Free Republic 3rd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $27,615
31%  
Woo hoo!! And the first 31% is in!! Thank you all very much!! God bless.

Keyword: hackers

Brevity: Headers | « Text »
  • Julian Assange: 'A lot more material' coming on US elections

    07/26/2016 4:56:02 PM PDT · by Beave Meister · 50 replies
    CNN ^ | 7/26/2016 | Matthew Chance
    (CNN)Wikileaks founder Julian Assange said Tuesday his whistleblowing website might release "a lot more material" relevant to the US electoral campaign. Assange was speaking in a CNN interview following the release of nearly 20,000 emails stolen from the Democratic National Committee by suspected Russian hackers. However, Assange refused to confirm or deny a Russian origin for the mass email leak, saying Wikileaks tries to create ambiguity to protect all its sources. "Perhaps one day the source or sources will step forward and that might be an interesting moment some people may have egg on their faces. But to exclude certain...
  • Democrats Accuse Russia Of Hacking DNC Server To Help Donald Trump [IMPORTANT INFO]

    07/25/2016 1:12:36 AM PDT · by ScaniaBoy · 88 replies
    ZeroHedge ^ | July 24, 2016 | Tyler Durden
    In the aftermath of the fallout from the DNC server hack, the Democrats have been scrambling how to redirect public anger (especially among Bernie Sanders supporters) from the revelations that not only did the Democratic party try everything in its power to sabotage Bernie Sanders presidential bid, but also colluded with various "impartial" media outlets as well as breach fundraising rules in the process. And, as of this morning, it appears that the solution they have decided upon is not to explain or even justify the scandalous actions, but to simply blame Russia for the hack. [SNIP] Except... there is...
  • Maxthon Browser Sends Sensitive Data to China (!)

    07/14/2016 9:33:55 PM PDT · by Utilizer · 9 replies
    SecurityWeek ^ | July 14, 2016 | Eduard Kovacs
    ... Developed by China-based Maxthon International, the browser is available for all major platforms in more than 50 languages. In 2013, after the NSA surveillance scandal broke, the company boasted about its focus on privacy and security, and the use of strong encryption. Researchers at Fidelis Cybersecurity and Poland-based Exatel recently found that Maxthon regularly sends a file named ueipdata.zip to a server in Beijing, China, via HTTP. Further analysis revealed that ueipdata.zip contains an encrypted file named dat.txt. This file stores information on the operating system, CPU, ad blocker status, homepage URL, websites visited by the user (including online...
  • Comey: "probably hacked" (In other news, Russian universities dominate in 2016 hacking competition).

    07/06/2016 7:47:59 PM PDT · by AC Beach Patrol · 26 replies
    The New York Times ^ | 7/6/16 | David Sanger
    "When the F.B.I. director, James B. Comey, said on Tuesday that his investigators had no “direct evidence” that Hillary Clinton’s email account had been “successfully hacked,” both private experts and federal investigators immediately understood his meaning: It very likely had been breached, but the intruders were far too skilled to leave evidence of their work."
  • EXCLUSIVE: Hillary Clinton's emails packed with America's secrets were stored by company

    06/30/2016 4:33:37 PM PDT · by orchestra · 28 replies
    Daily Mail ^ | 6/30/2016 | Louise Boyle
    (Full title): EXCLUSIVE: Hillary Clinton's emails packed with America's secrets were stored by company 'wide open to hackers' and run by 'morons' whistleblowers reveal Hillary Clinton's secret 'homebrew' server has dogged her presidential campaign and led to an FBI probe into her handling of classified material Questions have been raised over whether the secrets could have been hacked by foreign spies because server lacked official protection Now Daily Mail Online investigation reveals how firm which stored her backed up emails was dogged by security lapses Datto Inc, of Norwalk, CT, was paid to 'mirror' the server by 'mom-and-pop' IT firm...
  • Hackers use Google to find website vulnerabilities

    02/23/2008 12:30:32 PM PST · by george76 · 29 replies · 396+ views
    Agence France Presse ^ | Feb 22, 2008
    Infamous computer hacker group Cult of the Dead Cow (CDC) said Friday it is offering a software tool that lets people use Google to scan websites for security flaws. CDC says a "Goolag Scanner" program based on work done by a hacker using the name "Johnny I Hack Stuff" is available for free download at its website. The tool lets people with fundamental programming skills check websites or Internet domains for weaknesses that could be exploited by hackers, according to CDC. The group said it uncovered "some pretty scary holes" through random tests of the tool in North America, Europe,...
  • How to surf anonymously without a trace

