Hacking News, Articles and Updates

Business​ ​Risk​ ​Intelligence​ ​-​ 2017​​ ​Review​,​ ​2018​ ​Flashpoints

China leads the hacking charts with the highest combination of impact factors ticked off on a matrix combining the potential capability and impact of possible attacker groups, thus presenting the highest risk.

Spanish research tool probes smartphone electromagnetic emissions for encryption keys

Spanish researchers are developing a tool that will scan smartphones for 'electromagnetic emanations' that could be used to obtain encryption keys as part of an attack.

Letter submitted in lawsuit alleges Uber hacked competitors' networks

A letter written on behalf of a former Uber employee contains allegations that the transportation company illegally hacked and surveilled its competitors.

Starbucks free Wi-Fi caught secretly mining cryptocurrency

A tech CEO noticed the free Wi-Fi at his local Starbucks didn't exactly come without a price after discovering the network was secretly jacking his computing power to mine crypto-currency.

A postmortem of the Grey's Anatomy ransomware episode: Accurate or not?

In the mid-season finale of Grey's Anatomy, titled "Out of Nowhere," Grey-Sloan Memorial Hospital itself was on life support after its network became infected with ransomware - how realistic was the portrayal?

Suicide risk leads appeal grounds in Lauri Love extradition case

A legal precedent will be set over the extradition of Lauri Love, a man with Asperger's accused in the US of hacking government computer systems, when a decision is made following presentations being made in the UK high court.

MPs push May to block Lauri Love extradition on health grounds

A group of UK MPs has beseeched Prime Minister Theresa May to block the extradition of hacker Lauri Love to the US, saying they fear for his mental health.

ROCA, the role of key generation and decrypting of private keys

Richard Moulds takes a look behind recent crypto vulnerability headlines - the ability to calculate the private key of an RSA keypair purely by knowing the public key - and asks if they are a prelude to a 'cryptoapocalypse'.

Is it time to rethink the password?

The password on its own is not enough to protect an organisation's data, even if you follow best practice says Kevin Timms, adding passwords that are easily entered and remembered are inherently weak and easily compromised.

Social Media - the privileged account no one talks about

Companies seem to be slow to realise that their Twitter, Facebook or LinkedIn accounts and passwords require exactly the same protection as any of their high-risk or high-value internal systems says Jackson Shaw.

Oilpro.com founder sentenced to prison for hacking competitor

The founder of a professional networking site was sentenced to a year and one day in prison after hacking into a competitor's database and attempting to sell his site to the same company whose database he hacked.

Malicious websites targeting Israeli institutions- TwoFace webshell link

A webshell used to harvest credentials from an unnamed Middle Eastern organisation appears to be targeting Israeli institutions and may possibly be linked to the Iranian APT group OilRig.

Attackers can pull data from air-gapped networks' surveillance cameras

Researchers have demonstrated a way for remote attackers to exfiltrate data from and send malicious commands to air-gapped networks, using infrared surveillance cameras.

ICYMI: Facebook malware; nude celeb hack; logons key; spambot; CeX hack

In Case You Missed It: Facebook spreads malware; Instagram celeb hack; Logon breach id key; Spambot weaponises 711 m accounts; CeX hacked

Hackers leak more celeb nude pics - Dakota Johnson joins Miley Cyrus

Hackers leak more celeb nude pics - Dakota Johnson joins former sports couple Tiger Woods and Lindsey Vonn, actress Kristen Stewart, performers Miley Cyrus and Katharine McPhee, and model Stella Maxwell.

Solar panel hack could knock out power grid

Cyber-attack on photovoltiac panels could bring down power and have a domino effect on the rest of the electricity supply, both nationally and potentially, continentally.

Blog: Malwaretech, a black and white case or somewhere in between?

Is Malwaretech, aka Marcus Hutchins, innocent? The FBI says Hutchins wrote the code for the Kronos banking Trojan. Without seeing all the evidence from both sides, it's impossible to know for sure.

Researchers pwn Alexa, turning Amazon Echo into covert snooping device

Older versions of Amazon Echo are vulnerable, and though physical access to the device is needed, this is more achievable with second hand devices.

Is China's newly built quantum crypto-network really unhackable?

It looks like China is the latest to apply quantum cryptology to create a supposedly unhackable network. But just how valid are these claims?

Don't be a copycat: TTPs of CopyKittens revealed

The group is known for attacking government, security and academic institutions around the world.

Security sucks: measures often disabled to increase productivity

Research shows most security pros would disable security to allow employees more freedom to get their work done.

G20 finance chiefs agree on concerted effort to fight financial crime

The agreement follows a number of high profile cyber-attacks on banking systems around the world, which has brought banking security to the top of the agenda.

Kremlin seeks to sway British public opinion?

The head of the UK's National Cyber Security Centre has written to political parties warning of potential Russian-backed hacking to sway the British electorate.

Wikileaks releases document trove allegedly containing CIA hacking tools

Hacking tools from the isolated, high-security network situated inside the CIA's Centre for Cyber Intelligence have allegedly been released by Wikileaks who hope to instigate conversation around the moral use of cyber-weapons.

Major spam operation suffers data leak containing 1.4 billion records

A spamming group called River City Media, led by well-known spammers Alvin Slocombe and Matt Ferris, has had its database of 1.4 billion records leaked.

New technology, same bugs: the rise and fall of the robot revolution

A plethora of vulnerabilities across multiple models and brands of robots is leaving cyber-security experts scratching their heads, wondering why we are making the same old mistakes again.

Cellebrite celebrates: Israeli firm can now open iPhone 6 and 6 plus

The mobile forensics company Cellebrite is slowly catching up with its abilities to exfiltrate data from mainstream mobile phones, and has come under criticism for selling its technology to autocratic regimes.

Major Dark Web host hacked, 381,000 sets of user details leaked online

Freedom Hosting II, a major Dark web host has been hacked, resulting in 381,000 user emails leaking onto the public internet.

Brian Krebs says the US needs to cultivate more "Hackers for Good"

Cyber-security blogger Brian Krebs spoke at Microsoft BlueHat IL on the psychology of the modern-day supervillain hacker and outlining key threats.