
They should make that pic part of Apple's marketing strategy.
Hector Xavier Monsegur, aka Subu, who allegedly led and then sold out the LulzSec hacking group, has bought himself another six months of freedom from the big house. The US Department of Justice has filed a motion in the New York courts to keep Monsegur on the streets until February 2013 due to his "ongoing cooperation with …
It wouldn't be him going there for them, it will be them going there for him. One might consider the illicit side of it to balance out - ignoring for the moment the question of whether he really was what one would consider some sort of instigater - but if all else is equal, the difference between them and him is he's trading a presumably significant part of _their_ lives to pay for _his_ mistakes. Like granny-muggers, there really is no place for people like him among the living.
When the Feds come knocking with enough charges against you to put you away for decades never to see your children again unless you turn on some internet "friends" you have never met IRL and only know from IRC boards, what would you do?
When confronted with the prospect of serious time in a Federal jail with hardened criminals (drop the soap sugar?) Most people would cut a deal in that situation.
Its sad he risked never seeing his chrildren grow up just to be an ass on the Internet "for teh lulz". Seems he realised his mistake himself as soon as the Feds were at his door.
I would imagine you don't have kids. Three hots & a cot doesn't mean anything if you can't see your kids.
Not to mention, he has made the careers of a number of government employees. There is a good chance he will find a place thanks to them.
You imagine wrong. My daughter is the Senior Member of the Technical Staff for a Fortune 150. Her goal in life is to become a better ethical hacker than I am ... although she cheerfully admits that it's unlikely to happen, seeing as I have a 27ish year head-start :-)
I seriously doubt that the unemployed "Sabu" twat gives a rat's ass about the kids, who are taken care of by his mommy. They are probably nothing more than a welfare paycheck for him.
The .gov will not give him a career. He's burned his "trustworthy" bridge.
China's internet regulator has launched an investigation into the security regime protecting academic journal database China National Knowledge Infrastructure (CNKI), citing national security concerns.
In its announcement of the investigation, the China Cyberspace Administration (CAC) said:
Air raid sirens sounded for over an hour in parts of Jerusalem and southern Israel on Sunday evening – but bombs never fell, leading some to blame Iran for compromising the alarms.
While the perpetrator remains unclear, Israel's National Cyber Directorate did say in a tweet that it suspected a cyberattack because the air raid sirens activated were municipality-owned public address systems, not Israel Defense Force alarms as originally believed. Sirens also sounded in the Red Sea port town of Eilat.
Netizens on social media and Israeli news sites pointed the finger at Iran, though a diplomatic source interviewed by the Jerusalem Post said there was no certainty Tehran was behind the attack. The source also said Israel faces cyberattacks regularly, and downplayed the significance of the incident.
Never mind what enterprise programmers are trained to do, a self-defined set of hackers has its own programming language zeitgeist, one that apparently changes with the wind, at least according to the relatively small set surveyed.
Members of Europe's Chaos Computer Club, which calls itself "Europe's largest association of hackers" were part of a pool for German researchers to poll. The goal of the study was to discover what tools and languages hackers prefer, a mission that sparked some unexpected results.
The researchers were interested in understanding what languages self-described hackers use, and also asked about OS and IDE choice, whether or not an individual considered their choice important for hacking and how much experience they had as a programmer and hacker.
After at least six years of peddling pilfered personal information, the infamous stolen-data market RaidForums has been shut down following the arrest of suspected founder and admin Diogo Santos Coelho in the UK earlier this year.
Coelho, 21, who allegedly used the mistaken moniker "Omnipotent" among others, according to the US indictment unsealed on Monday in the Eastern District of Virginia, is currently awaiting the outcome of UK legal proceedings to extradite him to the United States.
The six-count US indictment [PDF] charges Coelho with conspiracy, access device fraud, and aggravated identity theft following from his alleged activities as the chief administrator of RaidForums, an online market for compromised or stolen databases containing personal and financial information.
Analysis The Lapsus$ cyber-crime gang, believed to be based in Brazil, until recently was best known for attacks on that country's Ministry of Health and Portuguese media outlets SIC Noticias and Expresso.
However, the gang is climbing up the ladder, swinging at larger targets in the tech industry. Over the past few weeks, those have included Nvidia, Samsung, and Argentine online marketplace operator Mercado Libre. Now, Lapsus$ is suspected of attacking game developer Ubisoft.
Lapsus$ in February compromised Nvidia, stealing a terabyte of data that included proprietary information and employee credentials, and dumping some of the data online. The crew also demanded the GPU giant remove limits on crypto-coin mining from its graphics cards, and open-source its drivers.
The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.
NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.
"Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."
BadgerDAO, maker of a decentralized finance (DeFi) protocol, said on Wednesday that it is investigating reports that millions in user funds have been stolen.
"As Badger engineers investigate this, all smart contracts have been paused to prevent further withdrawals," the company wrote in a Twitter post. "Our investigation is ongoing and we will release further information as soon as possible."
PeckShield, a blockchain security firm, put the losses at $120.3 million, if translated to fiat currency.
A Ubiquiti developer has been charged with stealing data from the company and extortion attempts totalling $2m in what prosecutors claim was a vicious campaign to harm the firm's share price – including allegedly planting fake press stories about the breaches.
US federal prosecutors claimed that 36-year-old Nickolas Sharp had used his "access as a trusted insider" to steal data from his employer's AWS and GitHub instances before "posing as an anonymous hacker" to send a ransom demand of 50 Bitcoins.
The DoJ statement does not mention Sharp's employer by name, but a Linkedin account in Sharp's name says he worked for Ubiquiti as a cloud lead between August 2018 and March 2021, having previously worked for Amazon as a software development engineer.
A zero-day exploit said to have been developed by the NSA was cloned and used by Chinese government hackers on Windows systems years before the cyber-weapon was leaked online, it is claimed.
Check Point put out a report on Monday digging into Chinese malware it calls Jian, and argues persuasively this particular software nasty was spawned sometime around 2014 from NSA exploit code that eventually leaked online in 2017.
The timeline basically seems to be, according to Check Point:
A young man caught hacking into Nintendo’s servers to steal secret Switch blueprints has been sentenced to three years in prison after ignoring an FBI warning to stop.
According to court documents [PDF] Ryan Hernandez of Palmdale, California, is now 21 though in 2016, while a minor, he requested help on a Nintendo forum. An engineer at the Japanese giant clicked on a link in that post and was taken to a malicious website that secretly obtained the staffer's login credentials for Nintendo's developer portal. These were then used to gain administrator access on the internal site.
From there, he stole reams of Nintendo's confidential information, some of it on the yet-to-be-announced Switch console, that he then posted online. This attracted the attention of the FBI, who turned up at his parents’ house in October 2017, and extracted a promise from Hernandez that he would stop his hacking activities.
Biting the hand that feeds IT © 1998–2022