    03/13/2007 6:29:37 AM PDT · by ShadowAce · 93 replies · 19,520+ views
    ComputerWorld ^ | 12 March 2007 | Preston Gralla
    The punchline to an old cartoon is "On the Internet, nobody knows you're a dog," but these days, that's no longer true. It's easier than ever for the government, Web sites and private businesses to track exactly what you do online, know where you've visited, and build up comprehensive profiles about your likes, dislikes and private habits. And with the federal government increasingly demanding online records from sites such as Google and others, your online privacy is even more endangered. But you don't need to be a victim. There are things you can do to keep your surfing habits anonymous...
  • Clinton Foundation Said to Be Breached by Russian Hackers

    06/23/2016 3:40:42 PM PDT · by Innovative · 24 replies
    Newsmax ^ | June 23, 2016 | Newsmax
    The Bill, Hillary and Chelsea Clinton Foundation was among the organizations breached by suspected Russian hackers in a dragnet of the U.S. political apparatus ahead of the November election, according to three people familiar with the matter. The attacks on the foundation’s network, as well as those of the Democratic Party and Hillary Clinton’s presidential campaign, compound concerns about her digital security even as the FBI continues to investigate her use of a personal e-mail server while she was secretary of state.
  • New Homeland Security Records Reveal Top Officials Were Exempted from Strict Ban Placed on Web-...

    06/16/2016 2:03:44 PM PDT · by jazusamo · 12 replies
    Judicial Watch ^ | June 16, 2016
    Full title: New Homeland Security Records Reveal Top Officials Were Exempted from Strict Ban Placed on Web-Based Personal Email Accounts Despite Heightened Security Concerns Jeh Johnson granted special waiver on first day of official ban. Practice Continued Even After Clinton Email Revelations. (Washington, DC) – Judicial Watch today announced it obtained 693 pages of Department of Homeland Security records revealing that Secretary Jeh Johnson and 28 other agency officials used government computers to access personal web-based email accounts despite an agency-wide ban due to heightened security concerns. The documents also reveal that Homeland Security officials misled Rep. Scott Perry (R-PA)...
  • Hackers Hijack ISIS Twitter Accounts with Gay Porn after Orlando Attack

    06/15/2016 3:38:06 PM PDT · by John Robinson · 47 replies
    News Week ^ | 6/14/16 AT 1:26 PM | Anthony Cuthbertson
    Twitter accounts belonging to supporters of the Islamic State militant group (ISIS) have been hacked in the wake of the Orlando shooting, with jihadist content replaced with gay pride messages and links to gay pornography.
  • ISIS Announced Florida Threat THREE Days Ago: “We Will Attack Florida”

    06/12/2016 9:11:30 AM PDT · by bobsunshine · 54 replies
    Gateway Pundit ^ | June 12, 2016 | Jim Hoft
    ...Shoebat.com reported on the threat three days ago. ISIS Muslim terrorists released a statement on their plan to attack Florida, and even put out a list with the names of people in Florida that they plan on killing. According to one report: “ A pro-Isis group has released a hit list with the names of more than 8,000 people mostly Americans. More than 600-people live in Florida, and one security expert believes that many of those targeted live in Palm Beach County and on the Treasure Coast. The “United Cyber Caliphate” that hacked U.S. Central Command, 54,000 Twitter accounts and...
  • State Department: Don’t Ask Hillary Aides About Classified Info in Lawsuit

    04/06/2016 7:40:27 AM PDT · by MaxistheBest · 17 replies
    The Daily Beast ^ | 04/06/2016 | Shane Harris
    Lawyers object to any attempt to ask Huma Abedin, Cheryl Mills, and others about how information was handled—and are dead set against Clinton testifying. Lawyers for the State Department want to limit the types of questions that a watchdog group can ask former aides to Hillary Clinton, and potentially the former secretary of state herself, about her creation and use of a private email system while she was in office. The department asked a federal judge Tuesday night to grant “limited discovery” to Judicial Watch, a conservative watchdog group that wants to depose some of Clinton’s closest associates and staffers....
  • EXCLUSIVE: Hillary Clinton Posted Names of Hidden Intelligence Officials On Her Email

