-
+8 +1
The Mob's IT Department
How two tech consultants fell into one of Europe's biggest drug-smuggling operations
-
+34 +2
How Hackers Could Get Out of House Arrests
A security researchers find flaws in an anklet used to track people under house arrest.
-
+20 +1
Nine Charged in Insider Trading Case Tied to Hackers
It was a symbiotic relationship that brought together the underbelly of Wall Street and the dark reaches of the online world. From their suburban homes in the United States, dozens of rogue stock traders would send overseas hackers a shopping list of corporate news releases they wanted to get a sneak peek at before they were made public. The hackers, working from Ukraine, would then deliver how-to videos by email with instructions for gaining access to the pilfered earnings releases.
-
+29 +2
Hollywood Finally Gets Hacking Right with Mr. Robot
A few weeks ago I started hearing about a new show on the USA network, Mr. Robot. The synopsis for the show was “Mr. Robot is a psychological thriller that follows a young programmer who works as a cyber-security engineer by day and a vigilante hacker by night.” Yeah, that sounds like another Hollywood crapfest. Cue crazy GUIs and virtual reality flybys representing hacking scenes. After watching the pilot though, I realized I couldn’t have been more wrong.
-
+17 +1
Apple Confirms Discovery of Malicious Code in Some App Store Products
Apple confirmed on Sunday that a tool used by software developers for the company’s devices was copied and modified by hackers to put bad code into apps available on the App Store. So far about 40 apps with malicious code, or malware, have made it into the App Store, said researchers at Palo Alto Networks, an online security company that is investigating the incident.
-
+49 +1
Target stores attacked by pornographic pranksters
Pornographic audio has been blaring out at Target stores across California. A weak system is to blame.
-
+40 +1
It Is Now Legal to Hack a Smart TV
Earlier this year, we covered the odd saga of Samsung's Internet-connected SmartTV, whose privacy policy raised concern that hackers might attempt to activate built-in microphones and cameras to spy on viewers. At the time, the Software Freedom Conservancy looked to take advantage of a triennial review conducted by the U.S. Copyright Office. Every three years, this government office hears petitions to exempt certain hacking...
-
+25 +1
The Man Accused of Masterminding the Hacks That Shook Wall Street
Gery Shalon -- a 31-year-old from the Republic of Georgia lies at the head of a global, digital crime syndicate.
-
+17 +1
Even the LastPass Will be Stolen Deal with It!
I am back from Amsterdam after presenting our research at Blackhat “Even the LastPass Will be Stolen, Deal with It!” together with Alberto Garcia. We had a blast at the conference and we got great feedback from the audience. Many asked for the video, slides, etc. so I though it is worth writing a post with all the details of our talk...
-
+53 +1
The Anonymous "war on ISIS" is already falling apart
When a video first arrived announcing an Anonymous campaign against ISIS, many were skeptical. Coming in the wake of ISIS attacks on Paris, the #OpIsis campaign offered online activists an easy way to fight back against a frightening and genuinely evil group, all without closing their laptops. As the campaign picked up steam, many complained the Anonymous efforts would actually harm the fight against ISIS, muddying intelligence sources and flooding traditional channels with...
-
+23 +1
Hackers can hijack Wi-Fi Hello Barbie to spy on your children
Mattel’s latest Wi-Fi enabled Barbie doll can easily be hacked to turn it into a surveillance device for spying on children and listening into conversations without the owner’s knowledge. The Hello Barbie doll is billed as the world’s first “interactive doll” capable of listening to a child and responding via voice, in a similar way to Apple’s Siri, Google’s Now and Microsoft’s Cortana.
-
+38 +1
This Is What Anonymous' War Against ISIS Really Looks Like — From the Hackers Themselves
Anonymous was running its anti-ISIS game the same way it had been for months: finding jihadists online, hitting their websites with attacks and getting their accounts taken down. Then, in June, the hacktivist group stumbled on something dark, volatile and unexpected. By tracking and geolocating a small group of jihadists it had been keeping tabs on, Anonymous determined ISIS was planning a mass killing in Tunisia — a July 4 copycat of an attack that...
-
+37 +1
When Ethical Hacking Can't Compete
The cybersecurity expert Chris Rock is an unconventional killer. At this year's Defcon hacking conference—one of the largest conferences of its kind, attracting more than 6,000 hackers and security experts from around the globe—the Australian information-security researcher demonstrated how to manipulate online death-certification systems in order to declare a living person legally dead. Potential motivations for hackers, he explained...
-
+41 +1
Islamic State Twitter accounts have been traced back to a surprising source
Hackers have claimed that a number of Islamic State supporters' social media accounts are being run from internet addresses linked to the Department of Work and Pensions. A group of four young computer experts who call themselves VandaSec have unearthed evidence indicating that at least three ISIS-supporting accounts can be traced back to the DWP.
-
+36 +1
Hackers Threaten Xbox Live, PSN DDoS on Christmas (Again)
Remember last year, when hackers known as Lizard Squad took Xbox Live and the PlayStation Network offline on Christmas Day, leaving your brand-new Xbox One or PlayStation 4 largely inoperable? It might happen again. A new group calling itself Phantom Squad is threatening to do the exact same thing this year. In a now-deleted tweet, the group pledged to "shut down Xbox live and PSN this year on christmas [and] keep them down for one straight week."
-
+40 +1
NSA Helped British Spies Find Security Holes In Juniper Firewalls
GCHQ acquired the capability to target 13 different models and, with NSA help, exploited several networks in one year. A TOP-SECRET document dated February 2011 reveals that British spy agency GCHQ, with the knowledge and apparent cooperation of the NSA, acquired the capability to covertly exploit security vulnerabilities in 13 different models of firewalls made by Juniper Networks, a leading provider of networking and Internet security gear.
-
+11 +1
Russia Suspected in First-Ever Cyberattack on Ukraine’s Power Grid
If Ukraine's grid was intentionally sabotaged, it could be classified as an act of war
-
+35 +1
‘Trident is old technology’: the brave new world of cyber warfare
Forget debates about Britain’s nuclear deterrent. New technology means a country can be brought to its knees with the click of a mouse. The naval base at La Spezia in northern Italy is in an advanced state of decay. The grand Mussolini-era barracks are shuttered; the weeds won their battle with the concrete some time ago. But amid the crumbling masonry, there is an incongruously neat little building, shaded behind a line of flags, with smartly outfitted security...
-
+47 +1
JOHN MCAFEE: The NSA's back door has given every US secret to our enemies
Deng Xiaoping, in 1979 - his second year as supreme leader of China - perceived a fundamental truth that has yet to be fully grasped by most Western leaders: Software, if properly weaponized, could be far more destructive than any nuclear arsenal. Under Deng’s leadership, China began one of the most ambitious and sophisticated meta- software development programs ever undertaken.
-
+37 +1
Hackers did indeed cause Ukrainian power outage, US report concludes
A December outage in Ukraine that caused 225,000 customers to lose electricity was the work of hackers, a report prepared by US Department of Homeland Security officials has determined. The report published Thursday by the DHS Industrial Control Systems Cyber Emergency Response Team largely agrees with analysis provided last month by a member of the SANS industrial control systems team—that the December 23 outage was caused by external hackers.
Submit a link
Start a discussion