LOUNGE all new asksnapzu ideasforsnapzu newtribes interesting pics videos funny technology science technews gaming health history worldnews business web research entertainment food living internet socialmedia mobile space sports photography nature animals movies culture travel television finance music celebrities gadgets environment usa crime politics law money justice psychology security cars wtf art google books lifetips bigbrother women apple kids recipes whoa military privacy education facebook medicine computing wildlife design war drugs middleeast diet toplists economy fail violence humor africa microsoft parenting dogs canada neuroscience architecture religion advertising infographics sex journalism disaster software aviation relationships energy booze life japan ukraine newmovies nsa cannabis name Name of the tribe humanrights nasa cute weather gifs discoveries cops futurism football earth dataviz pets guns entrepreneurship fitness android extremeweather fashion insects india northamerica
Submit a link
Start a discussion
  • Current Event
    1 month ago
    by doodlegirl
    +20 +1

    'Staggering flaws' in US voting machines

    Voting machines pose "serious risks" to US security, hackers are warning. A report outlines major flaws in voting hardware, weeks before US mid-term elections. One ballot machine, used in 23 US states, carries a cybersecurity flaw that was reported over a decade ago, the hackers claim. An expert warned that lessons would need to be learned if the UK adopts electronic voting systems.

  • Current Event
    1 month ago
    by socialiguana
    +19 +1

    North Korean hacking group accused of trying to steal US$1.1 billion

    A North Korean hacking group focused on financial gain for the rogue state has penetrated banks around the world with a series of ongoing attacks, and has tried to steal at least US$1.1 billion over the last four years, according to a new tally by cybersecurity firm FireEye Inc.

  • Analysis
    3 years ago
    by ressmox
    +8 +1

    The Mob's IT Department

    How two tech consultants fell into one of Europe's biggest drug-smuggling operations

  • Analysis
    3 years ago
    by canuck
    +34 +2

    How Hackers Could Get Out of House Arrests

    A security researchers find flaws in an anklet used to track people under house arrest.

  • Current Event
    3 years ago
    by rhingo
    +20 +1

    Nine Charged in Insider Trading Case Tied to Hackers

    It was a symbiotic relationship that brought together the underbelly of Wall Street and the dark reaches of the online world. From their suburban homes in the United States, dozens of rogue stock traders would send overseas hackers a shopping list of corporate news releases they wanted to get a sneak peek at before they were made public. The hackers, working from Ukraine, would then deliver how-to videos by email with instructions for gaining access to the pilfered earnings releases.

  • Current Event
    3 years ago
    by powpow
    +29 +2

    Hollywood Finally Gets Hacking Right with Mr. Robot

    A few weeks ago I started hearing about a new show on the USA network, Mr. Robot. The synopsis for the show was “Mr. Robot is a psychological thriller that follows a young programmer who works as a cyber-security engineer by day and a vigilante hacker by night.” Yeah, that sounds like another Hollywood crapfest. Cue crazy GUIs and virtual reality flybys representing hacking scenes. After watching the pilot though, I realized I couldn’t have been more wrong.

  • Current Event
    3 years ago
    by Cobbydaler
    +17 +1

    Apple Confirms Discovery of Malicious Code in Some App Store Products

    Apple confirmed on Sunday that a tool used by software developers for the company’s devices was copied and modified by hackers to put bad code into apps available on the App Store. So far about 40 apps with malicious code, or malware, have made it into the App Store, said researchers at Palo Alto Networks, an online security company that is investigating the incident.

  • Current Event
    3 years ago
    by Cobbydaler
    +49 +1

    Target stores attacked by pornographic pranksters

    Pornographic audio has been blaring out at Target stores across California. A weak system is to blame.

  • Analysis
    3 years ago
    by aj0690
    +40 +1

    It Is Now Legal to Hack a Smart TV

    Earlier this year, we covered the odd saga of Samsung's Internet-connected SmartTV, whose privacy policy raised concern that hackers might attempt to activate built-in microphones and cameras to spy on viewers. At the time, the Software Freedom Conservancy looked to take advantage of a triennial review conducted by the U.S. Copyright Office. Every three years, this government office hears petitions to exempt certain hacking...

  • Current Event
    3 years ago
    by ressmox
    +25 +1

    The Man Accused of Masterminding the Hacks That Shook Wall Street

    Gery Shalon -- a 31-year-old from the Republic of Georgia lies at the head of a global, digital crime syndicate.

  • Analysis
    3 years ago
    by Project2501
    +17 +1

    Even the LastPass Will be Stolen Deal with It!

    I am back from Amsterdam after presenting our research at Blackhat “Even the LastPass Will be Stolen, Deal with It!” together with Alberto Garcia. We had a blast at the conference and we got great feedback from the audience. Many asked for the video, slides, etc. so I though it is worth writing a post with all the details of our talk...

  • Expression
    2 years ago
    by aj0690
    +53 +1

    The Anonymous "war on ISIS" is already falling apart

    When a video first arrived announcing an Anonymous campaign against ISIS, many were skeptical. Coming in the wake of ISIS attacks on Paris, the #OpIsis campaign offered online activists an easy way to fight back against a frightening and genuinely evil group, all without closing their laptops. As the campaign picked up steam, many complained the Anonymous efforts would actually harm the fight against ISIS, muddying intelligence sources and flooding traditional channels with...

  • Current Event
    2 years ago
    by Chubros
    +23 +1

    Hackers can hijack Wi-Fi Hello Barbie to spy on your children

    Mattel’s latest Wi-Fi enabled Barbie doll can easily be hacked to turn it into a surveillance device for spying on children and listening into conversations without the owner’s knowledge. The Hello Barbie doll is billed as the world’s first “interactive doll” capable of listening to a child and responding via voice, in a similar way to Apple’s Siri, Google’s Now and Microsoft’s Cortana.

  • Current Event
    2 years ago
    by geoleo
    +38 +1

    This Is What Anonymous' War Against ISIS Really Looks Like — From the Hackers Themselves 

    Anonymous was running its anti-ISIS game the same way it had been for months: finding jihadists online, hitting their websites with attacks and getting their accounts taken down. Then, in June, the hacktivist group stumbled on something dark, volatile and unexpected. By tracking and geolocating a small group of jihadists it had been keeping tabs on, Anonymous determined ISIS was planning a mass killing in Tunisia — a July 4 copycat of an attack that...

  • Expression
    2 years ago
    by ubthejudge
    +37 +1

    When Ethical Hacking Can't Compete

    The cybersecurity expert Chris Rock is an unconventional killer. At this year's Defcon hacking conference—one of the largest conferences of its kind, attracting more than 6,000 hackers and security experts from around the globe—the Australian information-security researcher demonstrated how to manipulate online death-certification systems in order to declare a living person legally dead. Potential motivations for hackers, he explained...

  • Current Event
    2 years ago
    by tyronne
    +41 +1

    Islamic State Twitter accounts have been traced back to a surprising source

    Hackers have claimed that a number of Islamic State supporters' social media accounts are being run from internet addresses linked to the Department of Work and Pensions. A group of four young computer experts who call themselves VandaSec have unearthed evidence indicating that at least three ISIS-supporting accounts can be traced back to the DWP.

  • Current Event
    2 years ago
    by belangermira
    +36 +1

    Hackers Threaten Xbox Live, PSN DDoS on Christmas (Again)

    Remember last year, when hackers known as Lizard Squad took Xbox Live and the PlayStation Network offline on Christmas Day, leaving your brand-new Xbox One or PlayStation 4 largely inoperable? It might happen again. A new group calling itself Phantom Squad is threatening to do the exact same thing this year. In a now-deleted tweet, the group pledged to "shut down Xbox live and PSN this year on christmas [and] keep them down for one straight week."

  • Current Event
    2 years ago
    by 8mm
    +40 +1

    NSA Helped British Spies Find Security Holes In Juniper Firewalls

    GCHQ acquired the capability to target 13 different models and, with NSA help, exploited several networks in one year. A TOP-SECRET document dated February 2011 reveals that British spy agency GCHQ, with the knowledge and apparent cooperation of the NSA, acquired the capability to covertly exploit security vulnerabilities in 13 different models of firewalls made by Juniper Networks, a leading provider of networking and Internet security gear.

  • Expression
    2 years ago
    by jcscher
    +11 +1

    Russia Suspected in First-Ever Cyberattack on Ukraine’s Power Grid

    If Ukraine's grid was intentionally sabotaged, it could be classified as an act of war

  • Expression
    2 years ago
    by zobo
    +35 +1

    ‘Trident is old technology’: the brave new world of cyber warfare

    Forget debates about Britain’s nuclear deterrent. New technology means a country can be brought to its knees with the click of a mouse. The naval base at La Spezia in northern Italy is in an advanced state of decay. The grand Mussolini-era barracks are shuttered; the weeds won their battle with the concrete some time ago. But amid the crumbling masonry, there is an incongruously neat little building, shaded behind a line of flags, with smartly outfitted security...

  • Current Event
    2 years ago
    by manix
    +47 +1

    JOHN MCAFEE: The NSA's back door has given every US secret to our enemies

    Deng Xiaoping, in 1979 - his second year as supreme leader of China - perceived a fundamental truth that has yet to be fully grasped by most Western leaders: Software, if properly weaponized, could be far more destructive than any nuclear arsenal. Under Deng’s leadership, China began one of the most ambitious and sophisticated meta- software development programs ever undertaken.

  • Current Event
    2 years ago
    by zritic
    +37 +1

    Hackers did indeed cause Ukrainian power outage, US report concludes

    A December outage in Ukraine that caused 225,000 customers to lose electricity was the work of hackers, a report prepared by US Department of Homeland Security officials has determined. The report published Thursday by the DHS Industrial Control Systems Cyber Emergency Response Team largely agrees with analysis provided last month by a member of the SANS industrial control systems team—that the December 23 outage was caused by external hackers.

  • Current Event
    2 years ago
    by CatLady
    +30 +1

    If you can turn a vacuum into an improvised weapon, DARPA may want your help

    New "Improv" program will look at how commercial tech can be used against military.

  • Expression
    2 years ago
    by bkool
    +34 +1

    Go Ahead, Hackers. Break My Heart

    MY LIFE DEPENDS on the functioning of a medical device: a pacemaker that generates each and every beat of my heart. I know how it feels to have my body controlled by a machine that is not working correctly, and this is why I encourage fellow security researchers to delve into these medical devices and find ways to make them more secure. Four years ago, I woke up lying on the floor, but I had no idea how I’d gotten there or for how long I’d been out.

  • Current Event
    2 years ago
    by socialiguana
    +32 +1

    FBI, NHTSA warn about car hacking

    The FBI and the National Highway Traffic Safety Administration are jointly warning that modern cars are vulnerable to hacking. That may come as no surprise to those who have followed news reports about the possibility, but it does show the level of attention coming to the issue from the nation's top federal law-enforcement agency. The FBI's "public service announcement," issued Thursday, cites recent demonstrations in which...

  • Current Event
    2 years ago
    by sauce
    +8 +1

    Wireless mice outed as 'security' loophole

    Hackers could gain access to home and corporate networks via security flaws in wireless mice, suggests research. Weaknesses in the way mice swapped data with computers left them vulnerable, said security firm Bastille Networks. Attackers could spoof poorly protected signals letting them use PCs as if they were sitting in front of them, it said. Information about the loopholes have been passed to the makers of vulnerable mice...

  • Current Event
    2 years ago
    by geoleo
    +26 +1

    Former Reuters Journalist Matthew Keys Sentenced to Two Years for Hacking

    On Wednesday, the former Reuters journalist Matthew Keys was sentenced to two years in prison for computer hacking. Keys, who once worked for Tribune Company-owned Sacramento television station Fox 40, left that job in 2010 and went on to copy and paste login credentials for the Tribune Company’s content management system (CMS) into a chatroom where members of the hacking collective Anonymous planned out their operations. (Keys still denies all allegations.)

