Think Information. Think Security.
This one is funny or for some, insulting.

AntiSec, a "hacktivism" partnership between Anonymous and former LulzSec members, released over 90,000 emails lifted from Booz Allen Hamilton's servers on Monday. The military contractor stayed quiet for most of the day, only to tweet vaguely in the late afternoon, "As part of @BoozAllen security policy, we generally do not comment on specific threats or actions taken against our systems."

They did not include word on whether they would be offering further response to one of the kind of novel part of the attack: Anonymous included an invoice for hacking the consulting firm:

A group of hackers who have taken credit for several high-profile data breaches in recent weeks said Monday it had done it again, this time infiltrating the network of a government contractor and releasing what it says are thousands of military email addresses.

Calling the hack "Military Meltdown Monday," the hacker group claimed to have penetrated a computer server of Booz Allen Hamilton and released a list of more than 90,000 military email addresses and encrypted passwords and deleted 4 GB of source code.

The recent compromise of a NATO server by “Team Inj3ct0r” has recently made the news, but, as the media usually do, they did not look any deeper than the website for Inj3ct0r and perhaps a little data as to what the team said in a text doc on the compromised server.

A further examination of the group shows that Inj3ctor has been around since 2008, and has ties to Chinese hackers as well as Russia, Turkey and other countries.

Now that the Lulzboat has run aground during its three hour tour, and the rats have gone overboard in search of the relative safety of a pineapple under the sea, the computer media continues with the personal soap operas of "Anonymous" and "AntiSec" with the kids engaged in their infighting, whereas the attention of security people returns once again to the larger, more serious issues that involve the client side of the world.

When we last left our heroes, Microsoft had announced the takedown of a major botnet known as "Rustock." Well... not a complete takedown of course, but it's dwindled a bit aseWeek reports. Rustock had a good run before it was wrestled to the ground (almost) given that it first appeared in 2006.

A mere five year half life for malware is considered perfectly acceptable these days in the computer security realm.

BlackKatSec: The New Kids on the Block Who Allege They Took Down Al-Qaeda

Last week, the Al Qaeda site was taken down by unknown persons and their domain suspended by Godaddy for abuse.

Evan Kohlmann of Flashpoint Global was making the rounds on the media circuit pimping that it was in fact MI6 or the like that took the site down.

However, Evan had little to no evidence to back this claim, and frankly, the media just ate it up evidence be damned. I came to the party after hearing online the previous weekend that the site was under attack and going down from an unknown type of attack.

It was early May when LulzSec's profile skyrocketed after a hack on the giant Sony corporation. LulzSec's name comes from Lulz, a corruption of LOL, often denoting laughter at the victim of a prank. For 50 days until it disbanded, the group's unique blend of humour, taunting and unapologetic data theft made it notorious. But knowing whether LulzSec was all about the "lulz" or if it owed more to its roots as part of Anonymous – the umbrella group of internet subculture and digital activism – was pure speculation. Until now.

With an online warning that they are picking up where hackers LulzSec left off, a new group calling itself AntiSec has released a large torrent of hacked data via the Pirate Bay's servers including:
  • A "Universal Music Group Partners dump 1 & 2 containing's user:passwords and other data"
  • A "Viacom dump containing internal mapping of Viacom and its server:There has been no comment yet form Universal on the extend or exact nature of the shared data. Here is the full AntiSec statement:

What's in a "gray hat hacker?"

He is slender, with steel-gray eyes and close-cropped light brown hair. He looks even younger than his 22 years, belying his experience in the world of high-stakes cybercrime

Mike Major, Jr., of Halethorpe calls himself a “gray hat” hacker–neither clearly a good guy nor a bad guy, but one who navigates the virtual realm of cybercrime guided by his own internal sense of justice.

“I do whatever I feel is right at the time,” he said.

Major said he has no regrets–or fear of reprisals–for his role in disrupting the international hacking group Lulz Security, or LulzSec, which claims responsiblity for attacks on several high-profile government and corporate web sites.

Last weekend’s announcement that the LulzSec group of jolly hackers was breaking up was met with bemusement after one of the most mysterious, albeit entertaining, chapters of the information wars of 2011.

It’s quite clear that 2011 is unfolding as the Year of the Hack, withelectronics company Sony – which now appears to be the joke of the online security world – major banksthe FBI and even Google’s Gmail service all the subject of serious online attacks.
The success of many of these attacks is a reminder to all about the importance of online security. It is our responsibility to protect our customer and staff details by taking basic precautions.

What drives the mind of a juvenile cyberdeviant?

New research from the United Statesfound that peer influence and low self-control are associated with juvenile cybercrimes, including computer hacking, online bullying, digital piracy, and viewing online pornography.

The arrest of UK teenager Ryan Cleary for suspicion of hacking major players, like the CIA, Sony, and Facebook, brought to light claimedmental health issues such as autism,attention deficit hyperactivity disorder, and agoraphobia.