The big picture: It's the latest lexical stretch for an adjective that's widely used in reports of cybersecurity incidents — and widely loathed by researchers as a result. If everything is sophisticated, nothing is sophisticated.
Driving the news: Labour ultimately faced what's known as a denial of service attack, a way of overwhelming servers with a ton of traffic. It's a digital blunt force attack — harmful, yes, but hardly sophisticated. Labour was not alone.
In case you are keeping track:
A YouTuber With 350,000 Subscribers Was Hacked, YouTube Verified His Hacker
My first interaction with MarcoStyle was him telling me I was wrong. I don't remember what about Ubisoft's The Division we were arguing about specifically, but I heard my name come up in his YouTube video about how I had the wrong take on some issue or another in a recent article. Probably the Dark Zone, if I had to guess.
* * *
He immediately knew what was happening. He cut power to his PC, did a fresh Windows install and changed all his login info. But it was already too late.
Innovation Focused Firms Issue Open Call for Hackers | IndustryWeek
This is the primary goal of two recently annouced an open call for hackathons participants taking place between now and mid-December.
* * *
01 Communique Laboratory Inc. launched its quantum hackathon tackling the threat of quantum computing. Cybersecurity companies, computer science students an d hackers have begun challenging the Company's 'quantum-safe' encryption in a $100,000 hackathon.
On November 6th, the Company hosted an innovation celebration event with technology presentations from industry experts in artificial intelligence and cyber security. Andrew Cheung, 01 Communique's CEO, was one of the presenters addressing business people, students, and hackers on the threat quantum computers present with respect to keeping your data safe. He revealed the purpose behind the hackathon and why he is confident enough to offer a $100,000 prize.
5G has security flaws that could let hackers track your location - MIT Technology Review
The news: Security researchers have identified 11 design vulnerabilities with 5G protocols that could expose a user's location, spoof emergency alerts, track phone activity (calls, texts, or web browsing), or silently disconnect the phone from the network altogether.
Time is running out: Although they still face technical and regulatory barriers, 5G networks are starting to roll out in a few major cities worldwide, offering faster speeds and (we are told) greater security for users. Plugging these security holes will be an urgent task.
Quite a lot has been going on:
Pemex Refuses to Pay Hackers
The hack, which Pemex said it detected on Sunday, forced the company to shut down less than five percent of its computers in Mexico. Reuters reports that the ransom note that appeared on Pemex computers pointed to a darknet website affiliated with DoppelPaymer - a type of ransomware.
Some payment operations have been affected, but Pemex said that fuel output, storage and inventories were operating normally.
Previous cyber attacks have been made on Nyrstar, Saudi Aramco, Rosneft and Maersk, among others.
Russia Fails to Stop Alleged Hacker From Facing US Charges | WIRED
You can read the 2016 Burkov indictment in full below. Unsealed Tuesday, it alleges that the 29-year-old former St. Petersburg resident used both CardPlanet and another online forum to commit financial fraud, and outlines how much cybercrime now resembles legitimate online businesses and shopping sites. Burkov, the indictment alleges, sold card details for between $2.50 and $10 a card, and even offered a literal money-back guarantee: He would refund the price of any cards that proved invalid.
Iranian hacking group built its own VPN network | ZDNet
One of Iran's elite state-sponsored hacking groups has built and has been operating its own private network of VPN nodes, which they've using to connect to hacking infrastructure, perform reconnaissance on future targets, and even casual web browsing, according to research published today by cyber-security firm Trend Micro.
The group, tracked in cyber-security circles under the codename of APT33, is, by far, Iran's most sophisticated hacking unit.
In 2019, APT33 operations have relied on classic spear-phishing operations and sometimes on the use of a clever Outlook vulnerability .
Jubilee: A Toolchanging Homage To 3D Printer Hackers Everywhere | Hackaday
One year later, I am thrilled to release an open-source multitool motion platform I call Jubilee . For a world that’s hungry for toolchanging 3D printers, Jubilee might be the best toolchanging 3D printer you can build yourself–with nothing more than a set of hand tools and some patience. But it doesn’t stop there.
Jubilee is my homage to you, the 3D printer hacker; but it’s meant to serve the open-source community at large. Around the world, scientists, artists, and hackers alike use the precision of automated machines for their own personal exploration and expression. But the tools we use now are either expensive or cumbersome–often coupled with a hefty learning curve but no up-front promise that they’ll meet our needs.
No comments:
Post a Comment