Skip to main content

Home/ Digit_al Society/ Group items tagged network attack

Rss Feed Group items tagged

dr tech

Distressing Annecy footage put social media's self-regulation to the test | France | Th... - 0 views

  •  
    "Most social media users know to self-regulate when violent events such as terror attacks occur: don't share distressing footage; don't spread unfounded rumours. But in the aftermath of the Annecy attack some inevitably acted without restraint. Bystander footage of a man attacking children in a park in south-east France appeared online after the attack on Thursday and was still available, on Twitter and TikTok, on Friday. The distressing footage has been used by TV networks but is heavily edited. The raw versions seen by the Guardian show the attacker dodging a member of the public and running around the playground before appearing to stab a toddler in a pushchair."
dr tech

Six bailed teenagers accused of cyber attacks using Lizard Squad tool | Technology | Th... - 0 views

  •  
    "Ddos attacks have been used to cause both financial and reputational damage to businesses and services from Sony to government websites. The attacks can last from hours to days, and typically use computers or internet routers infected with viruses to make innocent users unwitting parties to the attack. The Lizard Stresser tool was used effectively by Lizard Squad during cyber attacks on Microsoft's Xbox Live and Sony's PlayStation Network online gaming services in December last year."
dr tech

The US has suffered a massive cyberbreach. It's hard to overstate how bad it is | Techn... - 1 views

  •  
    "This is called a supply-chain attack, because it targets a supplier to an organization rather than an organization itself - and can affect all of a supplier's customers. It's an increasingly common way to attack networks. Other examples of this sort of attack include fake apps in the Google Play store, and hacked replacement screens for your smartphone."
dr tech

Hackers warn Iran: 'Don't mess with our elections' | World news | The Guardian - 0 views

  •  
    "Hackers have attacked networks in a number of countries including data centres in Iran, where they left the image of a US flag on screens along with a warning: "Don't mess with our elections", the Iranian IT ministry said on Saturday. "The attack apparently affected 200,000 router switches across the world in a widespread attack, including 3,500 switches in our country," the Ministry of Communication and Information Technology said in a statement carried by Iran's official news agency IRNA"
dr tech

Why the internet of things is the new magic ingredient for cyber criminals | John Naugh... - 0 views

  •  
    "The significance of the attack on Krebs is that it looks as though many of the attacks on him came from large numbers of enslaved devices - routers, cameras, networked TVs and the like. "Someone has a botnet with capabilities we haven't seen before," says Martin McKeay, Akamai's senior security expert. The DDoS arms race has just moved up a gear."
dr tech

Researchers demonstrate attack for pwning entire wind-farms / Boing Boing - 0 views

  •  
    "Worse: turbines are networked, so once one turbine is compromised, the rest of the turbines in the field can be poisoned, with attacks that include "paralyzing turbines, suddenly triggering their brakes to potentially damage them, and even relaying false feedback to their operators to prevent the sabotage from being detected.""
dr tech

North Korea refuses to deny role in Sony cyber-attack | World news | The Guardian - 0 views

  •  
    "Re/code, a technology news website, was the first to float the North Korea theory last Friday. Citing unnamed sources familiar with the matter, it said: "Sony Pictures Entertainment is exploring the possibility that hackers working on behalf of North Korea, possibly operating out of China, may be behind a devastating attack that brought the studio's network to a screeching halt earlier this week … The sources stress that a link to North Korea hasn't been confirmed, but has not been ruled out, either.""
aren01

The future of cybersecurity: Your body as a hacker-proof network | ZDNet - 1 views

  •  
    "The Purdue researchers have created Electro-Quasistatic Human Body Communication (EQS-HBC) which uses low-frequency, carrier-less broadband transmission, and so keeps the signal almost entirely within the human body. That means data from pacemakers and other implantable medical devices would only be readable a handful of centimetres outside the wearer."
  •  
    "Increasing numbers of implantable medical devices are now gaining internet connectivity, giving doctors the ability to monitor patients health remotely, and even update the devices to tweak a treatment plan. Unfortunately, that flexibility offers a way for hackers to hijack that hardware, and even potentially make changes to the way the devices work. While so far no attacks have been successful, proof-of-concept attacks have been available for years"
dr tech

What we know about 'Regin,' the powerful malware that could be the work of NSA - 0 views

  •  
    "Regin is a tool capable of infecting and compromising entire networks, not just individual computers, as security companies Symantec and Kaspersky Labs detailed in their technical reports published on Sunday and Monday. It's not only a computer virus or malware, but also a toolkit or platform that can be used for different purposes, depending on the needs of the attackers. It can collect passwords, retrieve deleted files, and even take over entire networks and infrastructures, according to researchers. "
dr tech

OK, panic-newly evolved ransomware is bad news for everyone | Ars Technica - 0 views

  •  
    "And that means that there's now a financial incentive for going after just about anything. While the payoff of going after businesses' networks used to depend on the long play-working deep into the network, finding and packaging data, smuggling it back out-ransomware attacks don't require that level of sophistication today. It's now much easier to convert hacks into cash."
dr tech

NSA and GCHQ target Tor network that protects anonymity of web users | World news | The... - 0 views

  •  
    "The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself."
dr tech

Seized ransomware network LockBit rewired to expose hackers to world | Cybercrime | The... - 0 views

  •  
    "The organisation is a pioneer of the "ransomware as a service" model, whereby it outsources the target selection and attacks to a network of semi-independent "affiliates", providing them with the tools and infrastructure and taking a commission on the ransoms in return. As well as ransomware, which typically works by encrypting data on infected machines and demanding a payment for providing the decryption key, LockBit copied stolen data and threatened to publish it if the fee was not paid, promising to delete the copies on receipt of a ransom."
dr tech

$10 router blamed in Bangladesh bank hack - BBC News - 0 views

  •  
    "The bank had no firewall and used second-hand routers that cost $10 to connect to global financial networks. Better security and hardware would have hampered the attackers, Reuters said, quoting an official investigator."
dr tech

The Morris Worm Was the World's First Cyberattack - 0 views

  •  
    "His program became the first of a particular type of cyber attack called "distributed denial of service," in which large numbers of internet-connected devices, including computers, webcams and other smart gadgets, are told to send lots of traffic to one particular address, overloading it with so much activity that either the system shuts down or its network connections are completely blocked."
dr tech

Hospitals brace for increase in cyberattacks  | TheHill - 0 views

  •  
    "As hospitals face a surge in patients and critical equipment shortages stemming from the coronavirus pandemic, they are increasingly becoming the target of hackers who see health care facilities as easy prey. Ransomware attacks, in which hackers lock up a network and demand payment to return access to these systems, have presented a growing threat to hospitals since January. "
dr tech

Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to c... - 0 views

  •  
    "In a collaboration between CyberNews Sr. Information Security Researcher Mantas Sasnauskas and researchers James Clee and Roni Carta, suspicious backdoors have been discovered in a Chinese-made Jetstream router, sold exclusively at Walmart as their new line of "affordable" wifi routers. This backdoor would allow an attacker the ability to remotely control not only the routers, but also any devices connected to that network. "
dr tech

Turkey blocks use of Twitter after prime minister attacks social media site | World new... - 0 views

  •  
    "Turkey restricted access to Twitter hours after its prime minister, Recep Tayyip Erdoğan, threatened to "root out" the social media network where wiretapped recordings have been leaked, damaging the government's reputation ahead of local elections."
1 - 18 of 18
Showing 20 items per page