The "Islamic State Hacking Division," a hacker group claiming to be affiliated with the extremist group operating in Syria and Iraq, took credit for posting the personal information of hundreds of US military and government personnel.
Compromised data included names, email addresses, passwords, phone numbers and other information of personnel of the Air Force, Marine Corps, Port Authority of New York and New Jersey, and NASA.
Leaked data also reportedly included credit card information from US State Department officials, along with Facebook message screenshots between military personnel. The group previously targeted Canadian military cadets, and hacked websites to share images from Syria.
There are plenty of folks in Washington, D.C. unhappy with former NSA contractor Edward Snowden, and you can count retired Sen. Saxby Chambliss (R-GA) as one of those people. Snowden remains holed up in Moscow, Russia, with very few options considering the severity of charges he faces in the United States.
Chambliss believes there could be only one way to punish Snowden for his actions:
"We need to hang him on the courthouse square as soon as we get our hands on him," Chambliss recently told students at the University of Georgia's Terry College of Business. "I hope none of you have any sympathy for him."
The Obama Administration desperately seeks changes to encryption, hoping technology companies will install hidden backdoors just for them. Former NSA analyst Edward Snowden is defending the argument supported by companies such as Google and Apple, as politicians in Washington demand better access.
"The central problem with insecurity mandates has never been addressed by its proponents: if one government can demand access to private communications, all governments can," Snowden said in an email published by The Intercept. "No matter how good the reason, if the US sets the precedent that Apple has to compromise the security of a customer in response to a piece of government paper, what can they do when the government is China and the customer is the Dalai Lama?"
"Technologists and companies working to protect ordinary citizens should be applauded, not sued or prosecuted," Snowden also said in the email.
Who could have foreseen a Wi-Fi-connected self-aiming weapon could be compromised so hackers are able to digitally "tag" a target independent of what the shooter wanted to fire at. TrackingPoint created an uber pricey rifle that allows for amateur shooters to accurately hit targets up to a half mile away - unless a hacker changes the target.
Using the weapon's Wi-Fi system, the researchers were able to compromise its software - and they found a way to manipulate its scope, feeding the shooter false wind direction, temperatures, and other considerations. Amateur shooters wouldn't likely notice the changing variables, even if the rifle locked onto a different target.
"You can make it lie constantly to the user so they'll always miss their shot," said Runa Sandvik, a researcher able to hack the rifle, in a statement published by Wired. "If the scope is bricked, you have a six to seven thousand dollar computer you can't use on top of a rifle that you still have to aim yourself."
As more vehicles include connected features such as high-tech infotainment systems, the problem won't just disappear anytime soon. In fact, this is something that we'll end up hearing more about in the future, as more problems are identified.
"This is the shot across the bow. Everybody's been saying 'cybersecurity,'" said Mark Rosekind, head of the National Transportation Safety Administration (NTSA), in a statement published by the NBC News. "You've got to see the entire industry proactively dealing with these things."
News that hackers were able to hijack a Jeep vehicle was the most recent connected car security fear - and it's something that has the NTSA frightened. "The supplier didn't just supply radios to Chrysler but to a lot of other manufacturers - a lot of our work now is trying to find out how broad the vulnerability could be."
The Chinese government and suspected hacker groups with ties to Beijing are enjoying their attacks against the United States economy, according to a secret map compiled by the National Security Agency (NSA). Each red dot signifies a major corporate, private or government cyberattack victim from suspected Chinese sources:
When it comes to cybersecurity, the United States clearly hasn't taken the threat seriously enough, and it's glaringly obvious to organized hackers and foreign governments. Although the folks in Washington absolutely love to spy on others, they haven't done a very good job trying to prevent these attacks.
If the map is accurate, the NSA has a pretty good idea on which companies, government networks, and critical infrastructure the Chinese hackers are interested in compromising.
WikiLeaks has published "Target Tokyo," listing 35 "Top Secret NSA targets" located in Japan, including intercepts from US-Japan relations, trade negotiations and sensitive climate change strategy.
The United States spied on companies such as Mitsubishi and Matsui, Japanese government officials, ministries and senior advisers to Prime Minister Shinzo Abe's administration. Other targets included the Japanese Cabinet Office switchboard, Japanese Central Bank officials, governors, and other high-ranking officials.
"In these documents we see the Japanese government worrying in private about how much or how little to tell the United States, in order to prevent undermining of its climate change proposal or its diplomatic relationship," said Julian Assange, Editor-in-Chief of WikiLeaks. "And yet we now know that the United States heard everything and read everything, and was passing around the deliberations of Japanese leadership to Australia, Canada, New Zealand and the UK."
Cybercriminals known as "ratters," responsible for hijacking webcams and other electronic devices to spy on unsuspecting users, are finding new ways to launch attacks. Specifically, the groups use remote access tools (RATs) to steal images and photos from webcams, and have lately started charging others for this stolen data.
"Ratters are disturbingly comfortable with spreading misery and fear," said Adam Benson, deputy executive director for the Digital Citizens Alliance. "It's like a game for them. We saw them chat about it on Hack Forums and then share videos showing off how they scare young people, spy on people in private moments, and steal pictures from victims' accounts."
It's not uncommon to find RATs available for download on Internet forums and through file-sharing services. One such forum offered access to compromised devices for $1 for guys and $5 for women - showing there a modest financial incentive.
White hat hacker Samy Kamkar recently posted a video discussing how he found a way to "locate, unlock and remote-start" General Motors vehicles by compromising the OnStar vehicle communications system.
Using the gadget, which cost around $100 to make, the system makes it possible to locate, unlock, and start the engine. Once a small wireless device has been placed near a GM car with OnStar, Kamkar was able to gain unauthorized access to the vehicle.
Dubbed the "OwnStar" system, Kamkar showed he was able to intercept communication from the OnStar service and OnStar RemoteLink mobile app. Technical details will be revealed during Def Con next week.
The FBI isn't finding it very easy to beef up its cybersecurity ranks, largely due to lower salaries, according to a report from the US Department of Justice.
In addition to higher salaries in the private sector, trying to get a government position related to cybersecurity involves multiple hoops that people won't have to jump through if they simply go to Silicon Valley. Applicants have to undergo extensive background checks, drug screenings, and other hurdles that private sector companies typically don't bother with.
Under the Justice Department's Next Generation Cyber Initiative, which went live in 2012, the FBI has successfully recruited just 52 of the 134 computer scientists it was granted permission to hire.