The New Threat to Oil Supplies: Hackers
Earlier this year, a sullen, 28-year-old contractor in California was charged in federal court with sabotaging the computerized controls on oil-rig sitting off the coast, allegedly out of spite for not being hired full time. Prosecutors say the contractor hacked into a shore-to-rig communications network that, among other functions, detected oil leaks. He caused thousands […]
Tags: hacker, oilApple to Ship Mac OS X Snow Leopard on August 28
Apple today announced that Mac OS X v10.6 Snow Leopard will go on sale Friday, August 28 at Appleās retail stores and Apple Authorized Resellers, and that Appleās online store is now accepting pre-orders. Snow Leopard builds on a decade of OS X innovation and success with hundreds of refinements, new core technologies and out […]
Tags: leopard, osxLabour MP gives me, Google and the world her password
It’s funny what you discover sometimes when you’re doing the daily trawl of things and looking for something to blog. Today was one of those days. I was scanning through the Register of Members’ Interests and saw that Gisela Stuart MP had been paid for an article in the German weekly newspaper,Ā Die Zeit.
Tags: google, labour party, prime ministerPolice try to trick hackers, with hilarious results
Hereās a fun story. Police in Australia thought they were being mighty clever when they took over an āunderground hacking forum.ā (The forum is r00t-y0u.org, though it seems to be down right now.) One of the hackers on the forum then retaliated by breaking into police computers using a simple SQL injection. Security fail.
Tags: hacker, police, undergroundAnother friend busted: 130 million credit and debit card numbers “borrowed”
SoupNazi, and 2 others “unknown” Russian hackers are been sued for one the of biggest electonic robbery grabbing more than 130 million credit and debit cards.
Tags: credit card, hackingLinux Kernels vulnerability since 2001 (and still working)
Hackers expose weakness in visiting trusted sites
Hackers at the Black Hat and DefCon security conferences have revealed a serious flaw in the way Web browsers weed out untrustworthy sites and block anybody from seeing them. If a criminal infiltrates a network, he can set up a secret eavesdropping post and capture credit card numbers, passwords and other sensitive data flowing between computers on that network and sites their browsers have deemed safe.
Tags: sslSelf-Destructing Digital Data
Vanish is a research system designed to give users control over the lifetime of personal data stored on the web or in the cloud. Specifically, all copies of Vanish encrypted data ā even archived or cached copies ā will becomepermanently unreadable at a specific time, without any action on the part of the user or any third party or centralized service.
Tags: encryption, facebook