Finding The Humor In Life|A Place for Laughs|Poetry|Humorous Stories…

Posts tagged ‘Hacking’

Times Temper Tested Twice


The NY Times was hacked for the second time this month.

It’s working to make its website available again for all readers after it was disrupted by a group calling itself the Syrian Electronic Army in an exploit that also affected Twitter.

The group disrupted traffic to the websites by hacking yesterday into registration-services provider Melbourne IT Ltd. (MLB), which handles the online addresses of nytimes.com and twitter.co.uk, according to Tony Smith, a spokesman for the Melbourne-based company.

The Times instructed readers who can’t access its home page to go to an alternate site.

Some users initially reported being redirected to the Syrian group’s sites. Many were simply unable to access the pages at all.

 

The Syrian Electronic Army, which backs the country’s president, Bashar al-Assad, has also claimed responsibility for hacking the Washington Post this month and the Financial Times in early May, redirecting readers to its own websites and videos.

“The credentials of a Melbourne IT reseller (username and password) were used to access a reseller account on Melbourne IT’s systems,” Smith wrote in an e-mail. He said the login information was obtained through phishing, a technique used to obtain private data by imitating legitimate websites.

It may take time before all users can get normal access to the newspaper’s site, Smith said. Times employees have been instructed to use caution when sending sensitive e-mails, the newspaper said.

Found at:   http://www.bloomberg.com/news/2013-08-28/ny-times-twitter-web-address-data-hacked-by-syrian-group.html

Hmmm…

The Syrians attacked again,

Subscribers again complained;

They did it times two,

Who’s next? Maybe you,

We’re sorry’s the current refrain.

 

The Syrians did some Phishing,

For data they were a whishing;

They went through Melbourne,

Resulting in scorn,

The Times must be Syrian dissing.

 

© 2013 Ronald J. Yarosh

All rights reserved.

Alert Aussies Arrest Aggressive Attacker


Good news everybody!

Australian Federal Police have arrested the self-proclaimed leader of the international hacking group, LulzSec. It’s the collective that claimed responsibility for infiltrating and shutting down the CIA website.

Police reported the 24 year old IT worker was arrested in Sydney and charged with hacking crimes which could earn him 10 years in prison.

Police said the man was arrested at his work place where he had access to “sensitive information from clients including government agencies.”

LulzSec is an offshoot of the international hacking group, Anonymous. It has taken credit for hacking attacks on government and private sector computers including the U.S. Central Intelligence Agency (CIA), Sony Pictures, 20th Century Fox Studios, and Nintendo.

The two cyber hacking groups became notorious in late 2010 when they launched what they called the “first cyber war” in retaliation for attempts to shut down the Wiki leaks website.

The name LulzSec is a combination of “lulz” which is apparently another way of writing lols, and the word security.

You can learn more at this web site:

http://www.nbcnews.com/technology/technolog/lulzsec-leader-arrested-australian-cops-say-6C9576130

 Hmmm…. 

They caught a mighty big hacker,

He wasn’t your everyday slacker;

He made cyber war,

But not anymore,

He’s now one jailed attacker.

© 2013 Ronald J. Yarosh

Crafty QR Codes Confound Crooks


There’s a lot of counterfeiting of goods and currencies going on these days. Scientists are working on ways to counter act the counterfeiters.

They have upgraded QR codes to help in that effort.

Quick Response (QR) codes are applied to products and advertising, and are found just about everywhere.

QRs are those little, funny looking squares with smudges on them usually found on the corners.

New codes have been developed which will hamper the efforts of the counterfeiters of profitable products and even money.

You will be able to scan them with a smart phone and go to the company’s web site to determine if they are the real thing.

Hmmm…

QR codes are now on the scene.

To crooks that really is mean.

They won’t capture the codes,

To steal mother loads.

But smart phones can, isn’t that keen?

© 2013 Ronald J. Yarosh

Malware Machinations Make Many Miserable


The Great Guru of Gizmos says…

McAfee, a computer security firm, said they have added more than thirty million kinds of malware to its suspect database in the last twelve months (or a year whichever you prefer).

That’s one way to sell anti-virus software.

I wonder what the other security companies have found in the way of malware?

I hope you’re equipped with some kind of anti-virus software.

We are on the cusp of March. Beware of the ides.

