hacking

  • Obama orders review of Russian election hacking

    Obama orders review of Russian election hacking

    President Obama has ordered intelligence agencies to conduct a complete review of the hacks and leaks that led up to and may have influenced the presidential election, according to White House homeland security and counterterrorism adviser Lisa Monaco. “The President has directed the Intelligence Community to conduct a full review of what happened during the 2016 election… Read More

  • San Francisco Muni hacker gets hacked back

    San Francisco Muni hacker gets hacked back

    Revenge is sweet, but irony is sweeter. Apparently, the hacker who infiltrated San Francisco’s Muni transportation system late last week fell victim to his own horrible personal cyber hygiene. According to security reporter Brian Krebs, a separate individual infiltrated the Muni hacker’s own email using nothing more than the ransom note provided by the hacker himself. Read More

  • Jill Stein campaign files to recount votes in Wisconsin

    Jill Stein campaign files to recount votes in Wisconsin

    Green Party presidential candidate Jill Stein, and independent party candidate Rocky De La Fuente, today filed for a recount of votes in the state of Wisconsin after Stein raised more than $5.2 million via NationBuilder.com to pursue “election integrity.” Stein’s crowdfunding campaign raised donations after a group of legal and cybersecurity experts raised questions… Read More

  • LinkedIn is now officially blocked in Russia

    LinkedIn is now officially blocked in Russia

    Amid a tense stand-off and attempt at negotiations, Russia’s communications regulator Roskomnadzor has started to enforce a proposed block of LinkedIn in the country, after the social network failed to transfer Russian user data to servers located in the country, violating a law instituted in Russia requiring all online sites to store personal data on national servers. The order… Read More

  • IBM opens new Cambridge, MA security headquarters with massive cyber range

    IBM opens new Cambridge, MA security headquarters with massive cyber range

    It was a big day for IBM today as it opened its shiny new security headquarters in Kendall Square in Cambridge, MA, complete with what the company is calling the first commercial cyber range. A cyber range is a network security testing environment, and is typically run by the military or military contractors. This one, dubbed X-Force Command, however, is much more than a couple of terminals in… Read More

  • Why the Department of Transportation’s self-driving car guidelines aren’t enough Crunch Network

    Why the Department of Transportation’s self-driving car guidelines aren’t enough

    Ford, GM, Toyota and VW are just a handful of the car manufacturers planning to put self-driving cars on the road in the next five years. If you ask Uber or Tesla, they might say driverless cars have already arrived… which means we’re running out of time to secure one of the juiciest new targets for hackers. Read More

  • Weebly hacked, 43 million credentials stolen

    Weebly hacked, 43 million credentials stolen

    The web design platform Weebly was hacked in February, according to the data breach notification site LeakedSource. Usernames and passwords for more than 43 million accounts were taken in the breach, although the passwords are secured with the strong hashing algorithm bcrypt. Weebly said in an email to customers that user IP addresses were also taken in the breach. “We do not believe… Read More

  • Why an unhackable mobile phone is a complete marketing myth Crunch Network

    Why an unhackable mobile phone is a complete marketing myth

    The mobile security market is taking off due to high-profile hackings. Is there such a thing as an unhackable phone? Consider this: The smartphone in your pocket is 10 times more powerful than the fastest supercomputers of just 20 years ago. The complexity is mind-boggling — and so are all the security vulnerabilities. Anyone claiming to sell an “unhackable phone” is… Read More

  • Toppling democracy one byte at a time Crunch Network

    Toppling democracy one byte at a time

    As the saying goes, “all politics is local.” And now, so is hacking. Cyber attacks popularized on the silver screen are now occurring in every aspect of our life. Our election system is not immune from this new reality. Read More

  • Swiss public back law expanding surveillance powers

    Swiss public back law expanding surveillance powers

    In the wake of the 2013 Snowden revelations about mass surveillance programs some startups with concerns about overreaching government requests for user data settled on Switzerland as a base for their business — owing to what they dubbed favorable privacy laws. However, they might need to have a rethink after the Swiss public approved more invasive state surveillance powers in a… Read More

  • Hacking for investor profit Crunch Network

    Hacking for investor profit

    Just over four years ago, I sat through what still is the most viscerally disturbing information security talk I’ve ever seen. The late Barnaby Jack, a brilliant security researcher, had just demonstrated in front of 300 people how he could wirelessly take control of an Implantable Cardioverter Defibrillator and cause it to discharge enough electricity to jump a 12 mm spark gap. Read More

  • UnifyID wants to bury the password once and for all

    UnifyID wants to bury the password once and for all

    The old-fashioned password gets little respect from hackers these days. In fact, it’s barely a speed bump for them to get past. The hacker can find your password or even the answers to your “security” questions for sale on the internet black market. UnifyID, a participant in this year’s TechCrunch Disrupt SF Battlefield competition, sees a system that’s… Read More

  • Meet the team hacking Sundar Pichai and Channing Tatum

    Meet the team hacking Sundar Pichai and Channing Tatum

    If you follow tech executives or famous actors on Twitter, you’ve probably seen references to something called OurMine several times over the last few weeks. That’s because a group of three hackers called OurMine have been finding their way into accounts belonging to Google CEO Sundar Pichai, Spotify CEO Daniel Ek, Amazon CTO Werner Vogels and “Magic Mike” star… Read More

  • UK surveillance bill under fire as data security risk

    UK surveillance bill under fire as data security risk

    A 2015 data breach of UK ISP TalkTalk should serve as a warning to the government that its proposed new surveillance legislation risks creating vulnerable pools of data that could be exploited by hackers, a parliamentary committee has warned. Read More

  • How Twitter secured accounts after user credentials were sold online

    How Twitter secured accounts after user credentials were sold online

    Rumors of a Twitter breach started circulating yesterday afternoon, fittingly, on Twitter. Security researchers cautioned users to change their passwords and enable two-factor authentication, a feature that requires a user to verify their identity at login with a pincode sent to a trusted device. But the rumors were wrong — at least partially. Although millions of Twitter handles… Read More

  • Guccifer pleads guilty to hacking of American political figures

    Guccifer pleads guilty to hacking of American political figures

    A hacker who first exposed the existence of Hillary Clinton’s private email server and who found his way into accounts of several American political figures pleaded guilty to identity theft and hacking charges today. Read More

  • Supreme Court moves to expand FBI’s hacking authority

    Supreme Court moves to expand FBI’s hacking authority

    The Supreme Court approved hotly contested amendments to federal criminal procedure today that, if accepted by Congress, will expand the FBI’s ability to hack into computer networks. The rule at the heart of the debate is Criminal Rule 41, which limits judges’ authority to authorize search warrants. Magistrate judges can usually only approve warrants within their jurisdiction… Read More

  • Mad scientist shrinks Arduino to size of an AA battery

    Mad scientist shrinks Arduino to size of an AA battery

    The hardware tinkerers and prototype mavens out there will invariably have stumbled across the Arduino platform. Completely open source and always pushing the limits for collaboration, there are a ton of different development boards available, but none are as awesome as Johan Kanflo’s AAduino. Behind the delightfully punny name, you’ll find an Arduino-compatible board the size of an… Read More

  • Fear and loathing at RSA: Hacking, security and the limits of protection

    Fear and loathing at RSA: Hacking, security and the limits of protection

    People are trying to steal your credentials or trick you into giving them important information. They are exploiting unpatched operating systems, locating security holes in applications and hacking into unprotected hardware. You’re not paranoid, you’re told. Hackers, con artists and social engineers really are out to get you, and frankly you’re pretty helpless to stop… Read More