Opening the Hacker Halted conference in Miami, Florida, 29th October 2012, Jav Bavisi, president and CEO of the EC-Council, told the audience that the post-PC era of computing requires a fundamental shift in the security industry’s tactics.
NullCrew continues its hacking spree with a new international operation
NullCrew is a hacking team that bears some similarities to the defunct LulzSec: it has sympathy with Anonymous, but is separate from Anonymous. It does, however, operate with none of the taunting flamboyance that probably led to the downfall of LulzSec.
3.6 million social security numbers and 387,000 card numbers stolen
Taxpayers in South Carolina have been told of a security breach involving the theft of millions of social security numbers and hundreds of thousands of debit and credit card numbers. None of the SSNs were encrypted and 16,000 of the bank cards were sim…
DDoS and SQL injection are the most popular attack subjects
An analysis of conversations in one of the largest known hacker forums – with around 250,000 members – has revealed that SQL-injection and DDoS are the subjects of most interest to up-and-coming wannabe hackers.
The Future of Hacktivism: Why Unemployment Will Increase Hacktivist Activity
Research on the similarities between hacktivist groups like Anonymous and real-world protest groups and the future of hacktivism has been carried out by Czech Technical University in Prague.
Stoke-on-Trent gets £120K fine for second data encryption offense
The ICO has hit the Stoke-on-Trent City Council with a hefty £120,000 fine for failing to use basic encryption on email messages, and for sending a message about a child protection case to the wrong person.
Government official advises users to use a false name online
There’s a row brewing in the UK after a senior security official at the Cabinet Office advises users to provide false personal information to websites such as Facebook. Opposition MPs and Facebook are not amused.
Unprotected backdoor into industrial control systems
A software tool that is used to program the programmable logic controllers (PLCs) used in much of the critical infrastructure contains an unprotected backdoor that could be used by hackers to access any such device that has an internet connection.
Jesus and Ninja show up in most-hacked passwords list
Apparently, quite a few people feel that “Jesus” can save them from online account breaches –but the popular Spanish men’s name and savior in the Christian tradition performs no miracles as a password, coming in at 21 in a list of the top 25 most-hacke…
Jester’s warbag: be careful of what you do on the internet
Jester (th3j35t3r) describes himself as a patriotic cyber activist. He spends his time trying to find and take down what he considers to be enemies of the USA, ranging from Wikileaks and Anonymous to militant Islamic websites.