Jump to content

Search the Community

Showing results for tags 'Hackers'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Categories

  • Articles
    • Forum Integration
    • Frontpage
  • Pages
  • Miscellaneous
    • Databases
    • Templates
    • Media

Forums

  • Cars
    • General Car Discussion
    • Tips and Resources
  • Aftermarket
    • Accessories
    • Performance and Tuning
    • Cosmetics
    • Maintenance & Repairs
    • Detailing
    • Tyres and Rims
    • In-Car-Entertainment
  • Car Brands
    • Japanese Talk
    • Conti Talk
    • Korean Talk
    • American Talk
    • Malaysian Talk
    • China Talk
  • General
    • Electric Cars
    • Motorsports
    • Meetups
    • Complaints
  • Sponsors
  • Non-Car Related
    • Lite & EZ
    • Makan Corner
    • Travel & Road Trips
    • Football Channel
    • Property Buzz
    • Investment & Financial Matters
  • MCF Forum Related
    • Official Announcements
    • Feedback & Suggestions
    • FAQ & Help
    • Testing

Blogs

  • MyAutoBlog

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Found 10 results

  1. Dear all MCFers Today someone hacked my credit card This is a 20 years aged card So many incurring monthly payee Actually the moment I received a OTP for online transaction I smelled a rat liao Immediately I reported to card centre Then CSO immediately blocked the card She go through all unbilled transactions with me Checking from when the card was compromised After verification she confirmed it is hacked more than a week But I don’t have sms alert for my 20 years old card So I don’t know what is happening Only OTP came...siao liao Ok this hacker got balls of steel I can say (He) used my card for all iTunes payments, Apple items, online automobile accessories and even dare to use my card to pay his mobile phone bill Do you think this hacker really no horse run? Card centre CSO also surprised that those transactions can track the hacker down Clever to hack but stupid to spend huh BTW sorry for so long winded I hope to share this so that bro and sis here can be more careful Best if some people can share more information about card security etc Thank you for reading my post PS. The troublesome part is I have to inform all payee about this and update all my new card details
  2. The personal details of some 40,000 job applicants have been leaked online, following a cyber attack on an employment agency here. Protemps Employment Services, which has an office at Paya Lebar Square, had its entire server swiped and deleted earlier this month. The personal details of about 40,000 people who submitted job applications to the company have since been uploaded online. The details include scans of their identity cards or passports, their phone numbers, salaries, jobs and home addresses. Most of the job seekers appeared to be Singaporean. The hackers, known as Desorden Group, said they were behind the attack on Oct 4, boasting about their heist on hacking forums on Oct 7. They made a video showing the stolen files and databases, with a message to Protemps, saying they had stolen all the files from the server and had wiped it clean. It also came with a warning for Protemps to "think carefully". The video is believed to have been sent to Protemps along with a ransom note. On Oct 14, Desorden Group uploaded the entire database online, making it accessible for the price of €2.10 (S$3.30). https://www.straitstimes.com/singapore/courts-crime/spore-employment-agency-hacked-ic-scans-and-salaries-of-40000-job-seekershttps://www.straitstimes.com/singapore/courts-crime/spore-employment-agency-hacked-ic-scans-and-salaries-of-40000-job-seekers 😱😱😱
  3. SINGAPORE - A florist here said her online shop set up on the popular e-commerce platform Shopify was hacked in May, resulting in a loss of $24,000. Checks by The Straits Times showed dozens of other merchants around the world have had their accounts hacked as well. They posted their experience on online forums. The Canadian e-commerce firm has more than 500,000 merchants that use the platform to set up online shops for which the business owners pay a fee for services provided by Shopify. Transactions are made through Shopify, with merchants holding accounts with the company. Shopify then transfers the proceeds to the merchants' bank accounts. Florist Wendy Han, 32, said when she was settling bills on June 12, she logged into her account only to discover that her business had zero proceeds for the month. She said the shop's revenue on average per month is between $70,000 and $90,000. Ms Han, who set up the online flower shop Floristique in 2018 with her husband Shaun Chuan, said hackers had entered the shop's Shopify account and changed the company's bank account to the hackers'. As a result, sales proceeds went directly to the hackers' account instead. "We got the shock of our lives when we realised that we might have been hacked," said Mr Chuan, 33. The couple made a police report here and also alerted their bank. A police spokesman said investigations are ongoing. The couple also contacted Shopify, which investigated and informed them that their account had been compromised on May 28. Losses they suffered were from that day. According to Ms Han, the company claimed to have notified the owners about this via e-mail, but the couple denied receiving any notification. Shopify had