Gawker was hacked six months ago, say sources close to Gnosis

Gawker was hacked six months ago, say sources close to Gnosis


Gawker was hacked six months ago, say sources close to Gnosis

Posted:

InfoSec News: Gawker was hacked six months ago, say sources close to Gnosis: http://www.guardian.co.uk/technology/2010/dec/29/gawker-hacking-gnosis-six-months
By Charles Arthur guardian.co.uk 29 December 2010
Hackers had access to the gossip site Gawker's content management system (CMS) and password files for around six months, rather than the few days [...]

Data breach affects 4.9 million Honda customers

Posted:

InfoSec News: Data breach affects 4.9 million Honda customers: http://www.zdnetasia.com/data-breach-affects-4-9-million-honda-customers-62205394.htm
By Vivian Yeo ZDNet Asia December 30, 2010
Japanese automaker Honda has put some 2.2 million customers in the United States on a security breach alert after a database containing [...]

New Geinimi Android Trojan Steals Data from Infected Mobile Applications

Posted:

InfoSec News: New Geinimi Android Trojan Steals Data from Infected Mobile Applications: http://www.eweek.com/c/a/Security/New-Geinimi-Android-Trojan-Steals-Data-from-Infected-Mobile-Applications-717465/
By Fahmida Y. Rashid eWEEK.com 2010-12-30
A sophisticated piece of Android malware that has botnet-like capabilities was discovered attached to a number of games on a [...]

Secunia Weekly Summary - Issue: 2010-52

Posted:

InfoSec News: Secunia Weekly Summary - Issue: 2010-52: ========================================================================
The Secunia Weekly Advisory Summary 2010-12-23 - 2010-12-30
This week: 32 advisories [...]

Hacking cellphones' GSM software quick, cheap, researchers claim

Posted:

InfoSec News: Hacking cellphones' GSM software quick, cheap, researchers claim: http://www.montrealgazette.com/technology/Hacking+cellphones+software+quick+cheap+researchers+claim/4038592/story.html
By Jason Magder Postmedia News December 29, 2010
MONTREAL - Most of the world's cellphones can be hacked and their phone calls recorded using less than $100 of equipment, a pair of researchers have found.
The pair, Sylvain Munaut and Karsten Nohl, demonstrated to the Chaos Computer Club Congress in Berlin, Germany, this week how they intercepted phone calls and SMS messages using four phones they bought for less than $15 each, and a laptop. The pair said most phone networks working on the GSM standard are vulnerable. The GSM network is used by 80 per cent of the world's phones, including Rogers Communications Inc., which has the largest market share in Canada, and Fido.
Speaking for Rogers, Sebastien Bouchard said he wasn't sure if customers were affected by this vulnerability. He said, however, that Rogers works closely with the world GSM association to protect the privacy of its customers.
Bell Canada Enterprises and Telus Corporation use different technology, the HSPA+ network. Bell spokesperson Marie-Eve Francoeur said that network isn't affected by the vulnerabilities of GSM software. She said, however, that Bell is concerned with security and reviews its procedures continuously.
The pair showed how they could send a ghost text message to a target phone, that the phone would not see, but the phone would transmit its identification number to the sender.
[...]

[Dataloss Weekly Summary] Week of Sunday, December 19, 2010

Posted:

InfoSec News: [Dataloss Weekly Summary] Week of Sunday, December 19, 2010: ========================================================================
Open Security Foundation - DataLossDB Weekly Summary Week of Sunday, December 19, 2010
5 Incidents Added.
======================================================================== [...]

FBI raids ISP in Anonymous DDoS investigation

Posted:

InfoSec News: FBI raids ISP in Anonymous DDoS investigation: http://www.computerworld.com/s/article/9202838/FBI_raids_ISP_in_Anonymous_DDoS_investigation
By Robert McMillan IDG News Service December 30, 2010
Authorities in the U.S. and Germany have raided Internet Service Providers in hopes of tracking down the hackers who launched distributed [...]

0 comments:

Post a Comment