Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Australian Pizza Boy Becomes ATM Hacker

captured_Image.png An Australian man has managed to escape a jail sentence despite admitting to stealing nearly AU$30,000 (around US $27,700) from ATMs. According to the prosecutors, he devised the attacks using information from an ATM repair manual found on the Web.

Brian Sommer, 23, from Bundaberg, Queensland, used to work in a pizza shop back in 2007, when he came across an ATM repair manual on the Internet. The document contained default passwords for accessing certain ATM models and information about their options.

The young computer enthusiast realized that he could use the information to access the hard disks of ATMs and alter the settings so that he could withdraw large amounts of cash. He put his idea to test for the first time on a service station's ATM and managed to walk off with $21,120. An hour later, he hit another automated teller machine in Hervey Bay and scored $7,500.

There was a flaw in Sommer's plan, though – it required the use of real credit cards. Therefore, in order to pull off several attacks over a period of seven months, the hacker used cards belonging to himself, his girlfriend, his mother, as well as two friends. This led the authorities knocking on his door.

More : news.softpedia.com

Technorati Tags: ,,
| Continue Reading..

Thousands of Hotmail passwords leaked online

Hotmail password leaked We has received information regarding a possible Windows Live Hotmail "hack" or phishing scheme where password details of thousands of Hotmail accounts have been posted online.

An anonymous user posted details of the accounts on October 1 at pastebin.com, a site commonly used by developers to share code snippets.

The details have since been removed but Neowin has seen part of the list posted and can confirm the accounts are genuine and most appear to be based in Europe. The list details over 10,000 accounts starting from A through to B, suggesting there could be additional lists. Currently it appears only accounts used to access Microsoft's Windows Live Hotmail have been posted, this includes @hotmail.com, @msn.com and @live.com accounts.

Neowin has reported this immediately to Microsoft's Security Response Center and to Microsoft's PR teams in the UK and US and we are currently awaiting feedback on the situation. As this is a breaking story please check back frequently as the story will be updated as soon as more information becomes available.

If you are a Windows Live Hotmail user Neowin recommends that you change your password and security question immediately.

Thanks to Chris for the news tip
Update: According to BBC News, Microsoft is currently "investigating the situation and will take appropriate steps as rapidly as possible."

Update 2: Microsoft has now fully confirmed our reports. According to a Microsoft spokesperson "over the weekend Microsoft learned that several thousand Windows Live Hotmail customer's credentials were exposed on a third-party site due to a likely phishing scheme. Upon learning of the issue, we immediately requested that the credentials be removed and launched an investigation to determine the impact to customers. As part of that investigation, we determined that this was not a breach of internal Microsoft data and initiated our standard process of working to help customers regain control of their accounts."

source: neowin.net

Technorati Tags: ,,
| Continue Reading..

Twitter : Koobface Worm Comes To Twitter

The new thread begin to follow on Twitter.

The Koobface worm, which had popped up on social networks, has begun to spread on Twitter.

Koobface, the worm that’s been spreading among users of social networks Facebook and MySpace, is now on Twitter. How many people have been affected in unclear, but it’s been serious enough to Twitter to issue a warning on Friday, and some infected accounts have been suspended.
The company said:
"Some users’ PCs have been infected with a variant of the Koobface malware. This malware sends bogus tweets when the user logs into Twitter."
"We are currently suspending all accounts that we detect sending such bogus tweets. If we suspend your account, we will send you an email notifying you of the suspension. This email also includes tips for removing the malware from your PC."
The problem comes from infected PCs that upload bogus Tweets, containing a link to a supposed video, but which is actually to one of a number of sites loaded with exploit code, according to The Register. Anyone installing the codec from the site becomes infected.

From : news.digitaltrends.com

Technorati Tags: ,,,
| Continue Reading..

Attacks on South Korean Internet Sites Resume for Third Day

Here the latest news about cyber attack in South Korean.

South Korean Internet sites came under attack from hackers for a third day as the government boosted security to counter intrusions that paralyzed some U.S. services yesterday.

The Web sites of Kookmin Bank and Daum Communications Corp. were being targeted in a new wave of attacks that resumed at 6 p.m. today in Seoul, computer security company Ahnlab Inc. said. The two Web sites were still offline as of 7:30 p.m.

The “highly organized” attacks may come from a state, the National Intelligence Service, or NIS, said today in a statement without naming a country. There is “speculation” North Korea orchestrated the barrage, Kwon Tae Shin, South Korea’s minister for policy coordination, said at a meeting of vice-ministers today in Seoul.

The attacks could be the most serious in South Korea since January 2003, when the “Slammer” worm slowed networks and crippled service, Ahnlab spokeswoman Hwang Mi Kyung said earlier.

South Korea’s NIS and Defense Ministry have previously accused Kim Jong Il’s regime of training a “cyber division” within the North Korean army. So far South Korea has never provided evidence to show the communist nation has hacked South Korean Web sites or disseminated viruses.

‘Cannot Rule Out’

“Of course we cannot rule out the possibility that North Korea is behind these attacks but it’s too early to draw conclusions from what we know so far,” Choi Hee Weon, a senior researcher at Korea Information Security Agency said of this week’s assaults. “It will take time to trace the origin of the attacks.”

South Korea’s Defense Ministry plans to spend 489 billion won ($382 million) next year to beef up its defense against cyber warfare, the ministry said in a budget report today.

The malicious script behind this week’s trouble works by commandeering remote computers and turning them into “zombies” that flood targeted Web sites with a large volume of data. The attacks may target seven organizations, including the Web site of South Korea’s Ministry of Public Administration and Security, Ahnlab said earlier today in an e-mailed statement. Korean- language Web portals known as Naver and Paran are also targeted.

“The level of the attacks were highly organized and meticulously planned, indicating a level of certain organizations or state,” the NIS said.

The U.S. departments of State, Treasury and Transportation were attacked by unidentified hackers during the July 4 holiday weekend, the same day North Korea test-fired seven missiles. In some cases the cyber attacks were continuing, the agencies said yesterday.

Escalating Provocation

If North Korea is behind the attacks it would mark an escalation of provocations against the U.S. and South Korea, Bruce Klingner, a Northeast Asia analyst at the Washington-based Heritage Foundation, said in a statement. Still, there is no “hard evidence” linking North Korea to the attacks, he said.

North and South Korea have been technically at war for more than half a century since their 1950-53 conflict ended without a peace agreement. The two nations exchanged military threats since the North testing a nuclear weapon on May 25, prompting United Nation’s sanctions.

Web sites of some government agencies and banks in South Korea were also attacked yesterday, following similar strikes on 26 sites on July 7, the Korea Information Security Agency said in a statement today.

Seven South Korean banks’ Web sites were paralyzed in the July 7 attacks, but have fully resumed operations, the nation’s regulator Financial Services Commission said today. The lenders suffered no losses from the attacks, it said, without naming them.

From : Bloomberg

Technorati Tags: ,,,
| Continue Reading..

Microsoft Working on Patch for IE ActiveX Vulnerability

Microsoft has warned of an Internet Explorer vulnerability involving its Video ActiveX Control that could let an attacker take control of a PC. Microsoft said the vulnerability affects Windows XP and Windows Server 2003.

It offered a workaround to the IE ActiveX hole that it said should also be used for Windows Vista and Windows Server 2008.

Microsoft Relevant Products/Services has warned of a vulnerability in its Video ActiveX Control that affects Windows XP and Windows Server 2003. The software giant said there have been limited attacks exploiting the vulnerability.

The flaw could be exploited by a visit to a malicious Web site and allow an attacker to take control of a PC. Microsoft said it is working on a security Relevant Products/Services update, and meantime advised that users prevent Microsoft Video ActiveX Control from running in Internet Explorer.

The steps to stop the control in IE are a bit complex, but Microsoft offers a "Fix it for me" option at http://support.microsoft.com/kb/972890.

Microsoft also recommends users of Windows Vista and Windows Server 2008 take these steps.

The Microsoft Video ActiveX Control connects DirectShow filters for video and is used in Windows Media Center. When the control runs in Internet Explorer, it can corrupt the system so that an attacker can run arbitrary code.

Security vendor Symantec said the vulnerability affects IE6 and IE7, but not IE8.

| Continue Reading..

Ex-boyfriend convicted of stalking Marin woman and hacking into her computer

After more than three years of legal maneuvering, a Las Vegas man was convicted of stalking a Corte Madera woman, breaking into her home and hacking into her computer.

Robert Charles Sudar, 56, faces up to 10 years in prison when he is sentenced Sept. 9 before Judge Paul Haakenson.

Sudar, who was free on bail during the protracted case, was booked into Marin County Jail late Tuesday afternoon, shortly after a jury convicted him of all counts. His bail is set at $1.5 million.

"It's the best possible outcome," said Deputy District Attorney Yvette Martinez, who prosecuted Sudar.

Sudar, a computer technician, was first arrested Nov. 26, 2005, after the Corte Madera woman told police a man she dated for about a year was stalking and harassing her.

The woman said the ex-boyfriend, who had helped set up a computer in her home office, might have set up wireless access to the computer and was using it to monitor her computer activity.

The woman later left a wireless remote camera in her home office while she went out for the evening. The camera captured the image of Sudar entering the room and using the woman's computer, police said.

Police later arrested Sudar after a brief chase on Lucky Drive and searched his car, seizing binoculars, computer connection wires and storage devices, a Palm Pilot and mobile disk drives.

Numerous counterfeit items, including a passport, were found in a backpack along with photographs

Advertisement

belonging to the woman, police said.

Sudar was released on bail, but he was arrested again the next year after police saw him driving around the victim's residence, a violation of a court protective order. He posted bail again.

Through attorney changes and legal motions by Sudar, the case dragged on for years, finally reaching trial in early June. On Tuesday afternoon, after one day of deliberations, the jury convicted him of stalking, residential burglary, unauthorized computer hacking, receiving stolen property and eavesdropping, Martinez said.

Sudar's lawyer, David Wise, could not be reached for comment Wednesday.

From : mercurynews

Technorati Tags: ,,,
| Continue Reading..

FBI: Top 10 Internet Auction Fraud (CyberCrime)

The latest report of the Internet Crime Complaint Center shows auction fraud is the number one complaint.

According to the FBI,  one in every four Internet crime complaints in 2008 involved auction scams such as wire transfer schemes, second-chance schemes and overpayment fraud.

FBI Internet Crime

The FBI has a great breakdown of the schemes and how to avoid being victimized. Check out the FBI link below .

Info:  

http://www.fbi.gov/page2/june09/auctionfraud_063009.html

Technorati Tags: ,,,,,
| Continue Reading..

Michael Jackson Malware

captured_Image.pngThere has been a couple of malware attacks that have tried to use the news coverage of the death of Michael Jackson as the lure to get people infected.

Last night we saw this one: a file called Michael-www.google.com.exe. This file was distributed through a site called photos-google.com and possibly also through photo-msn.org, facebook-photo.net and orkut-images.com. Do not visit these sites.
When executed, Michael-www.google.com.exe drops files called reptile.exe and winudp.exe. These are IRC bots with backdoor capability. The file also shows this fake error message:captured_Image.png We detect the dropper and the backdoors as Trojan.Win32.Buzus.bjyo.

From : F-Secure

| Continue Reading..

Download Free-Trial : Kaspersky Internet Security 2010 9.0.0.459

Has everything you need for a safe and secure Internet experience.

The Kaspersky Internet Security 20010 application was designed to be a all-in-one security solution that offers a worry-free computing environment for you and your family. Kaspersky Internet Security 2010 has everything you need for a safe and secure Internet experience.

