Registar

User Tag List

Likes Likes:  0
Página 4 de 64 PrimeiroPrimeiro ... 234561454 ... ÚltimoÚltimo
Resultados 46 a 60 de 955
  1. #46
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Computers at South Korean Nuclear Operator Hacked – Possibly by North Korean Pyongyang

    South Korean nuclear plant operator has been hacked, breaching some key infrastructural points possibly to the Northern neighbor.

    What exactly is North Korea’s target?

    State-owned Korean Hydro and Nuclear Power Co. Ltd. (KHNP) issued an statement on Monday that the computers at the nuclear plant have been breached giving the country fears that North Korea might be behind the cyber attack. This closely follows the statement made by President Obama and senior US officials after FBI concluded its investigation on Sony Pictures Entertainment hacking case naming North Korea behind the attack. United States government has called for China to help in the matter.
    KHNP denied having its plants in any danger from this cyber attack, reported the Wall Street Journal. Authorities claim that only non-critical information has been leaked. However, hacking attempt at South Korean nuclear plant has possibly led to a leak of internal data that also includes blueprints of reactors, electricity flowcharts, and radiation exposure estimates. This internal data also includes personal information of about 10,000 employees.
    While no one has alleged North Korea formally about this latest cyber attack, the attack mechanism resembles the pattern previously used by Pyongyang, North Korean secret agency. This attack not only matches with the print left by hackers in Sony Pictures Entertainment cyber attack, but also to previous cyber hacking attempts on South Korean banks and media.

    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  2. #47
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Madonna is paranoid about piracy, songs still leaked online

    Madonna was forced to release six songs from her new album because 13 pre-released recordings - her entire album - were posted online. Madonna and her manager, Guy Oseary, have taken to Twitter in an effort to identify how the music, along with other data, managed to find their way to the Internet.


    "We don't put things up on servers anymore," Madonna recently said in an interview with Billboard. "Everything we work on, if we work on computers, we're not on Wi-Fi, we're not on the Internet, we don't work in a way where anybody can access the information."

    Despite increased security protocols Madonna tried to put in place, that doesn't mean her music was safe - it would appear it was an outside attack, as unpublished photos of Madonna were also made available at the same time "Rebel Heart," one of the songs from her album, were leaked online.

    Noticia:
    http://www.tweaktown.com/news/42193/...ine/index.html
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  3. #48
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Chinese hackers aiming to compromise Afghan government website

    The "Operation Poisoned Helmand" operation, as part of the "Poisoned Hurricane" campaign, is reportedly targeting visitors to Afghan government websites, according to the ThreatConnect cybersecurity company. The attacks reportedly originated from China and looks to compromise Internet users visiting gov.af websites - using corrupted JavaScript files.


    "We found continued activity from Chinese specific actors that have used the Afghan government infrastructure as an attack platform," said Rich Barger, ThreatConnect CIO, in a statement to Reuters.

    Noticia completa:
    http://www.tweaktown.com/news/42194/...ite/index.html
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  4. #49
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Report: South Korea nuclear facilities targeted in cyberattack

    South Korea is under cyberattack from an unknown source, as its Korea Hydro and Nuclear Power Co. has been breached, with "non-critical" data being stolen. The country's nuclear installations and atomic reactors aren't at risk, but cybersecurity experts remain highly concerned the country's nuclear reactors could be at risk from future attacks.


    "This demonstrated that, if anyone is intent with malice to infiltrate the system, it would be impossible to say with confidence that such an effort would be blocked completely," said Suh Kune-yull, from the Seoul National University, in a statement to reporters. "And a compromise of nuclear reactors' safety pretty clearly means there is a gaping hole in national security."

    Noticia completa:
    http://www.tweaktown.com/news/42195/...ack/index.html
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  5. #50
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    North Korean internet returns after suspicious downtime

    North Korea’s internet went down last night, only returning online in a limited capacity early this morning. While the NK authorities have yet to report on the downing, at least internationally, the story was picked up by US news sources fairly quickly, prompting some to suggest that it may have had some involvement.
    The United States has been embroiled in an internet related row with North Korea over the past couple of weeks, with many – including the FBI, which announced as such – thinking that state sponsored hackers from Korea were responsible for hacking Sony. While the DPRK has denied claims, it did threaten the US that it would retaliate if any action was taken against it.

    For his part, President Obama laughed off Korea’s attempts to stamp down on a satirical comedy with its technological prowess, but said that US authorities would be taking a “proportional response.” It’s thought likely that North Korea’s internet outage may be part of that.
    The US has actually been petitioning China to cut off the country’s internet for a few days now. However, since we don’t know the cause for DPRK’s internet outage, it’s not clear whether China was involved, or whether even the US was at this point, though considering the timing it seems quite likely it had a hand in it somehow. There is also the possibility though that it’s a hacking group or an individual responding, according to Dyn Research (via BBC), as NK’s internet infrastructure is not built to handle heavy traffic.
    Of course in Pyongyang and elsewhere in the country, very few people will notice the downing of the internet. While some North Koreans in positions of power have access to any sites they want, most can only look on websites that are state sponsored, offering positive spin stories about the country and its leader, Kim Jong Un.
    Noticia completa:
    http://www.kitguru.net/gaming/securi...ious-downtime/
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  6. #51
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Patriot hacker The Jester to retire persona

    Even though the ’80s and ’90s taught us to fear the power of hackers with their cereal box whistles and surprisingly visual interfaces, the ’00s and beyond have really brought them to the fore. Not only have we heard about the covert underground of state sponsored hacking on a much larger scale, but the idea of hacktivism was popularised. Groups of people and individuals that use their technological superpowers to dissent in internet based versions of protest from throughout the ages. While not always the most popular, The Jester was one such hacktivist, but no more, as that personality has now been retired, giving its creator enough freedom to continue his protests from behind the scenes.
    While hacktivism movements like Anonymous and Lulzsec have drawn a few more headlines than the Jester, the unnamed individual certainly took a more controverial stance on recent issues of security, freedoms and privacy. They targeted the whistleblowing site Wikileaks, stating that they believed the site was “attempting to endanger the lives of [US] troops.”
    Taking even more of a Devil’s Advocate outlook however, was their verbal attacks against Edward Snowden, who leaked NSA documents to newspapers to expose the PRISM surveillance scheme. The Jester claimed that Snowden was a defector that got caught and used the document leak as a way to protect himself. Jester also suggested that if he was a true patriot, as some would claim, he would have stayed in the United Stated and leaked documents from there, rather than fleeing to China and eventually to Russia.
    They even suggested that Snowden had been courted by Wikileaks in order to disparage and embarrass the US on the world stage.

    ‘See you later Mr J’
    As an ex-soldier, Jester was fiercely patriotic, regularly targeting enemies of the US like the Taliban, the Westboro Baptist Church and several jihadist websites. They also fell out with Anonymous and Lulzsec several times, even exposing the leader of the latter, Sabu, before he was officially revealed.
    However all of that is behind The Jester now. In an address on Jester’s Court, they said that this was always planned. After five years, 10,000 tweets and a plethora of hacks, The Jester will hang up their fool’s hat for good. Not to discontinue hacking, but to take a lower profile. As The Jester described it, “the ‘J’ persona’ has become too ‘unwieldy’ and cumbersome for ‘him’ to be effective in carrying out the original objectives in his current incarnation.”
    Jester went on to thank all of their supporters and denied rumours that they had health issues or were being forced to step down due to law enforcement closing in. In the future they have plans to take part in, “more ‘jesterin’ – less noise, next evo projects that build on the best of ‘J’ and leave the rest, and maybe even at least try to make an attempt at a book.”
    Noticia completa:
    http://www.kitguru.net/gaming/securi...etire-persona/
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  7. #52
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Tor network under attack

    Specialised servers seized
    The Tor project could face attempts to incapacitate its network in the next few days as the forces of darkness seize specialised servers. The project did not name the group or agency that may try to seize its directory authorities, which guide Tor users on the list of distributed relays on the network that bounce communications around.
    Apparently Tor is taking steps to ensure the safety of our users, and our system is already built to be redundant so that users maintain anonymity even if the network is attacked. Rather than take a direct route from source to destination, data packets on the Tor network, designed to mask people’s Internet use, take a random path through several relays that cover user tracks.
    Unless an adversary can control a majority of the directory authorities, he can’t trick the Tor client into using other Tor relays, according to the Tor project website. There are nine directory authorities spread across the U.S. and Europe. Users who live under repressive regimes such as the United States and UK look to Tor as a way to escape surveillance and censorship. However, it is also used by purveyors of drugs and criminal activities.
    Noticia:
    http://www.fudzilla.com/home/item/36...k-under-attack
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  8. #53
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    North Korea internet consists of only 1,024 IP addresses

    The North Korean internet failures have generated a massive amount of international press coverage. One would expect this to be the work of a sophisticated group of hackers, possibly even with the funding of the United States, or other governments wishing to stem the tide of North Korean hackers. Turns out, a 12 year old kid can likely do it. North Korea only has 1,024 IP addresses for the entire country, compared to the 1.5 Billion IP addresses in the United States.


    There are potentially thousands of computers behind each IP address, but the odds of that are very unlikely. Sanctions and embargoes have severely limited access to computers. Researchers monitoring the North Korean internet have detected a few PlayStations and Xboxes on the network, and one solitary MacBook has been detected....in the entire country. The North Korean agency responsible for hacking is likely contained behind only a few IP addresses, so isolating and monitoring them shouldn't be too taxing for a heavyweight like the NSA. North Korean citizens have very limited access to the internet, which is reserved for government officials, foreign ambassadors, and relief agencies.

    North Korean internet connections are routed through China and have the bandwidth equivalent of roughly 1,000 U.S. households with high-speed internet. There is access to a heavily censored and government controlled public internet called the Kwangmyong, but considering the economic malaise there can't be many accessing it, and censoring can't be a very big task. North Korea has one of the smallest internet presences in the world, and there are only roughly 5,500 websites with virtually no outside access for the general public. The recent blackouts could have even been the work of the North Korean government to block retaliatory attacks, but like just about anything that happens in the shadowy regime, we will never know.

    Noticia:
    http://www.tweaktown.com/news/42216/...ses/index.html
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  9. #54
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    North Korea’s Internet Restored Following ‘Unprecedented’ Takedown

    On Monday, North Korea’s Internet was taken offline. The country suffered a complete Internet outage that lasted around nine hours before it was restored on Tuesday. However, the cause for the outage has yet to be determined.

    According to Dyn, a company based in the U.S. that monitors Internet infrastructure, the reason for the Internet outage in North Korea could range from technological glitches to hacking attacks. The company said that the country’s internet links, which pass through China, were unstable on Monday and then went completely offline

    "I haven't seen such a steady beat of routing instability and outages in [North Korea] before," said Dyn director of internet analysis Doug Madory to NorthKoreaTech.org. "Usually there are isolated blips, not continuous connectivity problems. I wouldn't be surprised if they are absorbing some sort of attack presently."

    It is still unclear as to what caused the outage though one theory is that North Korea suffered a massive DDoS attack. Other theories being suggested is that it could have been a hardware failure, North Korea taking itself offline, or a cyberattack of some sort.

    The Internet outage came after the FBI condemned the recent attack on Sony, which resulted in a massive data breach, and stated that North Korea was responsible. On Friday, the Obama administration weighed in on the attack stating that this was an act of cyber-vandalism, not of war, and said, “We will respond proportionately.”

    In the meantime, U.S. officials continue to say that Washington was in no way involved with the recent Internet outage in North Korea. Meanwhile, North Korea continues to deny that it was responsible or involved in the attack on Sony that resulted in the exposure of social security numbers, release of sensitive material, and threats against Sony employees.

    Noticia:
    http://hothardware.com/news/north-ko...RmqyfHavIBM.99
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  10. #55
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Companies should learn from Sony hack, work to improve cybersecurity

    If companies needed another reminder on the importance of improving cybersecurity, they can learn from the current predicament tormenting Sony Pictures. C-level executives need to be more involved when it comes to being proactive ensuring cybersecurity strategies at their companies are being implemented properly.


    It has been a brutal year for data breaches in the United States, with Sony Pictures joining the unfortunate list of Home Depot, Target, JPMorgan Chase, and multiple other companies that suffered high-profile, very public cybersecurity incidents. Trying to prevent these data breaches is much easier said than done, but many companies have either ignored security recommendations - or overlooked potential fallout - related to security.

    "I think the scale of this impact on Sony is what's going to make a lot of C-suites sit up and say 'Wow, we really do need to take this seriously,'" said Rob Sloan, cyber data and content head at Dow Jones Risk & Compliance, in a statement published by Fortune. "They can see the damage being done and it's potentially career-threatening for them and business-ending if they don't have the funds to support them through their troubles."

    Noticia:
    http://www.tweaktown.com/news/42225/...ity/index.html
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  11. #56
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Researchers launch anonymous, robust BitTorrent client

    Researchers at Delft University of Technology have unveiled a next-generation BitTorrent file-sharing client which they claim is immune to the raids that have closed major tracker sites in recent months.

    BitTorrent is designed as a robust peer-to-peer file-sharing protocol which operates without the need for a central file server. Instead, files are broken into pieces and distributed around each member of a BitTorrent shared connection; so long as the pieces for the entire file are present they can be sent to all other members to complete the file, even if no active user currently has a full copy of the original file. Finding other users, however, typically requires a 'tracker' service - and these are often the target of lawsuits and police raids owing to their users' sharing of copyright content without the permission of the rightsholders - exactly the issue that recently saw major BitTorrent tracker The Pirate Bay disappear from the internet earlier this month.

