Hacked: Hacking Finance

Hacked: Hacking Finance


Navigation
CategoryHome Security
Featured

Cybersecurity

Proposed Law Would Require U.S. Companies to Unlock Encryption under Court Order

Posted on April 14th, 2016.

The encryption controversy in the U.S. isn’t going away anytime soon. Two U.S. senators have proposed requiring companies to unlock encrypted technology when a court calls on them to do so, changing the current law and escalating a conflict between the technology industry and the U.S. government, according to The Wall Street...

Featured

Business

Is the FBI Warrant against Apple Legally Suspect?

Posted on March 2nd, 2016.

The Wall Street Journal has come out today in favor of Apple in its legal fight with the FBI in an editorial titled “Apple is Right on Encryption.” The editorial notes that the FBI is invoking a law that only allows them to exercise powers Congress has granted, which in this case it has not. The newspaper says the case is not about...

Featured

Breaches

U.K. Police Arrest Teen Following Hacks Of High-Level U.S. Intelligence Officials

Posted on February 13th, 2016.

Police in the United Kingdom arrested a teenager suspected of breaching U.S. intelligence officials’ accounts, according to phys.org, a science, research and technology news site. The arrest followed news reports of hacking attacks against CIA, FBI, White House, Homeland Security and other government agencies claimed by someone...

Featured

Cybersecurity

JavaScript-based Ransom32 Makes Ransomware Easier Than Ever

Posted on January 3rd, 2016.

Ransomware has traditionally involved advanced exploitation of desktop vulnerabilities, gaining the Windows equivalent of root, and encrypting the file system in such a way that the user can only get out of it by making a payment. Police departments, along with thousands of everyday users, have been impacted. Often in the case of police...

Featured

Cybersecurity

Feds Charge Hacker With Trying To Sell Stolen TV Scripts, Sex Tapes And Private Information

Posted on December 26th, 2015.

Federal prosecutors have charged a Bahamas man with felony criminal copyright infringement and identity theft for hacking 130 celebrities’ email accounts and stealing unreleased movie scripts, sex tapes and Social Security numbers, according to The New York Times. Alonzo Knowles, 23, appeared in Federal District Court in New York City on...

Featured

Breaches

Iranian Hacking Of New York Dam Signals Wider Cyber Threat

Posted on December 22nd, 2015.

A classified incident where Iranian hackers infiltrated a dam less than 20 miles from New York City two years ago underscores a major threat to the U.S. power grid, factories, pipelines, bridges and dams, according to a front-page story in today’s Wall Street Journal. The story notes the incident occurred amidst concerns that the...

Featured

Business

DHS Offers Free Cyber-Attack Drills For Private Companies

Posted on December 3rd, 2015.

The U.S. Department of Homeland Security (DHS) has been offering a free service to test companies’ abilities to withstand cyber attacks, according to KrebsOnSecurity. The little-known program involves penetration testing of companies’ infrastructure and has drawn both support and criticism from private security experts. Under the...

Featured

Cybersecurity

Cyber Warfare: The New Arms Race

Posted on October 13th, 2015.

After spending billions to build nuclear weapons, a different arms race has emerged in cyber warfare. Where the nuclear arms race pits the larger countries against each other, the cyber arms race includes a much larger number of combatants since it is open to almost anyone with cash and a computer, according to a front-page article in...

Featured

Breaches

Report: Publicly Disclosed Data Breaches are Increasing, Dramatically

Posted on October 3rd, 2015.

The 2015 Internet Organized Crime Threat Assessment (IOCTA) has revealed that the number of “publically disclosed” data breaches this year has increased significantly, leading to secondary crimes wherein the breached data is used for extortion, identity theft, fraud and other similar offences. The 2015 law enforcement-centric IOCTA...

Featured

Breaches

Hackers Net 5.6 Million Fingerprint Records In U.S. Government Breach

Posted on September 23rd, 2015.