also clarified with them that it was "not liable for any damages or losses incurred as it is the merchants' responsibility to keep all username and password information secure and confidential". The e-commerce platform has since temporarily stopped transferring the company's earnings to all bank accounts, to prevent further losses. Mr Chuan said the company should have asked for verification before changing the bank account details. "It's a feature they should implement," said Mr Chuan. Ms Han posted her experience on Floristique's Facebook page on Friday (June 14), warning other business owners to protect their hard-earned money by changing their passwords often and to set up two-step verification for their accounts. "As a florist business, we don't earn a lot. This loss has made quite an impact on us," said Ms Han. "I never expected that this would happen to us. I hope that people will be more vigilant as there are more of such online scams," she added. The Straits Times has contacted Shopify for a response.
  4. legal hackers invited to try hacking into MINDEF's system to expose vulnerabilities... Mindef invites hackers to test public-facing systems for vulnerabilities http://www.todayonline.com/singapore/mindef-hire-hackers-test-public-facing-systems-vulnerabilities
  5. AUSTRALIAN HACKERS apparently have hijacked Apple's Find My iPhone feature, enabling them to hold iOS and Mac device owners to ransom. iPhone, iPad and Mac users have taken to Apple's support forum to complain about the hacking, in which hackers use the Find My iPhone feature to remotely lock users' devices and send messages demanding money. One user wrote, "I went to check my phone and there was a message on the screen (it's still there) saying that my device(s) had been hacked by 'Oleg Pliss' and he/she/they demanded $100 USD/EUR (sent by paypal to lock404(at)hotmail.com) to return them to me." http://www.theinquirer.net/inquirer/news/2346670/hackers-hijack-find-my-iphone-to-hold-ios-and-mac-users-to-ransom
  6. Wa lao... Still can smile somemore. http://www.straitstimes.com/breaking-news/singapore/story/istana-site-hacking-businessman-charged-unauthorised-modification-webp Businessman Delson Moo was charged in court on Friday with two counts of unauthorised modification of computer material under the Computer Misuse and Cybersecurity Act. This is in relation to the recent hacking of an Istana webpage on Nov 8. Moo had allegedly intruded into the website twice at 12.34am that night through its search function and modified the code to cause the site to display a picture of an old woman pointing her middle finger, along with a string of offensive words in Hokkien. The case against the 42-year-old has been stood down until 2.30pm, to allow time for a decision to be made after he requested for the court's permission to leave the country from Dec 4 to Dec 8. Student Melvin Teo, the second suspect reportedly linked to the cyber intrusion of the Istana website, is expected to appear in court at the same time to face charges. The 17-year-old's name was not indicated in the charges against Moo. Moo, who remains on $10,000 bail, arrived at the court earlier at about 9.15 am. He was accompanied by a woman, believed to be his wife, and lawyer M. Ravi. Mr Ravi is also representing James Raj Arokiasamy, whom court documents previously identified as the alleged hacker who used "The Messiah" pseudonym. The 35-year-old accused of hacking the Ang Mo Kio Town Council website has been remanded for further investigations. Police had said previously that the ases against Moo and Melvin are not linked to James Raj, who also faces drug offences committed in 2011.
  7. PM Lee urges citizens to stand against hackers Referring to the recent hacking incidents, which also affected Singapore’s government sites, he noted that the suspects have been arrested by the Police. It is not a prank when someone hacks websites and intrudes into computer systems, but a criminal act, said Mr Lee. He added that such acts inconvenience the public but also resulted in graver consequences which could endanger lives. For instance, this will be a serious problem when hospital management systems are affected, he said. Mr Lee told the audience that the courts will deal with culprits to the full extent of the law but also urged citizens to speak up against these actions and to stand against the culprits. I raise up both hands and feet to support PM Lee in pushing for a strong deterrent sentence to those hackers that have been caught.
  8. Hackers: $50,000 to keep Symantec source code private As part of a sting operation, Symantec told a hacker group that it would pay $50,000 to keep the source code for some of the its flagship security products off the Internet, the company confirmed to CNET this evening. An e-mail exchange revealing the extortion attempt posted to Pastebin (see below) today shows a purported Symantec employee named Sam Thomas negotiating payment with an individual named "Yamatough" to prevent the release of PCAnywhere and Norton Antivirus code. Yamatough is the Twitter identity of an individual or group that had previously threatened to release the source code for Norton Antivirus. "We will pay you $50,000.00 USD total," Thomas said in an e-mail dated Thursday. "However, we need assurances that you are not going to release the code after