Consumers can do better, and so can companies, said Troy Hunt, a cybersecurity expert who runs Have I Been Pwned, a service that tracks hacked login credentials and other data breaches.
The services draw from a massive database of stolen credentials created by the service Have I Been Pwned, where you can also check which data breaches you've been involved in.
Ring and its parent company, Amazon, are ahead of the curve in helping customers safely share access to accounts.
Quite a lot has been going on:
Did Hacker Who 'Helped Expose' Steubenville Rape Face More Prison Time than Rapists?
The hacker who "helped expose" the infamous Steubenville High School rape in Ohio faced more prison time than the rapists themselves.
In late 2019, a years-old story about a hacker sentenced to prison in a case stemming from the infamous Steubenville High School rape in Ohio circulated on social media, even though the subject of the story had already been released from prison.
Lostutter, a Kentucky resident, was ultimately sentenced to two years in federal prison after striking a plea deal with prosecutors. According to jail booking records , he was released from custody in September 2019. A press release published by the U.S. Attorney's Office in the Eastern District of Kentucky about the conclusion of Lostutter's criminal case outlines the accusations against him:
Disney Plus (Disney+) accounts hacked are up for sale in hacking forums on the
Rohmeyer said services may be hesitant to implement tougher security because they don't want to be seen as more inconvenient than competitors.
* * *
At the end of the year, a trio of events in the North are likely to threaten President Trump's hopes for progress in U.S.-North Korea relations
President Trump, during a meeting with Paraguayan President Mario Abdo Benítez, said Democrats are "trivializing impeachment."
Phineas Fisher Offers $100,000 Bounty to Hack Banks and Oil Companies - VICE
An infamous vigilante hacker known for their hits on surveillance companies is launching a new kind of bug bounty to reward hacktivists who do public interest hacks and leaks.
To be clear, this is basically a bug bounty that incentivizes criminal activity. Most bug bounty programs are run by companies to encourage security researchers to find bugs in their software that they can then patch to make their services safer. Other bug bounty programs are run by third-party companies like Zerodium , which pay hackers for bugs in software like iOS, Android, or Chrome that can then be re-sold to governments.
Not to change the topic here:
Cybersecurity: This password-stealing hacking campaign is targeting governments around the world
Anyone who enters their login credentials into the spoofed government agency websites will give cyber criminals access to their account.
"It could be that the adversaries are trying to gain access to potential bidders to undercut the competition or to compromise government suppliers for more long-term gain," Sara Moore, cyber-threat intelligence analyst at Anomali, told ZDNet.
The majority of the attacks focus on government departments, but a small percentage also target procurement and logistics firms related to the targets.
Iran's APT33 Hackers Are Targeting Industrial Control Systems | WIRED
Microsoft ranked those targets by the number of accounts hackers tried to crack; Moran says about half of the top 25 were manufacturers, suppliers, or maintainers of industrial control system equipment. In total, Microsoft says it has seen APT33 target dozens of those industrial equipment and software firms since mid-October.
The hackers' motivation—and which industrial control systems they've actually breached—remains unclear. Moran speculates that the group is seeking to gain a foothold to carry out cyberattacks with physically disruptive effects. "They're going after these producers and manufacturers of control systems, but I don't think they're the end targets," says Moran. "They're trying to find the downstream customer, to find out how they work and who uses them.
How Hackers Are Breaking Into Ring Cameras - VICE
Hackers have created dedicated software for breaking into Ring security cameras, according to posts on hacking forums reviewed by Motherboard. The camera company is owned by Amazon, which has hundreds of partnerships with police departments around the country.
On Wednesday, local Tennessee media reported that a hacker broke into a Ring camera installed in the bedroom of three young girls in DeSoto County, Mississippi, and spoke through the device's speakers with one of the children.
Security expert offers advice to prevent Ring Video Doorbell hacking
Action 2 News spoke to a security expert about the Ring Video Doorbell and precautions you should take when setting up that device or others like it.
The growing popularity of video surveillance, and items like the Ring Video Doorbell, haven't just caught the attention of consumers, they're also gaining popularity with hackers..
Just recently many people have reported hearing voices that have caused a scare (read related stories HERE and HERE ).
Happening on Twitter
National #PackageProtectionDay tip: Get to know your delivery person. Maria left out a sweet surprise for her loc… https://t.co/iEzsafGKhL ring (from Santa Monica, CA) Thu Dec 05 01:59:28 +0000 2019
No comments:
Post a Comment