Friday, November 19, 2021

2 suspected Iranian hackers are charged with trying to intimidate U.S. voters : NPR

The covert effort to disrupt the 2020 election was publicly unmasked in October of last year when FBI Director Chris Wray and others held a news conference to say the authorities were aware of the Iranian actions. Now, two Iranians have been charged.

An indictment unsealed Thursday in New York charges Seyyed Kazemi and Sajjad Kashian with several counts including hacking conspiracy, voter intimidation and transmitting interstate threats.

logo
Publisher: NPR.org
Date: 2021-11-18
Twitter: @NPR
Reference: (Read more) Visit Source



Microsoft warning: Now Iran's hackers are attacking IT companies, too | ZDNet

Microsoft has raised an alarm about a massive surge in Iranian state-sponsored hacking attempts against IT services firms.

According to Microsoft, attacks from state-sponsored Iranian hackers on IT services firms were virtually non-existent in 2020, but this year exceeded 1,500 potential attacks.

logo
Publisher: ZDNet
Author: Liam Tung
Twitter: @ZDNet
Reference: (Read more) Visit Source



Robinhood says hackers also got thousands of phone numbers - The Verge

Robinhood has revealed that "several thousand entries" in a list obtained by hackers included phone numbers, indicating that a November 3rd security breach compromised more information than the company originally reported.

Robinhood told Motherboard that it still believes information like Social Security, bank account, and debit card numbers weren't compromised, but that it's also analyzing "other text entries" in one of the lists the hackers obtained.

Publisher: The Verge
Date: 2021-11-17T12:42:30-05:00
Author: Mitchell Clark
Twitter: @verge
Reference: (Read more) Visit Source



How Hackers Use Payloads to Take Over Your Machine | eSecurityPlanet

A payload is a piece of code that executes when hackers exploit a vulnerability . In other words, it's an exploit module. It's usually composed of a few commands that will run on the targeted operating system (e.g., key-loggers) to steal data and other malicious acts.

And a payload can hide within a non-executable file such as an image and trigger later. Most people will be less reluctant to open .png than .zip or .exe files.

logo
Publisher: eSecurityPlanet
Date: 2021-11-19T02:38:46 00:00
Twitter: @eSecurityPlanet
Reference: (Read more) Visit Source



Taking Action Against Hackers in Pakistan and Syria | Meta

Today, we are sharing actions we've taken against four distinct groups of hackers in Pakistan and Syria over the past several months.

Meta’s threat intelligence analysts and security experts work to find and stop a wide range of threats including cyber espionage campaigns , influence operations and hacking of our platform by nation-state actors and other groups.

logo
Publisher: Meta
Date: 2021-11-16T14:30:38 00:00
Reference: (Read more) Visit Source



Lawmakers increasingly anxious about US efforts against Russian hackers | TheHill

Their concerns have increased in recent weeks as they heard mixed messages from key federal leaders on whether ransomware attacks tied back to Russian-based hackers have decreased since the two leaders met, undercutting the Biden administration's extensive efforts to strengthen the nation's

Biden put cybersecurity concerns at the center of his agenda during his in-person talk with Putin in Geneva earlier this year, and handed the Russian leader a list of 16 types of critical infrastructure in the U.S. that could not be attacked without risking retaliation.

Publisher: TheHill
Date: 2021-11-19T06:00:19-05:00
Author: Maggie Miller
Reference: (Read more) Visit Source



Betty Lin-Fisher: Here are some tips, secrets of professional hackers

I probably sound like a broken record when I say to be careful of scammers who are pretending to be authorities.

Every year, my parent company requires all employees to take various trainings, including one on cyber security.

Publisher: Akron Beacon Journal
Author: Betty Lin Fisher
Reference: (Read more) Visit Source



Missing Miles: Frequent flyer miles new target for hackers – WSVN 7News | Miami News,

(WSVN) - We've all been warned about hackers worming their way into our bank accounts, but now they have a new target. 7's Kevin Ozebek says you need to be on the look out for "Missing Miles."

With the holidays around the corner, travelers are looking forward to being with family and friends.

logo
Date: 2021-11-20T03:56:18Z
Author: Kevin Ozebek
Twitter: @wsvn
Reference: (Read more) Visit Source



Protect Yourself This Holiday Season From Hackers | News | nbcrightnow.com

YAKIMA, WA - With black Friday coming up and the holiday gift giving season right around the corner, hackers might be patiently waiting to get in to your networks.

Hackers know that many people will be out of the office during the holidays, so they probably wont be paying attention to little details on their electronics,

Publisher: NBC Right Now
Date: 0713B43387E696EA1A415814D82F3F41
Author: Sophia Lesseos
Twitter: @KNDUKNDO
Reference: (Read more) Visit Source



Here's How the Most Famous Hackers Pushed Computing to the Limits

Below, we're going to take a look at some of the most famous — or, depending on your viewpoint, infamous — hackers of all time. But first, let's delve into the history of hacking a little bit. 

You could argue that the idea of hacking began at the Massachusetts Institute of Technology during the 1950s and 60s, when the term "hack" was used for elegant or inspired solutions to problems. Many of these "hacks" were actually practical jokes.

Date: 2021-11-17T16:26:43-05:00
Twitter: @IntEngineering
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment