Internet Anthropologist Think Tank: Hackers Ops and Intel update, 12.18.09

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Saturday, December 19, 2009

    Hackers Ops and Intel update, 12.18.09



    Hackers Ops and Intel update, 12.18.09





    hACKER Seeks Hit Man to Kill Informant






    SPY:
    SEOUL, South Korea -- South Korea's military said Friday it was investigating a hacking attack that netted secret defense plans with the United States and may have been carried out by North Korea. SOURCE:


    HACKER: $1.1 million that he had buried in his parents’ backyard.
    SOURCE




    HACKED US MILITARY VIDEO FEEDS, MOST AIRCRAFT.
    SOURCE:




    HACKED
    American Bank online has been offline since Monday when company officials discovered someone may have hacked into the online banking system 
    SOURCE:




    CYBER HACKER STRIKE; iran
    Computer hackers disrupted an opposition Web site and Twitter late Thursday and Friday, identifying themselves as the Iranian CyberArmy and posting anti-American messages in English. Traffic on Twitter was blocked for more than an hour, according to a message posted by the site. The opposition Web site www.mowjcamp.com, which is run by supporters of candidates who ran against PresidentMahmoud Ahmadinejad in the June election, was also disrupted.Iran’s opposition movement has depended heavily on Web sites and Twitter to communicate with the outside world, particularly since a government crackdown that began after the election, which Mr. Ahmadinejad won amid accusations of widespread fraud.
    SOURCES:


    HACKER BREAK THROUGH
    RAM scrapers that grab data during the few seconds it’s unencrypted.





    while companies have been expanding their use of encryption to protect bank card data in transit and in storage, hackers have begun to use RAM scrapers to grab data during the few seconds it’s unencrypted and transactions are being authorized.


    The supplement provides case studies, involving anonymous Verizon clients, that detail some of the tools and methods hackers used to compromise the more than 285 million sensitive records that were breached in 90 forensic cases Verizon handled last year.




    CYBER Ghost Riding is very dangerous, IATT SOURCE:







    Gerald
    Internet Anthropologist
    Tactical Internet Systems analyst


    ,



    Labels: ,

    0 Comments:

    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home