Saudi hackers allied with Anonymous claim credit for exposure of 400,000 accounts.
10 Companies Driving Mobile Security
(click image for larger view and for slideshow)
A Saudi hacker group reportedly associated with Anonymous has posted credit card information on what it said represented 400,000 Israeli account holders, but an Israeli credit card firm said most of the accounts were invalid or incorrect and that the total count was far less.
According to Reuters, media reports out of Israel said the hackers had infiltrated multiple websites in Israel and grabbed the credit card data.
Dov Kotler, CEO of Isracard, said in a statement that a file listing 400,000 Israeli credit card numbers had appeared online, but that his firm studied the list and confirmed that around 14,000 of the credit card numbers listed by the hackers were valid, including 6,600 issued by Isracard, according to Reuters.
The hackers claimed to be using the stolen credit card accounts, but Israeli banks have frozen the accounts and won't hold the accountholders responsible for any fraudulent charges. Among the hacked websites were an Israeli sports information website and a local television station, according to reports.
Visitors to One, the Saudi sports site, on Monday evening were redirected to a post on the hacker's site that stated: "We decided to give a new year's gift to the world: the information of about 400,000 Israelis."
In today's uncertain and highly scrutinized financial services industry, achieving effective risk management is vital for survival. The report examines the need for enterprise risk management, the benefits of holistic data management, and ERM best practices. Download the report now. (Free registration required.)
Published: 2014-08-30 Cisco Intelligent Automation for Cloud (aka Cisco Cloud Portal) 2008.3_SP9 and earlier does not properly consider whether a session is a problematic NULL session, which allows remote attackers to obtain sensitive information via crafted packets, related to an "iFrame vulnerability," aka Bug ID CSCuh...
Published: 2014-08-30 The Amazon.com Kindle application before 4.5.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Published: 2014-08-29 Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section.
Published: 2014-08-29 Monitoring Agent for UNIX Logs 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP09, and 6.2.3 through FP04 and Monitoring Server (ms) and Shared Libraries (ax) 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP08, 6.2.3 through FP01, and 6.3.0 through FP01 in IBM Tivoli Monitoring (ITM)...
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.