The security flaw in Apple's iOS operating system came to light on Wednesday as the website www.jailbreakme.com released code that Apple customers can use to modify the iOS operating system through a process known as "jail breaking."
Some Apple customers choose to jail break their devices so they can download and run applications that are not approved by Apple or use iPhone phones on networks of carriers that are not approved by Apple.
Security experts warned that criminal hackers could download that code, reverse engineer it to identify a hole in iOS security and build a piece of malicious software within a few days. More...
But their targets were not corporate executives, government officials or clueless bank customers. They were other hackers.
And in trying to unmask the identities of the members of a group known as Lulz Security, the A-Team was aiming to take them down a peg — and, indirectly, to help law enforcement officials lock them up.
The core members of Lulz Security “lack the skill to do anything more than go after the low-hanging fruit,” the A-Team sneered in its posting last month. More...
Unveillance had information on the so-called botnets because it was tracking them for potential corporate targets, Hijazi said in an interview. LulzSec had leverage to make Hijazi comply because it had hacked his Wilmington, Delaware-based company’s e-mail system and threatened to post captured confidential documents online if he didn’t help the group.
“If they did get a hold of these, they could potentially do way more damage than what’s already being done to these corporate targets,” said Hijazi, who rejected the demands. “The harm could be monumental.”
Botnets, which secretly control almost one-fifth of all home computers, have become a hotly contested terrain in the cyber-underground, according to Alex Cox, a security researcher at Reston, Virginia-based NetWitness Corp. Criminals who run them or rivals who want to are facing off against each other and against law enforcement and intelligence agencies that seek to render the rogue networks harmless or use them for their own devices, according to cyber-security experts. More...
- Email Attack on Vendor Set Up Breach at Target
- With data vulnerable, retailers look for tougher security
- Target Struck in the Cat-and-Mouse Game of Credit Theft
- Technology firms seek government surveillance reform
- Rise of the Machines: Internet-Connected Devices
- Mystery traffic redirection attack pulls net traffic through Belarus, Iceland
- Silicon Valley Nerds Seek Revenge on NSA Spies With Coding
- Russian Cosmonauts Occasionally Infect the ISS with Malware
- Council on CyberSecurity to Revise the 20 Critical Security Controls
- Cybersecurity website reports cyberattacks at data brokers D&B, LexisNexis, Altegrity