hacking

  • Risks And Red Lines As UK Prepares To Reforge Surveillance Law

    Risks And Red Lines As UK Prepares To Reforge Surveillance Law

    This year the U.K. has a historic opportunity to lead the world in creating a transparent legal framework for the operation of secret state surveillance powers. But there is a parallel risk of forging bad law and encouraging other countries down a similarly problematic path. The stakes could not be higher… Read More

  • Costs And Risks Of UK’s Draft Surveillance Powers Probed

    Costs And Risks Of UK’s Draft Surveillance Powers Probed

    A U.K. parliamentary committee tasked with scrutinizing the new surveillance powers contained in the draft Investigatory Powers Bill has heard several contradictory views on the proposed legislation. Read More

  • Dojo Is Designed To Protect Your Smart Home From Itself

    Dojo Is Designed To Protect Your Smart Home From Itself

    Israeli startup Dojo-Labs has it eye on securing the connected smart home from the threat posed by, well, all the devices that comprise the connected smart home… Read More

  • The Biggest Cybersecurity Risk Is Not Identity Theft Crunch Network

    The Biggest Cybersecurity Risk Is Not Identity Theft

    What would happen if a hacker edited a major news website to falsely report an anthrax attack in Times Square? Even if the site removed the story within minutes, it already would have been reposted and retweeted thousands of times. The misinformation likely would lead to crowded sidewalks, traffic accidents, overflowing hospitals, a plummeting stock market and other chaos. Read More

  • De-escalation Is The Answer To Today’s Growing Cyber Tension Crunch Network

    De-escalation Is The Answer To Today’s Growing Cyber Tension

    Leading up to Chinese President Xi Jinping’s visit to the United States, media buzzed with talk of an unprecedented cybersecurity agreement on par with previous governance around the creation and handling of nuclear, chemical and biological weapons. But what was built up to be the first arms control accord for cyberspace actually turned out to be quite anticlimactic. Read More

  • Facebook Now Warns Users If They’re A Target Of State-Sponsored Attacks

    Facebook Now Warns Users If They’re A Target Of State-Sponsored Attacks

    Years after Google implemented a similar feature for Gmail users, Facebook says it will begin alerting users if it suspects they’re a target of state-sponsored attacks. That is, if the network believes a user’s account has been either targeted or already compromised by an attacker working on behalf of a nation-state, Facebook will pop up a notification warning them of the incident… Read More

  • The Hacking Quandary Crunch Network

    The Hacking Quandary

    This summer, two different events affected two different worlds. First, Milan-based Hacking Team — a small group of programmers who customize malware to gather intelligence — was itself hacked, and more than 400GB of its internal data was leaked. A few days later, a South Korean intelligence officer who had been implementing tracking software killed himself, and his suicide… Read More

  • How To Keep IoT Hunters And Poachers Out Of Your Food And Farms Crunch Network

    How To Keep IoT Hunters And Poachers Out Of Your Food And Farms

    A drone equipped to “sniff” Zigbee flew over an Austin neighborhood in early August and found almost 1,600 devices. It’s a sign of how ubiquitous these technologies have become, and how we use them every day — despite their vulnerabilities. As we connect more devices to our lives, I can’t help but wonder, can hackers hurt, hunt or poach our local food… Read More

  • To Fix Cybersecurity Law, Ask More Questions Crunch Network

    To Fix Cybersecurity Law, Ask More Questions

    When a company realizes that it may have been hacked, its first call often is not to outside forensics consultants, security firms or even to law enforcement. Too often, the company first must consult with its lawyers. Lots and lots of lawyers. And for good reason. Our system of cybersecurity and privacy laws is difficult to navigate, and exposes companies to large penalties for failure to… Read More

  • APIs Are The New FTEs Crunch Network

    APIs Are The New FTEs

    Facebook, Google and Twitter have to deal with outrageous amounts of spam and abuse. They hire teams of engineers to stop trolls, outwit bad actors and otherwise keep their walled gardens free of misanthropes. It’s a costly business. Huge teams of Full-Time Employees, or FTEs, are charged with stopping these attacks at other companies, and it’s easy to imagine millions of dollars… Read More