    06/02/2016 6:46:16 PM PDT · by blueyon · 136 replies
    breitbart.com ^ | 6/02/16 | by Patrick Howley
    Hillary Clinton posted and shared the names of concealed U.S. intelligence officials on her unprotected email system. Federal records reveal that Clinton swapped these highly classified names on an email account that was vulnerable to attack and was breached repeatedly by Russia-linked hacker attempts. These new revelations — reminiscent of the Valerie Plame scandal during George W. Bush’s tenure — could give FBI investigators the evidence they need to make a case that Clinton violated the Espionage Act by mishandling national defense information through “gross negligence.”
  • Clinton, aides tried to use wireless devices in secure areas

    06/02/2016 10:54:32 AM PDT · by Red Badger · 53 replies
    www.washingtontimes.com ^ | Wednesday, June 1, 2016 | By Bill Gertz
    Former Secretary of State Hillary Clinton and her aides tried to use personal hand-held electronic devices inside areas used to store classified information, according to the just-released State Department inspector general report. The Bureau of Diplomatic Security, the State Department’s security arm, told the inspector general that in March 2009 Mrs. Clinton rejected an offer from security officials to provide her with a secure government smartphone. “DS was informed that Secretary Clinton’s staff had been asking to use BlackBerry devices inside classified areas,” said the report, released late last month. Another portion of the inspector general’s report states that Mrs....
  • Hacking of Florida elections websites brings criminal charges

    05/05/2016 3:11:52 PM PDT · by Beautiful_Gracious_Skies · 13 replies
    Herald Times / Tallahassee bureau ^ | May 5, 2016 | Steve Bousquet
    The young cybersleuth says he exposed security lapses on Florida elections websites, but the state says he committed a crime. David Levin, 31, of Estero, a political consultant and owner of a computer security firm, was booked Wednesday on three felony charges of unauthorized access to computer systems. Each count carries a maximum five-year prison sentence. The Florida Department of Law Enforcement said Levin illegally gained internal access to websites of the state Division of Elections and the Lee County elections office, which together hold data on more than 12 million Florida voters. FDLE said that after Levin gained access...
  • Islamic State-linked hackers post target list of New Yorkers

    04/29/2016 4:36:16 PM PDT · by StCloudMoose · 15 replies
    reuters ^ | 4/29/16
    A group of hackers linked to Islamic State has posted online a list of thousands of New York residents and urged followers of the militant group to target them, according to a source with knowledge of the matter. Federal agents and New York City police officers have been contacting the individuals on the list to inform them of the posting, but the source said law enforcement does not believe there is any credible threat. In a statement, the Federal Bureau of Investigation said, "While our standard practice is to decline comment on specific operational and investigative matters, the FBI routinely...
  • Apple remains in dark on how FBI hacked iPhone without help

    03/30/2016 5:56:43 AM PDT · by rktman · 117 replies
    townhall.com ^ | 3/30/2016 | Tami Abdollah
    The FBI's announcement that it mysteriously hacked into an iPhone is a public setback for Apple Inc., as consumers learned that they can't keep the government out of even an encrypted device that U.S. officials had claimed was impossible to crack. Apple, meanwhile, remains in the dark about how to restore the security of its flagship product. The government said it was able to break into an iPhone used by a gunman in a mass shooting in California, but it didn't say how. That puzzled Apple software engineers — and outside experts — about how the FBI broke the digital...
  • The Anonymous ‘leak’ of Donald Trump’s cell phone and SSN are nothing new

    03/18/2016 10:39:14 AM PDT · by detective · 10 replies
    MSN News ^ | 18 Mar 2016 | Paul Szoldra
    Hacker collective Anonymous claimed to have leaked Donald Trump's private details on Thursday, but most of the dump was already publicly-available or made so last year. "We have attached a gift of sorts," says a computer-generated voice in a new video claiming to be from Anonymous. "Trump's social security number, cell phone number, and other details that might be able to assist you all in independently investigating this would-be dictator. These are provided for informational purposes only."
  • OpTrump: Donald Trump faces 'total war' from Anonymous cyberattacks on April Fools' Day

