Showing posts with label hack. Show all posts
Showing posts with label hack. Show all posts

Wednesday, December 18, 2013

Credit-Card Hack at Target May Hit Millions of Shoppers


(Newser) – Attention, Target shoppers: That Black Friday bargain you scored might have some serious strings attached. Two independent reports say the retailer is investigating a major credit card breach at its physical stores that began just after Thanksgiving and ran at least through that weekend and possibly through last Sunday. Millions of credit cards swiped at stores across the country might be compromised, reports Krebs on Security and the Wall Street Journal. Online shoppers appear to be safe.


So far, the retailer has been mum on the potential hack, but the Secret Service has confirmed that it is investigating what might turn out to be one of the biggest retail breaches to date. The reports suggest that hackers gained access to the data stored on the cards’ magnetic stripes. Worst case, the hackers could “create counterfeit cards by encoding the information onto any card with a magnetic stripe,” says the Krebs report. “If the thieves also were able to intercept PIN data for debit transactions, they would theoretically be able to reproduce stolen debit cards and use them to withdraw cash from ATMs.”




Money from Newser



Credit-Card Hack at Target May Hit Millions of Shoppers

Wednesday, November 20, 2013

Reagan"s role in NSA"s hack of Google and Yahoo



(AP) — Back when Yahoo was something hollered at a rodeo and no one could conceive of Googling anything, President Ronald Reagan signed an executive order that extended the power of U.S. intelligence agencies overseas, allowing broader surveillance of non-U.S. suspects. At the time, no one imagined he was granting authority to spy on what became known as Silicon Valley.


But recent reports that the National Security Agency secretly broke into communications on Yahoo and Google overseas have technology companies, privacy advocates and even national security proponents calling for a re-examination of Reagan’s order and other intelligence laws.


Experts suggest a legislative update is long overdue to clear up what Electronic Frontier Foundation legal director Cindy Cohn calls “lots of big gray areas.”


With the cooperation of foreign allies, the NSA is potentially gaining access to every email sent or received abroad, or between people abroad, from Google and Yahoo’s email services, as well as anything in Google Docs, Maps or Voice, according to a series of articles in the Washington Post. It’s impossible to know how many of Google and Yahoo’s collective 1.8 billion accounts are affected, but in a single 30-day period last year, field collectors processed and warehoused more than 180 million new records — ranging from “metadata,” which would indicate who sent or received emails and when, to content such as text, audio and video, the Post reported.


The Post reported that the NSA and its British counterpart, the U.K. Government Communications Headquarters, have intercepted and tapped into data funneled by Google and Yahoo through fiber optic cables, routing information in an NSA operation called Muscular. The information was provided to the newspaper by former NSA contract employee Edward Snowden, who is being sought by the U.S. for leaking classified information.


“Had the NSA done the same warrantless tapping at Google’s Mountain View, California, headquarters, there’s no doubt they would be violating the law,” said Cohn, whose San Francisco-based non-profit fights for digital freedoms. “They’re doing this abroad because they want that fig leaf of legality.”


The NSA, in an online statement, says its collection operations comply with federal laws and orders.


Reagan’s 1981 Executive Order 12333 for the first time in a public, written record allowed foreign covert action to be conducted from inside the U.S. The measure, amended several times after 9/11, outlines key rules for more than a dozen intelligence agencies. It spells out when spies are allowed to peek into mail, homes and electronics, identifies who has to approve of specific searches, and details how to carry out clandestine collection of foreign intelligence.


“What NSA does is collect the communications of targets of foreign intelligence value, irrespective of the provider that carries them,” the agency said, likening the data channels at private firms to super highways.


In other words, the NSA is not targeting information about Google and Yahoo as such, but is conducting surveillance on foreigners using the services these companies provide, said University of Indiana law professor David Fidler. But Fidler says this explanation ignores the fact that the NSA is directly targeting the facilities of U.S. companies, “even if the information ostensibly sought concerned foreign persons.”


Even Google’s chairman Eric Schmidt, outraged by the invasion, says he’s not sure it is illegal, telling CNN the operation is “perhaps a violation of law but certainly a violation of mission.”


It is unclear exactly how the intrusions were carried out, but Daniel Castro, senior analyst at the Washington nonprofit Information Technology and Innovation Foundation, suspects the surveillance required a computer savvy person either working for the NSA, another government, or a contractor, to physically get inside a network provider’s facilities to tap into the fiber optic network and route a copy of the online traffic into their own network. The set up could be similar to a secret NSA room built into an AT&T building in San Francisco in 2002 and made public by a retired AT&T staffer in 2007.


The Post reported that the NSA isn’t breaking into accounts as they sit, stored in data centers, but is able to gather the emails and other communications as they move between them.


The NSA says that if they accidentally scoop up extra, non-criminal related information from Americans, there are strict limits about how it can be used. But there’s no guarantee those limits apply if British intelligence agents are doing the rerouting and then turning information over to the NSA, and the Obama Administration will not talk about their methods.


Thus the immediate pushback from advocates is a loud call for new laws.


“It’s a relatively new phenomenon that the government is sweeping through American communications outside the U.S., so there haven’t been a lot of legal decisions,” said American Civil Liberty Union’s national security project attorney Patrick Toomey. “We think that these revelations show the ways in which the surveillance laws are in desperate need of reform. The location in which surveillance and collection occurs no longer matters.”


Those reforms are already underway, spearheaded by the USA FREEDOM Act introduced by Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) and Congressman Jim Sensenbrenner (R-Wisc.), chairman of the Crime and Terrorism Subcommittee in the House; the proposed legislation, which is widely supported by the tech industry including Google, seeks to limit the NSA’s surveillance powers both here and abroad. The bill appears to have bipartisan support.


But it might not go far enough for Kel McClanahan, executive director of National Security Counselors, which represents clients involved in security or privacy law-related proceedings. McClanahan says in addition to the broad privacy questions, there’s a problem with the NSA actions when it comes to attorney-client privilege. Working with an attorney in the United Kingdom, McClanahan is currently fighting a legal Freedom of Information Act battle with the NSA, seeking documents related to Sharif Mobley, a U.S. citizen charged with terrorism in Yemen. Under current law, says McClanahan, the NSA could ostensibly tap into the private communications between himself and the British attorney he is working with, and read the litigation strategies as he and the British attorney plan them.


“From what I can tell, what they’re doing is technically legal because of the lack of any law prohibiting it,” he said.


The NSA says it has “minimization procedures” that limit how deeply it can examine communications of U.S. citizens while they’re in the U.S., but it’s unclear whether they extend to foreign attorneys.


Earlier reports based on Snowden’s documents revealed the existence of other NSA programs, including the PRISM data-gathering program, which forces major tech firms to turn over the detailed contents of Internet communications, although those required court orders.


The difference this time is that the NSA is “tapping into the data centers as a backdoor activity, which made the tech firms extremely unhappy,” said attorney Pat Fowler, who handles data privacy and security cases from his Phoenix, Arizona office.


Indeed, several Google engineers who spend their days fighting hackers fired back with furious online responses to their systems being targeted.


And it’s quite possible Yahoo and Google weren’t the only ones, said Fowler, noting that Microsoft’s Hotmail, which with Google’s Gmail and Yahoo’s email dominate the email market.


“It wouldn’t be a stretch to think they might try to get that data from the other entities,” said Fowler.


Attorney Steven Bradbury, who headed of the Justice Department’s office of legal counsel until 2009, used to advise the president and executives on constitutional questions of privacy and security. Today he says public concerns about invasions of privacy are off base because the NSA is not allowed to target U.S. data abroad, and when it gets it, there are tight limits.


“Communications that travel over wires overseas are susceptible to interception by all kinds of foreign governments that are active in collecting and doing surveillance,” he said. “The difference is that the NSA and U.S. intelligence agencies are subject to strict rules and oversight. There’s much more protection for U.S. persons than for foreign citizens.”



