Wednesday, December 25, 2019

How Christmas became one of the biggest days of the year for hackers

"It's really like the Grinch," said Patrick Sullivan, senior director of security at Akamai Technologies, a security firm that specializes in stopping attacks.

"Everyone gets this present and they're excited to play it and they're deprived of that opportunity," Sullivan said. "They have to talk to their family, I guess."

Every year since, Christmas Day has become notorious in the cybersecurity industry. While presents are getting unwrapped under trees, computer systems — and some unfortunate security professionals — are guarding against deluges of fake traffic.

Publisher: NBC News
Twitter: @NBCNews
Reference: (Read more) Visit Source



Quite a lot has been going on:

'Fallout 76' hackers wiped out players' inventories | Engadget

If you play Fallout 76 you might want to avoid public servers for a while. According to multiple posts on the game's Reddit forums -- and confirmed by publisher Bethesda -- hackers have attacked public servers and wiped out the inventories of more than a few players. A post from one of the Overseers warns that "Your weapons and armor, and any other inventory items are not safe." It also appears that Bethesda is unable to restore lost items, so if they're gone, they're gone for good.

Publisher: Engadget
Date: 2019-12-24T16:04:00-05:00
Author: https www engadget com editors rachel england
Twitter: @engadget
Reference: (Read more) Visit Source



FBIs IDLE Program: A Decoy for Hackers

The U.S. Federal Law enforcement agency – FBI has quite literally decided to hang the carrot (read fake data) as bait for cyber criminals. The FBI 's exclusive Illicit Data Loss Exploitation (IDLE) program, lures hackers to attack a network in order to trace their identity.

Trusted sources from the FBI say that the agency started the IDLE program with a view of providing security to top companies' data and network needs. Not much of official information is available on the IDLE program but experts say that the program is designed to place honeypots in servers. Companies will store irrelevant data as a decoy in their servers and use this data as honeypots to lure and trap hackers who try to steal valuable or critical information.

logo
Publisher: CISO MAG | Cyber Security Magazine
Date: 2019-12-25T07:50:18+00:00
Twitter: @cisomag
Reference: (Read more) Visit Source



Pensacola hackers claim stolen data posted online | WPMI
Publisher: WPMI
Date: 2019-12-24T12:24:40+00:00
Author: Tanner Gilliland
Twitter: @mynbc15
Reference: (Read more) Visit Source



And here's another article:

Ring Doorbell & Camera Account Hacking - Consumer Reports

A Ring spokesperson told Consumer Reports that the data exposure didn't involve the company's own system. There is "no evidence of an unauthorized intrusion or compromise of Ring's systems or network," the spokesperson said.

Ring doesn't require users to do so, however. Ring's head of communications, Yassi Shahmiri, declined to comment on why Ring doesn't require the use of two-factor authentication. 

The set of stolen login information also came with other account information, such as the names of cameras and users' timezones. "All that information is accessible if you have someone's credentials," Shahmiri said.

Publisher: Consumer Reports
Date: 2019-12-20T00:50Z
Twitter: @consumerreports
Reference: (Read more) Visit Source



Chinese hacker group caught bypassing 2FA | ZDNet

The attacks have been attributed to a group the cyber-security industry is tracking as APT20, believed to operate on the behest of the Beijing government, Dutch cyber-security firm Fox-IT said in a report published last week.

The group's primary targets were government entities and managed service providers (MSPs). The government entities and MSPs were active in fields like aviation, healthcare, finance, insurance, energy, and even something as niche as gambling and physical locks.

logo
Publisher: ZDNet
Author: Catalin Cimpanu
Twitter: @ZDNet
Reference: (Read more) Visit Source



Here's why hackers love Christmas, too, and how they'll try to ruin your holiday -

Christmas Day is a special time of the year for families across America. It's a spiritual time for many as the year comes to a close, as well as a time of togetherness, family and generosity.

But retailers aren't the only ones noticing how much technology is changing hands on Christmas. Hackers are eager to take advantage of all the new gizmos flooding the market — and are using freshly opened gifts as target practice for their hacking skills.

According to new reports from CNBC , Christmas has become somewhat of an unofficial holiday for hackers in the past several years. This phenomenon sprung from the sheer amount of tech-based gifts and toys making the rounds each year — each one an opportunity for hackers eager to strut their stuff.

Publisher: Komando.com
Date: 2019-12-25T08:00:00+00:00
Twitter: @kimkomando
Reference: (Read more) Visit Source



"Santa's Little Hackers" spread holiday cheer to hundreds through accessible toys

BROOMFIELD, Colo. — It's a few weeks before Christmas, and a small army of people fills into a Broomfield gymnasium for a Saturday of work. Their mission: to make toys accessible to those who need them.

"Essentially, we're taking things that work just fine and then making them work in a different way," volunteer Cameron Trussell said.

Every person in that gym, totaling more than 400, is a volunteer. They are part of "Santa's Little Hackers."

Publisher: KMGH
Date: 2019-12-25T00:47:09.952
Author: https www thedenverchannel com jason gruenauer
Twitter: @DenverChannel
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment