Monday, November 8, 2010

ANOTHER PLEADS GUILTY IN BOTNET HACKING CONSPIRACY

http://www.daemonnews.org

The following case is about Tomas James and Frederik Jack also Smith's co-defendant, who pleaded guilty for intentionally cause damage to a protected computer and to commit computer fraud. 
According to the information available ,Smith, Thomas and Edward agreed and assisted each other in causing damages, transmission of a program, information, code,or command, by using an Internet Relay Chat.
Smith and Edward also initiated code application  file by the name NETTICK, which had usage to hack into another person's account computer and control the system. 
Smith was the member of online forums like Darmarker and CcpowerForums.com and in 2006 he posted a public message on several forums in which he offered an executable program to control a bonter for $750, or the source code for 41200.
in addition, he used Edward's website kidindustries.net and demonstrated to engage in a distribution denial of service attack by attaching an IP address at an Internet service provider in North Texas. on the same year, Smith and Edward also accessed, without authorization the T35.net user database, which provided free personal and business Internet web-hosting services for thousand of users. The database subjected to hack by Smith and Edward contained confidential user identification and passwords which they downloaded. Moreover, on October 3, 2006, Smith helped Edward in order to defacing the T35 and make the confidential information include user, IDs, and passwords available to public.  
Each of them faces a maximum statutory 5 years in prison, a 250,000 fine and restitution. 
My comment  
The case that it was discussed above,it's authorize and legal use of computer as a tool for doing criminal actions and includes several scenarios: hacking and unauthorized access, defacing which is unauthorized  modification , DOS  or denial of service that all come under computer crime, and they are punishable by law.
One another thing that it needs to be mention here is, when Smith Helped Edward  for defacing T35 , this is the case that is known as Aiding and Abetting and the person who assist is going to be guilty of an offence, the punishment will be the same as that of the principal offender but cannot be more.  


source:
"Another Pleads Guilty in Botnet Hacking Conspiracy - Silobreaker." Welcome - Silobreaker. Web. 08 Nov. 2010. .





Saturday, November 6, 2010

Blaine man indicted for hacking into neighbor’s wireless Internet system and posing as the neighbor to email child pornography and threats to the Vice President

http://money.cnn.com
This case is about 45-years old man, Blaine ,who has been guilty for hacking into his neighbor's wireless Internet system and use it to make threat to kill the Vice President of the United States and also Email child pornography. This guy pleaded gulty for different offences including: one court for aggravated identity theft, making threats to president and successors to the presidency, one court for unauthorized access to a protected computer and another court for possession of child pornography and distribution of child pornography. 
Base on the information available Blaine in February 2009, hacked into his neighbor's wireless Internet connection and formed a multiple Yahoo.com email accounts in that person's name and in May 6,2009 he used one of those accounts to email the office of the Vice President of the United State and governor and US senator as well. In that Email he stated:
"This is a terrorist threat! Take this seriously. I hate the way you people are
spending money you don’t have.... I’m assigning myself to be judge jury and
executioner. Since you folks have spent what you don’t have it’s time to pay 
ultimate price. Time for new officials after you all are put to death by us"

Blaine used the emails accounts he created in the victim's name to send sexually-themed emails to three of the victim's co-workers too, in addition to that he attached an image containing child pornography. he also created Myspace page in the victim's name, on which he posted the same image of child pornography. 
Adolf faces a maximum penalty of 20 years imprisonment on the distribution of child pornography, ten years on the pornography possession and five years on both  the unauthorized access to a computer and and a threat to vice president also a  two-year minimum sentence on each count of aggravated identity. 
My comment
this is the case that involve many offence but one thing that is in common in all of the them, is using a computer as a tool to commit a crime against the person and government as well.
Technically speaking, it is kind of crime that is called Spoofing, that is faking the email sender's identity and tricking the target recipient into believing that the e-mail originated from the supposed mail sender.  

source:
Month, By. "Minnesota Man Indicted for Hacking, Threatening Vice President: The Criminal Report Daily : Investigation Discovery." Discovery Networks: Blogs. Web. 07 Nov. 2010. .

DUBLIN WOMAN PLEADS GUILTY TO HACKING EMAIL ACCOUNTS AND DELETING DOCUMENTS IN DOMESTIC RELATIONS DISPUTE

http://www.gohacking.com

Jamie Staley,26 years old, pleaded guilty in United State district for changing the Email passwords without authorization also accessing those account and deleting Emails from them. 
according to the information available, Staley was involved in the case of child support and visitation argue with her child's father and grandparents in 2008 and then in July 2008 Staley decided to hack child's grandmother and deleted emails between grandma and her attorney regarding to th custody and dispute but the email provider notified the grandma of the password change and when she reset the password, she found out some of the emails had been removed. 
at that time FBI started to investigate and determined Staley also accessed to emails, Facebook and Myspace and accounts of 16 people including her child's elementary school teacher.
Staley pleaded guilty for in felony that is punishable by law up to five years. 
My comment
when I read this case I said thanks God that I am not in the place to judge because what she did it was for love to her son but the law is applicable to anyone and when you do something wrong is wrong and a person shall be guilty of an offence if:
1.the person causes a computer to perform any function with intent to secure access to any program or data held in any computer
 2.the access is unauthorized
3.the person knows at the time when she causes the computer to perform the function that is the case. 


source:
"Woman Pleads Guilty To E-mail Hacking, Deleting Case Documents | NBC 4i." Home | NBC 4i. Web. 06 Nov. 2010. .





Tuesday, November 2, 2010

WOMAN PLEADS GUILTY TO HACKING INTO PRIVATE BOXES ON PERSONAL AD COMPANY COMPUTERS AND THREATENING A CUSTOMER

http://spybusters.blogspot.com

The case that I am going to share today is about the woman, Barbara Denenburg, who pleaded guilty for hacking the ad company and  making death threat against Massachusetts woman who she met through company's personal ad service.
the way that the company works is ,the personal ad goes to the newspaper but instead the reader calls directly, in respond, a reader calls a phone number at the company and leaves a message for the person who put th ad on the newspaper.
Using a computer and from he skill Barbara accessed voice-mail boxes of around 200 people who put the ads on the newspaper and changed the password of 40 of these voice-mails and also greeting 25 of them. following her actions, she harassed number of women through personal ad company among them she began harassing a woman by series of Emails, one of which stated that the victim would be executed by lethal injection. in addition to the emails she sent a package including cardboard tombstone which had been written "RIP" , victim's name, date of birth and "Hated by ... all women everywhere" on it. 
the defendant faced a sentences ,under binding plea agreement,  a time served, 23 months already served, following by three years supervised release and $67000 in restitution. 


My comment
this is kind of crime that at the first place is cyber-crime under property and then cyber-crime against a person with the use of computer such as Emails.
this case involves both Hacking and at the same time Cyber Stalking where the victim got the repeated-threatening Emails and it is punishable by law.
For those that are confuse with biding plea arrangement mentioned in the last paragraph of the caes, it is kind of arrangement in which a prosecutor and defendant arrange to settle the disagreement against defendant. 

Source:"The United States Department of Justice - United States Attorney's Office - District of Massachusetts." Welcome to the United States Department of Justice. Web. 02 Nov. 2010. .

EXTRADITED HACKER SENTENCED TO 10 YEARS IN FEDERAL PRISON FOR MASTERMINDING FIRST-EVER HACK INTO INTERNET PHONE NETWORKS

http://www.voip-weblog.com
This case is about the very first individual hacker that hacked VOIP service and reselling it for profit.Edwin Andrea Pena 27, penetrated the networks of internet phone providers and transmitted over 10 million minutes of unauthorized telephone calls over the victims's network and selling discounted service to his unsuspecting customers. he was able to offer at such low price because he hacked into the computer networks of suspecting VOIP providers, to route his customers'calls. 

Pena fled the United state in 2006 but the chase ended in 2009 when he got arrested in Mexico.Pena Pleaded guilty for computer hacking and wire fraud. United States Attorney Fishman stated: Theft is theft whether he robs a bank or a network and their services. Hackers should assume if they operate from shadow or other countries the law can not keep up with them.
      
Pena caused a loss of more than $1.4 million around one year for networked based company, moreover Pena admitted the help of others, including, Robert Moore who helped Pena for finding vulnerable network ports. 
Pena with the money that he got from this illegal business purchased real state, new cars, also a 40-foot motor boat under the name of someone else, except one car that the court executed a warrant for Pena's 2004 BMW M3. 
Pena was sentenced three years in the prison and in addition to prison time he also had to pay restitution in the amount of $1,012,311. 


My comment:
There are some points regarding to this case, Firs: as United States Attorney Fishman stated a person can steal and many other criminal activities through cyber-space without having physical existence at the place that he wants to commit a crime and the crime is more complicated to what it used to be, But the law is applicable in cyber space the same as real world. 
Second point  is when Pena fled to Mexico and he got arrested in there and then he was return to US for justice, this is because there is an agreement between tow countries regarding to the this case and similar ones that each side needs to send the person for justice to the country that he had caused damages. 


Source: "Federal Bureau of Investigation - The Newark Division: Department of Justice Press Release."Federal Bureau of Investigation - Newark - Homepage. Web. 02 Nov. 2010. .



Monday, November 1, 2010

Comcast Hackers Sentenced to Prison

http://www.wired.com
Four mans that were associated with the hacker group Kryogeniks ,by the names Lewis, Nebel, Jr.a.k.a and co-defendant, were sentenced to 18 months in prisons. 
the way they commit a crime was ,they used their skills in order to redirect all traffic directed to www.comcast.com to website that they'd designed. Therefore, the customers that intended to read their emails and listen to their Emails redirected to the website that they found this message  “KRYOGENIKS Defiant and EBB RoXed COMCAST sHouTz to VIRUS Warlock elul21 coll1er seven.”


The costumers that connected to the website were around 5000 per day and the damages caused by this group of hackers  cost Comcast around $89,578.13 .
The four persons in addition to prison time they punished to pay restitution in the amount that they caused damage.  


My comment
when we talk about Cyber-crime simply we can put them into three categories:
Cyber-crimes against: 1. Person  2. Government  3.property
in this case you can see, it is kind of crime against property which incurred damages to Comcast.
moreover, this is good example of unauthorized modification under property damages that is punishable offence.


Source:Poulsen, By Kevin. "Comcast.net Hijacker Gets 4 Months | Threat Level | Wired.com." Wired News. Web. 02 Nov. 2010. .  


Hacking and cracking are  the most well known among these type of activities. 



A fired Information Technology Director was sentenced to 27 months for hacking employer's website

http://enterpriseblog.net/


In 29th October 2010, Assistant Attorney General Lanny announced "Albert-El pleaded guilty to one count of intentionally damaging a protected  computer belonging to Transmarx LLC without authorization. 
According to the information available Albert-El got fire by Trnsmarx when he was information technology assistance. During his employment he had access to administrative-level information and also computer network, which contain the company website hosted on a computer network in Suwanee. 
He accepted that on 25 July, 2008 used a personal computer an administrator account and password in order to access the computer hosting the Transmarx website.  After he got access, he started the transmission of a series of commands that intentionally made damages,  without authorization to the computer by deleting around 1000 files. Furthermore, he admitted he made the dames because he was angry about got the sack. Albert action caused around $6000 losses to Transmarx.1


My comment


when you read this post the very first thing you would realize is that who and for what purposes the person commit a cyber-crime. there are many different people for different purpose commie a cyber-crime. include: student ,member of organized crime syndicates, terrorist and what apply to this case disenchanted and mad employee and they do commit a crime many different purposes, include: for the purpose of a gain, pleasures or retaliation which for this case the latter one can be applied.
there are two elements that they need to be consider for any case of crime .
1. Intention
2. Knowledge
for this case ,it is obvious that the intention act is to cause damages and loss to the company that he used to work for and also the guy had enough knowledge of computer technology for doing illegal activity.  




1.Source:"Virginia Information Technology Director Sentenced to 27 Months in Prison for Hacking Former Employer’s Website." World News and Headlines at Net News Publisher. Web. 01 Nov. 2010. .

Wednesday, October 13, 2010

French Cops Nail Man Who Hacked Obama Twitter

source: http://thesecuritytimes.com
An unemployed 25-year hacker hacked President Obama twitters account, this guy got caught in his native country , French. he explained how he did this. apparently, the guy did this on purpose and as a result of bet.this guy lives with his parents  and goes by  “Hacker Croll” the nom-de-Web of the person who got his hands on Twitter employee data last year ,however,  no other information are revealed about this guy.
th source also says the punishment about the case of Crolle's latest move that it goes under the agreement between French and FBI police, could result the guy to be in jail for two years.


source:
McCahill,, By Will. "French Cops Nail Man Who Hacked Obama Twitter—on a Bet." Newser | Headline News Summaries, World News, Breaking News, and Local News. Web. 13 Oct. 2010. .