payment. We will pay you $2,500 a month for the first three months. Payments start next week. After the first three months you have to convince us you have destroyed the code before we pay the balance. We are trusting you to keep your end of the bargain."A Symantec representative confirmed for CNET the extortion attempt in this statement: In January an individual claiming to be part of the 'Anonymous' group attempted to extort a payment from Symantec in exchange for not publicly posting stolen Symantec source code they claimed to have in their possession. Symantec conducted an internal investigation into this incident and also contacted law enforcement given the attempted extortion and apparent theft of intellectual property. The communications with the person(s) attempting to extort the payment from Symantec were part of the law enforcement investigation. Given that the investigation is still ongoing, we are not going to disclose the law enforcement agencies involved and have no additional information to provide. However, after weeks of discussions regarding proof of code and how to transfer payment, talks broke down and the deal was never completed. A group called AnonymousIRC tweeted this evening that it would soon release the data. "#Symantec software source codes to be released soon. stay tuned folks!!! #Anonymous #AntiSec #CockCrashed #NortonAV." Apparently after weeks of discussions, Yamatough's patience was wearing thin, leading to an ultimatum: "If we dont hear from you in 30m we make an official announcement and put your code on sale at auction terms. We have many people who are willing to get your code. Dont f*** with us." The exchange gets contentious at times, with Yamatough suggesting that Symantec was trying to track the source of the e-mails. "If you are trying to trace with the ftp trick it's just worthless. If we detect any malevolent tracing action we cancel the deal. Is that clear? You've got the doc files and pathes [sic] to the files. what's the problem? Explain." Another e-mail, with the subject line "say hi to FBI," accuses the company of being in contact with the federal law enforcement agency, a charge Thomas denied. "We are not in contact with the FBI," he wrote, falsely. "We are using this email account to protect our network from you. Protecting our company and property are our top priorities." Yamatough demanded that Symantec transfer the money via Liberty Reserve, a payment processor based in San Jose, Costa Rica. But Thomas appears reluctant, calling it "more complicated than we expected." Thomas instead suggests using PayPal to transmit a $1,000 test as "a sign of good faith." Yamatough rejects that offer, saying, "Do not send us any money (we do not use paypal period) do not send us any 1k etc. We can wait till we agree on final amount." Liberty Reserve did not immediately respond to a request for comment. The posted thread ends with an exchange today with the subject line "10 minutes" that threatens to release the code immediately if Symantec doesn't agree to use the payment processor to transfer the funds. "Since no code yet being released and our email communication wasnt also released we give you 10 minutes to decide which way you go after that two of your codes fly to the moon PCAnywhere and Norton Antivirus totaling 2350MB in size (rar) 10 minutes if no reply from you we consider it a START this time we've made mirrors so it will be hard for you to get rid of it." Thomas' response, apparently the last of the discussion, is brief: "We can't make a decision in ten minutes. We need more time." Symantec admitted in mid-January that a 2006 security breach of its networks led to the theft of the source code, backtracking on earlier statements that its network had not been hacked. The security software maker initially said a third party was responsible for allowing the theft of 2006-era source code for Norton Antivirus Corporate Edition, Norton Internet Security, Norton SystemWorks (Norton Utilities and Norton GoBack), and PCAnywhere. Symantec said that most of it customers were not in any increased danger of cyberattacks as a result of the code's theft but that users of its remote-access suite PCAnywhere may face a "slightly increased security risk." Symantec instructed its PCAnywhere users in late January to disable the product until the company could issue a software update to protect them against attacks that could result from the theft of the product's source code. The theft came to light in early January when hackers claimed that they had accessed the source code for certain Symantec products, which Symantec identified as Symantec Endpoint Protection (SEP) 11.0 and Symantec Antivirus 10.2. Evidence at the time suggested that hackers found the code after breaking into servers run by Indian military intelligence. A hacker group calling itself Yama Tough and employing the mask of hacktivist group Anonymous in its Twitter avatar said in a tweet last month that it would release 1.7GB of source code for Norton Antivirus, but the group said in a later tweet that that it had decided to delay the release. Source : http://www.zdnet.com/news/hackers-50000-to...private/6342977 The source codes are available for download at TPB. Though PCAnywhere is an old obsolete software, other Symantec product lines codes are also stolen and now compromised. Wonder now who will take responsibilities for the disclosure of the codes? FBI??
  9. (May 13 & 14, 2010) Researchers from the University of Washington and the University of California, San Diego, plan to present a paper in which they describe how computer programs used in automobiles can be manipulated by hackers to take control of braking and other critical systems in cars. The researchers created a tool called CarShark that "can sniff and inject packets on the" Controller Area Network (CAN) system, the diagnostic tool used for all US cars built in 2008 and later. The cyber attackers would need access to a standard diagnostic computer port in the targeted car. In a demonstration last year, the researchers connected a laptop to the targeted car and controlled that car's computer system wirelessly with another laptop in a car close by. The researchers are not trying to scare people, but to drive home the point to automobile manufacturers that they must bake security into the computer systems that accompany new cars. The paper is scheduled to be presented at the IEEE Symposium on Security and Privacy on Wednesday, May 19. http://www.nytimes.com/2010/05/14/science/14hack.html http://www.theregister.co.uk/2010/05/14/car_security_risks/ http://www.pcworld.com/businesscenter/arti...e_and_more.html http://news.cnet.com/8301-27080_3-20005047...tag=mncol;title
  10. Teens say they were banned from Apple stores for life, company denies it By Kristina Peterson Bay Area News Group Article Launched: 05/29/2008 07:27:16 PM PDT Four Palo Alto teenagers raised in the heart of Silicon Valley got the scare of their lives when they thought they might be banished from all Apple stores worldwide, for life. Their crime, the teens said, was downloading a third-party car racing game onto iPhones at Apple's University Avenue store in Palo Alto last weekend. For that, the two Palo Alto High School students and two recent graduates said they were detained 2 1/2 hours at the store and permanently banned by management. Apple spokesman Steve Dowling denied the teenagers' banishment claim. "They were not banned from that store or any other store," Dowling said. Coincidentally, the company has already announced it will encourage customers to download similar third-party applications onto their iPhones, starting next month. Earlier this week, the four teenagers said they were depressed about not being able to visit their favorite store again. "I can't walk down University Avenue without going in there," said Paly senior Daniel Fukuba, who camped out for the first iPhones last year. Fukuba, who works at a local start-up when not in school, said he and two friends - junior Eric Vicenti and Paly alum Noah Rogers - had some time to kill before meeting up with Paly alum Anjay Patel on Saturday, so they headed over to the Apple store. Showing off the capabilities of the iPhone to Vicenti, Fukuba downloaded a car racing game called "Raging Thunder" - a third-party application created by the Swedish company Polarbits - onto the store phone. "We thought that it was completely harmless," Vicenti said. When an employee stopped by and asked what they were doing, Fukuba told him they were "playing around with the phones." Rogers, who said he worked for the Palo Alto Apple store during the holiday season, said employees are trained to restore the iPhones and computers each night so any downloaded applications would be erased before the next day. "All you have to do is plug it in a laptop to restore it to normal," he said. The employee did not seem alarmed, but a few minutes later a manager came over and asked whether they needed help, Fukuba said. He replied that they were doing fine, and shortly after Patel arrived the group left the store. Patel said he had spent less than five minutes in the store, doing nothing but checking his Facebook page and barely chatting with his friends. "I may have said one or two words to them," he said. But the group had time to talk over the next 2 1/2 hours. "We're halfway down the block when the manager comes running out and tells us to stop right there,"' Fukuba said. The students were ordered to return to the store, where a security guard and the manager called police, Vicenti said. Sgt. Sandra Brown confirmed that the store called the Palo Alto Police Department and an officer responded, but made no arrests. She said the store issued the teens an "admonishment" to leave the store, but police did not force them out. After being lectured by the manager on the dangers of "hacking" into the phones, the teens were photographed and told their pictures were being sent to all Apple stores "so they'd be on the lookout for us," Rogers said. He and Patel were then allowed to leave. Fukuba and Vicenti, who are both under 18, had to wait for their parents to come pick them up. Over the next few days, the boys worried about the ban's repercussions. Fukuba wondered what will happen if he needs to get his computer or iPhone repaired. "I'll have to get a friend to buy stuff for me, like a drug deal," Fukuba said. Later in the week, the teens had heard through a friend that a different manager had told said they were still welcome at Apple, despite what the other employees had said. "I'm not really sure what's going on," Fukuba said. http://www.mercurynews.com/ci_942052...ce=most_viewed
×
×
  • Create New...