  • Hacking For Cause: Today’s Growing Cyber Security Trend Crunch Network

    Hacking For Cause: Today’s Growing Cyber Security Trend

    What do the following data-breach headlines from the past year have in common? The Sony Pictures hack: Everything we know so far; Anonymous hackers release emails ordering bear cubs be killed; Hackers threaten to release names from adultery website … Connecting the dots yet? Read More

  • The Dinosaurs Of Cybersecurity Are Planes, Power Grids And Hospitals Crunch Network

    The Dinosaurs Of Cybersecurity Are Planes, Power Grids And Hospitals

    As we continue down the path toward complete connectivity — in which all devices, appliances and networks connect to each other and the Internet — it is evident that much of our longstanding technology can no longer keep up. And it’s not an issue affecting only tech companies and web-connected devices, it’s affecting systems and infrastructures that most would expect to… Read More

  • Malaysia Airlines Site Hacked By Lizard Squad

    Malaysia Airlines Site Hacked By Lizard Squad

    Hacker group Lizard Squad, which took down Xbox Live and the Sony Playstation Network last month, have claimed credit for an attack on Malaysia Airlines’ website. The site currently displays a picture of a lizard in a top hat and monocle, as well as the text “404-Plane Not Found” (a reference to flight MH370, which disappeared in March), and “Hacked by LIZARD… Read More

  • U.K. Police Arrest Alleged Lizard Squad Hacker

    U.K. Police Arrest Alleged Lizard Squad Hacker

    Vinnie Omari, alleged member of the Lizard Squad, the hacking crew that took down both Xbox Live and the Playstation Network on Christmas, was arrested in Twickenham on December 31. Omari provided details to the Daily Dot regarding the arrest and the police issued a press release announcing the raid. From the release: The South East Regional Organised Crime Unit (SEROCU) has arrested a… Read More

  • North Korea On Sony Hack: It Wasn’t Us

    North Korea On Sony Hack: It Wasn’t Us

    Here is the latest twist in the ongoing Sony hacking story: after the FBI alleged that North Korea was indeed behind the attack on Sony, North Korea today categorically denied having anything to do with it. According to a BBC report, North Korea’s foreign ministry went as far threatening “grave consequences” and demanding a joint investigation into the allegations. North… Read More

  • Five Sony Pictures Movie Screeners Leaked After Hacking

    Five Sony Pictures Movie Screeners Leaked After Hacking

    Five movie screeners from Sony Pictures have made their way onto torrent sites after the studio’s computer system was hacked earlier this week. Read More

  • Clueless Founder “Hacks” Jason Calacanis’ Voicemail After Spoofing Phone Calls

    Clueless Founder “Hacks” Jason Calacanis’ Voicemail After Spoofing Phone Calls

    I don’t like to bring up these little lapses of judgement (or, in this case, horrendous lapses of reason) but it’s an interesting story and deserves at least a brief mention. An entrepreneur, who shall remain nameless, wanted Jason Calacanis and Tim Ferris to invest in his startup. Instead of emailing the two, the founder spoofed a phone call from Ferris to Calacanis, assuming… Read More

  • In Year 3 Of Stealth Mode, Enterprise Security Startup vArmour Raises Another $36M

    In Year 3 Of Stealth Mode, Enterprise Security Startup vArmour Raises Another $36M

    vArmour, a security startup that has been in stealth mode for the past three years, is today announcing not one but two more rounds of funding as it finally gears up for a launch later this year. The startup, based out of Mountain View, has raised $36 million in Series B and Series C rounds. The first of these, a $15 million tranche from December 2013, was led by Menlo Ventures (which has led… Read More

  • New Search Engine Unmasks The Hackers

    New Search Engine Unmasks The Hackers

    Indexeus.net looks like it could have been a Y Combinator project. With a slick design, snappy copy, and a bitcoin-based payment system, it looks unusually legit. But what the site is hiding is the produce of hundreds of hacking efforts from around the web. I’ve left out the link because it’s unclear if the site may deliver malware now or in the future. You can type it in if… Read More

  • The Internet Is Burning Crunch Network

    The Internet Is Burning

    Online security is a horrifying nightmare. Heartbleed. Target. Apple. Linux. Microsoft. Yahoo. eBay. X.509. Whatever security cataclysm erupts next, probably in weeks or even days. We seem to be trapped in a vicious cycle of cascading security disasters that just keep getting worse. Read More

  1. 1
  2. 2
  3. ...