Wednesday, October 6, 2010

Hackers deface 5th government Web site, mock automated polls JERRIE ABELLA, GMANews.TV

                                               source: www.you.tube.com


This is the case that  happened recently in Philippine and it's about the government agancy ,Technical Education and Skills Authority, was hacked by hackers before this case, hackers also hacked the Department of health, Department of social welfare and development, National disaster coordinating council, and Department of Labor and Employment. 
Malaccan warned over the series of hacking attacks on government websites, also expresses new concern regarding to security of coming election in May. 
Deputy presidential spokesman said "this is great concert for the authorities in Philippine because it's happening all over the country and it is a matter of information policy within goverment."
Moreover, base on the information, hackers leave the messages referring to a young new cadre who was killed last December and also hackers made the site automatically jump into another page,    a job announcement supposedly from Ventured that inviting technicians across the country to be part of it team. Following the attack Oliver urged the commission on Elections and other agencies to take action for securing their websites.  
My Comment
base on this case you can see how cyber crime can be dangerous not only to the individual but also the whole country. This case and similar cases comes under public law issue and it is known as Cyber crimes against government that has serious consequences if necessary actions are not taken.


source:
"Security of Govt Websites Highlighted in Hacking Incidents." GAZOTUBE.com. Web. 07 Oct. 2010. . 

Monday, September 20, 2010

Yahoo News hacked, story changed

www.dipity.com

Online news took a hit this week with Yahoo's acknowledgment that a hacker substantially altered a news story that appeared on its site.

The changes, which have since been removed, were made to an Aug. 23 Reuters story about the Russian software programmer Dmitry Sklyarov, who stands accused of violating U.S. copyright law.
According to Yahoo, news of the hack was first reported and brought to the company's attention by SecurityFocus.com this week. A Yahoo representative said the Web portal had taken "appropriate steps to block unauthorized access" to its production tools.
The hacks are the latest in an ongoing headache for online news organizations. Previous incidents include the defacement of The New York Times Web site and an attack one year ago on the Orange County Register's Web site.
In those incidents, hackers appeared to be using the sites to make a political point or simply to make trouble. But in the attack on Yahoo News, the hacker, Adrian Lamo, said he was acting to demonstrate Yahoo's security lapses, according to the SecurityFocus report.
Some of Lamo's changes were whimsical, but others were substantial factual misrepresentations. For example, Lamo's altered story reported that the Russian hacker faced the death penalty if convicted, SecurityFocus reported.
Lamo also told SecurityFocus that he'd been able to change Yahoo News stories over the course of three weeks and that he had changed other stories in addition to the Aug. 23 Reuters story.
Yahoo would not comment on whether it planned legal action against Lamo over the incidents.
The Yahoo News caper is not Lamo's first warning to a Web company. In May, he brought to light security lapses in Excite@Home's network, which the broadband Internet access provider later thanked him for catching.
Lamo, the founder and a staff writer for the Inside-AOL Web site, was also credited last year for exposing a hole in America Online's instant-messaging application.


Source:
Festa, By Paul. "Yahoo News Hacked, Story Changed - CNET News." Technology News - CNET News. Web. 20 Sept. 2010. .

Monday, September 13, 2010

(Reuters) - A British computer hacker accused by the United States of breaking into military and government networks has won more time in his fight against extradition, his lawyer said on Thursday.



ww.ufodigest.com


Gary McKinnon, 44, who says he was trawling for evidence of aliens and secret technology, could be jailed for up to 70 years if he is convicted for what U.S. officials have described as the "biggest military computer hack of all time."
His lawyer Karen Todner said she has successfully lobbied Home Secretary Theresa May to reconsider the U.S. extradition request.
"(The minister) wishes to have appropriate time fully to consider the issues in the case," Todner said in a statement.
Todner says McKinnon, who suffers from Asperger's syndrome, a form of autism, is too ill to be sent for trial in the United States. She has asked senior judges to review a ruling by former Home Secretary Alan Johnson that McKinnon is fit to be extradited and that it would not breach his human rights.
The government has agreed to delay that review, due to be held next week at the High Court, and McKinnon will stay in Britain for the time being.
A Home Office spokesman said: "The home secretary has considered the proposal from Gary McKinnon's legal team and has agreed an adjournment should be sought. An application to the court is being made today (Thursday)."
McKinnon was arrested in 2002 after U.S. prosecutors charged him with illegally accessing computers, including systems at the Pentagon and NASA, and causing $900,000 (630,000 pounds) worth of damage.
They say he deleted files, copied passwords and forced the closure of a government computer network in Washington, leaving 2,000 workers without internet and email access for three days.
McKinnon later told Reuters that he just wanted to find out whether aliens really existed. He became obsessed with looking through large military data networks for any proof that they might be out there.
Prime Minister David Cameron has said the case raises "serious questions" about the extradition treaty between Britain and the United States. His deputy Nick Clegg has campaigned for McKinnon to be tried in a British court.



