hacking

Sony Pictures hack spawns FBI warning, pulls in Mandiant

Sony Pictures hack spawns FBI warning, pulls in Mandiant

After a widespread hacking incident aimed at Sony Pictures earlier this month the company has been forced to bring in FireEye Inc's Mandiant forensics unit to help rid them of their mess. This is a professional computer systems repair group that specializes in security, making clear that this isn't just a run of the mill attack. The FBI has also taken action, letting loose a warning packet earlier this week and launching an investigation into the matter. This attack was also quite likely responsible for the leak of several unreleased top-name movies in the past week.

Continue Reading

Sony Pictures movies leaked online following network hack

Sony Pictures movies leaked online following network hack

Following the news last week of the hacking of Sony Pictures' network by a group calling themselves "#GOP," or Guardians of Peace, DVD screener copies of several of the studio's movies have been leaked online. As was previously reported, the hackers threatened Sony with a list of unspecified demands, saying sensitive data would be released if the movie studio didn't cooperate. It appears that this could be the first of such leaks.

Continue Reading

Syrian Electronic Army hacks Walmart, media sites

Syrian Electronic Army hacks Walmart, media sites

The Syrian Electronic Army, which has pulled off a bunch of often annoying hacks in the past, has been relatively quiet in recent times. That ended on Thanksgiving, when the collective posted a tweet referencing the holiday and users across the global began seeing popups from the SEA appears on several websites. Multiple media websites were affected, including CBC.ca and The Boston Globe, as well as Wal-Mart's Canadian website. Though no user data is known to have been compromised, many users were redirected to the hackers' logo, according to Reuters.

Continue Reading

Sony Pictures hack tipped as an inside job

Sony Pictures hack tipped as an inside job

Sony Pictures was swept up in a widespread attack recently, something that came to light after a screenshot of a compromised computer in one of the company's offices was posted to Reddit. Through that screenshot we saw mention of some unspecified demands and a threat to leak data if the demands weren't met. That has spawned different tidbits of information coming from different sources alleging knowledge of or access to the situation, the most recent of which suggests the hack was, in part at least, an inside job.

Continue Reading

Sony Pictures network hacked, data held for ransom

Sony Pictures network hacked, data held for ransom

Sony Pictures has been hacked, it is being reported, with the company's computer network in New York and other unspecified locations around the globe being taken over by some group referring to itself as "#GOP". The company has reportedly shut down all of its computers in Los Angeles as a precaution, and is investigating the matter. In the course of things, a screenshot of the hack has been made public by an anonymous source, and we have it after the jump.

Continue Reading

Regin malware: three things you need to know

Regin malware: three things you need to know

Today the folks at Symantec have reported their discovery of the malware known as Regin. This software is detected by Symantec and Norton products as "Backdoor.Regin", and it seems clear that given the complexity of the hack, a nation state is likely responsible for its creation. This software is extremely "low key", meaning it can remain undetected for several years in a system, and even if it IS detected, it's not always possible to find out what its been up to.

Continue Reading

Craigslist was down: a short interview with the hacker blamed for it

Craigslist was down: a short interview with the hacker blamed for it

Overnight Craigslist experienced some down time in the form of a hacker redirect. Today we've had a short chat with one of the hackers blamed for the mess, along with word on his most recent project as a musician called YTCracker - a project we've also covered very recently. It would seem that it's no coincidence that one event happened right on top of the other - it might also be no coincidence that 15 years ago today, YTCracker broke into NASA's webpage for the Goddard Flight Center, vandalizing it with a warning for US government to beef up security.

Continue Reading

Apple on Masque Attack: ‘just use the App Store’

Apple on Masque Attack: ‘just use the App Store’

Earlier this week, we told you about Masque Attack, which let hackers sideload apps onto your iDevices. Often without you even realizing it, an app was loaded, and scary people somewhere else could gain access to your information. The app loaded may not have even been the app you were looking for when you followed the link, either. Now, Apple has issued a response to the report. We gotta say, it’s about what you’d expect from Apple, and full of common sense, too.

Continue Reading

Windows Phone surprisingly survives HP Pwn2Own contest

Windows Phone surprisingly survives HP Pwn2Own contest

You can say what you want about Microsoft's mobile platform, but apparently, Windows Phone is a rather tough nut to crack. This revelation came on the second day of HP's Pwn2Own hacking contest, with this round targeting browsers of mobile devices. One contestant tried to gain control of the phone by attacking the browser but ultimately failed to break through the sandbox. That said, there was still some access gained, so Windows Phone didn't completely emerge unscathed, surviving with just some war wounds and probably a bit of pride.

Continue Reading

Notorious hacker’s password was his cat’s name

Notorious hacker’s password was his cat’s name

The warning is a common one: choose a strong password. Don't use "password" as your password. Don't use "123456" as your password. Yet every year a report or two surfaces showing those and dozens like them are the passwords of choices for users across the globe, not to mention passwords that are easy to guess once you know something about the user. One would expect hackers to be a collective well-versed in the need to choose hard-to-guess passwords, but even hackers make mistakes.

Continue Reading