Sunday, December 29, 2013

Bloopers 2013 in cyber?wiecie - BBC News

on Twitter every minute appeared even a few hundred entries for PRISM. NSA spying activities, including eavesdropping Angela Merkel and outbursts Anonymous, are topics that were immediately taken by the traditional media and social networks. In 2013, do not run both trivial and widely commented on events such as toilets or funny hacking attack surfers during a teleconference Macierewicz.

passing 2,013 years abounded in various incidents in cyberspace. / © 123RF/PICSEL

passing 2,013 years abounded in various incidents in cyberspace.

/ © 123RF/PICSEL

Year 2013 in the world of cyber-attacks began to Anonymous. Group switched FBI.gov website and NSA, taking 294 e-mail addresses FBI employees along with their passwords. Shortly thereafter, on the side of the American Department of Homeland Security broke NullCrew. In January we heard also that wants to register Anonymous DDoS attacks as a legitimate form of protest. At the beginning of the year revealed further analysis of operations cyberszpiegowskiej “Red October”, the aim of which was to gather intelligence from the affected government agencies and diplomatic missions in countries around the world.

Reports of PRISM shocked the whole world

In May 2013 the world held its breath after reports of PRISM – a program that allows the U.S. government agencies full and uncontrolled access to the data collected by such giants as Google, Facebook, Apple, Yahoo! and Microsoft. According to reports Edward Snowden, an intelligence officer working with the program to see the information relates to the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI). Web users shocked the information that each of the companies proceeded to participate in the program voluntarily. Apple, Google and Microsoft denied the existence of a system in the infrastructure of their products.

The most important security incidents in 2013

In 2013, cybercriminals continued to carry out operations on a large scale. Besides, appeared cybernajemnicy – specialized groups “for rent”, focused on operations based on the unexpected, a concentrated attack and escape. The media constantly popping up words … read more

“reports Snowden result, some companies have banned the use of Dropbox, for example,” – says Artur Klimczak, Head of IT Support in Unizeto. “Products and services operating in accordance with the letter of American law much lost on trust, both among home users and business” – he added.

Snowden turns over the cards

In July, Edward Snowden gave details of the machine used for spying. DAYS Presenter, so called because the program, an easy way to provide any information related to a particular person, such as e-mails, search the related phone numbers and even read messages from Facebook. At the same time, the officer revealed the origin of the famous, mysterious, malicious software – Stuxnet. Snowden said that the creation of software that would prevent Iran from uranium enrichment process, is the U.S. government, in cooperation with Israel.

Zombie Invasion

Also in May, were incidents of a lighter nature. The sign warning the U.S. of Madison appeared funny inscription on the content of “Zombies Ahead” (zombies are coming). At the same time leaked outline of the author of the new book “Sex and the City” – Candace Bushnel.

Mysterious goal spy on Windows

June brought another Anonymous attacks related to protests in Turkey. As part of the campaign, designed to show solidarity with the Protestants, the group switched government website of the country. Just before the holidays on the internet uproar well as information about the alleged hidden secret access codes built into Windows. The codes allow the NSA had penetration of any user of the system.

Hacker in Bangladesh and threatened SIM card

In July Bangladeshi hacker nicknamed Tiger-M @ TE made a compromise Web-known companies such as Microsoft, Dell, Kaspersky and Skype. German analyst Karsten Nohl, broke and methods of communication with SIM cards, which threatened the 750 million users.

hacked seats …

In August we hear about a funny message for a smart Japanese toilets. Due to the special application it was possible to remotely control sedesami, namely: the constant raising and lowering the flaps, flushing water, and activating the dryer and bidet.

… and compromised Members

In October wit paralyzed surfers teleconference Macierewicz team. During the conference, Mr politicians connect with experts through Skype. Viewers have the opportunity to see the account name expert, which connect to Macierewicz. Stumble used netizens, calling the expert Bogdan Gajewski on Skype, causing a rash of messages. Callers also took care of irreverent nicknames, such as “Vladimir Putin”, “Prime Minister Donald Tusk” or “dude”.

Eavesdropping Merkel talks

Also in October, the media reported that the object of surveillance conducted by the American intelligence services may be the Chancellor of Germany, Angela Merkel. American service over the years had a private track down a cell phone chancellor. Alleged tapping of U.S. services Merkel was confirmed by Edward Snowden. The officer reported that the NSA was eavesdropping phones 35 world leaders.

Battles on the occasion of November 11 moving to the Internet

In November we had the opportunity to observe how real conflicts move to cyberspace. During the riots associated with the National Independence Day rigged a series of web pages, such as narodowcy.net, ruchnarodowy.pl or marszniepodleglosci.org.

No comments:

Post a Comment