Skip to main content

Home/ Digit_al Society/ Group items matching "hacker" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
dr tech

Twitter hack shows why social media needs cybersecurity regulations - 0 views

  •  
    "According to the report, Twitter's security "problems" were only exacerbated by the push to remote work necessitated by the coronavirus pandemic. Like many other newly remote workers, Twitter's employees experienced tech problems working from home. Hackers were able to capitalize on this, tricking at least one Twitter employee into believing the Hacker was a member of Twitter's IT team."
dr tech

Encryption Lava Lamps - San Francisco, California - Atlas Obscura - 1 views

  •  
    "As the lava lamps bubble and swirl, a video camera on the ceiling monitors their unpredictable changes and connects the footage to a computer, which converts the randomness into a virtually unhackable code.  Why use lava lamps for encryption instead of computer-generated code? Since computer codes are created by machines with relatively predictable patterns, it is entirely possible for hackers to guess their algorithms, posing a security risk. Lava lamps, on the other hand, add to the equation the sheer randomness of the physical world, making it nearly impossible for hackers to break through."
dr tech

FBI warns of look-alike election sites that could mess with voting - 1 views

  •  
    "Dubbed typosquatting, the idea is simple (if devious): A hacker registers a domain that is close enough to a real site, like yourbanknarne.com, and puts up a clone of yourbankname.com. The unsuspecting victim goes to the wrong site by mistake, and enters their personal banking information. In doing so, they have inadvertently handed the digital keys to their account to a hacker. "
aren01

The future of cybersecurity: Your body as a hacker-proof network | ZDNet - 1 views

  •  
    "The Purdue researchers have created Electro-Quasistatic Human Body Communication (EQS-HBC) which uses low-frequency, carrier-less broadband transmission, and so keeps the signal almost entirely within the human body. That means data from pacemakers and other implantable medical devices would only be readable a handful of centimetres outside the wearer."
  •  
    "Increasing numbers of implantable medical devices are now gaining internet connectivity, giving doctors the ability to monitor patients health remotely, and even update the devices to tweak a treatment plan. Unfortunately, that flexibility offers a way for hackers to hijack that hardware, and even potentially make changes to the way the devices work. While so far no attacks have been successful, proof-of-concept attacks have been available for years"
dr tech

Ransomware hackers steal a hospital. Again. / Boing Boing - 0 views

  •  
    "A month after a hospital in Hollywood was shut down by a ransomware infection that encrypted all the files on its computers and computer-controlled instruments and systems, another hospital, this one in Kentucky, has suffered a similar fate. "
dr tech

Bitcoin Thefts Surge, DDoS Hackers Take Millions - InformationWeek - 0 views

  •  
    "Bitcoin Internet Payment System (BIPS), a Denmark-based Bitcoin payment processor, suffered a denial-of-service (DDoS) attack."
longspagetti

Hackers Home in on Health, Education, Government Sectors | Cybersecurity | TechNewsWorld - 0 views

  •  
    New York healthcare provider, California's higher education system and the U.S. Department of Energy have become the latest targets of data bandits.
dr tech

Chat with the 17 year old hacker who hacked my blog - 1 views

  •  
    Age should'nt relate to wisdom. This is funny, it made me laugh especially the snapshot.
dr tech

Russian Hacker Selling 1.5 Million Facebook Accounts - 0 views

  •  
    This is the problem with a database with such economic value!
dr tech

Facebook Is Breached by Hackers, Putting 50 Million Users' Data at Risk - The New York Times - 0 views

  •  
    "Three software flaws in Facebook's systems allowed hackers to break into user accounts, including those of the top executives Mark Zuckerberg and Sheryl Sandberg, according to two people familiar with the investigation but not allowed to discuss it publicly. Once in, the attackers could have gained access to apps like Spotify, Instagram and hundreds of others that give users a way to log into their systems through Facebook."
dr tech

Deloitte hit by cyber-attack revealing clients' secret emails | Business | The Guardian - 0 views

  •  
    "The hacker compromised the firm's global email server through an "administrator's account" that, in theory, gave them privileged, unrestricted "access to all areas". The account required only a single password and did not have "two-step" verification, sources said."
dr tech

Humour over rumour? The world can learn a lot from Taiwan's approach to fake news | Arwa Mahdawi | Opinion | The Guardian - 0 views

  •  
    "Inoculating people from misinformation and tackling the "infodemic" are key to fighting the coronavirus. Tang, Taiwan's first transgender government minister and a self-described "civic hacker", has done this by fostering digital democracy: using technology to encourage civic participation and build consensus. Tang has also quashed faked news by implementing a 2-2-2 "humour over rumour" strategy. A response to misinformation is provided within 20 minutes, in 200 words or fewer, alongside two fun images. Early in the pandemic, for example, people were panic-buying toilet paper because of a rumour that it was being used to manufacture face masks; supplies were running out. So, the Taiwanese premier, Su Tseng-chang, released a cartoon of him wiggling his bum, with a caption saying: "We only have one pair of buttocks." It sounds silly, but it went viral. Humour can be far more effective than serious fact-checking."
dr tech

Hacker claims to have obtained data on 1 billion Chinese citizens | Hacking | The Guardian - 0 views

  •  
    ""In 2022, the Shanghai National Police (SHGA) database was leaked. This database contains many TB of data and information on billions of Chinese citizen," the post said. "Databases contain information on 1 billion Chinese national residents and several billion case records, including: name, address, birthplace, national ID number, mobile number, all crime/case details.""
dr tech

'I employ a lot of hackers': how a stock exchange chief deters cyber-attacks | Cyberwar | The Guardian - 0 views

  •  
    "After "social engineering" efforts using personal details to target staff were uncovered, badges no longer carry last names, clean-desk policies are far more strictly enforced and the processing and communication of sensitive information is now subject to higher bars of regular mandatory training."
dr tech

TerraCom and YourTel threaten journalists who exposed massive personal data breach - Boing Boing - 0 views

  •  
    "Journalists discovered that two companies had posted the personal data of 170,000 customers online. The leak, which exposed the victims to identity theft and fraud, was reportedly so bad that social security numbers, passport scans, financial data and home addresses were indexed by search engines. Rather than merely address the problem, however, TerraCom and YourTel threatened the reporters, referring to them as "hackers" and accusing them of "numerous violations of the Computer Fraud and Abuse Act"
dr tech

Security alert: notes from the frontline of the war in cyberspace | Technology | The Guardian - 0 views

  •  
    The battle for control of cyberspace is turning nasty, with young hackers, pirates and activists facing long prison sentences. We report from the frontline
dr tech

Major cyber attack disrupts internet service across Europe and US | Technology | The Guardian - 0 views

  •  
    "DDoS attacks are also becoming more common. Brian Krebs, an independent security researcher, observed earlier this month that the "source code" to the Mirai botnet had been released by a hacker group, "virtually guaranteeing that the internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices""
‹ Previous 21 - 40 of 85 Next › Last »
Showing 20 items per page