Hacking, Security & Privacy News - Page 51

All the latest Hacking, Security & Privacy news with plenty of coverage on new data breaches and leaks, new hacks, ways to protect yourself online & plenty more - Page 51.

Follow TweakTown on Google News

US police have deployed radar that peers into homes

Paul Alcorn | Jan 20, 2015 9:28 AM CST

Troubling news is coming to light. Under a cloak of secrecy over 50 U.S. law enforcement have deployed radars that allow them to see through walls. These agencies include the FBI and the U.S. Marshals Service, and the project began over two years ago. These radars run afoul of a Supreme Court ruling that bans the use of high-tech sensors probing the inside of someone's home without a warrant, which helps to explain the total silence on the new radars.

The sensors are effective out to 50 feet and can detect human movement via radio waves. They are so sensitive they can even pick up human breathing. The new technology came to light during a December federal appeals trial of a parole absconder in Denver. During the trial officials revealed they used the device to locate the man, and the presiding judges sounded off that "the government's warrantless use of such a powerful tool to search inside homes poses grave Fourth Amendment questions."

The devices are manufactured by L-3 Communications under the Range-R product family. Each device costs $6,000 and over 200 devices have been sold to US law enforcement agencies. The radar displays if there is movement on the other side of the wall, and displays how far away the movement is. The Range-R doesn't actually show the inside of the building, but there are other models that do. There are similar radar devices that feature 3-D displays of the location of people in a building, and the Justice Department is already funding development systems that can map entire buildings and locate people, so they surely have no qualms with deploying these devices.

Continue reading: US police have deployed radar that peers into homes (full post)

Obama Administration also doesn't want encryption to interfere

Michael Hatamoto | Jan 19, 2015 4:12 PM CST

Not surprisingly, President Barack Obama has sided with UK Prime Minister David Cameron's demand that computer companies provide a backdoor to governments, even of encrypted communications. The US government has relied on a mix of warrants, wiretaps and direct access from technology companies so they have access to phone calls, social media, and other communications.

Simply demanding access to encrypted communication isn't worthwhile, so Obama played to emotions with his justification: "If we find evidence of a terrorist plot... and despite having a phone number, despite having a social media address or email address, we can't penetrate that, that's a problem," Obama recently said.

Obama wants to ensure a way to keep data private from cybercriminals, but not from police authorities and federal investigators.

Continue reading: Obama Administration also doesn't want encryption to interfere (full post)

Universities trying to close cybersecurity research gap

Michael Hatamoto | Jan 19, 2015 3:42 PM CST

The FBI and other US government departments want to recruit cybersecurity specialists, while the private sector also is throwing big money at qualified job candidates. To help fill this jobs void, a growing number of universities are creating programs to develop the next wave of security specialists.

Cybersecurity jobs soared 74 percent from 2007 to 2013, and there are a number of appealing opportunities for candidates. With such fierce competition for the current crop of security specialists, universities are broadening security-themed offerings from one or two courses to minor and major programs, or certifications.

"The demand is very high. I've had students get into cyberspace companies with just one security class, never mind an entire major," said Kenneth Knapp, IT management professor at University of Tampa and head of its cybersecurity program. "With all of the high-profile breaches over this last year or so, more focus has been on security than I've ever seen, and I've been doing it since I was 21 years old in the Air Force."

Continue reading: Universities trying to close cybersecurity research gap (full post)

Edward Snowden leaks confirm China stole Aussie F-35 JSF plans

Michael Hatamoto | Jan 19, 2015 1:42 PM CST

Chinese cybercriminals stole data related to the B-2 stealth bomber, F-22 Raptor, a nuclear submarine, and Australia's new F-35 Lighting II aircraft, according to data taken by former NSA contractor Edward Snowden. The Australian government plans to purchase 58 F-35 fighter jets for $12 billion, which will bring its JSF fleet up to 72 total.

Using a mix of its own research and development, along with data stolen from western political rivals, China continues to develop its own Shenyang J-31 and Chengdu J-20 aircraft. The J-31 is the most advanced Chinese fighter jet, while the J-20 is the country's first effort to develop a stealth fighter.

The Chinese government has been accused on numerous occasions of running sophisticated cyberespionage attacks against the United States - and its key allies - to steal software code, hardware designs, and military technology.

Continue reading: Edward Snowden leaks confirm China stole Aussie F-35 JSF plans (full post)

US reportedly penetrated North Korean computer networks in 2010

Michael Hatamoto | Jan 19, 2015 12:34 PM CST

It would appear the National Security Agency (NSA) is responsible for breaching North Korea's computer systems years ago, before North Korea's alleged role in attacking Sony Pictures. With help from select allies, the NSA targeted North Korea's links to the outside world, such as China and Malaysia.

US security officials installed malware so they were able to monitor the online movements of North Korea's Bureau 121 hackers - a group growing in sophistication - as cyberespionage becomes more popular.

When the FBI was so quick to conclude North Korea was responsible for attacking SPE in late 2014, the cybersecurity industry was skeptical. FBI Director James Comey previously said the hackers got sloppy and forgot to mask their IP addresses. "We could see that the IP [Internet protocol] addresses that were being used to post and to send the emails were coming from IPs that were exclusively used by the North Koreans."

Continue reading: US reportedly penetrated North Korean computer networks in 2010 (full post)

Lizard Squad's DDoS attack service hacked, as pressure mounts

Michael Hatamoto | Jan 18, 2015 3:32 PM CST

Unknown cybercriminals breached the Lizard Squad's LizardStresser distributed denial of service (DDoS) service, which serves customers as an attack-for-hire tool. There are more than 14,000 registered users, with $11,000 collected via bitcoin to help pay for DDoS attacks against thousands of website URLs and IP addresses.

The Lizard Squad reportedly brought down Microsoft Xbox Live and Sony PlayStation Network (PSN) to promote its service.

Lizard Squad appears to have a number of younger members contributing to its cybercriminal operation, though several reported members have been arrested across the world. However, core members of the group still haven't been identified and arrested, so future cyberattacks are expected to continue against higher-profile targets.

Continue reading: Lizard Squad's DDoS attack service hacked, as pressure mounts (full post)

Hackers List helps you search for your most suitable candidate

Chris Smith | Jan 17, 2015 2:23 AM CST

"It could be used for legitimate reasons, right?" was the first thought that went through my head when looking at this website - well that's apparently not the case. If you're looking to seek revenge or hold a grudge and have money to spend - Hackers List will enable you to list up your task and a price - helping you search for the most suitable hacker for your needs.

As described by the New York Times, there are potential clients on here including a Sweedish man offering up $2,000 for someone to hack into his landlord's website and even a lady from California ready to pony up $500 for someone to gain access to his Facebook and Gmail accounts - talk about a healthy relationship!

With over 500 jobs currently listed, everything is completed completely anonymously, with the website working as the 'middle man' when it comes to jobs, correspondence and payment.

Continue reading: Hackers List helps you search for your most suitable candidate (full post)

John McAfee says North Korea isn't responsible for SPE data breach

Michael Hatamoto | Jan 16, 2015 5:26 PM CST

The FBI insists North Korea is responsible for breaching Sony Pictures, while some cybersecurity experts aren't so sure. John McAfee, an eccentric cybersecurity pioneer, says he knows what group is responsible for breaching SPE - and it wasn't the North Koreans.

"I can guarantee they are wrong,"McAfee recently told IBTimes UK, while speaking about the FBI's assertion that North Korea is involved. "It has to do with a group of hackers - I will not name them - who are civil libertarians and who hate the confinement the restrictions the music industry and the movie industry has placed on art and so they are behind it."

McAfee spent much of his career defending users and companies against hackers - but has a mutual respect for hackers today, saying "they want freedom, freedom of expression, freedom to live unobserved."

Continue reading: John McAfee says North Korea isn't responsible for SPE data breach (full post)

North Korea's hackers seek theft, retribution against targets

Michael Hatamoto | Jan 16, 2015 3:59 PM CST

Kim Jong-un became "supreme leader" of North Korea at a young age, and has shown political instability since his reign began in 2011. The North Korean government, meanwhile, has steadily invested time and resources into its Bureau 121 hacker division, aiming to compromise political rivals.

"In the case of the DPRK, the paranoia is amplified to the extreme," according to a commentary written about North Korea's cyberattack motivations on InformationWeek's Dark Reading. It's true that the North Korean government, which strives to maintain full control of its citizens, is suspicious of all outsiders - and launching cyberattacks to steal information has evolved into a valuable asset.

The FBI continues to say North Korea is behind the major data breach of Sony Pictures - and whether the reclusive government is responsible - foreign governments and cybersecurity companies are paying attention to Pyongyang's rising cyberattack capabilities.

Continue reading: North Korea's hackers seek theft, retribution against targets (full post)

NSA, GCHQ plan to step up cybersecurity cooperation efforts in 2015

Michael Hatamoto | Jan 16, 2015 1:46 PM CST

The US National Security Agency (NSA) and British GCHQ intelligence agencies plan to step up their cybersecurity cooperation, as both governments face increasing numbers of cyberattacks. The agencies plan to launch cyber war games to test the cybersecurity of financial institutions, hoping to defend against the "biggest modern threats that we face."

"We have got hugely capable cyber defenses, we have got the expertise and that is why we should combine as we are going to, set up cyber cells on both sides of the Atlantic to share information," said British Prime Minister David Cameron during a press conference.

Following mass surveillance operations detailed by former NSA contractor Edward Snowden, critics said the US and UK government should focus on beefing up cybersecurity efforts - instead of spying on citizens, residents, and foreign governments - as cyberespionage campaigns target both countries.

Continue reading: NSA, GCHQ plan to step up cybersecurity cooperation efforts in 2015 (full post)