(Page 2 of 2)
According to info on Pastebin, during the second week of March 2012, a Dell Vostro notebook , used by Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java:
"During the shell session some files were downloaded from his Desktop folder one of them with the name of 'NCFTA_iOS_devices_intel.csv' turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc. the personal details fields referring to people appears many times empty leaving the whole list incompleted on many parts."
Breeding Better Security
We caught up with Jonathan Spira, CEO and chief analyst at Basex, to get his takeaways from the lasts fallout of the Java exploit. His first reaction was to question
why an FBI agent allegedly carried a database of Apple device IDs.
"This hack does show that once again nothing is ever fully secure. We constantly have to reevaluate how we attempt to keep our information secure. No organization, including the FBI, appears to be exempt," Spira told us. "We have to find fundamentally new approaches to security and how we collect, manage and store information."
Posted: 2013-04-03 @ 7:38am PT
Ken is correct. Technology is a double edged sword. It can do wonderful things but it seems today it's being used more to profit from us and spy on us than benefit us.
Kenneth B ishop:
Posted: 2012-10-04 @ 4:50pm PT
I think we are our own worst enemy because we cant seem to grasp the idea that unless you keep vital info in a 100 percent safe location you might as well put the info on TV