Tags hacked

Hundreds of Twitter Accounts Hacked with Swastikas Through Third Party App ‘Twitter Counter’

A number of Twitter accounts, including major brands and institutions are getting hijacked right now. Everyone from Duke University to major fast food outlets to Nike Spain are getting hacked with a swastika and a reference to April 16th, a date when a referendum will be held in Turkey to give President Erdogan more…

Read more...

Comments Off on Hundreds of Twitter Accounts Hacked with Swastikas Through Third Party App ‘Twitter Counter’

Photo

Matt Novak

March 15th

Uncategorized

Hundreds of Twitter Accounts Hacked with Swastikas Through Third Party App ‘Twitter Counter’

A number of Twitter accounts, including major brands and institutions are getting hijacked right now. Everyone from Duke University to major fast food outlets to Nike Spain are getting hacked with a swastika and a reference to April 16th, a date when a referendum will be held in Turkey to give President Erdogan more…

Read more...

Comments Off on Hundreds of Twitter Accounts Hacked with Swastikas Through Third Party App ‘Twitter Counter’

Photo

Matt Novak

March 15th

Uncategorized

How I knew Yahoo had been hacked before Yahoo did

yahoo mail hacked

So, Yahoo got hacked again. It's a new, bigger breach than the one Yahoo most recently admitted to, and over a billion user accounts have been compromised. Yahoo's complete lack of adequate security — and the company's habit of keeping these things quiet for literally years after they've happened — is a bit of a running joke in the tech community. For a Yahoo user, though, it's really no laughing matter.

I have a confession: I knew Yahoo had been hacked, again. In fact, I knew of Yahoo's re-hacking back in September. For those of us that still use Yahoo services for any reason — I use it strictly for account sign-ups that I don't give a damn about — knowing that Yahoo suffered another massive breach didn't take any detective work; we simply had to look at our email.

Continue reading...

Trending right now:

  1. The Galaxy S8 should beat the iPhone 7 with one brand-new feature
  2. Shots fired: T-Mobile will give switchers a year of AT&T’s DirecTV Now service for free
  3. NES Classic Edition back in stock on Amazon for five more cities

Comments Off on How I knew Yahoo had been hacked before Yahoo did

Photo

Mike Wehner

December 15th

Uncategorized

It Has Been Zero Days Since the US Government Was Last Hacked

Same as it ever was. [August 6, 2015]

Read more...











Comments Off on It Has Been Zero Days Since the US Government Was Last Hacked

Photo

Matt Novak on Paleofuture, shared by Alissa Walker to Gizmodo

August 6th

Uncategorized

Delta’s Facebook Page Just Wants To Talk About Bl0wjobs Right Now

Delta, Delta, Delta. The Jan Brady of airlines has fucked up again. Someone has hacked Delta's Facebook page and is posting about blowjobs and worms. (No word yet on whether the hacker is a group of 13-year-old boys at a sleepover.)

Read more...








Comments Off on Delta’s Facebook Page Just Wants To Talk About Bl0wjobs Right Now

Photo

Kate Knibbs

February 10th

Uncategorized

iPhone 5s, Samsung Galaxy S5 and Nexus 5 hacked at Pwn2Own

A man holds a new Apple iPhone 5S next to his iPhone 5 at an Apple Store at Tokyo's Ginza shopping district

HP’s annual two-day Mobile Pwn2Own competition came to a close this afternoon, with a group of veteran security researchers and other competitors able to compromise several flagship smartphones across the top-three mobile operating systems: iOS, Android and Windows Phone. The devices that were exploited include the iPhone 5s, Samsung Galaxy S5, Nexus 5, Amazon Fire Phone and Nokia Lumia 1520.

The first day of the competition was highly successful, with five teams, five targeted devices and five successful attempts. A total of nine bugs were discovered and immediately disclosed to and confirmed by the Zero Day Initiative, in order for smartphone vendors to patch their mobile operating systems to close vulnerabilities that allow for things like the iOS 8 untethered jailbreak Pangu and malware attacks.

A team of South Korean competition veterans were able to come across a two-bug combination in iOS that compromised the iPhone 5s through the Safari browser. One of the bugs was able to execute a full Safari sandbox escape, making it possible for the security researchers to gain full control of the system. The security flaw was immediately disclosed to Apple by the Zero Day Initiative.

HP Pwn2Own 2014

The second contest involved two successful attempts against compromising the Samsung Galaxy S5. The first vulnerability, which “used NFC as a vector trigger a deserialization issue in certain code specific to Samsung,” was discovered by Japan’s team MSBD on day one of the competition. Jon Butler of South Africa’s MWR InfoSecurity also hacked the Samsung Galaxy S5 with an NFC focus.

Later during the first day of competition, Adam Laurie from UK’s Aperture Labs stepped up his game with a two-bug exploit for the Nexus 5 that involves NFC capabilities. The security bug demonstrated a way for the Nexus 5 to force Bluetooth pairings between two smartphones, presenting a myriad of privacy and security issues if one of the users is a malicious attacker.

The first day was rounded off with a three-bug exploit targeting the Amazon Fire Phone’s web browser by the three-man MWR InfoSecurity team of Kyle Riley, Bernard Wagner, and Tyrone Erasmus. Amazon’s Fire Phone is based on the proprietary Fire OS operating system that is distributed as a fork of Android 4.2.2 Jelly Bean.

The second day of competition was not as successful, given that competitors were only able to obtain partial attacks on the Android and Windows Phone platforms. Competitor Nico Joly tackled the Lumia 1520 with an exploit aimed at the smartphone’s web browser, but was only able to exfiltrate the cookie database and could not break the sandbox to gain full access to the system.

Meanwhile, the final competitor of the second day and event altogether, Pwn2Own veteran Jüri Aedla, was able to present an exploit that involved utilizing Wi-Fi on his Nexus 5 running Android. As with Joly before him, however, Aedla was unable to elevate his system privileges higher than their original level. Afterwards, the event officially came to a close.

Mobile Pwn2Own is a recurring event that resumes at CanSecWest next spring.


Filed under: iOS Devices Tagged: Amazon Fire Phone, Android, competition, hacked, HP, iOS, iPhone 5s, mobile, Nexus 5, Pwn2Own, Samsung GALAXY S5, Windows Phone

Visit 9to5Mac to find more special coverage of iOS Devices, iOS, and Android.

What do you think? Discuss "iPhone 5s, Samsung Galaxy S5 and Nexus 5 hacked at Pwn2Own" with our community.

Comments Off on iPhone 5s, Samsung Galaxy S5 and Nexus 5 hacked at Pwn2Own

Photo

Joe Rossignol

November 14th

Apple

Mac

Mobile

Developer claims Apple is throttling iPhone/iPad data speeds on AT&T, Sprint, & Verizon (but not T-Mobile), posts fixes

test-drive-t-mobile

Joseph Brown, the developer behind the hacked carrier updates floating around for AT&T, Sprint, Verizon, and T-Mobile, just posted a lengthy blog post detailing how he claims “Apple limits devices to even out” the networks of its carrier partners. Specifically, Brown says that Apple is limiting the iPhone 5 to Category 10 (14.4Mbps) HSDPA despite the device’s support for category 24 (42.2Mbps) DC-HSDPA+ and the AT&T network supporting up to Category 14 (21.1Mbps) HSDPA+:

Here we can see what is quite obvious to, really, anyone at this point from being jerked around so much by carriers. Yes folks, this is throttling coding. When we made the AT&T Hacked Carrier Update, this was the first line of coding to be scrapped when the project started. Immediately, through my testing on an AT&T iPhone 5 and iPad 4th generation, there were significant and noticeable results. There is no argueing or disputing that this is clear evidence you are purposely, 24/7, being throttled, even if you haven’t used more data than your authorized to use or that you’ve purchased with your hard earned money. AT&T users, do you think this is fair?

The theory is that Apple limits the capabilities of the device in order to combat the large amount of data/bandwidth iOS device users consume and ease congestion on carrier networks. Brown found signs of throttling data speeds for Verizon and Sprint too. The only carrier that is apparently not limiting the iPhone 5′s capabilities is T-Mobile.

Brown also says “Apple has band preferences set for T-Mobile and AT&T causing signal issues” that could be easily fixed.

Here’s what Brown found in his analysis of the other carriers:

-AT&T limits HSPA+ and permanently throttles LTE (unless hack is applied)

-Verizon permanently throttles LTE (unless hack is applied)

-Verizon and Sprint throttle down 3G (unless hack is applied)

-Apple has band preferences set for T-Mobile and AT&T causing signal issues (very much fixable by Apple and the carrier and is currently being looked into, from I’ve been told)

(via iClarified)


Comments Off on Developer claims Apple is throttling iPhone/iPad data speeds on AT&T, Sprint, & Verizon (but not T-Mobile), posts fixes

Photo

Jordan Kahn

June 5th

Apple

Mac

Snooki’s Cellphone Gets Hacked, Naked Pictures Get Leaked, Eyeballs Get Hurt [Nsfw]

Someone has allegedly hacked into the cellphone of the beautiful Snooki, the elegant lady who is the beacon of good taste and faithful love in a show called Jersey Shore, the epitome of modern American values. Surprisingly enough, the hacker found naked pictures of her, which obviously were taken by coercion. More »


Comments Off on Snooki’s Cellphone Gets Hacked, Naked Pictures Get Leaked, Eyeballs Get Hurt [Nsfw]

Photo

Jesus Diaz

June 10th

Uncategorized

‘Anonymous’ hacker group releases its own desktop OS [updated]

Notorious hacker group “Anonymous Operations” on Wednesday released the first version of its own desktop operating system. Dubbed Anonymous-OS, the computer platform is built on top of the open-source Linux-based Ubuntu 11.10 operating system, and it also utilizes the open-source Mate desktop environment, The Hacker News reports. It is unclear exactly who is behind the operating system, which comes with a number of tools pre-installed that are apparently Anonymous-approved. Included are Anonymous HOIC, John the Ripper, SQL Poison and more. Version 0.1 of the hacker group’s Anonymous-OS is free and available immediately for download, though readers should obviously exercise caution.

UPDATE: The Anonymous-OS Tumblr blog states that the group’s operating system is “created for educational purposes, to checking the security of web pages,” and the page suggests that users should not “use any tool to destroy any web page.”

UPDATE 2: Anonymous says this OS is fake, not affiliated with their group, and packed with malware.

[Via The Hacker News]

Read

Comments Off on ‘Anonymous’ hacker group releases its own desktop OS [updated]

Photo

Zach Epstein

March 14th

Uncategorized

Hackers tried to extort $50,000 from Symantec after stealing source code

A group of hackers demanded that Symantec pay $50,000 to prevent it from releasing stolen source code for several of the firm’s software titles. Symantec reportedly confirmed that it was cooperating with a sting operation while communicating via email with a group of hackers claiming ties to notorious hacktivist group “Anonymous.” Those ties have not been confirmed. The email conversation was posted to Pastebin on Monday, and a Symantec representative confirmed to CNET that the emails were authentic. Read on for more.

A person identifying him or herself as Yamatough contacted Symantec in January and claimed to be in possession of the company’s proprietary source code for its Norton Antivirus and PCAnywhere software. The hacker provided code samples to prove possession of the code in question, and then demanded a payment of $50,000 to prevent the release of Symantec’s code. Conflicting reports suggest Symantec’s initial actions were not part of a sting, however, and the firm attempted to offer a bribe to the hackers in order to prevent them from releasing the company’s source code.

“In January an individual claiming to be part of the ‘Anonymous’ group attempted to extort a payment from Symantec in exchange for not publicly posting stolen Symantec source code they claimed to have in their possession,” a Symantec spokesperson told CNET in a statement. “Symantec conducted an internal investigation into this incident and also contacted law enforcement given the attempted extortion and apparent theft of intellectual property. The communications with the person(s) attempting to extort the payment from Symantec were part of the law enforcement investigation. Given that the investigation is still ongoing, we are not going to disclose the law enforcement agencies involved and have no additional information to provide.”

Negotiations between Symantec and the hacker reportedly broke down however, culminating with an email on Monday that threatened to release the company’s source code if Symantec didn’t deliver funds within 10 minutes. ”Since no code yet being released and our email communication wasnt also released we give you 10 minutes to decide which way you go,” Yamatough wrote. ”After that two of your codes fly to the moon PCAnywhere and Norton Antivirus totaling 2350MB in size (rar) 10 minutes if no reply from you we consider it a START this time we’ve made mirrors so it will be hard for you to get rid of it.”

The Symatec employee who had been the point of contact with the hacker made an attempt to delay the code’s release, replying with, “We can’t make a decision in ten minutes. We need more time.” Yamatough was apparently unwilling to afford the company more time, however, as a 1.2GB file titled ”Symantec’s pcAnywhere Leaked Source Code” was posted to the Pirate Bay Monday evening. Symantec has not yet confirmed whether or not the code within the file is authentic.

Read

Comments Off on Hackers tried to extort $50,000 from Symantec after stealing source code

Photo

Zach Epstein

February 7th

Uncategorized
line
September 2017
M T W T F S S
« Aug    
 123
45678910
11121314151617
18192021222324
252627282930