Cellular Network Hijacking...

Weekend Following the success of hijacked network Free Libyana, we took the opportunity to talk to some engineers about the complexity of lifting someone else infrastructure, and discovered there isn’t much. In April this year, Ousama Abushagur hacked into the infrastructure built by the Libyana network in Libya. He cut the connections to the head office in Tripoli...

Over 100 arrested as US an...

Police in the US and Romania have made more than 100 arrests aimed at stopping a criminal gang from defrauding internet users. According to the US Justice Department a combined operation was carried out with 117 searches in the US and Europe that have resulted in more than 100 arrests. The criminal group are accused of holding fake auctions and then channelling funds...

Lying Facebook app offers ...

Facebook scammers have latched onto the buzz around Google+, as the theme for a new scam that has already claimed thousands of fans victims. A fake app, called “Google Plus Direct Access“, prompts users to visit a page on the social networking site they need to “like” in order to progress: a process that hands over personal information to the...

Vodafone Hacked – Ro...

The Hacker’s Choice (http://www.thc.org) announced a security problem with Vodafone’s Mobile Phone Network today.An attacker can listen to _any_ UK Vodafone customer’s phone call.An attacker can exploit a vulnerability in 3G/UMTS/WCDMA – the latest and most secure mobile phone standard in use today.The technical details are available at...

Zuckerberg and Google elit...

Mark Zuckerberg, Google founders Larry Page, Sergey Brin, and a whole raft of Google’s top brass have suddenly activated the privacy settings on their Google+ profiles. Even though they want you to expose your entire life to world+dog over the interwebs, they would rather not. The newly activated privacy settings has made it impossible to see who is following...

Security experts claim Goo...

SECURITY EXPERTS have criticised Google’s decision to ban all .co.cc domains from search results, claiming that it’s both inefficient in preventing abuse and unsustainable in the long run. Google took the unprecedented step of deindexing the entire .co.cc second-level domain (SLD) at the beginning of this month because of the high number of malicious web...

Hackers Select a New Targe...

The hackers, calling themselves the A-Team, assembled a trove of private information and put it online for all to see: names, aliases, addresses, phone numbers, even details about family members and girlfriends. But their targets were not corporate executives, government officials or clueless bank customers. They were other hackers. And in trying to unmask the...

Top 25 dangerous software ...

MITRE AND THE SANS INSTITUTE have released their 2011 list of the top 25 most dangerous software errors. The software coding errors were ranked as the highest due to their ability to let hackers take over systems, steal data, or freeze up the software altogether to stop it from working. The threats are divided into three key areas – insecure interaction between...

Analysts calm fears of ind...

Fears over a recent malware outbreak described by one firm as “practically indestructible” have been quelled by other security analysts who noted there is a simple method to stop it spreading. Dubbed TDL4, the malware was the subject of a recent report from Kaspersky Lab which characterised the malware as “the most sophisticated threat...

LulzSec hacking group anno...

Lulz Security made its announcement through its Twitter account, giving no reason for its decision. A statement published on a file-sharing website said that its “planned 50-day cruise has expired”. The group leapt to prominence by carrying out attacks on companies such as Sony and Nintendo. Broadcasters Fox and PBS, the CIA, and the United States Senate...

LulzSec Releases Over 62,0...

Innocent accounts hacked, released. Rogue hacker group LulzSec is at it again, recently boasting on its Twitter that it had hacked the accounts of over 62,000 and provided a dump of emails and passwords free for download. CRO of F-secure, Mikko H. Hypponen, believes that the emails and passwords were from a database kept by website Writerspace.com, according to the...

Sony Ready To Move Past Ha...

Long before the iPod, there was the Walkman. Then, the CD, the DVD and Blu-ray. Over the decades, Sony has contributed to or invented some of the most significant consumer products in the world. Of course, the company is also in the entertainment business. Sony makes movies, the cameras to make movies, and the Blu-ray players and TVs people watch them on at home. It...

Hackers jailbreak iOS 5 in...

Like clockwork, hackers said they’ve removed the digital locks in the latest version of Apple’s iOS so it will run applications not officially sanctioned by the company. iOS 5 was unveiled on Monday, and a beta version was made available to a limited number of developers. Within hours, members of the iPhone Dev Team posted pictures that showed it had been...