Hackers say they breached the website security of computer-maker Acer and made off with data for 40,000 of its customers. Screenshots posted on Friday on The Hacker News appeared to show the purchase histories, names, email addresses, and partial addresses and phone numbers for a limited number of customers stored on acer-euro. …
Acer's FTP server
Brought to you by the same team who brought you their pre-loaded software on Windows computers...
"report comes as dozens of companies and government agencies"
I'm starting to smell a rat, as they say. In Sony's case I can see exactly why hackers would go after them, but why the sudden big increase in *high profile* attacks on so many other sites?
This news also comes after a period of months of government cyber security warnings and now we have the wave of high profile attacks which is being used to justify plans to increase cyber security.
Coincidence, I don't think so. There's a whole area of covert operations about flying under False colors as they say, e.g.
"False flag (aka Black Flag) operations are covert operations designed to deceive the public in such a way that the operations appear as though they are being carried out by other entities. The name is derived from the military concept of flying false colors; that is flying the flag of a country other than one's own. False flag operations are not limited to war and counter-insurgency operations, and can be used in peace-time."
If security forces wanted to boost their budgets & power, they simply have to do some hacking of their own and then blame it on hackers.
Well, maybe. But possible not.
Hmmm.... a "Mukden Incident", "Gleiwitz Attack" or "Tonkin Gulf Incident" in Cyberspace?
Nahh... The proposal for mo' money are already in and the Central Bank Presses are rolling, no need to finagle something.
not coincidence but not conspiracy, either
What may well be happening is that we have reached a point where it has become fairly easy (for some) to use recently developed tools to get in to systems.
If it's likely to be military then it won't be announced by the perps but those affected, no bragging rights as you'd want to stay hidden for as long as possible.
If it's commercial espionage then it's a similar scenario.
If it's break ins to find personal info and/or embarrass the site owners then publicity is what's required, either for brownie points to show how simple it was or for some sort of political point to be made.
Like burglary, there is a difference between a careful job where you don't want to leave evidence and are selective or there's the brick through the window and make off with the obvious stuff.
Tools change according to the job in hand, tools evolve and make life easier but some people still leave the keys under the doormat.
'maybe it's (uh) just a change of climate' (James Marshal Hendrix)
.. wonder if they're the same chaps going after unveillance.
- Analysis iPhone 6: The final straw for Android makers eaten alive by the data parasite?
- First Crack Man buys iPHONE 6 and DROPS IT to SMASH on PURPOSE
- First Fondle Reg journo battles Sydney iPHONE queue, FONDLES BIG 'UN
- TOR users become FBI's No.1 hacking target after legal power grab
- Vid Reg bloke zips through an iPHONE 6 queue from ZERO to 60 SECONDS