G$earch

Sega investigating into hack attack on their servers

Posted by Harshad

Sega investigating into hack attack on their servers


Sega investigating into hack attack on their servers

Posted: 18 Jun 2011 07:46 PM PDT

Sega investigating into hack attack on their serversSega has noted they are investigating into the hack on their servers on Friday whilst taking all the appropriate steps to secure data.

Consumer data was stolen, says the gaming company, but passwords were encrypted and financial data was not compromised.

Says Sega (via IBT):

Over the last 24 hours we have identified that unauthorized entry was gained to our Sega Pass database. We immediately took the appropriate action to protect our consumers' data and isolate the location of the breach. We have launched an investigation into the extent of the breach of our public systems.


LulzSec did not take credit for the attack, and even asked the company for details so they could attack the group that did it.

Permalink | Comments



Domains like '.apple' and countless others set for approval

Posted: 18 Jun 2011 07:18 PM PDT

Domains like '.apple' and countless others set for approvalICANN is set to approve the biggest move in Internet domain awarding history, allowing brand owners to own their own brands on the web, like .apple, .microsoft and thousands of others.

Following a special board meeting tomorrow, the move is expected to be enacted.

Currently, there are 22 top-level domains such as .com, .org, etc, and 250 country-level domains like .ly (Libya) and .uk.

If enacted, the move will give major brands a better way to control their presence online, and give them better ways to add visibility to their sites in search results. If it is approved this coming week, the window to apply will start in January and last 90 days.

Applications cost $185,000 and the applicant must have full proof of claim to the name they are purchasing.

Cities are also expected to partake, with some examples given like .nyc and .london.

Permalink | Comments



New blog is bent on 'exposing' LulzSec

Posted: 18 Jun 2011 06:54 PM PDT

New blog is bent on 'exposing' LulzSecIf you have been following AfterDawn for the past month, or broad technology news in general you have undoubtedly heard of the group LulzSec, responsible for multiple hacks on Sony, Sega, Cia.gov, a site for the U.S. Senate and countless others.

Over the past week, however, a group calling themselves "Web Ninjas" have posted a blog called LulzSec Exposed, with the group's main purpose being "exposing" the members of LulzSec.

So far, the group has posted numerous chatlogs from alleged LulzSec leaders and members and even "Doxed" five of them, posting their pictures, names, addresses, emails, and in one unfortunate guy's case, his social security number and IP address.

One 'exposed' member is a contributory journalist for The Huffington Post, Guardian UK and other large sites.

The hacking group did respond to the blog and practically laugh it off, saying:

Dear Internets,

> Herro! Recently some of you may have seen "LulzSec exposed" logs floating around. We'd like the time to say this: LOL. Those logs are primarily from a channel called #pure-elite, which is /not/ the LulzSec core chatting channel. #pure-elite is where we gather potential backup/subcrew research and development battle fleet members, i.e. we were using that channel only to recruit talent for side-operations.

Despite the fact that we're laughing heartily right now, we do take care of our subcrew, and as such the person who leaked those logs (m_nerva) has been completely hacked inside and out. We have all his online accounts, all his personal information, all the illegal things he's done on record. We destroyed him so hard that he sat there apologizing to us all night on IRC for what he did. His mother probably spanked him after we wrecked his home connection. Uh-oh, m_nerva!


Check the site if you are interested but be reminded there is really no proof to the claims or the denial from the group itself.

Permalink | Comments



0 comments:

Post a Comment