Follow Martha Mendoza at https://twitter.com/mendozamartha


Associated Press




Top Headlines



Reagan"s role in NSA"s hack of Google and Yahoo

Friday, October 4, 2013

How to hack your friends Facebook statuses.


FB Mobile Upload URL: https://m.facebook.com/upload.php?_rdr —————————————————————– Feel free to like, favorite, c…



How to hack your friends Facebook statuses.

Thursday, August 29, 2013

New York Times site hack shifts attention to registry locks





Computerworld – One way that owners of major websites can mitigate the risk of their domains being hijacked like The New York Times’ site
was on Tuesday is to apply what is known as a registry lock on the domain, security researchers say.


A registry lock is basically a mechanism under which any requests for changes to a domain name server have to be manually
verified and authenticated by a top-level domain owner like Verisign and NeuStar, which operate the dotcom and dotbiz domains
respectively.


A registry lock provides an additional layer of protection against DNS tampering and is particularly useful in situations
where a domain name registrar might be compromised, the security researchers said.


On Tuesday, The Times blamed a prolonged website outage on a hacking attack at the company’s Australia-based domain name registrar, Melbourne IT.


The Times said hackers belonging to the Syrian Electronic Army (SEA) gained access to the company’s DNS records by compromising
its domain name registrar. The attackers then used that access to change the paper’s DNS record so it was pointing to systems
in Syria and Moscow.


Melbourne IT, in turn, blamed the outage on one of its resellers, whose account was apparently compromised and used to change several domain names, including
that of The Times, Twitter and others.


H.D. Moore, chief research officer at security vendor Rapid7, said registry locks make it much more difficult to make such
DNS changes.


Typically, changes to name servers are handled directly by domain registrars such as Melbourne IT and not by the top-level
domain owners. A registry lock prevents the registrar from making any changes on its own and instead allows changes to be
made only with the approval of the top-level owner.


“Instead of updating a record through your registrar’s website, you have to contact the [Top Level Domain] owner instead and
go through a secondary form of authentication,” Moore said. “It makes sense for big brands, but does impose a maintenance
penalty on organizations who change DNS providers frequently.”p>


At the time of the attack, many of the major websites hosted by Melbourne IT did not have a registry lock in place, Moore
said. Among the companies using Melbourne IT are Yahoo, Google, Microsoft, Ikea, AOL and dozens of other major site owners.


While there is no evidence that the attackers made changes to any of these domains, they were potentially vulnerable, Moore
said. “In other words, things could have been much worse.”


Since the attacks on The Times, several of the websites using Melbourne IT as a registrar have applied registry locks, Moore
said. Among the websites that appear to have put a lock in place are the Huffington Post, Mapquest, Starbucks and Twitter’s
TweetDeck. However, many other major websites using Melbourne IT have not done so yet, and remain vulnerable.


Matthew Prince, co-founder of CloudFlare, saiddomain registrars generally do not make it easy for website owners to request
registry locks, however. “[Locks] make processes like automatic renewals more difficult,” Prince said in a blog post. “However, if you have a domain that may be at risk, you should insist that your registrar put a registry lock in place.”




Netflash



New York Times site hack shifts attention to registry locks

Saturday, June 29, 2013

Leading light in science, Italy"s "lady of the stars" Hack dies




ROME | Sat Jun 29, 2013 11:51am EDT



ROME (Reuters) – Astrophysicist Margherita Hack, a popular science writer, public intellectual and the first woman to lead an astronomical observatory in Italy, died on Saturday at the age of 91.


Known as the “lady of the stars”, Hack’s research contributed to the spectral classification of many groups of stars, and the asteroid 8558 Hack is named after her.


She introduced astrophysics to a broad Italian audience, from university textbooks to colorful tomes of astronomy for children, and was astronomy chair at the University of Trieste and director of the Trieste Astronomical Observatory from 1964 to 1987, the first woman to hold the position.


