Monthly Archives: January 2013

A short history of hacking attacks against the media

A short history of hack attacks against the media

The revelation of the Chinese hacking campaign against reporters working for the New York Times has raised awareness of targeted malware attacks, but what does the history of cyberattacks against media agencies look like?

Graham Cluley takes a trip down memory lane..

Chinese hackers break into the New York Times, steal every employee's password

chinese flag_thumb

Chinese hackers have been infiltrating the newspaper's networks, broken into the email accounts of senior staff, stolen the corporate passwords for every Times employee and used those to gain access to the personal computers of 53 employees.

First pirate prosecution in New Zealand under "three strikes" law

The New Zealand copyright tribunal has imposed its first penalty under the country's "three strikes" file sharing regulations.

Paul Ducklin explains what happened, and asks, "What do you think?"

Jailbreak iOS 6.1 today, or wait until Sunday?

The cat-and-mouse game between Apple and its diehard technical fans continues.

Update - jailbreak - update - jailbreak...

Should Apple open up iOS and offer an official route to jailbreaking?

Serious security holes fixed in Opera - but Mac App Store users left at risk again

Serious security holes fixed in Opera - but Mac App Store users left at risk again

It should go without saying that if you use Opera, you should update to version 12.13 as soon as possible.

But... what if you didn't get your copy of Opera from the official website?

What if, instead, you acquired your version of Opera for Mac from Apple's Mac App Store?

Hacker blackmailed 350 women into stripping on their webcams, FBI says

Hacker blackmailed over 350 women into stripping on their webcams, FBI says

The FBI has arrested a 27-year-old man, who they claim hacked the accounts of Facebook users, and coerced hundreds of women into stripping while he watched via Skype.

Learn more about this case, and a history of other hackers who have spied on their victims via webcams.

Governments increasingly strong-arm Twitter for data

Governments increasingly strong-arm Twitter for data

Twitter on Monday released its second Transparency Report, which revealed governments' growing taste for what Twitter itself labels "invasive requests" for information.

SSCC 101 - Private things made public, the Java saga, PWN2OWN, and precision versus accuracy

Chester talks to Paul Ducklin in Sophos Security Chet Chat Episode 101.

Spend an enjoyable quarter-hour as our duo take on a range of security issues with their usual mixture of insight, expertise, scepticism, advice and occasional outright puzzlement.

FBI intent on sniffing out those who leaked possible US Stuxnet role

Stuxnet: The FBI is intent on sniffing out those who leaked details of America's anti-Iran virus

Federal investigators in the US are tightening the screws on former senior government officials who might have leaked info about the Stuxnet worm.

Test your security knowledge with the Sophos scavenger hunt - you could bag yourself a prize!

Play our scavenger hunt, learn something, and perhaps even bag yourself a prize

Take Sophos's quick scavenger hunt - you'll not only learn some cool security facts to impress your friends with, you'll also be in with the chance of winning some goodies!

What if your security camera were an insecurity camera?

What if your security camera were an insecurity camera?

Paul Ducklin investigates and offers some advice...

WhatsApp's privacy investigated by joint Canadian-Dutch probe

WhatsApp's privacy investigated by joint Canadian-Dutch probe

Privacy commissions in Canada and The Netherlands have investigated poor privacy practices in the popular mobile phone application WhatsApp. What's the problem and what should you do?

86,800 network printers open to the whole internet - is one of them yours?

Last week, it was programmers uploading their private keys to public websites.

This week, it's private printers left openly on the public internet.

In the words of a famous software company, "Where do you want to print today?"

Apple updates iOS fixing 27 vulnerabilities and TURKTRUST revocation

Apple updates iOS fixing 27 vulnerabilities and TURKTRUST revocation

Apple has released updates for users of the iPod Touch, iPhone, iPad and Apple TV products that fix critical vulnerabilities. Apple users should update their devices to iOS 6.1 as soon as possible.

Point of sale devices and Canadian banks targeted by Citadel malware variant

Point of sale devices and Canadian banks targeted by Citadel malware variant

A new variant of the prevalent Citadel crimeware kit has been discovered to target Point of Sale (POS) devices. Find out more, in this analysis from SophosLabs expert James Wyke.

How to find single women who like men *and* like getting drunk, with Facebook Graph Search

How to find single women who like men *and* like getting drunk, with Facebook Graph Search

Check what you share on your Facebook account *before* Facebook Graph Search is rolled out to a wider audience - or else prepare to suffer the consequences..

Hackers play Asteroids on US government websites

asteroid-thumb

To have one website fall foul of Asteroid-loving hackers may be regarded as a misfortune; but to have two looks like carelessness.

Twitter ordered to unmask hate speakers

Twitter ordered to unmask hate speakers

Months after hate speech was taken down from Twitter, a French court has ordered the company to hand over details of users who posted anti-Semitic content. Is the uncloaking of the haters worth the erosion of privacy?

Anatomy of a phish - how crooks hack legitimate websites to steal your details

Are you a "safe surfer"?

What about sites that were perfectly good yesterday, but today are serving phishing pages for the crooks?

Paul Ducklin takes you on a four-country phishing trip...

Monday review - the hot 24 stories of the week

dow-250

It's weekly roundup time.

Here's everything we've written in the past seven days.