The latest cybersecurity threats and news to help you protect your data, networks, applications, and devices.
Members of Anonymous and the Peoples Liberation Front (PLF) recently announced the launch of the AnonPaste service for the uploading and sharing of data. “Paste services have become very popular, and many people want to post controversial material,” the groups wrote in a joint statement. “This is especially so for those involved in Information Activism.… Read more
According to an FBI affadavit, alleged CabinCr3w hacker Higinio O. Ochoa III was caught by FBI agents after posting a photo of his girlfriend online. “Higino O. Ochoa III was charged with illegally hacking into U.S. law enforcement websites and releasing personal information of several U.S. police officers under the online name ‘w0rmer,’” writes Digital… Read more
Nude photos of “Glee” star Heather Morris were recently posted online. “The naked pictures are alleged to have been stolen by hackers from the 25-year-old actress’s mobile phone,” writes Sophos’ Graham Cluley. “In November 2011, Christopher Chaney of Florida pleaded not guilty to hacking into the email and cellphones of some 50 people, including Scarlett… Read more
A new botnet coded by TheGrimReap3r is currently nearing completion, and will soon be offered for sale on hacking forums for $8,000. “THOR does not use a central [command and control server],” Infosecurity reports. “It has a decentralized architecture based on peer-to-peer (P2P) technology. P2P botnets are the latest innovation in the battle between whitehat… Read more
The porn site Digital Playground was recently hacked by The Consortium, exposing 72,794 customers’ user names, e-mail addresses and passwords, as well as more than 44,000 credit card numbers. “They did not dump the 44,663 credit card numbers that they claim to have acquired, but note that card numbers, card expiration date, cvv and all… Read more
In the earlier days of computers, virus writers and hackers were viewed as fame-seeking and adrenaline-hungry teens with nothing better to do. But as PC usage and the Internet grew, the amount of potential victims grew exponentially and money became the hacker’s greatest motivator; spawning a whole new cyber-lexicon that now includes the term criminal.… Read more
The cornerstone of any reliable security system is authentication, the way of confirming the truth of something or the identity of a person. To protect data and/or control access to data, many organizations still rely on the simplest and most common form of authentication: the password. Not surprisingly, the basic password is too often breached… Read more
Members of Anonymous claim to have taken down more than 50 child pornography Web sites and leaked the names of more than 1,500 members of one of the sites. “The Anonymous campaign began Oct. 14, when members of the hacktivist group found a cache of child-pornography websites while browsing a secret website called the Hidden… Read more
Trend Micro is one of the “big four” business endpoint security vendors, along with Symantec, McAfee and Kaspersky. Its offering comes in two versions: a standard one, called OfficeScan Standalone, and a more comprehensive suite called Enterprise Security for Endpoints. OfficeScan Standalone offers protection for Windows-based endpoints and Windows, Linux and Netware servers, while Enterprise… Read more