freak’

Get Your Freak OnAs Google, Apple and Microsoft scramble to patch a long missed security flaw it might be timely to remember how we got here. Way back at the latter end of the last century – the 1990s, when Netscape browser was all the rage and – SSL (Secure Socket Layer) encryption was brand-spanking-new, the U.S. government wanted control over export of “weapons grade” encryption.

Its theory was that domestic communications could benefit from stronger, 128-bit encryption, but ‘backdoors’ should be available to U.S. intelligence and law enforcement when it came to foreign communications, the concept of weaker, “export grade” encryption was born.

Turns out that this theory and it’s legacy backdoor, a vulnerability that we’ve come to know in recent days as ‘FREAK’ still exists in up to 30 percent of U.S. web servers. It’s a sad example of how zombie-security from the era that gave us grunge can come back and bite us on the posterior.

Meanwhile, Apple and Google are saying they’ve developed fixes/patches – though we note Apple has yet to deploy –  to mitigate the ‘Freak’ security flaw. Initially thought to be immune, Microsoft released an advisory which warned hundreds of millions of Windows PC users are also vulnerable to the security vulnerability :: Read the full article »»»»


Telstra Warns Data Storage Plan Will Attract Hackers

Posted: February 6th, 2015 | Author: | Filed under: Hack!, ONLINE SECURITY, Technoid Computer News, Technoid Internet Security | Tags: , , , , , , , , , , , | Comments Off on Telstra Warns Data Storage Plan Will Attract Hackers

Telstra Warns Data Storage Plan Will Attract HackersAustralia’s biggest telco, Telstra, has sounded a warning about the Government’s mandatory metadata retention scheme.

Telstra said an unintended consequence of the plan would be the creation of many highly attractive targets for hackers.

The Federal Government has cited national security as one of the reasons for its plan to force telcos and internet companies to store customer metadata for two years.

A parliamentary committee investigating the bills also heard concerns from Australia’s intelligence agency watchdog that ASIO could keep metadata indefinitely.

Under the metadata retention scheme, Telstra, and all other national telcos and internet companies, would be forced to store customer metadata for two years.

Telstra said the data would be kept in a database, ready to be given to law enforcement on request :: Read the full article »»»»


Targets Pickled Russian Potato

Posted: January 23rd, 2014 | Author: | Filed under: CRIME!, Hack! | Tags: , , , , , , , , | Comments Off on Targets Pickled Russian Potato

Targets Pickled Russian PotatoThe virus that was used to steal 40 million people’s credit-card details from giant American retailer Target was, it was recently revealed, called ‘Kaptoxa’ which, as English-language news outlets are helpfully explaining, is Russian slang for “potato.”

The hack is likely to affect more than 110 million credit card users in the US.

And as banks and retailers point fingers – mostly at one-another – speculation over who was behind the Target hack goes on, doubtless it was the work of a very sophisticated crime ring – бушель большевистских картофеля – A Bushel of Bolshoviks!?

The breach was clearly a real black eye for the retailer, the aftermath is however getting much, much darker.

How hackers broke into Target and installed malware on point-of-sale – POS – terminals, then harvested some 40 million card details is still sketchy, what is more more interesting is that almost all-trace of the hack is very quickly being erased, redacted, not by hackers, but by security companies linked to the breach.

At least three security companies so far have scrubbed information related to Target from the internet, highlighting a serious sensitivity to one of the largest ever data breaches :: Read the full article »»»»


UPDATE! LulzSec Leader Arrested In Australia

Posted: April 24th, 2013 | Author: | Filed under: Hack!, UPDATED! | Tags: , , , , , , , | Comments Off on UPDATE! LulzSec Leader Arrested In Australia

STANDOUT! LulzSec Leader Arrested in AustraliaThe self-proclaimed leader of international hacking group Lulz Security has been arrested by AFP – Australian Federal Police – on the New South Wales central coast. The AFP says the 24-year-old man was arrested in the Gosford suburb of Point Clare yesterday.

He has been charged with two counts of unauthorised modification of data to cause impairment and one count of unauthorised access to a restricted computer system. The AFP says he claims to be in charge of Lulz Security, or LulzSec, which has previously claimed responsibility for high-profile hacking attacks, includinga DDS attack that took the CIA website offline, and a hack which caused some serious headaches for Sony Corp.

AFP is alleging that the 24 year old IT worker hacked an Australian Government website site last month, the man has been bailed to appear in court later this year.

In June last year the hack-group allegedly broke into Australian Government departments, universities and schools. Some of the targets included AusAid, Victorian Government departments and local councils in Victoria and New South Wales. The group bragged over the Aussie hack, saying in a Twitter post,  “Releasing 62,000 possible account combinations is the loot for creative minds to scour; think of it like digging a very unique mineshaft.” At the time LulzSec claimed more than 5,000 people had downloaded the leaked files.

Passwords for email accounts within eight Australian universities were leaked, along with the log-ins for two high schools in Queensland and Melbourne. The 24-year-old man is the first alleged member of the group to be charged by the AFP UPDATED :: Read the full article »»»»


UPDATE! Chinese Military Hack Attacks Might Originate in NORTH KOREAN

Posted: March 21st, 2013 | Author: | Filed under: Hack!, UPDATED! | Tags: , , , , , , , , , | Comments Off on UPDATE! Chinese Military Hack Attacks Might Originate in NORTH KOREAN

CHINA HACKSLast month we reported that security experts from Mandiant believed a Chinese military unit was responsible for multiple hack attacks on US companies. Mandiant released a report that identified ‘Unit 61398’ as the most likely source of attacks on at least US 141 organisations, “across a diverse set of industries beginning as early as 2006”.

“The nature of ‘Unit 61398’s’ work is considered by China to be a state secret; however, we believe it engages in harmful ‘Computer Network Operations’,” Mandiant said in the report. “It is time to acknowledge the threat is originating in China, and we wanted to do our part to arm and prepare security professionals to combat that threat effectively.”

The Mandiant report said that Unit 61398 is located in Shanghai’s Pudong district, China’s financial and banking hub, and staffed by perhaps thousands of people proficient in English as well as computer programming and network operations.

There are now suspicions that the facility might be shared with North Korean backed hackers? An unnamed source from South Korea’s presidential office was quoted by the Yonhap news agency as saying the discovery of the IP address indicated Pyongyang was responsible for the attack on Wednesday. A previous attack on a South Korean newspaper that the government in Seoul traced back to North Korea also used a Chinese IP address :: Read the full article »»»»


APPLE HACKED

Posted: February 20th, 2013 | Author: | Filed under: Cult of Apple, Hack! | Tags: , , , , | Comments Off on APPLE HACKED

APPLE HACKEDThe consumer electronics and technology behemoth that is Apple, has confirmed that it’s the latest victim of a malicious hack attack.

However, the tech-giant says the invaders malware was repelled before any data was able to be plundered. Apple says a “small number” of its computer systems were infected, but they were isolated from it’s main network.

Apple is working with law enforcement to hunt down the hackers, who appear to be tied to a series of recent cyber attacks on US companies.

The malicious software, or malware, took advantage of a vulnerability in a Java program used as a “plug-in” for web-browsing programs :: Read the full article »»»»