Source: Wired - Posted by Dave Wreski
|
An elite group of nation-state hackers running roughshod through the financial sector and other industries in the U.S. has pioneered techniques that others are following, and has used sophisticated methods to go after hardened targets, including hacking a security firm to undermine the security service the company provided its clients. |
|
Source: Reuters - Posted by Dave Wreski
|
Former security contractor Edward Snowden was able to obtain secret documents revealing a massive U.S. spying effort from the National Security Agency's internal website, U.S. officials said according to a report on Wednesday. |
|
Source: Slate - Posted by Alex
|
Cryptographers are fighting back against efforts by spy agencies to secretly weaken the encryption standards designed to keep the Internet secure. |
|
Source: RT - Posted by Dave Wreski
|
The NSA has been widely monitoring international banking and credit card transactions, a new report says referencing Edward Snowden’s leak. The agency targeted Visa customers and global financial service SWIFT and created its own money flows database. |
|
Source: Times of Isreal - Posted by Dave Wreski
|
In the hacking world, it takes one to know one. For many corporations, the best defense against hackers is to actually hire a hacker and pay him or her to break into their sites or databases and expose weaknesses in a benign manner. There aren’t that many “white hat” hackers out there, and one of the most in-demand of these hackers is Israeli Shai Rod. |
|
Source: Schneier on Security - Posted by Alex
|
The Brazilian television show "Fantastico" exposed an NSA training presentation that discusses how the agency runs man-in-the-middle attacks on the Internet. The point of the story was that the NSA engages in economic espionage against Petrobras, the Brazilian giant oil company, but I'm more interested in the tactical details. |
|
Source: Poughkeepsie Journal - Posted by Dave Wreski
|
Hacker culture is alive and thriving in today’s Internet-dependent world. From cyberattacks to “hacktivism,” hackers run the gamut from criminals to modern-day heroes. Learn all about these clever individuals and the very real implications of their efforts. |
|
Source: BBC - Posted by Dave Wreski
|
Police in Argentina have arrested a 19-year-old man accused of heading a gang of hackers who targeted international money transfer and gambling websites.
Dubbed "the superhacker", the teenager was making $50,000 (£31,500) a month, working from his bedroom in Buenos Aires, police say. |
|
Source: lifehacker - Posted by Dave Wreski
|
Welcome to our next Hacker Challenge! Each week, we issue a new challenge. You get until Sunday to prepare your submission and send it to us. That gives you a few days to think about it and a whole weekend to work it up. Our editors pick the best submissions and our favorite will be featured right here on Lifehacker! |
|
Source: Washington Post - Posted by Alex
|
A hacker group linked to the Syrian government was “highly effective” in conducting cyberattacks against social media over the past several months, according to an FBI advisory. |
|
Source: DW - Posted by Dave Wreski
|
The German subsidiary of British mobile operator Vodafone has been attacked by a hacker, who has reportedly stolen a huge amount of customer data. Police suspect that a contracted IT specialist carried out the attack. |
|
Source: RT - Posted by Dave Wreski
|
The Pirate Bay has long been a thorn in the side of copyright holders, but when Britain’s record industry trade association asked Google to remove the notorious file-sharing site from its homepage, the search engine refused to comply. |
|
Source: The Guardian - Posted by Anthony Pell
|
Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves. |
|
Source: Schneier on Security - Posted by Anthony Pell
|
The TSA does not have to tell the truth:
Can the TSA (or local governments as directed by the TSA) lie in response to a FOIA request?
Sure, no problem! Even the NSA responds that they "can't confirm or deny the existence" of classified things for which admitting or denying existence would (allegedly, of course) damage national security. |
|