There are also physical hacks – that can cause problems The Hacker News has an older post, and then we go down the list – pump skimmers, Bluetooth skimmer, and old fashioned ATM devices.
Fastcolabs has a video which shows where the skimmers are added (inside the pump stand – where the electronics are
That is the issue – one needs to have physical tests and reviews on all aspects of consumer access.
As VentureBeat.com has a story on an ATM Credit card skimmer to steal $100k
What can you do? – require the places you frequent on whether they are testing their devices like a hacker would look at things.
Arstechnica and other news stories broke this story in March, 2014
If your router has the following DNS servers: 126.96.36.199 and 188.8.131.52
Then you have been hacked.
Otherwise you will not know.
This is a typical example how malware authors make money.
They sell their programs and have other people make the attacks on you.
RSA blogs has the story – RSA is a security division of EMC company which has security encryption
RSA was one of the first practicable public-key cryptosystems and is widely used for secure data.
We recommend that you do not use SMS banking – as it is done over text. You should not use such a weak encrypted method
Here the EFF recommends not to text over SMS anything you dont want others to see.
GoodGearGuide out of Australia has a report:
Denial of service “attack” can cause a reboot of your phone.
It affects all Android 4.x firmware versions on Google Galaxy Nexus, 4 and 5.
When a phone receives a large number of SMS(Short Message Service- otherwise know known as text) messages it could reboot
A gang of 3 hackers were caught and have now been charged with conspiring to hack government computers.
A Wired story discusses the different hacks that occured:
1. gang is accused of using SQL-injection hacks and other methods to gain access to various systems including ones belonging to the U.S. National Geospatial Intelligence Agency
the most interesting point is how they went about doing it:
first a member scanned Internet websites for security vulnerabilities on protected computers, and especially to government, military and critical infrastructure sites.
Second they exploited the vulnerability by using SQL injection, and obtained the database schema.
Third, a member then saved the data
Fourth, upload the data to cloud storage websites – placing the data for public to see.
Fifth, they then claimed credit for the hack
Some websites were shutdown in order to fix the problems.
This is the court document on the Wired site.