Tag Archives | Hacking

How To Buy Zero Day Exploits (And How Much They Cost)

If you have to ask what zero day exploits are, this post ain’t for you. But if you know and you’re in the market for some custom hacking, Wired usefully provides a spy firm’s price list:

The trade in the secret hacker techniques known as “zero day exploits” has long taken place in the dark, hidden from the companies whose software those exploits target, and from the privacy advocates who revile the practice. But one zero-day broker is taking the market for these hacking techniques into the open, complete with a full price list.


In an unprecedented move Wednesday, the zero-day broker startup Zerodium published a price chart for different classes of digital intrusion techniques and software targets that it buys from hackers and resells in a subscription service to customers that include government agencies. The list, which details the sums it pays for attack methods that effect dozens of different applications and operating systems, represents one of the most detailed views yet into the controversial and murky market for secret hacker exploits.

Read the rest
Continue Reading

The New Art of War: How trolls, hackers and spies are rewriting the rules of conflict

Is the Art of War different if it’s a cyberwar? Tech Republic glamorizes hackers and trolls:

Cyberwar isn’t going to be about hacking power stations. It’s going to be far more subtle, and more dangerous.

Wandering the pretty, medieval streets of Tallinn’s old town, it is hard to believe that the tiny country of Estonia has anything at all to do with cyberwarfare. But first as victim of an attack and now as home to some of the leading thinkers on how the digital battlefield will develop, the country has played a key role in its emergence and evolution.

Talinn - 08

Estonia is a country of around 1.3 million people, facing the Baltic Sea and the Gulf of Finland, it borders Latvia to the south and Russia to the east. After decades as part of the Soviet Union, it regained independence in 1991.

Even today reminders of the Soviet times still abound in the capital Tallinn.

Read the rest
Continue Reading

How To Navigate A Data Leak

r2hox (CC BY-SA 2.0)

r2hox (CC BY-SA 2.0)

Welcome to the 21st century. The age of the Data Leak and web security breaches galore. Virtually no website is secure from determined data-miners and hackers alike. On Tuesday, user info (including addresses and partial credit card numbers) was leaked from the site Ashley Madison and has left the web and real world in an uproar. The leak came in two parts. Another info drop was made yesterday and seems to be info from the website owners and internal site goings-on, supposedly including internal site emails.

Very little of our internet deeds or misdeeds are truly secure. This is the era of leaked celebrity nudes, internal email breaches, and security insecurity. For those in the know, it’s easy enough to “cover” your tracks online through a series of email accounts and a few pre-paid credit cards, but on the whole, most people do not go through that much trouble to hide their actions online.… Read the rest

Continue Reading

Hackers Can Disable A Sniper Rifle – Or Change Its Target

tp750 rifle

TrackingPoint self-aiming rifle.

Hot off their success at forcing Jeep to recall 1.4 million vehicles due to their vulnerability to being taken over by hackers, the gang at Wired is focusing on sniper rifles that can be hacked. Yes you read that right…

Put a computer on a sniper rifle, and it can turn the most amateur shooter into a world-class marksman. But add a wireless connection to that computer-aided weapon, and you may find that your smart gun suddenly seems to have a mind of its own—and a very different idea of the target.

At the Black Hat hacker conference in two weeks, security researchers Runa Sandvik and Michael Auger plan to present the results of a year of work hacking a pair of $13,000 TrackingPoint self-aiming rifles. The married hacker couple have developed a set of techniques that could allow an attacker to compromise the rifle via its Wi-Fi connection and exploit vulnerabilities in its software.

Read the rest
Continue Reading

Hackers Watch “Hackers” The Movie

Simon Chetrit via Hopes&Fears:

The cultural impact of the mid-nineties tech revolution is still being felt today. Cell phones, email, webcams, the Hubble Space Telescope, the World Wide Web and HTML, digital cameras—all came about within a relatively short time span. A newly computerized world brought with it fears from the general public about the potential for technological abuses. This paranoia was keenly exploited by the filmmakers of the day.

Hackers, The Net, Virtuosity, GoldenEye and Johnny Mnemonic all came out in 1995, when just 14 million American adults were using the internet. Of these films, few stand the test of time. The flicks faced a unique challenge in attempting to make a fundamentally uninteresting, unfamiliar activity into something captivating. Hackers was a financial flop, but its hilariously over-the-top early CGI visuals, oddly prescient view on technology, and glam-cyberpunk aesthetic rendered it a cult classic.

To honor its 20th anniversary—at a time dogged by newfound fears about what the future of technology holds—we thought it would be fitting to bring together a group of actual hackers to screen and discuss the film.

Read the rest
Continue Reading

Hackers List, Where You Can Hire Hackers To Do Dubious Things

Do you need someone to be your own private North Korean-style hacker? ArsTechnica suggests checking out Hackers List:

One recent post on Hacker’s List, a site dedicated to matching up hackers with those who need something hacked, was headed “FB [Facebook] Account Hack for Justice.”

hackers list

“Scumbag guy I met at a bar over the weekend followed me home and assaulted me,” it read. “Thankfully the police caught him and he’s thinking long and hard about what he did in a county jail. This is apparently not the first time he’s done this, but he got off free of charge the last time. I want to hit him where it hurts.”

The poster offered between $200-$300 for access to the man’s account.

Since being profiled in The New York Times two weeks ago, Hacker’s List has buckled under a deluge of traffic and still goes up and down on a regular basis.

Read the rest
Continue Reading

John McAfee: ‘I know who hacked Sony Pictures – and it wasn’t North Korea’

Remember John McAfee, the onetime cybersecurity king who lost the plot and went on the lam? Ironically he’s now a sort of hacker hero and he tells IB Times that through his knowledge of the hacking community he knows who hacked Sony Pictures’ computer systems and it definitely wasn’t North Korea:

Anti-virus pioneer John McAfee claims to have been in contact with the group of hackers behind the devastating cyber-attack against Sony Pictures and guarantees they are not from North Korea.


Speaking to IBTimes UK about his current roster of security startups under his Future Tense brand – including secure messaging app Chadder – McAfee spoke about working with the FBI previously but said that, in this case, the agency was “wrong”.

“I can guarantee they are wrong. It has to do with a group of hackers – I will not name them – who are civil libertarians and who hate the confinement the restrictions the music industry and the movie industry has placed on art and so they are behind it.”

In December Sony Pictures was the victim of a devastating cyber-attack by a group calling themselves Guardians of Peace.

Read the rest
Continue Reading

North Korea, Sony, and America’s First Losing Cyberwar

The Interview 2014 poster.jpg

I’ve been hooked on the various salacious disclosures from the hack attack on Sony Pictures Entertainment. Reading what studio executives really think of their star actors and producers is better than TMZ can make up, and the true financial performance of various movies would never, ever be disclosed outside the C-suite if not for the Pastebin uploads. The real-life plot starring North Korea’s leader Kim Jong-un, his supposed superhackers, Seth Rogen and the heads of Sony also reads like a sequel to The Orphan Master’s Son. But is it too good to be true? Wired pours some cold water on the fire:

Today Sony canceled the premiere of “The Interview” and its entire Christmas-Day release of the movie because of fears that terrorists might attack theaters showing the film.

The actions show just how much power the attackers behind the Sony hack have amassed in a short time. But who exactly are they?

Read the rest
Continue Reading

Remembering the Max Headroom Incident, One of the Creepiest Hacks Ever

I actually learned about this on Reddit just a couple of weeks ago. If you haven’t heard of the Max Headroom Incident, you’re in luck because Klint Finley recounts this bizarre, but legendary hacking event over at Wired.

via Wired:

Around 9 o’clock on November 22, 1989, Chicago residents witnessed this epic hack. The evening news sportscast cut out, and a person in a strange mask appeared, dancing around in front of a spinning piece of metal—a rather dark incarnation of Max Headroom, the rather inexplicable character at the heart of the British TV series Max Headroom: 20 Minutes into The Future and two subsequent TV shows. On these shows, Headroom had a tendency to interrupt the broadcasts of the fictional TV station Network 23, but this wasn’t an authorized appearance by the character. It was a real pirate transmission.

After about 30 seconds, WGN’s technicians were able to override the pirate signal.

Read the rest
Continue Reading

The KKK Learns the Hard Way: Don’t Mess With Anonymous

(Photo: Twitter)

(Photo: Twitter)

via Take Part:

The hacktivist collective hacked the Ku Klux Klan’s Twitter account after the white supremacists threatened Ferguson protesters.

Participants of one group wear hoods, while members of the other cloak their identity with the mystery of the Internet and Guy Fawkes masks. Despite all that secrecy, most folks would agree that’s where the similarities between the Ku Klux Klan and Anonymous begin and end. But the two organizations are now engaged in a war after the hacktivist collective took over several of the hate group’s Twitter accounts and revealed the identities of purported KKK members on social media.

In a YouTube video posted on Sunday announcing Operation KKK, Anonymous stated, “We are not attacking you [the KKK] because of what you believe in, as we fight for freedom of speech. We are attacking you because of your threats to use lethal force against us at the Ferguson protests.”

Read More: http://www.takepart.com/article/2014/11/17/anonymous-hacks-kkks-twitter-account-starts-outing-alleged-members

Read the rest

Continue Reading