Streams

 

Hackers

It's A Free Blog

Iowa GOP Ups Protection Against Hacker Attack

Wednesday, December 28, 2011

The Iowa Republican Party is increasing security of the electronic systems it will use next week to count the votes from presidential caucusegoers. Law enforcement and cyber security geeks are also on high alert following a threat from a group of hackers delivered via video. 

"The video claims to be ...

Read More

Comments [1]

The Takeaway

Outrage Grows Over Murdoch Tabloid Hacking Scandal

Thursday, July 07, 2011

British Prime Minister David Cameron says there needs to be a public inquiry into allegations that the NewsCorp.-owned newspaper News of the World hacked mobile phones to listen to voicemails of murder and terrorism victims. The latest allegation against the Murdoch tabloid is that a private investigator employed by the paper hacked into the personal accounts of family members of soldiers killed in the Iraq and Afghanistan wars.

Comments [3]

The Takeaway

Lulz Security Collective: A Return to Old School Hacking?

Wednesday, June 22, 2011

UK authorities have arrested a 19-year-old under suspicion for his potential connection to the hacking group LulzSec. The group has claimed to have pulled off attacks on PBS, Sony and the Senate.

The group has a mischievous persona. It has set up a hotline for people to call in and suggest sites that should be attacked. The recorded voice that answers claims, in an exaggerated French accent, that "Pierre Dubois and Franvois Deluxe" are not available because they’re out hacking websites. Yesterday, they announced that they're teaming up with Anonymous, another hacking group with a deeper political bent.

Comment

The Takeaway

Inside Citi's Hacking Fiasco

Tuesday, June 14, 2011

Earlier this week, we told you that hackers had infiltrated Citibank’s security system and gained the sensitive account information of more than 200,000 of their customers. What we didn’t know then was that Citigroup officials had discovered the security breach three weeks earlier and failed to notify their customers.

Comment

The Takeaway

Citibank Says Hackers Accessed Credit Card Information

Thursday, June 09, 2011

Citibank has confirmed that hackers accessed credit card information for over 200,000 US customers (1% of the bank's 21 million account holders). The bank says the hacking occurred over a month ago. It's one more occurrence in what seems like a season of hacking attacks, with Lockheed Martin, Sony's PlayStation network, and Google in China also falling victim to recent hackings. 

Comment

The Takeaway

What are Bitcoins? And Are They a Threat to the Monetary System?

Monday, May 23, 2011

A new peer-to-peer payment system called bitcoins allow people to use currency online without being taxed, tracked, or subject to the regulation of governments or banks. Internet entrepreneur and host of the "This Week in Startups" podcast Jason Calacanis says they are "the most dangerous open-source project ever created," and that they threaten to "change the world unless governments ban them with harsh penalties."

Comments [5]

The Takeaway

Arrest of Julian Assange Sparks Online 'Operation Payback'

Thursday, December 09, 2010

The arrest of WikiLeaks founder Julian Assange has sparked an online furor. By utilizing "distributed denial of service" attacks to attempt to overwhelm companies' web servers, the activist group "Anonymous" has targeted organizations that they feel worked against WikiLeaks’ efforts in the days leading up to Assange's arrest on Monday. Anonymous has vowed to continue its online efforts, which have so far been directed at Amazon, PayPal, Visa...and even took the MasterCard website offline for much of yesterday morning. How serious are these attacks, and what are the methods of the people behind them?

Comments [2]

It's A Free Country ®

Hacktivism for Wikileaks

Thursday, December 09, 2010

WNYC
Intermediaries are absolutely necessary to ensure that free speech online is robust and strong, and when they're afraid to stand up for their users' right to free speech and help them get that speech out, then users don't have much of a right at all.

Marcia Hoffman, Electronic Frontier Foundation Senior Staff Attorney, on The Brian Lehrer Show.

Comment

The Takeaway

Top of the Hour: WikiLeaks and Cyber Wars, Morning Headlines

Thursday, December 09, 2010

Are the companies who deny services to WikiLeaks, and the hackers who attack those sites in retaliation, starting a cyber war, and if so, do both sides have a digital ax to grind? 

Comment

The Brian Lehrer Show

Hacktivism and Wikileaks

Thursday, December 09, 2010

To show their support for Wikileaks and its founder, Julian Assange, hackers attacked websites of corporations such as PayPal and MasterCard who have been making it difficult for the controversial site to function. John Abell, New York Bureau Chief for Wired, discusses this recent form of cyber warfare and Marcia Hoffman, Electronic Frontier Foundation Senior Staff Attorney, weighs in on the first amendment ramifications of shutting Wikileaks out of funding, or prosecuting them for the cable dumps.

