In some sense, cyber attacks are no different that physical world attacks; in other ways, they are completely different. Let’s assume that you did not physically catch some bad guys that broke into a building. Do you know who broke in? On rare occasions they leave something behind – there have been instances so rare […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Unlike the Sony breach in November, the group that took down Sony’s and Microsoft’s game network on Christmas (see article) seems to be very interested in getting attention. Hopefully enough so that the FBI finds them, but that is another story. What is more important is that the people who did this, according to Brian […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A presentation at the Chaos Communication Congress (a large hacker convention in Hamburg, Germany that attracted about 10,000 visitors this year – sort of, kind of, like Defcon here) demonstrated the ability to reproduce fingerprints of a target subject from just photographs. Reports in PC Magazine say that the researcher, Jan Krissler, took photographs of Ursula von […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Der Spiegel wrote an article on efforts by the NSA and GCHQ (their British equivalent) to crack encryption of various sorts. Take the article at what it is worth; it is based on documents that Snowden released, so it is a little bit old. I apologize that this post is pretty long, but there is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This is the time of year that people make lists, so I will also. These are not in any particular order, but the total is pretty amazing. I had already forgotten some of these — Michaels and its subsidiary Aaron Bros Art Framing (January) – 3.4 million records, credit and debit cards information from their […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Seems far fetched, but it is not. Of course, it is expensive. It took Stephen Hilt almost two weeks and $400. Of course that is the “quantity one” price. With a little work and volume, the price would go down. Dark Reading is reporting that Stephen, who works for the industrial control security firm Digital […]
Continue reading →
[DISPLAY_ACURAX_ICONS]