-
+19 +1
Obama’s Feds Tried to Hack Indiana’s Election System While Pence Was Governor
Department of Homeland Security (DHS) officials tried to hack Indiana’s state electoral system with at least 14,800 “scans” or hits between Nov. 1, 2016, to Dec. 16, 2016.
-
+13 +1
Vigilante who conspired to hack local football website sentenced to 2 years
Deric Lostutter, a self-styled online vigilante who went by the handle "KYAnonymous," has been sentenced to two years in federal prison Wednesday for his role in hacking a local high school football team website more than four years ago. Lostutter initially denied his involvement. But in November 2016, he reversed himself and took a plea agreement in exchange for the prosecution dropping two of the four counts, including the hacking charge under the Computer Fraud and Abuse Act. (The other two counts—conspiracy and making false statements—remained.)
-
+1 +1
A 22 year old Canadian arrested over massive Russian hack of 500 million Yahoo accounts
A 22-year-old Canadian man is one of four men arrested in connection with the theft of 500 million Yahoo user accounts in early 2014. Karim Baratov, a dual national of Kazakhstan and Canada, is accused of being a hacker-for-hire contracted by two members of the Russian intelligence agency FSB, according to a release from the U.S. Department of Justice. Baratov and the three other men – two Russian spies and a hacker on the FBI’s most wanted cyber criminals list – are facing charges of criminal espionage...
-
+33 +1
U.S. sweeping up Russian hackers in a broad global dragnet
The arrests caught the Russian hackers totally by surprise. One was at a Finnish border crossing. Another was arriving at an airport in Spain. A third was dining at a restaurant in Prague. Still others were at luxury resorts in the Maldives and Thailand. Many have now turned up in U.S. courts. The long arm of U.S. law enforcement is spanning the globe like never before to bring criminal hackers to justice.
-
+2 +1
Government secretly planning to spy on thousands of people's phones, leaked document reveals
The UK government is secretly planning to force technology companies to build backdoors into their products, to enable intelligence agencies to read people’s private messages. A draft document leaked by the Open Rights Group details extreme new surveillance proposals, which would enable government agencies to spy on one in 10,000 citizens – around 6,500 people – at any one time.
-
+6 +1
US watched Russia hack French systems during election
The United States watched Russians hack France’s computer networks during the election and tipped off French officials before it became public, a U.S. cyber official told the Senate on Tuesday. France’s election campaign commission said Saturday that “a significant amount of data” — and some information that was likely fake — was leaked on social networks following a hacking attack on centrist Emmanuel Macron’s successful presidential campaign. France’s government cybersecurity agency is investigating what a government official described as a “very serious” breach.
-
+15 +1
WannaCry ransomware has links to North Korea, cybersecurity experts say
Two top security firms have found evidence linking the WannaCry ransomware to the prolific North Korean cybergang known as Lazarus Group. What is WannaCry ransomware and why is it attacking global computers? Kaspersky and Symantec both said on Monday that technical details within an early version of the WannaCry code are similar to code used in a 2015 backdoor created by the government-linked North Korean hackers, who were implicated in the 2014 attack on Sony Pictures...
-
+16 +1
Russia struck at election systems and data of 39 US states
Citing sources "with direct knowledge of the US investigation" into Russia's information operations campaign during the 2016 US presidential election campaign, Bloomberg News' Michael Riley and Jordan Robertson report that Russian hackers struck at far more states' election offices than previously known. A total of 39 states had election systems targeted by the Russians, Bloomberg's sources said—including Illinois, where attackers broke into voter rolls and tried to delete or modify voter registration data in an attempt to disrupt voting on Election Day.
-
+13 +1
The Floppotron: Harder, Better, Faster, Stronger
Daft Punk - Harder, Better, Faster, Stronger cover by computer hardware orchestra.
-
+1 +1
‘I don’t believe in coincidence’
THE collision of a second US warship this year points to the possibility of cyber espionage, an expert has warned. The US Navy ordered an investigation Monday into its entire 7th Fleet, based in the Pacific, after the USS John S McCain was involved in a run-in with an oil tanker near Singapore. The incident left a gaping hole in the destroyer’s hull, injured five sailors and left 10 sailors still missing.
-
+5 +1
Three Equifax Managers Sold Stock Before Cyber Hack Revealed
Three Equifax Inc. senior executives sold shares worth almost $1.8 million in the days after the company discovered a security breach that may have compromised information on about 143 million U.S. consumers. The trio had not yet been informed of the incident, the company said. The credit-reporting service said late Thursday in a statement that it discovered the intrusion on July 29. Regulatory filings show that three days later...
-
+14 +1
Ghost in the cell
How an inmate hacker hid computers in the ceiling and turned his prison upside down. By Colin Lecher.
-
+26 +1
Genetically Engineering Yourself Sounds Like A Horrible Idea, But This Guy Is Doing It Anyway
“’The interesting thing is, if it works, will it last?’ Zayner told me, a GoPro strapped to his head and a Hell or High Watermelon beer on the table as he filled a pipette with the DNA mixture to spread over his skin…” By Kristen V. Brown.
-
+19 +1
Early Hackers Used Whistles From Cap’n Crunch Cereal Boxes
Cereal companies have long used box prizes as an inducement for children to nag parents into buying sugary breakfast food. From movie tie-in toys to video games on CD-ROM (remember Chex Quest?), cereal box baubles tend to be momentarily thrilling and then quickly forgotten. Except when they’re used for hacking.
-
+11 +1
South Korean Overwatch hacker handed suspended prison sentence
An Overwatch hack creator in South Korea could face jail time after violating the Game Industry Promotion Law and Information and Communication Technology Protection Law. A 28-year old man was handed a suspended one-year prison sentence and two year's probation, according to South Korean news broadcaster SBS News. The hacker reportedly collected a large sum of money in exchange for the program—200 million won, or around $180,000, SBS News said.
-
+4 +1
How they did it (and will likely try again): GRU hackers vs. US elections
Latest Mueller indictment offers excruciating details to confirm known election pwnage.
-
+38 +1
The $250 Biohack That’s Revolutionizing Life With Diabetes
DIYers used a security flaw to bypass the $8.3 billion insulin delivery business with a cobbled-together artificial pancreas. By Naomi Kresge, Michelle Cortez.
-
+20 +1
'Staggering flaws' in US voting machines
Voting machines pose "serious risks" to US security, hackers are warning. A report outlines major flaws in voting hardware, weeks before US mid-term elections. One ballot machine, used in 23 US states, carries a cybersecurity flaw that was reported over a decade ago, the hackers claim. An expert warned that lessons would need to be learned if the UK adopts electronic voting systems.
-
+19 +1
North Korean hacking group accused of trying to steal US$1.1 billion
A North Korean hacking group focused on financial gain for the rogue state has penetrated banks around the world with a series of ongoing attacks, and has tried to steal at least US$1.1 billion over the last four years, according to a new tally by cybersecurity firm FireEye Inc.
-
+3 +1
How to Get Emergency Power From a [U.S.] Phone Line
How to Get Emergency Power From a Phone Line: What do you do if the power is out and you need to charge your cell phone to make an emergency phone call? Don’t worry. There are plenty of potential power sources all around you. One of them is the phone line. In this instructable, I am going to ...
Submit a link
Start a discussion