Hack was one of Italy’s most visible scientists over her career and remained a grey-haired media presence into her 90s, often consulted for her assessment of the issues of the day from a wooden rocking chair in her book-lined Trieste home.


An outspoken atheist in a predominantly Catholic country, Hack was known for her opposition to the influence of religious beliefs over scientific research, and lobbied for legalized abortion, euthanasia, animal protection and gay rights.


One of her many books, “Why I am Vegetarian”, published at the age of 89, outlined Hack’s belief that there was no difference between human and animal pain and that eating meat damaged the environment, sparking debate in a country with a proud tradition of meatballs, beef pasta dishes and cured hams.


In December 2012 she told a reporter she had decided not to have a heart operation that could prolong her life, wryly commenting that she might as well save the Italian public health service the money, and saying she preferred to stay at home with her books and her husband of seven decades, Aldo De Rosa.


“I do not believe in the afterlife,” she said, chuckling and animated, in her final television appearance in March. “When I die my particles will flutter about the terrestrial atmosphere.”


(Reporting by Naomi O’Leary; Editing by Alison Williams)





Reuters: People News



Leading light in science, Italy"s "lady of the stars" Hack dies

Monday, June 3, 2013

Researchers say they can hack an iPhone through the charger


A team of researchers say they


A team of researchers say they’ve found a way to hack into an iPhone or iPad in less than a minute using a “malicious charger.”





  • Researchers say they can hack Apple mobile devices through the charger

  • Georgia Tech team will present findings at Black Hat security conference

  • Claim: Malicious charger “Mactans” can hack iOS in less than a minute



(CNN) — Apple devices, from Macs to iPhones, have always been able to boast of advanced safety from viruses, spam and the like. Now, apparently, not even your phone charger is safe.


A team of researchers from Georgia Tech say they’ve discovered, and can demonstrate, a way to to hack into an iPhone or iPad in less than a minute using a “malicious charger.”


The team plans to demonstrate its findings at the Black Hat computer security conference, which begins July 27 in Las Vegas.


In a preview of its presentation, the team acknowledges Apple’s “plethora of defense mechanisms in iOS.” Historically, Mac users have been able to boast of being largely malware free, in part because spammers, scammers and hackers preferred to target the larger number of Windows computers in the world.


On its mobile iOS operating system, Apple has created a “closed garden” environment in which everything from apps to accessories has to be approved by Apple, as opposed to Google’s more wide-open Android system.


But by attacking in a nontraditional way, the team of Billy Lau, Yeongjin Jang and Chengyu Song say, those defenses can be bypassed.


“(W)e investigated the extent to which security threats were considered when performing everyday activities such as charging a device,” they wrote. “The results were alarming: despite the plethora of defense mechanisms in iOS, we successfully injected arbitrary software into current-generation Apple devices running the latest operating system (OS) software.


“All users are affected, as our approach requires neither a jailbroken device nor user interaction.”


The team says they have built a malicious charger named Mactans, which they plan to demonstrate at Black Hat. Latrodectus mactans is the scientific name for the deadly black widow spider.


The preview doesn’t say whether the charger is a modified version of Apple’s standard equipment or entirely new.


“While Mactans was built with limited amount of time and a small budget, we also briefly consider what more motivated, well-funded adversaries could accomplish,” they wrote. “Finally, we recommend ways in which users can protect themselves and suggest security features Apple could implement to make the attacks we describe substantially more difficult to pull off.”


Apple did not immediately respond to a message seeking comment.




CNN.com Recently Published/Updated



Researchers say they can hack an iPhone through the charger

Monday, February 18, 2013

Burger King takes down Twitter account after hack attack

Burger King’s Twitter account shows hacking activity before the account was suspended by Twitter in this screen grab taken on February 18, 2013.

Credit: Reuters/Handout


Reuters: Oddly Enough


Burger King takes down Twitter account after hack attack