  • Current Event
    2 years ago
    by sjvn
    +27 +1

    Exploiting Ammyy Admin, or Revenge hack on Microsoft Support Tech Scammers

    For the past few years, a number of groups of scammers have been cold-calling thousands if not millions of people in what's been referred to as the "Ammyy Scam" or the "Microsoft Tech Support Scam" among other names. The scammers pretend to be from Microsoft or another official group and claim to have detected errors on the users' computers. They have the victims pull up internal logs that show errors, and convince them to download and run the Ammyy Admin software to allow them to remotely...

  • Expression
    2 years ago
    by robmonk
    +24 +1

    The Ukrainian Hacker Who Became the FBI’s Best Weapon—And Worst Nightmare

    Hacker Maksym Popov gave himself up to the FBI and joined its fight against Eastern European cybercrime. Trouble is, he never really gave up his black hat. One Thursday in January 2001, Maksym Igor Popov, a 20-year-old Ukrainian man, walked nervously through the doors of the United States embassy in London. While Popov could have been mistaken for an exchange student applying for a visa, in truth he was a hacker, part of an Eastern European...

  • Current Event
    2 years ago
    by takai
    +34 +1

    For $20M, These Israeli Hackers Will Spy On Any Phone On The Planet

    With just a few million dollars and a phone number, you can snoop on any call or text that phone makes – no matter where you are or where the device is located. That’s the bold claim of Israel’s Ability Inc, which offers its set of bleeding-edge spy tools to governments the world over. And it’s plotting to flog its kit to American cops in the coming months.

  • Expression
    2 years ago
    by grandtheftsoul
    +18 +1

    The Chinese Hackers in the Back Office

    Drive past the dairy farms, cornfields and horse pastures here and you will eventually arrive at Cate Machine & Welding, a small-town business run by Gene and Lori Cate and their sons. For 46 years, the Cates have welded many things — fertilizer tanks, jet-fighter parts, cheese molds, even a farmer’s broken glasses. And like many small businesses, they have a dusty old computer humming away in the back office. On this one, however, an unusual spy-versus-spy battle is playing out: The machine has been taken over by Chinese hackers.

  • Current Event
    2 years ago
    by zyery
    +16 +1

    $100,000 Prize if You Can Find This Secret Command in DOS

    There have long been rumors that Microsoft copied CP/M to create MS-DOS for the IBM PC. Consultant Bob Zeidman in 2012 used forensic software tools to analyze the code for IEEE Spectrum, and found no evidence of copying, as he reported in Did Bill Gates Steal the Heart of DOS? Since he did that analysis, Microsoft donated previously unavailable source code for MS-DOS to the Computer History Museum. (Zeidman did his original analysis using QDOS.).

  • Analysis
    2 years ago
    by Appaloosa
    +15 +1

    NSA website recovers from outage amid intrigue

    A nearly daylong outage that ended Tuesday came amid much speculation about an alleged theft of the agency's cyber tools.

  • Current Event
    2 years ago
    by Chubros
    +16 +1

    FBI says foreign hackers penetrated state election systems

    The FBI has uncovered evidence that foreign hackers penetrated two state election databases in recent weeks, prompting the bureau to warn election officials across the country to take new steps to enhance the security of their computer systems, according to federal and state law enforcement officials.

  • Current Event
    2 years ago
    by Petrox
    +40 +1

    Why a Hacker Who Exposed Rapists Faces More Jail Than the Rapists

    A hacker who uncovered evidence that two men who sexually assaulted and photographed an unconscious 16-year-old girl in Steubenville, Ohio, two years ago could spend more than a decade longer in jail than the rapists he helped expose and convict, thanks to an outdated cybersecurity law. Deric Lostutter, 29, could spend a maximum of 16 years behind bars for his alleged role in a hack of a high school football fan website that led to the discovery of tweets and Instagram photos documenting the 2012 sexual assault of a young girl at a party.