| 

Pink claims her Facebook page was ‘hacked'

  • Post author: Omid Farhang
  • Post published: September 6, 2011
  • Reading Time: 2 min
  • Word Count: 324 words

SophosLabs: Pop singer Pink has posted an angry message to hackers, who she claims stole photographs from her Facebook page. But was Pink’s Facebook page really hacked, or was she just one of the many people who have been careless with their privacy settings? The Grammy award-winning singer, famous for hit records such as “Get the party started” and “God is a DJ”, posted on Twitter about the incident, but didn’t clarify the nature of the photos the hackers might have accessed. ...

Continue Reading Pink claims her Facebook page was ‘hacked'

ComodoHacker responsible for DigiNotar Attack

  • Post author: Omid Farhang
  • Post published: September 6, 2011
  • Reading Time: 2 min
  • Word Count: 272 words

TheHackerNews.com: The hacker warns the Internet community that he has access to 4 other high-profile CAs, among them being GlobalSign, a certification authority from the U.S. He threatens that he will use his power over the companies to issue false certificates, which will later become the weapon of his revenge against countries who deserve it.In his own words, he said “I won’t talk so many detail for now, just I wanted to let the world know that ANYTHING you do will have consequences, ANYTHING your country did in past, you have to pay for it…”. Complete Message here. ...

Continue Reading ComodoHacker responsible for DigiNotar Attack

German Censors Approve New Action Game

  • Post author: Omid Farhang
  • Post published: September 1, 2011
  • Reading Time: 2 min
  • Word Count: 277 words

rockpapershotgun.com: Are you a German teenager? Then do we have some good news for you! After a short seventeen year-long wait, you are now legally allowed to buy a copy of Doom. And, indeed, Doom can now be stocked in normal shops, not just ones ominously deemed ‘adults-only’ – which was basically putting the game right up there with porn. As of yesterday, Germany’s Federal Department for Media Harmful to Young Persons (Bundesprufstelle) has removed Doom – and Doom II – from its list of ‘controlled’ games, following an appeal by id’s owners Bethesda. Their reasoning? Because the Bundesprufstelle thinks Doom is ‘now only of artistic and scientific interest and will not appeal to youngsters’, according to the BBC. ...

Continue Reading German Censors Approve New Action Game

Wikileaks website targeted by hackers

  • Post author: Omid Farhang
  • Post published: September 1, 2011
  • Reading Time: 2 min
  • Word Count: 308 words

TechSpot: Wikileaks found itself the victim of a cyberattack on Tuesday, shortly after the release of thousands of US State Department communications. News broke of the attack on their Twitter page, which offered another link to the communications, and a message stating “WikiLeaks.org is presently under attack.” It is likely that they were hit with a Distributed Denial of Service (DDoS) attack, the most commonly used method by hackers to cause disruption to websites. It works by flooding the servers with traffic, overloading them, and subsequently causing the servers to crash, or become otherwise unreachable. ...

Continue Reading Wikileaks website targeted by hackers

Call of Duty: MW3 To Use Steamworks

  • Post author: Omid Farhang
  • Post published: September 1, 2011
  • Reading Time: 1 min
  • Word Count: 69 words

rockpapershotgun.com: This just came in from Valve: “The PC version of the product will be powered with Steamworks for both the digital and tangible versions of the game and, as with all Steamworks titles, offline play will also be supported along with Auto-Updating, Achievements, and more. Call of Duty: Modern Warfare 3 will also support dedicated servers on day 1.” Better, I suppose. The game is out November 8th. ...

Continue Reading Call of Duty: MW3 To Use Steamworks

Woman sues after firm tracking stolen laptop records nude video chats

  • Post author: Omid Farhang
  • Post published: September 1, 2011
  • Reading Time: 2 min
  • Word Count: 375 words

SophosLabs: Imagine the scene. You buy a second-hand laptop using it to, among other things, have secret sexy video chats with your significant other. Unbeknownst to you, naked photos of you are being taken by a company hired to track down the stolen laptop. Ouch. This is what has happened to Ohio-based Susan Clements-Jeffrey and her boyfriend. Absolute Software is in the business of helping people recover their computers. Fair enough. But is taking nude snaps of the person using the stolen laptop a step too far? ...

Continue Reading Woman sues after firm tracking stolen laptop records nude video chats

Julianne Hough leaked photos published after phone hack

  • Post author: Omid Farhang
  • Post published: September 1, 2011
  • Reading Time: 2 min
  • Word Count: 417 words

SophosLabs: Julianne Hough is famous in the United States not just for being an actress and country music singer, and dating “American Idol” host Ryan Seacrest, but also for having won ABC’s “Dancing with the stars” TV show twice. So, hardly the kind of woman who you would think would need to resort to a cheap publicity stunt to raise her profile. But no doubt there are skeptics who are right now wondering if the news that her mobile phone was “hacked” and one hundred of her private photographs published on the net is nothing more than a way of gaining attention. ...

