The Channel logo

Articles about Hacking

European Union Flag

European Parliament reports HACK ATTACK, turns off public Wi-Fi

The European Parliament has disabled its public Wi-Fi network following the detection of a suspected hacking attack which has been linked to the exposure of weak security practices at the institution by a French media outlet. The private network of the European institution is thought to be secure but techies are advising users …
John Leyden, 26 Nov 2013

Enterprise giant SAP's systems take a probe to the wobbly bits - report

At least 3,000 SAP systems are directly exposed to the internet, providing direct access to core corporate systems for potential attackers, according to a penetration-testing firm. Rapid7, the firm behind the Metasploit penetration-testing tool, carried out the scanning exercise in the wake of the discovery of a banking Trojan …
John Leyden, 13 Nov 2013
Parliament in the clouds

Crack CERT warriors arrive to save UK from grid-crippling hack attacks

The UK is finally getting a national Computer Emergency Response Team (CERT), with the delayed launch of the organisation taking place today. CERT-UK, a key component of the government's £650m National Cyber Security Strategy, will co-ordinate responses to hacking and malware-based cyber attacks on a national level. The …
John Leyden, 31 Mar 2014
The Four Horsemen Apocalypse ride up the grassy mound that adorns the WinXP desktop

Win XP usage down but not out as support cutoff deadline looms

Windows XP usage on the web is decreasing as the venerable operating system edges ever closer towards its "end of life" from Microsoft support next week. Data from cloud security firm's Qualys QualysGuard shows that the percentage of XP on machines decreased from 35 per cent as of January 2013 to 14 per cent in February 2014. …
John Leyden, 04 Apr 2014

So many 'cyberspying hackers' about... and most of you are garbage

Cyber-espionage groups are too numerous to count and are often far less skilled than their reputation suggests, according to threat-trackers. Costin Raiu, director of global research at Kaspersky Lab, estimated that anything between 100 to 200 hacking crews operate in China alone. Despite the hype abut zero-day attacks, many …
John Leyden, 30 Oct 2013

Microsoft hands Neath keys to OEM kingdom

Microsoft has filled the Gary Fowle-shaped gap at the top of its local OEM business, with Darren Neath stepping into the breach. Fowle resigned as senior OEM director at Microsoft UK in May and is heading to the vendor's Singapore operation to take on the same job. "Darren Neath, formerly director of our multi-national accounts …
Paul Kunert, 23 Jul 2013
Strawberries suitable for growing in space. Credit: Purdue University

Give young infosec boffins more cash or BAD THINGS will happen – RSA boff

Declining support for young science and technology researchers from the US government could hurt technology innovation in the long term, a top computer scientist has warned. Robert Griffin, chief security architect at information security biz RSA, said complaints about funding featured in all three pairs of Nobel Prize …
John Leyden, 31 Oct 2013
Disney's Beagle Boys

Three million Adobe accounts hacked? Sorry, make that 38 MILLION

Remember that Adobe security breach earlier this month that leaked the account records of some 3 million customers? Scratch that: the actual number hacked was at least 38 million, it has emerged. In early October, Adobe warned of "sophisticated attacks" on its network in which hackers gained access to data for what was then …
Neil McAllister, 30 Oct 2013
Compared to a normal bulb

It's the Inter-THREAT of THINGS: Lightbulb ARMY could turn on HUMANITY

Fujitsu’s CTO has sketched a nightmare vision of lightbulbs turning on their human masters in massive denial of service attacks if industry doesn’t get a grip on the security of the “internet of things”. And even if they don’t get that incandescent, the much vaunted internet-connected lightbulb leaves users open to having their …
Joe Fay, 06 Nov 2013
Video camera

Anonymity is the enemy of privacy, says RSA grand fromage

A dogmatic allegiance to anonymity is threatening privacy, according to Art Coviello, executive chairman of RSA. Coviello cast anonymity as the "enemy of privacy" because it gives "free reign to our networks to adversaries" with "no risk of discovery or prosecution." The head of EMC's security division told delegates at the RSA …
John Leyden, 29 Oct 2013
triangular warning sign featuring exclamation mark

