-
+30 +1
If you can turn a vacuum into an improvised weapon, DARPA may want your help
New "Improv" program will look at how commercial tech can be used against military.
-
+34 +1
Go Ahead, Hackers. Break My Heart
MY LIFE DEPENDS on the functioning of a medical device: a pacemaker that generates each and every beat of my heart. I know how it feels to have my body controlled by a machine that is not working correctly, and this is why I encourage fellow security researchers to delve into these medical devices and find ways to make them more secure. Four years ago, I woke up lying on the floor, but I had no idea how I’d gotten there or for how long I’d been out.
-
+32 +1
FBI, NHTSA warn about car hacking
The FBI and the National Highway Traffic Safety Administration are jointly warning that modern cars are vulnerable to hacking. That may come as no surprise to those who have followed news reports about the possibility, but it does show the level of attention coming to the issue from the nation's top federal law-enforcement agency. The FBI's "public service announcement," issued Thursday, cites recent demonstrations in which...
-
+8 +1
Wireless mice outed as 'security' loophole
Hackers could gain access to home and corporate networks via security flaws in wireless mice, suggests research. Weaknesses in the way mice swapped data with computers left them vulnerable, said security firm Bastille Networks. Attackers could spoof poorly protected signals letting them use PCs as if they were sitting in front of them, it said. Information about the loopholes have been passed to the makers of vulnerable mice...
-
+26 +1
Former Reuters Journalist Matthew Keys Sentenced to Two Years for Hacking
On Wednesday, the former Reuters journalist Matthew Keys was sentenced to two years in prison for computer hacking. Keys, who once worked for Tribune Company-owned Sacramento television station Fox 40, left that job in 2010 and went on to copy and paste login credentials for the Tribune Company’s content management system (CMS) into a chatroom where members of the hacking collective Anonymous planned out their operations. (Keys still denies all allegations.)
-
+27 +1
Exploiting Ammyy Admin, or Revenge hack on Microsoft Support Tech Scammers
For the past few years, a number of groups of scammers have been cold-calling thousands if not millions of people in what's been referred to as the "Ammyy Scam" or the "Microsoft Tech Support Scam" among other names. The scammers pretend to be from Microsoft or another official group and claim to have detected errors on the users' computers. They have the victims pull up internal logs that show errors, and convince them to download and run the Ammyy Admin software to allow them to remotely...
-
+24 +1
The Ukrainian Hacker Who Became the FBI’s Best Weapon—And Worst Nightmare
Hacker Maksym Popov gave himself up to the FBI and joined its fight against Eastern European cybercrime. Trouble is, he never really gave up his black hat. One Thursday in January 2001, Maksym Igor Popov, a 20-year-old Ukrainian man, walked nervously through the doors of the United States embassy in London. While Popov could have been mistaken for an exchange student applying for a visa, in truth he was a hacker, part of an Eastern European...
-
+34 +1
For $20M, These Israeli Hackers Will Spy On Any Phone On The Planet
With just a few million dollars and a phone number, you can snoop on any call or text that phone makes – no matter where you are or where the device is located. That’s the bold claim of Israel’s Ability Inc, which offers its set of bleeding-edge spy tools to governments the world over. And it’s plotting to flog its kit to American cops in the coming months.
-
+18 +1
The Chinese Hackers in the Back Office
Drive past the dairy farms, cornfields and horse pastures here and you will eventually arrive at Cate Machine & Welding, a small-town business run by Gene and Lori Cate and their sons. For 46 years, the Cates have welded many things — fertilizer tanks, jet-fighter parts, cheese molds, even a farmer’s broken glasses. And like many small businesses, they have a dusty old computer humming away in the back office. On this one, however, an unusual spy-versus-spy battle is playing out: The machine has been taken over by Chinese hackers.
-
+16 +1
$100,000 Prize if You Can Find This Secret Command in DOS
There have long been rumors that Microsoft copied CP/M to create MS-DOS for the IBM PC. Consultant Bob Zeidman in 2012 used forensic software tools to analyze the code for IEEE Spectrum, and found no evidence of copying, as he reported in Did Bill Gates Steal the Heart of DOS? Since he did that analysis, Microsoft donated previously unavailable source code for MS-DOS to the Computer History Museum. (Zeidman did his original analysis using QDOS.).
-
+15 +1
NSA website recovers from outage amid intrigue
A nearly daylong outage that ended Tuesday came amid much speculation about an alleged theft of the agency's cyber tools.
-
+16 +1
FBI says foreign hackers penetrated state election systems
The FBI has uncovered evidence that foreign hackers penetrated two state election databases in recent weeks, prompting the bureau to warn election officials across the country to take new steps to enhance the security of their computer systems, according to federal and state law enforcement officials.
-
+40 +1
Why a Hacker Who Exposed Rapists Faces More Jail Than the Rapists
A hacker who uncovered evidence that two men who sexually assaulted and photographed an unconscious 16-year-old girl in Steubenville, Ohio, two years ago could spend more than a decade longer in jail than the rapists he helped expose and convict, thanks to an outdated cybersecurity law. Deric Lostutter, 29, could spend a maximum of 16 years behind bars for his alleged role in a hack of a high school football fan website that led to the discovery of tweets and Instagram photos documenting the 2012 sexual assault of a young girl at a party.
-
+5 +1
US-CERT: Stop using your remotely exploitable Netgear routers
A flaw in Netgear routers is 'trivial' to remotely exploit -- R7000, R8000 and R6400 -- maybe more. US-CERT advised discontinuing use unless Netgear issues a fix. There's a way to test if your router is vulnerable and an unofficial temporary fix.
-
+38 +1
Russian Hackers 'Threaten Germany 2017 Election', MPs Warn
German politicians say Russia could use hackers and others to undermine the German elections.
-
+35 +1
Alarm Bells about Moscow's Meddling have been Ringing in Europe for Months
To view the cyberattacks on Hillary Clinton's presidential election campaign as a unique offence — as many Americans seem to do — is to miss the full picture.
-
+20 +1
Hacker who stole celebrity naked pictures sentenced
An Illinois man was sentenced to nine months in federal prison on Tuesday for breaking into the email and online storage of celebrities to obtain their private photos and videos, according to the US Attorney's office. Edward Majerczyk, 29, who pleaded guilty to felony computer hacking charges last year, will begin serving his sentence on 27 February, said Joseph Fitzpatrick, a spokesman for Zach Fardon, US Attorney for the Northern District of Illinois.
-
+25 +1
If Trump hates leaks, he needs to give up his phone
My favourite image of the week was a picture of the Queen opening the National Cyber Security Centre in London. Her Majesty is looking bemusedly at a large display while a member of staff explains how hackers could target the nation’s electricity supply. The job of the centre’s director, Ciaran Martin, is to protect the nation from such dangers. It’s a heavy responsibility, but at least he doesn’t have to worry that his head of state is a cybersecurity liability.
-
+1 +1
Looking for the fastest threat investigation solution? Found it!
Security Operations Center (SOC) teams want faster, more intuitive search and investigation built on their security operations (SecOps) platforms. We've heard this time and time again. We've listened, and are pleased to announce the launch of HPE Security ArcSight Investigate Early Access Program. ...
-
+1 +1
Indiana Officials Expose Evidence of Electoral Hacking by the DHS | We Are Change
Article Via: The Daily Sheeple According to a report published by the Daily Caller News Foundation Investigative Group, the Department of Homeland Security
Submit a link
Start a discussion