Copyright © 2015
Tag - Hackers
A secretive hacking collective that has been active for almost two decades has allegedly been uncovered by Kaspersky Lab. Dubbed the "Equation Group," because of their use of encryption algorithms and obfuscation methods, the hackers are apparently unique in that they created highly-professional tools and used "classic spying techniques" to retrieve data and affect systems used by high-value targets, such as governments, major national organizations, and other political targets.
In a surprising twist to the ongoing saga of an attack on Sony Pictures' internal computer system by unidentified hackers (likely to be from North Korea), the studio is starting to fight back by leveraging Amazon Web Services to carry out distributed denial of service (DDoS) attacks on identified servers that contain files stolen from Sony over the last month. Taking a page from its own playbook, the media conglomerate is flooding suspect servers with dummy files, a sequel of sorts to anti-piracy attacks carried out by the firm in conjunction with Media Defender seven years ago.
Sony Pictures employees were greeted by a message from hackers when they attempted to log in for work this morning, as a group reportedly seized control of all computers in the company. According to the images appearing on the Sony computers, the hacking group referring to itself as #GOP said it would continue until "requests be met."
In a speech on Monday, Detroit Mayor Mike Duggan revealed some of the recent technical problems the city is facing. As if bankruptcy and other financial woes from the recession weren't enough for the city, Duggan said that Detroit has been a target for various cyberattacks, including an attempt by hackers to hold one of the city's databases for ransom.
A filing made with the United States Securities and Exchange Commission (SEC) Thursday revealed new information on the scope of the breach that JPMorgan Chase witnessed earlier in the summer. In July the company, along with at least four other financial institutions, discovered an attack by hackers that reportedly resulted in gigabytes of data stolen after they gained high-level access to 90 of JPMorgan Chase's servers worldwide.
The United States Department of Justice (DOJ) released a statement today in regard to a group of hackers charged with a string of computer breaches related to the theft of software from several large game companies. More than $100 million in software was stolen as a result of their activities, including a US Army helicopter training program developed by Zombie Studios, developer of America's Army: Special Forces.
A US Senate committee discovered that Chinese hackers were able to gain access to computer systems for US Transportation Command (Transcom) contractors at least 20 times in a single year. In an unclassified report released today, the investigation focused on the security of Transcom due of the central role it plays in mobilizing troops and equipment.
Apple CEO Tim Cook has formally addressed the recent celebrity selfies scandal, where some of the images obtained by hackers came from the victims' iCloud accounts (alongside other services, those responsible for the collection of the images have recently admitted). In an interview with the Wall Street Journal, Cook not only acknowledged that some celebrities' accounts were specifically targeted using conventional data-stealing techniques, but promised both educational and engineering improvements.
The New York Times reported earlier this week that a hacker group has collected 1.2 billion unique username and password credentials from 420,000 websites. The records, which were verified by a security firm, is thought to be one of the largest collections of Internet identity information reported. The publication had the data analyzed by another expert, who verified the authenticity of the collection but has not commented on the validity of the data.
Hackers in the United Kingdom could face tougher penalties in the future, as a part of government plans announced in the Queen's Speech yesterday. The proposed Serious Crime Bill, part of which updates the 1990 Computer Misuse Act, would see penalties up to and including life sentences for cyberattacks that cause death or serious injury, or is deemed a threat to national security.
Now AAPL Stock: 95.01 ( + 0.99 )
Swift benchmarking suite goes open-source
Following the release of new betas for all its platforms, Apple on Monday also made a suite of 75 tools for benchmarking Swift-developed coding projects, including libraries for benchmarking functions, a utility for comparing the resulting metrics, and a driver for running them. The company says it is asking the community for help in developing additional benchmarks, as well as further "helper" libraries and overall code review for better stability and performance. Apple plans to include benchmark pull requests in Swift's new continuous integration system as well. http://bit.ly/1W8u0EU
Instagram now supporting multiple accounts
As reported earlier, Instagram is now rolling out support for multiple accounts (up to five) in version 7.1.5 of its iOS app. The feature has been one of the main attractions of third-party Instagram clients, but it is unclear if users must seek out an "add account" preference in the app; additionally, some users are reporting that the ability to add accounts has not yet been added. The company says notifications "depend on when you last logged in, and the number of devices that are logged into that account," suggesting not all notifications across accounts will appear when logged into a given one. http://bit.ly/1moh95p
Pictures of Galaxy S7, Edge leaked
New images have been leaked of Samsung's new Galaxy S7 and S7 Edge. The images of the Galaxy S7 are very similar to a draft leaked earlier this year, with a curved back reminiscent of the iPhone 3G with the normal Samsung camera hump in the upper center of the phone. The picture of the Galaxy S7 Edge as leaked is running a benchmark application showing modest improvements over the S6 line, if accurate. Both models are expected to be formally announced in a February 21 press event hosted by Samsung. http://bit.ly/20Gf07X
Bambooti wooden skins for MacBooks
Bambooti has introduced premium wooden skins for Apple laptops that allow users to customize any design or logo directly on the case. Each Bambooti skin is handcrafted from sustainably managed forests, and are hand sanded and spray-finished to create an ultra smooth exterior. Bambooti's wooden skins start at $65 on the fully-funded Kickstarter which includes a custom design or logo of the user's choice that will be engraved on the product. http://kck.st/1PhE6Sb
Apple Music in Taiwan, now up to 113 countries
Apple Music has now added its 113th country, Taiwan, to its expanding list of areas where it offers its paid subscription service. The price in the country will start at NT$150 (about $4.50 US) for an individual subscription, and that now includes (as it does in the rest of the world) the formerly free-but-ad-supported iTunes Radio feature, which as in other countries will be customized somewhat to offer channels of locally-popular music styles. Apple Music is now available in 16 countries and regions -- including China, India, Russia, and Japan -- where Spotify has not yet arrived.
Invisible wall mount for iPad Pro, mini
Computing hardware mounting company Wall-Smart has announced the availability the new "invisible" wall mount, with models for the iPad Pro, iPad Air 2 and iPad mini 4 -- all with no bezel. The invisible mount includes Power Over Ethernet to USB, which allows charging while in-wall, and is available for both drywall and solid surfaces such as solid wood panels or partition walls. Prices vary widely by iPad model, and required mounting hardware. http://bit.ly/1SE5jCO
Kingston buys IronKey secure USB tech
Kingston Digital today announced it has acquired the USB technology and assets of IronKey from Imation. In addition to Kingston's acquisition, encryption services leader DataLocker has purchased the IronKey Enterprise Management Services platform which provides centralized management to encrypted USB drives. Kingston and DataLocker claim that there will be no interruption in service provided, or available products as a result of the consolidations. http://bit.ly/1QQk9SZ