Searching for "hacker"

Facebok hackers

Facebook Says It’s Your Fault That Hackers Got Half a Billion User Phone Numbers from r/technology

https://www.vice.com/en/article/88awzp/facebook-says-its-your-fault-that-hackers-got-half-a-billion-user-phone-numbers

Facebook has become accustomed to dealing with multiple massive privacy breaches in recent years, and data belonging to hundreds of millions of its users has been leaked or stolen by hackers.

Facebook does not plan to notify half-billion users affected by data leak from r/worldnews

https://mobile.reuters.com/article/amp/idUSKBN2BU2ZY

The July 2019 FTC settlement requires Facebook to report details about unauthorized access to data on 500 or more users within 30 days of confirming an incident.

The Facebook spokesman declined to comment on the company’s conversations with regulators but said it was in contact to answer their questions.

++++++++++++++++
more on facebook in this IMS blog
https://blog.stcloudstate.edu/ims?s=facebook

China hackers

https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies

Nested on the servers’ motherboards, the testers found a tiny microchip, not much bigger than a grain of rice, that wasn’t part of the boards’ original design. Amazon reported the discovery to U.S. authorities, sending a shudder through the intelligence community. Elemental’s servers could be found in Department of Defense data centers, the CIA’s drone operations, and the onboard networks of Navy warships. And Elemental was just one of hundreds of Supermicro customers.

interdiction, consists of manipulating devices as they’re in transit from manufacturer to customer. This approach is favored by U.S. spy agencies, according to documents leaked by former National Security Agency contractor Edward Snowden. The other method involves seeding changes from the very beginning.

In emailed statements, Amazon (which announced its acquisition of Elemental in September 2015), Apple, and Supermicro disputed summaries of Bloomberg Businessweek’s reporting.

The Chinese government didn’t directly address questions about manipulation of Supermicro servers, issuing a statement that read, in part, “Supply chain safety in cyberspace is an issue of common concern, and China is also a victim.” The FBI and the Office of the Director of National Intelligence, representing the CIA and NSA, declined to comment.

+++++++++++++
more on hackers in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker

Vatican bots hackers

Vatican enlists bots to protect library from onslaught of hackers from r/technology

Vatican enlists bots to protect library from onslaught of hackers

https://www.theguardian.com/world/2020/nov/08/vatican-enlists-bots-to-protect-library-from-onslaught-of-hackers

The library has partnered with Darktrace, a company founded by Cambridge University mathematicians, which claims to be the first to develop an AI system for cybersecurity.

+++++++++++++++
more on bots in this IMS blog
https://blog.stcloudstate.edu/ims?s=bots

EU sanctions hackers

EU sanctions China, Russia, and North Korea for past hacks

The EU has imposed today its first-ever economical sanctions following cyber-attacks from foreign adversaries.

https://www.zdnet.com/article/eu-sanctions-china-russia-and-north-korea-for-past-hacks/

+++++++++++++++++

EU sanctions Russian intelligence, North Korean, Chinese firms over alleged cyberattacks

https://www.reuters.com/article/us-eu-cybercrime-russia-sanctions-idUSKCN24V32Q

+++++++++++++++++++

Pompeo praises EU over sanctions targeting cyberattacks from China, Russia

https://www.msn.com/en-us/news/world/pompeo-praises-eu-over-sanctions-targeting-cyberattacks-from-china-russia/ar-BB17nVlN

++++++++++++++++
more on hackers in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker

against government hackers

How to defend against government hackers

By Mark Rockwell Mar 31, 2017

https://fcw.com/articles/2017/03/31/rule41-aclu-defense-cyber.aspx

The 188-page “Challenging Government Hacking In Criminal Cases” report, released by the American Civil Liberties Union on March 30, addresses new amendments to Rule 41 of the Federal Rules of Criminal Procedure, which took effect last December.

Under the changes to criminal procedure rules, feds can remotely search computers in multiple jurisdictions with a single warrant. The rules are touted by law enforcement agencies as a way to streamline 100-year-old rules of criminal procedure

++++++++++++++++++++++++
more on surveillance in this IMS blog
https://blog.stcloudstate.edu/ims?s=surveillance

hackers versus crackers: Guccifer

Hackers versus crackers

http://www.techrepublic.com/blog/it-security/hacker-vs-cracker/

http://www.pctools.com/security-news/crackers-and-hackers/

Federal court sentences original Guccifer

By Mark Rockwell Sep 02, 2016

https://fcw.com/articles/2016/09/02/guccifer-sentence-rockwell.aspx

+++++++++++++++++

more in this blog on hackers and crackers

https://blog.stcloudstate.edu/ims?s=hackers

https://blog.stcloudstate.edu/ims?s=crackers

 

hackers and hard drive noises

Hackers could acquire sensitive data through monitoring hard drive noises

++++++++++++++

more on hackers in this IMS blog:
https://blog.stcloudstate.edu/ims?s=hackers

schools cybersecurity

https://www.edweek.org/technology/opinion-what-can-be-done-about-k-12s-looming-tech-nightmare/2022/01

As of this past August, Politico has reported that ransomware attacks have hit 58 education organizations and school districts, including 830 individual schools. Last March, the Broward County, Fla., district didn’t pay a $40 million ransom, leading the hackers to publish 26,000 stolen files online (these included student and staff Social Security numbers and addresses).

+++++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

1 2 3 6