Source:
 "Omputer Hacker Gary McKinnon Wins More Time to Fight US Extradition." Www.hacking-news.com. Web. 13 Sept. 2010. .ource



Sunday, August 22, 2010

As Hacking Hits Home, China Strengthens Cyber Laws


 A year ago, when a time Magazine reporter told Tan Dailin that he'd been identified as someone who may have hacked
 the Pentagon, he gasped and asked, "Will the FBI send 
special agents out to arrest me?" The answer, it turns out, was,
 "No, the Chinese government will." Dailin, better known in Chinese hacker circles as Withered Rose, was reportedly picked up last month in Chengdu, China, by local authorities. He is now facing seven years in prison under a new Chinese cybercrime law that was passed in late February.
Although the Western media has been awash with stories of Chinese hacking for years, cybercrime was until recently governed by three articles added to China's criminal code in 1997. The laws were out-of-date and "failed to correlate proportionately with the tremendous social harm" caused by cybercrime, according to a recent paper on Chinese cyber-law published in the International Journal of Electronic Security and Digital Forensics.
"China has made significant progress in cybercrime legislation and is putting in great efforts to strengthen it," said Man Qi, one of the paper's co-authors, in an e-mail interview.
However, the paper concludes that the country's laws are still in the early stages of development. "Gaps and inadequacies exist in traditional offense provisions," said Qi, a senior lecturer in the Department of Computing at Canterbury Christ Church University in the U.K.
Until the new law was passed in February, computer crimes carried a maximum of three years' jail time. That has now been extended to seven years, and the definition of computer crime has also been broadened.
"These changes to the criminal code are important to crack down [on] cybercrime and also help to strengthen the protection of privacy and personal property," Qi said.
However, the laws are still not as tough as those in the U.S., where perpetrators of computer fraud routinely face 20-year sentences. And many security experts accuse China of sponsoring politically motivated cyber-attacks and turning a blind eye to cybercrime.
Still, China has expressed some willingness to work internationally on crime, Qi said. While preparing for the 2008 Beijing Olympics, "China was praised by Interpol for their 'highest possible standard' work," she noted.
The new law comes as cybercrime is starting to hit home in China, according to Scott Henderson, the author of a blog that covers Chinese hackers.
In the past few years, criminals posing as security experts have begun calling small-business owners, offering their services, Henderson said. If they're not hired, they simply attack the business, typically with distributed denial of service (DDOS) attacks, unless they are paid. "We're starting to see Chinese hackers hacking internally now, too," he said.
Dailin reportedly was arrested after he trained a DDOS attack on rival hacker groups. His victims went to authorities with evidence.
With China's economy struggling, some IT professionals have begun turning to crime in the past two years, Beijing-based security expert Wei Zhao said recently. "They cannot easily find jobs, maybe the security market is too small for them," he said in an interview.
Zhao, the CEO of security consultancy Knownsec, called China "the world's malware factory," saying that the country has become a major source of online attacks and so-called zero-day attacks, which target previously undisclosed software flaws.
In recent months, Chinese hackers have gained fame for launching widespread attacks against programs such as Internet Explorer and Adobe Flash, but they have also targeted popular local programs such as Xunlei, QQ and UUSee.

Source: McMillan, By Robert. "As Hacking Hits Home, China Strengthens Cyber Laws - PCWorld Business Center." Reviews and News on Tech Products, Software and Downloads - PCWorld. 11 May 2009. Web. 22 Aug. 2010.



Thursday, August 19, 2010

ARLINGTON SECURITY GUARD, WHO HACKED INTO HOSPITAL’S COMPUTER SYSTEM, PLEADS GUILTY TO FEDERAL CHARGES

http://doc40.blogspot.com
Jesse William McGraw pleaded guilty for felony offences that caused damages to the hospital's computer system, in Dallas. McGraw had access to around 14 computers located in the North Central Medical Plaza, including a nurses's station computer and a heating and ventilation and air conditioning. The nurses station used to track a patient's progress through the Carrell Memorial Clinic.
McGrow used a transmitted program that allowed him or anyone with his account name and password, to access the computers. 
He also weakened the integrity of some of the computer system by removing security supports like: uninstalling anti-virus programs that made the computer network more vulnerable to attack. In addition, he installed malicious code that was associated with theft of data from the compromised computer, using the compromised computer in denial of service attack, and using the computer in order to send spam. 
 he also took advantage of these information and action for his Electronic Tribulation Army and others who interested in computer crimes.   
McGraw had unauthorized physical access to security locked room containing HVAC computer for downloading a password recovery tool from a website also inserted a removable storage device and executed a program which allowed him to emulate a CD/DVD device. 
Although he denied  but by doing that and control on HVAC he was able to interfere with treatment regimes, including the efficiency of all temperature-sensitive drugs and supplies. 

