The Channel logo

Articles about Hacking

FBI badge and gun

TOR users become FBI's No.1 hacking target after legal power grab

The FBI wants greater authority to hack overseas computers, according to a law professor. A Department of Justice proposal to amend Rule 41 of the Federal Rules of Criminal Procedure would make it easier for domestic law enforcement to hack into the computers of people attempting to protect their anonymity on the internet. The …
John Leyden, 19 Sep 2014
Routers

Cisco posts kit to empty houses to dodge NSA chop shops

Cisco will ship boxes to vacant addresses in a bid to foil the NSA, security chief John Stewart says. The dead drop shipments help to foil a Snowden-revealed operation whereby the NSA would intercept networking kit and install backdoors before boxen reached customers. The interception campaign was revealed last May. Speaking …
Darren Pauli, 18 Mar 2015

Roll up, come see the BOOMING HACKER BAZAAR!

Underground hacker markets are booming with counterfeit documents, premiere credit cards, hacker tutorials, and "complete satisfaction guarantees", according to a new report from Dell SecureWorks. The means to create a false identity are easily purchased through the cracker bazaars. A fake social security card can be obtain for …
John Leyden, 15 Dec 2014

Don't be fooled! He's not from the IT crowd... he's a CYBERSPY – FireEye

Impersonating IT departments in spear-phishing attacks is becoming an increasingly popular tactic among hackers, particularly in cyber-espionage attacks. IT staff themed phishing emails comprised 78 per cent of observed phishing schemes picked up by FireEye in 2014, compared to just 44 per cent in 2013. The sixth annual FireEye …
John Leyden, 24 Feb 2015

Silver-tongued phish bait lures execs, hooks M&A deals

A hacking group has been stealing identity information and reading emails to get the inside edge on stock markets to buy and sell to make quick profits. Vendor FireEye reckons the group sent articulate phishing emails with malicious attachments demonstrating "deep" knowledge of financial markets and corporate communications. In …
Darren Pauli, 02 Dec 2014
US Pentagon. Pic: DoD photo by MSgt Ken Hammond, USAF

Respect mah privacy! EU delegation begs US to play nice with data

A delegation of MEPs is in Washington this week to put pressure on the US authorities to respect EU privacy laws. The 11-strong group from the European Parliament’s Civil Liberties Committee (LIBE) is led by British Labour MEP Claude Moraes. He said the Parliament hasn’t forgotten about the National Security Agency (NSA)'s …
Jennifer Baker, 17 Mar 2015
Hacker image

'A motivated, funded, skilled hacker will always get in' – Schneier

IP Expo Hacking attacks are more or less inevitable, so organisations need to move on from the protection and detection of attacks towards managing their response to breaches so as to minimise harm, according to security guru Bruce Schneier. Prevention and detection are necessary, but not sufficient, he said. Improving response means …
John Leyden, 09 Oct 2014
The future of air war

US and UK declare red-team CYBER WAR – on EACH OTHER

The US and the UK are planning a series of joint war games involving cyber-warriors from either side attacking each other in a bid to expose security weaknesses before they are abused by criminal hackers or hostile governments. The exercises, which will initially test the security defences and procedures at banks on Wall Street …
John Leyden, 16 Jan 2015

Anonymous plans hacktivism against World Cup sponsors

Ragtag hacktivist collective Anonymous is threatening World Cup sponsors as its next hacking target. Hacker Che Commodore made the threat in solidarity with real-world protestors in Brazil who are enraged that funds are being funnelled into building white elephant stadiums for football's showpiece event rather than much needed …
John Leyden, 09 Jun 2014
Money image

NASA's British cloudy collab provider scores $51m from VCs

Cloudy storage and collaboration service provider Huddle has trousered millions more cash from vulture venture capitalists to spend on biz development on both sides of the Atlantic. The UK-based outfit, started by CEO Alastair Mitchell in 2007, last night took home a $51m Series D round of funding, valuing the business at …
Paul Kunert, 12 Dec 2014
Night scene of bank station in central london

Bank of England seeks 'HACKERS' to defend vaults against e-thieves

The Bank of England is planning to hire ethical hackers to conduct penetration tests on 20 "major" banks and other financial institutions, it has been reported. The move appears to be a response to lessons learned during the Waking Shark II security response exercise last November. The exercise put merchant banks and other …
John Leyden, 24 Apr 2014

Symantec: Antivirus is 'DEAD' – no longer 'a moneymaker'

Symantec, a company that has made huge amounts of cash as the largest antivirus software vendor for the last quarter of a century, looks to be getting out of that business and into fixing hacking problems rather than stopping them. "We don't think of antivirus as a moneymaker in any way," Brian Dye, Symantec's senior vice …
Iain Thomson, 06 May 2014
LIZARD WEARING A TOP HAT SITS ON A BRANCH.  Brett Weinstein pic - ALTERED BY JUDE KARABUS - licensed under  CC 3.0

Oh No, Lenovo! Lizard Squad on the attack, flashes swiped emails

Updated Lenovo's domain name lenovo.com appears to have fallen victim to cyber-mischief-makers Lizard Squad. In the past few minutes, the computer giant's website has been updated to display a slideshow of webcam photos of a bored-looking youth instead of its normal wares. There's some God awful slushy pop music playing in the …
Shaun Nichols, 25 Feb 2015
Bart Simpson

Microsoft will give away Windows 10 FREE - for ONE year

Microsoft is planning a big push for Windows 10 and will be giving away the new operating system to Windows 7, Windows 8.1, and Windows Phone 8 users in the first year of release. "With Windows 10, we think of the operating system as 'Windows as a service'," said Terry Myerson, Microsoft's VP of operating systems. "In next few …
Iain Thomson, 21 Jan 2015
HMS Belfast on the Thames. Pic: Nick Hewson

Hurry shipmates - the black hats have hacked our fire control system

The final instalment of Blighty's Cyber Security Challenge, a ten-month process to find new talent for Blighty's infosec workforce, will conclude this afternoon. The Cyber Security Challenge Masterclass, organised by BT, and described as "a series of national competitions, learning programmes, and networking initiatives designed …
balaclava_thief_burglar

Crims at vendors could crock kit says ENISA

Before you sign on the dotted line to acquire some kit or sign up a service provider, ask the vendor you're considering if any of their staff have criminal records. That's just one of many, many, suggestions made by the European Union Agency for Network and Information Security (ENISA), in a new guide to Secure ICT Procurement …
Simon Sharwood, 11 Dec 2014
European Union Flag

European Parliament reports HACK ATTACK, turns off public Wi-Fi

The European Parliament has disabled its public Wi-Fi network following the detection of a suspected hacking attack which has been linked to the exposure of weak security practices at the institution by a French media outlet. The private network of the European institution is thought to be secure but techies are advising users …
John Leyden, 26 Nov 2013
Spying image

New software ported from Windows to Mac! You'll never guess what. Yes, it's spyware

Miscreants have ported five-year-old spyware XSLCmd to OS X. The Windows version of the malware has been around since 2009, and the Apple Mac edition of XSLCmd shares significant portions of the same code. It can open a reverse shell to its masters, automatically transfer your documents to a remote system, install executables, …
John Leyden, 05 Sep 2014
Windows XP boot screen

Hackers ZERO IN on ZOMBIE XP boxes: Get patching, Internet Explorer 8 users

A newly uncovered attack specifically targeting out-of-support Windows XP machines running Internet Explorer 8 is being used to hack potential victims in multiple industries across Europe and North America, according to security researchers. This is the first “in the wild” attack spotted against Windows XP after Microsoft pulled …
John Leyden, 02 May 2014
triangular warning sign featuring exclamation mark

Hackers hijack hacking tools website

Crackers briefly hijacked hacking tools website Metasploit on Monday. Metasploit is an open-source toolkit widely used by both hackers and security admins to test for website vulnerabilities. But visitors to the site on Monday were redirected to a page announcing the site was "hacked by sunwear ! just for fun", as recorded by …
John Leyden, 03 Jun 2008

