Monday, January 20, 2020

U.S. Army Hacked By 52 Hackers In Five Weeks

During five weeks between October 9 and November 15, 2019, the U.S. Army was hacked by a total of 52 hackers. This isn't as bad as it sounds. A spokesperson at the U.S. Department of Defense Defense Digital Service said the hacking strengthens its security posture. That's because the 52 hackers were of the ethical variety and participating in the second "Hack the Army" event to have taken place since 2016.

"Participation from hackers is key in helping the Department of Defense boost its security practices beyond basic compliance checklists to get to real security," Alex Romero, digital service expert at the Department of Defense, Defense Digital Service, said.

Publisher: Forbes
Date: 2020-01-16
Author: Davey Winder
Twitter: @forbes
Reference: (Read more) Visit Source



Not to change the topic here:

Hacker leaks passwords for more than 500,000 servers, routers, and IoT devices | ZDNet

A hacker has published this week a massive list of Telnet credentials for more than 515,000 servers, home routers, and IoT (Internet of Things) "smart" devices.

These types of lists -- called "bot lists" -- are a common component of an IoT botnet operation. Hackers scan the internet to build bot lists, and then use them to connect to the devices and install malware.

As ZDNet understands, the list was published online by the maintainer of a DDoS-for-hire (DDoS booter) service.

logo
Publisher: ZDNet
Author: Catalin Cimpanu
Twitter: @ZDNet
Reference: (Read more) Visit Source



Hacker Publishes Telnet Credentials for More Than 515,000 Servers, Routers, IoT Devices |

A hacker has published a list of Telnet credentials for more than 515,000 servers, home routers and IoT (Internet of Things) "smart" devices.

The list was published online by the maintainer of a DDoS-for-hire (DDoS booter) service. "When asked why he published such a massive list of "bots," the leaker said he upgraded his DDoS service from working on top of IoT botnets to a new model that relies on renting high-output servers from cloud service providers," says the report. 

Reference: (Read more) Visit Source



Teen hackers are defacing unsuspecting US websites with pro-Iran messages - The Verge

Phil Openshaw, a retired Californian dentist, hadn't checked his website in months. So he was unaware that it no longer displayed details for his annual mission trip that provides free dental services in Uganda. Instead, it displayed a photo of recently assassinated Iranian Gen. Qassem Soleimani with the message "Down with America."

"Hoo boy. Thanks for the good news," he said when informed that his site, www.ldsafricasmiles.com , had been defaced. "I don't really know how to respond to that. I'll take a look at it."

Publisher: The Verge
Date: 2020-01-09T13:42:14-05:00
Author: Kevin Collier
Twitter: @verge
Reference: (Read more) Visit Source



While you're here, how about this:

N.S.A. Takes Step Toward Protecting World's Computers, Not Just Hacking Them - The New York Times

WASHINGTON — The National Security Agency has taken a significant step toward protecting the world's computer systems, announcing Tuesday that it alerted Microsoft to a vulnerability in its Windows operating system rather than following the agency's typical approach of keeping quiet and exploiting the flaw to develop cyberweapons.

The warning allowed Microsoft to develop a patch for the problem and gave the government an early start on fixing the vulnerability. In years past, the National Security Agency has collected all manner of computer vulnerabilities to gain access to digital networks to gather intelligence and generate hacking tools to use against American adversaries.

Date: 2020-01-14T16:16:22.000Z
Reference: (Read more) Visit Source



What happens when we unmask the hackers? | TechRadar

Cyber-threat activity has become an increasingly common topic of discussion in the media, and society in general. Why is this? Because of public disclosures, which have helped to shine a light on a hitherto murky part underworld of malware and hacking across the internet. But until now, little has been considered about the potential impact of these disclosures on the attackers themselves.

* * *

That’s why BAE Systems recently compiled a new report, analysing motivations for public disclosure of threat activity and attacker responses that appear to have been influenced by it. 

logo
Publisher: TechRadar
Date: 2020-01-20T16:10:33 00:00
Author: https www facebook com TechRadar
Twitter: @TechRadar
Reference: (Read more) Visit Source



UK Shuts Down Website Selling Stolen IDs To Hackers - Law360

In the legal profession, information is the key to success. You have to know what's happening with clients, competitors, practice areas, and industries. Law360 provides the intelligence you need to remain an expert and beat the competition.

* * *

Enter your details below and select your area(s) of interest to stay ahead of the curve and receive Law360's daily newsletters

Author: A website that marketed 12 billion stolen passwords and account information to cybercriminals has been shut down after a coordinated investigation by international law enforcement British crime fighting authorities have said
Twitter: @law360
Reference: (Read more) Visit Source



What is 'house hacking,' and how can you do it? | Fox News

Add the furniture industry to the long list of businesses that are shifting strategies to appeal to millennials.

However, she was confused when he then proceeded to move into a 1967 camper and rent out his new house.

* * *

In 2017, Kelczewski himself bought a duplex for $150,000 in Wilmington, Delaware. He uses rent from the larger unit to pay off his mortgage “while leveraging equity to pyramid alternate investments.” Would he do it again? Definitely. But he says he’d buy a larger property, like a triplex or a 4-unit multi-family home.

Publisher: Fox News
Date: 2020-01-16
Twitter: @foxnews
Reference: (Read more) Visit Source



No comments:

Post a Comment