Hacked: Hacking Finance

Hacked: Hacking Finance


Navigation
CategoryVulnerabilities
Featured

Vulnerabilities

New Form of Ransomware Uses Social Media to Customize Demands

Posted on November 27th, 2016.

A new form of ransomware is reported to have been found that uses a person’s social media and computer files to customize a demand, according to cybersecurity researchers at Proofpoint. Called ‘Ransoc’ by the researchers because of its connection to social media, they found that the malware was scanning local media filenames and running...

Featured

Eavesdropping

Are Children Losing Their Childhood to Smart Toys?

Posted on October 27th, 2016.

Smart toys are on the rise, but while they may have the ability to enhance a child’s play, do they also pose a threat by spying on what children are doing? In an article from the New Scientist, the issue of privacy is looked into. More specifically, the privacy of children. Nowadays, it seems it’s no longer a case of simply playing with...

Featured

Bitcoin

Russian Fraudster Lures Thousands in Kenyan Pyramid Scheme with a Bitcoin Twist

Posted on October 26th, 2016.

For the past year, Kenyans have been lured with the promise of making money quickly through a pyramid scheme started by convicted Russian fraudster, Sergey Mavrodi, reports the Daily Nation, a Kenyan news site. Mavrodi is reported to have designed a major pyramid scheme in Russia before its end came in 1997, which is believed to have...

Featured

Vulnerabilities

Gorillaz Web Shop Redirects To Family-Oriented Guns & Ammo Dealer

Posted on October 13th, 2016.

For several weeks, the official Gorillaz web shop – http://www.shop.gorillaz.com – has redirected to Betty’s Country Grocery in Stokes County, North Carolina. The building where Betty’s Country Grocery is located was built in the early 1940s, but Betty did not run her business from the location until she bought it from...

Featured

Cybersecurity

Atomic Energy Director: Nuclear Power Plant Saw ‘Disruptive’ Cyber Attack

Posted on October 11th, 2016.

The head of the United Nations’ nuclear watchdog revealed that a nuclear power plant was the target of a disruptive cyberattack two to three years ago. “We never know if we know anything…” said the director of the International Atomic Energy Agency, the world’s foremost nuclear watchdog, when it comes to cyberattacks targeting...

Featured

Bitcoin

Majority of Monero 3rd Party Wallets Vulnerable to Theft, Says Security Advisory

Posted on September 20th, 2016.

  A security firm has published an advisory that warns Monero users of a vulnerability that would enable a hacker to steal the cryptocurrency from a majority of third-party digital wallets.

Featured

Cybersecurity

Hackers Successfully Remote Attack a Tesla Model S

Posted on September 20th, 2016.

A group of Chinese hackers has posted a video that supposedly demonstrates the impact of their remote attack vector on Tesla Motors.

Featured

Bitcoin

The Biggest Bitcoin Hacks and Thefts of All Time

Posted on September 19th, 2016.

The story of bitcoin’s biggest hacks and thefts is the story of bitcoin itself. From its early days and its first hack, to the biggest theft of all time, bitcoin’s utopian promises often turned into a dystopian reality where scammers, thieves, unaccountable and often amateur exchanges, some, even fully anonymous, proliferated in a...

Featured

Breaches

How Cybercriminals Target Victims: Report Cites Top Information Resources

Posted on September 19th, 2016.

Cybercriminals, whose attacks cost organizations millions of dollars a year, do extensive research on their targets. They gather organizational and personal information before deciding which vulnerabilities to exploit. SurfWatch Labs, a security consultancy, has released a report on research resources cybercriminals use. The purpose of...

Featured

CCN

Banks Still Losing Money through SWIFT Attacks

Posted on August 31st, 2016.

It has been half a year since the now infamous bank heist that saw the Bangladesh Central Bank lose over $80 million from its New York Federal Reserve account. Hackers were able to exploit the bank’s lax security framework with SWIFT transfers, at the time. Things haven’t changed much, SWIFT privately disclosed to its client banks....

