Blog Posts Tagged with "Data Dump"
December 12, 2012 Added by:Pierluigi Paganini
The hackers during the operation named ProjectWhiteFox have targeted a wide range of companies operating in different sectors such as aerospace, nanotechnology, banking, law, military, education and government, following a list of the targets hacked...
July 19, 2012 Added by:Dan Dieterle
Wow, not one, but two massive password dumps in one day. Hackers leaked a very large number of Billabong and Yahoo passwords in plain text with no need to try to crack them. We looked at the passwords using the analysis tool Pipa, and here is what we found...
July 12, 2012 Added by:Headlines
Just a month after LinkedIn experienced a significant security breach and caught flack for not "salting their hash", the revelation that the Yahoo! credentials were not even stored in an encrypted format should have everyone concerned about how seriously companies are taking the security of their users...
July 07, 2012 Added by:Robert Siciliano
“Dumps” are batches of stolen credit card numbers. This example of a criminal’s sales pitch for stolen dumps came to me through a comment on a blog post I wrote about credit card security. Go figure. If you scan the following message line by line, you’ll see there’s a great deal of thought put into the pitch...
June 15, 2012 Added by:Andy Willingham
You see what made me so mad? It wasn’t the release of the PII of all those innocent people, it was their reason for doing it. They reported a web site vulnerability and it wasn’t fixed, so they decided to post PII of thousands of people on the internet. Who put them in the role of deciding who wins and who loses?
May 22, 2012 Added by:Headlines
"The department is looking into the unauthorized access of a website server operated by the Bureau of Justice Statistics that contained data from their public website. The... website has remained operational throughout this time. The department’s main website... was not affected..."
May 03, 2012 Added by:Headlines
A new hacktivist group claims to have breached the systems of multiple government, military and private organizations. The hackers posted screenshots of their intrusions to support their claims, as well as posting what is characterized as military files for access on MediaFire...
March 12, 2012 Added by:Headlines
The Jester posted a link to data exfiltrated during last week's Webkit exploit aimed at mobile device users who scanned the QR-code posted as an avatar on his Twitter account and then were cross-referenced with a database of targeted jihadi and Anonymous operatives...
March 09, 2012 Added by:Headlines
“Symantec can confirm that the source code for 2006 versions of Norton Antivirus posted by Anonymous is authentic. The exposure of this code poses no increased risk to Norton or Symantec customers. This code is part of the original cache of code for 2006 versions of the products..."
February 14, 2012 Added by:Rafal Los
Most people don't get prosecuted or charged for distributing or re-tweeting a link to an Anonymous pastebin dump. Where is the line drawn then, and why are some incidents bigger than others? The question ultimately goes to the contents of the cache of information...
January 24, 2012 Added by:Infosec Island Admin
A Pastebin dump alleged to be from Anonymous has forty-nine IP addresses with SCADA systems on them. Furthermore, those systems were claimed to not have any authentication on them whatsoever. I checked the IP’s and I have to say “meh” on this little dump by the skiddies...
January 20, 2012 Added by:Infosec Island Admin
The SCADA were not in default state for passwords, and in general did not seem to be important systems - like government or large power company hardware. Hell, for that matter, none were even water facilities, which I should think in a desert would be kinda important, no?
January 16, 2012 Added by:Anthony M. Freed
YamaTough, spokesperson for the hacktivist group “The Lords of Dharmaraja”, informed Infosec Island of plans to release source code for Symantec's PCAnywhere. The release is to be made prior to the threatened exposure of the full source code for the Norton antivirus...
January 03, 2012 Added by:Richard Stiennon
The most painful lesson the Stratfor hack is about to demonstrate is the importance of email security. Anonymous will be recruiting volunteers to analyze the 3.3 million emails they stole that have the potential for real harm equal to the infamous WikiLeaks State Department leak...
October 20, 2011 Added by:Infosec Island Admin
Due to the nature of the site and its being in the hidden wiki (DarkNet) it is tough to know exactly where the systems sit that house/host the content, but, it seems that through certain techniques using TTL, they pretty much have a good idea of where the server may sit in the continental US.
August 19, 2011 Added by:Headlines
AntiSec hackers have made good on their threat to release sensitive emails and documents stolen in an operation against defense contractor VDI, revealing evidence that financial giant Merrill Lynch may have tipped off VDI about S&P plans to downgrade the U.S. government's credit rating...
Today's Mobile Device Data Protection Must G... Anna Maria on 09-29-2014
Defining Success for Information Security Th... Michael Thibodeaux on 09-29-2014
"Fake ID" Android Vulnerability in Lets Mali... france deal on 09-28-2014