Pages

Showing posts with label Hacker. Show all posts
Showing posts with label Hacker. Show all posts

Verizon Business Annual Report: There Are Significant Increase In Cyber Crime

An annual report issued by the Verizon Business, a technology and communication services company based in United States, mentioned that the number of internet crimes by hackers, carders and crackers has increased and the amount is reaching 285 million cases.

That number is dominated by the action happens in the banks and other financial services. And from the many bank customer data theft done by the crackers, 81% targeted to the data from card payments, particularly debit cards.

They exert power and their mind to be able to enter and accessing data such as PIN numbers. In this case, piercing debit card data is considered more arouse than a credit card. Debit cards are considered as the most arouse prey for them.

With the details contained in the debit card: card number, information inside the magnetic lines, and PIN, they can attract the money directly. Unlike the credit card that require them to first make a purchase and then transfer it in cash.

With a report issued by the Verizon Business, some parties are expected to be more vigilant, particularly for financial companies and the owner of the payment card. The Verizon is also suggesting the IT administrator to maintain personal data of users with super careful.

Read more

North Korea cyber warfare unit trying to hack U.S. government and South Korea military networks

North Korea activates their cyber warfare unit and trying to hack U.S. government and South Korean military networks to gather confidential information and disrupt service. The North Korea's military has expanded the unit, they were recruited about 100 personnel, mostly graduates and computer skills teacher from Pyongyang university, Yonhap news agency reported, citing an intelligence agency it didn't identify.

South Korea's Ministry of Defense mentioned it is aware that Pyongyang has been training lots of hackers in recent years but they did not provide any details about it and had no other comment. The National Intelligence Service — South Korea's main spy agency — said it could not immediately confirm the Yonhap report.

This report came a day after the Ministry of Defense said it had signed an accord with the Pentagon to strengthen their cooperation in fighting against foreign cyber threats. However, The ministry statement, did not identify any specific cyber threats, such as from North Korea.

The U.S. stations about 28,500 troops in South Korea as a deterrent against North Korea. The U.S. military command's public affairs office in Seoul was not immediately available to comment on the report Tuesday, a national holiday in South Korea.

North Korea as the one of the most secretive countries in the world have a deep interest in Internet and information technology. The country's leader, Kim Jong Il, commands his staff pushed the development of advanced computer technology, saying those who don't use computers are among the "three main fools of the 21st century" along with those who smoke and don't appreciate music.

But North Korea tightly controls their ordinary citizens to access computers and the Internet.

Read more

Pentagon's Job Opportunities For Internet Hackers

Internet Hackers In Pentagon

United States federal authorities, Sunday(19/4), Announced that they will open the job opportunities for Internet Hackers. This is not meant to punish them, but to pay them in order to secure the country's network. General Dynamics Information Technology has been looking for someone who can 'think like a bad guy'. According to the Homeland Security Department, Applicants, must understand hacker's tools and tactics and be able to analyze Internet traffic and identify vulnerabilities in the federal systems.

Defense Secretary Robert Gates said the Pentagon will increase the number of cyberexperts it can train each year from 80 to 250 by 2011. This Hacker Expert were formed because the United States feel that they must preparing for cyberattack, and then White House can manage and use technology to protect all, from the electrical grid and stock markets to tax data, airline flight systems, and nuclear launch codes.

David Powner, director of technology issues for the Government Accountability Office, revealed that they should have a plan to re-cover digital disaster. "We're clearly not as prepared as we should be," he said.

Administration officials says the U.S. has not kept pace with technological innovations needed to protect its computer networks against emerging threats from hackers, criminals or other nations looking for national security secrets.

To Face the risk of cyber crime, President Barack Obama has requested time to review for 2 months to test how federal agencies manage and protect state's data, and what rules that the country should be made to secure the network who control the vital utility and other important infrastructures. For that, Obama asks for reports from the Bush administration, Melissa Hathaway, to the efforts of this hackers search.

Read more

Owen Thor Walker, New Zealand Hacker Recruited By TelstraClear

Internet Hacker Owen Thor Walker

Owen Thor Walker, hacker from New Zealand, now works as a cyber security consultant to the TelstraClear company, the second-largest telecommunications company in the country. TelstraClear is a subsidiary of Australia's largest telecommunications, Telstra. TelstraClear Spoker Person Chris Mirams explained to National Radio in Wellington, on Wednesday (25 / 3), that they believes if Walker have the ability to help senior executives and customers, in understanding the security threat that can attack their networks.”

Last year, Walker walker has been brought to justice related to his success on some data penetration over 1.3 million computers around the world. Hacker with a fictitious name AKILL also has been proven harmful to computer systems and enter through a number of bank accounts and carry more than Rp 132.4 billion. At that time, Walker was just 18 years old.

Mirams said, Walker had some counseling and providing advice to managers and security staff TelstraClear. Walker also participate in TelstraClear ad programs . “Walker tells what are the cyber criminals looking for, and how to fortify their networks from the threats."said Mirams

Read more