Hacking, Security & Privacy News - Page 43

All the latest Hacking, Security & Privacy news with plenty of coverage on new data breaches and leaks, new hacks, ways to protect yourself online & plenty more - Page 43.

Follow TweakTown on Google News

Revenge porn king, Hunter Moore, pleads guilty to hacking charges

Michael Hatamoto | Feb 22, 2015 12:35 PM CST

Hunter Moore, 28, the founder of revenge porn website IsAnyoneUp.com, has pleaded guilty and faces years in prison. Moore pleaded guilty to identity theft, unauthorized access to a computer, and aiding and abetting unauthorized access of a computer. Unlike other revenge porn website operators, Moore paid a hacker to access email accounts looking for photos to steal.

Each charge carries a maximum prison sentence of two to five years, and Moore should be sentenced in a few months. Moore was once called "the most hated man on the Internet" for creating IsAnyoneUp.com, which served as one of the most popular revenge porn websites.

The infamous revenge porn website generated up to $10,000 per month in advertising revenue - and featured nude images and videos of ex-boyfriends and ex-girlfriends. The person's full name, city of residence, social media profile and profession were prominently listed on the website.

Continue reading: Revenge porn king, Hunter Moore, pleads guilty to hacking charges (full post)

After data breaches, companies still nonchalant about cybersecurity

Michael Hatamoto | Feb 22, 2015 10:30 AM CST

Company executives have observed Target, JPMorgan Chase, Home Depot, Anthem, and other major companies suffer devastating data breaches - and understand they need stronger cybersecurity protocols - but actually deploying new methods has been rather slow.

Seventy eight percent of company tech executives have not been briefed regarding internal security strategies within the past 12 months, according to a Raytheon survey. In addition, 75 percent said cybersecurity is a necessary cost, but only 25 percent of survey respondents said security is a strategic priority.

"The Target hack was very interesting," said Jack Harrington, VP of cybersecurity and special missions of Raytheon, in a statement published by the Christian Science Monitor. "It raised awareness across the entire retail industry certainly," but demand for chief information security officer (CISO) positions wasn't' a priority. "That tells you they felt they didn't even need that position. They just didn't feel at risk."

Continue reading: After data breaches, companies still nonchalant about cybersecurity (full post)

Politics could get in the way of improved US national cybersecurity

Michael Hatamoto | Feb 22, 2015 5:35 AM CST

It took several high-profile data breaches before the United States publicly discussed the need for improved cybersecurity protocols. Democrats and Republicans agree that something must be done, but security experts hope politics don't get in the way of necessary change.

However, cybersecurity efforts could receive bipartisan support from the Obama Administration and the Republican-led Congress - and politics hopefully won't get in the way.

"In order to improve cybersecurity, it is critical to facilitate the sharing of cyberattack information," said Sen. Ron Johnson (R-Wisc), in the GOP weekly address. "By sharing threat signatures, vulnerabilities and other indicators of network compromise, within and between the private sector and government, many cyberattacks can be prevented."

Continue reading: Politics could get in the way of improved US national cybersecurity (full post)

Report: More than 1,500 international data breaches in 2014

Michael Hatamoto | Feb 21, 2015 6:20 AM CST

There were 1,500 global data breaches in 2014, with the number rising almost 50 percent year-over-year, according to the Gemalto Breach Level Index (BLI) report. Of the 1 billion total compromised records, almost 800 million of them belong to US companies - a frightening figure that cybersecurity experts believe will rise.

Companies remain unsure how to address these sometimes sophisticated cyberattacks, while consumers are frustrated that their personal information is seemingly up for grabs. Banks and credit card companies are becoming more proactive in identifying - and informing customers - of fraud, but it can still be a chaotic process.

"Not only are data breach numbers rising, but the breaches are becoming more severe," said Jason Hart, VP of cloud services, identity and data protection at Gemalto. "Identity theft could lead to the opening of new fraudulent credit accounts, creating false identities for criminal enterprises, or a host of other serious crimes. As data breaches become more personal, we're starting to see that the universe of risk exposure for the average person is expanding."

Continue reading: Report: More than 1,500 international data breaches in 2014 (full post)

More Anthem data breach fallout, millions of kids at risk of ID theft

Michael Hatamoto | Feb 21, 2015 5:30 AM CST

Millions of Anthem customers are at risk from the Anthem data breach, including tens of millions of children impacted from the data breach. Personal information ranging from names, date of brith, Social Security numbers and health care ID numbers were stolen, and some children could be at risk for decades, according to cybersecurity experts.

Information on children is tied to their parents, so attacks against adult account holders are expected to accelerate in the future as well. However, personal information of children is especially lucrative to criminals, as the data hasn't been tied to a credit file - so the government and credit reporting agencies aren't expecting fraud-related activities.

"Every terrible outcome that can occur as the result of an identity theft will happen to the children who were on that database," said Adam Levin, chairman and founder of IDentityTheft911, in a statement published by NBC News. "Criminals will use those stolen Social Security numbers to open accounts, get medical treatment, commit tax fraud, you name it."

Continue reading: More Anthem data breach fallout, millions of kids at risk of ID theft (full post)

NSA says North Korea definitely to blame for Sony attack

Michael Hatamoto | Feb 20, 2015 9:48 PM CST

The National Security Agency (NSA) believes North Korea is behind the Sony Pictures attack because of software used to breach the company. SPE was targeted in November by a group calling itself the "Guardians of Peace," with emails, employee personal information, movies, and other data stolen - and posted online.

"We ultimately ended up generating the signatures to recognize the activity used against Sony," said NSA Director Admiral Michael Rogers, in a statement during a security conference in Canada. "From the time the malware left North Korea to the time it got to Sony's headquarters in California, it crossed four different commanders' lines or areas in the US construct."

Cyberattacks are causing confusion for government agents, unexpectedly spending more time investigating breaches against private sector companies - as attacks mount against critical infrastructure and government agencies.

Continue reading: NSA says North Korea definitely to blame for Sony attack (full post)

DHS recommends users uninstall Superfish adware from Lenovo products

Michael Hatamoto | Feb 20, 2015 3:46 PM CST

The US Department of Homeland Security (DHS) recommended Lenovo customers remove the Superfish adware from their computers and laptops. The Chinese electronics company installed the software on machines beginning in 2010 until January 2015, and Lenovo is no longer installing it on consumer products.

Despite Lenovo saying there were no cybersecurity issues, the National Cyber Awareness System said customers are vulnerable to SSL spoofing attacks. "Systems that came with the software already installed will continue to be vulnerable until corrective actions have been taken," the DHS said in a statement published by Reuters.

"We should have known about this sooner," said Brion Tingler, Lenovo spokesman, in a statement to Reuters. "And if we could go back, we never would have installed this software on our machines. But we can't, so we are dealing with this head on."

Continue reading: DHS recommends users uninstall Superfish adware from Lenovo products (full post)

Hackers still have access to US State Department email system

Michael Hatamoto | Feb 20, 2015 2:28 PM CST

US State Department officials confirmed the agency temporarily shut down its unclassified email system because of hacker activity three months ago - and it looks like security experts still haven't been able to boot the unwelcome guests from its network.

It remains unknown where the attacks originated, but specialists suggest it could be from Russia. No classified data has been accessed, but there is growing concern the hackers will be able to write false emails, delete emails and find a way to access classified networks.

"We have robust security to protect our systems and our information, and we deal successfully with thousands of attacks every day," said Marie Harf, State Department spokeswoman, in a statement to Bloomberg. "We take any possible cyber intrusion very seriously."

Continue reading: Hackers still have access to US State Department email system (full post)

Google puts FBI on blast for invasive privacy practices against users

Michael Hatamoto | Feb 20, 2015 1:20 AM CST

Google doesn't like the idea of the FBI being able to easily access Internet-connected devices owned by consumers, with the company sending a 14-page letter to officials.

"Law-abiding citizens who were the target of an unconstitutional search but are not charged with a crime will almost certainly never learn of the search and therefore will not be able to challenge the search," said Richard Salgado, director of information security and law enforcement for Google, in a letter to the US government.

Not surprisingly, the federal government thinks it needs access to user data to bust criminals and for better national security:

Continue reading: Google puts FBI on blast for invasive privacy practices against users (full post)

NSA hacked into largest SIM card maker, accessing billions of phones

Anthony Garreffa | Feb 19, 2015 5:58 PM CST

Just days after we reported that the NSA had backdoor access to the firmware level of major HDD manufacturers in Seagate and Western Digital, Edward Snowden is back with new information that the National Security Agency (NSA) and its British partner GCHQ hacked into Gemalto. Gemalto, is a Netherlands SIM card manufacturer, the largest in the world.

Gemalto makes two billion SIM cards each year, with the NSA hacking into the company and stealing its encryption keys, giving them access to secretly monitor both voice calls and data. The Intercept reported on the news, which has reportedly provided spy agencies with the ability of secretly monitoring gigantic portions of the world's cellular communications, which experts have said is a major violation of international laws. Considering Gemalto makes SIM cards for companies like AT&T, Sprint, T-Mobile and Verizon, you can begin to see the scope of this hack by the US government agency. Gemalto itself operates in some 85 countries around the world, providing SIM cards to over 450 wireless network providers.

With the NSA having these encryption keys in its hands, it has the power to monitor mobile communications "without the approval of telecom companies and foreign governments", reports The Guardian. This is something I talked about in my last OpEd, where the Obama administration needs to address it, and as I said "The NSA needs to be ripped apart, and its powers neutered". Most people think that 3G and 4G mobile networks have their calls encrypted, and while they might be, but with the keys that the NSA and GCHQ have, it's like they are living "in the phone".

Continue reading: NSA hacked into largest SIM card maker, accessing billions of phones (full post)