Cryptome has published an PDF file that includes a chat history taken in 2012 of the Anonymous "Topiary" Jake.
The PDF has been released on the 19th of March 2013 and can be found here.
In the PDF file you can read how Topiary discusses multiples topics from the activist Barret Brown to Soccer and slaying zombies.
Twitter users with SMS enabled are vulnerable to an attack that allows anyone to post to their account. The attacker only needs knowledge of the mobile number associated with a target’s Twitter account. Messages can then be sent to Twitter with the source number spoofed.
Like email, the originating address of a SMS cannot be trusted. Many SMS gateways allow the originating address of a message to be set to an arbitrary identifier, including someone else’s number.
In Russia most of the cell phone SIM cards are prepaid cards. One of the Russian operators offers a legal service that allows SIM prepaid users to transfer the prepaid money to a bank account.
This particular service is misused by cyber criminals. Cybercriminals are using the service to obtain money. Denis Maslennikov has provided a podcast about cell phone money laundering.
3 popular types of cell phones replenishing
HAVANA, Oct. 3 (Xinhua) -- Cuba accused on Monday the United States of "preparing a spam SMS cyberwar" with the Caribbean island nation to disrupt SMS service to over 1 million Cuban mobile phone users, said the country's official website Cubadebate in an article.
"The U.S. government hired a telecommunication company from Maryland to design a computer system capable of sending 24,000 text messages weekly to the mobile phone users in Cuba," said Cubadebate.
One of the more common methods of spreading malware on the Internet is through social engineering. Most malicious activity is often successful because users are deceived into believing it is legitimate. Exploitation by social engineering is extremely lucrative and will likely significantly increase in the mobile market.
Phishing is the criminal act of attempting to manipulate a victim into providing sensitive information by masquerading as a trustworthy entity. This technique is a well-established, significant cyber threat, and mobile devices provide unique opportunities for phishing, including variants such as vishing and smishing.
Vishing is the social engineering approach that leverages voice communication. This technique can be combined with other forms of social engineering that entice a victim to call a certain number and divulge sensitive information. Advanced vishing attacks can take place completely over voice communications by exploiting Voice over Internet Protocol (VoIP) solutions and broadcasting services.VoIP easily allows caller identity (ID) to be spoofed, which can take advantage of the public’s misplaced trust in the security of phone services, especially landline services. Landline communication cannot be intercepted without physical access to the line; however, this trait is not beneficial when communicating directly with a malicious actor.