News Posts matching #Hacking

Return to Keyword Browsing

Brand New Models for Happy Hacking Keyboard and HHKB Accessories Now Available!

Fujitsu Computer Products of America, Inc. introduces new Happy Hacking Keyboard (HHKB) models including a Bluetooth enabled model, as well as HHKB branded accessories for avid HHKB fans!

The HHKB was developed by programmers for programmers to provide a smooth and fast keying experience while minimizing hand and finger fatigue. The keyboard only has the most necessary keys resulting in a light, compact and minimalist device. Since its introduction, the HHKB has been used by many customers including programmers and engineers and has sold over 500,000 units worldwide. The core concepts for the HHKB are its intelligent key layout and compact size. While these features have never changed for more than 20 years, keymap customization software and multi-platform support have been introduced to meet the changes in today's technology and work environment.

"I've personally used HHKB for over 20 years for professional and personal use, and I'm very excited to bring the latest generation of this cult classic to the U.S. market." said Yasunari Shimizu, CEO of Fujitsu Computer Products of America.

Symantec Report Reveals 81 Percent Increase in Malicious Attacks in 2011

Symantec Corp. today announced the findings of its Internet Security Threat Report, Volume 17, which shows that while the number of vulnerabilities decreased by 20 percent, the number of malicious attacks continued to skyrocket by 81 percent. In addition, the report highlights that advanced targeted attacks are spreading to organizations of all sizes and variety of personnel, data breaches are increasing, and that attackers are focusing on mobile threats.

Malicious Attacks Continue to Grow Rapidly

Symantec blocked more than 5.5 billion malicious attacks in 2011, an increase of 81 percent over the previous year. In addition, the number of unique malware variants increased to 403 million and the number of Web attacks blocked per day increased by 36 percent.

Canadian Police Slay Zombie Network With up to 1 Million Members

In response to one of the largest hacking scams in the history of Canada, police from Quebec raided several homes across Quebec, and arrested 16 people, between the ages of 17 and 26. Their crimes, other than making a million zombies, include creating phishing sites that earned them a respectable kickback of $45 million CAD. Canadian authorities claim that these million computers were mainly in Poland, Brazil, Manitoba, and America. Government computers may have been compromised as well, but investigators will not disclose where those computers may have been. Regardless, many of these zombies are coming back from the brink, and it seems this crisis is, for the most part, contained.

Harvard University Hacked; Backup of Server Databases Found on Bittorrent

While The Pirate Bay, itself, is not involved in any crime (which is really the only reason that groups like the RIAA haven't been able to get a conviction on any of the administrators just yet), it certainly is a host to all manner of evil. Most recently, the torrent tracker found a 125MB zip file, which turns out to be the backup from the Harvard Graduate School of Arts and Sciences website. The torrent was actually seeded from a Harvard-based IP address, and carries all manner of information, passwords, and files. The .NFO file, in broken English, reads as follows:
Maybe you don't like it but this is to demonstrate that persons like tgatton(admin of the server) in they don't know how to secure a website.
This is the first security breach since 2005. Harvard is currently working on patching the breach, and at this point, the main website that was hacked is down.

Vista Registry Hack Forces Auto-Download of SP1

For any of you hoping to get Windows Vista SP1 RTM code before it's officially ready, I suggest you head over to the source link for a detailed registry hack. Basically, this hack is a clever use of Microsoft's own code. At the run of a CMD file that was present in the latest beta version of Vista SP1, any version of Windows Vista will phone home and download whatever SP1 files it can find. Luckily for the adventurous, Microsoft will not be trying to shoot this hack down. In fact, they're happy that this time around, the hacking is completely legal, and safe. Safe, that is, until the upgrade is complete, after which you still are dealing with unfinished code.

If you understand the risks and want to play around, please follow the source link to download the appropriate files.

High School Student May Not Graduate Because he Built a Proxy Server

While some schools do everything they can to facilitate children learning about computers, others draw a fine line between "edutainment" and "security risk". A high school student in Fairfax County, Virginia must visit one of the latter categories. He was pulled out of his Philosophy exam to be told that he may not graduate; he built a proxy server in his (parents') home. Dubbed "Afnani's Moo Proxy", it was used by himself and a couple technologically-adept students to bypass school firewalls. The administrator of the school networks would not have any of it. He tried to declare the server illegal, despite nothing in the usage contract saying using any proxy, let alone your own personal one, was illegal. When the student pointed out the flaw in the contract, the administrator simply changed his accusations to "repeat network abuse", which can keep the boy from walking at graduation.

The high school student has decided to comply, and has shut down all proxy servers he owns. His personal school computer account has been disabled, but he is (at this point) allowed to graduate.

PowerColor Website Hacked

Readers might want to take care when visiting PowerColor's website for the next couple of days as it looks like the site has been hacked by someone with the alias DaRKHuNTeR. From a quick look the only noticeable alteration is that the news story titles have been modified, which shouldn't be too dangerous. However, the more worrying thing is what else might have been changed. For example the hacker may have potentially added malicious downloads and links, so it's probably best to avoid PowerColor's site for a while.

Hackers Launch Major Attack on US Military Labs

Hackers have succeeded in breaking into the computer systems of two of the U.S.' most important science labs, the Oak Ridge National Laboratory (ORNL) in Tennessee and Los Alamos National Laboratory in New Mexico. In what a spokesperson for the Oak Ridge facility described as a "sophisticated cyber attack," it appears that intruders accessed a database of visitors to the Tennessee lab between 1990 and 2004, which included their social security numbers and dates of birth. Three thousand researchers reportedly visit the lab each year, a who's who of the science establishment in the U.S.

New Report Reveals Wireless Keyboard Security Vulnerabilities

A new white-paper published by Remote Exploit highlights how it is possible to remotely intercept signals from wireless peripherals such as keyboards. The security hack works only against keyboards using radio technology operating on a radio frequency of 27Mhz, which was previously thought to be secure from most casual attacks. The white-paper demonstrates how it is possible to use a simple radio receiver, a sound card, and some basic PC software to intercept these signals and reveal what users have been typing. While Bluetooth is safe from this vulnerability, companies such as Microsoft and Logitech still continue to use the tradition radio technology.

New Hacking Tool Uses Power of Graphics Cards

When Folding@Home came out with a GPU client, folding scores soared, due to the massive power just waiting to be unlocked in a graphics card. However, as said in Spider-man, with great power comes great responsibility. Someone has reverse-engineered the power of graphics, and is trying to patent the use of this power to crack passwords at incredible rates.
The toughest passwords, including those used to log in to a Windows Vista computer, would normally take months of continuous computer processing time to crack using a computer's central processing unit (CPU). By harnessing a $150 GPU - less powerful than the nVidia 8800 card - Elcomsoft says they can cracked in just three to five days. Less complex passwords can be retrieved in minutes, rather than hours or days
Such technology could be used by crime investigators to log into terrorist networks, or pirates to get into RIAA servers.
Return to Keyword Browsing