Hackers hijack hacking tools website

Crackers briefly hijacked hacking tools website Metasploit on Monday. Metasploit is an open-source toolkit widely used by both hackers and security admins to test for website vulnerabilities. But visitors to the site on Monday were redirected to a page announcing the site was "hacked by sunwear ! just for fun", as recorded by …
John Leyden, 03 Jun 2008
chart

Phishers automate attacks using 'Google hacking'

Three in four phishing sites are hosted on compromised servers, according to a new survey. A study of 2,486 fraudulent websites found that 76 per cent were housed on hacked webservers, typically pwned after hackers identified well-known vulnerabilities using search engine queries. Free web hosting for fraudulent websites was …
John Leyden, 02 Mar 2009
Sign outside the National Security Agency HQ

Europe, SAVE US! Patriot Act author begs for help to curb NSA spying

US House Representative Jim Sensenbrenner, the lead author of controversial anti-terror law the Patriot Act, has asked the European Parliament for help in taming the NSA. He also called for Europe to put pressure on the US to change its legislation and bring a halt to the spy agency's planet-wide communications data-slurping …
Iain Thomson, 13 Nov 2013

8 in 10 small UK firms hacked last year - at £65k a pop: Report

Over 80 per cent of small businesses in the UK suffered a computer security breach last year, according to new government research. And the proportion of large firms that reported attacks has reached a whopping 93 per cent. The Department for Business, Innovation and Skills' 2013 hacking survey found that 87 per cent of small …
John Leyden, 23 Apr 2013
channel

cDc automates Google Hacking

Infamous hacking group the Cult of the Dead Cow (cDc) has published a tool that searches for vulnerabilities and private data using carefully-selected Google search queries. The process of so-called Google hacking is already well known, largely due to the efforts of Johnny "I Hack Stuff" Long, whose presentation on the subject …
John Leyden, 22 Feb 2008
channel

Sacked IT admin sentenced for hacking ex-employer

A British IT admin was ordered to pay more than £3,000 and given a three-months jail sentence after being accused of hacking into his former employer's computer system so he could install spyware and delete emails. Julius Oladiran, 46, of South Norwood, admitted making a false statement and gaining unauthorized access to …
Dan Goodin, 07 Jan 2009

IE 0-day plugged up but TIFF terror continues in November Patch Tuesday

November's edition of Patch Tuesday brought relief from an IE zero-day exploit but a TIFF image-handling vulnerability under active attack from hackers remains unpatched. Microsoft released a total of five bulletins, three of which are marked up as critical and five of which are designated as important. The patch batch …
John Leyden, 13 Nov 2013

Tech bazaar Aria puts £10K bounty on heads of DDoS varmints

Manchester-based reseller Aria PC is offering a £10,000 bounty for information leading to the conviction of miscreants who hit its websites with a sustained denial-of-service attack this week. In a forum post, Aria said it had already reported packet-flooding assaults against its main site and forum to the police, but wanted to …
John Leyden, 01 Mar 2013
Myspace logo

MySpace celebrity hacker downs hacking forum

A wannabe hacker succeeded only in getting a forum for a group he wanted to join taken down after hacking celebrity MySpace profiles. Tesla defaced the MySpace profiles of singers Tila Tequila and Justin Timberlake as well as actress Hilary Duff to post greetings to the Kryogenics crew. Aside from the greeting nothing malicious …
John Leyden, 07 Dec 2007
Handcuffs

Nanny agency hacking suspect cuffed

Scotland Yard arrested a nanny agency worker over suspected hacking offences on Monday. The unnamed woman allegedly rifled through emails in AOL accounts maintained by her former employer, Nannies Incorporated, while working for a competitor agency. The woman was arrested following an investigation by officers at the Specialist …
John Leyden, 09 Oct 2007
axe_channel_teaser

