hacking

  • The Biggest Cybersecurity Risk Is Not Identity Theft Crunch Network

    The Biggest Cybersecurity Risk Is Not Identity Theft

    What would happen if a hacker edited a major news website to falsely report an anthrax attack in Times Square? Even if the site removed the story within minutes, it already would have been reposted and retweeted thousands of times. The misinformation likely would lead to crowded sidewalks, traffic accidents, overflowing hospitals, a plummeting stock market and other chaos. Read More

  • De-escalation Is The Answer To Today’s Growing Cyber Tension Crunch Network

    De-escalation Is The Answer To Today’s Growing Cyber Tension

    Leading up to Chinese President Xi Jinping’s visit to the United States, media buzzed with talk of an unprecedented cybersecurity agreement on par with previous governance around the creation and handling of nuclear, chemical and biological weapons. But what was built up to be the first arms control accord for cyberspace actually turned out to be quite anticlimactic. Read More

  • Facebook Now Warns Users If They’re A Target Of State-Sponsored Attacks

    Facebook Now Warns Users If They’re A Target Of State-Sponsored Attacks

    Years after Google implemented a similar feature for Gmail users, Facebook says it will begin alerting users if it suspects they’re a target of state-sponsored attacks. That is, if the network believes a user’s account has been either targeted or already compromised by an attacker working on behalf of a nation-state, Facebook will pop up a notification warning them of the incident… Read More

  • The Hacking Quandary Crunch Network

    The Hacking Quandary

    This summer, two different events affected two different worlds. First, Milan-based Hacking Team — a small group of programmers who customize malware to gather intelligence — was itself hacked, and more than 400GB of its internal data was leaked. A few days later, a South Korean intelligence officer who had been implementing tracking software killed himself, and his suicide… Read More

  • How To Keep IoT Hunters And Poachers Out Of Your Food And Farms Crunch Network

    How To Keep IoT Hunters And Poachers Out Of Your Food And Farms

    A drone equipped to “sniff” Zigbee flew over an Austin neighborhood in early August and found almost 1,600 devices. It’s a sign of how ubiquitous these technologies have become, and how we use them every day — despite their vulnerabilities. As we connect more devices to our lives, I can’t help but wonder, can hackers hurt, hunt or poach our local food… Read More

  • To Fix Cybersecurity Law, Ask More Questions Crunch Network

    To Fix Cybersecurity Law, Ask More Questions

    When a company realizes that it may have been hacked, its first call often is not to outside forensics consultants, security firms or even to law enforcement. Too often, the company first must consult with its lawyers. Lots and lots of lawyers. And for good reason. Our system of cybersecurity and privacy laws is difficult to navigate, and exposes companies to large penalties for failure to… Read More

  • APIs Are The New FTEs Crunch Network

    APIs Are The New FTEs

    Facebook, Google and Twitter have to deal with outrageous amounts of spam and abuse. They hire teams of engineers to stop trolls, outwit bad actors and otherwise keep their walled gardens free of misanthropes. It’s a costly business. Huge teams of Full-Time Employees, or FTEs, are charged with stopping these attacks at other companies, and it’s easy to imagine millions of dollars… Read More

  • Hacking For Cause: Today’s Growing Cyber Security Trend Crunch Network

    Hacking For Cause: Today’s Growing Cyber Security Trend

    What do the following data-breach headlines from the past year have in common? The Sony Pictures hack: Everything we know so far; Anonymous hackers release emails ordering bear cubs be killed; Hackers threaten to release names from adultery website … Connecting the dots yet? Read More

  • The Dinosaurs Of Cybersecurity Are Planes, Power Grids And Hospitals Crunch Network

    The Dinosaurs Of Cybersecurity Are Planes, Power Grids And Hospitals

    As we continue down the path toward complete connectivity — in which all devices, appliances and networks connect to each other and the Internet — it is evident that much of our longstanding technology can no longer keep up. And it’s not an issue affecting only tech companies and web-connected devices, it’s affecting systems and infrastructures that most would expect to… Read More

  • Malaysia Airlines Site Hacked By Lizard Squad

    Malaysia Airlines Site Hacked By Lizard Squad

    Hacker group Lizard Squad, which took down Xbox Live and the Sony Playstation Network last month, have claimed credit for an attack on Malaysia Airlines’ website. The site currently displays a picture of a lizard in a top hat and monocle, as well as the text “404-Plane Not Found” (a reference to flight MH370, which disappeared in March), and “Hacked by LIZARD… Read More

  • U.K. Police Arrest Alleged Lizard Squad Hacker

    U.K. Police Arrest Alleged Lizard Squad Hacker

    Vinnie Omari, alleged member of the Lizard Squad, the hacking crew that took down both Xbox Live and the Playstation Network on Christmas, was arrested in Twickenham on December 31. Omari provided details to the Daily Dot regarding the arrest and the police issued a press release announcing the raid. From the release: The South East Regional Organised Crime Unit (SEROCU) has arrested a… Read More

  1. 1
  2. 2
  3. ...