Man behind hack of the year 2007 investigated

16/11/2007 Written by minor

lock1Dan Egerstad, man behind con­tro­ver­sial “hack of the year 2007″ was taken for ques­tion­ing by Swedish National Crime and Swedish Secu­rity Police few days ago, The Age informed. Also his house was raided and police took his com­put­ers and hard dri­ves. Any­way no charges have been set.

Egerstad pub­lished in August this year user­names and pass­words to email accounts from embassies and gov­ern­ments from dif­fer­ent coun­tries. As he explained, he cre­ated exit TOR nodes and inter­cepted traf­fic and on such way he obtained these infor­ma­tions. What is maybe worser, logins acquired on this way were accord­ing to him not used by legit users but actual mali­cious peo­ple that com­pro­mise these accounts and tried to hide in TOR net­work when using them. Many would say this is uneth­i­cal approach, but what is here more impor­tant: ethics or secu­rity (and in this case it applies maybe to world-​wide security)?

Read more

Want drive with preinstalled virus?

14/11/2007 Written by minor

virusIf you plan to upgrade your com­puter or just buy­ing some spare parts, you should be care­ful. As Taipei Times informed, some Max­tor portable hard disks come with “virus pre­in­stalled”.

In Thai­land pro­duced dri­ves car­ried two files that help tro­jans get into the sys­tem: autorun.inf and ghost.inf. Tro­jans then upload data such as logins and other inter­est­ing infor­ma­tions to www​.nice8​.org and www​.we168​.org.

Read more

How much can cyberterrorist get?

02/11/2007 Written by Jakub Maslowski

hackeroWe don’t want to talk about pos­si­ble pun­ish­ment and jail time/​fee some­one doing the “bad” things on inter­net can get, we want to show you how much cash so called ‘black­hat” can get.…

G DATA, a data-​company that makes soft­ware for secur­ing pc’s just realeased a press note wherethey try to answer the ques­tion asked at beggining.

Read more

NSA surveillance immunity

23/10/2007 Written by minor

silentIt is well known, not only among com­mu­nity, that after 911 AT&T allowed sur­veil­lance for law enforce­ment agen­cies, espe­cially NSA. Many law­suits after that were filled claim­ing ille­gal coop­er­a­tion with National Secu­rity Agency.

Of course it is not only AT&T, that allowed such activ­i­ties, Already before 911 there were signs of coop­er­a­tion between NSA and big com­pa­nies. Just to remind you, in year 1999 and 2000 there was great debate about so called _​NSAKEY.

Read more

Don't misuse emergency call services

19/10/2007 Written by minor

swatMis­us­ing emer­gency ser­vices can be some­times quite expen­sive. Some­times you can be jailed for it. Ran­dall Ellis, 19-​years old from Muk­il­teo, Wash­ing­ton is accused from hack­ing into the county’s 911 sys­tem from his home and plac­ing a false emer­gency call, prompt­ing a fully armed response to the home of an unsus­pect­ing peo­ple, OC Reg­is­ter informed.

This tech­nique, known as “SWAT­ting” was seen in U.S. by law enforce­ment agen­cies already before. Attacker breaches into emer­gency sys­tem call­ing for help, then as response SWAT team is called on site. In this case, Ellis pre­tended to be a teenager shot into shoul­der by some­one and cocaine over­dose case. SWAT with heli­copter and dogs respon­den to this false call in Lake For­est house.

Read more

9 10 11 12 13 14 15 16 17 18
ZONE-H In Numbers
  • News: 4.739
  • Admins: 3
  • Registered Users: 169.583
  • Early Warning subscriptions: 8205
  • Digital Attacks: 15.361.496
  • Attacks On Hold: 482.884
  • Online Users: 86
Login




 Lost password ?

Events
  • M
  • T
  • W
  • T
  • F
  • S
  • S
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  •  
  •  
  •  
  •