Feeds

Teen jailed over Paris Hilton hack

Sidekick cracker linked to LexisNexis breach

The essential guide to IT transformation

An unnamed Massachusetts teenager who hacked into the mobile phone of Paris Hilton and posted her celebrity contacts online has been sentenced to 11 months in a juvenile detention facility. The teenage tearaway, who can't be named for legal reasons, pleaded guilty to nine counts of juvenile delinquency last week before Judge Rya W. Zobel in US District Court in Boston. Judge Zobel also passed an order prohibiting the 17 year-old from owning any equipment capable of accessing the internet while behind bars or for two years of subsequent supervised release.

Along with hacking into the computer systems of mobile telco T-mobile, the teenage ne'er do well also admitted the theft of personal information and making email bomb threats high against schools in Florida and Massachusetts during a 15 month reign of terror. In January, the teen hacker exploited a security flaw in the T-mobile's web site to snatch data its customers, including Hilton, had stored online.

The 17 year-old is the youngest member of the hacking group investigators reckon is responsible for an attack on data giant LexisNexis that led to the exposure of personal details of 300,000 consumers, the Washington Post reports. This group rejoices under the moniker of the Defonic Team Screen Name Club or DFNCTSC. These links are the subject of ongoing police investigations.

The teenager carried out a dialogue with a Washington Post reporter between March and June during which they admitted responsibility over the crimes he was stood accused of last week. It remains unclear how police traced the teenage miscreant. ®

Next gen security for virtualised datacentres

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?