Posted: April 24th, 2013 | Author: Michael Courtenay | Filed under: Hack!, UPDATED! | Tags: Anonymous, Hack, Hacked, Hacker, Hacking, LulzSec, Mathew Flannery, Standout | Comments Off on UPDATE! LulzSec Leader Arrested In Australia
The self-proclaimed leader of international hacking group Lulz Security has been arrested by AFP – Australian Federal Police – on the New South Wales central coast. The AFP says the 24-year-old man was arrested in the Gosford suburb of Point Clare yesterday.
He has been charged with two counts of unauthorised modification of data to cause impairment and one count of unauthorised access to a restricted computer system. The AFP says he claims to be in charge of Lulz Security, or LulzSec, which has previously claimed responsibility for high-profile hacking attacks, includinga DDS attack that took the CIA website offline, and a hack which caused some serious headaches for Sony Corp.
AFP is alleging that the 24 year old IT worker hacked an Australian Government website site last month, the man has been bailed to appear in court later this year.
In June last year the hack-group allegedly broke into Australian Government departments, universities and schools. Some of the targets included AusAid, Victorian Government departments and local councils in Victoria and New South Wales. The group bragged over the Aussie hack, saying in a Twitter post, “Releasing 62,000 possible account combinations is the loot for creative minds to scour; think of it like digging a very unique mineshaft.” At the time LulzSec claimed more than 5,000 people had downloaded the leaked files.
Passwords for email accounts within eight Australian universities were leaked, along with the log-ins for two high schools in Queensland and Melbourne. The 24-year-old man is the first alleged member of the group to be charged by the AFP UPDATED :: Read the full article »»»»
Posted: June 7th, 2012 | Author: Verity Penfold | Filed under: Hack! | Tags: Hack, Hacker, Linkedin, Password | Comments Off on Millions of Linkedin Passwords Hacked
That hub of corporate social networking, LinkedIn is investigating claims that over 6 million of its users’ passwords were leaked onto the internet. Linkedin, which has over 150 million users, is designed to allow professionals to share resume details and network with one like minded corporates.
Hackers have reportedly posted a file containing encrypted passwords onto a Russian web forum. The company has confirmed the leak and says it is currently looking into the reports.
Linkedin Statement: We want to provide you with an update on this morning’s reports of stolen passwords. We can confirm that some of the passwords that were compromised correspond to LinkedIn accounts. We are continuing to investigate this situation and here is what we are pursuing as far as next steps for the compromised accounts :: Read the full article »»»»
Posted: February 8th, 2012 | Author: The Technoid | Filed under: News From the web | Tags: Anonymous, Hack, Hacked, Hacker, Hackers, Indian Hackers, Norton Antivirus, Pastebin, Symantec, Twitter, UPDATED, Yama Tough | Comments Off on GAWKER: Anonymous Fundraising
In early January we reported: India has had some serious issues dealing with technology over the past decade, the country has gone from a potential tech behemoth to an open joke. An Indian hacking group, calling itself the Lords of Dharmaraja, has threatened to publicly disclose the source code on the internet. So far, there have been two claims related to Symantec’s source code. A document claiming to be confidential information related to Norton AntiVirus’s source code was posted on Pastebin. Symantec says it has investigated the claim, and rather than source code, most of the hackers booty seems to have been documentation dated April 1999, the documentation is related to an API – application programming interface – used by the product.
GAWKER is now reporting that, Anonymous Swears It Was Trying to Extort $50,000 from Antivirus Company for Charity. An Anonymous hacker tried to use stolen source codes to extort $50,000 from antivirus firm Symantec. Turned out it was a law enforcement sting. Now Anonymous is in spin mode, claiming the hacker was trying to raise money for poor kids in India.
The source code for some popular Symantec products, including pcAnywhere and Norton Antivrus, ended up in the hands of an Indian-based hacker named Yamatough, a member of the Anonymous-affiliated group the Lords of Dharamaja. This is a big deal, since the source code can give hackers a map to dangerous vulnerabilities.
Indian Hackers Set to Release Full Antivirus Code
Posted: January 6th, 2012 | Author: Marcus Dangerfield | Filed under: Technoid Computer News, UPDATED! | Tags: Hack, Hacked, Hacker, Hackers, Indian Hackers, Norton Antivirus, Pastebin, Symantec, Twitter, UPDATED, Yama Tough | Comments Off on UPDATED: Indian Hackers Set to Release Full Symantec-Norton Antivirus Code
India has had some serious issues dealing with technology over the past decade, the country has gone from a potential tech behemoth to an open joke. An Indian hacking group, calling itself the Lords of Dharmaraja, has threatened to publicly disclose the source code on the internet. So far, there have been two claims related to Symantec’s source code.
