Posts Tagged ‘ cyber warfare ’

McAfee: I know who’s helping the FBI hack Apple

March 23, 2016
posted by

CNBC    

"John McAfee said he's not the third party helping unlock an iPhone used by a terrorist -- but he knows who is -- and he's not fond of their approach. 'I promise you that [Apple CEO] Tim Cook and Apple are not going to be happy with the solution that the FBI has come up with,' McAfee, the controversial technology executive, told CNBC's 'Power Lunch.' 'Because it is almost as bad as a universal master key.' McAfee is the cybersecurity pioneer behind McAfee Security antivirus software products, now part of Intel. He declined to name with whom, or how, the FBI plans to move forward. But his comments come as the Justice Department says it may have found a third party to hack the iPhone at the center of a cybersecurity standoff." (03/22/16)

http://www.cnbc.com/2016/03/22/john-mcafee-speaks-out-on-fbi-apple-hacks-third-party.html  

8 Comments »

First live ransomware targeting Mac found “in the wild”

March 7, 2016
posted by

CNet News CNet News    

"Sorry Mac fans -- now you're no better off than regular old PC users. Security researchers have discovered what they believe to be the first ever ransomware attack targeted at Apple users that actually made it out 'into the wild.' And in bad news for downloading fiends, it's being spread through torrenting software. The problem was first detected on Friday, when a team of researchers at Palo Alto Networks found a popular OS X BitTorrent client infected with the ransomware, which they have dubbed 'KeRanger.'" (03/07/16)

http://www.cnet.com/uk/news/apple-users-beware-first-live-ransomware-targeting-mac-found-in-the-wild/  

No Comments »

US National Guard may join cyber offense against Islamic State

March 6, 2016
posted by

Reuters    

"U.S. Defense Secretary Ash Carter said the National Guard's cyber squadrons will play an increasingly important role in assessing the vulnerabilities of U.S. industrial infrastructure and could be asked to join the fight against Islamic State. The National Guard -- a reserve military force that resides in the states but can be mobilized for national needs -- is a key part of the military's larger effort to set up over 120 cyber squadrons to respond to cyber attacks and prevent them." (03/06/16)

http://www.reuters.com/article/us-usa-military-cyber-idUSKCN0W70UQ?feedType=RSS&feedName=technologyNews  

No Comments »

CA: UC-Berkeley alerts 80,000 people of cyber attack

February 29, 2016
posted by

CNN-IBN [India]    

"Officials at the University of California Berkeley said that they were alerting 80,000 people, including current and former students, faculty and vendors of a cyber attack on a system that stores social security and bank account numbers. ... The school said a hacker or hackers gained access to its financial management software in late December due to a security flaw present when the system is updating. Officials have notified law enforcement, including the FBI, and hired a private computer investigation company." (02/29/16)

http://www.ibnlive.com/news/tech/university-of-california-alerts-80000-people-of-cyber-attack-1209413.html  

No Comments »

I’ll decrypt the San Bernardino iPhone

February 18, 2016
posted by

Tech Insider
by John McAfee  

"Using an obscure law, written in 1789 -- the All Writs Act -- the US government has ordered Apple to place a back door into its iOS software so the FBI can decrypt information on an iPhone used by one of the San Bernardino shooters. It has finally come to this. After years of arguments by virtually every industry specialist that back doors will be a bigger boon to hackers and to our nation's enemies than publishing our nuclear codes and giving the keys to all of our military weapons to the Russians and the Chinese, our government has chosen, once again, not to listen to the minds that have created the glue that holds this world together. This is a black day and the beginning of the end of the US as a world power." (02/18/16)

http://www.techinsider.io/john-mcafee-ill-decrypt-the-san-bernardino-iphone-for-free-so-apple-doesnt-need-to-place-a-back-door-on-its-product-2016-2  

11 Comments »

Obama creates cyber panel, says long-term vigilance needed

February 18, 2016
posted by

The Washington Post Washington Post    

"President Barack Obama on Wednesday appointed his former national security adviser, Tom Donilon, to lead a new commission on cybersecurity that will make detailed recommendations on how the nation should better protect itself against computer attacks. Donilon will serve as chairman of the Commission on Enhancing National Cybersecurity. Obama will appoint former IBM chief executive Sam Palmisano to serve as vice chairman. Their task, Obama said, is to produce a report by Dec. 1 that will guide future presidents on the infrastructure necessary to confront long-term computer challenges." [editor's note: Obama isn't even in John McAfee's league on this subject. Just sayin' ... - TLK] (02/18/16)

https://www.washingtonpost.com/politics/obama-creates-cyber-panel-says-long-term-vigilance-needed/2016/02/18/6fa503e8-d600-11e5-a65b-587e721fb231_story.html  

No Comments »

Israel: Regime prepares cyber battle against BDS movement

February 17, 2016
posted by

Fox News    

"Israel is using its world-leading expertise in cyber security to take on the growing threat of the global pro-Palestinian movement to boycott Israel. The Israeli government recently allotted nearly $26 million in this year's budget to combat what it sees as worldwide efforts to 'delegitimize' the Jewish state's right to exist. Some of the funds are earmarked for Israeli tech companies, many of them headed by former military intelligence officers, for digital initiatives aimed at gathering intelligence on activist groups and countering their efforts." [editor's note: If Israel can afford to spend $26 million on propaganda, cyber warfare, or a mixture of the two, that's $26 million they shouldn't be getting from US taxpayers - TLK] (02/17/16)

http://www.foxnews.com/world/2016/02/17/israel-prepares-cyber-battle-against-pro-palestinian-boycott.html  

No Comments »

CA: Cyber extortionists zap computers at Hollywood hospital

February 17, 2016
posted by

Los Angeles Times Los Angeles Times    

"Hollywood Presbyterian Medical Center was the target of a ransomware extortion plot in which hackers seized control of the hospital's computer systems and then demanded that directors pay in bitcoin to regain access, according to law enforcement sources. ... Laura Eimiller, an FBI spokeswoman, said the bureau has now taken control of the hacking investigation, but declined to discuss specifics of the case. The attack has forced the hospital to return to pen-and-paper for its record keeping, and cyber security experts are addressing system weaknesses, according to sources." (02/17/16)

http://www.latimes.com/local/lanow/la-me-ln-cyber-extortion-20160216-story.html  

No Comments »

We’re a lot more exposed to hackers than you think

February 11, 2016
posted by

Business Insider
by John McAfee  

"An Intel study found that 97% of all computer users could not identify all 10 out of 10 phishing emails as not being legitimate. All that a hacker would have to do is to send multiple types of phishing emails to be guaranteed that over 90% of respondents would provide the hacker their passwords. ZDNET did a study and found that with a single phishing email, an average of 45% of users submitted their full login credentials. Please see how horrifying these statistics are." (02/10/16)

http://www.businessinsider.com/john-mcafee-more-exposed-to-hackers-than-you-think-2016-2  

1 Comment »

Kaspersky Lab details new banking, ATM attack campaigns

February 9, 2016
posted by

eWeek    

"Security firm Kaspersky Lab today revealed details on a trio of new financial industry attacks that are stealing money from banks and ATMs. One of the campaigns, Carbanak 2.0, is an evolution of an attack that Kaspersky first reported in 2015, while the Metel and GCMAN attacks are new. There is no direct connection between the Carbanak, Metel and GCMAN attacks, according to Kaspersky. The Metel and GCMAN campaigns are 'copycats' of Carbanak in some respects, explained Sergey Golovanov, principal security researcher with the Global Research and Analysis Team at Kaspersky Lab." (02/09/16)

http://www.eweek.com/security/kaspersky-lab-details-new-banking-atm-attack-campaigns.html  

No Comments »

Jeb Bush is a smart man, but his views on cybersecurity depress me

January 15, 2016
posted by

Business Insider
by John McAfee  

"Jeb Bush recently penned an article about cybersecurity for Business Insider. My reaction at first was horror, then lethargy and finally depression. The first serious candidate to speak out about their cybersecurity platform shows an utter lack of understanding of what is really happening in the cybersecurity world. I am depressed, because Jeb Bush is a smart man -- more clever than perhaps the front runners in both parties. If his understanding of our position is as described in his policy statement, then our best move is to immediately surrender to the Chinese or the Russians and hope for mercy." (01/13/16)

http://www.businessinsider.com/john-mcafee-jeb-bush-doesnt-understand-cybersecurity-2016-1  

1 Comment »

EU: Suspected members of Bitcoin extortion group DD4BC arrested

January 13, 2016
posted by

ZDNet ZDNet    

"European law enforcement has arrested and detained two alleged members of a hacking group linked to DDoS attacks and Bitcoin extortion, DD4BC. Europol says the investigation, under the name Operation Pleiades, led to the arrest of one main target and another suspect being detained. ... DD4BC -- otherwise known as Distributed denial-of-service for Bitcoin -- is a group dedicated to extorting virtual currency from companies. Emerging in the middle of 2014, DD4BC used the threat of DDoS attacks and held companies to ransom unless they agreed to pay a fee in Bitcoin." (01/13/16)

http://www.zdnet.com/article/suspected-members-of-bitcoin-extortion-group-dd4bc-arrested/  

No Comments »

