Just as school was to start this semester, technology chief Tony Brooks rushed to his office in Athens, Texas. Colleagues said they were unable to access the school district's network.
Quite a lot has been going on:
The best gifts for hackers | ZDNet
Looking for the perfect gift this holiday season? Here's a great lineup of gift ideas and resources to get you started.
While hackers are often associated with criminal acts and interest in hacking may not be encouraged -- especially at younger ages -- the difference between white hat and black hat activities is important to remember.
These days, with cyberattacks increasing in scope and complexity, we need professional, ethical hackers to help protect the day-to-day services we all use, and when it comes to younger people especially with an interest in this field, a gift or two to encourage their entry into this world could be a great idea this holiday season.
Hackers access Texas driver's license data - ABC13 Houston
Akropolis DeFi protocol 'paused' as hackers get away with $2M in DAI
Hackers were reportedly able to exploit savings pools at Gibraltar-based decentralized finance protocol Akropolis, getting away with more than $2 million in stablecoins.
The firm stated on Twitter on Nov. 12 that it had identified a hack "executed across a body of smart contracts in the savings pools." Akropolis said the areas targeted by the hackers had already been audited twice, and only included "Curve Y and Curve sUSD savings pools."
Ethereum blockchain records show the hackers got away with more than 2,030,850 Dai by exploiting these savings pools. They then moved the funds to a different address.
In case you are keeping track:
Animal Jam Hacked, 46M Records Roam the Dark Web | Threatpost
Animal Jam, just the latest in a string of attacks on gaming apps, has adopted a transparent communications strategy after stolen data turned up on a criminal forum.
The company behind the wildly popular kids’ game Animal Jam has announced that hackers stole a menagerie of account records during a breach of a third-party vendor’s server in October — more than 46 million of them, in fact.
The company, WildWorks, said that it was unaware that the data had been compromised, until 7 million records turned up on an underground forum used by malicious actors to distribute lifted data, on Nov. 11.
How Hackers Blend Attack Methods to Bypass MFA
Many security experts recommend multifactor authentication (MFA) to prevent unauthorized access to protected accounts. It's a key security measure for mobile apps, but it's not a silver bullet. Hackers are getting better at defeating second- and third-layer security protections like MFA.
* * *
Plus, earlier this year we saw the emergence of the Eventbot malware, which targets mobile banking apps and often masquerades as a well-known app (like Microsoft or Adobe). It can intercept SMS messages to obtain MFA codes for account takeovers and data theft. Newer and more sophisticated variants continue to pop up thanks to auto-update capabilities.
Windows 10, iOS, Chrome, and many others fall at China's top hacking contest | ZDNet
Many of today's top software programs have been hacked using new and never-before-seen exploits at this year's edition of the Tianfu Cup — China's largest and most prestigious hacking competition.
Held in the city of Chengdu, in central China, the third edition of the Tianfu Cup ended earlier today.
"Many mature and hard targets have been pwned on this year's contest," organizers said today. Successful exploits were confirmed against:
Google Patches 2 Severe Chrome Flaws Being Exploited by Hackers | PCMag
On Wednesday, the company released a patch for the previously unknown vulnerabilities, which it uncovered with the help of an anonymous tip. According to Google, exploits for both flaws “exist in the wild,” meaning hackers have developed the means to weaponize them.
"These vulnerabilities can be exploited if a user visits, or is redirected to, a specially crafted web page," wrote the Center for Internet Security in a warning. “Depending on the privileges associated with the application, an attacker could view, change, or delete data.”
Happening on Twitter
Guys, I am still a new Democrat, I've only been a member since 2019. I care about putting accurate information beca… https://t.co/VD2WLrqcDF davidmweissman (from Palm Bay, FL) Thu Nov 12 17:09:24 +0000 2020
MHRA urgently seeks an Artificial Intelligence (AI) software tool to process the EXPECTED HIGH VOLUME OF #Covid19 V… https://t.co/PyYJ1aP7B2 Jimcorrsays Thu Nov 12 14:32:49 +0000 2020
No comments:
Post a Comment