Continue Reading Julianne Hough leaked photos published after phone hack

kernel.org compromised

  • Post author: Omid Farhang
  • Post published: August 31, 2011
  • Reading Time: 3 min
  • Word Count: 587 words

Read it yourself… 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 ———- Forwarded message ———- From: J.H. Date: 2011/8/29 Subject: [kernel.org users] [KORG] Master back-end break-in To: [email protected] —–BEGIN PGP SIGNED MESSAGE—– Hash: SHA1 Afternoon Everyone, As you can guess from the subject line, I've not had what many would consider a “good” day. Earlier today discovered a trojan existing on HPA's personal colo machine, as well as hera. Upon some investigation there are a couple of kernel.org boxes, specifically hera and odin1, with potential pre-cursors on demeter2, zeus1 and zeus2, that have been hit by this. As it stands right now, HPA is working on cleaning his box, and I'm working on hera (odin1 and zeus1 are out of rotation still for other reasons), mainly so that if one of us finds something of interest, we can deal with it and compare notes on the other box. Points of interest: – – Break-in seems to have initially occurred no later than August 12th – – Files belonging to ssh (openssh, openssh-server and openssh-clients) were modified and running live. These have been uninstalled and removed, all processes were killed and known good copies were reinstalled. That said all users may wish to consider taking this opportunity to change their passwords and update ssh keys (particularly if you had an ssh private key on hera). This seems to have occurred on or around August 19th. – – A trojan startup file was added to rc3.d – – User interactions were logged, as well as some exploit code. We have retained this for now. – – Trojan initially discovered due to the Xnest /dev/mem error message w/o Xnest installed; have been seen on other systems. It is unclear if systems that exhibit this message are susceptible, compromised or not. If you see this, and you don't have Xnest installed, please investigate. – – It \*appears\* that 3.1-rc2 might have blocked the exploit injector, we don't know if this is intentional or a side affect of another bugfix or change. – – System is being verified from backups, signatures, etc. As of right now things look correct, however we may take the system down soon to do a full reinstall and for more invasive checking. – – As a precaution a number of packages have been removed from the system, if something was removed that you were using please let us know so we can put it back. – – At this time we do not know the vector that was used to get into the systems, but the attackers had gained root access level privileges. That's what we know right now, some of the recent instabilities may have been caused by these intrusions, and we are looking into everything. If you are on the box, keep an eye out, and if you see something please let us know immediately. Beyond that, verify your git trees and make sure things are correct. – – John ‘Warthog9' Hawley Chief Kernel.org Administrator —–BEGIN PGP SIGNATURE—– Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Fedora – http://enigmail.mozdev.org/ iEYEARECAAYFAk5a5U0ACgkQ/E3kyWU9dif+1ACfYPlgq/keFrFO77AmQVduKGwx TAcAnRAu6nHt74+5aC+fPeb8aT0hcy2K =Semd —–END PGP SIGNATURE—–

Continue Reading kernel.org compromised

An update on attempted man-in-the-middle attacks

  • Post author: Omid Farhang
  • Post published: August 31, 2011
  • Reading Time: 1 min
  • Word Count: 164 words

Google: Today we received reports of attempted SSL man-in-the-middle (MITM) attacks against Google users, whereby someone tried to get between them and encrypted Google services. The people affected were primarily located in Iran. The attacker used a fraudulent SSL certificate issued by DigiNotar, a root certificate authority that should not issue certificates for Google (and has since revoked it). Google Chrome users were protected from this attack because Chrome was able to detect the fraudulent certificate. ...

Continue Reading An update on attempted man-in-the-middle attacks

Hacker steals user data from Nokia developer forum

  • Post author: Omid Farhang
  • Post published: August 29, 2011
  • Reading Time: 1 min
  • Word Count: 204 words

H-Online: A vulnerability in its forum software has been exploited by a hacker to compromise mobile phone maker Nokia‘s developer forum. The attacker used SQL injection to access the forum database at developer.nokia.com and, according to Nokia, obtained email addresses of registered users. Where configured to be publicly available, the table also includes details such as the user’s date of birth, web site URL and Skype, ICQ or other IM username; this is reported to be the case for around 7 per cent of users. The database did not contain passwords or credit card information. The issue does not, according to Nokia, affect any other Nokia accounts. ...

Continue Reading Hacker steals user data from Nokia developer forum