Hmmm…

Malware is now on the rise,

To me it is not a surprise;

You’ll someday go wacky,

By some sneaky hacky,

It may cause your system’s demise.

© 2013 Ronald J. Yarosh

Password Protection Produces Potential Problems


This came from ABC News.com found at: http://www.nbcnews.com/technology/technolog/anyone-can-bypass-your-iphones-passcode-some-practice-required-1C8377251

It may take practice, as well as some really great timing, but anyone with the knowledge, and a little practice can bypass your iPhone’s pass code to make calls.

They can also send out emails and messages, scroll through your call history, view (and edit) your contact information.

This (hacking) was done with an  iPhone 5 as well as an iPhone 4.

Both devices were running iOS 6.1, with  the very latest update. That update seems to be at the center of the vulnerability.

An Apple spokesperson said they were aware of the problem and would find a fix as soon as possible.

You can read more on the link above.

Hmmm….

You iPhone is vulnerable now,

Anyone can show you how,

To bypass your secret code,

And find the mother load,

Of contacts and calls that were made,

Even with Apple’s upgrade.

They’re working to find a fast fix,

To overcome the hackers new tricks.

Let’s hope they find one fast,

Before someone discovers your past.

© 2013 Ronald J. Yarosh

Hackers Hit Honey Holes


According to  The Associated Press (AP), many Apple Mac users were surprised recently when their computers stopped running programs which were written using Java’s programming.

Apple blocked Java on some units because Java has been having many security problems.

In fact, last month, the U.S. Department of Homeland Security (DHS) came out with a recommendation to disable Java in all computers in the U.S. because of hacking issues.

Oracle Corporation, the owner of Java has tried in vain to block hackers. It has been alerting users to obtain new downloads of the program to fix the holes that hackers readily use.

In spite of Oracle’s efforts, the DHS still believes there are more problems with Java’s coding. They recommend disabling the program in Web Browsers.

The DHS recommends disabling Java in Web browsers to avoid potential hacking attacks. Oracle Corp., which owns Java, has issued updates that fix known vulnerabilities, but the DHS expects that there are more flaws in Java’s coding.

BTW…I heard there is another Java update available right now. Check it out at the Oracle web site, www.oracle.com

Does all this hack you off?

Hmmm

Apple is dumping old Java;

It’s something they don’t want us to have-a.

It’s security is weak,

In spite of some tweaks,

Java users are hotter than lava.

Paper Penetrated by Plucky Poachers

According to The Wall Street Journal the same group of hackers that penetrated the New York Times also cracked into their private accounts as well.

The Journal reported that the hackers were looking for news stories involving China.

The attack was generated via computers in Beijing.

Of course, Chinese government officials have denied any cyber attacks of American businesses.

Hmmm…

The Chinese hacked into the Journal,

The owners thought it was infernal,

They’re hitting the papers,

And other news makers,

They want to find every news kernel

Paper Penetrated by Plucky Poachers

According to The Wall Street Journal the same group of hackers that penetrated the New York Times also cracked into their private accounts as well.

The Journal reported that the hackers were looking for news stories involving China.

The attack was generated via computers in Beijing.

Of course, Chinese government officials have denied any cyber attacks of American businesses.

Hmmm…

The Chinese hacked into the Journal,

The owners thought it was infernal,

They’re hitting the papers,

And other news makers,

They want to find every news kernel

© 2013 Ronald J. Yarosh

Hacking Hi-jinks Highlighted


At a recent security conference, they introduced computer hackers as young as eight years old.

The event even featured security exercises as a challenge for them.

Whatever happened to kids watching cartoons, playing games outdoors, or reading a book?

Oh yeah. They are all sitting around the house alone texting each other.

Hmmm…

Hackers as young as eight?

They hack and they think it’s great.

They break into computers,

Instead of riding scooters.

It’s something we all would berate.

Cloud Company Compromised


Dropbox, a cloud storage company revealed that an undisclosed number of their clients have had their accounts hacked.

I’ve seen elephants in clouds but never hackers.

I think it was a disservice to deserving servers.

 

Hmmm…

They say that Dropbox was cracked,

Some accounts were silently hacked,

They went to the cloud,

Though they weren’t allowed,

I imagine some people were sacked.

Tag Cloud

%d bloggers like this: