Skip to main content

Home/ Digit_al Society/ Group items tagged hacking

Rss Feed Group items tagged

dr tech

23,000 Thai students' data up for sale on the dark web | Coconuts - 0 views

  •  
    "The university presidents' council said this morning that the security of its central admissions system has been upgraded after the personal data of around 23,000 students was advertised for sale on the dark web. The university presidents' council insisted that the leaked admissions data, which included personal information and examination results, was only current through last May after anger erupted over the data breach. #BanTCAS was surging on Thai Twitter this morning in reference to the Thai University Central Admission System, or TCAS."
dr tech

China's Olympics app is pure spyware; preparing for cyber spillover; and simulating tom... - 0 views

  •  
    "Cybersecurity researchers say the My2022 mobile app - the official app of the Beijing Winter Olympics - has serious security vulnerabilities and that "all Olympian audio is being collected, analyzed and saved on Chinese servers." Why This Matters: The Chinese government is mandating all Olympic athletes, coaches, and attendees use the My2022 app and, as of Thursday morning, the app is still available in the Apple and Android U.S. app stores where Americans can download it too."
dr tech

How the growing Russian ransomware threat is costing companies dear | Cybercrime | The ... - 0 views

  •  
    "The January snow lay thick on the Moscow ground, as masked officers of the FSB - Russia's fearsome security agency - prepared to smash down the doors at one of 25 addresses they would raid that day. Their target was REvil, a shadowy conclave of hackers that claimed to have stolen more than $100m (£74m) a year through "ransomware" attacks, before suddenly disappearing. As group members were led away in cuffs, FSB officers gathered crypto-wallets containing untold volumes of digital currency such as bitcoin. Others used money-counting machines to tot up dozens of stacks of hundred dollar bills."
dr tech

Cyber-attack forces shutdown of one of the US's largest pipelines | Cybercrime | The Gu... - 0 views

  •  
    "In a statement, the company said: "Colonial Pipeline is taking steps to understand and resolve this issue. At this time, our primary focus is the safe and efficient restoration of our service and our efforts to return to normal operation. This process is already under way, and we are working diligently to address this matter and to minimize disruption to our customers and those who rely on Colonial Pipeline."
dr tech

Can Your Genetic Information Be Hacked? - 0 views

  •  
    "Now, researchers warn that these "direct to consumer" services could be vulnerable to a sort of genetic hacking. By uploading selected DNA sequences, they say, it may be possible, for example, to pull out the genomes of most people in a database or to identify people with genetic variants associated with specific traits such as Alzheimer's disease."
dr tech

Largest dump in history: 2.7 billion records; 773 million of them unique; 140 million n... - 0 views

  •  
    "A dump called "Collection #1" has been released by parties unknown, containing email addresses and cracked passwords: in its raw form, it contains 2.7 billion records, which Troy "Have I Been Pwned" Hunt (previously) de-duplicated to come up with 773 million unique records -- of those 140,000,000 email addresses and 10,000,000 passwords have never been seen in the HaveIBeenPwned database before."
dr tech

The Biggest Data Breaches of 2017 (So Far…) - 0 views

  •  
    "This week, Atlassian's . This follows the trend of more and more high-profile hacks that are waking consumers up - like , , and the that rocked the country when 40 million debit and credit card numbers stolen during the holiday shopping time that year. (See of all the hacks from 2004 - present.)"
dr tech

Hacking a phone's fingerprint sensor in 15 mins with $500 worth of inkjet printer and c... - 0 views

  •  
    "$500 method for using a 300dpi scan of a fingerprint (which can be captured from a fingerprint sensor itself) to produce a working replica printed with conductive ink fed through a normal inkjet printer, in a prodcedure that takes less than 15 minutes. "
Ruben De Fraye

Hacking the Lights Out: The Computer Virus Threat to the Electrical Grid: Scientific Am... - 0 views

  • Last year word broke of a computer virus that had managed to slip into Iran’s highly secure nuclear enrichment facilities. Most viruses multiply without prejudice, but the Stuxnet virus had a specific target in its sights—one that is not connected to the Internet.
dr tech

Iran accused of using online censorship and hacking to sway presidential poll... - 0 views

  •  
    "Keyword-based filtering allows blocking of sites and texts containing candidates' names and slogans, say security experts"
1 - 17 of 17
Showing 20 items per page