Hackers

Hack of Russian Defense Firm Called ‘Cyberwar’

Posted In DataCenter
New anti-Putin hacktivist group cracks Russian arms-export firm, posts (infected) 500MB of documents and passports. continue…

Snapchat Finally Says ‘Sorry’

Posted In Cloud
More than a week after attackers swiped information on 4.6 million users, Snapchat offers that long-awaited apology. continue…

Shocker: The Internet of Things Is Insecure

Picture hundreds of millions—maybe billions, at some future point—of connected devices vulnerable to all sorts of hacks. continue…

How Hackers Use Bots to Score Prime Restaurant Reservations

Posted In Cloud
Automated scripts aren’t just for e-commerce or high-frequency trading: you can also use them to nail a good table for four at a hot eatery. continue…

System Admins and Hackers: Now What?

Posted In Living in Tech
Systems Admin Thumbnail
The last couple of weeks have brought tons of coverage on the government’s metadata gathering, the privacy concerns of American citizens and who has access to data in large, sprawling systems. As the NSA, Booz-Allen and the IT sector grapples with what to do next, it shouldn’t come as any surprise that system admins and their role would all of the sudden come under scrutiny. The situation illustrates the extremely complex interplay between computing professionals and their organizations, especially when… continue…

Ways AP Could Have Avoided Its Twitter Hack

AP Hack T
A single tweet with a phony bit of news sent the stock market into a brief dive Tuesday, pushing the Dow Jones Industrial Average down more than 140 points in the three minutes from 1:07 to 1:10 p.m. ET. When the “news” — that two bombs had exploded in the White House, injuring the president — was debunked, the market regained its footing.   Of course, phony information blasts out through Twitter all the time. The difference here is that… continue…

Are Hackers a Killable Target in a Cyber-War?

A new report suggests that nations can go after cyber-attackers with “kinetic force” in certain situations. continue…

The Cost of Cyber-Spying: Boredom, Bitterness

A blog reportedly written by a Chinese military hacker hints at the drudgery of building viruses. continue…

A Brute Force Defense Against Injection Attacks

Injection
Injection attacks are a common security problem for Web developers. The interpreted nature of most development languages makes them especially vulnerable to these attacks. This article explains what an injection attack is and provides some simple steps that you can take to defend your site against them. What is an Injection Attack? An injection attack takes place when a malevolent programmer puts code in the query string or other parts of the HTTP request. The interpreter executes the malicious code,… continue…

Symantec Pushes Back Against New York Times Hacking Report

Posted In Cloud
Symantec has issued a statement about its role in the recent cyber-attacks on The New York Times. continue…