Keyword: hacking
-
Thieves have discovered a new way to exploit older ATM's into spitting out every dollar they hold. It's called jackpotting because of the speed of the bills flying out, resembling how slot machines used to pay out coins. The Secret Service has warned financial institutions to expect a wave of jackpotting over the next week to 10 days, based on its investigation of ATM crimes in several parts of the country. The U.S. appears to be the latest target. In 2016, jackpotting yielded $13 million from ATM's. Twelve European countries and Mexico have also been hit recently. Ahmed Banafa, from...
-
Hackers stole several hundred million dollars' worth of a lesser-known cryptocurrency from a major Japanese exchange Friday. Coincheck said that around 523 million of the exchange's NEM coins were sent to another account around 3 a.m. local time (1 p.m. ET Thursday), according to a Google translate of a Japanese transcript of the Friday press conference from Logmi. The exchange has about 6 percent of yen-bitcoin trading, ranking fourth by market share on CryptoCompare.
-
Dutch intelligence services had eyes and ears for years on the Russian outfit that hacked the Democratic National Committee, even infiltrating a surveillance camera at the Cozy Bear headquarters and recording hackers' faces, Dutch media reported. That trove of intelligence gathered by the Netherlands since 2014 has been crucial to the U.S. investigation into the Russian campaign influence operation, the reports from Nieuwsuur and Volkskrant said. Cybersecurity company CrowdStrike reportedly first noticed the DNC hack by two Russian intelligence groups on June 14, 2016; CrowdStrike CTO Dmitri Alperovitch wrote in a blog post at the time that they were called...
-
Two Dutch intelligence services uncovered substantial evidence detailing how a Russian-backed hacking group infiltrated the Barack Obama White House, the U.S. Department of State, and the Democratic National Committee, according to a ground breaking report from broadcaster NOS and newspaper Volkskrant. The evidence was uncovered by a Dutch cyber defense team gained access to the "Cozy Bear" hacker group's systems, including a hallway security camera that allowed the Dutch team to maintain visual surveillance of the hackers.
-
Cables Portray Expanded Reach of Drug Agency By GINGER THOMPSON and SCOTT SHANE WASHINGTON — The Drug Enforcement Administration has been transformed into a global intelligence organization with a reach that extends far beyond narcotics, and an eavesdropping operation so expansive it has to fend off foreign politicians who want to use it against their political enemies, according to secret diplomatic cables. In far greater detail than previously seen, the cables, from the cache obtained by WikiLeaks and made available to some news organizations, offer glimpses of drug agents balancing diplomacy and law enforcement in places where it can be...
-
ALEXANDRIA, Va. – Justin G. Liverman, 24, of Morehead City, North Carolina, pleaded guilty today for his role in a harassment scheme that targeted senior U.S. government officials. Liverman’s plea admits guilt to a conspiracy to commit unauthorized computer intrusions, identity theft, and telephone harassment. According to the statement of facts filed with the plea agreement, beginning in November 2015, Liverman conspired to attempt to intimidate and harass U.S. officials and their families by gaining unauthorized access to victims’ online accounts, among other things. For example, Liverman publicly posted online documents and personal information unlawfully obtained from a victim’s personal...
-
The dramatic decision by five Arab countries to sever ties with Qatar over its alleged coddling of the Muslim Brotherhood and its flirtation with their archenemy Iran has caught the pugnacious emirate’s closest regional ally, Turkey, off balance and wondering whether it too may be targeted. Turkey’s initial reaction to the announcement by Bahrain, Egypt, Saudi Arabia, the United Arab Emirates (UAE) and Yemen that they were suspending diplomatic ties as well as air and sea travel to and from Qatar was a call for dialogue. Foreign Minister Mevlut Cavusoglu said at a news conference, “We see the stability in the Gulf region as our own...
-
CNN host Anderson Cooper claimed Wednesday that his Twitter account was hacked, and was used to send a tweet that called President Trump a "pathetic loser." "Just woke up to find out someone gained access to my twitter account," Cooper tweeted Wednesday. "I have not sent a tweet in days or replied to any tweets. We are looking into how this happened."
-
Two Senate Republican campaign staffers have resigned after they were caught breaking into a fundraising database kept by the House Republican campaign committee, according to a new report by Politico.
-
WASHINGTON (AP) — The FBI failed to notify scores of U.S. officials that Russian hackers were trying to break into their personal Gmail accounts despite having evidence for at least a year that the targets were in the Kremlin's crosshairs, The Associated Press has found. Nearly 80 interviews with Americans targeted by Fancy Bear, a Russian government-aligned cyberespionage group, turned up only two cases in which the FBI had provided a heads-up. Even senior policymakers discovered they were targets only when the AP told them, a situation some described as bizarre and dispiriting. "It's utterly confounding," said Philip Reiner, a...
-
For 25 seconds in 1987, in the middle of WGN-TV anchor Dan Roan’s sportscast, thousands of Chicagoans’ feeds were replaced with a low analog whine and the eery image of a masked man nodding over and over as if in a state of mania. “If you’re wondering what’s happened, so am I,” Roan said to his audience once WGN regained control of the signal. What he couldn’t have known is that the rest of the world would still be wondering to this day.9:14pm CST today marks 30 years since one of the most unusual hacks in history: the Max Headroom...
-
Hackers stole data from 57 million Uber users and drivers in 2016. The hackers stole names and driver's license numbers of around 600,000 drivers in the U.S., as well as rider names, email addresses and mobile phone numbers. According to Bloomberg, the company paid hackers $100,000 to delete the data and keep the breach quiet, and did not report the incident. Hackers stole data from 57 million Uber users and drivers, a breach that the company concealed for more than a year. Uber released a statement on the 2016 attack, and also published resources for riders and drivers. According to...
-
Humanity has a massive password problem. We might call it The Password Pandemic. Computers keep getting faster and cheaper, making passwords easier to crack, while human operators do not change their bad password habits. This is a losing proposition, with the advantage clearly toward hackers and cyber criminals. Most users of the Internet now know that they need to use “strong” passwords, and that they should use a different password for each site. With a dozen or several dozen online accounts, this quickly becomes unmanageable. Exasperated, people just use the same (usually weak) password across several accounts. Hackers know this,...
-
The majority of the Democratic National Committee (DNC) emails released by Wikileaks were not even written until after the DNC knew it had been hacked, raising questions about the effectiveness of Democrats’ decision to turn to a private firm instead of the FBI. DNC CEO Amy Dacey learned of the breach in late April, but of the 27,500 DNC emails published by Wikileaks, fewer than 7,000 pre-date April 29. A Daily Caller News Foundation analysis of the published emails shows that the majority were written between May 5 and May 25 — after cybersecurity firm CrowdStrike was brought in to...
-
Experts: North Korea Targeted U.S. Electric Power Companies by ANDREA MITCHELL and KEN DILANIAN WASHINGTON — The cybersecurity company FireEye says in a new report to private clients, obtained exclusively by NBC News, that hackers linked to North Korea recently targeted U.S. electric power companies with spearphishing emails. The emails used fake invitations to a fundraiser to target victims, FireEye said. A victim who downloaded the invitation attached to the email would also be downloading malware into his or her computer network, according to the FireEye report. The company did not dispute NBC's characterization of the report, but declined to...
-
It was a case of spies watching spies watching spies: Israeli intelligence officers looked on in real time as Russian government hackers searched computers around the world for the code names of American intelligence programs. What gave the Russian hacking, detected more than two years ago, such global reach was its improvised search tool — antivirus software made by a Russian company, Kaspersky Lab, that is used by 400 million people worldwide, including by officials at some two dozen American government agencies. The Israeli officials who had hacked into Kaspersky’s own network alerted the United States to the broad Russian...
-
Did The iCloud Celebrity Nude Picture Scandal Have Something To Do With Harvey Weinstein? In September of 2014, Apple was getting ready to announce a massive iPhone upgrade: bigger iPhones than anything it sold before. But just a few days ahead of the iPhone 6 press event, an iCloud security scandal broke out. Nude pictures belonging to Jennifer Lawrence and many other celebrities leaked online, originating from iPhone backups. Apple explained at the time that its iCloud security was not breached and that hackers probably used phishing schemes to obtain the usernames and passwords of the celebrities. Here is a...
-
White House officials believe that chief of staff John Kelly’s personal cellphone was compromised, potentially as long ago as December, according to three U.S. government officials. The discovery raises concerns that hackers or foreign governments may have had access to data on Kelly’s phone while he was secretary of Homeland Security and after he joined the West Wing. Tech support staff discovered the suspected breach after Kelly turned his phone in to White House tech support this summer complaining that it wasn’t working or updating software properly. Kelly told the staffers the phone hadn’t been working properly for months, according...
-
Early clues have emerged that suggest a state actor was behind the massive hack of Equifax earlier this month, with China suggested as a prime suspect. The startling new details from the investigation into the data breach affecting 142million Americans' personal data came in a Bloomberg report on Friday citing more than a dozen people familiar with the probe.
-
Political legend Roger Stone appeared before the House Intelligence Committee today during a closed hearing intended to tackle the allegations of Russian collusion with the Trump campaign, but rather than Roger standing trial, he flipped the script in proper Stonean fashion and put the entire committee itself on trial. In an exclusive interview, a TGP sat down with Mr. Stone and discussed some of the finer details of the hearing and also touched briefly on the Alabama senate race, the slippery, snakelike DNC operative John Podesta, and the much gossiped about Guccifer 2.0. What follows is a penetrating looks at...
|
|
|