SACK MORE BRITS, Symantec UK told by US supremos - sources

Symantec UK bosses must redraft their master plan to layoff Brit workers - after their first proposal was rejected by the US top brass for not cutting far enough, sources claim. As we reported a week ago, up to 1,700 employees worldwide - eight per cent of the total workforce - are expected to get the chop during June and July …
Paul Kunert, 21 Jun 2013

PEAK APPLE: iPad market share hits the skids

The seemingly impenetrable wall of iPads that Apple CEO Steve Jobs erected around the slablet market is being turned to a pile of fruity mush under the rule of his successor Tim Cook. At least, that is, according to global sales figures for Q2 from Strategy Analytics, which showed Apple's market share fell to 28.3 per cent - …
Paul Kunert, 30 Jul 2013
Handcuffs

French police bust 22 youths in alleged hacking network

Police in Dijon, France have detained 22 youths suspected of being members of a domestic network of hackers. According to the French daily Le Monde, sixteen of the alleged hackers are minors, and at least one is reported to be 14 years-old. The oldest detained was 25 years-old. They were apprehended yesterday near Paris and …
Austin Modine, 29 May 2008
fbl4s

Inside Facebook's engineering labs: Hardware heaven, HP hell – PICTURES

Facebook's hardware development lab is either a paradise, a business opportunity, or a hell, depending on your viewpoint. If you're a hardware nerd who loves fiddling with data centre gear, ripping out extraneous fluff, and generally cutting the cost of your infrastructure, then the lab is a wonderful place where your dreams are …
Jack Clark, 05 Mar 2014
Handcuffs

Baby held in Indian jail alongside hacking suspect mum

A seven-month-old child has been held in prison alongside his hacker parents in India. P A Aryan is being held in detention at Puzhal central prison along with his mother, 25 year old Ritu Peter Anderson, and father Peter Anderson. The baby can't be entrusted to the care of his extended family because Anderson's brother P …
John Leyden, 05 Jun 2008
Flag Germany

Germany declares hacking tools 'verboten'

Updates to Germany's computer crime laws banning so-called "hacking tools" have been criticised as ill-considered and counterproductive. The revamp to the German criminal code is designed to tighten definitions, making denial of service attacks and attempts to sniff data on third-party wireless networks, for example, clearly …
John Leyden, 30 May 2007
Flag United Kingdom

UK.gov delay means hacking laws are so last century

The government has suspended legislation to update the outdated Computer Misuse Act in England, Wales and Northern Ireland, leaving Scotland the only part of the UK with laws to tackle 21st century hackers. Amendments to the CMA - which was passed in 1990 before the widespread use of the internet - were due to come into force …
John Leyden, 03 Apr 2008

WTF is the Internet of Things and how insurers will use it against you

What is "the internet of things" and why should we care? Put simply, the internet of things is a catch-all term for ultra-low-power embedded devices that mostly consist of sensors and control systems. This market segment is expanding rapidly; devices falling into this category will soon outnumber all other types of computers on …
Trevor Pott, 27 Nov 2013
globalisation

HP warns over printer hacking risk

A security vulnerability involving some HP printer models makes users open to hacking attack. The bug in the Toolbox software installed with HP's Color LaserJet 2500 and 4600 printers creates a means for attackers to pinch valuable information. When the Toolbox is left in a default configuration hackers might be able to steal …
John Leyden, 06 Apr 2006

Stop saying 'Cyber Pearl Harbor,' RSA boss pleads

Art Coviello, executive president of RSA, used the opening keynote of the RSA conference to criticize the habits of some in the industry for spreading fear, uncertainty, and doubt (FUD) as a marketing tool. "I absolutely hate the term 'Cyber Pearl Harbor'," he said. "I just think it's a poor metaphor to describe the state we are …
Iain Thomson, 26 Feb 2013
arrow pointing up

Max Vision hit with hacking charges (again)

