Skip to main content

Home/ Digit_al Society/ Group items tagged control ITGS hacker

Rss Feed Group items tagged

dr tech

Hackers warn Iran: 'Don't mess with our elections' | World news | The Guardian - 0 views

  •  
    "Hackers have attacked networks in a number of countries including data centres in Iran, where they left the image of a US flag on screens along with a warning: "Don't mess with our elections", the Iranian IT ministry said on Saturday. "The attack apparently affected 200,000 router switches across the world in a widespread attack, including 3,500 switches in our country," the Ministry of Communication and Information Technology said in a statement carried by Iran's official news agency IRNA"
dr tech

Twitter hack: accounts of prominent figures, including Biden, Musk, Obama, Gates and Ka... - 0 views

  •  
    "Twitter suffered a major security breach on Wednesday that saw hackers take control of the accounts of major public figures and corporations, including Joe Biden, Barack Obama, Elon Musk, Bill Gates, Jeff Bezos and Apple. The company confirmed the breach Wednesday evening, more than six hours after the hack began, and attributed it to a "coordinated social engineering attack" on its own employees that enabled the hackers to access "internal systems and tools"."
dr tech

Leaked employee passwords open up Fortune 500 companies to hackers - 0 views

  •  
    "At 221 of the Fortune 500 companies, Fortune magazine's list of the the top 500 U.S. public corporations ranked by gross revenue, employees' credentials are posted publicly online for hackers to steal and reuse in cyberattacks, according to new research from the web intelligence firm Recorded Future. "
dr tech

Ransomware hackers steal a hospital. Again. / Boing Boing - 0 views

  •  
    "A month after a hospital in Hollywood was shut down by a ransomware infection that encrypted all the files on its computers and computer-controlled instruments and systems, another hospital, this one in Kentucky, has suffered a similar fate. "
dr tech

Security alert: notes from the frontline of the war in cyberspace | Technology | The Gu... - 0 views

  •  
    The battle for control of cyberspace is turning nasty, with young hackers, pirates and activists facing long prison sentences. We report from the frontline
dr tech

Elon Musk and Sam Altman's OpenAI and Pennsylvania State University made a tool to prot... - 0 views

  •  
    "To thwart such hackers, Elon Musk's OpenAI and Pennsylvania State University released a new tool this week called "cleverhans," that lets artificial intelligence researchers test how vulnerable their AI is to adversarial examples, or purposefully malicious data meant to confuse the algorithms. Once the vulnerability has been found, a defense to the attack can automatically be applied."
dr tech

Antivirus software is dead, says security expert at Symantec | Technology | theguardian... - 0 views

  •  
    "Dye told the Wall Street Journal that hackers increasingly use novel methods and bugs in the software of computers to perform attacks, resulting in about 55% cyberattacks going unnoticed by commercial antivirus software."
Max van Mesdag

iPhone 'malware' writer gets job - 0 views

  •  
    The writer of a worm that can enter jailbroken iPhones has accepted a job to be a hacker full time. Although he will be doing his work for good, are iPhone owners so happy about the situation?
dr tech

UK government plans to weaken encryption 'threatens way of life, privacy and economic s... - 0 views

  •  
    "Apple has warned the UK government that proposals in the draft Investigatory Powers Bill to demand technology firms weaken encryption would make the data of millions of law-abiding citizens less secure and make it easier for hackers to "cause chaos"."
dr tech

Seized ransomware network LockBit rewired to expose hackers to world | Cybercrime | The... - 0 views

  •  
    "The organisation is a pioneer of the "ransomware as a service" model, whereby it outsources the target selection and attacks to a network of semi-independent "affiliates", providing them with the tools and infrastructure and taking a commission on the ransoms in return. As well as ransomware, which typically works by encrypting data on infected machines and demanding a payment for providing the decryption key, LockBit copied stolen data and threatened to publish it if the fee was not paid, promising to delete the copies on receipt of a ransom."
1 - 11 of 11
Showing 20 items per page