In January last year, a hacker network that claimed to be based in Saudi Arabia paralyzed the websites of Israel's stock exchange and national airline and claimed to have published details of thousands of Israeli credit cards.
Only, the wireless network you signed into was not only unsecure, it was a decoy network setup by a malicious hacker targeting people casually checking email, like you.
In a talk at the Black Hat security conference in Barcelona Thursday, Greek researcher Thanassis Giannetsos plans to present a new software tool that he and two colleagues have written that they say would allow a malicious hacker to penetrate a sensor network and change or delete data at will.
FORBES: Researcher Throws A Wrench In IBM And HP's Sensor Networks
Kevin Bong, a Wisconsin-based security researcher and penetration tester, has developed what he calls the Mini Pwner, a spy computer smaller than a smartphone designed to be inconspicuously plugged into an ethernet port to gain access to a corporate network, feeding information back to a nearby hacker over its wifi signal.
FORBES: Hacker's Tiny Spy Computer Cracks Corporate Networks, Fits In An Altoid Tin
The young hacker began to focus his attention away from network flaws to what he perceived as wrongdoings of governments.
Five days after a hacker invaded Sony Computer Entertainment's PlayStation Network resulting in a lengthy outage, the video game giant has yet to offer a comprehensive explanation.
Would it be a haggard, red-eyed hacker working in a basement somewhere trying to break into your network?
FORBES: Intellectual Property Theft: Beware The Enemy Within
But for anyone who wants to do their fellow network users a favor and really screw with anyone using Firesheep, one Icelandic hacker has come up with a more aggressive solution: FireShepherd.
FORBES: How To Screw With Firesheep Snoops? Try FireShepherd
The day of the lone hacker in Des Moines trying to invent a worm to bring down the network for personal bragging rights .
FORBES: Intel Is Alive And Well: An Interview With CEO Paul Otellini
When it comes to security, Census should focus on protecting its Web server, which is a prime hacker target, said Mike Zboray, vice president and research director of network security at Gartner Group.
CNN: Census Bureau will allow millions of citizens to file census forms online
That means a hacker with enough time, resources and skill can break or break into any network--no matter how seemingly well-protected.
The hacker seemed to be incensed by the recent Goldman Sachs investment in the social network, suggesting instead that Facebook consider the non-profit route.
FORBES: After Mark Zuckerberg's Account is Hacked, Facebook Ups its Security Measures
Guido uses the case, much of which has been made public, to recreate the exploit, having students map out step by step how the hacker was able to access a desktop computer and infiltrate the company's network.
The PlayStation Network that provides those multiplayer capabilities recently suffered an outage of more than three weeks after a hacker intrusion on the service.
The hacker executes a DDoS attack by telling all the computers on his botnet the network of zombie computers to contact a specific server or Web site repeatedly.
应用推荐