For a summary of their conversation, go to It's A Free Country.

Comments [49]

The Takeaway

Morning Wrap: Mastercard and 'Anonymous' Hacker Group -- Technological Warfare?

Wednesday, December 08, 2010

MasterCard.com, PayPal, and other sites are suffering large-scale attacks from a hacker group called “Anonymous”. The group claims it’s retaliating against companies that have stopped working with WikiLeaks.

Are these prankster antics or the start of a technological war?

Read More

Comment

The Takeaway

Mastercard, Other Sites Brought Down by Wikileaks Supporters

Wednesday, December 08, 2010

All morning, hackers claiming to be fighting back on behalf of Julian Assange and Wikileaks have been attacking major websites that recently stopped offering services to the organization. "Operation Payback" has already brought down Mastercard's site, Paypal is under attack, as is a bank that froze Julian Assange's accounts. Meanwhile, Julian Assange is in custody in England, waiting to see if he'll be extradited to Sweden to face sexual assault charges. Ironically, the attacks on these major sites aren't all that different from similar efforts to bring down Wikileaks itself (one tactic being used is to take down the sites by pure volume of traffic). But how do they really work, and how do hackers decide what to target?   

Comments [1]

The Takeaway

MasterCard, Other Websites Downed by Hackers Supporting Assange

Wednesday, December 08, 2010

A hacker group known as "Anonymous" has reportedly initiated "Operation Payback" a call for attacks on several websites in retaliation for those sites pulling services from Wikileaks in the past 24 hours. So far, Mastercard's website has been brought down, PayPal is under attack as is Swiss bank PostFinance, which recently froze Julian Assange's bank accounts at the institution. We're joined by Rory Cellan-jones, reporter for our partner the BBC, for more on this breaking story.  

Comment

The Takeaway

A View from Inside the Wikileaks 'Cyber War'

Wednesday, December 08, 2010

As major sites remove services to Wikileaks, and hackers retaliate by trying to bring those sites down, some say a cyber war is beginning, and are using the battle to make further arguments for internet freedom. Laurence "Loz" Kaye, head of the U.K. Pirate Party, has helped provide Wikileaks with "mirror sites," when the organization was under attack from hackers. He joins us now to talk about the battle lines being drawn online.

Comment

The Takeaway

Spanish Hackers Arrested for Creating 'Bot-Net'

Thursday, March 04, 2010

Spanish authorities say they have arrested the ring leaders of a 'bot-net,' or network of millions of hacked computers all over the world. The group was planning to siphon financial and other sensitive information from companies, several of which are American, according to officials.

Comment

The Takeaway

British Man Hacked the Pentagon and NASA Computers

Friday, July 31, 2009

A British man facing charges of hacking into top secret Pentagon and NASA computers in the U.S. has lost a long legal battle against his extradition from the U.K. to the U.S. American prosecutors say the man, Gary McKinnon, is a major military computer hacker. Some British celebrities are defending him, saying he never posed a threat. To tell us more about this unusual case is BBC Correspondent Rob Broomby in London.

Comment

The Takeaway

Hackers vs. Your Social Security Number

Tuesday, July 07, 2009

Your social security number is now a part of almost every form, including health insurance paperwork and the application for your library card. In fact, researchers reporting in this week's issue of the journal the Proceedings of the National Academy of Sciences used public data (hello, Facebook) to predict the first five digits of a person's social security number. And they got it right, on the first try, 44 percent of the time. With more on the dangers of our less-than-private individual identification system, The Takeaway is joined by privacy expert Peter Swire.

You can read more about the PNAS study by heading to the web site of our partners, The New York Times, and checking out today's article, Social Security Numbering System Vulnerable to Fraud, Experts Say.

"We have a known system that's leading to a lot of identity theft and will lead to a lot more identity theft. We probably have to suck it up as a society and get to a new system."
—Ohio State University professor Peter Swire

Comments [1]

The Takeaway

Securing Your Cyber World

Thursday, May 28, 2009

This week President Obama will unveil a much anticipated report on his plans to make the internet secure. He is also likely to name his new cyber-security czar. James Lewis consulted with the administration on this report and he joins The Takeaway to discuss the threats to our cybersecurity. James Lewis is a Senior Fellow at the Center for Strategic and International Studies, where he is director of the center’s Technology and Public Policy Program.

Watch this clip from the 1995 movie Hackers to learn exactly how hackers operate.

Comment