Lessons from Somebody Hacking the Hackers

May 31st, 2016 by Jennifer Lough

Hackers Hacking HackersCall it irony, poetic justice, karma, whatever you like. Nulled.io, a popular website for sharing hacking information, was hacked in the beginning of May. Unfortunately for any hacker wishing to remain anonymous online, the entire database is open for perusal. It contains 536,064 user accounts, 800,593 personal messages between users, 12,600 invoices, 5582 purchase records, and quite a few passwords and IP addresses. Since the hackers paid the website owners to keep such information under wraps, they’re probably just as disgruntled as their previous victims. On the plus side, this presents an excellent opportunity for law enforcement. Law abiding citizens may also learn a few things from the hackers’ misery.

Nulled.io was using the IP.Board community forum, which has had 185  known security vulnerabilities. Supposedly, all of them are fixed, but that doesn’t account for any new or unknown problems. At the time of this writing, the most widely accepted explanation for how the counterhackers accomplished the breach involves exploiting the numerous holes in the website host’s security. However, given that most security reviews for IPb commend them, there are certainly other possibilities. Read the rest of this entry »


Twinkle, Twinkle, Little Starry: The Future of Internet Connectivity?

May 18th, 2016 by Jennifer Lough

MVI starryI have no use for horoscopes, but I suppose in this case one could argue that the future is in the stars. Starry, more specifically. Starry released its router, Starry Station, on February 5 and announced that it would begin beta testing its Internet service this summer in Boston. The router received mixed reviews, as some consider it overpriced and gimmicky  while others like the Health Score information and good customer service. Everybody thinks the price is too high, but that’s bound to come down eventually.  However, the router is just a piece of Starry’s master plan. Read the rest of this entry »


Microsoft Cloud App Security Helps Security Teams Combat Shadow IT

May 4th, 2016 by Pamela Michael

MVI Cloud App Security“I’m heading to my appointment/home/golf game/kid’s music program/you name it. Let me know when you’ve finished that proposal and I’ll take a look before the meeting.”

Ever heard something like that around the office? Each day the demand for more flexible work technology increases. Employees on the go want access to their corporate emails and the ability to share and edit documents from home and across wifi connections wherever they may be.

In addition, technology can be expensive — especially when outfitting an entire team. This means business owners and IT departments often have a hard time keeping up with the lightweight ultrabooks and latest smartphone models their employees purchase for themselves; technology that is often newer and more advanced than the equipment provided by the office, and therefore overwhelmingly preferred. Let’s face it: You’re not going to pull up that proposal on your work-issued Galaxy S4 when your new Surface Book is sitting right there on the couch!

But while great for collaboration and productivity, Bring Your Own Technology (BYOT) or Bring Your Own Device (BYOD) has the ability to threaten a company’s IT security and put sensitive business systems at risk Read the rest of this entry »