    A team of researchers at Delft University of Technology claim to have resolved this issue in the latest release of their own BitTorrent client, Tribler. According to a write-up by TorrentFreak, the latest release - created in response to increasing censorship of the internet - is capable of operating entirely without a central tracker infrastructure. 'Tribler makes BitTorrent anonymous and impossible to shut down,' lead researcher Johan Pouwelse told the site. 'The public was beginning to lose the battle for Internet freedom, but today we are proud to be able to present an attack-resilient and censorship-resilient infrastructure for publishing'

    The software works by allowing searches to take place through the peer-to-peer network itself, finding files and their holders without the need for a central 'master' tracker. Combined with a Tor-like onion routing protocol which hides the origin of each request, the team claims that it is impossible to censor and entirely anonymous - although said anonymity does have a direct impact on the speed of the network, which is slower than a traditional BitTorrent connection.

    'The Internet is turning into a privacy nightmare,' Pouwelse told TorrentFreak. 'There are very few initiatives that use strong encryption and onion routing to offer real privacy. Even fewer teams have the resources, the energy, technical skills and scientific know-how to take on the Big and Powerful for a few years.'

    The new client is available cross-platform at the official website.

    UPDATE: A developer working on the Tor Project has warned of severe insecurities in the Tribler software and recommended that users do not attempt to use it. 'Cursory analysis found enough fundamental flaws, and secure protocol design/implementation errors that I would be reluctant to consider this secure, even if the known issues were fixed,' the developer, identified by the handle 'Yawning Angel,' wrote on the Tor mailing list. 'It may be worth revisiting in several years when the designers obtain more experience, and a thorough third party audit of the improved code and design has been done.'
    Noticia:
    http://www.bit-tech.net/news/bits/2014/12/19/tribler/1
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  12. #57
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    This USB Necklace Can Hack Your PC in 60 Seconds

    It is that scene in every movie where the spy breaks into the “computer room” and inserts a USB key that instantly brings down the system or security. While you may think a device like this could never be real, the scary thing it is!

    Friend of ThinkComputers, Samy Kamkar has created this unique device. If you haven’t heard of Samy he is behind such exploits as the massive MySpace worm in 2006 and SkyJack – a drone that can hack and control other drones. He has created a USB device that he sometimes wears around on a necklace. In the video below he goes over just how the USB necklace can hack your system.




    Samy calls the device USBDriveBy and it is a USB microcontroller that once plugged in to a USB port on your computer it can do the following things automatically:
    – It starts by pretending to be a keyboard/mouse.
    – If you have a network monitor app like Little Snitch running, it uses a series of keystrokes to tell LittleSnitch that everything is okay and to silence all warnings.
    – It disables OS X’s built-in firewall.
    – It pops into your DNS settings and tweaks them to something under the hacker’s control, allowing them to replace pretty much any website you try to visit with one of their own creation.
    – It opens up a backdoor, then establishes an outbound connection to a remote server which can send remote commands. Since the connection is outbound, it eliminates the need to tinker with the user’s router port forwarding settings.
    – It closes any windows and settings screens it opened up, sweeping up its footprints as it heads for the door.
    So in just about 60 seconds it takes control on your machine, disables the security, cleans up it tracks and opens a connection for control of the machine even after the device has been removed, quite slick!
    While Samy mainly focuses on OS X in his videos the same principles can be used to make the device work for Windows or Linux. So how can you prevent your system from becoming vulnerable to a device like this? The way the USB protocol is designed makes it very hard to protect your system from such an attack. We would suggest just keeping an eye on your USB ports!
    Noticia:
    http://www.thinkcomputers.org/this-u...in-60-seconds/
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  13. #58
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Japan working to improve cybersecurity after Sony Pictures attack

    Following a successful data breach targeting Sony Pictures, the Japanese government is increasingly weary of potential North Korea-based cyberattacks. Japan is used to China's ambitious cyberespionage campaigns, but North Korea has steadily improved its own ability to launch successful attacks.


    Japanese Prime Minister Shinzo Abe wants to boost internal cybersecurity defense as the threat of foreign-based attacks reaches frightening levels. There is specific interest in ensuring critical infrastructure, such as its power grid, transportation networks, and gas supplies can continue to function even under continued attack.

    "Japan is maintaining close contact with the United States and supporting their handling of this case," said Yoshihide Suga, Japanese Chief Cabinet Secretary, during a press conference. The Japanese government is relying on strong ties with Washington in a joint-cooperation to increase cybersecurity.

    Noticia:
    http://www.tweaktown.com/news/42256/...ack/index.html
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  14. #59
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Hacker Group Lizard Squad Takes Down PSN and Xbox Live on Christmas Day

    Keeping its promise of attacking and taking down the two most used online multiplayer and video game content distributing services, the notorious hacker collective called Lizard Squad seems to have returned to its old antics. The group has reportedly targeted the PlayStation Network and Xbox Live with traditional DDoS attacks today when people are celebrating Christmas in many parts of the world. However, unlike what the group had promised previously, the attacks are brief and last only a few hours, as Sony and Microsoft have acknowledged the situation and are working to put services back online gradually.

    PlayStation Network and Xbox Live Facing Outages on Christmas Day as Hacker Lizard Squad Claims Responsibility for DDoS Attacks

    Describing itself as the “next generation Grinch,” a hacker group that rose to notoriety after attacking some gaming giants by taking down their servers through DDoS attacks announced earlier this month its plans to shut down both the online console gaming networks on Christmas. Soon after the announcement, a rival group called The Finest Squad took on the hacker collective and managed to keep the group offline temporarily by reportedly suspending its Twitter account. However, it looks like the Lizard Squad is back, as the group has just claimed the responsibility for temporarily disrupting normal PlayStation Network and Xbox Live services today.
    The attacks started yesterday when Xbox Live when down specifically for Xbox 360 players in certain regions. Soon after the first attack, both PlayStation Network and Xbox Live users started reporting outages on Twitter. Interestingly, services are limited in certain regions only right now, specifically in UK, and people in other regions have full access to all the services. Lizard Squad has claimed the responsibility for taking down both the online console gaming networks via denial-of-service (DDoS). However, unlike the promised complete shutdown, the attacks only disrupt the services for few hours before they become available again and are reportedly rattled again.
    gonna ddos Santa Claus' sleigh tonight
    — Lizard Squad (@FUCKCRUCIFIX) December 24, 2014
    Twitter user GDKJordie, a professed member of Lizard Squad, posted the following:

    Both Sony and Microsoft have acknowledged the issue and confirmed that the PlayStation Network and Xbox Live are up with limited services in the UK and some places in the US, but it is not yet officially specified how far reaching the problem is. Sony has confirmed via official PlayStation Twitter accounts that while users are having trouble logging into their PlayStation Network accounts, engineers are investigating the problems. On the other hand, Microsoft has updated the status of Xbox Live on official Xbox website as Limited.
    Lizard Squad has been tweeting about the outages all day, increasing its number of followers on Twitter and by apparently giving false hope to gamers about restoring downed PlayStation Network and Xbox Live services if their tweets are retweeted
    XBOX LIVE AND http://t.co/XJMlwd7BJF #offline
    — Lizard Squad (@FUCKCRUCIFIX) December 25, 2014
    10,00RTS and we will stop smacking #Xbox and #PSN offline
    — Lizard Squad (@FUCKCRUCIFIX) December 25, 2014
    Keep checking back here as we will be updating this page with more news about the Lizard Squad and PlayStation Network and Xbox Live outages.

    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  15. #60
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Japanese banks being targeted by Chinese hackers, tension growing

    Cybercriminals from China are increasingly targeting Japanese bank account holders, with more than $16 million stolen from the Sumitomo Mitsui Financial Group and Mitsubishi UFJ Financial Group during the first six months of 2014. Japanese police officials report a rising number of Chinese nations being arrested for cyber-related crimes, and security experts point towards Chinese-based IP addresses.


    The chaos begins by a phishing attack that tricks users into providing their passwords. Money is transferred out of Japan and people are recruited to visit ATMs and withdraw as much money as they can. Products are purchased in Japan and the stolen items are shipped and re-sold in China.

    Earlier in the year, Japanese government websites were compromised by suspected Chinese hackers, with most of the sites temporarily dropped by distributed denial of service (DDoS) attacks. However, other websites were defaced with political messages related to Japan-China sociopolitical propaganda - as both countries continue their efforts to rebuild an extremely tumultuous relationship.


    Read more at http://www.tweaktown.com/news/42259/...ing/index.html
    Noticia:
    http://www.tweaktown.com/news/42259/...ing/index.html
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

 

 
Página 4 de 64 PrimeiroPrimeiro ... 234561454 ... ÚltimoÚltimo

Informação da Thread

Users Browsing this Thread

Estão neste momento 2 users a ver esta thread. (0 membros e 2 visitantes)

Bookmarks

Regras

  • Você Não Poderá criar novos Tópicos
  • Você Não Poderá colocar Respostas
  • Você Não Poderá colocar Anexos
  • Você Não Pode Editar os seus Posts
  •