Computer security consultant and convicted cyber intruder Max Butler has been indicted on counts of wire-fraud and identity theft, just five years after being released from prison for hacking into military and defense contractor computers. Max Butler, 35, of San Francisco (AKA Max Vision, AKA Iceman) was indicted by a federal …
Austin Modine, 12 Sep 2007

Russian phishers loot $500K in two-year hacking spree

A pair of Russian hackers looted more than $500,000 from Turkish bank accounts during the course of a Trojan-powered two year hacking spree. One of the unidentified perps is on remand following his arrest on fraud charges in June while the other remains at large, Russian Interior Ministry investigators told the RIA Novsoti wire …
John Leyden, 02 Aug 2007
Flag China

MI5 warns over China hacking menace

MI5 has warned UK businesses of the threat posed by state-sponsored Chinese hackers. The UK security service has sent an advisory to banks and law firms warning them to guard against attack from "Chinese state organisations". Jonathan Evans, the director-general of MI5, took the highly unusual step of writing to 300 UK chief …
John Leyden, 03 Dec 2007
homeless man with sign

Hacking students will need background checks

Applicants to the University of Abertay's new Ethical Hacking course will be subject to stringent background checks before being offered a place, to make sure they are not likely to abuse the knowledge they will gain. The four-year degree "Ethical Hacking and Countermeasures" will be on offer from this September, and is …
Lucy Sherriff, 19 Jun 2006

Dragons' Den badboy's biz Expansys is soaked in red

The recovery at Expansys - the consumer electronics etailer owned by Dragons' Den meanie Peter Jones - has proved shortlived. The wireless tech web seller and provider of mobile networks edged back into the black in fiscal 2012 ended April in spite of currency headwinds and hard up UK consumers. Sadly for Jones and other …
Paul Kunert, 14 Dec 2012
channel

Hacking probe clouds Swedish election result

Hi-tech scandal cast its shadow over last weekend's Swedish elections after the incumbent Social Democratic Party accused its political rivals, the Liberal party, of hacking into its systems. The Social Democrats reckons that "someone linked to the Liberal Party" broke into its internal network to swipe election strategy …
John Leyden, 18 Sep 2006
channel

US man faces five years for hacking supervisor's PC

A former federal computer security expert faces a possible five year jail term after pleading guilty to hacking a US Department of Education computer. Kenneth Kwak, 34, of Chantilly, Virginia, admitted snooping on his supervisor's email and internet surfing activities while employed as a system auditor for the US Department of …
John Leyden, 02 Mar 2006
channel

US man jailed for hacking supervisor's PC

A former US government computer security specialist has been jailed for five months for hacking. Kenneth Kwak, 34, of Chantilly, Virginia, admitted unauthorised access to his former boss's computer at the Department of Education. In addition to his spell behind bars, US District Judge Royce Lamberth last week sentenced Kwak to …
John Leyden, 15 May 2006
homeless man with sign

Optical link hacking unsheathed

Optical links are not as secure as might be assumed. Techniques for extracting data flowing over fibre optic links are evolving to make the technique easier to apply. Instead of breaking a fibre and installing a device (splicing), an approach that might easily be detected, off-the shelf equipment makes it possible to extract …
John Leyden, 25 Apr 2007
Mortar board

Teaching hacking helps students, professors say

When Sam Bowne visited the DEFCON hacking conference in 2006, he saw a lot of people having fun with a really interesting topic: computer security. As a professor of computer science at the City College of San Francisco, Bowne wanted to find a way to make computer security accessible to the average student. So, following his …
Robert Lemos, 07 Aug 2007
Handcuffs

Veteran defence hacking suspect cuffed in Greece

A man suspected of using computer hacking techniques to steal corporate secrets from a French defence contractor was arrested in Greece last Friday. Police are continuing to hunt for a suspected accomplice reckoned to be living in the UK. The as-yet-unnamed 58-year-old mathematician was wanted for questioning for the theft of …
John Leyden, 28 Jan 2008
eBay teaser 75

eBay pulls Vista laptop pwned in hacking contest

An eBay listing for the Windows Vista laptop that was successfully compromised at last week's Pwn2Own hacking contest was removed after the online auctioneer said it violated terms that forbid sales of items that might do harm. Shane Macaulay, who felled the machine with code that attacked a weakness in Adobe Flash, posted the …
Dan Goodin, 02 Apr 2008

Bromium launches security-through-virtualisation tech in the UK

Bromium has arrived as a sales force in the UK market with its strategy for making desktop computers secure using virtualisation technology. The firm, which already employs a R&D/engineering team in Cambridge, has now added sales and support operations for the UK and wider European market. It's also looking to recruit channel …
John Leyden, 14 Mar 2013
homeless man with sign

Political hacking scandal hits Hungary

A "Watergate-style" political scandal has broken in Hungary after the opposition party was forced to admit an over-zealous intern was responsible for hacking into the servers of the governing party. Fidesz said the hack against the systems of the ruling socialist party, ahead of the April general elections, was not sanctioned by …
John Leyden, 20 Feb 2006
Flag Russia

Botnets linked to political hacking in Russia

Security researcher Jose Nazario has uncovered circumstantial evidence of the use of botnets in politically-motivated denial of service attacks. Political events in the wider world are sometimes accompanied by hacking incidents in cyberspace, such as defacements and the like. Nobody paid much attention to the issue until the …
John Leyden, 14 Dec 2007
Facebook

Facebook sues Canadian smut firm over hacking

Facebook is suing a Canadian skin-flick firm for trying to hack into its website. The porno outfit, which trades online under the name SlickCash, along with a number of individuals in Toronto allegedly tried to access Facebook's servers at least 200,000 times over two weeks in June. Istra Holdings Inc., a firm affiliated with …
John Leyden, 17 Dec 2007
Warning: biohazard

Anti-virus hacking contest polarizes vendors

Security firms have split over the merits of a hacking contest aimed against anti-virus packages planned for August's Defcon conference. Anti-virus firm Sophos reckons the exercise will serve only to increase the volume of malware in circulation, further taxing the resources of already hard-pressed security firms. However, net …
John Leyden, 28 Apr 2008
globalisation

1,200 Dutch e-voting machines vulnerable to hacking

Dutch intelligence service AIVD has ruled 1,200 e-voting computers inadequate for next month's national elections after testing showed the machines could be be easily intercepted from 20 to 30 metres away. Voters in large cities such as Amsterdam, Eindhoven, and Tilburg will now have to cast their ballot with pencil and paper, …
Jan Libbenga, 31 Oct 2006
channel

'DEC hacking' trial opens

Horsferry Road Magistrates Court has heard the first day of evidence against the East London man accused of hacking into a donations site for the tsunami appeal last December. Daniel James Cuthbert, 28, of Whitechapel, London, is accused of breaches of Section One of the Computer Misuse Act, 1990, on the afternoon of New Year’s …
John Oates, 05 Oct 2005
heart

Hacking attacks can turn off heart monitors

American researchers have proven it's possible to maliciously turn off individuals' heart monitors through a wireless hacking attack. Many thousands of people across the world have the monitors, medically known as implantable cardiac defibrillators (ICDs), installed to help their hearts beat regularly. ICDs treat abnormal heart …

Opinion

Chris Mellor

How long before Blue Big HQ pulls the plug on the whole thing?

Chris Mellor

Drives nails forged with Red Hat iron into VCE's coffin
Sleep Cycle iOS app screenshot

Trevor Pott

Forget big-spending globo biz: it's about the consumer... and he's desperate for a nap

Features

Windows 8.1 Update  Storeapps Taskbar
Chinese Buffet self-service
Chopping down the phone tree to scrump low-hanging fruit
An original member of the System/360 family announced in 1964, the Model 50 was the most powerful unit in the medium price range.
Big Blue's big $5bn bet adjusted, modified, reduced, back for more
Microsoft CEO Satya Nadella
Redmond needs to discover the mathematics of trust