New Search

If you are not happy with the results below please do another search

690 search results for: hackers

51

Hackers Play “Social Engineering Capture The Flag” At Defcon

Social engineering is a fancier, more technical form of lying. An alternative to traditional hacking, it is the act of manipulating others into performing certain actions or divulging confidential information. Social engineering or “social penetration” techniques are used to bypass sophisticated and expensive hardware and software in a corporate network. Smart organizations train their employees…

53

Mobile Phone Becoming Bigger Target For Hackers

Identity Theft Expert Robert Siciliano Mobile Internet access and mobile service usage is growing rapidly and cyber criminals are expected to pay more attention to this sector. Mobile device platforms compete for innovation created by application developers and other content creators who are increasingly demanding more device access. As their requests grow in numbers and…

54

Criminal Hackers Had Their Best Year

Identity Theft Expert Robert Siciliano The FBI reported that last year, organized criminals made double what was reported in 2008. Phishing emails containing the name and logo of the FBI were one of the top money makers for scam artists. Successful scams included auction scams where products were bought and paid for but product was…

56

EFT Point of Sales Hackers Net $50 Million

Robert Siciliano Identity Theft Expert Readers of these posts are familiar with ATM skimming. ATM skimming is a billion dollar problem and growing. A relatively new scam over the past few years is electronic funds transfers at the point of sale (EFTPOS ) skimming. People commonly swipe both credit and debit cards through the in-store…

57

Criminal Hackers Buying and Selling Hacked Accounts

Robert Siciliano Identity Theft Expert Malicious software designed to gather usernames and passwords has been a boon for the criminal hacking community. Spyware as it’s commonly known records almost everything a user does on their PC. The most damaging spyware records all electronic communications via a web browser. That’s where the most damage can be…

58

Russian Hackers Make Millions Breaching 7/11 and ATMs

Robert Siciliano Identity Theft Expert It started simply by hacking 7-Elevens public website using a SQL injection.  SQL is abbreviation of Structured Query Language.  Pronounced  ”Ess Que El” or ”Sequel” depending on who you ask.  This led to 7 elevens main servers compromised which led to ATMs within 7-Eleven hacked. Wired reports ““The Russians, evidently using an SQL injection vulnerability, …

59

Hackers Indicted for Jacking Comcast

Robert Siciliano identity theft expert A single hacked email address led to the defacement of Comcast’s homepage. When the hackers called Comcast’s technical contact to let him know that the Comcast homepage and all 200 Comcast domain names were vulnerable, he hung up on them. It has not been disclosed how the email was compromised,…

60

Criminal Hackers Get to Momma and DaDa Via Children

Robert Siciliano Identity Theft Expert I’m particularly irate about this. There’s criminal hackers, then there’s complete lowlife scumbag criminal hackers that hack children. InternetNews reports hackers took over sections of the PBS.org Web site earlier this week, installing malicious JavaScript code on the site’s “Curious George” page that infects visitors with a slew of software exploits. For…