Snowden may have some clarifying to do after reports that Russia and China accessed NSA files
The Sunday Times reports that Russia and China de-encrypted files stolen by the former NSA contractor Edward Snowden, forcing the UK intelligence service MI6 to pull officers out of live operations in hostile countries. “Western intelligence agencies say they have been forced into the rescue operations after Moscow gained access to more than [1 million] […] more…Twitter CEO Dick Costolo to resign, 140-character limit lifted for direct messages
The company announced (PDF link) to investors that Costolo will step down effective July 1, with co-founder and chairman Jack Dorsey to serve as interim CEO while Twitter’s board searches for a suitable replacement. Tags: Twitter Industry News more…The Mystery of Duqu 2.0: a sophisticated cyberespionage actor returns
Duqu 2.0 Technical Paper (PDF) can be found here Indicators of Compromise (IOC) can be found here Earlier this year, during a security sweep, Kaspersky Lab detected a cyber-intrusion affecting several of our internal systems. Following this finding, we launched a large scale investigation, which led to the discovery of a new malware platform from […] more…Hacking the brain: How technology is curing mental illness
Our perception of the mind changes as our technology evolves. With the whirring gears of the Enlightenment came the metaphor of the mind as a ticking clock. The steam engines and hydraulics of the industrial revolution influenced the drives and impulses of Freudian psychoanalysis. The signals of the telegraph network provided a basis for early […] more…AMD takes aim at the notebook market with new 12-core processors
Announced Wednesday at Computex, AMD’s latest A-Series processors will come in 3 flavors and are designed for serious online streaming and gaming. The 3 variants come packing discrete graphics cores in the form of a Radeon R6 or R7 for better visual performance, and the chips in range will have a total number of either […] more…Nokia Rolls Out Cloud Hardware Platform for Telcos
Nokia Networks officials are continuing their efforts to better compete with larger rivals like Ericsson and Huawei Technologies in the rapidly evolving telecommunications space. Nokia in April announced plans to buy Alcatel-Lucent for $16.6 billion, a move that will give it greater scale against larger vendors and expand its capabilities in network-functions virtualization (NFV), a […] more…HITB Haxpo Kicks Off With Richard Thieme’s Call To InfoSec Community To ‘Think Beyond The Edges’
“Think beyond the edges, because the edges are where new things come,” urged Richard Theime in the opening keynote for Hat In The Box Haxpo in Amsterdam. The former priest gone author and futuristic technology guru is well known within the InfoSec community and considered a “father figure” of the hacking convention circuit, keynoting at […] more…Hacking With Pictures; New Stegosploit Tool Hides Malware Inside Internet Images For Instant Drive-by Pwning
Go online for five minutes. Visit a few webpages. How many pictures do you see? With the media rich nature of the web, chances are your answer is in the hundreds. It is in this space the future of malicious cyber attacks could be embedded. In a presentation at Hack In The Box in Amsterdam, […] more…Bay Area woman accidentally junks $200,000 Apple-1 computer
Have you ever thrown away something you regretted later on? If so, you have something in common with the San Francisco Bay Area woman who recently junked a vintage Apple-1 computer — one of just 200 surviving machines created by Steve Jobs and the Woz way back in 1976. Fortunately the ultra-rare desktop was recognized […] more…Tor connections to hidden services could be easy to de-anonymize
Identifying users who access Tor hidden services—websites that are only accessible inside the Tor anonymity network—is easier than de-anonymizing users who use Tor to access regular Internet websites. Security researchers Filipo Valsorda and George Tankersley showed Friday at the Hack in the Box security conference in Amsterdam why Tor connections to hidden services are more […] more…DNS Changer Malware Sets Sights on Home Routers
Home routers can be used to steal user credentials, and most people just don’t know it yet. Bad guys have found ways to use Domain Name System (DNS) changer malware to turn the most inconspicuous network router into a vital tool for their schemes. Attacks that use DNS changer malware aren’t new, but this is […] more…What enterprises should do when helpless employees lose hope in fighting cyber attacks
Hit too many times with successful attacks and compromises, an enterprise’s human resources can develop a victim mentality, a.k.a. learned helplessness. When this happens, employees who feel they are helpless to do anything effective to fight cyber attacks lose hope. To support an empowered and resilient team, test and prove the theory that when basic […] more…Egor Homakov exploits bug in Starbucks gift cards gets rebuke, not love
A security researcher said he found a way to game Starbucks gift cards to generate unlimited amounts of money on them. Both he and the coffee chain are grumbling after he used a fraudulent card to make a purchase, then repaid the amount and reported the vulnerability. Tags: Security more…‘90s-style security flaw puts “millions” of routers at risk
As companies continue to beat the Internet of Things drum, promoting a world when every device is smart, and anything electronic is network connected, we have some news that shows just what a horrible idea this really is. A security firm has found that a Linux kernel driver called NetUSB contains an amateurish error that […] more…Toyota Prius batteries being targeted by car thieves
First the thieves came for the car radios, and I did not speak out. Then it was airbags. And now, according to Toyota dealers, battery packs are increasingly becoming the target of smash-and-grab thieves. The Toyota Prius, as you may know, is a hybrid—it has a small 1.5- or 1.8-litre engine, along with an electric […] more…Hacking Airplanes: No One Benefits When Lives Are Risked To Prove A Point
There are a lot of things Denver is known for being high on — mostly altitude. Lately, it isn’t just the sticky green political battle that has been gaining attention. It’s the high-altitude antics of our local information security enthusiast Chris Roberts. But, like most highs and hacked aviation systems, this story is bound to […] more…More information
- New Ransomware Group Claims Attack on US Telecom Firm WideOpenWest
- File-Sharing Site Was A Year-Long Pirate Honeypot
- After seven years, exactly one person gets off the gov’t no-fly list
- ZDI Announces Rules and Prizes for Pwn2Own 2022
- Targeted attacks against aerospace industry use Sykipot malware
- Politics bog down US response to election hacks
- Splunk Patches Information Theft and XSS Flaws
- A Year of Spam: The Notable Trends of 2013
- Why Tim Cook is concerned about coding skills
- HELP – My Child is an Online Bully…