    03/14/2016 2:36:52 PM PDT · by markomalley · 16 replies
    International Business Times ^ | 3/14/16 | Jason Murdock
    Hackers affiliated with the Anonymous hacktivist collective have vowed to relaunch cyber-operations against US presidential candidate Donald Trump from 1 April. They threaten to 'dismantle his campaign' by taking his election websites offline in a large-scale and orchestrated distributed denial-of-service (DDoS) attack.In December 2015, Anonymous officially 'declared war' on Trump after a radical speech in which he said Muslims should be banned from entering the United States. The operation at the time resulted in a number of websites being targeted by hackers, but failed to have lasting impact. Why advertise with us A new video statement has been posted to...
  • How a $1 Billion Bank Heist Was Thwarted by a Typo

    03/10/2016 2:23:32 PM PST · by nickcarraway · 4 replies
    KFOR ^ | MARCH 10, 2016
    South Korean Economy Boosted As Won Jumps To New High Hackers helped themselves to $81 million after breaching Bangladesh Bank’s systems between Feb. 4 and Feb. 5—but the massive theft could have been far worse if not for a typo. After successfully transferring $81 million from the bank’s account at the Federal Reserve Bank of New York to entities in the Philippines, the hackers tried to transfer another $20 million to a Sri Lankan nonprofit, only they wrote “fandation” rather than “foundation” as part of its name, an official tells Reuters. While the Fed grew suspicious, routing bank Deutsche Bank...
  • Hollywood Hospital Succumbs to Hacker Shakedown

    02/19/2016 9:44:19 PM PST · by iowamark · 11 replies
    TechNewsWorld ^ | Feb 19, 2016 | John P. Mello Jr.
    Hollywood Presbyterian Medical Center on Wednesday announced that it paid approximately US$17,000 to resume normal operations after digital extortionists knocked its computer systems offline. The Los Angeles hospital discovered its computer network infected with ransomware earlier this month. Ransomware is a form of malware that scrambles data and key files on a system and demands a ransom be paid for a digital key to unscramble the data. After paying a ransom of 40 bitcoins, or $17,000, to the extortionists, the hospital was able to bring its electronic medical record system online, HPMC said. Bitcoins are a digital currency favored by...
  • Hackers break into more than 20 million accounts on China's largest marketpla

    02/04/2016 8:22:29 PM PST · by aimhigh · 1 replies
    Mashable ^ | 02/04/2016 | Victoria Ho
    One of China's largest web companies suffered a massive hacking attack last year, its owner said Thursday. Hackers managed to gain access to 20.59 million user accounts on Taobao. The attack on China's largest marketplace happened in October last year, where criminals managed to obtain a database of 99 million usernames and passwords for Taobao, according to Reuters. Taobao is the 12th most popular site in the world, and ranks third in China. It has an estimated 265 million registered users, and is China's equivalent of eBay.
  • Michael Savage: Draft tech workers to help defeat ISIS

    01/28/2016 4:36:12 AM PST · by ObamahatesPACoal · 16 replies
    WND ^ | 12/17/2015
    (Copyright)
  • Ukraine Goes Dark: Russia-Attributed Hackers Take Down Power Grid

    01/14/2016 7:26:19 AM PST · by Pan_Yan · 7 replies
    The Daily Signal ^ | January 13, 2016 | Riley Walters
    As many as 80,000 residents in western Ukraine lost power for six hours on Dec. 23. Cybersecurity firms SANS ICS and iSight Partners have attributed the blackout to Russian hacking group Sandworm and its malicious software, BlackEnergy 3. Cyberattacks on power grids and other critical infrastructure are not new, but this most recent attack seems to be the first use of cyber as a weapon with kinetic effects during an ongoing conflict, highlighting the growing importance of cybersecurity. While an analysis of the cyberattack is ongoing, BlackEnergy has a history of targeting information control systems. For the Prikarpattiaoblenergo electric company...
  • Drug Cartels Are Hacking US Border Patrol Drones

    01/01/2016 1:03:33 PM PST · by KeyLargo · 28 replies
    NEWS Softpedia ^ | JAN 1, 2016 | By Catalin Cimpanu
    Drug Cartels Are Hacking US Border Patrol Drones Border patrol drones are vulnerable to GPS spoofing attacks The US Department of Homeland Security (DHS) and the US Customs and Border Protection (CBP) agency are reporting on incidents where drug traffickers have hacked unmanned air vehicles (UAVs, drones) in order to illegally and secretly cross the US-Mexican border. UAVs have become a common presence in the US military, but they have also spread to other US law enforcement agencies like local police and border patrol. Unlike their military counterparts, which cost millions of dollars, the drones used by other law enforcement...
  • California traffic sign hacked to display pro-Trump message

    12/28/2015 9:45:48 AM PST · by GonzoII · 18 replies
    washingtonexaminer.com ^ | 12/28/15 11:58 AM | Gabby Morrongiello
    Rather than encouraging motorists to avoid drinking and driving, a traffic sign in Southern California was recently hacked to display an unusual message: "Vote Donald Trump." A husband and wife first noticed the pro-Trump digital advisory, positioned just off the side of Interstate 15 in Corona, Calif., on their way home from the movies on Christmas day, a local news station reported Monday. The full text of the traffic sign reads: "Inland Empire supports Donald Trump. Merry Xmas. Vote Donald Trump." A spokesperson for California's Department of Transportation declined to specify whether the sign supporting the Republican front-runner was...
  • Are Isis hackers trying to destroy the internet?

    12/17/2015 1:21:35 AM PST · by Libloather · 8 replies
    International Business Times via MSN ^ | 12/17/15 | Anthony Cuthbertson
    A smartphone app used by Islamic State (Isis) to spread news and propaganda could be behind the massive attack on the internet's core infrastructure that took place earlier this month, according to several cybersecurity experts. Analysis of the IS Amaq Agency app has revealed that it was potentially the source of a botnet created to perform a massive DDoS (distributed denial of service) attack on root name servers. A more powerful attack in the future could cause significant disruption to internet services and could even temporarily take down the internet. **SNIP** Until recently, the cyber capabilities of IS have been...
  • Hackers trace ISIS Twitter accounts back to internet addresses linked to ..

    12/15/2015 1:41:11 PM PST · by MeshugeMikey · 8 replies
    Mirror ^ | December 15, 2015 | JASPER HAMILL
    Full Title: Hackers trace ISIS Twitter accounts back to internet addresses linked to ..Department of Work and Pensions Teenage computer experts unveil astonishing web of unpublicised interactions linking extremist social media mouthpieces to the British government. Hackers have claimed that a number of Islamic State supporters' social media accounts are being run from internet addresses linked to the Department of Work and Pensions. A group of four young computer experts who call themselves VandaSec have unearthed evidence indicating that at least three ISIS-supporting accounts can be traced back to the DWP's London offices.
  • Vanity: Identity Theft Protection Services

    12/07/2015 6:40:51 PM PST · by Jed Eckert · 35 replies
    12/7/2015 | self
    Ok Freepers, so my question is are these services (LifeLock and others) worth it? Or are they just a waste of money? Can anyone recommend a particular one based on personal experiences? Reason I ask is one of my credit cards was apparently hijacked today. No fraudulent charges but they did manage to change my profile info and password for online access. Received an email from the bank saying my personal info was changed and if I didn't do the changes contact the bank at the number on the card. Sure enough they had successfully changed all the info including...
  • Hackers Take Over Indiana (PA) County's Website

    11/22/2015 4:51:21 AM PST · by knarf · 3 replies
    The Indiana Gazette ^ | Novemner22, 2015
    A local FReeper e-mailed this to me this morningThere IS cause for alarm
  • ISIS guides followers on how to hide online with 34-page manual ( Islamic State )

    11/18/2015 5:03:53 PM PST · by george76 · 24 replies
    The Hill ^ | 11/18/15 | Cory Bennett
    The Islamic State in Iraq and Syria (ISIS) uses a 34-page manual to instruct its followers on how to stay invisible on the Internet. The Arabic document was translated and released this week by analysts at the Combating Terrorism Center, an independent research group at the U.S. Military Academy at West Point. It includes warnings to avoid Instagram because it is owned by Facebook, and Dropbox because former secretary of State Condoleezza Rice sits on its board of investors. Famous government leaker Edward Snowden has also criticized Dropbox over its privacy, the document notes. Users are also directed to use...
  • Hacking group Anonymous disables thousands of pro-ISIS Twitter accounts

