hack

Tue
05
Jul
Dennis Faas's picture

Twitter Hackers Report Obama Dead

Fox News has reported that one of its Twitter accounts was recently breached by hackers. The hacked account was then used to post fake reports that President Barack Obama had been assassinated in Iowa while visiting a local restaurant. (Source: ... wsj.com ) Fake Tweet Stays Live for 9 Hours It's not known for sure who was behind the attack, though there are a number of suspects. Whoever it was, they made fixing the problem a hassle by changing account passwords, preventing Fox News from easily removing the post and offering an explanation. In total, the falsified tweet stayed live for about nine ... (view more)

Mon
02
May
Dennis Faas's picture

Sony Network Hack Could Cost Credit Firms $300M

It's becoming clear just how costly the recent hack of Sony's PlayStation Network (PSN) could really be. A recent report suggests the debacle could cost Sony Corporation about $1.5 billion, with credit card lenders about $300 million in the hole. ... "It's not insignificant," said Keefe, Bruyette ... (view more)

Wed
16
Mar
Dennis Faas's picture

Judge Grants Sony Access to IP Logs of PS3 Pirates

Earlier this year, Jeremy Hotz, known to some as "GeoHot", made quite a name for himself by using his website to publish programming code that allows people to hack Sony's PlayStation 3 (PS3) video game console. Hotz is currently in the middle of a ... lengthy legal battle with Sony as a result, and we've yet to see a final decision. However, it's a side story from the case -- a court order that allows Sony to see who is and has been visiting Hotz's web site and YouTube page -- which has drawn lots of attention lately. Hotz originally decided to publish a special hack for the PlayStation 3 that ... (view more)

Thu
12
Aug
Dennis Faas's picture

New Hack Gives XP SP2 Users Access to Microsoft Support

Microsoft two weeks ago cut support for its Windows XP Service Pack 2 (SP2), essentially leaving millions of XP users without software updates to patch MS Windows from exploits (and hackers). However, a security researcher has revealed a new hack ... that can help SP2 users get access to the support many thought was forever lost. Microsoft's decision to cut tech support for SP2 was a controversial move, particularly when a shortcut flaw affecting the operating system emerged at the same time. SP2 users remain more exposed than users of Windows XP SP3 through Windows 7. (Source: neoseeker.com ) ... (view more)

Mon
05
Oct
Dennis Faas's picture

New Malware Takes Hacking to a Whole New Level

New malware being used by cyber criminals takes hacking to a whole new level: it hides evidence of a fraud victim's dwindling bank balance by rewriting online bank statements on-the-fly. The hack employs a Trojan horse program installed on a ... victim's machine that alters HTML (hyper text markup language) coding before it's displayed in a user's web browser. The altered HTML code either erases evidence of a money transfer transaction entirely from a bank statement, or it alters the total amount of money balances and transfers. The hack buys cyber criminals more time before a victim finds out he ... (view more)

Thu
14
Jun
Dennis Faas's picture

Vista's Deja Vu Snafu

Talk about deja vu. A Finnish security researcher recently discovered that the same problems affecting Windows XP and recovery disks were inherited by Windows Vista. If you have a Vista install DVD, you can gain administrative level access to the ... hard drive without needing a password. Detailed documentation, including possible workarounds, can be found at Kimmo Rousku's web site . The potential hack was discovered on February 8, 2007 during a Windows Vista training session. It was immediately reported to Microsoft Finland who confirmed it two days later. Apparently, the Command Prompt tool in ... (view more)

Wed
09
Oct
Dennis Faas's picture

Can I track down a hacker?, Part 2

Yesterday's Visitor Feedback asked, " Can I track down a hacker ?" My answer to that question was a passive one -- mainly based on the fact it would take an inconceivable amount of time to prosecute each and every hacker who tries to wallow his way ... into your computer system. An algorithm for a typical Hacker might look something like this: Randomly select a computer to hack; Attempt to gain access to randomly selected computer; If access is granted, deliver a payload (send virus/trojan, delete files); If access is not granted, disconnect from this computer; Repeat process. With the ... (view more)

Pages

Subscribe to RSS - hack