This article was very interesting to me. While humorous, it shows the practicality of hacking while also showing the reader why it is good to at least have a passing knowledge of how it works. Knowing how hackers can breach systems is a very important step in knowing how to keep them out. It is also interesting to see how simple it can be to get a job in such a company. It dispels the myth that computers and their related disciplines are “hard” and too difficult for the average person to know.
This article discusses the poll for Time magazine’s Person of the Year award, and that Miley Cyrus is currently in the lead. However, it also brings up an issue that is relevant to class discussion. Two hackers are taking credit for developing a way to bypass the “one vote per person per day” rule and instead cast multiple votes a day for Miley, influencing her lead. This raises the question of security on the internet, as Time also mentioned that they have had issues with their POY poll being hacked in the past. This brings the legitimacy of the poll into question, and the issue of how to prevent the poll from being hacked in the future, if it is possible. Another interesting part from the article is that Snowden is currently in third in the voting, though he is 20% behind Miley.
Federal officials have accused a Dutch man of hacking into a New Hampshire-based game company, tampering with sensitive user data, and using the stolen source code to start a competing online game.
Anil Kheda, 24, of the Netherlands, began his hacking spree in November 2007 after one of his accounts was deleted from Outwar (an online role-playing game with 75,000 active players), according to documents filed in US District Court in New Hampshire. Prosecutors allege that two months later, he started a competing game called Outcraft using source code obtained from the hacked servers. The game earned Kheda at least $10,000 in profits. Over the next nine months, he allegedly continued the hacks and agreed to stop only if the hacked company—Portsmouth, New Hampshire-based Rampid Interactive—paid him money and provided other benefits.
According to prosecutors, Kheda claimed to have found vulnerabilities in Rampid’s network and the Outwar source code that allowed him to gain administrator access to the underlying functions of the game. His ability to repeatedly delete a user database seemed to indicate his claims were at least partially true. The tampering caused Outwar to go down for a total of about two weeks over the nine-month stretch, causing Rampid to incur more than $100,000 in lost revenue, wages, and other costs, according to prosecutors.
Why would a network engineer route all of his employer’s traffic through his home RoadRunner cable modem? “You can direct where your traffic is going, and we found out that he’d sent the traffic home to ensure that his routing patterns at work were correct,” Saccavino told InformationWeek in a recent interview. But after a week, Saccavino said, he’d forgotten to turn it off.
During the week or so in 2005 that all brokerage traffic was being piped through the home router, the data being sent by GunnAllen’s 200 or so employees included bank routing information, account balances, account and social security numbers, and customers’ home addresses and driver’s license numbers, says Roger Sago, a former Revere Group SQL Server database administrator who was working at the GunnAllen offices at the time. Sago was in charge of defining the data stream to and from Pershing (a unit of Bank of New York Mellon that provides prime brokerage and other services to financial services organizations), which involved thousands of transactions per day. “They transmitted it over the system, online, to the clearinghouse, and if anyone had access to that data … the ramifications would be huge,” Sago said. “There’s enough data there that a person could run off and live forever off of what they found.”