Screen Shot 2013-02-22 at 8.25.32 AM

Profile of a cyber criminal (infographic)

Yesterday, Zendesk was hacked and the personal information of an unknown number of Twitter, Pinterest, and Tumblr users was stolen. Last year, 12.6 million U.S adults were the victims of identity fraud.

Hacker holds alleged Romney tax returns ransom for $1M in Bitcoins

Ready for the most outlandish story of your morning? Here we go. Today, a hacker allegedly stole Mitt Romney’s tax returns, is demanding $1 million in Bitcoins for silence, and sent a USB drive and letter to the GOP and Democratic party offices in Williamson County, Tennessee as proof.

hackathon

The rise of the hack

I didn’t know it could be someone’s job to attend hackathons. I hadn’t heard of a developer evangelist before, so a year ago when I stumbled across an opportunity to become one, I was drawn by its novelty.

Github community in turmoil after hacker exposes massive security flaw

Github, the service that many professional programmers use to store their work and collaborate on coding, was hacked over the weekend. A young Russian named Egor Homakov showcased a loophole in Github that would allow anyone to commit to the master copy of a project, meaning they could alter or delete the source code. But when his account was suspended by Github, a furious argument broke among developers out about his intentions. Was he doing the community a service by exposing the flaw or taking things too far with a very public hack?

Hacking water meters is easier than it should be

The smarter water meters become, the easier they’re getting to hack. Like many things in electronics, water meters become easier for hackers to break into and misuse when they are upgraded to include wireless and computer technology.

You can hack a MacBook battery from afar. Is there a point?

A seasoned security hacker who spent seven months figuring out how to hack a laptop battery disclosed his findings today at the Black Hat security conference. Charlie Miller, who specializes in hacking Apple software, figured out how to remotely control a battery and do some damage to it such as “bricking it” – or incapacitating it – from afar.

Security researchers hack Google’s Chrome OS

When Google first started talking about its Google Chrome OS software a few years ago, one of the selling points was the promise that it would come with much better built-in security than other operating systems. Now, Chrome OS has only been commercially available for a few months, and security researchers have already figured out how to hack it.

Sony says hacked PlayStation Network credit card data was encrypted

Sony said yesterday that all credit card information on its hacked PlayStation Network was protected with encryption. As the outage for the online game service for the PlayStation 3 entered its eighth day, the company sought to reassure angry users.