Customer information and product source code at risk
AdobeChief Security Officer Brad Arkin has revealed that Adobe’s servers were attacked in a successful attempt to access customer data and product source code. 2.9 million customers are affected with “names, encrypted credit or debit card numbers, expiration dates, and other information relating to customer orders,” taken.
Ruh-roh, 'Raggy: late yesterday, Nvidia announced that it has battened down the hatches and shut down both its general and Developer forums after a series of hack attacks against the sites. So far, Nvidia's investigation confirms that "unauthorized third parties" gained access to the forum-goers' usernames, email addresses, passwords and public profile information.
It’s been almost a year since the famous Sony hack leaked the personal information of millions of unsuspecting gamers into some of the seedier corners of the Internet, and history is repeating itself again, this time with Microsoft. Those visiting the Microsoft Online Store in India this morning were greeted with the haunting image of Guy Fawkes warning them that this “unsafe system would be baptized”. A hacker group known as the Evil Shadow Team has taken responsibility for the attack, and has even released proof that passwords stored on the server were not encrypted.
When life hands PC gamers lemons – like news that the massive $1.6m Battlefield 3 tourney is console-only – they figure out a way to hack the lemons to bits and make lemonade. In this case, gamers have gained access to 128-player support for the “Operation Metro” map available in the BF3 beta, which isn't offered on the official servers. Don’t necessarily go rushing out to find the action, though; DICE, the makers of the game, thinks the lemonade tastes mighty bitter and they’re threatening to swing the banhammer at anyone who participates in the unsanctioned fun.
After a hot and heavy summer – whew! – things are starting to cool down a bit on the nefarious hacker front. But even though LulzSec and Anonymous have chilled out in the wake of numerous arrests, the lesson remains: almost no website is safe against a skilled and dedicated hacker. Wait! Take off that tinfoil hat!
The LulzSec ship may have sailed off into the sunset, but Anonymous lives on and continues hitting government and corporate targets while flying the flag of the #AntiSec movement. After laying the smack down on the Arizona police and IRC Federal last week, Anonymous' hit the servers of military contractors Booz Allen Hamilton. In an stunning display of jackassery that proves that Anon does not, in fact, support our troops, the group released a torrent containing 90,000 military email addresses and passwords that it swiped from BAH's databases.
Another day, another hacking story. If you thought the recent disbanding of LulzSec meant an end to the daily exploit updates, you thought wrong; plenty of other groups are wrangling for Lulzsec's crown as king of the headache-causing chuckleheads. Today's facepalm-inducing report involves a group called Inj3ct0r Team, who claim to have sneaked into a backup NATO server while waving the flag of Operation AntiSec, an anti-security movement popularized by LulzSec and Anonymous.
When lulz-seeking hackers aren't busy reincarnating Tupac on PBS and taking down government websites worldwide, they always seem to turn their attention to videogame companies. We're not quite sure what the grudge is, but Sony, Nintendo, Minecraft, Bethesda, Sega, BioWare and scads of other gaming targets have been hacked in one way or another. Pretty much the only major player unaffected thus far has been Microsoft. In fact, the company's even profited from the rash of attacks as gamers bailed the PlayStation in droves. So what does Microsoft think of all the recent troubles from its seat on the sidelines?
We've always known Maximum PC readers hold mastery over the technical realm – but new evidence shows that at least one may hold mastery over all things mental as well. Just a few hours ago, in response to news that those affable LulzSec hackers opened a request hotline, RUSENSITIVESWEETNESS posted the following psychic burst: "They should target the CIA or FBI... Do it. Go after the CIA or FBI, geniuses."
The MPAA's DRM promotional site is the latest victim of the internet machine that is Anonymous. The loosely affiliated group of hackers replaced the CopyProtected.com page with a manifesto regarding the state of copy protection technologies in digital media. The hacked site also showed a graphic based on the Pirate Bay logo reading, "Operation: Payback". After a few moments, the site would redirect users to the Pirate Bay. CopyProtected.com is currently still down, but the Anonymous content is gone.
The posting read in part, " You are forcing our hand by ignoring the voice of the people. In doing so, you bring the destruction of your iron grip of information ever closer. You have ignored the people, attacked the people and lied to the people. For this, you will be held accountable before the people, and you will be punished by them.” It is unclear what further action Anonymous will take in Operation: Payback, but they will probably make sure we know about it.
This is just the latest step in Anonymous' underground war against copyright holders. Recent DDoS attacks against the MPAA, RIAA, and the Ministry of Sound have drawn attention. Do you think these efforts are unethical, or is it a proportional response to the actions of copyright holders?