Subscribe to:

Subscribe to :: TheGuruReview.net ::

Israel Plans To Go After Hackers

January 9, 2012 by Michael  
Filed under Computing

After an attack that stole credit card details Israel has likened the theft to terrorism and vowed to take action.

Israel isn’t too happy after thousands of its citizens’ credit card details were posted online by a hacker, according to Reuters. The country said it was one of the worst attacks it has faced and compared the security breach to a terrorist operation.

Danny Ayalon, deputy foreign minister of Israel said it was “a breach of sovereignty comparable to a terrorist operation, and must be treated as such”.

“Israel has active capabilities for striking at those who are trying to harm it, and no agency or hacker will be immune from retaliatory action,” he added.

Commercial web sites were the focus of the attack and Ayalon said that Israel hasn’t ruled out the possibility that the hacking was carried out by a “more organised and sophisticated” group rather than just one person.

The hacker, known as 0xomar, claims to have leaked personal information about more than 400,000 Israelis. However, credit card companies said 25,000 credit card numbers had been posted and some were expired.

The Haaretz newspaper claimed that the hacker had been tracked down by an unnamed blogger who discovered him to be a 19 year old United Arab Emirates student studying and working in Mexico.

Courtesy-Theinq

The CCC(Hackers) Wants To Go Into Space For The Web

January 4, 2012 by Michael  
Filed under Around The Net

The Chaos Computer Club wants to create a censorship free internet by sticking its own satillites in space. Hackers at the Chaos Computer Club’s Chaos Communication Congress in Berlin proposed an initiative called the Hackerspace Global Grid (HGG), which aims to create and freely make available satellite based communication.

The group also says it wants to stick a hacker on the moon in 23 years, but their first goal is to deal with threats to the Internet like the proposed Stop Online Piracy Act (SOPA), by creating an “uncensorable Internet in space.” The project builds off of an earlier idea by Nick Farr in August for a Hacker Space Program.Armin Bauer is working on the communications infrastructure for the project with his team.

His background is with the Constellation platform that uses Internet-connected computers for aerospace related research. It is developing an idea for a network of low-cost ground stations for when the project gets low-orbit satellites up there. The stations would be there to pinpoint satellites and facilitate sending data back to earth.

Not sure where they will get the satellites from.

.

Courtesy-Fud

Can Hackers Attack A Trains Network?

December 30, 2011 by Michael  
Filed under Around The Net

Security expert Professor Stefan Katzenbeisser of Technische Universität Darmstadt told a security conference in Berlin that the GSM-R which is being installed in train networks makes them vulnerable to hackers.

Katzenbeisser said that the new system was vulnerable to “Denial of Service” attacks and, while trains could not crash, service could be disrupted for quite some time. Speaking to the Chaos Communication Congress he said that Network Rail is currently installing GSM-R across the British railway network.

It uses the similar technical standards to 2G mobile networks and is due to replace older signalling technology in southern England next year, and throughout the whole country in 2014. But train switching systems, which enable trains to be guided from one track to another at a railway junction, have historically been separate from the online world. If they were connected to the internet as they are in GSM-R they could be hit by Denial of Service attacks.

At the moment Britain trains can grind to a halt for things on the line ranging from frost, ice and leaves.

.

Courtesy-Fud

Research Finds GSM Phones Vulnerable To Attacks

December 27, 2011 by mphillips  
Filed under Mobile

Vulnerability in a very popular wireless technology could allow hackers to gain remote control of mobile devices And instruct them to send text messages or make calls, according to an expert on cellular phone security.

They could use the vulnerability in the GSM network technology, which is used by billions of people in about 80 percent of the global mobile market, to make calls or send texts to expensive, premium phone and messaging services in scams, said Karsten Nohl, head of Germany’s Security Research Labs.

Similar attacks against a small number of smartphones have been done before, but the new attack could expose any cellphone using GSM technology.

“We can do it to hundreds of thousands of phones in a short timeframe,” Nohl told Reuters in advance of a presentation at a hacking convention in Berlin on Tuesday.

The convention takes place just days after U.S. security think tank Strategic Forecasting Inc (Stratfor) said its website had been hacked and that some of the names of corporate subscribers had been made public. Activist hacker group Anonymous claimed responsibility.

Attacks on corporate landline phone systems are fairly common, often involving bogus premium-service phone lines that hackers set up across Eastern Europe, Africa and Asia.

Fraudsters make calls to the numbers from hacked business phone systems or mobile phones, then collect their cash and move on before the activity is identified.

The phone users typically don’t identify the problem until after they receive their bills and telecommunications carriers often end up footing at least some of the costs.

Even though Nohl will not present details of attack at the conference, he said hackers will usually replicate the code needed for attacks within a few weeks.

Mobile networks of Germany’s T-Mobile and France’s SFR offer their clients best protection against online criminals wanting to intercept their calls or track their movements, shows a new ranking Nohl will demonstrate at his presentation.

The new ranking, at gsmmap.org, lets consumers to see how their operators are performing and lets anyone to participate in measurement of their carriers’ security.