Featured

Breaches

Shadow Brokers Hacking Group Claim to Have NSA Hacking Tools for Sale

Posted on August 16th, 2016.

A hacking group by the name of Shadow Brokers is claiming that it has National Security Agency hacking tools for sale. In an Internet posting, the group said that they have a ‘full sponsor state tool set’ of cyberweapons, which the group claim belongs to the Equation Group, which is believed to be an NSA affiliate, according...

Featured

Cybersecurity

Lock Picking at Cybersecurity Conference Def Con

Posted on August 15th, 2016.

When you think of lock picking you might not put it with a cybersecurity conference such as Def Con. However, the recent conference in Sin City demonstrated that the traditional method of picking locks is essential to teaching individuals how to protect machines from digital threats letting them unleash their inner child. With remote...

Featured

Cybersecurity

Whitepaper: Cybersecurity Risk for Connected Cars

Posted on August 10th, 2016.

A whitepaper has unveiled that design flaws could allow hackers to take control of connected vehicles. The cybersecurity division of IOActive reported in the whitepaper that 50 percent of cyber vulnerabilities discovered in manufacturer designs have the potential to be exploited. Furthermore, 71 percent of the vulnerabilities listed...

Featured

Cybersecurity

The Future of Cybersecurity May Be with Supercomputers

Posted on August 5th, 2016.

Seven supercomputers recently took part in a virtual contest that saw them competing against one another in a bid to find software vulnerabilities. Taking place in Las Vegas at DEF CON, a cybersecurity event, the seven supercomputers participated in the Cyber Grand Challenge where they were tasked with playing the hacking game Capture...

Featured

Cybersecurity

Donald Trump Is All about the ‘Cyber’ with Cybersecurity

Posted on July 22nd, 2016.

Donald Trump could become the next President of the United States. If and when he does, the subject of cybersecurity and the widening scale of cyberattacks will firmly be on the agenda. So what does Trump have to say about a subject that requires a certain understanding and nuance? Donald Trump, now officially the Republican candidate...

Featured

Identity Theft

Researcher: Pokémon GO is a Huge Security Risk

Posted on July 13th, 2016.

The phenomenon that is Nintendo’s Pokémon registered another massive (and arguably its biggest) hit with the release of Pokémon Go, a mobile app game so successful that it helped rocket Nintendo’s shares through the roof. With popularity comes scrutiny and one security researcher has pointed to a significant security risk concerning the...

Featured

Breaches

Obama: Cybersecurity in Government Concerns Me

Posted on July 11th, 2016.

U.S. President Barack Obama has admitted that the White House has been the target of hacking incidents while adding that the state of cybersecurity “throughout the government, in general.” U.S. President Barack Obama was in Spain during a diplomatic visit when he spoke about the state of cybersecurity in the U.S. state department, White...

Featured

Breaches

FBI: Hillary Clinton Faces No Charges for Email Hacking

Posted on July 6th, 2016.

Although he deemed Hillary Clinton’s use of her private email servers while serving as secretary of state, FBI director James Comey said that he would not be recommending criminal charges against the presumptive Democratic presidential nominee. In a public conference held in front of the watching world, FBI director James Comey raised...

Featured

Cybersecurity

Google CEO’s Quora Account Hacked by Zuckerberg Hackers

Posted on June 27th, 2016.

Google CEO Sundar Pichai’s Quora account has been compromised by the same group of hackers who previously breached Facebook CEO Mark Zuckerberg’s Twitter and Pinterest accounts. A three-man hacker outfit called OurMine has hacked Google CEO Sundar Pichai’s Quora account, posting messages on the platform which was incidentally connected...

Featured

Breaches

Terrorist Cyber Attacks Are Coming, Security Experts Warn

Posted on June 22nd, 2016.

Kaspersky Lab senior researchers warned at a cyber security conference in Baku, Azerbaijan that major cyber attacks on infrastructure in the Middle East are pending, with governments, companies and individuals mostly unprepared. The average ransomware is now $551,000, and security researchers find 310,000 new viruses every day. Ghareeb...