hacker

Dropbox users getting spammed, might be from earlier hack

It looks like Dropbox may be grappling with some leftover issues from hackers' access into the system last July.

Over the past 24 hours, users have been posting on the file-sharing site's forum, saying that they're being hit with spam e-mails sent to e-mail accounts used only for Dropbox.

"My Dropbox specific email has been receiving spam since the 20th of February," Daniel B. wrote today. Richard F. wrote, "I have an internal to my company email address that I used for Dropbox only and I am getting the same fake paypal scam emails. This … Read more

China blames U.S. for most cyberattacks against military Web sites

China has accused the U.S. for most of the cyberattacks launched against its military networks.

In a statement released today, China's Ministry of National Defense said that cyberattacks against its military sites have increased over the past few years. Based on checks of IP addresses, the Defense Ministry claimed an average of 144,000 cyberattacks per month last year, according to Reuters.

And it fingered the U.S. for almost 63 percent of them.

The allegations from Beijing come hot on the heels of a recent report from U.S. security firm Mandiant, linking the Chinese army to cyberattacksRead more

Overseas hackers nab more than 1TB of data daily

The idea of governments waging futuristic cyberbattles and online espionage campaigns actually isn't too farfetched. A new study released today by Team Cymru basically says as much.

The study, shared exclusively with The Verge, says that overseas hackers are stealing as much as one terabyte of data per day from governments, businesses, militaries, and academic facilities. Apparently, the hackers are using a network of 500 computer servers.

According to a lengthy article by The Verge, Team Cymru concludes that the hackers are so sophisticated and are running such massive campaigns that they must be state-sponsored. "This is Internet … Read more

Hacker says security flaw let him access any Facebook profile

A security hacker recently found a flaw in a Facebook system that allowed developers to access anyone's Facebook account through app permissions.

Though Facebook has fixed this issue, Nir Goldshlager, a Web application security specialist who looks for these types of flaws professionally, found more app authorization bugs that need fixing, according to his blog. App permissions are what developers use to access the user data needed to run their apps. Users give them access permission when they install the apps.

"I found a couple more OAuth flaws in Facebook, just waiting for a fix to post about … Read more

Zendesk hack snares user data from Twitter, Tumblr, Pinterest

At a time when it seems no company is immune from hackers, user information from three high-profile social-networking sites has been compromised due to a hack at another company.

Customer support service Zendesk revealed today that it had been the victim of a security breach and that information from three of its clients had been downloaded. As first reported by Wired, those three clients are Twitter, Pinterest, and Tumblr.

Zendesk revealed the hack in a company blog post today that said the vulnerability was immediately identified and patched:

Our ongoing investigation indicates that the hacker had access to the support … Read more

Apple, Facebook, Twitter hacks said to hail from Eastern Europe

While many security experts have been pointing the blame at China for the recent wave of cyberattacks on U.S. companies and newspapers, Bloomberg reports that some of the malware attacks actually may be coming from Eastern Europe.

Investigators familiar with the matter told Bloomberg they believe a cybercriminal group based in either Russia or Eastern Europe is carrying out the high-level attacks to steal company secrets, research, and intellectual property, which could then be sold on the black market.

Evidence that the attacks may be coming from Eastern Europe is the type of malware being used by the hackers, … Read more

Chinese Army linked to hacks of U.S. companies, agencies

An "overwhelming percentage" of cyberattacks on U.S. corporations, government agencies, and organizations originate from a 12-story office tower on the outskirts of Shanghai that's connected to the People's Liberation Army, according to an extensive New York Times report.

The newspaper cites a 60-page report by U.S. security firm Mandiant that traces the activities of a sophisticated Chinese hacking group -- known in some circles as "Comment Crew" or "Shanghai Group" -- to the headquarters of People's Liberation Army Unit 61398. The report notes that a body of digital forensic … Read more

Burger King Twitter account hacked, defaced

The Twitter account associated with the fast-food chain Burger King was suspended after an apparent hack defaced the page with messages that the account had been sold to McDonald's.

The @BurgerKing account name was changed today to "McDonalds" and the Golden Arches logo was added to the page, as was a message that the account had been sold to McDonald's "because the whopper flopped."

The page has since been taken down, but images of the defacement are still visible on Web cache.

Before the feed's suspension, hackers posted tweets that included racial epithets … Read more

Hackers can easily breach Emergency Alert Systems

Hackers broke into several television stations' Emergency Alert Systems this week and broadcast that zombies were "rising from their graves" and "attacking the living."

While a comical hoax, security consultancy firm IOActive warns that this type of behavior is dangerous and not that hard for hackers to do, according to Computerworld. This week it's zombies, but next time it could be something that might make people really panic, such as an anthrax or terrorist attack.

IOActive says that devices used by TV and radio stations to air emergency alerts have critical vulnerabilities that make them … Read more

Unlocking Ma Bell: How phone phreaks came to be

Imagine a day when it cost an arm and a leg to use the phone, especially for long-distance calls. Then imagine that buried deep within the telephone network infrastructure was a flaw -- a hole that allowed those who were aware of it, and capable of exploiting it, to make all the free calls they want.

These days, phone calls are free -- or nearly so -- and hackers put their energies into computer networks, jailbreaking iPhones, and other more modern pursuits. But back in the 1950s and 1960s, a new group of people emerged, people who were fascinated by … Read more