    11/18/2015 10:42:22 AM PST · by COUNTrecount · 13 replies
    Daily Mail UK ^ | November 18,2015
    Hacking group Anonymous disables thousands of pro-ISIS Twitter accounts and taking militant websites offline Anonymous have stepped up their campaigns against the Islamic State They declared war on the jihadis in the wake of the Paris terrorist attacks One group claims to have suppressed over 10,000 social media pages Some have posed as recruits to gain information on the Dark Web Head of the Ghost Security Group said they are playing an intelligence role The volunteer organization has been sending data to the FBI and other agencies via Congressional terrorism adviser, Michael S. Smith II Islamic State sympathizers using social...
  • Here's how hackers can remotely access, control Siri, Google Now from 16 feet away (iphone/android)

    10/16/2015 9:14:16 AM PDT · by Vision Thing · 8 replies
    New York Daily News ^ | October 15, 2015 | Khier Casino
    Apple's Siri will listen to anyone — even hackers. French researchers have discovered a way to remotely gain access to Siri and Google Now on iOS and Android, respectively. The research team from ANSSI — a French government agency specializing in information security — were then able to control the intelligent personal assistants by using headphones with built-in microphones as antennas. Hackers could use radio waves transmitted from the antenna of the headphones to eavesdrop on private conversations, send the device browser to a malware site or shoot spam and phishing messages through email and social media sites — such...
  • Russians Tried To Hack Hillary Five Times

    10/05/2015 7:07:44 AM PDT · by Sean_Anthony · 9 replies
    Canada Free Press ^ | 10/05/15 | Matthew Vadum
    Hackers got malware-infected email through to the then-secretary of state. Hackers linked to Vladimir Putin’s Russia tried to gain access to Hillary Clinton’s insecure private email account at least five times while the Democrat presidential candidate served as U.S. secretary of state. The disturbing revelation comes months after retired U.S. Army Lt. Gen. Michael Flynn said the chances Clinton’s private email account was hacked were “very high.” At the time the former top Obama administration intelligence official implied Clinton should have been fired as the nation’s top diplomat. “As a military officer, if I said I was doing something for...
  • Scottrade says victim of hackers who targeted financial firms

    10/03/2015 8:05:53 AM PDT · by WhiskeyX · 7 replies
    Reuters ^ | Fri Oct 2, 2015 4:01pm EDT | (Reporting by Diane Bartz and Jim Finkle; Editing by Meredith Mazzilli and Christian Plumb)
    Discount broker Scottrade said on Friday that it was the victim of a cyber attack from late 2013 to early 2014 that compromised client names and addresses in a database with information on some 4.6 million customers. The firm said it learned about the attack from federal law enforcement officials who were investigating the theft of data from Scottrade and other financial services firms. The company did not identify other potential victims. FBI officials could not be reached for comment.
  • Clinton private account targeted in Russia-linked email scam

    10/01/2015 1:45:16 AM PDT · by Olog-hai · 6 replies
    Associated Press ^ | Oct. 1, 2015 3:36 AM EDT | Bradley Klapper, Jack Gillum and Stephen Braun
    Russia-linked hackers tried at least five times to trick Hillary Rodham Clinton into infecting her computer systems while she was secretary of state, newly released emails show. It is unclear whether she was fooled into clicking any attachments to expose her account. Clinton received the virus-riddled emails, disguised as speeding tickets from New York, over four hours early on the morning of Aug. 3, 2011. The emails instructed recipients to print the attached tickets—and opening them would have allowed hackers to take over control of a victim’s computer. Security researchers who analyzed the malicious software in September 2011 said that...
  • Office of Personnel Mgmt: 5.6M estimated to have fingerprints stolen in breach

    09/23/2015 11:56:09 AM PDT · by 2ndDivisionVet · 4 replies
    CNBC ^ | September 23, 2015 | Everett Rosenfeld
    The Office of Personnel Management announced Wednesday that 5.6 million people are now estimated to have had their fingerprint information stolen. That number was originally thought to be about 1.1 million, OPM said in a statement. About 21.5 million individuals had their Social Security Numbers and other sensitive information affected by the hack. According to OPM, "federal experts believe that, as of now, the ability to misuse fingerprint data is limited." The office acknowledged, however, that future technologies could take advantage of this information. An interagency working group—to include FBI, Department of Homeland Security and Defense Department representatives—plans to review...
  • IRS 'believes' massive data theft originated in Russia