Source:
"Another Pleads Guilty in Botnet Hacking Conspiracy - Silobreaker." Welcome - Silobreaker. Web. 08 Nov. 2010. . 

Wednesday, August 18, 2010

Malware hiding behind phony Fedex messages

www.sophos.com
Security experts are issuing warnings following the discovery of a malware scam using email attachments.
The attack uses emails claiming to be from delivery service FedEx. The message claims that the user was unable to receive a package due to an address error and instructs users to print out an attached form to claim the package.
The attachment, however, contains a malicious .zip file which when opened triggers the malware attack. Security firm Sunbelt Software identified the malwareas  zbot.
Sophos senior technology consultant Graham Cluley said that the attack shows an interesting twist on the common tactic of hiding malware trojans as e-mail attachments.
"Unlike many of the other Fedex-related malware attacks we have seen in the past, the emails carry the message about the failed delivery in the form of an image rather than text, possibly in an attempt to try and defeat more rudimentary anti-spam filters," Cluley said in a blog post.
Users are being advised to use common security best practices such as avoiding suspicious messages and not loading unknown or suspicious file attachments.

Malware
Malware is software such as viruses or Trojans designed to cause damage or disruption to a computer system.
It is defined as: 
any set of computer instructions that are designed to modify, damage, destroy,record, or transmit information within a computer, computer system, or computer
network without the intent or permission of the owner of the information. They include, but are not limited to, a group of computer instructions commonly called viruses or worms, that are self-replicating or self-propagating and are designed to contaminate other computer programs or computer data, consume computer resources, modify, destroy, record, or transmit data, or in some other fashion the normal operation of the computer, computer system, or computer
network.
Because this is the case in U.S and the punishment for violating this section of the penal code can be a fine of up to $10,000 or imprisonment for up to one year or both.The punishment severity is based on whether there was injury to the victim,or if there were prior offenses of the same nature.


Source:
"Malware Hiding behind Phony Fedex Messages - V3.co.uk - Formerly Vnunet.com." UK Technology News, Reviews and Analysis - V3.co.uk. Web. 27 Aug. 2010. 

'Internet job recruitment website Monster.com has been hacked by cyber criminals, who have stolen the personal details of some of the site's millions of online users.'


'Internet job recruitment website Monster.com has been hacked by cyber criminals, who have stolen the personal details of some of the site's millions of online users.'
The security breach is thought to have affected users all over the world, including some of the 4.5 million registered Monster.co.uk users.Monster has advised users to change their password when next logging on to the site.
"As is the case with many companies that maintain large databases of information, Monster is the target of illegal attempts to access and extract information from its database," said Patrick Manzo, the company's sentior vice-president, in a statement. He warned that hackers could use the email address information they had stolen to "phish" for further personal information through fraudulent email messages.
Monster refused to say how many people had been affected by the data breach, but said the appropriate authorities had been informed and that an investigation was under way.
The company said that no national insurance numbers, personal financial data or CVs had been stolen.
Security experts warned that because many computer users use the same login and password for multiple online service, banking details and other sensitive information could be at risk.
"It's a horrendous breach," said Graham Cluley, a security expert with Sophos. "The information they have can be used to cause all kinds of mischief.


base on the fact, this story is not a new one and this is the second time that the company has allowed to this happen. This simply indicates the lack of security on the website rather than the intelligency of the hackers. the cases like this is involve public low issue that causes distrustfulness between job seekers and online job recruitment websites .Here, many people  might prefer to look for the jobs via newspapers and other resources rather than  doing it online and employers do the same thing. 

Beaumont, Claudine. "Hackers Steal User Details from Monster.com Jobs Website - Telegraph."Telegraph.co.uk: News, Business, Sport, the Daily Telegraph Newspaper, Sunday Telegraph - Telegraph. 28 Jan. 2009. Web. 11 Aug. 2010. .