Krebs notes Lizard attacked Sony with home routers

The hacker group Lizard Squad  that attacked Sony and Microsoft on Christmas day: http://oversitesentry.com/christmas-hacking-while-you-were-out/ This was the result of their attack:   Brian Krebs has done research (as he does) and has found that the Lizard group has been hacking default password home routers around the world, and it seems they used them to attack … Read more

Mac and Video Game Hacks

Video Games are getting more connected to the Internet, and thus are more likely to be hacked or DOS’ed (Denial of Service) Trend Micro listed a few items that happened http://blog.trendmicro.com/video-game-vulnerabilities/?linkId=11643669 The Xbox hack happened on Christmas day 04 2014: http://oversitesentry.com/christmas-hacking-while-you-were-out/ I tried to go to the Sony website on Christmas: And I got site … Read more

How Can Hackers Steal Your Data?

How can hackers steal data without anyone knowing? It has been shown that it takes months before a breach is found, let’s assume one of your users clicked on a phishing email. With the email malware was installed on the persons computer, unbeknown to the user this malware has now opened a process named “notepad” ( … Read more

JP Morgan Chase hack news

It looks like the reason for the hack of JPMorgan is a basic hack. The routine check caught it, but did not find the problem in the first place. $250mil  spent on cyber security but did not complete the actual update on one machine. Arstechnica   says there was a missing two-factor authentication configuration on their … Read more

12 mil SOHO routers vulnerable

Checkpoint found a “Misfortune Cookie” vulnerability in various gateway devices for the home.   This is the paper about how to protect one’s device: http://mis.fortunecook.ie/misfortune-cookie-tr069-protection-whitepaper.pdf thsi is especially disconcerting: Any user traffic destined for banking or financial sites was redirected to malicious servers under the attackers control or redirected through SSL proxies where the security of … Read more