Teen who hacked CIA email is back to prank US spy chief

January 13, 2016
posted by

Motherboard    

"One of the 'teenage hackers' who broke into the CIA director's AOL email account last year hasn't given up targeting government intelligence officials. His latest victim is the Director of National Intelligence James Clapper, Motherboard has learned. ... One of the group's hackers, who’s known as 'Cracka,' contacted me on Monday, claiming to have broken into a series of accounts connected to Clapper, including his home telephone and internet, his personal email, and his wife's Yahoo email. While in control of Clapper's Verizon FiOS account, Cracka claimed to have changed the settings so that every call to his house number would get forwarded to the Free Palestine Movement." (01/12/16)

http://motherboard.vice.com/read/teen-who-hacked-cia-email-is-back-to-prank-us-spy-chief  

No Comments »

Microsoft pledges to inform users of state surveillance, account hacking

December 31, 2015
posted by

ZDNet ZDNet    

"Microsoft has pledged to inform users if their online communications are being targeted and monitored by government entities and state actors. Following the trail blazed by Facebook, Twitter and Google, the Redmond giant says the firm will notify users if any part of their Microsoft account -- including Outlook.com email and OneDrive [--] has been 'targeted or compromised by an individual or group working on behalf of a nation state.'" [editor's note: Every time I see these claims, I wonder if the warnings will include US state actors, especially "National Security Letter, we will hurt you if you tell" tactics - TLK] (12/31/15)

http://www.zdnet.com/article/microsoft-pledges-to-inform-users-of-state-surveillance-account-hacking/  

1 Comment »

Report: Iranian hackers breached controls of dam near New York

December 21, 2015
posted by

Newsweek    

"Iranian hackers breached the control system of a dam near New York City in 2013, an infiltration that raised concerns about the security of the country's infrastructure, The Wall Street Journal reported on Monday, citing former and current U.S. officials. Two people familiar with the breach told the newspaper it occurred at the Bowman Avenue Dam in Rye, New York. The small structure about 20 miles from New York City is used for flood control. The hackers gained access to the dam through a cellular modem, the Journal said, citing an unclassified Department of Homeland Security summary of the incident that did not specify the type of infrastructure." (12/21/15)

http://www.newsweek.com/iran-hackers-breached-controls-dam-near-new-york-report-407601  

1 Comment »

FBI said to probe breach of Juniper Networks VPN software

December 20, 2015
posted by

USA Today USA Today    

"U.S. officials are investigating a recent breach of Juniper Networks software over concerns the 'backdoor entry' allowed a foreign government to tap into communications of the U.S. government, news reports said. On Thursday, Sunnyvale, Calif.-based Juniper said it found unauthorized code had been inserted into its ScreenOS software, which runs its firewalls. The rogue code could potentially compromise the whole system and decrypt VPN devices, without leaving a trace of the party behind the breach. ... Juniper Networks makes communications equipment and software for large customers, including the U.S. government. Both groups have been vulnerable to large-scale hacks over the past year, and the Obama administration has expressed increased concern that foreign governments are involved in some of the attacks." (12/19/15)

http://www.usatoday.com/story/tech/news/2015/12/19/fbi-investigates-juniper-networks-breach-hack-vpn-encrypted/77642450/  

No Comments »

UK: Hackers trace Islamic State Twitter accounts back to Department of Work and Pensions

December 16, 2015
posted by

Mirror [UK]    

"Hackers have claimed that a number of Islamic State supporters' social media accounts are being run from internet addresses linked to the Department of Work and Pensions. A group of four young computer experts who call themselves VandaSec have unearthed evidence indicating that at least three ISIS-supporting accounts can be traced back to the DWP's London offices." (12/15/15)

http://www.mirror.co.uk/news/technology-science/technology/hackers-trace-isis-twitter-accounts-7010417  

No Comments »

Twitter warns some users of possible government hacking

December 14, 2015
posted by

CNet News CNet News    

"Twitter is warning some users that they may be the target of security breaches by 'state-sponsored actors.' The microblogging service sent emails to an unknown number of users warning that hackers may be trying to obtain phone numbers, email addresses and IP addresses, according to Twitter users who have received the emails. The emails warn that while Twitter is not certain recipients' personal information was obtained, it has reason to believe they were intended targets." (12/13/15)

http://www.cnet.com/uk/news/twitter-warns-users-of-possible-government-hacking/  

No Comments »