Here are some key features of "Kaspersky Internet Security":
Essential Protection:
· Protects from viruses, Trojans and worms
· Blocks spyware and adware
· Scans files in real time (on access) and on demand
· Scans email messages (regardless of email client)
· Scans Internet traffic (regardless of browser)
· Protects instant messengers (ICQ, MSN)
· Provides proactive protection from unknown threats
· Scans Java and Visual Basic scripts
Extended Protection:
· Two-way personal firewall
· Safe Wi-Fi and VPN connections
· Intrusion prevention system
· Intelligent application management and control
· automatically configured application rules
· security rating is assigned to unknown applications
· access to the user’s resources and data is restricted for unknown applications
and more.. Its 30 days trial, Get Download link here :  From Softpedia

Or more here : Softpedia 

| Continue Reading..

Hackers launch phishing attack on Facebook users

Quoted from Reuters (05/15/2009) that Hackers launched an attack on Facebook's 200 million users on Thursday, successfully gathering passwords from some of them in the latest campaign to prey on members of the popular social networking site.

Facebook spokesman Barry Schnitt said on Thursday that the site was in the process of cleaning up damage from the attack.

He said that Facebook was blocking compromised accounts.

Schnitt declined to say how many accounts had been compromised.

The hackers got passwords through what is known as a phishing attack, breaking into accounts of some Facebook members, then sending e-mails to friends and urging them to click on links to fake websites.

Those sites were designed to look like the Facebook home page. The victims were directed to log back in to the site, but actually logged into the one controlled by the hackers, unwittingly giving away their passwords.

The purpose of such attacks is generally identify theft and to spread spam.

The fake domains include www.151.im, www.121.im and www.123.im. Facebook has deleted all references to those domains.

Schnitt said that Facebook's security team believes the hackers intended to collect a large number of credentials, then use those accounts at a later time to send spam hawking fake pharmaceuticals and other goods to Facebook members.

The site fought off a similar attack two weeks ago, he said.

Privately held Facebook and rival social network MySpace, which is owned by News Corp, require senders of messages within the network to be members and hide user data from people who do not have accounts. Because of that, users tend to be far less suspicious of messages they receive.

Hackers used a phishing attack last year to spread a malicious virus known as Koobface (a reference to Facebook). It was downloaded onto Facebook members' PCs when they clicked on a link sent to them in an email that looked like it had been sent by a friend on Facebook.

Technorati Tags: ,,
| Continue Reading..

iTunes Gift Card worth USD200 for sale USD3

iTunes Gift Card Hacked California - The hacker continue to seek profits in a way that is wrong. Recently, a site in China, selling iTunes gift card worth USD3, the original price is USD200.

At a site called Taobato which is the largest auction site in China that similar e-Bay to sell an iTunes gift card at no less than USD3, while the original self worth USD200. By the managers, users who purchase the card is given a code that can be 'cut through' to your iTunes.

Obviously this makes the user-group purchased the card that is genuine but counterfeit. Many of those who bought it, then sell it again with a price that is still below the authorized price. So that as quoted from PC World, Thursday (12/3/2009).

Until now Apple have not provided official information, the code in the online store have been hack by a hacker. Also not yet known exactly, is that code can be used by customers domiciled in the United States.

iTunes Gift Card itself works as a gift card that we give to friends or family as a credit to shop in the iTunes Store. iTunes Gift Card Rate voucher number as mobile phone voucher that we met in the regular shops, means of communication.

Technorati Tags: ,,
| Continue Reading..

Symantec hit by hack attack on website

The website of security specialists Symantec was hacked into recently by a Romanian ethical hacking group known as HackersBlog.
Taking advantage of a SQL injection vulnerability in a section of Symantec’s EMEA site, the hacker was able to gain unauthorised access to the company database.

“The irony of the situation is that it’s done on https , on a login page , a page that promotes security products like Norton AntiVirus 2009 and Norton Internet SECURITY,” the hacker, going by the name of unu, revealed.

Unu has decided not to release any further details in order to give the prominent security software provider time to patch the vulnerability.
The attack is the latest in a series of successful hack-and-shame attempts by HackersBlog members on prominent security vendors, including Kaspersky, F-Secure and BitDefender.

Kaspersky went on record a few days ago to confirm that the data breach on its US website last week did not expose any customer information.

Source : arabianbusiness.com

Technorati Tags: ,,
| Continue Reading..

Microsoft offers $250,000 to nab author of Conficker worm


Microsoft has announced a $250,000 reward for information leading to the arrest of those responsible for an internet worm that has been infecting more than two million computers a day for the past five days.

The company said in a news release Thursday that it has also joined forces with several major organizations and firms in the industry an effort to stem the spread of the Conficker or "Downandup" worm, which infects computers running various versions of Microsoft Windows, especially those that have not been patched with a security upgrade issued by Microsoft in October.

Norton Antivirus maker Symantec Corp. said Thursday that in the past five days, an average total of 2.2 million IP addresses have been infected with two different variants of the worm, which was first noticed on the internet in November.

The worm disables Windows security features and makes the computer part of a "botnet" of other infected computers that take orders from a varying series of servers on the internet. As such, it may gather personal information, install malicious programs on the computer, and attack or infect other computers.

The Internet Corporation for Assigned Names and Numbers (ICANN), the organization that ensures each computer on the internet has a unique identifier, is working with Microsoft and internet security firms to help disable servers used by Conficker.

Unlike some other worms, Conficker doesn't require any user intervention to spread, and that makes it harder to stop, said Richard Reiner, founder and CEO of Assurent, a company and specialized in studying and managing technology security vulnerabilities and was later bought by Telus.

Source : CBC

| Continue Reading..

Download Windows 7 Antivirus from AVG, Kaspersky and Symantec


Just as it was the case with Windows Vista, the mitigations introduced by Microsoft alone in Windows 7 are not sufficient to bulletproof the operating system on their own.

While security for Windows 7 is not a new subject, as you have been able to already read materials on this subject, fact is that following the release of the first Beta for the next iteration of the Windows client, I have seen questions from users related to how they could protect themselves best. Microsoft is indeed providing, in collaboration with members of the security industry, solutions designed to integrate with Windows 7, even if the operating system is in Beta.


Brandon LeBlanc, Windows communications manager on the Windows Client Communications Team, revealed that Microsoft had been hard at work attempting to get security providers to offer anti-virus for Windows 7. No less than three companies have rushed to Microsoft's call, and are offering their products even if Windows 7 is still in Beta.

“The following anti-virus solutions are available [for Windows 7]: Symantec offers the Norton 360 3.0 Beta, which works on the Windows 7 Beta; AVG offers AVG Internet Security and AVG Anti-Virus that works with the Windows 7 Beta; Kaspersky is offering a technical preview of Kaspersky Anti-Virus for Windows 7. It is great to see that these partners were able to have their solutions working so early in our development process,” LeBlanc added.

Norton 360 3.0 Beta is available for download here.

VG Antivirus Professional 8.0 is available for download here.

AVG Internet Security 8.0 is available for download here.

Technical Preview Kaspersky Anti-Virus for Microsoft Windows 7 is available for download here.

source: softpedia.com


| Continue Reading..

Ministries in Bulgaria and New Zealand Fight Computer Viruses

The Bulgarian Interior Ministry and the Health Ministry in New Zealand are being confronted with virus outbreaks on their computer networks. The infections have hindered the normal operations in several departments.

Bulgaria's Minister of Interior, Mihail Mikov, announced that an unnamed computer virus had spread on the nationwide computer network operated by the ministry. According to him, operations that required heavy use of computer systems, such as the issuing of identity documents or the activity of the traffic police, had been most affected.

The outbreak seems to have originated in the network of Sofia's Direction of Interior Affairs, and the incident escalated last Thursday when parts of the computer infrastructure had to be isolated. The Ministry is in process of cleaning the virus from its network, but, according to Mr. Mikov, the action is advancing at a slow pace because each computer has to be checked and cleared individually.

“Things like that happen not only here, other countries have had the same problem as well,” the Minister of Interior commented, and he was right, as at almost the same time, in another part of the world, the New Zealand Minister of Health was fighting a mutating computer virus.

Alan Hesketh, deputy director general of New Zealand's health information directorate, noted that the  e-mail system had to be shut down in order to contain a computer virus outbreak that had wrecked havoc the Ministry's network the past week. Some other external services might also be affected, Mr Hesketh noted, but he gave assurances that no payments made through the Ministry's Proclaim system had been compromised.

The ministry is having trouble with handling the infection, because the virus has mutated to a new, more resilient variant. “The virus has mutated, Variant B has arrived. We actually have a way of removing variant A off our systems, so we are confident we can figure out how to get this new variant off as well. We are working with the vendors to get this procedure in place,” an internal advisory read, according to Computer World New Zealand.

The virus has not been named, probably for security reasons, but it's said to be causing blue screens on affected computers once every five minutes. Symantec, who's products are being used by the Ministry in order to protect its network, have been contacted in order to help with the containment efforts.

We recently reported that the U.S. Army was confronted with a similar outbreak, which led to a temporary ban of all removable media devices on its networks. Three London hospitals also had to deal with a virus spreading through e-mail on their common computer network.

Source : news.softpedia.com

Technorati Tags: ,
| Continue Reading..

Iranian hackers bring down Mossad web site

They did it to protest the ongoing Israeli onslaught on the Gaza Strip.

A group of Iranian hackers have managed to bring down the Israeli secret service's web site and the site had to stop its activity for several hours, Iranian media launched information.

Ashiyaneh, a group of Iranian hackers announced they had carried out the cyber attack against Mossad's web site to protest the ongoing Israeli onslaught on the Gaza Strip.

The web site was down more than two hours and the Israeli intelligence service  failed to resume the function of the Web site.

Source : anspress.com

Technorati Tags: ,,
| Continue Reading..

Malaysia Consider Cyber Court

Kuala Lumpur - The number of the virtual world of crime continued to increase in Malaysia. This country began to consider to create a special court to deal with internet cyber crimes..

Disclosed by the Minister of Communications Shaziman Abu Mansor, as quoted from AFP, on Tuesday (6/1/2009), there are more than 30 cases related to the Internet are registered in the Malaysian judiciary majestic in the last three years.

"If later we have not able to handle more, because too many cases, we may need a cyber court," said Shaziman.

Further disclosed by Shaziman, at this time the police investigate a case of blog publishing content that is considered to attack Islam and Prophet Muhammad.

So far, Malaysia is known as a strict state control in the media. According to the Reporter Without Borders, Malaysia to position-124 of 169 countries in the world in press freedom index.

Technorati Tags: ,,
| Continue Reading..

Pro-Gaza hackers target Israeli websites

A number of frequently-visited Israeli websites have been defaced amid indications of an imminent full-scale ground offensive into Gaza.
Since an Israeli military campaign against the Gaza Strip began on Saturday, various Israeli websites have come under cyber attack.

The widely-circulated Israeli daily's website, Ynetnews.com, has been defaced and is now a picture guide to the progressive takeover of Palestinian land by settlers since 1946.

The website, which is widely acknowledged as pro-Zionism, also draws parallels between the US conduct in Iraq and the Israeli siege on Gaza with a picture showing Palestinian victims of Israeli attacks above an image of American soldiers torturing detainees in Abu Ghraib prison.

Hackers also hacked into the Bank Discount website on Friday, according to Ha'aretz, publishing further messages in condemnation of Israeli crimes.

Bank officials responded by assuring customers that their accounts had not been touched.
The number of websites defaced since the Saturday air operations against the Gaza Strip has reportedly been in the thousands with small businesses and vanity websites having been affected most.

"RitualistaS GrouP Hacked your System!!! The world isn't insurance!!! For a better world," PC World quoted the website of Israel's Galoz Electronics Ltd as reading after it was hacked on Wednesday.

One hacker, called Cold Z3ro, claims to have hacked nearly 5,000 webpages, says Gary Warner, the director of research in computer forensics with the University of Alabama at Birmingham.
According to the forensics expert, the majority of hacking groups operate out of Morocco, Lebanon, Turkey and Iran.

Israel began air operations against the Gaza Strip -- home to 1.5 million Palestinians -- on Saturday. The attacks have so far left over 430 Palestinians dead and more than 2250 injured.

Israel says through its military campaign, it seeks to topple the Hamas movement, which took control of the Gaza Strip in June 2007 after winning the Palestinian Legislative Council (PLC) elections in January 2006.

In retaliation to the attacks on Gaza, Hamas has been launching rocket strikes against Israel. Unlike the state-of-the-art weapons and ammunition Israel holds, the homemade Qassam rockets rarely cause casualties.

Source : presstv.ir

Technorati Tags: ,,,
| Continue Reading..

VeriSign drops vulnerable certificate algorithm

The provider of Internet trust assurances said it was transitioning from MD5 to the SHA-1 algorithm for its new RapidSSL brand certificates. It also pledged to reissue any RapidSSL certificates created with MD5, using SHA-1.

Earlier this week, several teams of researchers presented research at the Chaos Communication Congress in Berlin about MD5 problems.

The researchers included independent ones from California, as well as teams from the Centrum Wiskunde & Informatica (CWI) and Eindhoven University of Technology in the Netherlands, and the Ecole Polytechnique Federal de Lausanne in Switzerland.

The researchers were able to generate two messages with one digital signature, using MD5. Digital certificates are supposed to have unique signatures. Four years ago, Chinese researchers first identified the vulnerability when they created a similar collision attack.

Researchers had estimated it would take more than 30 years of computer processing to generate such a fake certificate.

But the paper presented in Berlin showed there are more efficient ways. Using more than 200 Sony PlayStation 3 video-game machines in a cluster, the latest research effort was able to generate two fake messages with the same digital signature in only three days.

Observers had differing opinions on the impact of the research. The head of computer security at British Telecom, for instance, told news media that most people don't rely on digital certificates anyway.

But many others suggested the impact could be enormous. Although only some sites are using the older digital certificates, all browsers accept them.

When visiting Web sites, a locked padlock in a browser corner is intended to indicate to the user that the site uses digital certificates issued by one of several trusted certificate authorities, such as VeriSign.

(Source: NewsFactor)

Technorati Tags: ,,
| Continue Reading..

Software Executive Sentenced for Hacking

The president of a U.S. software company has been sentenced to probation after pleading guilty to stealing password-protected files from a competitor.

Jay E. Leonard, 61, was sentenced to 12 months supervised probation and a US$2,500 fine after pleading guilty to one count of unauthorized access to a protected computer, a misdemeanor charge.

Leonard is the owner of Boulder, Colorado's Platte River Associates, a company that builds software used in petroleum exploration. He illegally accessed a password-protected area of the Web site belonging to his company's competitor Zetaware, according to a plea agreement filed in the U.S. District Court for the District of Colorado.

One week later, he chaired a company staff meeting in which "a tentative plan was discussed to exploit and to unlawfully utilize the downloaded Zetaware files for the economic gain of Platte River Associates," the plea agreement states.

Zetaware CEO Zhiyong He was tipped off to the intrusion by a confidential source, which he then reported to the U.S. Federal Bureau of Investigation (FBI), court filings state. In an interview Monday, he said he is not sure how Leonard was able to access his Web site, but that he believes that he may have been given a password.

He said that one of Leonard's employees may have turned his boss in. He knew Leonard professionally and was "very surprised" by the incident, he said.

Leonard accessed the Zetaware site from a Sprint wireless network at Houston's George Bush Intercontinental Airport, located near Zetaware's headquarters, the plea agreement states.

In a separate case, Platte River Associates is also facing charges of "trading with the enemy," for allegedly allowing its software to be used to evaluate oil and gas development opportunities off the shore of Cuba, which is under a U.S. trade embargo. "The company has expressed an interest in pleading guilty," in that case, although no plea has been accepted by the judge, according to Jeffrey Dorschner, a spokesman for the United States Attorney's office prosecuting the two cases.

Leonard and his attorney did not return calls seeking comment for this story.

Source : pcworld.com

Technorati Tags: ,,
| Continue Reading..

Enter your email address:

Delivered by FeedBurner

Followers