Hacked: Hacking Finance

Hacked: Hacking Finance


Navigation
TagEditor’s Pick
Featured

Breaches

Career Hacker Fleeced by the FBI in Syracuse

Posted on April 21st, 2015.

Last Thursday, veteran hacker Chris Roberts made a huge mistake. He was enjoying the in-flight WiFi on a United Airlines flight from his home base in Denver to Syracuse, New York when he noticed that certain things were visible to him. Here’s the tweet heard ’round the world:

Featured

Cybersecurity

Ning Doesn’t Believe in HTTPS: Major Vulnerability for 50 Cent’s Social Network

Posted on April 20th, 2015.

Readers may be surprised to read that there are still websites that use the deprecated, insecure HTTP protocol to authenticate user access. As reported here, the dating website Match.com is one of them. But an even bigger userbase than that is Ning, the site that allows anyone to create a social network.

Featured

Breaches

Florida Bringing Hacking Felony Charges Against 13-Year-Old

Posted on April 17th, 2015.

The definition of hacking in Florida might get a whole lot broader if Domanik Green is found guilty, now that the Pasco County, Florida prosecutors have apparently not yet decided to drop hacking charges against the 8th grader. The Serious Crime of Changing a Desktop Background To be clear from the outset, all this boy did was change a...

Featured

Breaches

CyberCaliphate Takes French TV Station Offline and Off-Air

Posted on April 16th, 2015.

The web services of TV5Monde (TV5World) was attacked on the evening of April 9th in a very thorough way. The attack was claimed by ISIS-linked hacking group CyberCaliphate and affected all arms of the organization – broadcasting, websites, and social media accounts.

Featured

Breaches

Tewksbury, Massachusetts Police Latest to Get Cryptolocked

Posted on April 14th, 2015.

One would think that the police would understand security. After all, security is what they do. But time after time, hackers have been able to not only invade police networks, but then install Cryptolocker or a similar software, and hold the files hostage until the police pay in bitcoins.

Featured

Breaches

AT&T Gets a $25,000,000 Fine after Contractor Data Theft

Posted on April 12th, 2015.

The Federal Communications Commission has brought AT&T to a $25,000,000 settlement over its mismanagement of customer data between the end of 2013 and the end of 2014. Rather than face litigation, AT&T has agreed to the FCC’s largest-ever settlement in relation to data and privacy loss or theft. (Another fairly large...

Featured

Eavesdropping

Senate Compiling Database of US Spy Programs

Posted on April 10th, 2015.

Democratic Senator Dianne Feinstein, who has served 25 years for the state of California and is best known for her crusade against guns and violence, particularly violence in video games, has given a rather candid interview to the Associated Press. She explained that the Senate Intelligence Committee has been so overwhelmed by the...

Featured

Bugs

Mozilla Recalls New Features Due to Fatal Security Bug

Posted on April 9th, 2015.

Firefox 37 was released on March 31st, but less than a week later, on April 3rd, Mozilla was forced to release a patch that disabled many new features it had instituted.

Featured

Breaches

Despite Denial, Uber Users Complaining of Hacked Accounts

Posted on April 4th, 2015.

About a week ago, Motherboard reported that Uber accounts were being sold en masse on Dark Net Markets for $1 to $5. Uber has since denied the claim, but numerous complaints have surfaced on Twitter, and elsewhere that impostors had been using legitimate accounts to utilize the global, semi-peer-to-peer taxi service.

Featured

Politics

Estonia Takes Leading Strides in the Digital Age

Posted on April 2nd, 2015.

Estonia has taken definitive steps towards integrating their country with the digital age. This new service allows individuals and businesses to register themselves as an e-Resident of Estonia via easy e-estonia.com.

Featured

Videos

UK Man Creates Fake Website to Initiate Jail Release

Posted on April 1st, 2015.

Neil Moore, who was held at the UK’s Wandsworth Prison for defrauding large organizations in excess of £1.8 million, recently made use of his voice impersonation skills yet again. While imprisoned, he managed to create a fake website and e-mail account using an illicit mobile phone number.

Featured

Cybersecurity

How to Create a Secure Password

Posted on March 31st, 2015.

Want to learn how to create a secure password? In this guide you can get a good understanding of what you need for a strong password. In the last decade, the number of services requiring a password has grown exponentially. This has changed the way we use the Internet. Some reading this guide may not remember a time when the primary...

Featured

Cybersecurity

UK Government Authorized GHCQ to Hack Any Device

Posted on March 28th, 2015.

Last year, Privacy International legally challenged the UK government for information on its hacking powers via GHCQ. The request was based on documents leaked by Edward Snowden which alleged state-sponsored hacking. Not on the part of governments like the Democratic People’s Republic of Korea, but on the part of western...

Featured

Breaches

Cisco Discovers “PoSeidon” POS Malware

Posted on March 26th, 2015.

Researchers at Cisco’s Talos Security Intelligence and Research Group have discovered a dangerous, new form of point-of-sale (POS) malware dubbed “PoSeidon”. The malware builds upon previous trojans like ZeuS and BlackPOS that affected retail stores like Target and Home Depot. Many credit card terminals run legacy...

Featured

Cybersecurity

Eugene Kaspersky: I Am Not A Russian Spy

Posted on March 25th, 2015.

On the 19th of March, Bloomberg published a sensational, fear-inducing story: the founder of  Kaspersky Labs, Eugene Kaspersky, is a Russian spy, and this is why his company does not focus on attacks of Russian origin.

Featured

Breaches

Another Air-Gap Bridge Discovered, Using Heat

Posted on March 24th, 2015.

A fairly common set up for air-gap security, the set up which cuts a system off from all networking on a permanent basis, is to have air-gapped computers near regular workstations so that they are easily accessible. For a long time, the common wisdom has been that this is the only way to be truly secure from remote attacks. Local...

Featured

Breaches

No Browser is Secure: All Major Browsers Hacked at 2015 Pwn2Own Contest

Posted on March 22nd, 2015.

At least on Windows, and possibly on Mac. At the 2015 Pwn2Own Contest in Vancouver, which is part of the larger computer security conference called CanSecWest, independent security researchers were able to execute exploits on all four major browsers. The victims were Safari on OSX, Chrome on Windows, Firefox on Windows, and, less...

Featured

Breaches

Department of Justice Abandoning Hacking Charges Against NOAA Employee

Posted on March 21st, 2015.

Last October, Sherry Chen was brought up on very serious hacking charges. The government alleged that in 2012, Chen had illegally accessed data from the National Inventory of Dams. The NID is an Army Corps of Engineers database which records information about the structural integrity, as well as other safety information, about all the...

Featured

Communication

Tutanota: the Open-Source Encrypted E-mail Answer to Protonmail

Posted on March 20th, 2015.

For several years, and especially since the Edward Snowden revelations, there has been a need for an easy-to-use, automatically encrypted communications service.

Featured

Information

Hacktivist groups join the fight against ISIS

Posted on March 19th, 2015.

Several Hacktivist groups, including Anonymous, GhostSec, and Ctrlsec, have formed an alliance of sorts, to combat ISIS. Together, the groups have compiled a list of 9200 Twitter accounts that they claim support ISIS. Earlier this year, the hacktivist group known as Anonymous released a video in which they mark ISIS as their next target....