Keyword: hacking
-
The proposed changes to the CFAA and related laws, posted online by the White House early last week, would broaden the definition of computer crime and stiffen penalties for existing crimes, including doubling the maximum penalty for many violations from 10 years to 20 years. "Hanging out in an IRC chat room giving advice to people now makes you a member of a ‘criminal enterprise,’ allowing the FBI to sweep in and confiscate all your assets without charging you with a crime.”
-
Sharyl Attkisson was one of the most distinguished investigative journalists in television news, covering everything from the dangers of certain prescription drugs to mismanagement at the Red Cross to TARP to K Street. Over a career that spanned more than 20 years at CBS News, she received numerous awards for her work, including multiple Emmys. In her memoir Stonewalled: My Fight for Truth against the Forces of Obstruction, Intimidation, and Harassment in Obama’s Washington, Attkisson looks back on the final years of her network career. One concludes from her book that Attkisson encountered more difficulty practicing her profession at...
-
Last month, Senator Dianne Feinstein and other Democrats on the Senate Select Committee on Intelligence released the executive summary of their final report investigating the CIA's controversial detention and interrogation program. As part of their study, the Democrats compiled twenty case studies, which were intended to address claims made by the CIA regarding the efficacy of its interrogations. One of those case studies focused on the identification and arrest of Ali Saleh Kahlah al Marri, who was freed from a US prison just days ago. Al Marri served as a "sleeper" operative for al Qaeda inside the US in 2001....
-
It was a mere two months ago that Israeli cyber-security researchers hacked into a device that plugs into the diagnostic port of a car and determined they could remotely control the vehicle from anywhere in the world. At the time, the simulated attack seemed like the automotive version of a canary in a coal mine. If researchers could breach this one device, perhaps other aftermarket products that plug into diagnostic ports were also vulnerable? In short order, another cyber-security firm now reports finding serious flaws in a device used by more than 2 million motorists. Researchers at Florida-based Digital Bond...
-
Officials may have tracked down the leader of the group responsible for the not particularly harmful (but quite embarrassing) United States Central Command social media hack Monday, and the culprit may be none other than a 20-year-old Brit named Junaid Hussain. The avowed ISIS supporter who also goes by the moniker "TriCk" is believed to be behind the so-called Cyber Caliphate, which undertook the extremely strenuous task of guessing passwords to accounts CENTCOM wasn't smart enough to protect with two-step verification.The millennial has already served a stint in prison for leaking former British PM Tony Blair's personal information and photos....
-
DOVER, TN (WSMV) - The FBI is investigating a possible hacking by ISIS in Dover, TN. According to a report in the Stewart Houston Times, hackers posted some county documents on Twitter earlier this month. *snip* The report also said the hack may be related to the state and federal hacks pulled off by ISIS.
-
The troubling implications of the Central Command social media hacking In a coincidence many Americans may see as emblematic of the administration’s approach to global terror, President Obama was addressing the nation regarding cyber security Monday while hackers claiming to represent ISIS assumed control over the media accounts of the U.S. military’s Central Command (CENTCOM). “ISIS is already here, we are in your PCs, in each military base. With Allah’s permission we are in CENTCOM now,” said one tweet sent from CENTCOM’s account. The hacking of the Command’s Twitter and YouTube accounts began Monday afternoon and lasted approximately 30 minutes...
-
Call me a skeptic, but when I heard a report that the hack into "gov" web pages had come out of Maryland . . next to DC . . . next to the home of the CIA . . . well, that is just a little interesting. Especially if the administration uses this as a ruse to begin controlling security on the internet. As Glen Beck would say, "I'm just sayin."
-
A group calling itself the CyberCaliphate claimed responsibility for the hack. A Twitter account from a group identifying itself as Anonymous said Monday it had tracked the source of the hack to Maryland, but that was not confirmed by official sources.
-
Hackers claiming links to the Islamic State have hijacked several social media accounts belonging to U.S. military's Central Command. The hacking group, which calls itself "CyberCaliphate," is tweeting out what the group claims are U.S. military PowerPoints and data on retired Army personnel — seemingly sensitive files that have no business being publicly aired. The images are meant to show that the hackers have penetrated the Pentagon's network. But the chances of this actually having happened appear rather slim. Here's why. Much of the information being shared by Centcom's hijacked Twitter feed is publicly available from other sources and appears...
-
President Barack Obama will propose new legislation Tuesday aimed at fostering increased sharing between government agencies and the private sector to help improve cybersecurity. The legislation would encourage the private sector to share cyber threat information with the Department of Homeland Security's National Cybersecurity and Communications Integration Center, according to a White House fact sheet. Companies would qualify for targeted liability protection, but would have to comply with certain privacy restrictions.
-
Hacker group Anonymous have released a video and a statement via Twitter condemning the attacks on Charlie Hebdo, in which 12 people, including eight journalists, were murdered. The video description says that it is "a message for al-Qaeda, the Islamic State and other terrorists", and was uploaded to the group's Belgian account. In the clip, a figure wearing the group's symbolic Guy Fawkes mask is seated in front of a desk with the hashtag #OpCharlieHebdo - which stands for Operation Charlie Hebdo - featured on screen. The figure, whose voice is obscured says: "We are declaring war against you, the...
-
Former CBS News correspondent Sharyl Attkisson has sued the Justice Department over the hacking of her computers, officially accusing the Obama administration of illegal surveillance while she was reporting on administration scandals. In a series of legal filings that seek $35 million in damages, Attkisson alleges that three separate computer forensic exams showed that hackers used sophisticated methods to surreptitiously monitor her work between 2011 and 2013. "I just think it's important to send a message that people shouldn't be victimized and throw up their hands and think there's nothing they can do and they're powerless," Attkisson said in an...
-
Gotcha? 01.02.15 U.S. Spies Say They Tracked ‘Sony Hackers’ For Years American spies have detailed dossiers on the North Koreans who the U.S. says were behind the Sony attack. But the still-secret evidence likely won’t convince skeptics. The FBI and U.S. intelligence agencies for years have been tracking the hackers who they believe to be behind the cyber attack on Sony, according to current and former American officials. And during that long pursuit, U.S. agencies accumulated still-classified information that helps tie the hackers to the recent Sony intrusion. The Obama administration announced a round of sanctions against North Korea Friday,...
-
The risk is relatively low right now. But we must improve the security of future devices. We're living at the dawn of the age of the Internet of Things. Appliances ranging from light switches and door locks to cars and medical devices now boast internet connectivity. The convenience can't be beat. But what are the security and privacy implications? Is a patient implanted with a remotely controllable pacemaker at risk for security compromise? Vice President Dick Cheney's doctors worried enough about an assassination attempt via implant that they disabled his defibrillator's wireless capability. Should we expect capital crimes via hacked...
-
January 02, 2015 FoxNews.comThe Obama administration on Friday imposed a wave of sanctions against members of the North Korean government, amounting to the U.S. government's first official response to the cyber-attack against Sony Pictures Entertainment. Despite lingering questions from private security analysts over whether North Korea was responsible for the hack -- as the FBI has alleged -- the White House described the new sanctions as retaliation against Pyongyang. "We take seriously North Korea's attack that aimed to create destructive financial effects on a U.S. company and to threaten artists and other individuals with the goal of restricting their right...
-
A hacker has released a tool that he says can break into any iCloud account. The tool, iDict, uses an exploit in Apple's security to bypass restrictions that stop most hackers from gaining access to accounts. On iDict's GitHub page, user "Pr0x13" says the exploit used to create the hacking tool is "painfully obvious" and that it "was only a matter of time" before hackers used it to break into iCloud accounts. The tool is described as a "100% working iCloud Apple ID dictionary attack that bypasses account lockout restrictions and secondary authentication on any account."
-
First it was, with "absolute certainly", North Korea. Then, out of the blue, an even more ridiculous theory emerged about the origin of the Sony hackers: Russia. Now, we finally get the truth, and as it turns out it was neither of the abovementioned sovereign actors who had nothing better to do than to hack movie scripts and racist emails: it was Sony's own disgruntled worker who was the source of the hack. According to Politico, FBI agents investigating the Sony Pictures hack were briefed Monday by a security firm that says its research points to laid-off Sony staff,...
-
North Korea's Internet, 3G Mobile Network 'Paralyzed': Report North Korea's Internet and 3G mobile networks were paralyzed again on Saturday evening, China's official Xinhua news agency reported, with the North Korean government blaming the United States for systemic instability in the country's networks. Internet connectivity had not returned to normal as of 9:30 p.m. local time (7:30 a.m. ET), Xinhua said, citing reporters in the country that had confirmed the situation over fixed telephone systems. Analysts at global Internet performance firm Dyn Research also reported that North Korea appeared to be suffering another countrywide online blackout. "This time, there wasn't...
-
By Associated Press 27 Dec 2014Pyongyang issues furious statement accusing US of shutting down its internet services as row over The Interview shows no sign of easing North Korea called President Barack Obama "a monkey" and blamed the US on Saturday for shutting down its internet services amid the hacking row over The Interview. North Korea has denied involvement in a crippling cyberattack on Sony Pictures but has expressed fury over the comedy depicting an assassination of its leader Kim Jong-un. After Sony Pictures initially called off the release in a decision criticised by Obama, the movie has opened this...
|
|
|