rpg.pbem.online

Search

Items tagged with: hacking

George Floyd: Anonymous hackers re-emerge amid US unrest | BBC News

As the United States deals with widespread civil unrest across dozens of cities, "hacktivist" group Anonymous has returned from the shadows.
The hacker collective was once a regular fixture in the news, targeting those it accused of injustice with cyber-attacks.
After years of relative quiet, it appears to have re-emerged in the wake of violent protests in Minneapolis over the death of George Floyd, promising to expose the "many crimes" of the city's police to the world.
However, it's not easy to pin down what, if anything, is genuinely the mysterious group's work.
They're ba-ack! Or are they?

#justice #law #BlackLivesMatter #hacking #Anonymous
 

Microsoft warns of huge email phishing scam - here's how to stay protected | TechRadar

Microsoft has issued an alert to users concerning a new widespread Covid-19 themed phishing campaign.
The threat installs the NetSupport Manager remote administration tool to completely take over a user's system and even execute commands on it remotely.
TLDR: If you get an email from the John Hopkins Center, don't open the spreadsheet attachment.

#technology #tech #security #privacy #hacking #Covid-19 #CoronaVirus
 

What does coronavirus tracking in iOS 13.5 do? Cleaning up the confusion | Cult of Mac

iOS 13.5 dropped Wednesday, introducing a slew of upgrades — including, most notably, the API for Apple’s coronavirus contact-tracing tool, developed in conjunction with Google.
But, despite what you might hear online, this is neither an “app” or an update that means downloaders are being tracked without their knowledge. Let’s correct a few popular misconceptions.
#technology #tech #security #privacy #hacking #Apple #Covid-19 #CoronaVirus #ContactTracking
What exactly does coronavirus tracking in iOS 13.5 do? Clearing up the confusion
 

Signal to move away from using phone numbers as user IDs | ZDNet

Secure instant messaging app Signal launched this week a new feature called "Signal PINs" which the company says will help users migrate account data between devices.
Signal says that in the long run, this new feature is the base and the first step towards moving away from using phone numbers as profile IDs.
About time, too!

#technology #tech #security #privacy #hacking #messaging #Signal
 
Image/Photo

Dear hacker, i love you ! <3

An anonymous hacker has released code that allowed anyone to automatically submit junk data to Ohio’s controversial COVID-19 Fraud website, which prompts employers to report workers who refuse to work during the deadly pandemic so they won’t receive unemployment benefits.

Despite these risks, many large companies have continued business as usual while failing to provide employees with masks, gloves, and other personal protective equipment. Meanwhile, several states including Georgia have begun prematurely reopening business against the advice of health experts, forcing more people to return to work or face termination.

the hacker said. “What I’m hoping is that, whether people use this exact code or not, they see it’s possible for people to take direct action against these sort of snitch programs, and that making and spreading small tools like this amongst ourselves can help.”
DOWNLOAD THE TOOLKIT HERE

SOURCE : https://www.vice.com/en_us/article/wxqemy/this-script-sends-junk-data-to-ohios-website-for-snitching-on-workers

tags : #hack #hacker #hacking #work #worker #covid-19 #covid
#praxis #anonymous #pandemic #ohio #unemployment
#toolkit #capitalism #state #snitch #programming #linux #tech
 
Image/Photo

Dear hacker, i love you ! <3

An anonymous hacker has released code that allowed anyone to automatically submit junk data to Ohio’s controversial COVID-19 Fraud website, which prompts employers to report workers who refuse to work during the deadly pandemic so they won’t receive unemployment benefits.

Despite these risks, many large companies have continued business as usual while failing to provide employees with masks, gloves, and other personal protective equipment. Meanwhile, several states including Georgia have begun prematurely reopening business against the advice of health experts, forcing more people to return to work or face termination.

the hacker said. “What I’m hoping is that, whether people use this exact code or not, they see it’s possible for people to take direct action against these sort of snitch programs, and that making and spreading small tools like this amongst ourselves can help.”
DOWNLOAD THE TOOLKIT HERE

SOURCE : https://www.vice.com/en_us/article/wxqemy/this-script-sends-junk-data-to-ohios-website-for-snitching-on-workers

tags : #hack #hacker #hacking #work #worker #covid-19 #covid
#praxis #anonymous #pandemic #ohio #unemployment
#toolkit #capitalism #state #snitch #programming #linux #tech
 

Critical vulnerabilities found in popular VPN apps | TechRadar

Researchers have found various flaws in popular VPN applications that may have exposed users to the hackers allowing them to install malicious updates and ransomware remotely.
According to the experts, top VPN apps including PrivateVPN and Betternet were found to be able to download fake software updates forcing users to install malware, keyloggers, etc. eventually helping in stealing private data.
Other VPN applications like Torguard, CyberGhost, Hotspot Shield and Hide Me were also found to be vulnerable and allowed the researchers to intercept the communication.
#technology #tech #security #privacy #hacking
 

ShinyHunters leak millions of user details | TechRadar

A hacking group known as ShinyHunters has put up a huge cache of stolen user details online.
According to reports, the hackers were able to steal the data of over 73 million users from various websites, which is now up for sale for approximately $18,000 on the underground marketplaces.
Among the sites that have fallen victim to the attack are the likes of Zoosk, Chatbooks, Star Tribune newspaper, Chronicle of Higher Education and various South Korean fashion and furniture websites.
#technology #tech #security #privacy #hacking
 

Meet EventBot, a new Android malware that steals banking passwords and two-factor codes | TechCrunch

Security researchers are sounding the alarm over a newly discovered Android malware that targets banking apps and cryptocurrency wallets.
#technology #tech #Google #Android #malware #hacking #privacy #security
Meet EventBot, a new Android malware that steals banking passwords and two-factor codes
 

GCHQ calls on public to report coronavirus-related phishing emails | Technology | The Guardian

The National Cyber Security Centre, a branch of the intelligence agency, has launched the suspicious email reporting service with a simple request of the public: forward any dubious emails to [email protected], and the NCSC’s automated scanning system will check for scam emails and immediately remove criminal sites.
#UK #technology #tech #phishing #security #hacking
 

This WhatsApp hack puts your friends, family at risk | Android Authority

WhatsApp is one of the best messaging services you can use. It’s been around for more than 10 years, and people all around the world use it every day. Unfortunately, WhatsApp’s popularity makes it a prime target for attackers. That’s exactly what’s happening right now as a current WhatsApp hack is putting users’ accounts at risk.
#internet #messaging #WhatsApp #privacy #security #hacking
A current WhatsApp hack could put your friends and family at risk
 

New Android ransomware poses as coronavirus tracking app | Android Authority

We’ve seen loads of coronavirus apps pop up on mobile app stores in recent months, as the pandemic continues to sweep around the world. Google has taken steps to remove the more questionable apps from the Play Store, but it looks like one Android app on the web is actually ransomware.
#technology #tech #Google #Android #ransomeware #hacking #security
New Android ransomware poses as coronavirus tracking app
 

Live Coronavirus Map Used to Spread Malware | Krebs on Security

Cybercriminals constantly latch on to news items that captivate the public’s attention, but usually they do so by sensationalizing the topic or spreading misinformation about it. Recently, however, cybercrooks have started disseminating real-time, accurate information about global infection rates tied to the Coronavirus/COVID-19 pandemic in a bid to infect computers with malicious software.
Aren't people wonderful?!

#technology #tech #security #privacy #hacking #health #coronavirus #Covid-19
 

Researchers can hijack Siri with inaudible ultrasonic waves | Apple Insider

Security researchers have discovered a way to covertly hijack Siri and other smartphone digital assistants using ultrasonic waves, sounds that cannot be normally heard by humans.
You can use Siri without using voice activation. Just pull down on the middle of your home screen (iPhone or iPad) to start a Search. Type in whatever you like then scroll down to the bottom and tap on 'Ask Siri'.

#technology #tech #Apple #DigitalAssistant #Siri #hacking #vulnerability #security #privacy
 

Ring finally addresses its privacy concerns - here's how to make sure you're protected | TechRadar

Security camera company Ring has been plagued with privacy concerns in recent months, following a high-profile data breach and fears that criminals could hack their devices – and now the brand finally seems to be doing something about it.

If you have a Ring security camera or video doorbell, you'll now need to enable two-factor authentication when you sign in; this is mandatory for all users, and you won't be able to access your account without it.
#technology #tech #security #privacy #hacking #Ring
 

UK police deny responsibility for poster urging parents to report kids for using Kali Linux | ZDNet

The UK's National Crime Agency (NCA) has publicly said it has nothing to do with a misleading poster designed to put fear into the hearts of parents and urge them to call the police if their children are using Kali Linux.

The poster, made public by Twitter user @G_IW, has reportedly been distributed by local authorities on behalf of the West Midlands Regional Organised Crime Unit (WMROCU).
What fresh idiocy is this?

#technology #tech #hacking #security #privacy #linux #KaliLinux
 

UN confirms it suffered a 'serious' hack, but didn't inform employees | Engadget

The United Nations was the victim of a massive, likely state-sponsored hacker attack this past summer, according to reports from The New Humanitarian and Associated Press. To make the matters worse, the organization didn't disclose the details and severity of the hack until those publications obtained an internal document on the situation.
#technology #tech #hacking #security #privacy #UN
 

Intel is patching its Zombieload CPU security flaw for the third time | Engadget

For the third time in less than a year, Intel has disclosed a new set of vulnerabilities related to the speculative functionality of its processors. On Monday, the company said it will issue a software update "in the coming weeks" that will fix two more microarchitectural data sampling (MDS) or Zombieload flaws. This latest update comes after the company released two separate patches in May and November of last year.
#technology #tech #security #hacking
 

Researchers find serious flaws in WordPress plugins used on 400k sites | Ars Technica

Serious vulnerabilities have recently come to light in three WordPress plugins that have been installed on a combined 400,000 websites, researchers said. InfiniteWP, WP Time Capsule, and WP Database Reset are all affected.
#technology #tech #security #privacy #hacking #WordPress
 

36C3: Hacken und Basteln abseits der Vorträge


145 Vorträge gibt es beim 36C3, doch ebenso spannend ist der Trubel in den Hallen: Besucher löten dort Raketen, gehen zur Hackschule und erzeugen Sounds.
36C3: Hacken und Basteln abseits der Vorträge
#36C3 #ChaosComputerClub #Hacking
 

36C3: Hacken und Basteln abseits der Vorträge


145 Vorträge gibt es beim 36C3, doch ebenso spannend ist der Trubel in den Hallen: Besucher löten dort Raketen, gehen zur Hackschule und erzeugen Sounds.
36C3: Hacken und Basteln abseits der Vorträge
#36C3 #ChaosComputerClub #Hacking
 

Vulnerability in fully patched Android phones under active attack by bank thieves | Ars Technica

A vulnerability in millions of fully patched Android phones is being actively exploited by malware that's designed to drain the bank accounts of infected users, researchers said on Monday.

The vulnerability allows malicious apps to masquerade as legitimate apps that targets have already installed and come to trust, researchers from security firm Promon reported in a post. Running under the guise of trusted apps already installed, the malicious apps can then request permissions to carry out sensitive tasks, such as recording audio or video, taking photos, reading text messages or phishing login credentials. Targets who click yes to the request are then compromised.
#technology #security #hacking #Android #malware
 

Massive Android Exploit Lets Hackers Control Your Camera, Affects 'Hundreds of Millions' of Users | PetaPixel

A security firm has discovered a major Android exploit that would allow hackers to take control of your smartphone’s camera in the background and use it to take pictures or record video while the phone is locked. The security report reveals that the exploit affects Google and Samsung smartphones, bringing the tally of affected users into the “hundreds of millions.”
#technology #smartphone #Android #hacking #security #privacy
Massive Android Exploit Lets Hackers Control Your Camera, Affects ‘Hundreds of Millions’ of Users
 
Hacker Finds Hidden 'God Mode' on Old x86 CPUs https://www.tomshardware.com/news/x86-hidden-god-mode,37582.html
#risc #hacker #hacking #x86 #programming #computer #linux #cpu #secret #hidden #backdoor
 

Hackers spoofing US postal service to trap victims | TechRadar

After making the rounds in Europe, a new phishing campaign has arrived in the US and the attackers behind it are impersonating the US postal system with the aim of infecting users' computers with a banking trojan according to new research from Proofpoint.
#technology #hacking #phishing #security
 

Actively exploited bug in fully updated Firefox is sending users into a tizzy | Ars Technica

Scammers are actively exploiting a bug in Firefox that causes the browser to lock up after displaying a message warning the computer is running a pirated version of Windows that has been hacked.
#technology #security #hacking #Firefox
 
Do you have Alexa, Google Assistant or any other voice controlled device (like mobile phones) near a window?
Close the curtains :-)
It can be hacked by light.

Thanks for posting this @Hackaday (unofficial).

#hacking #Alexis #Home #laser #voice-control
 
Jane Manchun Wong: The woman scooping Silicon Valley - BBC News
She was the first person to get a detailed look at Facebook's new dating feature before the designs were released to the public.
She discovered that Airbnb was testing a new flight integration feature that alerted hosts on the website when their guests' planes landed safely.
And she sounded the horn when Instagram began experimenting with augmented reality profile pictures.
Silicon Valley's tech firms like to make a splash when they unveil new features. But half a world away, a Hong Kong-based software engineer has made it her ambition to spoil their scoops.
#technology #computing #hacking #WhiteHat
 

Zero-day exploits found in Android VoIP | TechRadar

Chinese researchers have found no less than nine zero-day vulnerabilities in how Android handles VoIP in its more recent versions.

The researchers stated that most security investigations focus on network infrastructure and apps, whereas they decided to look at Android’s VoIP integration.
#technology #Android #VOIP #hacking #security
 

Attackers exploit 0-day vulnerability that gives full control of Android phones | Ars Technica

Attackers are exploiting a zero-day vulnerability in Google’s Android mobile operating system that can give them full control of at least 18 different phone models, including four different Pixel models, a member of Google’s Project Zero research group said on Thursday night.
#technology #mobile #smartphone #Google #Android #Pixel #hacking #security
 
This will be fascinating to many people across the spectrum(s) of opinion... An interview with #EdwardSnowden
#NBC 's Brian Williams spoke via tele-video link between the studio and Snowden, still in Russia.

Anything about Snowden is hot-button. Some think Snowden is a hero and/or patriot, others think him a traitor.
Still others, especially outside America, see him as a voice of knowledge about the American security tentacles and also privacy in general. So, whether focused on 'deep state' or 'fascism', or simply tuning in to hear him talk about how our devices are spying on us.. this is worth a listen. Just a little bit on several topics, how your phone is chattering constantly, how he secures his own, how he feels about being stuck in Russia, and what he thinks of possibly helping to stop election hacking (spoiler: he'd welcome it) ....

Edward Snowden discusses Trump and privacy in the digital age


#snowden #digitalage #privacy #metadata #patriot #spay or traitor? #security #hacking #cybersecurity #analysis #perspective
 

iPhone attack also targeted Windows and Android devices | TechRadar

Last week's iPhone hack may have been wider than first thought to also affect Android and Windows devices, according to reports.

