Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Friday, February 17, 2012

Sesame Street's YouTube Account Got Hacked with Porn Videos [Hacking]

By Casey Chan Oct 16, 2011 8:25 PM 17,569 60

Sesame Street's YouTube Account Got Hacked with Porn VideosSesame Street's YouTube was hacked earlier today by people who replaced Muppet clips with graphic porn. It apparently took Google more than 20 minutes to react to the hack, which means porn was floating around on the iconic children's TV show channel.

PBS and Google haven't said anything but according to CNN, a message posted on the Sesame Street YouTube account "claimed responsibility in the names of two other YouTube users". One of those users who supposedly "claimed responsibility", however, has denied any wrongdoing. His account, MrEdxwx, said:

"I did not hack Sesame Street. I am an honest YouTuber. I work hard to make quality gameplay videos, and most important I respect the community guidelines."

No one else has claimed responsibility for the hack. [CNN, Image Credit: TNW]

Related Stories

View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Saturday, February 11, 2012

How to Hack the New Road Signs [Hacking]

By Jesus Diaz Oct 10, 2011 10:44 AM 16,640 46

How to Hack the New Road SignsWe knew hacking road signs was easy, but they changed the control boxes in the latest models and nobody knew to handle those—until now. Here's the manual, so you can warn people of zombies and raptors ahead.

It contains complete instructions on how to change the messages, as well as the default passwords, which of course they never change. Or maybe—hopefully—they would change them after this article. [Manual (PDF in ZIP file) —Thanks James!]

You can keep up with Jesus Diaz the author of this post, on Twitter or Facebook. Related Stories

View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Tuesday, September 13, 2011

This Cheap Air Drone Can Break Into Your Computer and Own It [Hacking]

This Cheap Air Drone Can Break Into Your Computer and Own ItThis must be the holy grail of hacking: a cheap, do-it-yourself flying drone that can break into Wi-Fi networks and turn computers into zombies that can be controlled remotely. The coolest part for evildoers: it makes the hacking untraceable.

The SkyNET drone is a modified $300 Parrot quadcopter with a Linux computer, 3G card, a GPS unit and two Wi-Fi cards. This is how it works:

Controlled by a botmaster using 3G, the drone or group of drones fly over any urban area looking for Wi-FI networks. As they find them, they automatically try to break in. Once they get inside the network, it searches for personal computers that can be compromised. Any computer that falls to the attack gets turned into a zombie without the user ever knowing it.

After the infection process, the hackers can easily control the zombies remotely through the Wi-Fi drone-to-host connection. The zombies can be used to perform any attack through their internet connections, receiving commands from SkyNET but with no traceable internet ties to the hacker botmaster:

Subsequent drone ?ights are used to issue command and control without ever linking the botmaster to the botnet via the Internet. Reverse engineering the botnet, or enumerating the bots, does not reveal the identity of the botmaster.

It's a perfect idea. Total cost: a mere $600. Anyone can easily build a complete fleet of these.

Also, words words words Sarah Connor words words Terminators hah hah words. [SkyNET Paper (PDF) via Cnet]

Related Stories

View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Sunday, September 11, 2011

That Anonymous Cop Leak Was Much Worse than We Thought [Hacking]

That Anonymous Cop Leak Was Much Worse than We ThoughtWhen Anon stuck their finger in the eye of many a Texan cop with their huge 3 GB data dump, we were more interested in the bigoted juicy stuff. Turns out, it was also an identity thief's wet dream.

Security firm Identity Finder ran a detailed analysis of the leaked goods, and came up with some astonishing stats—within the cache was enough to steal a hell of a lot of money:

•647 Social Security Numbers, of which 418 were unique;
•42 Credit Card and Bank Account Numbers, of which 26 were unique;
•174 Passwords;
•83 Driver License Numbers;
•6,182 Dates of Birth;
•78,869 Phone Numbers, of which 14,701 were unique;
•10,175 Personal Postal Addresses, of which 4,631 were unique; and
•325,596 e-mail addresses, of which 39,419 were unique.