A document claiming to be confidential information related to Norton AntiVirus’s source code was posted on Pastebin. Symantec says it has investigated the claim, and rather than source code, most of the hackers booty seems to have been documentation dated April 1999, the documentation is related to an API – application programming interface – used by the product.
In a later posting to Pastebin, the hacking group shared what it said was source code. However, it seems the code is related to what appears to have been the 2006 version of Symantec’s Norton AntiVirus.
Almost as quickly as the Hackers post documents, accounts are closed, documents removed and the smoke and mirror game goes no-place. The hacking group claim that they are working on creating mirror sites for their content, though nothing of any real substance has come through.
The group are claiming that they have been “pressured and censored by US and Indian government agencies.” It’s important to underline that there is presently no reason to believe that Symantec’s own servers have been compromised in any way.
It appears that the data leak has occurred on Indian government servers, which are notoriously unsecured, the implication is that Symantec, and perhaps other software companies, may have been required to supply their source code to the Indian authorities. The source code the hackers have released is NOT relevant to ANY of Symantec’s current anti-virus products, the source code is 6 years old. This is very likely a case of over-excited Indian Hackers.
The serious question now is: Has Symantec misled the Indaina government by feeding it old, redundant code, or are Indian Hackers truly going the way of Indian call center operators? :: Read the full article »»»»
Posted: January 2nd, 2012 | Author: Marcus Dangerfield | Filed under: Apple, Cult of Apple, Hack!, Technoid Computer News, Technoid Gadget News | Tags: Accuvant Labs, apple, Charlie Miller, Cult of Apple, Hack, Hacker, NSA, Security Researcher, Technoid Computer News, Technoid Gadget News | Comments Off on Charlie Miller! iOS Developer Ditched By Apple
Famed tech security researcher and hacker – NSA, Accuvant Labs – Charlie Miller has been blacklisted by Apple after he discovered, reported and then opened-up a potential vulnerability within iOS apps.
Exploiting the flaw – later patched by Apple – Miller created an app that made it possible to steal data from, and take control of, other iOS devices.
Further, Miller managed to get the app through the stringent Apple approval process and had the app posted on Apples App Store for a short while. In 2008 Miller won a $10,000 cash prize at the hacker conference Pwn2Own for being the first hacker to find a critical bug in the MacBook Air.
The next year, he won $5,000 for cracking Safari. In 2009 he also demonstrated an SMS processing vulnerability that allowed for complete compromise of the Apple iPhone and denial-of-service attacks on other phones
:: Read the full article »»»»
Posted: October 25th, 2011 | Author: Verity Penfold | Filed under: Favorite New Thought, Hack!, Kiss My . . ., Open Source, Technoid Computer News, Verity Penfold | Tags: Anonymous, Anti-Child-Pornography, Child Pornography, Darknet, DMCA, Hack, Hacker, Hackers, Hacktivist, Hidden Service Protocol, Lolita City, Onion, Takedown, top-level domain, Tor Project, UTF-16 ASCII | Comments Off on Anonymous: Operation Darknet Takes Down Pedophile Site
Our least favorite rabble rousers, Anonymous, have finally done something with real meaning. The Hactivist group has taken – excuse the bad taste – back door into a Pedophile site, rumaged around and caused a little chaos. Yeehaa, you guys now rock our world! Lolita City, a child pornography site run on a hidden “darknet,” has been taken down by Anonymous members, and account details of 1,600 users from the site’s database were posted as evidence.
The takedown is part of Anonymous’ Operation Darknet, an anti-child-pornography effort aimed at thwarting child pornographers operating on on the Tor network. Anonymous’ attack was focused on a hosting service called Freedom Hosting, which the group claims was the largest host of child pornography on Tor’s anonymized network. Read the full article »»»»
Posted: October 12th, 2011 | Author: M.Aaron Silverman | Filed under: Gaming, Hack!, M.Aaron Silverman, Sony, Sony-Hack, Standout, Technoid Computer News | Tags: Gaming, Hack, Hacker, Hackers, Lulz Security, LulzSec, m.aaron.silverman, PSN, Sony, Sony-Hack, Standout, Technoid Computer News | Comments Off on An Important Message From Sony’s Chief Information Security Officer . . . . Oops!
Right about now, Sony has got to be wondering what the __ they did . . .
In another round of hack attempts, Sony has been forced to shut down almost 100,000 user accounts. The company said last night that it had shut down approximately 93,000 accounts on its online gaming and entertainment networks after detecting a mass, attempted sign-in by a third party using stolen IDs and passwords. Read the full article »»»»