Anonymous officially denies that it is responsible for the recent hacking attacks on Sony—well, to the extent that an entity like Anonymous is capable of doing anything "officially," or with one voice. But two hackers identified as veterans of Anonymous tell the Financial Times that the cyber-activist group, or at least cells of the group, are probably behind it.
One Anonymous member told the FT that he saw technical details of a vulnerability in Sony's network that enabled the break-in discussed on an Anonymous chatroom, shortly before the intrusion.
"The hacker that did this was supporting OpSony's movements," the Anonymous activist told the FT.
Another established member of Anonymous who participated in the hacking of security firm HBGary Federal, said it could well have been other members who subsequently hacked Sony.
"If you say you are Anonymous, and do something as Anonymous, then Anonymous did it," said the hacker, who uses the online nickname Kayla. "Just because the rest of Anonymous might not agree with it, doesn't mean Anonymous didn't do it."
Hackers admit Anonymous likely behind Sony attacks
(FT, thanks Joseph Menn)
Philips has acquired Luciom, a French startup that makes Li-Fi products, which allow for very fast network connections over short distances by flickering an LED at speeds that are too fast to register on the human eye, and which can ever work in the dark by operating at low dimness settings the human eye perceives […]
Many insurers offer breaks to people who wear activity trackers that gather data on them; as Cathy “Mathbabe” O’Neil points out, the allegedly “anonymized’ data-collection is trivial to re-identify (so this data might be used against you), and, more broadly, the real business model for this data isn’t improving your health outcomes — it’s dividing […]
As the US government ramps up its insistence that visitors (and US citizens) unlock their devices and provide their social media accounts, the solution have run the gamut from extreme technological caution, abandoning mobile devices while traveling, or asking the government to rethink its policy. But Maciej Cegłowski has another solution: a “travel mode” for […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]