Thursday, November 14, 2019

The myth of the sophisticated hacker - Axios

The big picture: It's the latest lexical stretch for an adjective that's widely used in reports of cybersecurity incidents — and widely loathed by researchers as a result. If everything is sophisticated, nothing is sophisticated.

Driving the news: Labour ultimately faced what's known as a denial of service attack, a way of overwhelming servers with a ton of traffic. It's a digital blunt force attack — harmful, yes, but hardly sophisticated. Labour was not alone.

logo
Publisher: Axios
Twitter: @axios
Reference: (Read more) Visit Source



In case you are keeping track:

A YouTuber With 350,000 Subscribers Was Hacked, YouTube Verified His Hacker

My first interaction with MarcoStyle was him telling me I was wrong. I don't remember what about Ubisoft's The Division we were arguing about specifically, but I heard my name come up in his YouTube video about how I had the wrong take on some issue or another in a recent article. Probably the Dark Zone, if I had to guess.

* * *

He immediately knew what was happening. He cut power to his PC, did a fresh Windows install and changed all his login info. But it was already too late.

Publisher: Forbes
Date: 2019-11-14
Author: Paul Tassi
Twitter: @forbes
Reference: (Read more) Visit Source



Innovation Focused Firms Issue Open Call for Hackers | IndustryWeek

This is the primary goal of two recently annouced an open call for hackathons participants taking place between now and mid-December.

* * *

01 Communique Laboratory Inc. launched its quantum hackathon tackling the threat of quantum computing. Cybersecurity companies, computer science students an d hackers have begun challenging the Company's 'quantum-safe' encryption in a $100,000 hackathon.

On November 6th, the Company hosted an innovation celebration event with technology presentations from industry experts in artificial intelligence and cyber security. Andrew Cheung, 01 Communique's CEO, was one of the presenters addressing business people, students, and hackers on the threat quantum computers present with respect to keeping your data safe. He revealed the purpose behind the hackathon and why he is confident enough to offer a $100,000 prize.

Publisher: IndustryWeek
Date: 2019-11-14T19:14:23+00:00
Reference: (Read more) Visit Source



5G has security flaws that could let hackers track your location - MIT Technology Review

The news: Security researchers have identified 11 design vulnerabilities with 5G protocols that could expose a user's location, spoof emergency alerts, track phone activity (calls, texts, or web browsing), or silently disconnect the phone from the network altogether.

Time is running out: Although they still face technical and regulatory barriers, 5G networks are starting to roll out in a few major cities worldwide, offering faster speeds and (we are told) greater security for users. Plugging these security holes will be an urgent task.

Publisher: MIT Technology Review
Date: 2019-11-13T09:22:18-05:00
Twitter: @techreview
Reference: (Read more) Visit Source



Quite a lot has been going on:

Pemex Refuses to Pay Hackers

The hack, which Pemex said it detected on Sunday, forced the company to shut down less than five percent of its computers in Mexico. Reuters reports that the ransom note that appeared on Pemex computers pointed to a darknet website affiliated with DoppelPaymer - a type of ransomware.

Some payment operations have been affected, but Pemex said that fuel output, storage and inventories were operating normally.

Previous cyber attacks have been made on Nyrstar, Saudi Aramco, Rosneft  and Maersk, among others.
 

Publisher: The Maritime Executive
Date: The Maritime Executive
Reference: (Read more) Visit Source



Russia Fails to Stop Alleged Hacker From Facing US Charges | WIRED

You can read the 2016 Burkov indictment in full below. Unsealed Tuesday, it alleges that the 29-year-old former St. Petersburg resident used both CardPlanet and another online forum to commit financial fraud, and outlines how much cybercrime now resembles legitimate online businesses and shopping sites. Burkov, the indictment alleges, sold card details for between $2.50 and $10 a card, and even offered a literal money-back guarantee: He would refund the price of any cards that proved invalid.

Publisher: Wired
Author: Condé Nast
Twitter: @wired
Reference: (Read more) Visit Source



Iranian hacking group built its own VPN network | ZDNet

One of Iran's elite state-sponsored hacking groups has built and has been operating its own private network of VPN nodes, which they've using to connect to hacking infrastructure, perform reconnaissance on future targets, and even casual web browsing, according to research published today by cyber-security firm Trend Micro.

The group, tracked in cyber-security circles under the codename of APT33, is, by far, Iran's most sophisticated hacking unit.

In 2019, APT33 operations have relied on classic spear-phishing operations and sometimes on the use of a clever Outlook vulnerability .

Publisher: ZDNet
Author: Catalin Cimpanu
Twitter: @ZDNet
Reference: (Read more) Visit Source



Jubilee: A Toolchanging Homage To 3D Printer Hackers Everywhere | Hackaday

One year later, I am thrilled to release an open-source multitool motion platform I call Jubilee . For a world that’s hungry for toolchanging 3D printers, Jubilee might be the best toolchanging 3D printer you can build yourself–with nothing more than a set of hand tools and some patience. But it doesn’t stop there.

Jubilee is my homage to you, the 3D printer hacker; but it’s meant to serve the open-source community at large. Around the world, scientists, artists, and hackers alike use the precision of automated machines for their own personal exploration and expression. But the tools we use now are either expensive or cumbersome–often coupled with a hefty learning curve but no up-front promise that they’ll meet our needs.

Publisher: Hackaday
Date: 2019-11-14T15:00:12+00:00
Reference: (Read more) Visit Source



No comments:

Post a Comment

Popular Posts