Enterprise giant SAP's systems take a probe to the wobbly bits - report

At least 3,000 SAP systems are directly exposed to the internet, providing direct access to core corporate systems for potential attackers, according to a penetration-testing firm. Rapid7, the firm behind the Metasploit penetration-testing tool, carried out the scanning exercise in the wake of the discovery of a banking Trojan …
John Leyden, 13 Nov 2013
chart

Phishers automate attacks using 'Google hacking'

Three in four phishing sites are hosted on compromised servers, according to a new survey. A study of 2,486 fraudulent websites found that 76 per cent were housed on hacked webservers, typically pwned after hackers identified well-known vulnerabilities using search engine queries. Free web hosting for fraudulent websites was …
John Leyden, 02 Mar 2009

Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...

After Symantec published its report on the Regin super-spyware, there were many questions raised. Who coded it? What can it do? And – above all – why did it take so long for security vendors to notice it? Regin is a sophisticated piece of software. It can be customized for particular missions by inserting into its framework …
Iain Thomson, 26 Nov 2014
channel

cDc automates Google Hacking

Infamous hacking group the Cult of the Dead Cow (cDc) has published a tool that searches for vulnerabilities and private data using carefully-selected Google search queries. The process of so-called Google hacking is already well known, largely due to the efforts of Johnny "I Hack Stuff" Long, whose presentation on the subject …
John Leyden, 22 Feb 2008

So many 'cyberspying hackers' about... and most of you are garbage

RSA Europe 2013 Cyber-espionage groups are too numerous to count and are often far less skilled than their reputation suggests, according to threat-trackers. Costin Raiu, director of global research at Kaspersky Lab, estimated that anything between 100 to 200 hacking crews operate in China alone. Despite the hype abut zero-day attacks, many …
John Leyden, 30 Oct 2013
Old Bailey Lady Justice

Microsoft vs US.gov, Internet of Stuff, Big Data: Some of 2015's legal cloudy issues

Cloud, Big Data, the Internet of Things are among the hottest topics that vendors are driving in 2015, but there are five legal developments in each that are worth tracking. 1. Microsoft and US government go to court Again, Microsoft is resisting attempts by the US government to get access to the user data it is holding outside …
Frank Jennings, 15 Jan 2015
Parliament in the clouds

Crack CERT warriors arrive to save UK from grid-crippling hack attacks

The UK is finally getting a national Computer Emergency Response Team (CERT), with the delayed launch of the organisation taking place today. CERT-UK, a key component of the government's £650m National Cyber Security Strategy, will co-ordinate responses to hacking and malware-based cyber attacks on a national level. The …
John Leyden, 31 Mar 2014
Handcuffs

Nanny agency hacking suspect cuffed

Scotland Yard arrested a nanny agency worker over suspected hacking offences on Monday. The unnamed woman allegedly rifled through emails in AOL accounts maintained by her former employer, Nannies Incorporated, while working for a competitor agency. The woman was arrested following an investigation by officers at the Specialist …
John Leyden, 09 Oct 2007
Myspace logo

MySpace celebrity hacker downs hacking forum

A wannabe hacker succeeded only in getting a forum for a group he wanted to join taken down after hacking celebrity MySpace profiles. Tesla defaced the MySpace profiles of singers Tila Tequila and Justin Timberlake as well as actress Hilary Duff to post greetings to the Kryogenics crew. Aside from the greeting nothing malicious …
John Leyden, 07 Dec 2007
The Four Horsemen Apocalypse ride up the grassy mound that adorns the WinXP desktop

Win XP usage down but not out as support cutoff deadline looms

Windows XP usage on the web is decreasing as the venerable operating system edges ever closer towards its "end of life" from Microsoft support next week. Data from cloud security firm's Qualys QualysGuard shows that the percentage of XP on machines decreased from 35 per cent as of January 2013 to 14 per cent in February 2014. …
John Leyden, 04 Apr 2014
channel

Sacked IT admin sentenced for hacking ex-employer

A British IT admin was ordered to pay more than £3,000 and given a three-months jail sentence after being accused of hacking into his former employer's computer system so he could install spyware and delete emails. Julius Oladiran, 46, of South Norwood, admitted making a false statement and gaining unauthorized access to …
Dan Goodin, 07 Jan 2009

Microsoft hands Neath keys to OEM kingdom

Microsoft has filled the Gary Fowle-shaped gap at the top of its local OEM business, with Darren Neath stepping into the breach. Fowle resigned as senior OEM director at Microsoft UK in May and is heading to the vendor's Singapore operation to take on the same job. "Darren Neath, formerly director of our multi-national accounts …
Paul Kunert, 23 Jul 2013
Handcuffs

French police bust 22 youths in alleged hacking network

Police in Dijon, France have detained 22 youths suspected of being members of a domestic network of hackers. According to the French daily Le Monde, sixteen of the alleged hackers are minors, and at least one is reported to be 14 years-old. The oldest detained was 25 years-old. They were apprehended yesterday near Paris and …
Austin Modine, 29 May 2008

Cost-cutting pays off for Symantec as profit lifts

+Comment Software security, data management and protection behemoth Symantec has cashed in on hacking fears with an upswing in product sales, giving itself a revenue and profits lift. Revenues for its first fiscal 2015 quarter, which finished on 4 July, were $1.74bn, up a mere 1.5 per cent on a year ago, and a more flattering 6.4 per …
Chris Mellor, 07 Aug 2014
Flag Germany

Germany declares hacking tools 'verboten'

Updates to Germany's computer crime laws banning so-called "hacking tools" have been criticised as ill-considered and counterproductive. The revamp to the German criminal code is designed to tighten definitions, making denial of service attacks and attempts to sniff data on third-party wireless networks, for example, clearly …
John Leyden, 30 May 2007
Handcuffs

Baby held in Indian jail alongside hacking suspect mum

A seven-month-old child has been held in prison alongside his hacker parents in India. P A Aryan is being held in detention at Puzhal central prison along with his mother, 25 year old Ritu Peter Anderson, and father Peter Anderson. The baby can't be entrusted to the care of his extended family because Anderson's brother P …
John Leyden, 05 Jun 2008
Strawberries suitable for growing in space. Credit: Purdue University

Give young infosec boffins more cash or BAD THINGS will happen – RSA boff

RSA Europe 2013 Declining support for young science and technology researchers from the US government could hurt technology innovation in the long term, a top computer scientist has warned. Robert Griffin, chief security architect at information security biz RSA, said complaints about funding featured in all three pairs of Nobel Prize …
John Leyden, 31 Oct 2013
globalisation

HP warns over printer hacking risk

A security vulnerability involving some HP printer models makes users open to hacking attack. The bug in the Toolbox software installed with HP's Color LaserJet 2500 and 4600 printers creates a means for attackers to pinch valuable information. When the Toolbox is left in a default configuration hackers might be able to steal …
John Leyden, 06 Apr 2006
Flag United Kingdom

UK.gov delay means hacking laws are so last century

The government has suspended legislation to update the outdated Computer Misuse Act in England, Wales and Northern Ireland, leaving Scotland the only part of the UK with laws to tackle 21st century hackers. Amendments to the CMA - which was passed in 1990 before the widespread use of the internet - were due to come into force …
John Leyden, 03 Apr 2008
Disney's Beagle Boys

Three million Adobe accounts hacked? Sorry, make that 38 MILLION

Remember that Adobe security breach earlier this month that leaked the account records of some 3 million customers? Scratch that: the actual number hacked was at least 38 million, it has emerged. In early October, Adobe warned of "sophisticated attacks" on its network in which hackers gained access to data for what was then …
Neil McAllister, 30 Oct 2013
homeless man with sign

Hacking students will need background checks

Applicants to the University of Abertay's new Ethical Hacking course will be subject to stringent background checks before being offered a place, to make sure they are not likely to abuse the knowledge they will gain. The four-year degree "Ethical Hacking and Countermeasures" will be on offer from this September, and is …
Lucy Sherriff, 19 Jun 2006
channel

US man faces five years for hacking supervisor's PC

A former federal computer security expert faces a possible five year jail term after pleading guilty to hacking a US Department of Education computer. Kenneth Kwak, 34, of Chantilly, Virginia, admitted snooping on his supervisor's email and internet surfing activities while employed as a system auditor for the US Department of …
John Leyden, 02 Mar 2006
estonia attack

Daddy, what will you do in the new security wars?