The sorry tale of the PECB, Pakistan’s terrible electronic crime bill

November 24, 2015
posted by

Electronic Frontier Foundation Electronic Frontier Foundation
by Nighat Dad  

"It is a truth universally acknowledged that a government, in the wake of a national security crisis -- or hostage to the perceived threat of one -- will pursue and in many cases enact legislation that is claimed to protect its citizens from danger, actual or otherwise. These security laws often include wide-ranging provisions that do anything but protect their citizens' rights or their safety. We have seen this happen time and time again, from the America's PATRIOT Act to Canada's C-51. The latest wave of statements by politicians after the Paris bombing implies we will see more of the same very soon. Not keen to be left out, Pakistan has now joined the ranks of countries using 'cybercrime' and terrorism to rewrite the protections for their nationals' privacy and right to free expression." (11/23/15)

https://www.eff.org/deeplinks/2015/11/sorry-tale-pecb-pakistans-terrible-electronic-crime-bill  

No Comments »

UK: Regime to build cyber attack forces

November 18, 2015
posted by

Reuters    

"British spies are building elite cyber offensive forces to strike at Islamic State fighters, hackers and hostile powers, finance minister George Osborne said on Tuesday after warning militants wanted to launch deadly digital attacks. Islamic State was trying to develop the capability to attack British infrastructure such as hospitals, power networks and air traffic control systems with potentially lethal consequences, Osborne said. In response, Britain will bolster spending on cyber defences, simplify its state cyber structures and build its own offensive cyber capability to attack adversaries." (11/17/15)

http://in.reuters.com/article/2015/11/17/britain-security-cybersecurity-idINKCN0T601B20151117  

No Comments »

Hackers who targeted Samsung Pay may be looking to track individuals

October 7, 2015
posted by

PC World    

"The security breach at Samsung subsidiary LoopPay was probably more about spying than about gathering consumer data for profit, and the worst could be yet to come, a security analyst said Wednesday. Samsung acknowledged the attack on LoopPay, which it acquired in February for technology that it uses in its Samsung Pay service. It said hackers only breached LoopPay's office network, not systems used by Samsung Pay. The affected servers have been isolated and no personal payment information was put at risk, according to Samsung. However, if the breach was carried out by the notorious Codoso Group in China, as The New York Times reported, it probably wasn't intended to steal consumer data for sale, said Ken Westin, a senior security analyst at threat-detection software company TripWire." (10/07/15)

http://bit.ly/1N0JJCS  

No Comments »

Linux-powered botnet generates giant denial-of-service attacks

September 30, 2015
posted by

ZDNet ZDNet    

"Malware that has hijacked Linux systems for the past year has been recorded flooding targeted websites at speeds of over 150Gbps. The Linux botnet, known as XOR DDoS or XOR.DDoS, is orchestrating attacks on around 20 targets a day, according go Akamai, which in late August blocked two attacks against customers that measured 50 Gbps and 100 Gbps, respectively. ... Akamai warns that this particular example is just part of a wider trend that may have been made possible because Linux was seen as more secure than Windows, causing companies to adopt Linux. So today there are enough Linux systems to make it worthwhile to pick low-hanging Linux fruit, namely poorly configured systems." (09/30/15)

http://zd.net/1j0KuSJ  

No Comments »

Syria: British computer hacker killed in US drone strike

August 28, 2015
posted by

Irish Examiner [Ireland]    

"A British computer hacker accused of being a prominent member of the so-called Islamic State (IS) terror group has been killed in a US drone strike in Syria. Junaid Hussain, 21, from Birmingham, is thought to have died in a coalition air strike that targeted him as he was travelling in a vehicle in Syria, US sources were quoted as saying. Hussain, who was married to former punk rocker Sally Jones, is thought to have fled to Syria in 2013 while he was on bail in the UK." (08/27/15)

http://tinyurl.com/pe8dtwo  

No Comments »

Impact Team: Ashley Madison “blackmailed” users, not us

August 24, 2015
posted by

ZDNet ZDNet    

"Hackers Impact Team says Ashley Madison became a target for the group after making $100m a year fraudulently by blackmailing users. ... The hacking group took on Avid Life Media's Ashley Madison domain after claiming the "Paid Delete" function, which permanently removed user account details for a fee, did not perform as advertized. Instead, there are 'many accounts' which prove the feature duped users into handing over additional money for no return, according to Impact Team." (08/24/15)

http://tinyurl.com/nd2nndg  

No Comments »

Purported Islamic State militants post list of 1,400 US “targets”

August 13, 2015
posted by

CNN CNN    

"A group calling itself the Islamic State Hacking Division this week posted online a purported list of names and contacts for Americans it refers to as 'targets,' according to officials. Though the legitimacy of the list is questionable, and much of the information it contains is outdated, the message claims to provide the phone numbers, locations, and 'passwords' for 1400 American government and military personnel as well as purported credit card numbers, and excerpts of some Facebook chats." (08/13/15)

http://www.cnn.com/2015/08/13/world/isis-militants-american-targets/  

No Comments »

Our Sponsors