Out of all the ridiculous laws passed in the Internet age, this one might be the most absurd. The law, which only applies to Tennessee at the moment, may have originated with the good intentions of fighting cyber-bullying; but it not only makes nearly every citizen a criminal, but would also send them to jail for almost a year and fine them up to $2,500 if convicted. So what is this dangerous action that the Tennessee government finds so threatening? Nothing other than sending an offensive picture online… to anyone.

Read More →

Bullying used to mean bigger, more aggressive kids picking on the timid or different. With social networking sites giving millions of young adults a new place to expose their identities, opinions, interests and vulnerabilities came a new arena for predators to ridicule those differences. As a sign of the times, the Arkansas Senate could make cyberbullying a crime.

Read More →

cyber-armyAt around 10 pm on Thursday, Twitter’s website was down, and the home page replaced with a page saying that it was hacked by the “Iranian Cyber Army”. They also left a message saying:

Iranian Cyber Army

THIS SITE HAS BEEN HACKED BY IRANIAN CYBER ARMY

iRANiAN.CYBER.ARMY@GMAIL.COM

U.S.A. Think They Controlling And Managing Internet By Their Access, But They Don’t, We Control And Manage Internet By Our Power, So Do Not Try To Stimulation Iranian Peoples To….

NOW WHICH COUNTRY IN EMBARGO LIST? IRAN? USA?
WE PUSH THEM IN EMBARGO LIST ;)
Take Care.

The search result from Google were also changed for Twitter by the hackers, and read:

“In the name of God, as an Iranian this is a reaction to Twitter’s interference sly which was U.S. authorities ordered in the internal affairs of my country…”

google-hack

Twitter is now back to normal, but what was done is not exactly sure. It is now under investigation to find out who is responsible for this hack, and is suggested that if you use the same password on Twitter as you do with other accounts it would be a good idea to change those passwords.

(Via TechCrunch)

Read More →

rbs-worldpayIn an elaborate plan to hack into ATMs worldwide, four hackers were able to accrue $9.5 million in cash in a matter of hours. The hackers, Sergei Tsurikov, 25, of Tallinn, Estonia; Viktor Pleshchuk, 28, of St. Petersburg, Russia; Oleg Covelin, 28, of Chisinau, Moldova; and a fourth person identified only as “Hacker 3″ targeted the bank card processing company RBS WorldPay. By reverse engineering the PIN numbers assigned to payroll debit card accounts, the hackers were able to access millions of dollars and run.

RBS WorldPay, the payment-processing arm of the Royal Bank of Scotland, first noticed that they were hacked on November 10th. The hackers had actually  gained access to sensitive information for 100 payroll cards and the social security numbers of about 1.1 million account holders on November 4th. Little did the company know that within 12 hours they would be out $9.5 million dollars. Once the hackers broken into the company’s accounts, they raised the amount of available funds on the cards, some withdrawal limits to as high as $500,000. After raising the limit, the hackers are described to have provided the account details to their “army of cashers,” around the world who hit more than 2,000 ATMs in less than 12 hours.

Tsurikov, Pleshchuk, Covelin and “Hacker 3″ face up to 20 years in prison for conspiracy, while Covelin is currently wanted by the NY government for cyber crimes committed earlier in the year.

(Via Wired)


Read More →

hackedThe U.S. is preparing a new report for the Congressional panel that shows evidence of China launching cyber attacks to steal U.S. government and industry secrets. Since these attacks are using a lot more resources than your average hacker would have access too, the evidence points to the fact that these attacks are not being performed by some regular hacker who happens to just be based out of China.

The report says: “The problem is characterized by disciplined, standardized operations, sophisticated techniques, access to high-end software development resources, a deep knowledge of the targeted networks, and an ability to sustain activities inside targeted networks, sometimes over a period of months”

These attacks have been made on government computers, including those belonging to the Department of State, the White House, NASA, and Department of Defense agencies. Most of the files stolen were defense and policy related which further suggests that it was a government doing this and not just some random hacker. The hackers also knew exactly what they were doing and had total access to everything. The report states that:

“Analysis of the operation suggests that the adversaries previously identified specific directories, file shares, servers, user accounts, employee full names, password policies, and group memberships on the network, likely during their detailed reconnaissance phase”

It’s a known fact that China has been working on strategies for “information warfare” for the last 10 years, which might just be the case here. In response to this and other possible threats the U.S. government has also been developing its own cybersecurity and cyberwar capabilities, most recently bringing cyberwar responsibilities under the leadership of a new Cyber Command, headed by NSA director Keith Alexander.

(Via InformationWeek)

Read More →

sqlBecause of the struggling economy, many companies have been making cutbacks. But at the same time that cyber security concerns are rising, companies continue to cut IT funding.

According to an anti-fraud command company RSA in Tel Aviv, Israel, there has been a recent rise in attacks on U.K. businesses.

Oren Parag, an analyst for RSA stated “It’s always on the rise. It’s been specifically high in the past year. Much higher than before.”

The U.K. is the second most attacked country in the world, trailing only to the great U.S. of A. The U.K. has received 20% of all cyber attacks in the past year. However despite the increase in attacks on these companies it seems that the amount of money being allocated towards the IT development is not increasing. According to Chris Young, Head of Security Product Development at RSA, said: “For a lot of large enterprises, security spending is flat on where it was a year ago, or even a couple of years ago.”

Read More →