TweakTown NewsRefine News by Category:
Making good on their threat from last month, hacking collective The Impact Group has released nine gigabytes of Ashley Madison user data, which includes upwards of 37 million users details, onto the dark web
The hacker group was demanding that Avid Life Media, owner of Ashley Madison, as well as two other sites; Cougar Life and Established Men was to be taken offline or else the data would be released. Avid Life Media confirmed the leak, but kept the site online. Gizmodo have confirmed the availability of the dump, which includes email addresses, credit card transactions and profiles.
If you've ever use the site in the past, best to either fess up and get some flowers on the way home, or lawyer up.
Just mentioning Edward Snowden tends to elicit a lot of emotion from Americans, and while many of you applaud what he did, it looks like many Americans would like to see the former NSA contractor prosecuted.
Fifty-three percent of Americans believe the federal government should prosecute Snowden, while 26 percent don't want to see the American face charges if he comes home, according to a poll from Morning Consult. Meanwhile, 29 percent would "strongly support a criminal case" if American authorities detain Snowden.
It doesn't look like politics are playing much of a roll, with 64 percent of Republicans, 56 percent of Democrats, and 44 percent of independents supporting charges.
The "Islamic State Hacking Division," a hacker group claiming to be affiliated with the extremist group operating in Syria and Iraq, took credit for posting the personal information of hundreds of US military and government personnel.
Compromised data included names, email addresses, passwords, phone numbers and other information of personnel of the Air Force, Marine Corps, Port Authority of New York and New Jersey, and NASA.
Leaked data also reportedly included credit card information from US State Department officials, along with Facebook message screenshots between military personnel. The group previously targeted Canadian military cadets, and hacked websites to share images from Syria.
There are plenty of folks in Washington, D.C. unhappy with former NSA contractor Edward Snowden, and you can count retired Sen. Saxby Chambliss (R-GA) as one of those people. Snowden remains holed up in Moscow, Russia, with very few options considering the severity of charges he faces in the United States.
Chambliss believes there could be only one way to punish Snowden for his actions:
"We need to hang him on the courthouse square as soon as we get our hands on him," Chambliss recently told students at the University of Georgia's Terry College of Business. "I hope none of you have any sympathy for him."
The Obama Administration desperately seeks changes to encryption, hoping technology companies will install hidden backdoors just for them. Former NSA analyst Edward Snowden is defending the argument supported by companies such as Google and Apple, as politicians in Washington demand better access.
"The central problem with insecurity mandates has never been addressed by its proponents: if one government can demand access to private communications, all governments can," Snowden said in an email published by The Intercept. "No matter how good the reason, if the US sets the precedent that Apple has to compromise the security of a customer in response to a piece of government paper, what can they do when the government is China and the customer is the Dalai Lama?"
"Technologists and companies working to protect ordinary citizens should be applauded, not sued or prosecuted," Snowden also said in the email.
Who could have foreseen a Wi-Fi-connected self-aiming weapon could be compromised so hackers are able to digitally "tag" a target independent of what the shooter wanted to fire at. TrackingPoint created an uber pricey rifle that allows for amateur shooters to accurately hit targets up to a half mile away - unless a hacker changes the target.
Using the weapon's Wi-Fi system, the researchers were able to compromise its software - and they found a way to manipulate its scope, feeding the shooter false wind direction, temperatures, and other considerations. Amateur shooters wouldn't likely notice the changing variables, even if the rifle locked onto a different target.
"You can make it lie constantly to the user so they'll always miss their shot," said Runa Sandvik, a researcher able to hack the rifle, in a statement published by Wired. "If the scope is bricked, you have a six to seven thousand dollar computer you can't use on top of a rifle that you still have to aim yourself."
As more vehicles include connected features such as high-tech infotainment systems, the problem won't just disappear anytime soon. In fact, this is something that we'll end up hearing more about in the future, as more problems are identified.
"This is the shot across the bow. Everybody's been saying 'cybersecurity,'" said Mark Rosekind, head of the National Transportation Safety Administration (NTSA), in a statement published by the NBC News. "You've got to see the entire industry proactively dealing with these things."
News that hackers were able to hijack a Jeep vehicle was the most recent connected car security fear - and it's something that has the NTSA frightened. "The supplier didn't just supply radios to Chrysler but to a lot of other manufacturers - a lot of our work now is trying to find out how broad the vulnerability could be."
The Chinese government and suspected hacker groups with ties to Beijing are enjoying their attacks against the United States economy, according to a secret map compiled by the National Security Agency (NSA). Each red dot signifies a major corporate, private or government cyberattack victim from suspected Chinese sources:
When it comes to cybersecurity, the United States clearly hasn't taken the threat seriously enough, and it's glaringly obvious to organized hackers and foreign governments. Although the folks in Washington absolutely love to spy on others, they haven't done a very good job trying to prevent these attacks.
If the map is accurate, the NSA has a pretty good idea on which companies, government networks, and critical infrastructure the Chinese hackers are interested in compromising.
WikiLeaks has published "Target Tokyo," listing 35 "Top Secret NSA targets" located in Japan, including intercepts from US-Japan relations, trade negotiations and sensitive climate change strategy.
The United States spied on companies such as Mitsubishi and Matsui, Japanese government officials, ministries and senior advisers to Prime Minister Shinzo Abe's administration. Other targets included the Japanese Cabinet Office switchboard, Japanese Central Bank officials, governors, and other high-ranking officials.
"In these documents we see the Japanese government worrying in private about how much or how little to tell the United States, in order to prevent undermining of its climate change proposal or its diplomatic relationship," said Julian Assange, Editor-in-Chief of WikiLeaks. "And yet we now know that the United States heard everything and read everything, and was passing around the deliberations of Japanese leadership to Australia, Canada, New Zealand and the UK."
Cybercriminals known as "ratters," responsible for hijacking webcams and other electronic devices to spy on unsuspecting users, are finding new ways to launch attacks. Specifically, the groups use remote access tools (RATs) to steal images and photos from webcams, and have lately started charging others for this stolen data.
"Ratters are disturbingly comfortable with spreading misery and fear," said Adam Benson, deputy executive director for the Digital Citizens Alliance. "It's like a game for them. We saw them chat about it on Hack Forums and then share videos showing off how they scare young people, spy on people in private moments, and steal pictures from victims' accounts."
It's not uncommon to find RATs available for download on Internet forums and through file-sharing services. One such forum offered access to compromised devices for $1 for guys and $5 for women - showing there a modest financial incentive.