Tech content trusted by users in North America and around the world
6,795 Reviews & Articles | 46,936 News Posts
TRENDING NOW: AMD rumored to launch its dual-GPU next month, the Radeon R9 Fury X2

TweakTown News

Refine News by Category:

Hacking & Security Posts - Page 6

Poll: 53% of Americans want to see Edward Snowden prosecuted

By: Michael Hatamoto | More News: Hacking & Security | Posted: Aug 13, 2015 9:39 pm

Just mentioning Edward Snowden tends to elicit a lot of emotion from Americans, and while many of you applaud what he did, it looks like many Americans would like to see the former NSA contractor prosecuted.




Fifty-three percent of Americans believe the federal government should prosecute Snowden, while 26 percent don't want to see the American face charges if he comes home, according to a poll from Morning Consult. Meanwhile, 29 percent would "strongly support a criminal case" if American authorities detain Snowden.


It doesn't look like politics are playing much of a roll, with 64 percent of Republicans, 56 percent of Democrats, and 44 percent of independents supporting charges.

Continue reading 'Poll: 53% of Americans want to see Edward Snowden prosecuted' (full post)

'Islamic State Hacking Division' compromises US military personnel

By: Michael Hatamoto | More News: Hacking & Security | Posted: Aug 12, 2015 7:37 pm

The "Islamic State Hacking Division," a hacker group claiming to be affiliated with the extremist group operating in Syria and Iraq, took credit for posting the personal information of hundreds of US military and government personnel.




Compromised data included names, email addresses, passwords, phone numbers and other information of personnel of the Air Force, Marine Corps, Port Authority of New York and New Jersey, and NASA.


Leaked data also reportedly included credit card information from US State Department officials, along with Facebook message screenshots between military personnel. The group previously targeted Canadian military cadets, and hacked websites to share images from Syria.

Continue reading ''Islamic State Hacking Division' compromises US military personnel' (full post)

Former spy panel senator believes Edward Snowden should be hanged

By: Michael Hatamoto | More News: Hacking & Security | Posted: Aug 11, 2015 8:21 pm

There are plenty of folks in Washington, D.C. unhappy with former NSA contractor Edward Snowden, and you can count retired Sen. Saxby Chambliss (R-GA) as one of those people. Snowden remains holed up in Moscow, Russia, with very few options considering the severity of charges he faces in the United States.




Chambliss believes there could be only one way to punish Snowden for his actions:


"We need to hang him on the courthouse square as soon as we get our hands on him," Chambliss recently told students at the University of Georgia's Terry College of Business. "I hope none of you have any sympathy for him."

Continue reading 'Former spy panel senator believes Edward Snowden should be hanged' (full post)

Edward Snowden wants to see firms fight against encryption demands

By: Michael Hatamoto | More News: Hacking & Security | Posted: Aug 2, 2015 7:42 pm

The Obama Administration desperately seeks changes to encryption, hoping technology companies will install hidden backdoors just for them. Former NSA analyst Edward Snowden is defending the argument supported by companies such as Google and Apple, as politicians in Washington demand better access.




"The central problem with insecurity mandates has never been addressed by its proponents: if one government can demand access to private communications, all governments can," Snowden said in an email published by The Intercept. "No matter how good the reason, if the US sets the precedent that Apple has to compromise the security of a customer in response to a piece of government paper, what can they do when the government is China and the customer is the Dalai Lama?"


"Technologists and companies working to protect ordinary citizens should be applauded, not sued or prosecuted," Snowden also said in the email.

Continue reading 'Edward Snowden wants to see firms fight against encryption demands' (full post)

Hackers able to tamper with target of high-tech weapon

By: Michael Hatamoto | More News: Hacking & Security | Posted: Aug 2, 2015 7:32 pm

Who could have foreseen a Wi-Fi-connected self-aiming weapon could be compromised so hackers are able to digitally "tag" a target independent of what the shooter wanted to fire at. TrackingPoint created an uber pricey rifle that allows for amateur shooters to accurately hit targets up to a half mile away - unless a hacker changes the target.



Using the weapon's Wi-Fi system, the researchers were able to compromise its software - and they found a way to manipulate its scope, feeding the shooter false wind direction, temperatures, and other considerations. Amateur shooters wouldn't likely notice the changing variables, even if the rifle locked onto a different target.


"You can make it lie constantly to the user so they'll always miss their shot," said Runa Sandvik, a researcher able to hack the rifle, in a statement published by Wired. "If the scope is bricked, you have a six to seven thousand dollar computer you can't use on top of a rifle that you still have to aim yourself."

Continue reading 'Hackers able to tamper with target of high-tech weapon' (full post)

Connected car cybersecurity risks won't go away any time soon

By: Michael Hatamoto | More News: Hacking & Security | Posted: Aug 2, 2015 1:45 pm

As more vehicles include connected features such as high-tech infotainment systems, the problem won't just disappear anytime soon. In fact, this is something that we'll end up hearing more about in the future, as more problems are identified.




"This is the shot across the bow. Everybody's been saying 'cybersecurity,'" said Mark Rosekind, head of the National Transportation Safety Administration (NTSA), in a statement published by the NBC News. "You've got to see the entire industry proactively dealing with these things."


News that hackers were able to hijack a Jeep vehicle was the most recent connected car security fear - and it's something that has the NTSA frightened. "The supplier didn't just supply radios to Chrysler but to a lot of other manufacturers - a lot of our work now is trying to find out how broad the vulnerability could be."

Continue reading 'Connected car cybersecurity risks won't go away any time soon' (full post)

Chinese launching chaotic number of attacks against US infrastructure

By: Michael Hatamoto | More News: Hacking & Security | Posted: Aug 1, 2015 3:43 am

The Chinese government and suspected hacker groups with ties to Beijing are enjoying their attacks against the United States economy, according to a secret map compiled by the National Security Agency (NSA). Each red dot signifies a major corporate, private or government cyberattack victim from suspected Chinese sources:




When it comes to cybersecurity, the United States clearly hasn't taken the threat seriously enough, and it's glaringly obvious to organized hackers and foreign governments. Although the folks in Washington absolutely love to spy on others, they haven't done a very good job trying to prevent these attacks.


If the map is accurate, the NSA has a pretty good idea on which companies, government networks, and critical infrastructure the Chinese hackers are interested in compromising.

WikiLeaks says the United States spied on Japan, a close Asian ally

By: Michael Hatamoto | More News: Hacking & Security | Posted: Jul 31, 2015 5:28 pm

WikiLeaks has published "Target Tokyo," listing 35 "Top Secret NSA targets" located in Japan, including intercepts from US-Japan relations, trade negotiations and sensitive climate change strategy.




The United States spied on companies such as Mitsubishi and Matsui, Japanese government officials, ministries and senior advisers to Prime Minister Shinzo Abe's administration. Other targets included the Japanese Cabinet Office switchboard, Japanese Central Bank officials, governors, and other high-ranking officials.


"In these documents we see the Japanese government worrying in private about how much or how little to tell the United States, in order to prevent undermining of its climate change proposal or its diplomatic relationship," said Julian Assange, Editor-in-Chief of WikiLeaks. "And yet we now know that the United States heard everything and read everything, and was passing around the deliberations of Japanese leadership to Australia, Canada, New Zealand and the UK."

Continue reading 'WikiLeaks says the United States spied on Japan, a close Asian ally' (full post)

Hackers hijacking your webcam and finding ways to profit from it

By: Michael Hatamoto | More News: Hacking & Security | Posted: Jul 31, 2015 12:30 pm

Cybercriminals known as "ratters," responsible for hijacking webcams and other electronic devices to spy on unsuspecting users, are finding new ways to launch attacks. Specifically, the groups use remote access tools (RATs) to steal images and photos from webcams, and have lately started charging others for this stolen data.




"Ratters are disturbingly comfortable with spreading misery and fear," said Adam Benson, deputy executive director for the Digital Citizens Alliance. "It's like a game for them. We saw them chat about it on Hack Forums and then share videos showing off how they scare young people, spy on people in private moments, and steal pictures from victims' accounts."


It's not uncommon to find RATs available for download on Internet forums and through file-sharing services. One such forum offered access to compromised devices for $1 for guys and $5 for women - showing there a modest financial incentive.

Continue reading 'Hackers hijacking your webcam and finding ways to profit from it' (full post)

White hat hacker shows vulnerability in GM's OnStar system

By: Michael Hatamoto | More News: Hacking & Security | Posted: Jul 30, 2015 7:38 pm

White hat hacker Samy Kamkar recently posted a video discussing how he found a way to "locate, unlock and remote-start" General Motors vehicles by compromising the OnStar vehicle communications system.



Using the gadget, which cost around $100 to make, the system makes it possible to locate, unlock, and start the engine. Once a small wireless device has been placed near a GM car with OnStar, Kamkar was able to gain unauthorized access to the vehicle.


Dubbed the "OwnStar" system, Kamkar showed he was able to intercept communication from the OnStar service and OnStar RemoteLink mobile app. Technical details will be revealed during Def Con next week.

Continue reading 'White hat hacker shows vulnerability in GM's OnStar system' (full post)

Subscribe to our Newsletter

Latest News Posts

View More News Posts

Forum Activity

View More Forum Posts

Press Releases

View More Press Releases