Sunday, October 20, 2019

We asked a hacker to try and steal a CNN tech reporter's data. Here's what happened - CNN

Publisher: CNN
Date: 2019-10-18T12:52:19Z
Author: Story by Donie O CNN Business Video by Samantha Guff John General and Richa Naik
Reference: (Read more) Visit Source



In case you are keeping track:

DNC Hackers Resurface, Zuckerberg Talks Free Speech, and More News | WIRED

A dangerous hacker group resurfaced, Mark Zuckerberg delivered a long-winded defense of Facebook, and Volvo is going green! 12:02 DYNAMO REPLIES TO NHR HUNTER | HYDRA DYNAMO NHRHUNTER CONTROVERSY | DYNAMO PLAYING WITH HACKERS ? YouTube!! Here's the news you need to know, in two minutes or less.

* * *

A band of Kremlin hackers involved in the 2016 hack of the Democratic National Committee has resurfaced. Researchers revealed today that the group has been involved in a years-long espionage campaign , penetrating the networks of at least three targets: The ministries of foreign affairs at two Eastern European countries and one European Union nation, including the network of that EU country's Washington, DC embassy. "They rebuilt their arsenal," says researcher Matthieu Faou. "They never stopped their espionage activity."

Facebook CEO Mark Zuckerberg delivered a speech today at Gaston Hall auditorium at Georgetown University—which has hosted the likes of Bill Clinton, Barack Obama, and Bono—to declare himself a champion of free speech! We asked a hacker to try and steal a CNN tech reporter's ...www.cnn.com ...hack /index.html I thought my social media posts merely betrayed my desperate need for attention and likes. It turns out, though, that they're also a goldmine for hackers .!! He spoke for nearly 40 minutes, and while he didn't announce any new initiatives, he covered everything from conservative bias to Facebook's reputation in the world .

Publisher: Wired
Author: Condé Nast
Twitter: @wired
Reference: (Read more) Visit Source



Name A Hacker Camp | Hackaday

Many of us look forward to visiting a summer hacker camp, as an opportunity to immerse ourselves in some of the coolest and most stimulating stuff that comes out of our community! We asked a hacker to try and steal a CNN tech reporter's ...www.stltoday.com /business/ ...-cnn/article_f62...We asked a hacker to try and steal a CNN tech reporter's data. Here's what happened Story by Donie O'Sullivan, CNN Business Video by Samantha Guff, John General, and Richa Naik!! The names trip off the tongue, ToorCamp, CCCamp, EMFcamp, BornHack, and more.

There’s one major event that doesn’t trip off the tongue in the same way though, because though it’s one of the oldest in our calendar it doesn’t have the same name every time. Since the end of the 1980s the Netherlands has seen a sequence of hacker camps with three letter names such as HAR, OHM, and SHA. Every four years these events delight and amaze us, and every four years they need a new name. Do you think you can help them pick one for 2021 ?

There are a few ground rules to observe, for the would-be coiner of a new moniker. The tradition is of a three-letter acronym, usually one with a meaning somewhere in technology, and so far always containing the letter H somewhere to stand for “Hack” in some form. The idea is that it should somehow encapsulate the spirit of hacker camp culture rather than simply be three words containing “Hack”. HAR for example was Hacking At Random, OHM was Observe Hack Make, and SHA was Still Hacking Anyway! We asked a hacker to try and steal a CNN tech reporter's ...www.youtube.com ...We asked a hacker to try and steal a CNN tech reporter's data. She got it in seconds - YouTube CNN tech reporter Donie O'Sullivan thought he was being safe on social media. Watch social engineer &...!! So if you can dream up a TLA within those parameters, there is a group of hackers in the Netherlands who might like to hear from you. We suspect that HAD is already taken.

Publisher: Hackaday
Date: 2019-10-20T02:00:00+00:00
Reference: (Read more) Visit Source



Facebook Sweetens Deal for Hackers to Catch Security Bugs | WIRED

Last year, the company began paying bounties for certain bugs researchers might find in third-party services that integrate with Facebook! We asked a hacker to try and steal a CNN tech reporter s ...We asked a hacker to try and steal a CNN tech reporter s data. Here s what happened. I share, therefore I am. Read on the original site. Related news. World s largest brewer says rival tried to steal its secret recipe - cnn.com. I slept on a mail-order mattress for two weeks. Here s what happened, and how to get 30% off - CNET!! It will now expand the types of bugs that are eligible, and even pay out for bugs that have also been directly submitted to another developer's own bug bounty. Essentially, Facebook is willing to reward bugs that impact its platform even if a researcher has already gotten another payout elsewhere for finding it. The company is also adding bonuses from $1,000 to $15,000 if researchers find bugs in the fundamental code of its native products—like Messenger, Oculus, Portal, or WhatsApp—and then also submit additional materials, like showing how the bugs could actually be exploited in the wild. Before now, there wasn't a specifically codified bonus structure if you went above and beyond in a submission, a practice Facebook wants to encourage.

Publisher: Wired
Author: Condé Nast
Twitter: @wired
Reference: (Read more) Visit Source



Not to change the topic here:

Russia's Cozy Bear Hackers Resurface With Clever New Tricks | WIRED

The researchers found that the spying campaign extend both years before the DNC hack and years after—until as recently as June of this year—and used an entirely new collection of malware tools, some of which deployed novel tricks to avoid detection. "They rebuilt their arsenal," says ESET researcher Matthieu Faou, who presented the new findings earlier this week at ESET's research conference in Bratislava, Slovakia. "They never stopped their espionage activity."

In fact, one of the intrusions that included MiniDuke began in 2013, before the malware had been publicly identified—a strong indicator that the Dukes perpetrated the breach rather than someone else who picked up the malware from another source.

The Dukes' RegDuke implant uses a different obfuscation trick, planting a fileless back door in a target computer's memory. That back door then communicates to a Dropbox account used as its command-and-control, hiding its messages using a steganography technique that invisibly alters pixels in images like the ones shown below to embed secret information.

Publisher: Wired
Author: Condé Nast
Twitter: @wired
Reference: (Read more) Visit Source



Chinese Hacking: The Plane Made from Stolen Tech?—Cyber Saturday | Fortune
Publisher: Fortune
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment

Popular Posts