Blog Posts Tagged with "Hijack"

37d5f81e2277051bc17116221040d51c

Security Measures to Protect Business Twitter Accounts

April 27, 2012 Added by:Robert Siciliano

Hacking a business Twitter account is a favorite pastime for those wanting retribution, and for others it’s just plain fun. Once the businesses Twitter account is hacked their reputation is sullied making them look like they aren’t protecting their client’s data either...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Twitter Spam Campaign Serving Up Rogue Antivirus

April 19, 2012 Added by:Headlines

"Early today, Kaspersky Lab discovered a new ongoing spam campaign on Twitter. Hundreds of compromised accounts are currently spamming malicious links, hosted on .TK and .tw1.su domains, leading to Rogue Anti Virus softwares," writes Kasperky's Nicolas Brulez...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

US Confirms Iran Did Not Hack RQ-170 Stealth Drone

February 13, 2012 Added by:Dan Dieterle

A congressional official has confirmed that Iran did not bring down the drone with it’s “cyber warfare” skills. Information from a 10 week CIA review seems to point to a malfunctioning data stream. Information from the faulty stream may have led the drone operator to land the UAV...

Comments  (0)

91648658a3e987ddb81913b06dbdc57a

How the RQ-170 Was Hijacked

December 15, 2011 Added by:Ron Baklarz

While it is reported that intercepting unencrypted drone communication data streams had first been known to US military since the mid-1990's, this exploitation continued on into 2009 where militant laptops were found with drone data and unencrypted video feeds from Predator drones...

Comments  (9)

69dafe8b58066478aea48f3d0f384820

Anonymous Unveils Twitter Hijack Tool: URGE

September 09, 2011 Added by:Headlines

Anonymous has released an purported Twitter hijacking tool called URGE, posting the source code for the exploit on Github. Using the tool could be considered an illegal act, and those that choose to download and perform Twitter hijacking operations could find themselves facing legal repercussions...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Man Gets Eighteen Years for Hacking Neighbors

August 12, 2011 Added by:Robert Siciliano

In Minnesota prosecutors put away a “depraved criminal” for 18 years as a result of virtually torturing his neighbors via their Wi-Fi connection. After a brief encounter with his new neighbors he began “a calculated campaign to terrorize his neighbors”...

Comments  (1)

F29746c6cb299c1755e4087e6126a816

Are Hijacked Facebook Accounts Identity Theft?

August 08, 2011 Added by:Kelly Colgan

An interesting Appellate Court opinion was recently issued that requires us to acknowledge the expanding realm of our own identity footprints and the need for evolving views of how we define identity theft. The case stemmed from a Juvenile Court case in Kings county California...

Comments  (1)

37d5f81e2277051bc17116221040d51c

OddJob Trojan Hijacks Online Banking Sessions

June 14, 2011 Added by:Robert Siciliano

The OddJob Trojan hijacks online banking sessions, keeping users’ accounts open after they think they’ve quit. Hackers can then access the open account to make fraudulent transactions. When your computer’s security is lax, you’re vulnerable to malware or malicious software...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China Denies Orchestrating Gmail Hijacking Campaign

June 02, 2011 Added by:Headlines

"We are obviously very concerned about Google's announcement regarding a campaign that the company believes originated in China to collect the passwords of Google email account holders... These allegations are very serious... We're looking into them," said Secretary of State Hillary Clinton...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hijacked GOV and EDU Websites Serving Up SPAM

January 17, 2011 Added by:Headlines

The websites of some of the country's biggest universities, as well as several government administered sites, have been compromised and are redirecting visitors to SPAM ads. Sections of the websites contain redirected links to spoofed Google searches for fake online stores peddling everything from software to pharmaceuticals...

Comments  (0)