Showing posts with label hackers. Show all posts
Showing posts with label hackers. Show all posts

Friday, May 6, 2011

Sony PlayStation Network Threatened With More DDOS

A hacker group has denied that it attacked Sony's PlayStation Network with a Distributed Denial of Service (DDoS). PC Virus Doctors' Computer Repair Dallas ponders if an off-shoot of the infamous hacker group has launched the Sony attack. The attack left the game network offline for over a week.

The attack was two-prong that first launched the DDoS attack that pings servers repeatedly and quickly by a botnet, a huge network of infected computers, that can be controlled to point to different servers and domain names making access by the public impossible because of the traffic congestion.

The second phase was to enter the Sony network servers that stored customer data that was then breached. The threat may be real or not and their next intentions are unknown. If hackers can access the servers then anything may be possible including spreading viruses.

Monday, June 25, 2007

iPhone Hackers

Apple's iPhone is about to roll out to the public and iPhone security issues are being explored publicly. The device is a cell phone, internet browser and iPod that is wifi capable. Developer's Tools will not be available for the iPhone so hacking will be more tricky for malware writer's. Third party vendors will have a tougher time writing software for the iPhone without developer tools which will be an ace in Apple's pocket. Hackers have mostly taken advantage of software developer toolkits to write the malware programs in the past.

The amount of publicity is going to be too tempting for some skilled hackers who want to go after a tough system to "prove themselves". The device will run with the Mac OS X operating system and mostly likely along with the iPod, the iPhone's firmware will be updateable and more than likely updateable over the phone lines along with wifi to make the system quite stealthy. The browser will be Safari which will also be able to be easily updated and constantly ahead of hackers and malware authors.

A draw back to Apple will be that if hackers know the Safari browser vulnerabilites that they will be able to exploit the browser and compromise the system. The biggest threat that affects the iPhone is the number of applications, media formats, etc. that the iPhones supports making the ability to totally secure the device amazingly complex and leaving hackers with a multiple avenue of exploits to utilize. Last but not least is the hackers award of, "I was the first to hack iPhone".

Saturday, May 19, 2007

Malware Authors Battling

Dallas Computer Repair reports the authors of Warezov and Storm worm are engaged in online war to see who can control the largest botnet and gain the most profit. At least two groups are involved and possibly three criminals or criminal enterprises including the author(s) of Bagle worm variants. These malware authors are varying their trojans to more easily go into stealth mode where they steal computer users information.

Users need to keep a good 3rd party firewall up and running along with updated anti-virus signatures.

Wednesday, February 21, 2007

Chinese Hackers

Can we not keep these Chinese hackers out of the United States. Nuke 'em all. Those asses bring nothing but malware and spyware to our nation. Why can't we just pull the plug on them and stop them at the gate. All we do is allow these communists to access our technology and then turn around and use it on us like the freakin' alqueda. Nothing but a bunch of dirt trash ready to come into our house and steal our gold.

Be prepared with firewalls people and anti-viruses be prepared or be ready to accept the consequences as these overseas hackers are not just trying to get into our government installations but into our homes and businesses to see what they can get their hands on. And the latest reports say our military suspects the overseas hackers are acting in collusion with their government which means not only hacking and covert techniques but also most likely the latest computer equipment to supersede our technology in our homes and businesses.