Put this together and you have everything you need to take out a fake credit card in some deputy's name, as well as locational information that would help with something more nefarious. It's easy to dismiss these leaks as the equivalent of a bunch of kids running away with armfuls of Halloween candy, but we shouldn't forget the kind of highly sensitive stuff that can be extracted with ease. All those cops in Texas sure aren't going to forget.

Related Stories

View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Real-Life Crime Victims Are Also More Likely to Be Victims of Online Crime [Hacking]

Real-Life Crime Victims Are Also More Likely to Be Victims of Online CrimeNorton put out a study on cybercrime, deducing that people who fall victim to acts of real-worl crime, such as burglary or robbery, are also more likely to have their identity stolen or fall victim to a phishing scheme.

According to Lifehacker AU, the report, which canvassed 20,000 people, says that while there is an increased there's no direct correlation between the two. But it makes sense: if you're not so smart and savvy in the real world, chances are you wont be so smart and savvy in the online one either. [Lifehacker AU via Lifehacker]

Image via Shutterstock/Pedro Miguel Sousa

Related Stories

View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Friday, September 2, 2011

Anonymous Roars Back With 3GB Leak of Texas Police Chief Emails: "That stupid bitch got what she deserved" [Hacking]

Anonymous Roars Back With 3GB Leak of Texas Police Chief Emails: "That stupid bitch got what she deserved" Anonymous, after a relatively large period of doing nothing, are back with a vengeance. Even without their (arrested) de facto leader Topiary, they've punched Texan law enforcement squarely in their gut: a giant email leak, internal documents, addresses. Anon's back.

Anon explains the motives for the attack thusly:

We are doing this in solidarity with the "Anonymous 16" PayPal LOIC defendants, accused LulzSec member Jake Davis "Topiary", protesters arrested during #OpBart actions, Bradley Manning, Stephen Watt, and other hackers and leakers worldwide.

But really, it's Topiary's arrest more than anything. That cut of the hydra counted for more than one head, and they've been hurting (and quiet) ever since. Or at least that's how it's seemed. Now, Anon says they've been spending the time dormant in Texan police servers, preparing for this moment—a huge data dump and a site defacement.

Unsurprisingly, there's some damaging stuff in there—beyond the fact that this was all supposed to be private law enforcement dialogue.

Exhibit A, an email from Robert Wieners Chief of Police, Friendswood, Texas Police Department. Subject line? "Stupid Bitch":

That stupid bitch who started that stolen car chase at Yale and 610 got what she deserved (I'll bet she was fat and black too). Same with that pervert that got shot by the county. Fuck that guy, see ya. That all sounds like good police work to me. Those folks got the criminal cure. It's guaranteed, they will never commit a crime again.

Literally, the first email in the leak is racist.

Exhibit B, this bigoted chain message regarding "Muslim inbreeding." Yeah.

Subject: 1,400 years of inbreeding among Muslims
Attachments:
View As Web Page
GUYS,
I DO BELIEVE THAT THIS GUY IS ONTO SOMETHING!!

JESS

Subj: 1,400 years of inbreeding among Muslims

Read the article and make up your own mind. JHB
Hi everyone, this very interesting one came in tonight maybe it explains some of why the radical Muslims act so unreasonably brutal. Are the fact true? Don't know but if it is true that they have as a common practice of marrying first cousins, all kinds of problems can erupt. OK, I looked at all my "hoax sites" but couldn't find anything. But, just typing "1,400 years of inbreeding among Muslims" on Google results in a large number of articles discussing this topic. Is Bryan Fischer for real? Yep, See: http://en.wikipedia.org/wiki/Bryan_Fischer and other sites about him.
Doc <°)))><

Anyway, here's the article that came in:

I admit that I have not studied the Koran or Quroan or whatever it is, nor do I intend to !! I was subjected to enough of of their total nonsense as only a casual observer in their part of the world :( .... I only forward this for your reading pleasure and to add to our understanding of the Muslim world. Sharing my opinion that they need to stay in their own sandbox instead of trying to inflict their insane beliefs and religion upon civilized people. (Shucks, now they will call me an infidel)
..... JD

Other questionable content includes the use of homophobic language, and this request for the Texan chiefs to investigate an officer's affair with a married woman. Tax dollars at work:

From: Doug Lauersdorf Sent: Thu 9/16/2010 10:06 AM
To: Bob Wieners; Luke Loeser
Cc:
Subject: Complainant
Attachments:
View As Web Page

Chiefs:

I conducted a preliminary inquiry into information received from Detective Price who received a call from Mr. Clements wanting us to know that one of our officers on midnight shift was having an affair with his wife. He also complained that the officer had run his criminal history. I asked KC to contact DPS to research their database to ascertain any person(s) that had ran his information to obtain information from any of the following: CCH, TDL, NCIC, TCIC, SETCIC, etc. The search revealed that the only person with the Friendswood Police Department that had run him was Elaine who had ran the information at KC’s direction at my request. This matter is mute until the time comes when he initiates the complaint process and provides us with the officer’s name.

Sergeant Douglas E. Lauersdorf

The dump is enormous, and contains multitudes. And it makes me feel like it's Summer again—Anonymous looks as zesty and unafraid as they were before the cops neutered their leadership. Now it's #chingalamigra and #antisec all over again.

You can keep up with Sam Biddle, the author of this post, on Twitter, Facebook, or Google+. Related Stories

View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Wednesday, August 31, 2011

RankMyHack Gives You Achievement Points for Your Ballsiest Cyber Attacks [Hacking]

RankMyHack Gives You Achievement Points for Your Ballsiest Cyber Attacks2011 has seen some of the most brazen, daring cyber attacks to date, from the Arizona police to BART quite recently. It's a bad time to be a eve a medium-sized name on the net. So let's turn this into a game, shall we?

RankMyHack.com is an old-fashioned leaderboard for the "hacking elite." After singing up, you get points by breaking through the defenses of bigger and badder companies and organizations. Player can put out bounties on sites who they perceive as evil or just plain fun to mess with. And you can also challenge other members to dueling matches with their own time limits and stakes. It's all very in-depth and immersive... and even a little scary.

Not that think this so called gamification of hacker culture is going to bring down civilization as we know it. But having explored the site a little bit, one can see that with the right tools and some guidance you can start racking up points and making a name for yourself. Remember the single French girl who hacked her way into BART a few weeks ago. She said it was easy. A site like this could potentially give people a target to aim their blossoming hacker skills at.

Or, you know. Groups could, conversely, check out the site themselves and see if they should start beefing up their security in a hurry. [Washington Post]

Image Credit: dyoma/Shutterstock

Related Stories

View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.

Thursday, August 25, 2011

Hackers Used Google to Steal Social Security Numbers from 43,000 Yalies [Hacking]

Hackers Used Google to Steal Social Security Numbers from 43,000 YaliesHackers accessed personal information from 43,000 faculty, staff, students and alumni of Yale University all through Google. It's called dorking. Specifically, Google dorking. And it's scary easy what you can do.

Thieves found an unprotected FTP server containing the names and social security numbers of the 43,000 yalies by just using Google's FTP search function. Mike Lloyd, chief scientist at RedSeal a security firm, thinks that by having Google around, hackers don't even have to be that creative:

"Most victims are targets of opportunity. Chances are that anyone who got the data from Yale wasn't looking for Yale."

I thought I was good at the Google but these Google 'dorks' are even better. They've set up a whole database (which can be found here) that can be used to get started. As awesome and indispensable as Google has been to our lives, they need to patch up these holes pronto. [USA Today, Image Credit: Shutterstock]

Related Stories

View the original article here


This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.