Posts Tagged ‘ cyber warfare ’

Apple patches iOS security flaws found in spyware targeting activist

August 25, 2016
posted by

ComputerWorld    

"To spy on a human rights activist, hackers allegedly connected to a Middle Eastern government used three previously unknown vulnerabilities in Apple's iOS. The claims -- from research at Toronto-based Citizen Lab and mobile security firm Lookout -- focus on spyware that targeted Ahmed Mansoor, an activist in the United Arab Emirates. The exploits work by remotely jailbreaking the device to secretly download the spyware -- which can then access the iPhone's camera, microphone, and messages. Lookout called the attack the most sophisticated it's ever seen on a device. The researchers have already informed Apple about the exploits, and iOS version 9.3.5 -- which was released on Thursday -- fixes the issues." (08/25/16)

http://www.computerworld.com/article/3112844/security/apple-patches-ios-security-flaws-found-in-spyware-targeting-activist.html  

No Comments »

FBI investigating possible cyberbreach of New York Times reporters’ email accounts

August 24, 2016
posted by

Fox News Fox News    

"The FBI is probing a possible cyberbreach of numerous company email accounts belonging to New York Times reporters by Russian government-linked hackers, a law enforcement source close to the investigation told Fox News on Tuesday. The investigation, which is ongoing, is looking into how and how far the perpetrators infiltrated the Times email accounts in question. It was not exactly known how many New York Times email accounts may have been compromised, according to law enforcement sources. The latest apparent hacking adds to the laundry list of recently disclosed Russia-involved hacks of high profile U.S. organizations." [editor's note: Loooooooooooooook! It's !THEM RUSSIANS! Pay no attention to what the DNC or Hillary Clinton actually did, just blame !THEM RUSSIANS! for all your problems. Here, we have another story to tell you about !THEM RUSSIANS! - TLK] (08/23/16)

http://www.foxnews.com/tech/2016/08/23/fbi-investigating-possible-cyber-breach-new-york-times-reporter-email-accounts.html  

No Comments »

Kaspersky outs Android malware riding on Google Adsense network

August 17, 2016
posted by

SlashGear    

"More often than not, malware attacks start with conning unsuspecting users into visiting seemingly innocent, even helpful, websites or downloading software. Far more frightening, however, is malware that escapes early detection because it piggybacks on legitimate channels or apps. Such is the case with an Android Trojan reported by security company Kaspersky Lab Solutions called 'Trojan-Banker.AndroidOS.Svpeng.q,' or Svpeng, for short. This particular malware, which attempts to intercept and steal banking information, is spreading on perfectly legit websites through Google's own AdSense advertising network. ... The Svpeng Trojan downloads itself immediately as soon as an infected ad is loaded, regardless of whether the user tapped on it or not." (08/16/16)

http://www.slashgear.com/kaspersky-outs-android-malware-riding-on-google-adsense-network-16451932/  

No Comments »

We shouldn’t wait another fifteen years for a conversation about government hacking

August 15, 2016
posted by

Electronic Frontier Foundation Electronic Frontier Foundation
by Nate Cardozo and Andrew Crocker  

"With high-profile hacks in the headlines and government officials trying to reopen a long-settled debate about encryption, information security has become a mainstream issue. But we feel that one element of digital security hasn’t received enough critical attention: the role of government in acquiring and exploiting vulnerabilities and hacking for law enforcement and intelligence purposes. That's why EFF recently published some thoughts on a positive agenda for reforming how the government, obtains, creates, and uses vulnerabilities in our systems for a variety of purposes, from overseas espionage and cyberwarfare to domestic law enforcement investigations." (08/12/16)

https://www.eff.org/deeplinks/2016/08/we-shouldnt-wait-another-fifteen-years-conversation-about-government-hacking  

1 Comment »

Hacker reveals personal information for almost 200 congressional Democrats

August 14, 2016
posted by

Wall Street Journal    

"A hacker posted cellphone numbers and other personal information of nearly 200 current and former congressional Democrats on Friday, the latest public disclosure of sensitive records this election season. The hacker, or group of hackers, going by the name 'Guccifer 2.0' said the records were stolen as part of a breach of the Democratic Congressional Campaign Committee. A number of files were posted onto Guccifer 2.0’s website, including a spreadsheet that has information, such as phone numbers and email addresses, for 193 people." (08/13/16)

http://www.wsj.com/articles/hacker-reveals-personal-information-for-almost-200-democrats-1471048195  

No Comments »

Pelosi: DNC hack is “electronic Watergate”

August 11, 2016
posted by

CNN CNN    

"Amid reports that the hack of the Democratic National Committee was even broader than had been believed, the highest-ranking Democrat in Congress is calling the incident an 'electronic Watergate.' Speaking to reporters on Thursday, House Minority Leader Nancy Pelosi compared the hack to the infamous break-in of DNC offices at the Watergate complex that was tied back to President Richard Nixon and the White House. ... Pelosi was responding to a report late Wednesday by The New York Times that the scope of the hack of the DNC was broader than had been known. Citing sources familiar with the investigation, the Times reported that hackers compromised the private email accounts of over 100 party officials and groups, including officials in the campaign of Hillary Clinton and the Democratic Governors Association." [editor's note: They continue trying as hard to spin the conversation away from the content of the emails. The whole thing is "wahhhhh -- you CAUGHT US, you meanies!" - TLK] (08/11/16)

http://www.cnn.com/2016/08/11/politics/dnc-hack-electronic-watergate/  

1 Comment »

Australia: Regime’s census website shut down after cyber attacks

August 10, 2016
posted by

United Press International United Press International    

"The Australian Bureau of Statistics says a series of hacking attacks led to the census website being shut down Tuesday night on the first day people were able to fill out the forms online. Last Wednesday, the Australian Bureau of Statistics' top statistician, David Kalisch, said the agency was 'ready' with 'the best security features [for which] you could ever ask.' But six days later, Kalisch said the census website was hacked four times and was shut down as a precaution after the fourth attack. It remained shut down Wednesday." (08/10/16)

http://www.upi.com/Top_News/World-News/2016/08/10/Australias-census-website-shut-down-after-four-hack-attacks-on-first-day-of-online-census/3971470836167/  

No Comments »

Clinton supporters to hold fundraiser at cybersecurity conference

August 3, 2016
posted by

CNN Money    

"Some of the world's top security officials are heading to Las Vegas for Black Hat this week. And Hillary Clinton's campaign could get a boost. During the week-long conference, a cybersecurity-focused fundraiser will be held, according to Clinton's website. According to a campaign official, the event was organized by supporters without any involvement from the campaign. ... Developing relationships with supporters in the security community makes sense for a campaign that's been plagued with a number of cybersecurity issues, most notably Clinton's email controversy. The Democratic National Committee recently revealed that it had been hacked, and some experts believe it is linked to the Russian government." (08/02/16)

http://money.cnn.com/2016/08/02/technology/clinton-fundraiser-black-hat/  

No Comments »

Hacker selling 200 million Yahoo accounts on the Dark Web

August 2, 2016
posted by

The Hacker News    

"Hardly a day goes without headlines about any significant data breach. In the past few months, over 1 Billion account credentials from popular social network sites, including LinkedIn, Tumblr, MySpace and VK.com were exposed on the Internet. Now, the same hacker who was responsible for selling data dumps for LinkedIn, MySpace, Tumblr and VK.com is now selling what is said to be the login information of 200 Million Yahoo! users on the Dark Web." (08/01/16)

http://thehackernews.com/2016/08/hack-yahoo-account.html  

No Comments »

The Hunt for Red Trump-tober

July 26, 2016
posted by

Justin Raimondo Antiwar.com
by Justin Raimondo  

"Julian Assange has done it again: exposed the inner workings -- and crimes -- of our political class, that is. This time his target is Hillary Clinton and the Democratic National Committee, whose emails were hacked by a Romanian who calls himself 'Guccifer 2.0,' and posted online by WikiLeaks. As revelations tumble out of the enormous data dump -- e.g. DNC staffers conspired to target Bernie Sanders, who is Jewish, as an 'atheist' -- the collusion of the party leadership with the Clinton campaign to marginalize Sanders threatens the Democrats with a potential explosion on the eve of their convention. It's 'gas meets flame,' as one Democratic party leader put it. The Clinton campaign has responded by pushing a bizarre conspiracy theory that recalls the darkest days of the cold war: the DNC leak, they claim, is part of a plot by the Kremlin to elect Donald J. Trump President of these United States. Yes, seriously." (07/25/16)