    05/28/2015 4:55:03 AM PDT · by CharlesOConnell · 14 replies
    CNN ^ | 8/27/2015 | Chris Frates
    The IRS "believes" that a major cyber breach that allowed criminals to steal the tax returns of more than 100,000 people originated in Russia, two sources briefed on the data theft tell CNN. On Tuesday, the Internal Revenue Service announced that organized crime syndicates used personal data obtained elsewhere to access tax information, which they then used to file $50 million in fraudulent tax refunds.
  • Hackers Stole Secrets of U.S. Government Workers’ Sex Lives

    06/25/2015 10:02:35 AM PDT · by Zakeet · 54 replies
    Daily Beast ^ | June 24, 2015 | Shane Harris
    Infidelity. Sexual fetishes. Drug abuse. Crushing debt. They’re the most intimate secrets of U.S. government workers. And now they’re in the hands of foreign hackers. It was already being described as the worst hack of the U.S. government in history. And it just got much worse. A senior U.S. official has confirmed that foreign hackers compromised the intimate personal details of an untold number of government workers. Likely included in the hackers’ haul: information about workers’ sexual partners, drug and alcohol abuse, debts, gambling compulsions, marital troubles, and any criminal activity. Those details, which are now presumed to be in...
  • Hackers Steal 225,000 Apple Account Logins From Jailbroken iPhones

    09/02/2015 5:12:09 AM PDT · by Enlightened1 · 2 replies
    Epoch Times ^ | 08/31/15 | Jonathan Zhou, Epoch Times
    A recently discovered group of malware that infects jailbroken iPhones has gathered the login information for more than 225,000 Apple accounts, and is believed to be one of the largest breaches of Apple accounts ever. The malware, dubbed KeyRaider by its discoverer, found its way to victims via websites that hosted repositories of Cydia software. Cydia is an app that allows users of jailbroken iOS devices to access software and apps locked phones can’t normally access. The malware then steals Apple account information by intercepting iTunes traffic from the device. Palo Alto Networks (PAN) and WeipTech, which found the vulnerability,...
  • Hackers Finally Post Stolen Ashley Madison Data

    08/18/2015 4:20:29 PM PDT · by Crazieman · 23 replies
    Wired | 8/18/2015 | Kim Zetter
    http://www.wired.com/2015/08/happened-hackers-posted-stolen-ashley-madison-data/ Wired link, can't post excerpt.
  • Mideast hackers target U.S. gas pumps

    08/12/2015 3:51:04 AM PDT · by afraidfortherepublic · 7 replies
    The Washington Examiner ^ | 8-12-15 | John Siciliano
    Hackers from Syria and Iran are on the prowl to hold a neighborhood or city's gasoline supply up for ransom, or, worse, cause it to spill and explode, with Washington being high on the target list, according to a new report. The report, issued over the weekend by a group of digital security sleuths, found that a number of groups, including the notorious Syrian Electronic Army — known for hacking news groups — are looking for soft targets they can take control of easily through the Internet, and use to cause a variety of mayhem. The report shows that retail...
  • They Shoot Horses Don’t They?

    08/13/2015 6:31:26 AM PDT · by NOBO2012 · 7 replies
    Michelle Obama's Mirror ^ | 8-13-2015 | MOTUS
    Storyline: Gloria is a young woman of the Depression. She has aged beyond her years and feels her life is hopeless, having been cheated and betrayed many times in her past. While recovering from a suicide attempt, she gets the idea from a movie magazine to head for Hollywood to make it as an actress. Robert is a desperate Hollywood citizen trying to become a director, never doubting that he'll make it. Robert and Gloria meet and decide to enter a dance marathon, one of the crazes of the thirties. The grueling dancing takes its toll on Gloria's already weakened...
  • What’s Safer From Hackers: A PC or a Mac?

    08/10/2015 2:23:13 AM PDT · by Leaning Right · 86 replies
    Yahoo! ^ | August 7, 2015 | Sean Captain
    Apple’s vaunted reputation for safety and security has taken some hits recently. Just this week came news of DYLD_PRINT_TO_FILE — a bug in Apple’s OS X operating system that has allowed a malicious program to take complete control of Macs. *snip* When it comes to security flaws, Windows and OS X are now about tied, says Morey Haber, VP of technology at corporate security software maker BeyondTrust.
  • Anonymous to Protest Saturday in 35 US Cities — Threaten Cops, ‘No Mercy for Murderers’

    08/08/2015 2:35:46 PM PDT · by 2ndDivisionVet · 33 replies
    Breitbart Texas ^ | August 8, 2015 | Lana Shadwick
    A YouTube video message purportedly by the group Anonymous has issued a warning for U.S. police chiefs, Waller County police, and in particular, the Waller County Sheriff’s Department. In a threatening demand, the group told the Waller Sheriff’s Office, “We all know where you live. No mercy for murders.” The group plans protests in 35 cities throughout the U.S. on Saturday, August 8th. They pledge on August 8th to “rage against the corrupted system that killed Sandra Bland and continues to commit injustice across this country.” The group demands that Texas DPS trooper Brian Encinia, who stopped and arrested Bland...
  • Russia hacks Pentagon computers: NBC, citing sources

    08/06/2015 11:59:55 AM PDT · by gwjack · 18 replies
    CNBC.com ^ | 8/6/15 | Staff
    fficials tell NBC News that Russia launched a "sophisticated cyberattack" against the Pentagon's Joint Staff unclassified email system which has been shut down and taken off line for nearly two weeks. According to the officials, the "sophisticated cyber intrusion" occurred sometime around July 25 and affected some 4-thousand military and civilian personnel work for the Joint Chiefs of Staff. This story is developing. Please check back for further updates.
  • Hackers are installing malware on Macbooks — and there’s nothing you can do to stop them

    08/04/2015 8:54:07 AM PDT · by SeekAndFind · 37 replies
    Business Insider ^ | 08/04/2015 | Alastair Stevenson
    Researchers have spotted a wave of attacks targeting Macbook users.Hackers are exploiting a critical vulnerability in Apple’s OS X operating system to install malware on Macbooks.Malwarebytes Apple security expert Thomas Reed reported uncovering the attacks in a threat advisory.The vulnerability was uncovered by security researcher Stefan Esser at the end of July. It relates to the way Apple OS X version 10.10 logs software errors and can be used by hackers to forcibly install software on Macbooks.Reed said the current attacks targeting the flaw install a variety of malicious programs. These include the VSearch and Genio adwares and MacKeeper junkware.Adware...
  • Researcher says can hack GM's OnStar app, open vehicle, start engine

    07/30/2015 1:55:36 PM PDT · by Zakeet · 11 replies
    Reuters ^ | July 30, 2015 | Jim Finkle and Bernie Woodall
    A researcher is advising drivers to halt the use of a mobile app for General Motors Co's (GM.N) OnStar vehicle communications system, saying hackers can exploit a security flaw in the product to remotely unlock cars and start engines. "White-hat" hacker Samy Kamkar posted a video on Thursday saying he had figured out a way to "locate, unlock and remote-start" vehicles by intercepting communications between the OnStar RemoteLink mobile app and the OnStar service. Kamkar said he plans to provide technical details on the hack next week in Las Vegas at the Def Con conference, where tens of thousands of...
  • Hackers Remotely Kill a Jeep on the Highway—With Me in It

    07/21/2015 2:40:25 PM PDT · by Pelham · 34 replies
    Youtube ^ | July 21, 2015 | Andy Greenberg
    Are modern computer-heavy vehicles vulnerable to being hijacked by computer hackers? They are indeed, as computer security hasn't kept pace with what hackers can do.
  • Hacker remotely crashes Jeep from 10 miles away

    07/21/2015 9:51:38 AM PDT · by Zakeet · 70 replies
    (UK) Daily Telegraph ^ | July 21, 2015 | Daniel Bates
    Hackers took control of a car and crashed it into a ditch by remotely breaking into its systems from 10 miles away whilst sitting on their sofa. In the first such breach of its kind security experts cut out the engine and applied the brakes on the Jeep Cherokee, sending it into a spin. The US hackers said they used just a laptop and mobile phone to access the Jeep’s on-board systems via its wireless Internet connection. They claim that more than 470,000 cars made by Fiat Chrysler could be at risk of being attacked by similar means - including...