The U.S. government reported hackers got away with about 5.6 million fingerprint records, 4.5 million more than first reported, according to Reuters. The hackers stole security clearance data on millions of Defense Department and other U.S. government employees. The change in number was reported by the Office of Personnel Management...

Featured

Fun Hacks

Quick How-To: Hack Bios Passwords on your Computer

Posted on August 11th, 2015.

Whether you forget your password or the used laptop you bought online shipped with a locked BIOS, hacking the password is easy enough. If physical access is unlimited, the process is similar to replacing a watch battery. If taking apart your machine is outside your comfort zone or otherwise infeasible there is a software option. Most...

Featured

Business

Canadian Technology Giant CGI To Seek Cyber Security Acquisitions, Will Exit Low-Margin Markets

Posted on July 30th, 2015.

CGI Group Inc., the Montreal, Canada-based information and management consulting company, plans to target acquisitions in cyber security while exiting some markets entirely, according to Reuters. The company announced its growth plans in reporting Wednesday that third-quarter profit and revenue missed estimates. CEO Michael Roach said...

Featured

Cybersecurity

How to Encrypt & Decrypt Any File On Your System (Video Tutorial)

Posted on July 20th, 2015.

This tutorial assumes that you understand the purpose of cryptography, know how to install software, and learn best by doing. You may also find our guide on creating a secure password useful. We hope you find this tutorial useful and encourage any feedback directly to the author or in the comments field.

Featured

Bugs

T-Mobile Fined $17.5 Million for 911/EMS Outage

Posted on July 19th, 2015.

Every hour nearly 30,000 calls are placed to emergency medical services (EMS) in the United States, according to USA Today. These calls are of a protected nature and can be made even using a mobile device that is otherwise out of service. However, last August, many of T-Mobile’s customers were unable to reach 911, the American...

Featured

Breaches

Minnesota Family Discovers Compromised Nannycam

Posted on April 7th, 2015.

As technology advances, so does criminality. The “Peeping Tom” of old can now go about his nefarious activities from the comfort of his home – halfway around the world. Thanks to Nannycams, or web-enabled cameras that allow parents to monitor their children both on their local network and often while away from the home,...

Featured

Cybersecurity

Risky Business: the Internet of Things (IoT)

Posted on March 6th, 2015.

The internet has grown exponentially since it was introduced in 1981, and it’s unlikely anyone foresaw the level of dependency we’d have on it. Not only are we connecting our computers, phones, and tablets, but also our thermostats, TVs, vehicles, watches, refrigerators, toasters, light bulbs and a host of house hold appliances. Welcome...

Featured

Cybersecurity

The Future Of Passwords

Posted on March 5th, 2015.

In a search to address security concerns and solve the problems associated with password protection, DARPA, (Defense Advanced Research Projects Agency) is now in the process of developing a behavior based biometric identification system that may replace traditional passwords in the future. According to DARPA, even the strongest password...

Featured

Cybersecurity

Police Are Using Radar Devices To See Inside Homes

Posted on January 22nd, 2015.

In December 2014, in a federal appeals court in Denver, officers made it known they had used a radar device in order to “see through” walls before entering the house and arresting a man wanted for violating his parole. Enter the RANGE-R; a handheld radar device used by U.S. law enforcement agencies to detect movement behind walls.

Featured

Home Security

FBI Pushes The Limits of Their Power – Again

Posted on January 13th, 2015.

With growing concerns about our privacy, it seems a shame we have to look out not just for the criminals, but also to our government. The US Federal Bureau of Investigation has once again pushed the boundaries of their power. In a letter, Senate Judiciary Committee Chairman Patrick Leahy and staffer Sen. Chuck Grassley expressed concerns...

Featured

Home Security

Police Spies Use Fake Instagram Accounts

Posted on December 31st, 2014.

Law enforcement uses social media to enhance its power lying and spying on civilians. It’s no secret that the police spies use fake Instagram accounts and have been creating fictitious Facebook profiles for years. Often using the accounts to spy on suspects. Have you been sent a friend request from a random stranger? Your new...