The Tor encryption service is a high-profile bastion of computer security, but the project appears to have been compromised earlier this year.
Today, the Tor Project blog announced that an unknown party likely managed to gather information about people who were looking up hidden services — websites that users can operate and visit anonymously, like Silk Road — and could theoretically have compromised other parts of the network. Anyone who used Tor between early February and July 4th of 2014 "should assume they were affected" by the attack, says the Tor team. But they don't know what exactly that means.Read more
The main page Gizmodo was changed. Hackers have made all the users to be redirected to another web-page with the help of optional script.
The group of attackers compromised the well-known design Gizmodo`s reputation. Attackers tried to hack the site in order to spoil their reputation. Hackers changed the page of Brazilian web-portal Gizmodo by adding the script with the help of which guests of the site were redirected to an absolutely another page. The page on which the users were redirected was located in Sweden, under the domain name .se. The sheathing for server control was loaded on a site.Read more
Canada accused China on Tuesday of hacking into the computers of its research and development arm, which Beijing strongly denied.
China partners each year with thousands of Canadians firms to roll out new technologies, and took advantage of this arrangement to engage in a cyber attack, Ottawa said. "Recently, the government of Canada, through the work of the Communications Security Establishment, detected and confirmed a cyber intrusion on the IT infrastructure of the National Research Council of Canada by a highly sophisticated Chinese state-sponsored actor," said a government statement.Read more
Boffins get your mobe to spill the beans using Google text-to-speech kit. Researchers from the Chinese University of Hong Kong have developed bizarre malware that dictates contacts, emails and other sensitive text data in order to steal it.
In the novel attack a seemingly innocuous app that required no permissions called a bad guy's phone number and blabbered the stolen data out of the speakers and down the microphone using Google Voice Services (GVS). It affected 'nearly all' Android devices and could not be detected by VoicEmployer malware or victims, provided savvy hackers conducted the attack in the wee hours with the volume turned down.Read more
Hackers have enrooted harmful programs in computer, which steal personal information from guests.
Secret Service of the USA has found keyloggers in hotels and advised all heads of hotel and restaurant business to check personal computers, which visitors can use. To steal personal and bank information on visitors, malefactors enrooted malware, which remembers pressing of keys on the keyboard. Some people, suspected in compromising computers of many large hotels in Fort Worth and Dallas areas were arrested in Texas. Sometimes the suspects used stolen credit cards to register as guests of the hotels.Read more
The Yo app is in the top 10 in the App Store in the USA plus it got 1 million dollars of investments.
The app was noted even by Elon Musk who had called it the best messenger. It appears that the app was hacked by three students from college. Firstly, cracking allows to recognize any phone number of the app user (hackers have already learnt phone number of app founder, and talked to him). Secondly, they can send "Yo" to any user in any quantity. Thirdly, cracking allows sending the push-notice to any user, with any text (guys decided not to do it). Generally, hackers have already reported to the author about the problem and he has confirmed the fact of cracking.Read more
Nokia paid millions of euros to a blackmailer to protect an encryption key of the Symbian phones in 2008.
The National Bureau of Investigation confirms that the case is still unsolved. The matter is investigated as aggravated extortion, says Detective Superintendent Tero Haapala. Journalists said that the blackmailers had acquired the encryption key for a core part of Nokia's Symbian software and threatened to make it public. Had it done so anyone could then have written additional code for Symbian including possible malware which would have been indistinguishable from the legitimate part of the software, MTV said.Read more
Malefactors can send a harmful code to devices, transmitting packages of data through radio or television channels.
So called smart TV are vulnerable to carrying out drive-by of attacks in which course the exploit is applied to interception of a digital television signal instead of IP-address data. About it in the research report Yossef Oren and Anzhelos Keromitis from Network Security Lab at the Colombian university. "For attack it isn't necessary either the IP address, or the server. Access on a roof to the antenna is needed only, and you can't almost be traced," scientists emphasize.Read more
Dutch group of hackers named doulCi can activate blocked by means of Activation Lock function iPhones, using false iCloud servers.
Team DoulCi published a workaround that requires users to plug a bricked device into their computer and alter the "hosts" file inside. The iPhone or iPad is then tricked into connecting to the hacked server, which unlocks the gadget. Then the device is enough to be connected to iTunes and to dump Activation Lock regularly. DoulCi system works only partially: in attempt to unblock iPhone by their method, GSM module remains disconnected because hackers have no corresponding activation keys, however they promise to correct a problem shortly. The user gets access only to device operating system and Wi-Fi.Read more
Researchers have uncovered Android-based malware that disables infected handsets until end users pay a hefty cash payment to settle trumped-up criminal charges involving the viewing of illegal pornography.
To stoke maximum fear, Android-Trojan.Koler.A uses geolocation functions to tailor the warnings to whatever country a victim happens to reside in. The screenshot to the right invoking the FBI, for instance, is the notice that's displayed on infected phones connecting from a US-based IP address. People in Romania and other countries will see slightly different warnings. The malware prevents users from accessing the home screen of their phones, making it impossible to use most other apps installed on the phone.Read more