Tuesday, June 23, 2020

Neurodiversity on the rise among career hackers

The hacking community is becoming more reflective of today's society, with gender and neurodiversity on the increase among hackers, bringing new skills and insights that others might miss, according to new statistics gathered by crowdsourced security firm Bugcrowd .

In the latest edition of its annual Inside the mind of a hacker report, Bugcrowd – which connects ethical hackers to its customers to help them fix vulnerabilities – found that about 13% of career hackers now identify as neurodiverse.

Publisher: ComputerWeekly.com
Date: 06/23/2020
Twitter: @computerweekly
Reference: (Read more) Visit Source



Check out this next:

Warning: 'Invisible God' Hacker Sold Access To More Than 135 Companies In Just Three Years

A single hacker and his sales accomplice were responsible for hacking 135 companies in just three ... [+] years, according to cybersecurity researchers.

The name Fxmsp was first seen by Group-IB in 2016 on a Russian hacking forum. At that point, he appeared to be breaching company networks and using the stolen compute power within to mine cryptocurrency. To create new cryptocurrency, complex mathematical problems have to be solved, which typically needs substantial compute power. Hackers will often steal that compute power from networks they've broken into.

Publisher: Forbes
Date: 2020-06-23
Author: Thomas Brewster
Twitter: @forbes
Reference: (Read more) Visit Source



Three FBI units look into Zoom bombing; hackers 'almost certainly not from SBU' | Bradford |

ST. BONAVENTURE, N.Y. — Three departments of the Federal Bureau of Investigation pored over St. Bonaventure University's internal investigation into the racist hacking of a university Zoom conversation on June 5.

The overseas botnet IP addresses the hackers used make further investigation especially difficult, but that fact leads both federal and university officials to believe the hackers were "almost certainly not members of the university community," said Dr. Dennis DePerro, university president.

Publisher: The Bradford Era
Twitter: @TheBradfordEra
Reference: (Read more) Visit Source



BlueLeaks: Hackers leak sensitive files from 200 police departments - Business Insider
Publisher: Business Insider
Date: 2020-06-22
Author: Aaron Holmes
Twitter: @sai
Reference: (Read more) Visit Source



Check out this next:

Chinese hacker groups could target Indian businesses - The Economic Times
Publisher: The Economic Times
Date: 2020-06-22T12:50:00.000Z
Reference: (Read more) Visit Source



'Scorching-hot hacked computer burned my hand' - BBC News

He reached down and looked inside his computer, which he liked to leave open and on display in his bedroom.

Instinctively he touched one of the components, swore and pulled his hand back. The graphics card was so hot it had burned his fingers.

The 18-year-old from Sheffield hadn't realised it yet, but this minor injury was caused by crypto-jacking.

Crypto-jacking is the unauthorised and illegal use of someone's computer to collect Bitcoin and other crypto-currencies.

logo
Publisher: BBC News
Author: https www facebook com bbcnews
Twitter: @BBCWorld
Reference: (Read more) Visit Source



Animal Crossing: New Horizons hackers start free villager service, Villager Haven - Polygon

When the Animal Crossing: New Horizons community learned about the hacker who gave out Raymonds to fight black market greed , the response was immense. PokeNinja , the generous soul behind the project, couldn't keep up with all the people asking if they, too, could have a free gray cat in their game.

"With the amount of messages coming in, I wondered how I could continue helping people, but on a larger scale," he told Polygon over Twitter messages.

Publisher: Polygon
Date: 2020-06-22T14:16:18-04:00
Author: Patricia Hernandez
Twitter: @Polygon
Reference: (Read more) Visit Source



Microsoft: These hackers got from a broken password to full control of a network - in just days |

In particular, the Microsoft team identified the group it calls Holmium as among the most effective in using cloud-based attack vectors of all those -- including organised crime and nation-state backed hackers -- that it tracks.

But many of Holmium's recent attacks have involved a penetration testing tool called Ruler used alongside compromised Exchange credentials. The researchers said the hacking group has been running cloud-based attacks with Ruler since 2018, with another wave of such attacks in the first half of 2019.

logo
Publisher: ZDNet
Author: Steve Ranger
Twitter: @ZDNet
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment