Hackers Try to Suck the Earth Into Black Hole
If there weren't already enough problems at the European Organization for Nuclear Research — angry calls & letters, protests, panic, even death threats — surrounding the Large Hadron Collider — in addition, that is, to the chief problem of making the device work — there certainly are now, as a new and particularly frightening problem has arisen: hackers.
One might presume that the LHC would be a pretty hard target to hit. After all, it's being run by an international coalition, security is already on high alert due to the frenzy surrounding the possibility of sparking Armageddon, and, of course, it runs Linux. None of that seems to have deterred a group of hackers calling themselves the "Geek Security Team," as the group managed to hack the machine last Wednesday as the first beams were circulating. The hackers gained access to one of the computer systems operating the Compact Muon Solenoid Experiment, a massive magnet that serves as one of the detectors analyzing the LHC's activities, and modified a web page with a message in Greek ending ""We are 2600 - dont [sic] mess with us."
According to scientists, had they penetrated one level further, they would have gained sufficient access to turn off parts of the CMS detector. We don't know about anyone else, but it worries us just a tad that: a) hackers got into this thing, b) that the scientists who told us the LHC wouldn't suck us all into a black hole didn't know it could be hacked, and c) that the end of the world could be the result of restless script kiddies. We always thought it'd be the Vogons.
Justin Ryan is a Contributing Editor for Linux Journal.
- Free Today: September Issue of Linux Journal (Retail value: $5.99)
- The Tiny Internet Project, Part I
- Bitcoin on Amazon! Sort of...
- Machine Learning with Python
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- Android Browser Security--What You Haven't Been Told
- Epiq Solutions' Sidekiq M.2
- Returning Values from Bash Functions
- Securing the Programmer
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide