Posts Tagged ‘hackers’

Facebok hackers

Facebook Says It’s Your Fault That Hackers Got Half a Billion User Phone Numbers from r/technology

https://www.vice.com/en/article/88awzp/facebook-says-its-your-fault-that-hackers-got-half-a-billion-user-phone-numbers

Facebook has become accustomed to dealing with multiple massive privacy breaches in recent years, and data belonging to hundreds of millions of its users has been leaked or stolen by hackers.

Facebook does not plan to notify half-billion users affected by data leak from r/worldnews

https://mobile.reuters.com/article/amp/idUSKBN2BU2ZY

The July 2019 FTC settlement requires Facebook to report details about unauthorized access to data on 500 or more users within 30 days of confirming an incident.

The Facebook spokesman declined to comment on the company’s conversations with regulators but said it was in contact to answer their questions.

++++++++++++++++
more on facebook in this IMS blog
https://blog.stcloudstate.edu/ims?s=facebook

China hackers

https://soundcloud.com/bloomberg-business/the-big-hack-part-1-read-aloud

https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies

Nested on the servers’ motherboards, the testers found a tiny microchip, not much bigger than a grain of rice, that wasn’t part of the boards’ original design. Amazon reported the discovery to U.S. authorities, sending a shudder through the intelligence community. Elemental’s servers could be found in Department of Defense data centers, the CIA’s drone operations, and the onboard networks of Navy warships. And Elemental was just one of hundreds of Supermicro customers.

interdiction, consists of manipulating devices as they’re in transit from manufacturer to customer. This approach is favored by U.S. spy agencies, according to documents leaked by former National Security Agency contractor Edward Snowden. The other method involves seeding changes from the very beginning.

In emailed statements, Amazon (which announced its acquisition of Elemental in September 2015), Apple, and Supermicro disputed summaries of Bloomberg Businessweek’s reporting.

The Chinese government didn’t directly address questions about manipulation of Supermicro servers, issuing a statement that read, in part, “Supply chain safety in cyberspace is an issue of common concern, and China is also a victim.” The FBI and the Office of the Director of National Intelligence, representing the CIA and NSA, declined to comment.

+++++++++++++
more on hackers in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker

Vatican bots hackers

Vatican enlists bots to protect library from onslaught of hackers from r/technology

Vatican enlists bots to protect library from onslaught of hackers

https://www.theguardian.com/world/2020/nov/08/vatican-enlists-bots-to-protect-library-from-onslaught-of-hackers

The library has partnered with Darktrace, a company founded by Cambridge University mathematicians, which claims to be the first to develop an AI system for cybersecurity.

+++++++++++++++
more on bots in this IMS blog
https://blog.stcloudstate.edu/ims?s=bots

The Great Hack Cambridge Analytica

The Great Hack (2019) – Exploring how a data company named Cambridge Analytica came to symbolise the dark side of social media in the wake of the 2016 U.S. presidential election, as uncovered by journalist Carole Cadwalladr. [01:54:00] from r/Documentaries

https://www.netflix.com/title/80117542

+++++++++++++++++

Former Cambridge Analytica chief receives seven-year directorship ban from r/worldnews

https://www.theguardian.com/uk-news/2020/sep/24/cambridge-analytica-directorship-ban-alexander-nix

++++++++++++++++
more on Cambridge Analytica in this IMS blog
https://blog.stcloudstate.edu/ims?s=cambridge

Protect Student Data

Six Ways to Protect Student Data and Prevent Cyberattacks

By Ricky Doyle     Dec 10, 2018

https://www.edsurge.com/news/2018-12-10-six-ways-to-protect-student-data-and-prevent-cyberattacks

School administrators and IT staff can be super-vigilant, but the hackers are getting better and better at sneaking through security.

the most common cybersecurity threats, and how can school staff avoid them?

Eavesdropping / Man-in-the-Middle (MiTM) Attacks

What they are: It’s likely that you sometimes use a school laptop or mobile device to gain internet access via Wi-Fi networks in public places like coffee shops or airports. If so, be aware that there may be hackers eavesdropping to try and gain entry to any two-party exchange you make so they can filter and steal data.

How to avoid them: Always use a school-verified SIM carddongle or VPN(virtual private network) to access the internet in public places.

Social Engineering Attacks

According to Verizon’s 2018 Breach Investigations report, 92 percent of malware is delivered via email, often referred to as social engineering attacks. The aim is to interact with the user and influence and manipulate their actions to gain access to systems and install harmful software. Malware uses various guises. Here are some of the most common:

1. Phishing emails

2. Baiting attacks

3. Quid pro quo requests

4. Pretexting attacks

5. Contact with a ‘compromised’ website

Malware, Phishing, Hacking, Ransomware

Keeping Safe in a Digital World

How Not to be Hacked

Malware, Phishing, Hacking, Ransomware – oh my! Learn about the threats to you, your users and your library.  During this session, we will explore the threats to online security and discuss solutions that can be implemented at any level. Most importantly, we will look at how we can educate our users on current threats and safety

Date: December 5th, 10AM

Presenter: Diana Silveira

Register: https://netforum.avectra.com/eweb/DynamicPage.aspx?Site=SEFLIN&WebCode=EventDetail&evt_key=bec597af-02dd-41a4-9b3a-afc42dc155e4

Webinar December 5, 2017 10 AM

  • create policies. e.g. changing psw routinely
  • USB blockers for public computers (public libraries). like skimmers on gas stations
  • do not use admin passwords
  • software and firmware updates.
  • policy for leaving employees
  • HTTP vs HTTPS
  • Cybersecurity KNowledge Quiz Pew research Center
    http://www.pewinternet.org/quiz/cybersecurity-knowledge/ 

diana@novarelibrary.com

slideshare.net/dee987

facebook.com/novarelibrary

twitter @Novarelibrary

+++++++++++
more on hacking in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker

edmodo accounts compromised

Edmodo Investigates Millions of User Accounts for Sale on Dark Web

By Sri Ravipati  05/12/17

https://thejournal.com/articles/2017/05/12/millions-of-edmodo-user-accounts-for-sale-on-dark-web.aspx

A hacker going by the name “nclay” claims to have stolen more than 77 million user accounts from Edmodo

LeakBase yesterday Tweeted that the top domains for the data breach include:

  • @gmail.com, accounting for 19 percent of the accounts at 13,286,240;
  • @hotmail.com, making up 10 percent of the accounts at 7,065,761; and
  • @yahoo.com, at 8 percent with 6,074,901 accounts.

+++++++++++++++++++++
more on Edmodo in this IMS blog
https://blog.stcloudstate.edu/ims?s=edmodo

1 2