A senior figure at the anti-virus giant McAfee once told this writer the security industry was a mess. There were too many vendors trying to do too many things. But what the industry mirrors is the threat landscape it is trying to calm down. Just look at what’s happened in the past six months. Two of the most significant …
Tom Brewster, 24 Jun 2014
channel

Hacking probe clouds Swedish election result

Hi-tech scandal cast its shadow over last weekend's Swedish elections after the incumbent Social Democratic Party accused its political rivals, the Liberal party, of hacking into its systems. The Social Democrats reckons that "someone linked to the Liberal Party" broke into its internal network to swipe election strategy …
John Leyden, 18 Sep 2006
Compared to a normal bulb

It's the Inter-THREAT of THINGS: Lightbulb ARMY could turn on HUMANITY

Fujitsu Forum Fujitsu’s CTO has sketched a nightmare vision of lightbulbs turning on their human masters in massive denial of service attacks if industry doesn’t get a grip on the security of the “internet of things”. And even if they don’t get that incandescent, the much vaunted internet-connected lightbulb leaves users open to having their …
Joe Fay, 06 Nov 2013
arrow pointing up

Max Vision hit with hacking charges (again)

Computer security consultant and convicted cyber intruder Max Butler has been indicted on counts of wire-fraud and identity theft, just five years after being released from prison for hacking into military and defense contractor computers. Max Butler, 35, of San Francisco (AKA Max Vision, AKA Iceman) was indicted by a federal …
Austin Modine, 12 Sep 2007

Russian phishers loot $500K in two-year hacking spree

A pair of Russian hackers looted more than $500,000 from Turkish bank accounts during the course of a Trojan-powered two year hacking spree. One of the unidentified perps is on remand following his arrest on fraud charges in June while the other remains at large, Russian Interior Ministry investigators told the RIA Novsoti wire …
John Leyden, 02 Aug 2007
Video camera

Anonymity is the enemy of privacy, says RSA grand fromage

RSA Europe 2013 A dogmatic allegiance to anonymity is threatening privacy, according to Art Coviello, executive chairman of RSA. Coviello cast anonymity as the "enemy of privacy" because it gives "free reign to our networks to adversaries" with "no risk of discovery or prosecution." The head of EMC's security division told delegates at the RSA …
John Leyden, 29 Oct 2013
channel

US man jailed for hacking supervisor's PC

A former US government computer security specialist has been jailed for five months for hacking. Kenneth Kwak, 34, of Chantilly, Virginia, admitted unauthorised access to his former boss's computer at the Department of Education. In addition to his spell behind bars, US District Judge Royce Lamberth last week sentenced Kwak to …
John Leyden, 15 May 2006

8 in 10 small UK firms hacked last year - at £65k a pop: Report

Infosec 2013 Over 80 per cent of small businesses in the UK suffered a computer security breach last year, according to new government research. And the proportion of large firms that reported attacks has reached a whopping 93 per cent. The Department for Business, Innovation and Skills' 2013 hacking survey found that 87 per cent of small …
John Leyden, 23 Apr 2013

Opinion

Alexandre Mesguich

Change is order of day as tech giants shift strategy gears
Partnership

Frank Jennings

Confused? No problem, we have 5, no 6, no 7... lots of standards

Chris Mellor

VC sequence could end not with a bang, but a whimper
Sad man stares glumly over boxed contents of desk. Image via shutterstock (Baranq)

Features

money trap conceptual illustration
Big boys snare the unwary with too-good-to-be-true deals
Angus Highland cow
Pet carriers not wanted for whitebox stampede
FBcoldstoragearray
Sorry OpenStack and Open Compute, we're not all Facebook
Gary Kovacs, CEO of AVG. Pic: World Economic Forum
Scammy download sites? Government snooping? Run of the mill for Gary Kovacs