Sources speaking to Forbes have claimed that the attacks, which used malicious websites to install surveillance software onto victim devices, may have been part of a long-running campaign originating from China.
#technology #iPhone #hacking #security
 
Aujourd'hui Firefox m'a donné comme conseil :
Vérifiez si une fuite de données en ligne vous concerne.
Découvrez ce que les pirates informatiques savent déjà de vous, et apprenez à garder une longueur d’avance sur eux.
https://monitor.firefox.com/

#fuitededonnées #hacking #firefoxmonitor
 
Aujourd'hui Firefox m'a donné comme conseil :
Vérifiez si une fuite de données en ligne vous concerne.
Découvrez ce que les pirates informatiques savent déjà de vous, et apprenez à garder une longueur d’avance sur eux.
https://monitor.firefox.com/

#fuitededonnées #hacking #firefoxmonitor
 

Hackers can work out passwords by listening to you type | TechRadar

New hacking methods would allow criminals to work out passwords by listening to the sounds made when typing, experts have warned.

Reports have claimed that hackers listening into typing habits using a smartphone would be able to decode passwords with high levels of accuracy.
#technology #computing #security #hacking
 

YouTube's ban on “hacking techniques” threatens to shut down infosec YouTube


HN Discussion: https://news.ycombinator.com/item?id=20350306
Posted by KirinDave (karma: 14511)
Post stats: Points: 232 - Comments: 61 - 2019-07-04T00:09:08Z

\#HackerNews #ban #down #hacking #infosec #shut #techniques #threatens #youtube #youtubes
HackerNewsBot debug: Calculated post rank: 175 - Loop: 87 - Rank min: 100 - Author rank: 30
Youtube's ban on "hacking techniques" threatens to shut down all of infosec Youtube
 

Hacking the Casio F-91W to Handle 1000 Psi


HN Discussion: https://news.ycombinator.com/item?id=20079488
Posted by dvt (karma: 5259)
Post stats: Points: 123 - Comments: 42 - 2019-06-03T00:43:12Z

\#HackerNews #1000 #casio #f-91w #hacking #handle #psi #the
HackerNewsBot debug: Calculated post rank: 96 - Loop: 198 - Rank min: 80 - Author rank: 46
Hacking the Casio F-91W to Handle 1000+ PSI
 

The secret trick used by firms helping cyberhacking victims: pay the ransom | The Guardian

From 2015 to 2018, a strain of ransomware known as SamSam paralyzed computer networks across North America and the UK. It caused more than $30m in damages to at least 200 entities, including the cities of Atlanta and Newark, the port of San Diego and Hollywood Presbyterian medical center in Los Angeles. It knocked out Atlanta’s water service requests and online billing systems, prompted the Colorado Department of Transportation to call in the national guard, and delayed medical appointments and treatments for patients nationwide whose electronic records couldn’t be retrieved. In return for restoring access to the files, the cyberattackers collected at least $6m in ransom.
Warning: A long read.

#technology #hacking #security
 
WhatsApp gehackt, bitte Update einspielen
https://www.heise.de/security/meldung/Whatsapp-gehackt-bitte-Update-einspielen-4421379.html
#Android #Hacking #Israel #NSO #Sicherheit #WhatsApp #iOS
 
WhatsApp gehackt, bitte Update einspielen
https://www.heise.de/security/meldung/Whatsapp-gehackt-bitte-Update-einspielen-4421379.html
#Android #Hacking #Israel #NSO #Sicherheit #WhatsApp #iOS
 

Chinese Spies Got the NSA’s Hacking Tools, and Used Them for Attacks


HN Discussion: https://news.ycombinator.com/item?id=19845085
Posted by tysone (karma: 10479)
Post stats: Points: 164 - Comments: 64 - 2019-05-06T23:50:42Z

\#HackerNews #and #attacks #chinese #for #got #hacking #nsas #spies #the #them #tools #used
HackerNewsBot debug: Calculated post rank: 130 - Loop: 49 - Rank min: 100 - Author rank: 196

The New York Times: How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks (By NICOLE PERLROTH, DAVID E. SANGER and SCOTT SHANE)

 
Later posts Earlier posts