http://original.antiwar.com/justin/2016/07/24/hunt-red-trump-tober/  

9 Comments »

New Tor-powered backdoor malware targets Macs

July 7, 2016
posted by

PC World    

"Security researchers have found a new backdoor program that allows attackers to hijack Mac systems and control them over the Tor network. The new malware has been dubbed Backdoor.MAC.Eleanor by researchers from antivirus vendor Bitdefender and is distributed as a file converter application through reputable websites that offer Mac software. ... The good news is that the app is not digitally signed by an Apple-approved certificate, so users will see security warnings on the latest OS X version if they try to install it. On OS X El Capitan (10.11) users would actually need to perform a manual override in order to install the application." (07/06/16)

http://www.pcworld.com/article/3092227/security/new-tor-powered-backdoor-program-targets-macs.html  

No Comments »

The hunter

June 29, 2016
posted by

The Intercept The Intercept
by Peter Maass  

"There is no Miss Manners for exchanging pleasantries with a man the government has trained to be the digital equivalent of a Navy SEAL. Though I had initiated the contact, I was wary of how he might respond. The hacker had publicly expressed a visceral dislike for [Edward] Snowden and had accused The Intercept of jeopardizing lives by publishing classified information. One of his memos outlined the ways the NSA reroutes (or 'shapes') the internet traffic of entire countries, and another memo was titled 'I Hunt Sysadmins.' I felt sure he could hack anyone's computer, including mine. ... I got lucky with the hacker, because he recently left the agency for the cybersecurity industry; it would be his choice to talk, not the NSA's. Fortunately, speaking out is his second nature." (06/28/16)

https://theintercept.com/2016/06/28/he-was-a-hacker-for-the-nsa-and-he-was-willing-to-talk-i-was-willing-to-listen/  

No Comments »

Six times a government hack was bigger than first disclosed

June 28, 2016
posted by

The Atlantic The Atlantic
by Robinson Meyer and Kaveh Waddell  

"In July 2014, the New York Times reported that Chinese hackers broke into the servers of the Office of Personnel Management (OPM), the agency that functions as a kind of government-wide human-resources department. More than a year later, in May 2015, the Internal Revenue Service announced that more than 100,000 taxpayer accounts at the IRS had been breached. Both would have been bad by themselves. But since then, the number of people affected by both of those hacks have grown. ... The difficulty of pinning down even the most basic details of critical hacks -- what was actually stolen, the number of people affected -- is the result of an outdated but still prevalent way of thinking about cybersecurity." (06/28/16)

http://www.theatlantic.com/technology/archive/2016/06/6-times-a-government-hack-was-bigger-than-first-disclosed/488996/  

No Comments »

Anonymous hacks pro-ISIS Twitter accounts, fills them with gay pride

June 16, 2016
posted by

CBS News CBS News    

"In response to the Orlando mass shooting, the hacker-activist group known as Anonymous has hacked into dozens of pro-Islamic State of Iraq and Syria (ISIS) Twitter accounts and infused them with gay pride, CBS San Francisco reported. While San Francisco-based Twitter did not admit that the accounts were hacked, images of the hacked accounts and the Twitter account responsible for the hacking suggest otherwise." (06/15/16)

http://www.cbsnews.com/news/anonymous-hacks-pro-isis-twitter-accounts-fills-them-with-gay-pride/  

No Comments »

Flaws in Samsung’s “smart home” let hackers unlock doors and set off fire alarms

May 3, 2016
posted by

Wired    

"The security research community has been loudly warning for years that the so-called Internet of Things -- and particularly networked home appliances -- would introduce a deluge of new hackable vulnerabilities into everyday objects. Now one group of researchers at the University of Michigan and Microsoft have published what they call the first in-depth security analysis of one such 'smart home' platform that allows anyone to control their home appliances from light bulbs to locks with a PC or smartphone. They discovered they could pull off disturbing tricks over the internet, from triggering a smoke detector at will to planting a 'backdoor' PIN code in a digital lock that offers silent access to your home, all of which they plan to present at the IEEE Symposium on Security and Privacy later this month." (05/02/16)

https://www.wired.com/2016/05/flaws-samsungs-smart-home-let-hackers-unlock-doors-set-off-fire-alarms/?mbid=nl_5216  

No Comments »

With Rule 41, little-known committee proposes to grant new hacking powers to government

May 1, 2016
posted by

Electronic Frontier Foundation Electronic Frontier Foundation
by Rainey Reitman  

"The government hacking into phones and seizing computers remotely? It's not the plot of a dystopian blockbuster summer movie. It's a proposal from an obscure committee that proposes changes to court procedures -- and if we do nothing, it will go into effect in December. The proposal comes from the advisory committee on criminal rules for the Judicial Conference of the United States. The amendment would update Rule 41 of the Federal Rules of Criminal Procedure, creating a sweeping expansion of law enforcement's ability to engage in hacking and surveillance." (04/30/16)

https://www.eff.org/deeplinks/2016/04/rule-41-little-known-committee-proposes-grant-new-hacking-powers-government  

No Comments »

Cyberwarfare: Challenge of tomorrow

May 1, 2016
posted by

CounterPunch CounterPunch
by Alice Donovan  

"Computer hacking has become part of everyday life for the past few years Internet-connected devices have been hacked left and right, but most of the times, these are harmless so-called Internet of Things appliances, like kettles or fridges. According to the Boston hospital Beth Israel Deaconess, it is attacked about every 7 seconds, 24 hours a day, and the strikes come from everywhere: hacktivists, organized crime, cyberterrorists and even MIT students." (04/29/16)

http://www.counterpunch.org/2016/04/29/cyberwarfare-challenge-of-tomorrow/  

1 Comment »

Sanders Facebook pages shut down after porn cyber attack

April 26, 2016
posted by

Connecticut Post    

"Several Facebook pages supporting Bernie Sanders were quickly shut down late Monday night after self-proclaimed Hillary Clinton supporters flooded some of the pages with pornographic images. The pro-Sanders pages, including Bernie or Bust, Bernie Believers and Bernie Sanders is my HERO, had a combined 250,000 followers. According to The Hill, The attack began around 9 p.m. EDT on Monday night and lasted until just after midnight Tuesday. They have since been reinstated. ... According to eyewitness reports, the pages were flooded with pornographic images in what appeared to be coordinated fashion and then flagged for obscene content, prompting Facebook to remove them. ... At least one Facebook user linked to the Los Angeles-based pro-Clinton group 'Bros4Hillary' seems to have been a part of the attack. But the group told TheWrap they had no prior knowledge of the incident and that the member has been 'blocked' from the group's page." (04/26/16)

http://www.ctpost.com/entertainment/the-wrap/article/Bernie-Sanders-Facebook-Pages-Shut-Down-After-7376721.php  

No Comments »

US plan to drop “cyber bombs” on Islamic State will change the meaning of the term cyber war

April 26, 2016
posted by

Extreme Tech    

"Since its creation in 2009, US Cyber Command has focused its efforts mostly on sophisticated cyber-actors on the world stage, states like Iran, Russia, and North Korea. It acts mostly in the new realm of cyber-conflict, in which states can take digital shots at one another without getting too worried about starting a real shooting war. But now, the American war on ISIS is blurring the lines between digital and kinetic conflict, opening a new cyber-front in the physical world: For the first time in its short history, the US military's Cyber Command will now run its own aggressive operations as part of the War on Terror, and even augment regular, lethal military strikes with cyber capabilities." [editor's note: The idea that the US military hasn't previously engaged in cyber warfare is hilarious; openly admitting it is the only thing that's new - TLK] (04/26/16)

http://www.extremetech.com/extreme/227238-us-to-drop-cyber-bombs-on-isis-changing-the-meaning-of-the-term-cyber-war  

No Comments »

McAfee: If FBI gets backdoor to people’s phones, US society will collapse

April 24, 2016
posted by

Russia Today [Russian state media]
by Sophie Shevarnadze  

"They said that the war never changes -- but what if it does? The introduction of digital technologies, the cyberspace of the World Wide Web has introduced new battlefields. Law enforcement, drug trade, political fights and terrorism have gone online. The fight for information and access to the hidden data is raging on, both in the legal sphere, with authorities trying to tighten the grip on the digital flow, and international, with army-like hacker groups searching for the cracks in the cyber defense of nations. How far will this fight go? Who has the upper hand? And can battles in virtual reality claim real lives?" (04/22/16)

https://www.rt.com/shows/sophieco/340570-digital-war-information-fight/  

1 Comment »

Repetitive encryption tirades could be giving way to debate over “lawful hacking”

April 21, 2016
posted by

Jenna McLaughlin The Intercept
by Jenna McLaughlin  

"Attempts to regulate math are nonsensical. Encryption is here to stay. Arguing about it is a waste of time. At a House Energy and Commerce subcommittee hearing on Tuesday, a few Members of Congress pivoted away from that tired and ultimately fruitless policy argument to discuss instead what could be considered the next phase of the Crypto Wars. In that phase, the questions are about how law enforcement can get around encryption rather than break through it." (04/20/16)

https://theintercept.com/2016/04/20/repetitive-encryption-tirades-could-be-giving-way-to-debate-over-lawful-hacking/  

No Comments »

Secure cars, but not phones? Government doublespeak on cybersecurity

April 14, 2016
posted by

Jenna McLaughlin The Intercept
by Jenna McLaughlin  

"Privacy advocates say government officials are talking out of two sides of their mouths when it comes to cybersecurity. The latest case in point: Assistant Attorney General John Carlin calling for super-secure, hack-proof cars at an automotive conference on Tuesday, even as FBI Director James Comey continues to pressure phone manufacturers and technology companies to roll back their security to allow for law enforcement access. ... While Carlin is telling car companies that bulking up their cyber defenses is key to their long-term success, Comey has publicly suggested that phone manufacturers and communications providers like Apple, Google, and WhatsApp, who provide their customers with unbreakable encryption to secure their communications, should rethink their business models." (04/13/16)

https://theintercept.com/2016/04/13/secure-cars-but-not-phones-government-doublespeak-on-cybersecurity/  

No Comments »

Experts crack Petya ransomware

April 12, 2016
posted by

Ars Technica Ars Technica    

"A nasty piece of ransomware that took crypto-extortion to new heights contains a fatal weakness that allows victims to decrypt their data without paying the hefty ransom. When it came to light two weeks ago, Petya was notable because it targeted a victim's entire startup drive by rendering its master boot record inoperable. It accomplished this by encrypting the master boot file and displaying a ransom note. ... Now, someone who goes by the Twitter handle @leostone has devised a tool that generates the password Petya requires to decrypt the master boot file. ... Bleeping Computer, a reputable self-help computer forum, reports that the technique works as billed and provides [a] step-by-step tutorial that walks people through the entire process." (04/11/16)

http://arstechnica.com/security/2016/04/experts-crack-nasty-ransomware-that-took-crypto-extortion-to-new-heights/  

No Comments »

Philippines: Elections hack “leaks voter data”

April 11, 2016
posted by

BBC News BBC News [UK state media]    

"The Philippines may have suffered its worst-ever government data breach barely a month before its elections. Personal information, including fingerprint data and passport information, belonging to around 70 million people is said to have been compromised by hackers. The Philippine Commission on the Elections (Comelec) saw its website defaced at the end of March." (04/11/16)

http://www.bbc.com/news/technology-36013713  

No Comments »

A time bomb is hidden beneath the Panama Papers

April 6, 2016
posted by

John McAfee Business Insider
by John McAfee  

"Mossack Fonseca is the fourth-largest 'asset protection' law firm in the world, and its cybersecurity measures were obviously lacking. But they are not alone. Studies indicate that law firms are easy pickings for hackers, and Bloomberg reported last year that more than 80% of US law firms had already been hacked. Yet these law firms guard the gravest of our secrets, whether corporate secrets or those of an individual, and the damage done from a data breach could, as we might see, even bring down a head of state, as Iceland's prime minister is discovering. Why are law firms so vulnerable?" (04/05/16)

http://www.businessinsider.com/john-mcafee-panama-papers-evidence-we-need-better-cybersecurity-2016-4  

6 Comments »

Our Sponsors